<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2018-05-02T04:13:55</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:20022443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2002-2443</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2002-2443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443" source="CVE"/>
    <description>
    schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2002-2443.html">CVE-2002-2443</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 825985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 825985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 825985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 825985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 825985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 825985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 825985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 825985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 825985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 825985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 825985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 825985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 871411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 871411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 871411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 871411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 871411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 825985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 871411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 887734</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 825985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 871411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 871411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 871411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 825985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 871411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 825985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2002-2443">SUSE bug 871411</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0801</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2004-0801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0801" source="CVE"/>
    <description>
    Unknown vulnerability in foomatic-rip in Foomatic before 3.0.2 allows local users or remote attackers with access to CUPS to execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2004-0801.html">CVE-2004-0801</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-0801">SUSE bug 59233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-0801">SUSE bug 59233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-0801">SUSE bug 59233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-0801">SUSE bug 59233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-0801">SUSE bug 698451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-0801">SUSE bug 59233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-0801">SUSE bug 698451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-0801">SUSE bug 59233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-0801">SUSE bug 698451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-0801">SUSE bug 59233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-0801">SUSE bug 698451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-0801">SUSE bug 59233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-0801">SUSE bug 698451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-0801">SUSE bug 704608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-0801">SUSE bug 59233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-0801">SUSE bug 698451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-0801">SUSE bug 704608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-0801">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-0801">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-0801">SUSE bug 59233</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138396" comment="hplip-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151009" comment="hplip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138397" comment="hplip-hpijs-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151010" comment="hplip-hpijs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138398" comment="hplip-sane-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151011" comment="hplip-sane is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1377</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2004-1377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1377" source="CVE"/>
    <description>
    The (1) fixps (aka fixps.in) and (2) psmandup (aka psmandup.in) scripts in a2ps before 4.13 allow local users to overwrite arbitrary files via a symlink attack on temporary files.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2004-1377.html">CVE-2004-1377</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138057" comment="a2ps-4.14-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151012" comment="a2ps is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20042771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-2771</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2004-2771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2771" source="CVE"/>
    <description>
    The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2004-2771.html">CVE-2004-2771</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-2771">SUSE bug 909208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-2771">SUSE bug 909208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-2771">SUSE bug 909208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-2771">SUSE bug 909208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-2771">SUSE bug 909208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-2771">SUSE bug 909208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-2771">SUSE bug 909208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2004-2771">SUSE bug 909208</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138984" comment="mailx-12.5-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151013" comment="mailx is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0743</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2006-0743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0743" source="CVE"/>
    <description>
    Format string vulnerability in LocalSyslogAppender in Apache log4net 1.2.9 might allow remote attackers to cause a denial of service (memory corruption and termination) via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-0743.html">CVE-2006-0743</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-0743">SUSE bug 148685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-0743">SUSE bug 148685</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138980" comment="log4net-1.2.10-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151014" comment="log4net is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0855</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2006-0855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0855" source="CVE"/>
    <description>
    Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-0855.html">CVE-2006-0855</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-0855">SUSE bug 153057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-0855">SUSE bug 153057</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139156" comment="zoo-2.10-1027.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151015" comment="zoo is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2607</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2006-2607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2607" source="CVE"/>
    <description>
    do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-2607.html">CVE-2006-2607</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-2607">SUSE bug 178863</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-2607">SUSE bug 537178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-2607">SUSE bug 537178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-2607">SUSE bug 537178</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138197" comment="cron-4.2-57.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151016" comment="cron is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138198" comment="cronie-1.4.11-57.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151017" comment="cronie is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4197</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2006-4197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4197" source="CVE"/>
    <description>
    Multiple buffer overflows in libmusicbrainz (aka mb_client or MusicBrainz Client Library) 2.1.2 and earlier, and SVN 8406 and earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a long Location header by the HTTP server, which triggers an overflow in the MBHttp::Download function in lib/http.cpp; and (2) a long URL in RDF data, as demonstrated by a URL in an rdf:resource field in an RDF XML document, which triggers overflows in many functions in lib/rdfparse.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-4197.html">CVE-2006-4197</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-4197">SUSE bug 199134</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-4197">SUSE bug 199134</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-4197">SUSE bug 199134</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138717" comment="libmusicbrainz-devel-2.1.5-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151018" comment="libmusicbrainz-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138718" comment="libmusicbrainz4-2.1.5-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151019" comment="libmusicbrainz4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7234</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2006-7234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7234" source="CVE"/>
    <description>
    Untrusted search path vulnerability in Lynx before 2.8.6rel.4 allows local users to execute arbitrary code via malicious (1) .mailcap and (2) mime.types files in the current working directory.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-7234.html">CVE-2006-7234</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7234">SUSE bug 439427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7234">SUSE bug 439427</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138982" comment="lynx-2.8.7-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151020" comment="lynx is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7243</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2006-7243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7243" source="CVE"/>
    <description>
    PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-7243.html">CVE-2006-7243</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7243">SUSE bug 654853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7243">SUSE bug 654853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7243">SUSE bug 893855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7243">SUSE bug 654853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7243">SUSE bug 924970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7243">SUSE bug 992991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7243">SUSE bug 1067090</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7250</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2006-7250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7250" source="CVE"/>
    <description>
    The mime_hdr_cmp function in crypto/asn1/asn_mime.c in OpenSSL 0.9.8t and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2006-7250.html">CVE-2006-7250</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7250">SUSE bug 748738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7250">SUSE bug 748738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7250">SUSE bug 748738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7250">SUSE bug 748738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7250">SUSE bug 748738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7250">SUSE bug 748738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7250">SUSE bug 748738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7250">SUSE bug 748738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7250">SUSE bug 748738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7250">SUSE bug 748738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7250">SUSE bug 748738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7250">SUSE bug 883307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2006-7250">SUSE bug 748738</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1669</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2007-1669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1669" source="CVE"/>
    <description>
    zoo decoder 2.10 (zoo-2.10), as used in multiple products including (1) Barracuda Spam Firewall 3.4 and later with virusdef before 2.0.6399, (2) Spam Firewall before 3.4 20070319 with virusdef before 2.0.6399o, and (3) AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-1669.html">CVE-2007-1669</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-1669">SUSE bug 271781</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139156" comment="zoo-2.10-1027.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151015" comment="zoo is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4460</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2007-4460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4460" source="CVE"/>
    <description>
    The RenderV2ToFile function in tag_file.cpp in id3lib (aka libid3) 3.8.3 allows local users to overwrite arbitrary files via a symlink attack on a temporary file whose name is constructed from the name of a file being tagged.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4460.html">CVE-2007-4460</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-4460">SUSE bug 307073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-4460">SUSE bug 307073</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138405" comment="id3lib-3.8.3-267.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151068" comment="id3lib is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4772</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2007-4772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772" source="CVE"/>
    <description>
    The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-4772.html">CVE-2007-4772</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-4772">SUSE bug 329282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-4772">SUSE bug 329282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-4772">SUSE bug 329282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-4772">SUSE bug 329282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-4772">SUSE bug 329282</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123832" comment="libecpg6-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123833" comment="libecpg6-32bit-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151070" comment="libecpg6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123834" comment="libpq5-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123835" comment="libpq5-32bit-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123633" comment="postgresql-init-9.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151073" comment="postgresql-init is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123634" comment="postgresql93-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151074" comment="postgresql93 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123635" comment="postgresql93-contrib-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151075" comment="postgresql93-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123636" comment="postgresql93-devel-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151076" comment="postgresql93-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123637" comment="postgresql93-docs-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151077" comment="postgresql93-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123638" comment="postgresql93-libs-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151078" comment="postgresql93-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123639" comment="postgresql93-plperl-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151079" comment="postgresql93-plperl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123640" comment="postgresql93-plpython-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151080" comment="postgresql93-plpython is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123641" comment="postgresql93-pltcl-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151081" comment="postgresql93-pltcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123642" comment="postgresql93-server-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151082" comment="postgresql93-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123643" comment="postgresql93-test-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151083" comment="postgresql93-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123836" comment="postgresql94-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123837" comment="postgresql94-contrib-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123838" comment="postgresql94-devel-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123839" comment="postgresql94-docs-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123840" comment="postgresql94-libs-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151088" comment="postgresql94-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123841" comment="postgresql94-plperl-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151089" comment="postgresql94-plperl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123842" comment="postgresql94-plpython-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151090" comment="postgresql94-plpython is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123843" comment="postgresql94-pltcl-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151091" comment="postgresql94-pltcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123844" comment="postgresql94-server-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123845" comment="postgresql94-test-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151093" comment="postgresql94-test is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5970</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2007-5970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5970" source="CVE"/>
    <description>
    MySQL 5.1.x before 5.1.23 and 6.0.x before 6.0.4 allows remote authenticated users to gain privileges on arbitrary tables via unspecified vectors involving use of table-level DATA DIRECTORY and INDEX DIRECTORY options when creating a partitioned table with the same name as a table on which the user lacks privileges.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-5970.html">CVE-2007-5970</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-5970">SUSE bug 348307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-5970">SUSE bug 348307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-5970">SUSE bug 348307</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6600</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2007-6600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6600" source="CVE"/>
    <description>
    PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, 7.4 before 7.4.19, and 7.3 before 7.3.21 uses superuser privileges instead of table owner privileges for (1) VACUUM and (2) ANALYZE operations within index functions, and supports (3) SET ROLE and (4) SET SESSION AUTHORIZATION within index functions, which allows remote authenticated users to gain privileges.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6600.html">CVE-2007-6600</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6600">SUSE bug 329282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6600">SUSE bug 537706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6600">SUSE bug 537706</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6720</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2007-6720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6720" source="CVE"/>
    <description>
    libmikmod 3.1.9 through 3.2.0, as used by MikMod, SDL-mixer, and possibly other products, relies on the channel count of the last loaded song, rather than the currently playing song, for certain playback calculations, which allows user-assisted attackers to cause a denial of service (application crash) by loading multiple songs (aka MOD files) with different numbers of channels.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6720.html">CVE-2007-6720</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6720">SUSE bug 468760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6720">SUSE bug 468760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6720">SUSE bug 468760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6720">SUSE bug 468760</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138695" comment="libmikmod3-3.3.7-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151102" comment="libmikmod3 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6746</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2007-6746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6746" source="CVE"/>
    <description>
    telepathy-idle before 0.1.15 does not verify (1) that the issuer is a trusted CA, (2) that the server hostname matches a domain name in the subject's Common Name (CN), or (3) the expiration date of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2007-6746.html">CVE-2007-6746</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2007-6746">SUSE bug 817120</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139107" comment="telepathy-idle-0.2.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151103" comment="telepathy-idle is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0928</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-0928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0928" source="CVE"/>
    <description>
    Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-0928.html">CVE-2008-0928</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-0928">SUSE bug 362956</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139073" comment="qemu-linux-user-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1142</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-1142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1142" source="CVE"/>
    <description>
    rxvt 2.6.4 opens a terminal window on :0 if the DISPLAY environment variable is not set, which might allow local users to hijack X11 connections.  NOTE: it was later reported that rxvt-unicode, mrxvt, aterm, multi-aterm, and wterm are also affected.  NOTE: realistic attack scenarios require that the victim enters a command on the wrong machine.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1142.html">CVE-2008-1142</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-1142">SUSE bug 415661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-1142">SUSE bug 415661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-1142">SUSE bug 415661</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139086" comment="rxvt-unicode-9.21-4.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151120" comment="rxvt-unicode is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1420</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-1420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1420" source="CVE"/>
    <description>
    Integer overflow in residue partition value (aka partvals) evaluation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to execute arbitrary code via a crafted OGG file, which triggers a heap overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1420.html">CVE-2008-1420</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-1420">SUSE bug 372246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-1420">SUSE bug 372246</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138925" comment="libvorbis-devel-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151121" comment="libvorbis-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138926" comment="libvorbis0-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151122" comment="libvorbis0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138927" comment="libvorbis0-32bit-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151123" comment="libvorbis0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138928" comment="libvorbisenc2-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151124" comment="libvorbisenc2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138929" comment="libvorbisenc2-32bit-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151125" comment="libvorbisenc2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138930" comment="libvorbisfile3-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151126" comment="libvorbisfile3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138931" comment="libvorbisfile3-32bit-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151127" comment="libvorbisfile3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1686</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-1686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1686" source="CVE"/>
    <description>
    Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable DirectShow Filters and Annodex Plugins for Firefox, xine-lib before 1.1.12, and many other products, allows remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1686.html">CVE-2008-1686</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-1686">SUSE bug 377602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-1686">SUSE bug 377602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-1686">SUSE bug 377602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-1686">SUSE bug 379098</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009106467" comment="vorbis-tools-1.4.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151128" comment="vorbis-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009106468" comment="vorbis-tools-lang-1.4.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151129" comment="vorbis-tools-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1945</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-1945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1945" source="CVE"/>
    <description>
    QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different format, a related issue to CVE-2008-2004.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-1945.html">CVE-2008-1945</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-1945">SUSE bug 362956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-1945">SUSE bug 362956</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139073" comment="qemu-linux-user-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2109</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-2109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2109" source="CVE"/>
    <description>
    field.c in the libid3tag 0.15.0b library allows context-dependent attackers to cause a denial of service (CPU consumption) via an ID3_FIELD_TYPE_STRINGLIST field that ends in '\0', which triggers an infinite loop.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-2109.html">CVE-2008-2109</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-2109">SUSE bug 387731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-2109">SUSE bug 387731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-2109">SUSE bug 387731</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138655" comment="libid3tag0-0.15.1b-184.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151130" comment="libid3tag0 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2382</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-2382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2382" source="CVE"/>
    <description>
    The protocol_client_msg function in vnc.c in the VNC server in (1) Qemu 0.9.1 and earlier and (2) KVM kvm-79 and earlier allows remote attackers to cause a denial of service (infinite loop) via a certain message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-2382.html">CVE-2008-2382</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-2382">SUSE bug 461565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-2382">SUSE bug 464142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-2382">SUSE bug 464142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-2382">SUSE bug 464142</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139073" comment="qemu-linux-user-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3522</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-3522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522" source="CVE"/>
    <description>
    Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-3522.html">CVE-2008-3522</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-3522">SUSE bug 392410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-3522">SUSE bug 392410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-3522">SUSE bug 392410</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135598" comment="jasper-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135599" comment="libjasper-devel-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135600" comment="libjasper1-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135601" comment="libjasper1-32bit-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3825</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-3825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3825" source="CVE"/>
    <description>
    pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME environment variable to an arbitrary cache filename and running the (1) su or (2) sudo program. NOTE: there may be a related vector involving sshd that has limited relevance.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-3825.html">CVE-2008-3825</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-3825">SUSE bug 425861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-3825">SUSE bug 425861</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139018" comment="pam_krb5-2.4.4-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151135" comment="pam_krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139019" comment="pam_krb5-32bit-2.4.4-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151136" comment="pam_krb5-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4225</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-4225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4225" source="CVE"/>
    <description>
    Integer overflow in the xmlBufferResize function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (infinite loop) via a large XML document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4225.html">CVE-2008-4225</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4225">SUSE bug 445677</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4225">SUSE bug 445677</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138972" comment="libxml2-2-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138973" comment="libxml2-2-32bit-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138974" comment="libxml2-devel-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138975" comment="libxml2-tools-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139055" comment="python-libxml2-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4226</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-4226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226" source="CVE"/>
    <description>
    Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4226.html">CVE-2008-4226</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4226">SUSE bug 441368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4226">SUSE bug 441368</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138972" comment="libxml2-2-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138973" comment="libxml2-2-32bit-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138974" comment="libxml2-devel-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138975" comment="libxml2-tools-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139055" comment="python-libxml2-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4316</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-4316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4316" source="CVE"/>
    <description>
    Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4316.html">CVE-2008-4316</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4316">SUSE bug 449927</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4316">SUSE bug 449927</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4316">SUSE bug 449927</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4316">SUSE bug 475541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4316">SUSE bug 382708</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138330" comment="glib2-devel-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151142" comment="glib2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138331" comment="glib2-lang-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151143" comment="glib2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138332" comment="glib2-tools-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151144" comment="glib2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138333" comment="libgio-2_0-0-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151145" comment="libgio-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138334" comment="libgio-2_0-0-32bit-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151146" comment="libgio-2_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138335" comment="libglib-2_0-0-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151147" comment="libglib-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138336" comment="libglib-2_0-0-32bit-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151148" comment="libglib-2_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138337" comment="libgmodule-2_0-0-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151149" comment="libgmodule-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138338" comment="libgmodule-2_0-0-32bit-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151150" comment="libgmodule-2_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138339" comment="libgobject-2_0-0-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151151" comment="libgobject-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138340" comment="libgobject-2_0-0-32bit-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151152" comment="libgobject-2_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138341" comment="libgthread-2_0-0-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151153" comment="libgthread-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138342" comment="libgthread-2_0-0-32bit-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151154" comment="libgthread-2_0-0-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4409</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-4409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4409" source="CVE"/>
    <description>
    libxml2 2.7.0 and 2.7.1 does not properly handle "predefined entities definitions" in entities, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash), as demonstrated by use of xmllint on a certain XML document, a different vulnerability than CVE-2003-1564 and CVE-2008-3281.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4409.html">CVE-2008-4409</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4409">SUSE bug 432486</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138972" comment="libxml2-2-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138973" comment="libxml2-2-32bit-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138974" comment="libxml2-devel-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138975" comment="libxml2-tools-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139055" comment="python-libxml2-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4539</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4539" source="CVE"/>
    <description>
    Heap-based buffer overflow in the Cirrus VGA implementation in (1) KVM before kvm-82 and (2) QEMU on Debian GNU/Linux and Ubuntu might allow local users to gain privileges by using the VNC console for a connection, aka the LGD-54XX "bitblt" heap overflow.  NOTE: this issue exists because of an incorrect fix for CVE-2007-1320.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4539.html">CVE-2008-4539</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4539">SUSE bug 435135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4539">SUSE bug 448551</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4539">SUSE bug 448551</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139073" comment="qemu-linux-user-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4575</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-4575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4575" source="CVE"/>
    <description>
    Buffer overflow in the DoCommand function in jhead before 2.84 might allow context-dependent attackers to cause a denial of service (crash) via (1) a long -cmd argument and (2) unspecified vectors related to "a bunch of potential string overflows."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4575.html">CVE-2008-4575</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4575">SUSE bug 435979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4575">SUSE bug 435979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138413" comment="jhead-3.00-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151155" comment="jhead is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4641</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-4641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4641" source="CVE"/>
    <description>
    The DoCommand function in jhead.c in Matthias Wandel jhead 2.84 and earlier allows attackers to execute arbitrary commands via shell metacharacters in unspecified input.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4641.html">CVE-2008-4641</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4641">SUSE bug 435979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4641">SUSE bug 435979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4641">SUSE bug 435979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138413" comment="jhead-3.00-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151155" comment="jhead is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4690</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-4690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4690" source="CVE"/>
    <description>
    lynx 2.8.6dev.15 and earlier, when advanced mode is enabled and lynx is configured as a URL handler, allows remote attackers to execute arbitrary commands via a crafted lynxcgi: URL, a related issue to CVE-2005-2929.  NOTE: this might only be a vulnerability in limited deployments that have defined a lynxcgi: handler.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4690.html">CVE-2008-4690</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4690">SUSE bug 439149</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4690">SUSE bug 439149</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138982" comment="lynx-2.8.7-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151020" comment="lynx is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4989</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-4989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4989" source="CVE"/>
    <description>
    The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle attackers to insert a spoofed certificate for any Distinguished Name (DN).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-4989.html">CVE-2008-4989</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4989">SUSE bug 441856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4989">SUSE bug 467911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4989">SUSE bug 467911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4989">SUSE bug 467911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4989">SUSE bug 467911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4989">SUSE bug 467911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4989">SUSE bug 467911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4989">SUSE bug 467911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-4989">SUSE bug 392947</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138369" comment="gnutls-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138370" comment="libgnutls-devel-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138371" comment="libgnutls-openssl27-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151158" comment="libgnutls-openssl27 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138372" comment="libgnutls28-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151159" comment="libgnutls28 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138373" comment="libgnutls28-32bit-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151160" comment="libgnutls28-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5077</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-5077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077" source="CVE"/>
    <description>
    OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-5077.html">CVE-2008-5077</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-5077">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-5077">SUSE bug 465675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-5077">SUSE bug 465676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-5077">SUSE bug 465675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-5077">SUSE bug 465676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-5077">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-5077">SUSE bug 468866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-5077">SUSE bug 470968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-5077">SUSE bug 475108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-5077">SUSE bug 552497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-5077">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-5077">SUSE bug 629905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-5077">SUSE bug 708266</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-5077">SUSE bug 459468</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5913</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-5913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5913" source="CVE"/>
    <description>
    The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack."
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-5913.html">CVE-2008-5913</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-5913">SUSE bug 468762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-5913">SUSE bug 468762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-5913">SUSE bug 603356</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5984</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-5984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5984" source="CVE"/>
    <description>
    Untrusted search path vulnerability in the Python plugin in Dia 0.96.1, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-5984.html">CVE-2008-5984</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-5984">SUSE bug 470096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-5984">SUSE bug 470096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-5984">SUSE bug 470096</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138240" comment="dia-0.97.3-2.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151163" comment="dia is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138241" comment="dia-lang-0.97.3-2.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151164" comment="dia-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20087247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-7247</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2008-7247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7247" source="CVE"/>
    <description>
    sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2008-7247.html">CVE-2008-7247</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-7247">SUSE bug 557669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2008-7247">SUSE bug 604528</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0023</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023" source="CVE"/>
    <description>
    The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0023.html">CVE-2009-0023</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0023">SUSE bug 510301</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138541" comment="libapr-util1-1.5.3-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151171" comment="libapr-util1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138542" comment="libapr-util1-devel-1.5.3-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151172" comment="libapr-util1-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0035</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0035" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0035" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0035.html">CVE-2009-0035</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0035">SUSE bug 533396</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138064" comment="alsa-1.0.29-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151173" comment="alsa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138065" comment="alsa-devel-1.0.29-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151174" comment="alsa-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138066" comment="libasound2-1.0.29-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151175" comment="libasound2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138067" comment="libasound2-32bit-1.0.29-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151176" comment="libasound2-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0037</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037" source="CVE"/>
    <description>
    The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0037.html">CVE-2009-0037</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0037">SUSE bug 475103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0037">SUSE bug 475103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0037">SUSE bug 475103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0037">SUSE bug 527990</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138211" comment="curl-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138212" comment="libcurl-devel-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138213" comment="libcurl4-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0040</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040" source="CVE"/>
    <description>
    The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0040.html">CVE-2009-0040</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0040">SUSE bug 472745</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0040">SUSE bug 472745</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0040">SUSE bug 478625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0040">SUSE bug 478625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0040">SUSE bug 608040</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0159</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159" source="CVE"/>
    <description>
    Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0159.html">CVE-2009-0159</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0159">SUSE bug 484653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0159">SUSE bug 501632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0159">SUSE bug 484653</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138997" comment="ntp-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138998" comment="ntp-doc-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0163</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163" source="CVE"/>
    <description>
    Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and earlier allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted TIFF image, which is not properly handled by the (1) _cupsImageReadTIFF function in the imagetops filter and (2) imagetoraster filter, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0163.html">CVE-2009-0163</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0163">SUSE bug 485895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0163">SUSE bug 485895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0163">SUSE bug 485895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0163">SUSE bug 485895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0163">SUSE bug 485895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0163">SUSE bug 485895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0163">SUSE bug 485895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138200" comment="cups-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138201" comment="cups-client-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138202" comment="cups-devel-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138203" comment="cups-libs-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151187" comment="cups-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138204" comment="cups-libs-32bit-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151188" comment="cups-libs-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0179</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0179" source="CVE"/>
    <description>
    libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0179.html">CVE-2009-0179</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0179">SUSE bug 468760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0179">SUSE bug 468760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0179">SUSE bug 468760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0179">SUSE bug 468760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0179">SUSE bug 468760</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138695" comment="libmikmod3-3.3.7-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151102" comment="libmikmod3 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0186</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0186" source="CVE"/>
    <description>
    Integer overflow in libsndfile 1.0.18, as used in Winamp and other products, allows context-dependent attackers to execute arbitrary code via crafted description chunks in a CAF audio file, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0186.html">CVE-2009-0186</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0186">SUSE bug 481769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0186">SUSE bug 481769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0186">SUSE bug 481769</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138854" comment="libsndfile-devel-1.0.25-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151189" comment="libsndfile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138855" comment="libsndfile1-1.0.25-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151190" comment="libsndfile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138856" comment="libsndfile1-32bit-1.0.25-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151191" comment="libsndfile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0316</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0316" source="CVE"/>
    <description>
    Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim before 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983), as demonstrated by an erroneous search path for plugin/bike.vim in bicyclerepair.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0316.html">CVE-2009-0316</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0316">SUSE bug 470100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0316">SUSE bug 470100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0316">SUSE bug 470100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0316">SUSE bug 470100</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138391" comment="gvim-7.4.326-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151192" comment="gvim is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138392" comment="vim-7.4.326-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151193" comment="vim is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138393" comment="vim-data-7.4.326-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151194" comment="vim-data is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0590</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590" source="CVE"/>
    <description>
    The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0590.html">CVE-2009-0590</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0590">SUSE bug 489641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0590">SUSE bug 489641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0590">SUSE bug 489641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0590">SUSE bug 489641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0590">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0590">SUSE bug 629905</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0591</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0591" source="CVE"/>
    <description>
    The CMS_verify function in OpenSSL 0.9.8h through 0.9.8j, when CMS is enabled, does not properly handle errors associated with malformed signed attributes, which allows remote attackers to repudiate a signature that originally appeared to be valid but was actually invalid.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0591.html">CVE-2009-0591</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0591">SUSE bug 489641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0591">SUSE bug 489641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0591">SUSE bug 629905</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0652</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0652" source="CVE"/>
    <description>
    The Internationalized Domain Names (IDN) blacklist in Mozilla Firefox 3.0.6 and other versions before 3.0.9; Thunderbird before 2.0.0.21; and SeaMonkey before 1.1.15 does not include box-drawing characters, which allows remote attackers to spoof URLs and conduct phishing attacks, as demonstrated by homoglyphs of the / (slash) and ? (question mark) characters in a subdomain of a .cn domain name, a different vulnerability than CVE-2005-0233.  NOTE: some third parties claim that 3.0.6 is not affected, but much older versions perhaps are affected.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0652.html">CVE-2009-0652</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0652">SUSE bug 495473</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0688</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0688" source="CVE"/>
    <description>
    Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0688.html">CVE-2009-0688</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0688">SUSE bug 499104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0688">SUSE bug 499104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0688">SUSE bug 499104</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138219" comment="cyrus-sasl-2.1.26-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151195" comment="cyrus-sasl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138220" comment="cyrus-sasl-crammd5-2.1.26-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151196" comment="cyrus-sasl-crammd5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138221" comment="cyrus-sasl-devel-2.1.26-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151197" comment="cyrus-sasl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138222" comment="cyrus-sasl-digestmd5-2.1.26-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151198" comment="cyrus-sasl-digestmd5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138223" comment="cyrus-sasl-gssapi-2.1.26-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151199" comment="cyrus-sasl-gssapi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138224" comment="cyrus-sasl-plain-2.1.26-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151200" comment="cyrus-sasl-plain is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138225" comment="libsasl2-3-2.1.26-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151201" comment="libsasl2-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138226" comment="libsasl2-3-32bit-2.1.26-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151202" comment="libsasl2-3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0696</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696" source="CVE"/>
    <description>
    The dns_db_findrdataset function in db.c in named in ISC BIND 9.4 before 9.4.3-P3, 9.5 before 9.5.1-P3, and 9.6 before 9.6.1-P1, when configured as a master server, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an ANY record in the prerequisite section of a crafted dynamic update message, as exploited in the wild in July 2009.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0696.html">CVE-2009-0696</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0696">SUSE bug 526185</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0696">SUSE bug 526185</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0696">SUSE bug 526185</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0696">SUSE bug 526185</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0696">SUSE bug 526185</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0758</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0758" source="CVE"/>
    <description>
    The originates_from_local_legacy_unicast_socket function in avahi-core/server.c in avahi-daemon 0.6.23 does not account for the network byte order of a port number when processing incoming multicast packets, which allows remote attackers to cause a denial of service (network bandwidth and CPU consumption) via a crafted legacy unicast mDNS query packet that triggers a multicast packet storm.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0758.html">CVE-2009-0758</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0758">SUSE bug 480865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0758">SUSE bug 480865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0758">SUSE bug 480865</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138129" comment="avahi-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138130" comment="avahi-autoipd-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151209" comment="avahi-autoipd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138131" comment="avahi-compat-mDNSResponder-devel-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151210" comment="avahi-compat-mDNSResponder-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138132" comment="avahi-lang-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151211" comment="avahi-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138133" comment="libavahi-client3-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138134" comment="libavahi-client3-32bit-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151213" comment="libavahi-client3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138135" comment="libavahi-common3-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138136" comment="libavahi-common3-32bit-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151215" comment="libavahi-common3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138137" comment="libavahi-core7-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138138" comment="libavahi-devel-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151217" comment="libavahi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138139" comment="libdns_sd-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151218" comment="libdns_sd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0771</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0771" source="CVE"/>
    <description>
    The layout engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption and assertion failures.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0771.html">CVE-2009-0771</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0771">SUSE bug 478625</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0772</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0772" source="CVE"/>
    <description>
    The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to nsCSSStyleSheet::GetOwnerNode, events, and garbage collection, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0772.html">CVE-2009-0772</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0772">SUSE bug 478625</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0773</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0773" source="CVE"/>
    <description>
    The JavaScript engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a splice of an array that contains "some non-set elements," which causes jsarray.cpp to pass an incorrect argument to the ResizeSlots function, which triggers memory corruption; (2) vectors related to js_DecompileValueGenerator, jsopcode.cpp, __defineSetter__, and watch, which triggers an assertion failure or a segmentation fault; and (3) vectors related to gczeal, __defineSetter__, and watch, which triggers a hang.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0773.html">CVE-2009-0773</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0773">SUSE bug 478625</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0774</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0774" source="CVE"/>
    <description>
    The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to gczeal, a different vulnerability than CVE-2009-0773.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0774.html">CVE-2009-0774</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0774">SUSE bug 478625</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0775</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0775" source="CVE"/>
    <description>
    Double free vulnerability in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to execute arbitrary code via "cloned XUL DOM elements which were linked as a parent and child," which are not properly handled during garbage collection.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0775.html">CVE-2009-0775</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0775">SUSE bug 478625</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0776</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0776" source="CVE"/>
    <description>
    nsIRDFService in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to bypass the same-origin policy and read XML data from another domain via a cross-domain redirect.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0776.html">CVE-2009-0776</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0776">SUSE bug 478625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0776">SUSE bug 465291</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0777</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0777" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 decode invisible characters when they are displayed in the location bar, which causes an incorrect address to be displayed and makes it easier for remote attackers to spoof URLs and conduct phishing attacks.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0777.html">CVE-2009-0777</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0777">SUSE bug 478625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0777">SUSE bug 478625</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0789</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0789" source="CVE"/>
    <description>
    OpenSSL before 0.9.8k on WIN64 and certain other platforms does not properly handle a malformed ASN.1 structure, which allows remote attackers to cause a denial of service (invalid memory access and application crash) by placing this structure in the public key of a certificate, as demonstrated by an RSA public key.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0789.html">CVE-2009-0789</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0789">SUSE bug 489641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0789">SUSE bug 489641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0789">SUSE bug 489641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0789">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0789">SUSE bug 629905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0789">SUSE bug 489641</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0793</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0793" source="CVE"/>
    <description>
    cmsxform.c in LittleCMS (aka lcms or liblcms) 1.18, as used in OpenJDK and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted image that triggers execution of incorrect code for "transformations of monochrome profiles."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0793.html">CVE-2009-0793</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0793">SUSE bug 490610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0793">SUSE bug 490610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0793">SUSE bug 490610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0793">SUSE bug 490610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0793">SUSE bug 490610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0793">SUSE bug 490610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0793">SUSE bug 490610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0793">SUSE bug 521512</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0793">SUSE bug 490610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0793">SUSE bug 490610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0793">SUSE bug 521512</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0793">SUSE bug 521512</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0793">SUSE bug 490610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0793">SUSE bug 521513</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0793">SUSE bug 521513</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0793">SUSE bug 521513</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138681" comment="liblcms-devel-1.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151219" comment="liblcms-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138682" comment="liblcms1-1.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151220" comment="liblcms1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138683" comment="liblcms1-32bit-1.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151221" comment="liblcms1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138684" comment="python-lcms-1.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151222" comment="python-lcms is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0799</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799" source="CVE"/>
    <description>
    The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0799.html">CVE-2009-0799</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0799">SUSE bug 487100</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138754" comment="libpoppler-devel-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151223" comment="libpoppler-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138755" comment="libpoppler-glib8-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151224" comment="libpoppler-glib8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138756" comment="libpoppler-qt4-4-0.24.4-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151225" comment="libpoppler-qt4-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138757" comment="libpoppler44-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151226" comment="libpoppler44 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138758" comment="poppler-tools-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151227" comment="poppler-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0800</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800" source="CVE"/>
    <description>
    Multiple "input validation flaws" in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0800.html">CVE-2009-0800</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0800">SUSE bug 487100</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138754" comment="libpoppler-devel-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151223" comment="libpoppler-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138755" comment="libpoppler-glib8-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151224" comment="libpoppler-glib8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138756" comment="libpoppler-qt4-4-0.24.4-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151225" comment="libpoppler-qt4-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138757" comment="libpoppler44-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151226" comment="libpoppler44 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138758" comment="poppler-tools-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151227" comment="poppler-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0844</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844" source="CVE"/>
    <description>
    The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0844.html">CVE-2009-0844</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0844">SUSE bug 486722</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0845</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845" source="CVE"/>
    <description>
    The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3, when SPNEGO is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via invalid ContextFlags data in the reqFlags field in a negTokenInit token.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0845.html">CVE-2009-0845</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0845">SUSE bug 485894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0845">SUSE bug 486722</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0846</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846" source="CVE"/>
    <description>
    The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c in the ASN.1 GeneralizedTime decoder in MIT Kerberos 5 (aka krb5) before 1.6.4 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors involving an invalid DER encoding that triggers a free of an uninitialized pointer.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0846.html">CVE-2009-0846</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0846">SUSE bug 486723</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0846">SUSE bug 486723</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0847</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0847" source="CVE"/>
    <description>
    The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5 (aka krb5) 1.6.3, when PK-INIT is used, allows remote attackers to cause a denial of service (application crash) via a crafted length value that triggers an erroneous malloc call, related to incorrect calculations with pointer arithmetic.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0847.html">CVE-2009-0847</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0847">SUSE bug 486722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0847">SUSE bug 486722</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0945</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0945" source="CVE"/>
    <description>
    Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0945.html">CVE-2009-0945</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0945">SUSE bug 512559</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0945">SUSE bug 512559</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0945">SUSE bug 515124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0945">SUSE bug 515124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0945">SUSE bug 541632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0945">SUSE bug 515124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0945">SUSE bug 515124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0945">SUSE bug 515124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0945">SUSE bug 512559</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0945">SUSE bug 601349</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0945">SUSE bug 512559</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0945">SUSE bug 644114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0945">SUSE bug 512559</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138791" comment="libqt4-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151228" comment="libqt4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138792" comment="libqt4-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151229" comment="libqt4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138793" comment="libqt4-devel-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151230" comment="libqt4-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138794" comment="libqt4-linguist-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151231" comment="libqt4-linguist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138795" comment="libqt4-qt3support-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151232" comment="libqt4-qt3support is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138796" comment="libqt4-qt3support-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151233" comment="libqt4-qt3support-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138797" comment="libqt4-sql-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151234" comment="libqt4-sql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138798" comment="libqt4-sql-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151235" comment="libqt4-sql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138799" comment="libqt4-sql-mysql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151236" comment="libqt4-sql-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138800" comment="libqt4-sql-mysql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151237" comment="libqt4-sql-mysql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138801" comment="libqt4-sql-postgresql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151238" comment="libqt4-sql-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138802" comment="libqt4-sql-postgresql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151239" comment="libqt4-sql-postgresql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138803" comment="libqt4-sql-sqlite-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151240" comment="libqt4-sql-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138804" comment="libqt4-sql-sqlite-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151241" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138805" comment="libqt4-sql-unixODBC-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151242" comment="libqt4-sql-unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138806" comment="libqt4-sql-unixODBC-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151243" comment="libqt4-sql-unixODBC-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138807" comment="libqt4-x11-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151244" comment="libqt4-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138808" comment="libqt4-x11-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151245" comment="libqt4-x11-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0946</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-0946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946" source="CVE"/>
    <description>
    Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-0946.html">CVE-2009-0946</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0946">SUSE bug 485889</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0946">SUSE bug 496289</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0946">SUSE bug 485889</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0946">SUSE bug 541626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-0946">SUSE bug 541626</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1044</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1044" source="CVE"/>
    <description>
    Mozilla Firefox 3.0.7 on Windows 7 allows remote attackers to execute arbitrary code via unknown vectors related to the _moveToEdgeShift XUL tree method, which triggers garbage collection on objects that are still in use, as demonstrated by Nils during a PWN2OWN competition at CanSecWest 2009.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1044.html">CVE-2009-1044</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1044">SUSE bug 488955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1044">SUSE bug 488955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1044">SUSE bug 465291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1044">SUSE bug 488955</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1169</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1169" source="CVE"/>
    <description>
    The txMozillaXSLTProcessor::TransformToDoc function in Mozilla Firefox before 3.0.8 and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XML file with a crafted XSLT transform.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1169.html">CVE-2009-1169</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1169">SUSE bug 488955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1169">SUSE bug 488955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1169">SUSE bug 509766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1169">SUSE bug 509766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1169">SUSE bug 509766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1169">SUSE bug 509766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1169">SUSE bug 509766</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1179</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179" source="CVE"/>
    <description>
    Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1179.html">CVE-2009-1179</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1179">SUSE bug 487100</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138754" comment="libpoppler-devel-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151223" comment="libpoppler-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138755" comment="libpoppler-glib8-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151224" comment="libpoppler-glib8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138756" comment="libpoppler-qt4-4-0.24.4-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151225" comment="libpoppler-qt4-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138757" comment="libpoppler44-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151226" comment="libpoppler44 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138758" comment="poppler-tools-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151227" comment="poppler-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1180</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180" source="CVE"/>
    <description>
    The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a free of invalid data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1180.html">CVE-2009-1180</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1180">SUSE bug 487100</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138754" comment="libpoppler-devel-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151223" comment="libpoppler-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138755" comment="libpoppler-glib8-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151224" comment="libpoppler-glib8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138756" comment="libpoppler-qt4-4-0.24.4-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151225" comment="libpoppler-qt4-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138757" comment="libpoppler44-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151226" comment="libpoppler44 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138758" comment="poppler-tools-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151227" comment="poppler-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1181</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181" source="CVE"/>
    <description>
    The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1181.html">CVE-2009-1181</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1181">SUSE bug 487100</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138754" comment="libpoppler-devel-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151223" comment="libpoppler-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138755" comment="libpoppler-glib8-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151224" comment="libpoppler-glib8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138756" comment="libpoppler-qt4-4-0.24.4-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151225" comment="libpoppler-qt4-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138757" comment="libpoppler44-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151226" comment="libpoppler44 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138758" comment="poppler-tools-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151227" comment="poppler-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1182</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182" source="CVE"/>
    <description>
    Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1182.html">CVE-2009-1182</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1182">SUSE bug 487100</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138754" comment="libpoppler-devel-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151223" comment="libpoppler-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138755" comment="libpoppler-glib8-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151224" comment="libpoppler-glib8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138756" comment="libpoppler-qt4-4-0.24.4-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151225" comment="libpoppler-qt4-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138757" comment="libpoppler44-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151226" comment="libpoppler44 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138758" comment="poppler-tools-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151227" comment="poppler-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1183</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183" source="CVE"/>
    <description>
    The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1183.html">CVE-2009-1183</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1183">SUSE bug 487100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1183">SUSE bug 487100</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138754" comment="libpoppler-devel-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151223" comment="libpoppler-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138755" comment="libpoppler-glib8-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151224" comment="libpoppler-glib8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138756" comment="libpoppler-qt4-4-0.24.4-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151225" comment="libpoppler-qt4-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138757" comment="libpoppler44-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151226" comment="libpoppler44 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138758" comment="poppler-tools-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151227" comment="poppler-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1187</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1187" source="CVE"/>
    <description>
    Integer overflow in the JBIG2 decoding feature in Poppler before 0.10.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to CairoOutputDev (CairoOutputDev.cc).
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1187.html">CVE-2009-1187</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1187">SUSE bug 487100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1187">SUSE bug 487100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1187">SUSE bug 508153</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1187">SUSE bug 508154</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1187">SUSE bug 539875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1187">SUSE bug 566697</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138754" comment="libpoppler-devel-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151223" comment="libpoppler-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138755" comment="libpoppler-glib8-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151224" comment="libpoppler-glib8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138756" comment="libpoppler-qt4-4-0.24.4-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151225" comment="libpoppler-qt4-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138757" comment="libpoppler44-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151226" comment="libpoppler44 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138758" comment="poppler-tools-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151227" comment="poppler-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1188</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188" source="CVE"/>
    <description>
    Integer overflow in the JBIG2 decoding feature in the SplashBitmap::SplashBitmap function in SplashBitmap.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.10.6, as used in GPdf and kdegraphics KPDF, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1188.html">CVE-2009-1188</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1188">SUSE bug 487100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1188">SUSE bug 487100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1188">SUSE bug 508153</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1188">SUSE bug 508154</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1188">SUSE bug 508154</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1188">SUSE bug 508153</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1188">SUSE bug 508154</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1188">SUSE bug 508154</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1188">SUSE bug 539875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1188">SUSE bug 539875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1188">SUSE bug 546400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1188">SUSE bug 539875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1188">SUSE bug 539875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1188">SUSE bug 539875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1188">SUSE bug 539875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1188">SUSE bug 566697</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138754" comment="libpoppler-devel-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151223" comment="libpoppler-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138755" comment="libpoppler-glib8-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151224" comment="libpoppler-glib8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138756" comment="libpoppler-qt4-4-0.24.4-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151225" comment="libpoppler-qt4-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138757" comment="libpoppler44-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151226" comment="libpoppler44 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138758" comment="poppler-tools-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151227" comment="poppler-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1191</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1191" source="CVE"/>
    <description>
    mod_proxy_ajp.c in the mod_proxy_ajp module in the Apache HTTP Server 2.2.11 allows remote attackers to obtain sensitive response data, intended for a client that sent an earlier POST request with no request body, via an HTTP request.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1191.html">CVE-2009-1191</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1191">SUSE bug 521943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1191">SUSE bug 539571</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1191">SUSE bug 521943</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1195</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195" source="CVE"/>
    <description>
    The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1195.html">CVE-2009-1195</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 512583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 513080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 513080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 513080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 513080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 513080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 513080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 513080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 513080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 513080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 513080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 513080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 513080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 512583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 539571</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 513080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 539571</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 513080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 512583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 513080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 539571</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 513080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 539571</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1195">SUSE bug 513080</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1210</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1210" source="CVE"/>
    <description>
    Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1210.html">CVE-2009-1210</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1210">SUSE bug 491449</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1210">SUSE bug 493584</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1252</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252" source="CVE"/>
    <description>
    Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1252.html">CVE-2009-1252</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1252">SUSE bug 501632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1252">SUSE bug 501632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1252">SUSE bug 501632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1252">SUSE bug 501632</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138997" comment="ntp-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138998" comment="ntp-doc-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1267</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1267" source="CVE"/>
    <description>
    Unspecified vulnerability in the LDAP dissector in Wireshark 0.99.2 through 1.0.6, when running on Windows, allows remote attackers to cause a denial of service (crash) via unknown attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1267.html">CVE-2009-1267</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1267">SUSE bug 493584</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1268</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1268" source="CVE"/>
    <description>
    The Check Point High-Availability Protocol (CPHAP) dissector in Wireshark 0.9.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted FWHA_MY_STATE packet.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1268.html">CVE-2009-1268</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1268">SUSE bug 493584</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1269</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1269" source="CVE"/>
    <description>
    Unspecified vulnerability in Wireshark 0.99.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted Tektronix .rf5 file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1269.html">CVE-2009-1269</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1269">SUSE bug 493584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1269">SUSE bug 493584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1269">SUSE bug 493584</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1273</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1273" source="CVE"/>
    <description>
    pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1273.html">CVE-2009-1273</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1273">SUSE bug 492764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1273">SUSE bug 507729</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1273">SUSE bug 507729</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1273">SUSE bug 507729</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139020" comment="pam_ssh-2.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151252" comment="pam_ssh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139021" comment="pam_ssh-32bit-2.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151253" comment="pam_ssh-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1302</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1302" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox 3.x before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to (1) nsAsyncInstantiateEvent::Run, (2) nsStyleContext::Destroy, (3) nsComputedDOMStyle::GetWidth, (4) the xslt_attributeset_ImportSameName.html test case for the XSLT stylesheet compiler, (5) nsXULDocument::SynchronizeBroadcastListener, (6) IsBindingAncestor, (7) PL_DHashTableOperate and nsEditor::EndUpdateViewBatch, and (8) gfxSkipCharsIterator::SetOffsets, and other vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1302.html">CVE-2009-1302</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1302">SUSE bug 495473</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1303</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1303" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to nsSVGElement::BindToTree.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1303.html">CVE-2009-1303</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1303">SUSE bug 495473</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1304</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1304" source="CVE"/>
    <description>
    The JavaScript engine in Mozilla Firefox 3.x before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving (1) js_FindPropertyHelper, related to the definitions of Math and Date; and (2) js_CheckRedeclaration.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1304.html">CVE-2009-1304</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1304">SUSE bug 495473</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1305</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1305" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1305" source="CVE"/>
    <description>
    The JavaScript engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving JSOP_DEFVAR and properties that lack the JSPROP_PERMANENT attribute.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1305.html">CVE-2009-1305</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1305">SUSE bug 495473</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1306</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1306" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1306" source="CVE"/>
    <description>
    The jar: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not follow the Content-Disposition header of the inner URI, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via an uploaded .jar file with a "Content-Disposition: attachment" designation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1306.html">CVE-2009-1306</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1306">SUSE bug 495473</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1307</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1307" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1307" source="CVE"/>
    <description>
    The view-source: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not properly implement the Same Origin Policy, which allows remote attackers to (1) bypass crossdomain.xml restrictions and connect to arbitrary web sites via a Flash file; (2) read, create, or modify Local Shared Objects via a Flash file; or (3) bypass unspecified restrictions and render content via vectors involving a jar: URI.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1307.html">CVE-2009-1307</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1307">SUSE bug 495473</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1307">SUSE bug 515951</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1308</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1308" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1308" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey allows remote attackers to inject arbitrary web script or HTML via vectors involving XBL JavaScript bindings and remote stylesheets, as exploited in the wild by a March 2009 eBay listing.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1308.html">CVE-2009-1308</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1308">SUSE bug 495473</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1309</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1309" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1309" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey do not properly implement the Same Origin Policy for (1) XMLHttpRequest, involving a mismatch for a document's principal, and (2) XPCNativeWrapper.toString, involving an incorrect __proto__ scope, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1309.html">CVE-2009-1309</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1309">SUSE bug 495473</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1310</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1310" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the MozSearch plugin implementation in Mozilla Firefox before 3.0.9 allows user-assisted remote attackers to inject arbitrary web script or HTML via a javascript: URI in the SearchForm element.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1310.html">CVE-2009-1310</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1310">SUSE bug 495473</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1311</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1311" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.9 and SeaMonkey before 1.1.17 allow user-assisted remote attackers to obtain sensitive information via a web page with an embedded frame, which causes POST data from an outer page to be sent to the inner frame's URL during a SAVEMODE_FILEONLY save of the inner frame.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1311.html">CVE-2009-1311</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1311">SUSE bug 495473</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1311">SUSE bug 465291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1311">SUSE bug 515951</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1312</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1312" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1312" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.9 and SeaMonkey 1.1.17 do not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header. NOTE: it was later reported that Firefox 3.6 a1 pre and Mozilla 1.7.x and earlier are also affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1312.html">CVE-2009-1312</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1312">SUSE bug 495473</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1312">SUSE bug 495473</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1312">SUSE bug 495473</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1313</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1313" source="CVE"/>
    <description>
    The nsTextFrame::ClearTextRun function in layout/generic/nsTextFrameThebes.cpp in Mozilla Firefox 3.0.9 allows remote attackers to cause a denial of service (memory corruption) and probably execute arbitrary code via unspecified vectors.  NOTE: this vulnerability reportedly exists because of an incorrect fix for CVE-2009-1302.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1313.html">CVE-2009-1313</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1313">SUSE bug 500909</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1313">SUSE bug 502062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1313">SUSE bug 502062</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1377</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377" source="CVE"/>
    <description>
    The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1377.html">CVE-2009-1377</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1377">SUSE bug 504687</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1377">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1377">SUSE bug 629905</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1378</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378" source="CVE"/>
    <description>
    Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka "DTLS fragment handling memory leak."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1378.html">CVE-2009-1378</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1378">SUSE bug 504687</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1378">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1378">SUSE bug 629905</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1379</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379" source="CVE"/>
    <description>
    Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1379.html">CVE-2009-1379</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1379">SUSE bug 504687</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1379">SUSE bug 504687</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1379">SUSE bug 504687</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1379">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1379">SUSE bug 629905</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1384</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1384" source="CVE"/>
    <description>
    pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1384.html">CVE-2009-1384</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1384">SUSE bug 507729</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1384">SUSE bug 507729</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139018" comment="pam_krb5-2.4.4-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151135" comment="pam_krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139019" comment="pam_krb5-32bit-2.4.4-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151136" comment="pam_krb5-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1386</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1386" source="CVE"/>
    <description>
    ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1386.html">CVE-2009-1386</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1386">SUSE bug 509031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1386">SUSE bug 509031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1386">SUSE bug 515659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1386">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1386">SUSE bug 629905</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1387</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1387" source="CVE"/>
    <description>
    The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a "fragment bug."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1387.html">CVE-2009-1387</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1387">SUSE bug 509031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1387">SUSE bug 509031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1387">SUSE bug 515659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1387">SUSE bug 515659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1387">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1387">SUSE bug 629905</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1563</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1563" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2009-0689.  Reason: This candidate is a duplicate of CVE-2009-0689.  Certain codebase relationships were not originally clear.  Notes: All CVE users should reference CVE-2009-0689 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1563.html">CVE-2009-1563</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1563">SUSE bug 546371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1563">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1563">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1563">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1563">SUSE bug 522109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1563">SUSE bug 557126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1563">SUSE bug 557127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1563">SUSE bug 557128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1563">SUSE bug 557126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1563">SUSE bug 557671</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1571</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1571" source="CVE"/>
    <description>
    Use-after-free vulnerability in the HTML parser in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to execute arbitrary code via unspecified method calls that attempt to access freed objects in low-memory situations.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1571.html">CVE-2009-1571</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1571">SUSE bug 576969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1571">SUSE bug 581160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1571">SUSE bug 584499</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1720</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1720" source="CVE"/>
    <description>
    Multiple integer overflows in OpenEXR 1.2.2 and 1.6.1 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors that trigger heap-based buffer overflows, related to (1) the Imf::PreviewImage::PreviewImage function and (2) compressor constructors.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1720.html">CVE-2009-1720</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1720">SUSE bug 527538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1720">SUSE bug 527539</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1720">SUSE bug 527539</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138457" comment="libIlmImf-Imf_2_1-21-2.1.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151254" comment="libIlmImf-Imf_2_1-21 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138458" comment="openexr-devel-2.1.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1721</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1721" source="CVE"/>
    <description>
    The decompression implementation in the Imf::hufUncompress function in OpenEXR 1.2.2 and 1.6.1 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger a free of an uninitialized pointer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1721.html">CVE-2009-1721</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1721">SUSE bug 527538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1721">SUSE bug 527539</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138457" comment="libIlmImf-Imf_2_1-21-2.1.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151254" comment="libIlmImf-Imf_2_1-21 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138458" comment="openexr-devel-2.1.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1882</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1882" source="CVE"/>
    <description>
    Integer overflow in the XMakeImage function in magick/xwindow.c in ImageMagick 6.5.2-8, and GraphicsMagick, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF file, which triggers a buffer overflow.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1882.html">CVE-2009-1882</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1882">SUSE bug 507728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1882">SUSE bug 507728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1882">SUSE bug 507728</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138031" comment="GraphicsMagick-devel-1.3.21-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138032" comment="libGraphicsMagick-Q16-3-1.3.21-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138033" comment="libGraphicsMagick3-config-1.3.21-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138034" comment="libGraphicsMagickWand-Q16-2-1.3.21-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1885</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1885" source="CVE"/>
    <description>
    Stack consumption vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 2.7.0 and 2.8.0 allows context-dependent attackers to cause a denial of service (application crash) via vectors involving nested parentheses and invalid byte values in "simply nested DTD structures," as demonstrated by the Codenomicon XML fuzzing framework.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1885.html">CVE-2009-1885</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1885">SUSE bug 530708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1885">SUSE bug 530708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1885">SUSE bug 530708</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138971" comment="libxerces-c-3_1-3.1.1-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151260" comment="libxerces-c-3_1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1886</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1886" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1886" source="CVE"/>
    <description>
    Multiple format string vulnerabilities in client/client.c in smbclient in Samba 3.2.0 through 3.2.12 might allow context-dependent attackers to execute arbitrary code via format string specifiers in a filename.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1886.html">CVE-2009-1886</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1886">SUSE bug 513360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1886">SUSE bug 515479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1886">SUSE bug 515479</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138163" comment="cifs-utils-6.4-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151261" comment="cifs-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1888</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1888" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1888" source="CVE"/>
    <description>
    The acl_group_override function in smbd/posix_acls.c in smbd in Samba 3.0.x before 3.0.35, 3.1.x and 3.2.x before 3.2.13, and 3.3.x before 3.3.6, when dos filemode is enabled, allows remote attackers to modify access control lists for files via vectors related to read access to uninitialized memory.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1888.html">CVE-2009-1888</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1888">SUSE bug 513360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1888">SUSE bug 515479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1888">SUSE bug 515479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1888">SUSE bug 515479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1888">SUSE bug 515479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1888">SUSE bug 515479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1888">SUSE bug 515479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1888">SUSE bug 515479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1888">SUSE bug 515479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1888">SUSE bug 515479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1888">SUSE bug 515479</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138163" comment="cifs-utils-6.4-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151261" comment="cifs-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1890</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1890" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890" source="CVE"/>
    <description>
    The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1890.html">CVE-2009-1890</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1890">SUSE bug 519194</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1890">SUSE bug 519194</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1890">SUSE bug 519194</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1890">SUSE bug 519194</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1890">SUSE bug 519194</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1891</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891" source="CVE"/>
    <description>
    The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1891.html">CVE-2009-1891</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1891">SUSE bug 521906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1891">SUSE bug 521906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1891">SUSE bug 521906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1891">SUSE bug 521906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1891">SUSE bug 521906</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1892</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1892" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1892" source="CVE"/>
    <description>
    dhcpd in ISC DHCP 3.0.4 and 3.1.1, when the dhcp-client-identifier and hardware ethernet configuration settings are both used, allows remote attackers to cause a denial of service (daemon crash) via unspecified requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1892.html">CVE-2009-1892</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1892">SUSE bug 519413</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1892">SUSE bug 519413</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1892">SUSE bug 519413</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1892">SUSE bug 519413</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1892">SUSE bug 519413</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138235" comment="dhcp-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151310" comment="dhcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138236" comment="dhcp-client-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151311" comment="dhcp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138237" comment="dhcp-doc-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151312" comment="dhcp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138238" comment="dhcp-relay-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151313" comment="dhcp-relay is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138239" comment="dhcp-server-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151314" comment="dhcp-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1955</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955" source="CVE"/>
    <description>
    The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1955.html">CVE-2009-1955</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1955">SUSE bug 509825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1955">SUSE bug 510301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1955">SUSE bug 529591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1955">SUSE bug 992541</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1956</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956" source="CVE"/>
    <description>
    Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1956.html">CVE-2009-1956</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1956">SUSE bug 510301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1956">SUSE bug 510301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1956">SUSE bug 510301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1956">SUSE bug 510301</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1959</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-1959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1959" source="CVE"/>
    <description>
    Off-by-one error in the event_wallops function in fe-common/irc/fe-events.c in irssi 0.8.13 allows remote IRC servers to cause a denial of service (crash) via an empty command, which triggers a one-byte buffer under-read and a one-byte buffer underflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-1959.html">CVE-2009-1959</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1959">SUSE bug 510837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1959">SUSE bug 510837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1959">SUSE bug 510837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1959">SUSE bug 510837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-1959">SUSE bug 510837</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138408" comment="irssi-0.8.17-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151315" comment="irssi is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2285</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-2285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2285" source="CVE"/>
    <description>
    Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2 allows context-dependent attackers to cause a denial of service (crash) via a crafted TIFF image, a different vulnerability than CVE-2008-2327.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2285.html">CVE-2009-2285</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2285">SUSE bug 518698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2285">SUSE bug 518698</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2347</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-2347" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347" source="CVE"/>
    <description>
    Multiple integer overflows in inter-color spaces conversion tools in libtiff 3.8 through 3.8.2, 3.9, and 4.0 allow context-dependent attackers to execute arbitrary code via a TIFF image with large (1) width and (2) height values, which triggers a heap-based buffer overflow in the (a) cvt_whole_image function in tiff2rgba and (b) tiffcvt function in rgb2ycbcr.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2347.html">CVE-2009-2347</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2347">SUSE bug 519796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2347">SUSE bug 519796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2347">SUSE bug 519796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2347">SUSE bug 519796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2347">SUSE bug 616827</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2411</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-2411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2411" source="CVE"/>
    <description>
    Multiple integer overflows in the libsvn_delta library in Subversion before 1.5.7, and 1.6.x before 1.6.4, allow remote authenticated users and remote Subversion servers to execute arbitrary code via an svndiff stream with large windows that trigger a heap-based buffer overflow, a related issue to CVE-2009-2412.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2411.html">CVE-2009-2411</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2411">SUSE bug 528714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2411">SUSE bug 528714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2411">SUSE bug 528714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2411">SUSE bug 802057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2411">SUSE bug 528714</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2412</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-2412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412" source="CVE"/>
    <description>
    Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2412.html">CVE-2009-2412</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2412">SUSE bug 528714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2412">SUSE bug 529591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2412">SUSE bug 529591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2412">SUSE bug 529591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2412">SUSE bug 529591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2412">SUSE bug 528714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2412">SUSE bug 529591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2412">SUSE bug 529591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2412">SUSE bug 529591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2412">SUSE bug 529591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2412">SUSE bug 529591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2412">SUSE bug 529591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2412">SUSE bug 802057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2412">SUSE bug 529591</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138541" comment="libapr-util1-1.5.3-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151171" comment="libapr-util1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138542" comment="libapr-util1-devel-1.5.3-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151172" comment="libapr-util1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138543" comment="libapr1-1.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151326" comment="libapr1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138544" comment="libapr1-devel-1.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151327" comment="libapr1-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2417</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-2417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417" source="CVE"/>
    <description>
    lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2417.html">CVE-2009-2417</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2417">SUSE bug 527990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2417">SUSE bug 527990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2417">SUSE bug 528372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2417">SUSE bug 528372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2417">SUSE bug 528372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2417">SUSE bug 528372</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138211" comment="curl-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138212" comment="libcurl-devel-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138213" comment="libcurl4-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2470</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-2470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2470" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.12, and 3.5.x before 3.5.2, allows remote SOCKS5 proxy servers to cause a denial of service (data stream corruption) via a long domain name in a reply.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2470.html">CVE-2009-2470</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2473</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-2473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2473" source="CVE"/>
    <description>
    neon before 0.28.6, when expat is used, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2473.html">CVE-2009-2473</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2473">SUSE bug 532345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2473">SUSE bug 528370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2473">SUSE bug 532345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2473">SUSE bug 532345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2473">SUSE bug 532345</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138727" comment="libneon27-0.30.1-2.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151328" comment="libneon27 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2474</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-2474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2474" source="CVE"/>
    <description>
    neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2474.html">CVE-2009-2474</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2474">SUSE bug 528370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2474">SUSE bug 528370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2474">SUSE bug 528370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2474">SUSE bug 528370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138727" comment="libneon27-0.30.1-2.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151328" comment="libneon27 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2624</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-2624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2624" source="CVE"/>
    <description>
    The huft_build function in inflate.c in gzip before 1.3.13 creates a hufts (aka huffman) table that is too small, which allows remote attackers to cause a denial of service (application crash or infinite loop) or possibly execute arbitrary code via a crafted archive.  NOTE: this issue is caused by a CVE-2006-4334 regression.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2624.html">CVE-2009-2624</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2624">SUSE bug 570331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2624">SUSE bug 570331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2624">SUSE bug 570331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2624">SUSE bug 570331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2624">SUSE bug 588113</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138394" comment="gzip-1.6-9.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151329" comment="gzip is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2625</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625" source="CVE"/>
    <description>
    XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2625.html">CVE-2009-2625</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2625">SUSE bug 530717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2625">SUSE bug 534025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2625">SUSE bug 525562</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2625">SUSE bug 534721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2625">SUSE bug 537969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2625">SUSE bug 540945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2625">SUSE bug 540945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2625">SUSE bug 540945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2625">SUSE bug 548655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2625">SUSE bug 550664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2625">SUSE bug 553220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2625">SUSE bug 558892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2625">SUSE bug 581162</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2625">SUSE bug 581765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2625">SUSE bug 610080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2625">SUSE bug 611931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2625">SUSE bug 611932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2625">SUSE bug 610080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2625">SUSE bug 611931</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138272" comment="expat-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151330" comment="expat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138273" comment="libexpat-devel-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151331" comment="libexpat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138274" comment="libexpat1-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138275" comment="libexpat1-32bit-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151333" comment="libexpat1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2654</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-2654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2654" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to spoof the address bar, and possibly conduct phishing attacks, via a crafted web page that calls window.open with an invalid character in the URL, makes document.write calls to the resulting object, and then calls the stop method during the loading of the error page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2654.html">CVE-2009-2654</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2654">SUSE bug 527489</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2666</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-2666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2666" source="CVE"/>
    <description>
    socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2666.html">CVE-2009-2666</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2666">SUSE bug 528746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2666">SUSE bug 528746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2666">SUSE bug 528746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2666">SUSE bug 528746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2666">SUSE bug 528746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2666">SUSE bug 528746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2666">SUSE bug 528746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2666">SUSE bug 528746</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138276" comment="fetchmail-6.3.26-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151334" comment="fetchmail is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2694</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-2694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2694" source="CVE"/>
    <description>
    The msn_slplink_process_msg function in libpurple/protocols/msn/slplink.c in libpurple, as used in Pidgin (formerly Gaim) before 2.5.9 and Adium 1.3.5 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by sending multiple crafted SLP (aka MSNSLP) messages to trigger an overwrite of an arbitrary memory location.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-1376.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2694.html">CVE-2009-2694</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2694">SUSE bug 527100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2694">SUSE bug 527100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2694">SUSE bug 527100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2694">SUSE bug 527100</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2699</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-2699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2699" source="CVE"/>
    <description>
    The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows remote attackers to cause a denial of service (daemon hang) via unspecified HTTP requests, related to the prefork and event MPMs.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2699.html">CVE-2009-2699</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2699">SUSE bug 1078450</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2703</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-2703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2703" source="CVE"/>
    <description>
    libpurple/protocols/irc/msgs.c in the IRC protocol plugin in libpurple in Pidgin before 2.6.2 allows remote IRC servers to cause a denial of service (NULL pointer dereference and application crash) via a TOPIC message that lacks a topic string.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2703.html">CVE-2009-2703</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2703">SUSE bug 537214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2703">SUSE bug 537214</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2813</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-2813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813" source="CVE"/>
    <description>
    Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in Apple Mac OS X 10.5.8 when Windows File Sharing is enabled, Fedora 11, and other operating systems, does not properly handle errors in resolving pathnames, which allows remote authenticated users to bypass intended sharing restrictions, and read, create, or modify files, in certain circumstances involving user accounts that lack home directories.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2813.html">CVE-2009-2813</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2813">SUSE bug 539517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2813">SUSE bug 515479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2813">SUSE bug 539517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2813">SUSE bug 543115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2813">SUSE bug 539517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2813">SUSE bug 539517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2813">SUSE bug 539517</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138163" comment="cifs-utils-6.4-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151261" comment="cifs-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2820</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-2820" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2820" source="CVE"/>
    <description>
    The web interface in CUPS before 1.4.2, as used on Apple Mac OS X before 10.6.2 and other platforms, does not properly handle (1) HTTP headers and (2) HTML templates, which allows remote attackers to conduct cross-site scripting (XSS) attacks and HTTP response splitting attacks via vectors related to (a) the product's web interface, (b) the configuration of the print system, and (c) the titles of printed jobs, as demonstrated by an XSS attack that uses the kerberos parameter to the admin program, and leverages attribute injection and HTTP Parameter Pollution (HPP) issues.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2820.html">CVE-2009-2820</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2820">SUSE bug 548317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2820">SUSE bug 548317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2820">SUSE bug 551563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2820">SUSE bug 548317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2820">SUSE bug 548317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2820">SUSE bug 551563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2820">SUSE bug 574336</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138200" comment="cups-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138201" comment="cups-client-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138202" comment="cups-devel-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138203" comment="cups-libs-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151187" comment="cups-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138204" comment="cups-libs-32bit-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151188" comment="cups-libs-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2905</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-2905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2905" source="CVE"/>
    <description>
    Heap-based buffer overflow in textbox.c in newt 0.51.5, 0.51.6, and 0.52.2 allows local users to cause a denial of service (application crash) or possibly execute arbitrary code via a request to display a crafted text dialog box.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2905.html">CVE-2009-2905</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2905">SUSE bug 540930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2905">SUSE bug 540930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2905">SUSE bug 540930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2905">SUSE bug 540930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2905">SUSE bug 540930</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138728" comment="libnewt0_52-0.52.16-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151340" comment="libnewt0_52 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2906</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-2906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906" source="CVE"/>
    <description>
    smbd in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8, and 3.4 before 3.4.2 allows remote authenticated users to cause a denial of service (infinite loop) via an unanticipated oplock break notification reply packet.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2906.html">CVE-2009-2906</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2906">SUSE bug 543115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2906">SUSE bug 515479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2906">SUSE bug 543115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2906">SUSE bug 543115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2906">SUSE bug 543115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2906">SUSE bug 543115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2906">SUSE bug 543115</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138163" comment="cifs-utils-6.4-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151261" comment="cifs-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2948</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-2948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2948" source="CVE"/>
    <description>
    mount.cifs in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8 and 3.4 before 3.4.2, when mount.cifs is installed suid root, does not properly enforce permissions, which allows local users to read part of the credentials file and obtain the password by specifying the path to the credentials file and using the --verbose or -v option.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-2948.html">CVE-2009-2948</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2948">SUSE bug 542150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2948">SUSE bug 515479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2948">SUSE bug 542150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2948">SUSE bug 543115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2948">SUSE bug 542150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-2948">SUSE bug 542150</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138163" comment="cifs-utils-6.4-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151261" comment="cifs-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3026</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3026" source="CVE"/>
    <description>
    protocols/jabber/auth.c in libpurple in Pidgin 2.6.0, and possibly other versions, does not follow the "require TLS/SSL" preference when connecting to older Jabber servers that do not follow the XMPP specification, which causes libpurple to connect to the server without the expected encryption and allows remote attackers to sniff sessions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3026.html">CVE-2009-3026</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3026">SUSE bug 535570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3026">SUSE bug 535570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3026">SUSE bug 535570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3026">SUSE bug 550170</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3050</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3050" source="CVE"/>
    <description>
    Buffer overflow in the set_page_size function in util.cxx in HTMLDOC 1.8.27 and earlier allows context-dependent attackers to execute arbitrary code via a long MEDIA SIZE comment.  NOTE: it was later reported that there were additional vectors in htmllib.cxx and ps-pdf.cxx using an AFM font file with a long glyph name, but these vectors do not cross privilege boundaries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3050.html">CVE-2009-3050</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3050">SUSE bug 535943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3050">SUSE bug 523721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3050">SUSE bug 535943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3050">SUSE bug 535943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3050">SUSE bug 535943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3050">SUSE bug 535943</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138399" comment="htmldoc-1.8.28-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151341" comment="htmldoc is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3069</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3069" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3069.html">CVE-2009-3069</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3069">SUSE bug 534458</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3070</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3070" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3070.html">CVE-2009-3070</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3070">SUSE bug 534458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3070">SUSE bug 538290</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3071</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3071" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3071.html">CVE-2009-3071</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3071">SUSE bug 534458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3071">SUSE bug 538290</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3072</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3072" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.3, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the BinHex decoder in netwerk/streamconv/converters/nsBinHexDecoder.cpp, and unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3072.html">CVE-2009-3072</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3072">SUSE bug 534458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3072">SUSE bug 538290</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3072">SUSE bug 590499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3072">SUSE bug 607935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3073</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3073" source="CVE"/>
    <description>
    Unspecified vulnerability in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3073.html">CVE-2009-3073</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3073">SUSE bug 534458</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3074</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3074" source="CVE"/>
    <description>
    Unspecified vulnerability in the JavaScript engine in Mozilla Firefox before 3.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3074.html">CVE-2009-3074</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3074">SUSE bug 538290</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3075</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.2, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to use of mutable strings in the js_StringReplaceHelper function in js/src/jsstr.cpp, and unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3075.html">CVE-2009-3075</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3075">SUSE bug 534458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3075">SUSE bug 538290</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3075">SUSE bug 590499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3075">SUSE bug 607935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3077</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3077" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, does not properly manage pointers for the columns (aka TreeColumns) of a XUL tree element, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to a "dangling pointer vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3077.html">CVE-2009-3077</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3077">SUSE bug 534458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3077">SUSE bug 538290</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3077">SUSE bug 590499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3077">SUSE bug 607935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3078</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3078" source="CVE"/>
    <description>
    Visual truncation vulnerability in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, allows remote attackers to trigger a vertical scroll and spoof URLs via unspecified Unicode characters with a tall line-height property.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3078.html">CVE-2009-3078</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3078">SUSE bug 534458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3078">SUSE bug 538290</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3079</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3079" source="CVE"/>
    <description>
    Unspecified vulnerability in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, allows remote attackers to execute arbitrary JavaScript with chrome privileges via vectors involving an object, the FeedWriter, and the BrowserFeedWriter.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3079.html">CVE-2009-3079</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3079">SUSE bug 534458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3079">SUSE bug 538290</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3079">SUSE bug 538290</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3083</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3083" source="CVE"/>
    <description>
    The msn_slp_sip_recv function in libpurple/protocols/msn/slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an SLP invite message that lacks certain required fields, as demonstrated by a malformed message from a KMess client.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3083.html">CVE-2009-3083</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3083">SUSE bug 536602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3083">SUSE bug 550170</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3084</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3084" source="CVE"/>
    <description>
    The msn_slp_process_msg function in libpurple/protocols/msn/slpcall.c in the MSN protocol plugin in libpurple 2.6.0 and 2.6.1, as used in Pidgin before 2.6.2, allows remote attackers to cause a denial of service (application crash) via a handwritten (aka Ink) message, related to an uninitialized variable and the incorrect "UTF16-LE" charset name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3084.html">CVE-2009-3084</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3084">SUSE bug 536602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3084">SUSE bug 550170</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3085</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3085" source="CVE"/>
    <description>
    The XMPP protocol plugin in libpurple in Pidgin before 2.6.2 does not properly handle an error IQ stanza during an attempted fetch of a custom smiley, which allows remote attackers to cause a denial of service (application crash) via XHTML-IM content with cid: images.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3085.html">CVE-2009-3085</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3085">SUSE bug 536602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3085">SUSE bug 536602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3085">SUSE bug 536602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3085">SUSE bug 536602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3085">SUSE bug 550170</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3094</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094" source="CVE"/>
    <description>
    The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3094.html">CVE-2009-3094</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3094">SUSE bug 538322</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3095</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095" source="CVE"/>
    <description>
    The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3095.html">CVE-2009-3095</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3095">SUSE bug 538322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3095">SUSE bug 538322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3095">SUSE bug 538322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3095">SUSE bug 538322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3095">SUSE bug 538322</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3235</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3235" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3235.html">CVE-2009-3235</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3235">SUSE bug 539876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3235">SUSE bug 539877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3235">SUSE bug 539877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3235">SUSE bug 539877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3235">SUSE bug 539877</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138215" comment="cyradm-2.4.18-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151342" comment="cyradm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138216" comment="cyrus-imapd-2.4.18-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151343" comment="cyrus-imapd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138217" comment="perl-Cyrus-IMAP-2.4.18-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151344" comment="perl-Cyrus-IMAP is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138218" comment="perl-Cyrus-SIEVE-managesieve-2.4.18-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151345" comment="perl-Cyrus-SIEVE-managesieve is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3241</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3241" source="CVE"/>
    <description>
    Unspecified vulnerability in the OpcUa (OPC UA) dissector in Wireshark 0.99.6 through 1.0.8 and 1.2.0 through 1.2.1 allows remote attackers to cause a denial of service (memory and CPU consumption) via malformed OPCUA Service CallRequest packets.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3241.html">CVE-2009-3241</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3241">SUSE bug 541654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3241">SUSE bug 541654</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3242</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3242" source="CVE"/>
    <description>
    Unspecified vulnerability in packet.c in the GSM A RR dissector in Wireshark 1.2.0 and 1.2.1 allows remote attackers to cause a denial of service (application crash) via unknown vectors related to "an uninitialized dissector handle," which triggers an assertion failure.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3242.html">CVE-2009-3242</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3242">SUSE bug 541659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3242">SUSE bug 541659</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3243</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3243" source="CVE"/>
    <description>
    Unspecified vulnerability in the TLS dissector in Wireshark 1.2.0 and 1.2.1, when running on Windows, allows remote attackers to cause a denial of service (application crash) via unknown vectors related to TLS 1.2 conversations.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3243.html">CVE-2009-3243</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3243">SUSE bug 541655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3243">SUSE bug 541655</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3274</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3274" source="CVE"/>
    <description>
    Mozilla Firefox 3.6a1, 3.5.3, 3.5.2, and earlier 3.5.x versions, and 3.0.14 and earlier 2.x and 3.x versions, on Linux uses a predictable /tmp pathname for files selected from the Downloads window, which allows local users to replace an arbitrary downloaded file by placing a file in a /tmp location before the download occurs, related to the Download Manager component. NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3274.html">CVE-2009-3274</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3274">SUSE bug 534458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3274">SUSE bug 534458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3274">SUSE bug 534458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3274">SUSE bug 534458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3274">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3274">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3274">SUSE bug 522109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3295</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3295" source="CVE"/>
    <description>
    The prep_reprocess_req function in kdc/do_tgs_req.c in the cross-realm referral implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a ticket request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3295.html">CVE-2009-3295</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3295">SUSE bug 561347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3295">SUSE bug 561347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3295">SUSE bug 561347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3295">SUSE bug 561347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3295">SUSE bug 561347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3295">SUSE bug 561347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3295">SUSE bug 561347</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3297</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3297" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2010-0787, CVE-2010-0788, CVE-2010-0789.  Reason: this candidate was intended for one issue in Samba, but it was used for multiple distinct issues, including one in FUSE and one in ncpfs.  Notes: All CVE users should consult CVE-2010-0787 (Samba), CVE-2010-0788 (ncpfs), and CVE-2010-0789 (FUSE) to determine which ID is appropriate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Not set</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3297.html">CVE-2009-3297</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3297">SUSE bug 550002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3297">SUSE bug 550003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3297">SUSE bug 577925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3297">SUSE bug 583535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3297">SUSE bug 583536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3297">SUSE bug 583536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3297">SUSE bug 550002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3297">SUSE bug 550003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3297">SUSE bug 583536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3297">SUSE bug 594263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3297">SUSE bug 550004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3297">SUSE bug 620680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3297">SUSE bug 651598</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138291" comment="fuse-2.9.3-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151346" comment="fuse is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138292" comment="libfuse2-2.9.3-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151347" comment="libfuse2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3370</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3370" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.15, and 3.5.x before 3.5.4, allows remote attackers to read form history by forging mouse and keyboard events that leverage the auto-fill feature to populate form fields, in an attacker-readable form, with history entries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3370.html">CVE-2009-3370</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3370">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3370">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3370">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3370">SUSE bug 522109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3371</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3371" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by creating JavaScript web-workers recursively.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3371.html">CVE-2009-3371</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3371">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3371">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3371">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3371">SUSE bug 522109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3372</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3372" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via a crafted regular expression in a Proxy Auto-configuration (PAC) file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3372.html">CVE-2009-3372</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3372">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3372">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3372">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3372">SUSE bug 522109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3373</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3373" source="CVE"/>
    <description>
    Heap-based buffer overflow in the GIF image parser in Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3373.html">CVE-2009-3373</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3373">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3373">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3373">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3373">SUSE bug 522109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3373">SUSE bug 557686</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3374</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3374" source="CVE"/>
    <description>
    The XPCVariant::VariantDataToJS function in the XPCOM implementation in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 does not enforce intended restrictions on interaction between chrome privileged code and objects obtained from remote web sites, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via unspecified method calls, related to "doubly-wrapped objects."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3374.html">CVE-2009-3374</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3374">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3374">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3374">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3374">SUSE bug 522109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3375</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3375" source="CVE"/>
    <description>
    content/html/document/src/nsHTMLDocument.cpp in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allows user-assisted remote attackers to bypass the Same Origin Policy and read an arbitrary content selection via the document.getSelection function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3375.html">CVE-2009-3375</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3375">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3375">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3375">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3375">SUSE bug 522109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3376</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3376" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, does not properly handle a right-to-left override (aka RLO or U+202E) Unicode character in a download filename, which allows remote attackers to spoof file extensions via a crafted filename, as demonstrated by displaying a non-executable extension for an executable file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3376.html">CVE-2009-3376</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3376">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3376">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3376">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3376">SUSE bug 522109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3376">SUSE bug 590499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3376">SUSE bug 607935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3377</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3377" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in liboggz before cf5feeaab69b05e24, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3377.html">CVE-2009-3377</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3377">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3377">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3377">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3377">SUSE bug 522109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3378</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3378" source="CVE"/>
    <description>
    The oggplay_data_handle_theora_frame function in media/liboggplay/src/liboggplay/oggplay_data.c in liboggplay, as used in Mozilla Firefox 3.5.x before 3.5.4, attempts to reuse an earlier frame data structure upon encountering a decoding error for the first frame, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via a crafted .ogg video file.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3378.html">CVE-2009-3378</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3378">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3378">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3378">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3378">SUSE bug 522109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3379</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3379" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.  NOTE: this might overlap CVE-2009-2663.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3379.html">CVE-2009-3379</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3379">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3379">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3379">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3379">SUSE bug 522109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3379">SUSE bug 608192</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138925" comment="libvorbis-devel-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151121" comment="libvorbis-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138926" comment="libvorbis0-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151122" comment="libvorbis0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138927" comment="libvorbis0-32bit-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151123" comment="libvorbis0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138928" comment="libvorbisenc2-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151124" comment="libvorbisenc2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138929" comment="libvorbisenc2-32bit-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151125" comment="libvorbisenc2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138930" comment="libvorbisfile3-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151126" comment="libvorbisfile3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138931" comment="libvorbisfile3-32bit-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151127" comment="libvorbisfile3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3380</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3380" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3380.html">CVE-2009-3380</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3380">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3380">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3380">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3380">SUSE bug 522109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3381</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3381" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3381.html">CVE-2009-3381</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3381">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3381">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3381">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3381">SUSE bug 522109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3383</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3383" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3383.html">CVE-2009-3383</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3383">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3383">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3383">SUSE bug 545277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3383">SUSE bug 522109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3388</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3388" source="CVE"/>
    <description>
    liboggplay in Mozilla Firefox 3.5.x before 3.5.6 and SeaMonkey before 2.0.1 might allow context-dependent attackers to cause a denial of service (application crash) or execute arbitrary code via unspecified vectors, related to "memory safety issues."
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3388.html">CVE-2009-3388</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3388">SUSE bug 559807</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3389</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3389" source="CVE"/>
    <description>
    Integer overflow in libtheora in Xiph.Org Theora before 1.1, as used in Mozilla Firefox 3.5 before 3.5.6 and SeaMonkey before 2.0.1, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a video with large dimensions.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3389.html">CVE-2009-3389</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3389">SUSE bug 559807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3389">SUSE bug 581722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3389">SUSE bug 581722</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3553</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3553" source="CVE"/>
    <description>
    Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3553.html">CVE-2009-3553</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3553">SUSE bug 554861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3553">SUSE bug 554861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3553">SUSE bug 554861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3553">SUSE bug 578215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3553">SUSE bug 578215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3553">SUSE bug 578215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3553">SUSE bug 578215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3553">SUSE bug 578215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3553">SUSE bug 578215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3553">SUSE bug 578215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3553">SUSE bug 574336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3553">SUSE bug 578215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3553">SUSE bug 578215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3553">SUSE bug 578215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3553">SUSE bug 554861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3553">SUSE bug 578215</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138200" comment="cups-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138201" comment="cups-client-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138202" comment="cups-devel-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138203" comment="cups-libs-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151187" comment="cups-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138204" comment="cups-libs-32bit-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151188" comment="cups-libs-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3555</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555" source="CVE"/>
    <description>
    The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3555.html">CVE-2009-3555</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 553641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 553641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 554084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 554085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 554069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 554069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 555177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 557168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 554069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 564507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 564507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 566041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 552497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 459468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 584292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 590826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 584292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 588996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 586567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 592589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 594415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 604782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 614753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 586809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 622073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 623905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 646906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 648140</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 642531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 648950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 629905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 659926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 586809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 670152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 704832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 728876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 753357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 753357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 753357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 753357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 753357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 753357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 753357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 753357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 704832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 799454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 799454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 799454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 791794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 815621</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 554084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 979060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 979060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 979060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 979060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 986238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3555">SUSE bug 1077582</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3560</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560" source="CVE"/>
    <description>
    The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3560.html">CVE-2009-3560</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3560">SUSE bug 558892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3560">SUSE bug 561561</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3560">SUSE bug 581162</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3560">SUSE bug 561561</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3560">SUSE bug 581765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3560">SUSE bug 550666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3560">SUSE bug 561561</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3560">SUSE bug 611931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3560">SUSE bug 694595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3560">SUSE bug 725950</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138272" comment="expat-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151330" comment="expat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138541" comment="libapr-util1-1.5.3-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151171" comment="libapr-util1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138542" comment="libapr-util1-devel-1.5.3-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151172" comment="libapr-util1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138273" comment="libexpat-devel-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151331" comment="libexpat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138274" comment="libexpat1-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138275" comment="libexpat1-32bit-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151333" comment="libexpat1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3607</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3607" source="CVE"/>
    <description>
    Integer overflow in the create_surface_from_thumbnail_data function in glib/poppler-page.cc in Poppler 0.x allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3607.html">CVE-2009-3607</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3607">SUSE bug 546393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3607">SUSE bug 546393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3607">SUSE bug 566697</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138754" comment="libpoppler-devel-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151223" comment="libpoppler-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138755" comment="libpoppler-glib8-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151224" comment="libpoppler-glib8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138756" comment="libpoppler-qt4-4-0.24.4-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151225" comment="libpoppler-qt4-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138757" comment="libpoppler44-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151226" comment="libpoppler44 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138758" comment="poppler-tools-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151227" comment="poppler-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3608</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3608" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608" source="CVE"/>
    <description>
    Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3608.html">CVE-2009-3608</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3608">SUSE bug 543090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3608">SUSE bug 543410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3608">SUSE bug 546400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3608">SUSE bug 543410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3608">SUSE bug 546400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3608">SUSE bug 546404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3608">SUSE bug 556049</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3608">SUSE bug 566697</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138754" comment="libpoppler-devel-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151223" comment="libpoppler-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138755" comment="libpoppler-glib8-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151224" comment="libpoppler-glib8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138756" comment="libpoppler-qt4-4-0.24.4-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151225" comment="libpoppler-qt4-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138757" comment="libpoppler44-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151226" comment="libpoppler44 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138758" comment="poppler-tools-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151227" comment="poppler-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3615</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3615" source="CVE"/>
    <description>
    The OSCAR protocol plugin in libpurple in Pidgin before 2.6.3 and Adium before 1.3.7 allows remote attackers to cause a denial of service (application crash) via crafted contact-list data for (1) ICQ and possibly (2) AIM, as demonstrated by the SIM IM client.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3615.html">CVE-2009-3615</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3615">SUSE bug 548072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3615">SUSE bug 550170</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3617</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3617" source="CVE"/>
    <description>
    Format string vulnerability in the AbstractCommand::onAbort function in src/AbstractCommand.cc in aria2 before 1.6.2, when logging is enabled, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via format string specifiers in a download URI.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3617.html">CVE-2009-3617</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3617">SUSE bug 547318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3617">SUSE bug 573072</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138122" comment="aria2-1.19.0-7.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151348" comment="aria2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138123" comment="aria2-lang-1.19.0-7.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151349" comment="aria2-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3627</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3627" source="CVE"/>
    <description>
    The decode_entities function in util.c in HTML-Parser before 3.63 allows context-dependent attackers to cause a denial of service (infinite loop) via an incomplete SGML numeric character reference, which triggers generation of an invalid UTF-8 character.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3627.html">CVE-2009-3627</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3627">SUSE bug 550076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3627">SUSE bug 550076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3627">SUSE bug 585716</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139029" comment="perl-HTML-Parser-3.71-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151350" comment="perl-HTML-Parser is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3720</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720" source="CVE"/>
    <description>
    The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3720.html">CVE-2009-3720</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3720">SUSE bug 534721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3720">SUSE bug 550664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3720">SUSE bug 550666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3720">SUSE bug 558892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3720">SUSE bug 534721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3720">SUSE bug 581162</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3720">SUSE bug 561561</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3720">SUSE bug 581765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3720">SUSE bug 550666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3720">SUSE bug 561561</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3720">SUSE bug 611931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3720">SUSE bug 725950</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138272" comment="expat-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151330" comment="expat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138541" comment="libapr-util1-1.5.3-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151171" comment="libapr-util1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138542" comment="libapr-util1-devel-1.5.3-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151172" comment="libapr-util1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138273" comment="libexpat-devel-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151331" comment="libexpat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138274" comment="libexpat1-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138275" comment="libexpat1-32bit-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151333" comment="libexpat1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3736</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736" source="CVE"/>
    <description>
    ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3736.html">CVE-2009-3736</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3736">SUSE bug 556122</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138031" comment="GraphicsMagick-devel-1.3.21-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138032" comment="libGraphicsMagick-Q16-3-1.3.21-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138033" comment="libGraphicsMagick3-config-1.3.21-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138034" comment="libGraphicsMagickWand-Q16-2-1.3.21-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138688" comment="libltdl7-2.4.2-16.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151351" comment="libltdl7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138689" comment="libltdl7-32bit-2.4.2-16.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151352" comment="libltdl7-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138690" comment="libtool-2.4.2-16.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151353" comment="libtool is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3939</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3939" source="CVE"/>
    <description>
    The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3939.html">CVE-2009-3939</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3939">SUSE bug 555173</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3939">SUSE bug 557180</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3939">SUSE bug 557180</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3979</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3979" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3979.html">CVE-2009-3979</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3979">SUSE bug 559807</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3980</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3980" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3980.html">CVE-2009-3980</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3980">SUSE bug 559807</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3982</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3982" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3982.html">CVE-2009-3982</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3982">SUSE bug 559807</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3983</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3983" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to send authenticated requests to arbitrary applications by replaying the NTLM credentials of a browser user.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3983.html">CVE-2009-3983</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3983">SUSE bug 559807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3983">SUSE bug 590499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3983">SUSE bug 607935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3984</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3984" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to spoof an SSL indicator for an http URL or a file URL by setting document.location to an https URL corresponding to a site that responds with a No Content (aka 204) status code and an empty body.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3984.html">CVE-2009-3984</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3984">SUSE bug 559807</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3985</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3985" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to associate spoofed content with an invalid URL by setting document.location to this URL, and then writing arbitrary web script or HTML to the associated blank document, a related issue to CVE-2009-2654.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3985.html">CVE-2009-3985</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3985">SUSE bug 559807</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3995</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3995" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in IN_MOD.DLL (aka the Module Decoder Plug-in) in Winamp before 5.57, and libmikmod 3.1.12, might allow remote attackers to execute arbitrary code via (1) crafted samples or (2) crafted instrument definitions in an Impulse Tracker file.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3995.html">CVE-2009-3995</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 577875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 577875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 577875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 752802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 752802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 752802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 752802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 752802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 752802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 752802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 752802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 577875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 752802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3995">SUSE bug 625547</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138695" comment="libmikmod3-3.3.7-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151102" comment="libmikmod3 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3996</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-3996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3996" source="CVE"/>
    <description>
    Heap-based buffer overflow in IN_MOD.DLL (aka the Module Decoder Plug-in) in Winamp before 5.57, and libmikmod 3.1.12, might allow remote attackers to execute arbitrary code via an Ultratracker file.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-3996.html">CVE-2009-3996</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3996">SUSE bug 577875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3996">SUSE bug 577875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-3996">SUSE bug 577875</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138695" comment="libmikmod3-3.3.7-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151102" comment="libmikmod3 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4019</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-4019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4019" source="CVE"/>
    <description>
    mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote authenticated users to cause a denial of service (daemon crash) via a crafted statement.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4019.html">CVE-2009-4019</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4019">SUSE bug 557669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4019">SUSE bug 557669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4019">SUSE bug 557669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4019">SUSE bug 604528</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4022</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-4022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022" source="CVE"/>
    <description>
    Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4022.html">CVE-2009-4022</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4022">SUSE bug 558260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4022">SUSE bug 558260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4022">SUSE bug 570912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4022">SUSE bug 570912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4022">SUSE bug 570912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4022">SUSE bug 644911</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4026</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-4026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4026" source="CVE"/>
    <description>
    The mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (panic) via a crafted Delete Block ACK (aka DELBA) packet, related to an erroneous "code shuffling patch."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4026.html">CVE-2009-4026</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4026">SUSE bug 558267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4026">SUSE bug 558267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4026">SUSE bug 558267</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4027</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-4027" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4027" source="CVE"/>
    <description>
    Race condition in the mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (system crash) via a Delete Block ACK (aka DELBA) packet that triggers a certain state change in the absence of an aggregation session.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4027.html">CVE-2009-4027</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4027">SUSE bug 558267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4027">SUSE bug 558267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4027">SUSE bug 558267</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4028</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-4028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4028" source="CVE"/>
    <description>
    The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4028.html">CVE-2009-4028</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4028">SUSE bug 557669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4028">SUSE bug 604528</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4029</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-4029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4029" source="CVE"/>
    <description>
    The (1) dist or (2) distcheck rules in GNU Automake 1.11.1, 1.10.3, and release branches branch-1-4 through branch-1-9, when producing a distribution tarball for a package that uses Automake, assign insecure permissions (777) to directories in the build tree, which introduces a race condition that allows local users to modify the contents of package files, introduce Trojan horse programs, or conduct other attacks before the build is complete.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4029.html">CVE-2009-4029</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4029">SUSE bug 559815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4029">SUSE bug 559815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4029">SUSE bug 559815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4029">SUSE bug 559815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4029">SUSE bug 559815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4029">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4029">SUSE bug 786745</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4029">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4029">SUSE bug 559815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4029">SUSE bug 559815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4029">SUSE bug 559815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4029">SUSE bug 559815</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138127" comment="automake-1.13.4-6.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151364" comment="automake is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138128" comment="m4-1.4.16-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151365" comment="m4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4030</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-4030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4030" source="CVE"/>
    <description>
    MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4098 and CVE-2008-2079.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4030.html">CVE-2009-4030</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4030">SUSE bug 557669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4030">SUSE bug 604528</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4034</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-4034" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4034" source="CVE"/>
    <description>
    PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based PostgreSQL servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended client-hostname restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4034.html">CVE-2009-4034</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4034">SUSE bug 564710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4034">SUSE bug 603968</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4131</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-4131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4131" source="CVE"/>
    <description>
    The EXT4_IOC_MOVE_EXT (aka move extents) ioctl implementation in the ext4 filesystem in the Linux kernel before 2.6.32-git6 allows local users to overwrite arbitrary files via a crafted request, related to insufficient checks for file permissions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4131.html">CVE-2009-4131</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4131">SUSE bug 561018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4131">SUSE bug 561018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4131">SUSE bug 564380</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4136</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-4136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4136" source="CVE"/>
    <description>
    PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly manage session-local state during execution of an index function by a database superuser, which allows remote authenticated users to gain privileges via a table with crafted index functions, as demonstrated by functions that modify (1) search_path or (2) a prepared statement, a related issue to CVE-2007-6600 and CVE-2009-3230.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4136.html">CVE-2009-4136</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4136">SUSE bug 564360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4136">SUSE bug 603969</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4138</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-4138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4138" source="CVE"/>
    <description>
    drivers/firewire/ohci.c in the Linux kernel before 2.6.32-git9, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4138.html">CVE-2009-4138</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4138">SUSE bug 564712</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4212</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-4212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4212" source="CVE"/>
    <description>
    Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4212.html">CVE-2009-4212</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4212">SUSE bug 561351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4212">SUSE bug 561351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4212">SUSE bug 561351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4212">SUSE bug 561351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4212">SUSE bug 561351</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4492</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-4492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4492" source="CVE"/>
    <description>
    WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4492.html">CVE-2009-4492</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4492">SUSE bug 570616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4492">SUSE bug 580482</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4492">SUSE bug 570616</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139084" comment="ruby-2.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151366" comment="ruby is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139085" comment="ruby-devel-2.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151367" comment="ruby-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4536</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-4536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4536" source="CVE"/>
    <description>
    drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4536.html">CVE-2009-4536</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4536">SUSE bug 567376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4536">SUSE bug 567376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4536">SUSE bug 567376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4538</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4538" source="CVE"/>
    <description>
    drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-4538.html">CVE-2009-4538</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4538">SUSE bug 567376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4538">SUSE bug 567376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-4538">SUSE bug 567376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5029</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-5029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5029" source="CVE"/>
    <description>
    Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-5029.html">CVE-2009-5029</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-5029">SUSE bug 735850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-5029">SUSE bug 736174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-5029">SUSE bug 759836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-5029">SUSE bug 826666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-5029">SUSE bug 920055</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138343" comment="glibc-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138344" comment="glibc-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138345" comment="glibc-devel-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138346" comment="glibc-extra-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138347" comment="glibc-info-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138348" comment="glibc-locale-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138349" comment="glibc-locale-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138350" comment="nscd-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5030</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-5030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5030" source="CVE"/>
    <description>
    The tcd_free_encode function in tcd.c in OpenJPEG 1.3 through 1.5 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted tile information in a Gray16 TIFF image, which causes insufficient memory to be allocated and leads to an "invalid free."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-5030.html">CVE-2009-5030</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-5030">SUSE bug 757260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-5030">SUSE bug 757260</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138729" comment="libopenjpeg1-1.5.2-3.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151376" comment="libopenjpeg1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5044</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-5044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5044" source="CVE"/>
    <description>
    contrib/pdfmark/pdfroff.sh in GNU troff (aka groff) before 1.21 allows local users to overwrite arbitrary files via a symlink attack on a pdf#####.tmp temporary file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-5044.html">CVE-2009-5044</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-5044">SUSE bug 698290</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-5044">SUSE bug 703666</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138377" comment="groff-1.22.2-7.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151377" comment="groff is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138378" comment="groff-full-1.22.2-7.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151378" comment="groff-full is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138379" comment="gxditview-1.22.2-7.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151379" comment="gxditview is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5080</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-5080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5080" source="CVE"/>
    <description>
    The (1) contrib/eqn2graph/eqn2graph.sh, (2) contrib/grap2graph/grap2graph.sh, and (3) contrib/pic2graph/pic2graph.sh scripts in GNU troff (aka groff) 1.21 and earlier do not properly handle certain failed attempts to create temporary directories, which might allow local users to overwrite arbitrary files via a symlink attack on a file in a temporary directory, a different vulnerability than CVE-2004-1296.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-5080.html">CVE-2009-5080</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-5080">SUSE bug 703665</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138377" comment="groff-1.22.2-7.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151377" comment="groff is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138378" comment="groff-full-1.22.2-7.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151378" comment="groff-full is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138379" comment="gxditview-1.22.2-7.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151379" comment="gxditview is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5081</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2009-5081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5081" source="CVE"/>
    <description>
    The (1) config.guess, (2) contrib/groffer/perl/groffer.pl, and (3) contrib/groffer/perl/roff2.pl scripts in GNU troff (aka groff) 1.21 and earlier use an insufficient number of X characters in the template argument to the tempfile function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file, a different vulnerability than CVE-2004-0969.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2009-5081.html">CVE-2009-5081</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2009-5081">SUSE bug 703666</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138377" comment="groff-1.22.2-7.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151377" comment="groff is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138378" comment="groff-full-1.22.2-7.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151378" comment="groff-full is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138379" comment="gxditview-1.22.2-7.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151379" comment="gxditview is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0001</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001" source="CVE"/>
    <description>
    Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0001.html">CVE-2010-0001</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0001">SUSE bug 570331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0001">SUSE bug 570331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0001">SUSE bug 570331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0001">SUSE bug 588113</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0001">SUSE bug 588113</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138394" comment="gzip-1.6-9.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151329" comment="gzip is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0013</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0013" source="CVE"/>
    <description>
    Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122.  NOTE: it could be argued that this is resultant from a vulnerability in which an emoticon download request is processed even without a preceding text/x-mms-emoticon message that announced availability of the emoticon.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0013.html">CVE-2010-0013</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0013">SUSE bug 567799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0013">SUSE bug 569616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0013">SUSE bug 567799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0013">SUSE bug 581201</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0159</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0159" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsBlockFrame::StealFrame function in layout/generic/nsBlockFrame.cpp, and unspecified other vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0159.html">CVE-2010-0159</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0159">SUSE bug 576969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0159">SUSE bug 581160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0159">SUSE bug 584499</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0164</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0164" source="CVE"/>
    <description>
    Use-after-free vulnerability in the imgContainer::InternalAddFrameHelper function in src/imgContainer.cpp in libpr0n in Mozilla Firefox 3.6 before 3.6.2 allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace animation in which the frames have different bits-per-pixel (bpp) values.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0164.html">CVE-2010-0164</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0165</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0165" source="CVE"/>
    <description>
    The TraceRecorder::traverseScopeChain function in js/src/jstracer.cpp in the browser engine in Mozilla Firefox 3.6 before 3.6.2 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via vectors involving certain indirect calls to the JavaScript eval function.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0165.html">CVE-2010-0165</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0166</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0166" source="CVE"/>
    <description>
    The gfxTextRun::SanitizeGlyphRuns function in gfx/thebes/src/gfxFont.cpp in the browser engine in Mozilla Firefox 3.6 before 3.6.2 on Mac OS X, when the Core Text API is used, does not properly perform certain deletions, which allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via an HTML document containing invisible Unicode characters, as demonstrated by the U+FEFF, U+FFF9, U+FFFA, and U+FFFB characters.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0166.html">CVE-2010-0166</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0167</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0167" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via vectors related to (1) layout/generic/nsBlockFrame.cpp and (2) the _evaluate function in modules/plugin/base/src/nsNPAPIPlugin.cpp.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0167.html">CVE-2010-0167</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0168</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0168" source="CVE"/>
    <description>
    The nsDocument::MaybePreLoadImage function in content/base/src/nsDocument.cpp in the image-preloading implementation in Mozilla Firefox 3.6 before 3.6.2 does not apply scheme restrictions and policy restrictions to the image's URL, which might allow remote attackers to cause a denial of service (application crash or hang) or hijack the functionality of the browser's add-ons via a crafted SRC attribute of an IMG element, as demonstrated by remote command execution through an ssh: URL in a configuration that supports gnome-vfs with a nonstandard network.gnomevfs.supported-protocols setting.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0168.html">CVE-2010-0168</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0169</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0169" source="CVE"/>
    <description>
    The CSSLoaderImpl::DoSheetComplete function in layout/style/nsCSSLoader.cpp in Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 changes the case of certain strings in a stylesheet before adding this stylesheet to the XUL cache, which might allow remote attackers to modify the browser's font and other CSS attributes, and potentially disrupt rendering of a web page, by forcing the browser to perform this erroneous stylesheet caching.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0169.html">CVE-2010-0169</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0170</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0170" source="CVE"/>
    <description>
    Mozilla Firefox 3.6 before 3.6.2 does not offer plugins the expected window.location protection mechanism, which might allow remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via vectors that are specific to each affected plugin.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0170.html">CVE-2010-0170</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0171</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0171" source="CVE"/>
    <description>
    Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 allow remote attackers to perform cross-origin keystroke capture, and possibly conduct cross-site scripting (XSS) attacks, by using the addEventListener and setTimeout functions in conjunction with a wrapped object.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-3736.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0171.html">CVE-2010-0171</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0172</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0172" source="CVE"/>
    <description>
    toolkit/components/passwordmgr/src/nsLoginManagerPrompter.js in the asynchronous Authorization Prompt implementation in Mozilla Firefox 3.6 before 3.6.2 does not properly handle concurrent authorization requests from multiple web sites, which might allow remote web servers to spoof an authorization dialog and capture credentials by demanding HTTP authentication in opportunistic circumstances.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0172.html">CVE-2010-0172</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0173</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0173" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0173.html">CVE-2010-0173</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0173">SUSE bug 586567</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0174</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0174" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0174.html">CVE-2010-0174</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0174">SUSE bug 586567</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0175</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0175" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTreeSelection implementation in Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.9, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors that trigger a call to the handler for the select event for XUL tree items.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0175.html">CVE-2010-0175</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0175">SUSE bug 586567</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0176</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0176" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 do not properly manage reference counts for option elements in a XUL tree optgroup, which might allow remote attackers to execute arbitrary code via unspecified vectors that trigger access to deleted elements, related to a "dangling pointer vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0176.html">CVE-2010-0176</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0176">SUSE bug 586567</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0177</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0177" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, frees the contents of the window.navigator.plugins array while a reference to an array element is still active, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors, related to a "dangling pointer vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0177.html">CVE-2010-0177</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0177">SUSE bug 586567</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0178</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0178" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, does not prevent applets from interpreting mouse clicks as drag-and-drop actions, which allows remote attackers to execute arbitrary JavaScript with Chrome privileges by loading a chrome: URL and then loading a javascript: URL.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0178.html">CVE-2010-0178</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0178">SUSE bug 586567</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0181</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0181" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, executes a mail application in situations where an IMG element has a SRC attribute that is a redirect to a mailto: URL, which allows remote attackers to cause a denial of service (excessive application launches) via an HTML document with many images.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0181.html">CVE-2010-0181</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0181">SUSE bug 586567</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0182</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0182" source="CVE"/>
    <description>
    The XMLDocument::load function in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 does not perform the expected nsIContentPolicy checks during loading of content by XML documents, which allows attackers to bypass intended access restrictions via crafted content.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0182.html">CVE-2010-0182</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0182">SUSE bug 586567</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0277</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0277" source="CVE"/>
    <description>
    slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.6, including 2.6.4, and Adium 1.3.8 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed MSNSLP INVITE request in an SLP message, a different issue than CVE-2010-0013.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0277.html">CVE-2010-0277</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0277">SUSE bug 569616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0277">SUSE bug 567799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0277">SUSE bug 569616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0277">SUSE bug 569616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0277">SUSE bug 569616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0277">SUSE bug 569616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0277">SUSE bug 569616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0277">SUSE bug 581201</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0283</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0283" source="CVE"/>
    <description>
    The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.2, and 1.8 alpha, allows remote attackers to cause a denial of service (assertion failure and daemon crash) via an invalid (1) AS-REQ or (2) TGS-REQ request.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0283.html">CVE-2010-0283</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0283">SUSE bug 571781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0283">SUSE bug 576524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0283">SUSE bug 571781</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0393</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0393" source="CVE"/>
    <description>
    The _cupsGetlang function, as used by lppasswd.c in lppasswd in CUPS 1.2.2, 1.3.7, 1.3.9, and 1.4.1, relies on an environment variable to determine the file that provides localized message strings, which allows local users to gain privileges via a file that contains crafted localization data with format string specifiers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0393.html">CVE-2010-0393</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0393">SUSE bug 574336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0393">SUSE bug 574336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0393">SUSE bug 574336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0393">SUSE bug 574336</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138200" comment="cups-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138201" comment="cups-client-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138202" comment="cups-devel-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138203" comment="cups-libs-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151187" comment="cups-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138204" comment="cups-libs-32bit-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151188" comment="cups-libs-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0405</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405" source="CVE"/>
    <description>
    Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0405.html">CVE-2010-0405</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0405">SUSE bug 636978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0405">SUSE bug 636978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0405">SUSE bug 646682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0405">SUSE bug 636978</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138159" comment="bzip2-1.0.6-30.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151380" comment="bzip2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138164" comment="clamav-0.98.7-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138160" comment="libbz2-1-1.0.6-30.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151382" comment="libbz2-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138161" comment="libbz2-1-32bit-1.0.6-30.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151383" comment="libbz2-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138162" comment="libbz2-devel-1.0.6-30.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151384" comment="libbz2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0407</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0407" source="CVE"/>
    <description>
    Multiple buffer overflows in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 allow local users to gain privileges via crafted message data, which is improperly demarshalled.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0407.html">CVE-2010-0407</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0407">SUSE bug 609317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0407">SUSE bug 609317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0407">SUSE bug 641823</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138740" comment="libpcsclite1-1.8.14-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151385" comment="libpcsclite1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138741" comment="pcsc-lite-1.8.14-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151386" comment="pcsc-lite is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0408</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0408" source="CVE"/>
    <description>
    The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0408.html">CVE-2010-0408</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0408">SUSE bug 586572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0408">SUSE bug 586572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0408">SUSE bug 601151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0408">SUSE bug 586572</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0420</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0420" source="CVE"/>
    <description>
    libpurple in Finch in Pidgin before 2.6.6, when an XMPP multi-user chat (MUC) room is used, does not properly parse nicknames containing &lt;br&gt; sequences, which allows remote attackers to cause a denial of service (application crash) via a crafted nickname.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0420.html">CVE-2010-0420</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0420">SUSE bug 569616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0420">SUSE bug 569616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0420">SUSE bug 581201</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0423</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0423" source="CVE"/>
    <description>
    gtkimhtml.c in Pidgin before 2.6.6 allows remote attackers to cause a denial of service (CPU consumption and application hang) by sending many smileys in a (1) IM or (2) chat.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0423.html">CVE-2010-0423</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0423">SUSE bug 569616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0423">SUSE bug 569616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0423">SUSE bug 581201</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0424</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0424" source="CVE"/>
    <description>
    The edit_cmd function in crontab.c in (1) cronie before 1.4.4 and (2) Vixie cron (vixie-cron) allows local users to change the modification times of arbitrary files, and consequently cause a denial of service, via a symlink attack on a temporary file in the /tmp directory.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0424.html">CVE-2010-0424</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0424">SUSE bug 580800</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0424">SUSE bug 580800</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0424">SUSE bug 589640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0424">SUSE bug 580800</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0424">SUSE bug 590353</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0424">SUSE bug 579447</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0424">SUSE bug 580800</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138197" comment="cron-4.2-57.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151016" comment="cron is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138198" comment="cronie-1.4.11-57.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151017" comment="cronie is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0425</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0425" source="CVE"/>
    <description>
    modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers."
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0425.html">CVE-2010-0425</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0425">SUSE bug 586572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0425">SUSE bug 586572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0425">SUSE bug 601151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0425">SUSE bug 1078450</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0434</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434" source="CVE"/>
    <description>
    The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0434.html">CVE-2010-0434</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0434">SUSE bug 586572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0434">SUSE bug 586572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0434">SUSE bug 601151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0434">SUSE bug 586572</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0436</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0436" source="CVE"/>
    <description>
    Race condition in backend/ctrl.c in KDM in KDE Software Compilation (SC) 2.2.0 through 4.4.2 allows local users to change the permissions of arbitrary files, and consequently gain privileges, by blocking the removal of a certain directory that contains a control socket, related to improper interaction with ksm.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0436.html">CVE-2010-0436</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0436">SUSE bug 584223</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138415" comment="kdebase4-workspace-libs-4.11.22-1.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151387" comment="kdebase4-workspace-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138416" comment="python-kdebase4-4.11.22-1.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151388" comment="python-kdebase4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0540</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0540" source="CVE"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, allows remote attackers to hijack the authentication of administrators for requests that change settings.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0540.html">CVE-2010-0540</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0540">SUSE bug 601830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0540">SUSE bug 601830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0540">SUSE bug 601830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0540">SUSE bug 680210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0540">SUSE bug 680212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0540">SUSE bug 700987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0540">SUSE bug 711490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0540">SUSE bug 715643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0540">SUSE bug 601830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0540">SUSE bug 671735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0540">SUSE bug 680210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0540">SUSE bug 711490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0540">SUSE bug 715643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0540">SUSE bug 601830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0540">SUSE bug 680210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0540">SUSE bug 748422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0540">SUSE bug 748422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0540">SUSE bug 748422</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138200" comment="cups-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138201" comment="cups-client-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138202" comment="cups-devel-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138203" comment="cups-libs-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151187" comment="cups-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138204" comment="cups-libs-32bit-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151188" comment="cups-libs-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0541</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0541" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the WEBrick HTTP server in Ruby in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, allows remote attackers to inject arbitrary web script or HTML via a crafted URI that triggers a UTF-7 error page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0541.html">CVE-2010-0541</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0541">SUSE bug 600752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0541">SUSE bug 600752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0541">SUSE bug 600752</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139084" comment="ruby-2.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151366" comment="ruby is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139085" comment="ruby-devel-2.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151367" comment="ruby-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0542</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0542" source="CVE"/>
    <description>
    The _WriteProlog function in texttops.c in texttops in the Text Filter subsystem in CUPS before 1.4.4 does not check the return values of certain calloc calls, which allows remote attackers to cause a denial of service (NULL pointer dereference or heap memory corruption) or possibly execute arbitrary code via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0542.html">CVE-2010-0542</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0542">SUSE bug 601352</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0542">SUSE bug 644521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0542">SUSE bug 601352</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0542">SUSE bug 657780</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0542">SUSE bug 601352</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0542">SUSE bug 601352</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138200" comment="cups-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138201" comment="cups-client-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138202" comment="cups-devel-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138203" comment="cups-libs-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151187" comment="cups-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138204" comment="cups-libs-32bit-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151188" comment="cups-libs-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0547</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0547" source="CVE"/>
    <description>
    client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0547.html">CVE-2010-0547</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0547">SUSE bug 577925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0547">SUSE bug 577868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0547">SUSE bug 583535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0547">SUSE bug 583536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0547">SUSE bug 594263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0547">SUSE bug 597421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0547">SUSE bug 602694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0547">SUSE bug 583535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0547">SUSE bug 709819</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138163" comment="cifs-utils-6.4-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151261" comment="cifs-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0624</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0624" source="CVE"/>
    <description>
    Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending more data than was requested, related to archive filenames that contain a : (colon) character.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0624.html">CVE-2010-0624</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0624">SUSE bug 579475</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0624">SUSE bug 579475</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0624">SUSE bug 608034</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138175" comment="cpio-2.11-30.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151389" comment="cpio is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138176" comment="cpio-lang-2.11-30.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151390" comment="cpio-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139103" comment="tar-1.27.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151391" comment="tar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139104" comment="tar-lang-1.27.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151392" comment="tar-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0628</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0628" source="CVE"/>
    <description>
    The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in the SPNEGO GSS-API functionality in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.2 and 1.8 before 1.8.1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) via an invalid packet that triggers incorrect preparation of an error token.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0628.html">CVE-2010-0628</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0628">SUSE bug 582557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0628">SUSE bug 586981</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0654</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0654" source="CVE"/>
    <description>
    Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 permit cross-origin loading of CSS stylesheets even when the stylesheet download has an incorrect MIME type and the stylesheet document is malformed, which allows remote attackers to obtain sensitive information via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0654.html">CVE-2010-0654</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0654">SUSE bug 583603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0654">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0728</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0728" source="CVE"/>
    <description>
    smbd in Samba 3.3.11, 3.4.6, and 3.5.0, when libcap support is enabled, runs with the CAP_DAC_OVERRIDE capability, which allows remote authenticated users to bypass intended file permissions via standard filesystem operations with any client.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0728.html">CVE-2010-0728</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0728">SUSE bug 586683</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138163" comment="cifs-utils-6.4-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151261" comment="cifs-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0740</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0740" source="CVE"/>
    <description>
    The ssl3_get_record function in ssl/s3_pkt.c in OpenSSL 0.9.8f through 0.9.8m allows remote attackers to cause a denial of service (crash) via a malformed record in a TLS connection that triggers a NULL pointer dereference, related to the minor version number.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0740.html">CVE-2010-0740</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0740">SUSE bug 590833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0740">SUSE bug 590833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0740">SUSE bug 590833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0740">SUSE bug 629905</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0742</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0742" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0742" source="CVE"/>
    <description>
    The Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain OriginatorInfo, which allows context-dependent attackers to modify invalid memory locations or conduct double-free attacks, and possibly execute arbitrary code, via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0742.html">CVE-2010-0742</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0742">SUSE bug 610642</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0750</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0750" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0750" source="CVE"/>
    <description>
    pkexec.c in pkexec in libpolkit in PolicyKit 0.96 allows local users to determine the existence of arbitrary files via the argument.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0750.html">CVE-2010-0750</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0750">SUSE bug 593959</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138750" comment="libpolkit0-0.112-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151393" comment="libpolkit0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138751" comment="polkit-0.112-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151394" comment="polkit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138752" comment="polkit-devel-0.112-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151395" comment="polkit-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138753" comment="typelib-1_0-Polkit-1_0-0.112-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151396" comment="typelib-1_0-Polkit-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0787</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0787" source="CVE"/>
    <description>
    client/mount.cifs.c in mount.cifs in smbfs in Samba 3.0.22, 3.0.28a, 3.2.3, 3.3.2, 3.4.0, and 3.4.5 allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0787.html">CVE-2010-0787</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0787">SUSE bug 550002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0787">SUSE bug 550002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0787">SUSE bug 602694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0787">SUSE bug 620680</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138163" comment="cifs-utils-6.4-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151261" comment="cifs-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0926</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0926" source="CVE"/>
    <description>
    The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0926.html">CVE-2010-0926</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0926">SUSE bug 577868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0926">SUSE bug 577868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0926">SUSE bug 597421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0926">SUSE bug 1027147</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0991</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-0991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0991" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in imlib2 1.4.3 allow context-dependent attackers to execute arbitrary code via a crafted (1) ARGB, (2) XPM, or (3) BMP file, related to the IMAGE_DIMENSIONS_OK macro in lib/image.h.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-0991.html">CVE-2010-0991</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-0991">SUSE bug 598935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138459" comment="libImlib2-1-1.4.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151397" comment="libImlib2-1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1000</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1000" source="CVE"/>
    <description>
    Directory traversal vulnerability in KGet in KDE SC 4.0.0 through 4.4.3 allows remote attackers to create arbitrary files via directory traversal sequences in the name attribute of a file element in a metalink file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1000.html">CVE-2010-1000</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1000">SUSE bug 604709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1000">SUSE bug 687873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1000">SUSE bug 687873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1000">SUSE bug 687873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1000">SUSE bug 687873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1000">SUSE bug 687873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1000">SUSE bug 687873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1000">SUSE bug 687873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1000">SUSE bug 604709</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138425" comment="kdenetwork4-filesharing-15.04.3-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151398" comment="kdenetwork4-filesharing is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138426" comment="kdnssd-15.04.3-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151399" comment="kdnssd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138427" comment="kget-15.04.3-3.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151400" comment="kget is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138428" comment="kopete-15.04.3-3.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151401" comment="kopete is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138429" comment="kppp-15.08.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151402" comment="kppp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138430" comment="krdc-15.04.3-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151403" comment="krdc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138431" comment="krfb-15.04.3-3.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151404" comment="krfb is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1028</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1028" source="CVE"/>
    <description>
    Integer overflow in the decompression functionality in the Web Open Fonts Format (WOFF) decoder in Mozilla Firefox 3.6 before 3.6.2 and 3.7 before 3.7 alpha 3 allows remote attackers to execute arbitrary code via a crafted WOFF file that triggers a buffer overflow, as demonstrated by the vd_ff module in VulnDisco 9.0.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1028.html">CVE-2010-1028</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1121</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1121" source="CVE"/>
    <description>
    Mozilla Firefox 3.6.x before 3.6.3 does not properly manage the scopes of DOM nodes that are moved from one document to another, which allows remote attackers to conduct use-after-free attacks and execute arbitrary code via unspecified vectors involving improper interaction with garbage collection, as demonstrated by Nils during a Pwn2Own competition at CanSecWest 2010.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1121.html">CVE-2010-1121</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1121">SUSE bug 603356</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1125</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1125" source="CVE"/>
    <description>
    The JavaScript implementation in Mozilla Firefox 3.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to send selected keystrokes to a form field in a hidden frame, instead of the intended form field in a visible frame, via certain calls to the focus method.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1125.html">CVE-2010-1125</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1125">SUSE bug 603356</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1146</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1146" source="CVE"/>
    <description>
    The Linux kernel 2.6.33.2 and earlier, when a ReiserFS filesystem exists, does not restrict read or write access to the .reiserfs_priv directory, which allows local users to gain privileges by modifying (1) extended attributes or (2) ACLs, as demonstrated by deleting a file under .reiserfs_priv/xattrs/.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1146.html">CVE-2010-1146</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1146">SUSE bug 593906</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1154</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1154" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was in a CNA pool that was not assigned to any issues during 2010.  Notes: none.
    </description>
<advisory from="security@suse.de">
<severity>Not set</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1154.html">CVE-2010-1154</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1154">SUSE bug 596005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1154">SUSE bug 596005</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138408" comment="irssi-0.8.17-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151315" comment="irssi is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1155</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1155" source="CVE"/>
    <description>
    Irssi before 0.8.15, when SSL is used, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) field or a Subject Alternative Name field of the X.509 certificate, which allows man-in-the-middle attackers to spoof IRC servers via an arbitrary certificate.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1155.html">CVE-2010-1155</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1155">SUSE bug 596005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1155">SUSE bug 596005</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138408" comment="irssi-0.8.17-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151315" comment="irssi is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1160</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1160" source="CVE"/>
    <description>
    GNU nano before 2.2.4 does not verify whether a file has been changed before it is overwritten in a file-save operation, which allows local user-assisted attackers to overwrite arbitrary files via a symlink attack on an attacker-owned file that is being edited by the victim.
    </description>
<advisory from="security@suse.de">
<severity>Not set</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1160.html">CVE-2010-1160</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1160">SUSE bug 596831</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138992" comment="nano-2.4.2-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151405" comment="nano is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138993" comment="nano-lang-2.4.2-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151406" comment="nano-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1161</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1161" source="CVE"/>
    <description>
    Race condition in GNU nano before 2.2.4, when run by root to edit a file that is not owned by root, allows local user-assisted attackers to change the ownership of arbitrary files via vectors related to the creation of backup files.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1161.html">CVE-2010-1161</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1161">SUSE bug 596831</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138992" comment="nano-2.4.2-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151405" comment="nano is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138993" comment="nano-lang-2.4.2-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151406" comment="nano-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1163</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1163" source="CVE"/>
    <description>
    The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1163.html">CVE-2010-1163</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1163">SUSE bug 594738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1163">SUSE bug 594738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1163">SUSE bug 594738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1163">SUSE bug 594738</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139098" comment="sudo-1.8.10p3-3.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1167</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1167" source="CVE"/>
    <description>
    fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1167.html">CVE-2010-1167</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1167">SUSE bug 597673</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138276" comment="fetchmail-6.3.26-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151334" comment="fetchmail is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1169</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1169" source="CVE"/>
    <description>
    PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 does not properly restrict PL/perl procedures, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Perl code via a crafted script, related to the Safe module (aka Safe.pm) for Perl. NOTE: some sources report that this issue is the same as CVE-2010-1447.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1169.html">CVE-2010-1169</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1169">SUSE bug 605926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1169">SUSE bug 605926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1169">SUSE bug 605926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1169">SUSE bug 648140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1170</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1170" source="CVE"/>
    <description>
    The PL/Tcl implementation in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 loads Tcl code from the pltcl_modules table regardless of the table's ownership and permissions, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Tcl code by creating this table and inserting a crafted Tcl script.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1170.html">CVE-2010-1170</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1170">SUSE bug 605845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1170">SUSE bug 605926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1170">SUSE bug 605845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1170">SUSE bug 634562</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1170">SUSE bug 648140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1172</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1172" source="CVE"/>
    <description>
    DBus-GLib 0.73 disregards the access flag of exported GObject properties, which allows local users to bypass intended access restrictions and possibly cause a denial of service by modifying properties, as demonstrated by properties of the (1) DeviceKit-Power, (2) NetworkManager, and (3) ModemManager services.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1172.html">CVE-2010-1172</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633621</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633622</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633681</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633686</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 633702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1172">SUSE bug 628607</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138232" comment="dbus-1-glib-0.100.2-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151408" comment="dbus-1-glib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138233" comment="dbus-1-glib-32bit-0.100.2-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151409" comment="dbus-1-glib-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138234" comment="dbus-1-glib-devel-0.100.2-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151410" comment="dbus-1-glib-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1196</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1196" source="CVE"/>
    <description>
    Integer overflow in the nsGenericDOMDataNode::SetTextInternal function in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a DOM node with a long text value that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1196.html">CVE-2010-1196</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1196">SUSE bug 603356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1196">SUSE bug 617399</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1197</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1197" source="CVE"/>
    <description>
    Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, does not properly handle situations in which both "Content-Disposition: attachment" and "Content-Type: multipart" are present in HTTP headers, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an uploaded HTML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1197.html">CVE-2010-1197</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1197">SUSE bug 603356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1197">SUSE bug 617399</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1198</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1198" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to execute arbitrary code via vectors involving multiple plugin instances.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1198.html">CVE-2010-1198</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1198">SUSE bug 603356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1198">SUSE bug 617399</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1199</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1199" source="CVE"/>
    <description>
    Integer overflow in the XSLT node sorting implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a large text value for a node.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1199.html">CVE-2010-1199</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1199">SUSE bug 603356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1199">SUSE bug 617399</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1200</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1200" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1200.html">CVE-2010-1200</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1200">SUSE bug 603356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1200">SUSE bug 617399</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1201</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1201" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.10, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1201.html">CVE-2010-1201</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1201">SUSE bug 603356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1201">SUSE bug 617399</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1202</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1202" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1202.html">CVE-2010-1202</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1202">SUSE bug 603356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1202">SUSE bug 617399</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1203</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1203" source="CVE"/>
    <description>
    The JavaScript engine in Mozilla Firefox 3.6.x before 3.6.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors that trigger an assertion failure in jstracer.cpp.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1203.html">CVE-2010-1203</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1203">SUSE bug 603356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1203">SUSE bug 617399</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1205</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205" source="CVE"/>
    <description>
    Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1205.html">CVE-2010-1205</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 622506</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 639941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 639941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 639941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 639941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 639941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 639941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 639941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 639941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 854395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1205">SUSE bug 617866</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138743" comment="libpng12-0-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151411" comment="libpng12-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138744" comment="libpng12-0-32bit-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151412" comment="libpng12-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138745" comment="libpng12-devel-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151413" comment="libpng12-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138746" comment="libpng16-16-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138747" comment="libpng16-16-32bit-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151415" comment="libpng16-16-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138748" comment="libpng16-compat-devel-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138749" comment="libpng16-devel-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1206</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1206" source="CVE"/>
    <description>
    The startDocumentLoad function in browser/base/content/browser.js in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, does not properly implement the Same Origin Policy in certain circumstances related to the about:blank document and a document that is currently loading, which allows (1) remote web servers to conduct spoofing attacks via vectors involving a 204 (aka No Content) status code, and allows (2) remote attackers to conduct spoofing attacks via vectors involving a window.stop call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1206.html">CVE-2010-1206</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1206">SUSE bug 618183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1206">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1207</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1207" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.7 and Thunderbird before 3.1.1 do not properly implement read restrictions for CANVAS elements, which allows remote attackers to obtain sensitive cross-origin information via vectors involving reference retention and node deletion.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1207.html">CVE-2010-1207</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1207">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1208</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1208" source="CVE"/>
    <description>
    Use-after-free vulnerability in the attribute-cloning functionality in the DOM implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via vectors related to deletion of an event attribute node with a nonzero reference count.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1208.html">CVE-2010-1208</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1208">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1209</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1209" source="CVE"/>
    <description>
    Use-after-free vulnerability in the NodeIterator implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via a crafted NodeFilter that detaches DOM nodes, related to the NodeIterator interface and a javascript callback.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1209.html">CVE-2010-1209</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1209">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1210</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1210" source="CVE"/>
    <description>
    intl/uconv/util/nsUnicodeDecodeHelper.cpp in Mozilla Firefox before 3.6.7 and Thunderbird before 3.1.1 inserts a U+FFFD sequence into text in certain circumstances involving undefined positions, which might make it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted 8-bit text.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1210.html">CVE-2010-1210</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1210">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1211</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1211" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1211.html">CVE-2010-1211</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1211">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1212</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1212" source="CVE"/>
    <description>
    js/src/jstracer.cpp in the browser engine in Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) propagation of deep aborts in the TraceRecorder::record_JSOP_BINDNAME function, (2) depth handling in the TraceRecorder::record_JSOP_GETELEM function, and (3) tracing of out-of-range arguments in the TraceRecorder::record_JSOP_ARGSUB function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1212.html">CVE-2010-1212</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1212">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1213</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1213" source="CVE"/>
    <description>
    The importScripts Web Worker method in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 does not verify that content is valid JavaScript code, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted HTML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1213.html">CVE-2010-1213</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1213">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1214</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1214" source="CVE"/>
    <description>
    Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via plugin content with many parameter elements.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1214.html">CVE-2010-1214</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1214">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1215</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1215" source="CVE"/>
    <description>
    Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 do not properly implement access to a content object through a SafeJSObjectWrapper (aka SJOW) wrapper, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging "access to an object from the chrome scope."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1215.html">CVE-2010-1215</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1215">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1320</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1320" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1320" source="CVE"/>
    <description>
    Double free vulnerability in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x before 1.8.2 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a request associated with (1) renewal or (2) validation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1320.html">CVE-2010-1320</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1320">SUSE bug 596002</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1321</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1321" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321" source="CVE"/>
    <description>
    The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1321.html">CVE-2010-1321</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1321">SUSE bug 596826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1321">SUSE bug 596826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1321">SUSE bug 611090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1321">SUSE bug 646073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1321">SUSE bug 648950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1321">SUSE bug 658525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1321">SUSE bug 659926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1321">SUSE bug 663953</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1321">SUSE bug 679560</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1322</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1322" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1322" source="CVE"/>
    <description>
    The merge_authdata function in kdc_authdata.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x before 1.8.4 does not properly manage an index into an authorization-data list, which allows remote attackers to cause a denial of service (daemon crash), or possibly obtain sensitive information, spoof authorization, or execute arbitrary code, via a TGS request that triggers an uninitialized pointer dereference, as demonstrated by a request from a Windows Active Directory client.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1322.html">CVE-2010-1322</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1322">SUSE bug 640990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1322">SUSE bug 640990</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1323</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1323" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323" source="CVE"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1323.html">CVE-2010-1323</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1323">SUSE bug 650650</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1324</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1324" source="CVE"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unkeyed PAC checksum, or (3) a KrbFastArmoredReq checksum based on an RC4 key.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1324.html">CVE-2010-1324</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1324">SUSE bug 650650</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1436</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1436" source="CVE"/>
    <description>
    gfs2 in the Linux kernel 2.6.18, and possibly other versions, does not properly handle when the gfs2_quota struct occupies two separate pages, which allows local users to cause a denial of service (kernel panic) via certain manipulations that cause an out-of-bounds write, as demonstrated by writing from an ext3 file system to a gfs2 file system.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1436.html">CVE-2010-1436</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1436">SUSE bug 599957</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1452</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1452" source="CVE"/>
    <description>
    The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1452.html">CVE-2010-1452</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1452">SUSE bug 627030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1452">SUSE bug 627030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1452">SUSE bug 627030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1452">SUSE bug 627030</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1455</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1455" source="CVE"/>
    <description>
    The DOCSIS dissector in Wireshark 0.9.6 through 1.0.12 and 1.2.0 through 1.2.7 allows user-assisted remote attackers to cause a denial of service (application crash) via a malformed packet trace file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1455.html">CVE-2010-1455</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1455">SUSE bug 603251</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1455">SUSE bug 603251</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1585</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1585" source="CVE"/>
    <description>
    The nsIScriptableUnescapeHTML.parseFragment method in the ParanoidFragmentSink protection mechanism in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 does not properly sanitize HTML in a chrome document, which makes it easier for remote attackers to execute arbitrary JavaScript with chrome privileges via a javascript: URI in input to an extension, as demonstrated by a javascript:alert sequence in (1) the HREF attribute of an A element or (2) the ACTION attribute of a FORM element.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1585.html">CVE-2010-1585</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1585">SUSE bug 667155</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1585">SUSE bug 679570</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1623</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1623" source="CVE"/>
    <description>
    Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1623.html">CVE-2010-1623</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1623">SUSE bug 650435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1623">SUSE bug 650435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1623">SUSE bug 693778</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1623">SUSE bug 725950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1623">SUSE bug 997229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1623">SUSE bug 997229</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138541" comment="libapr-util1-1.5.3-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151171" comment="libapr-util1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138542" comment="libapr-util1-devel-1.5.3-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151172" comment="libapr-util1-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1624</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1624" source="CVE"/>
    <description>
    The msn_emoticon_msg function in slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.7.0 allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a custom emoticon in a malformed SLP message.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1624.html">CVE-2010-1624</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1624">SUSE bug 604225</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1633</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1633" source="CVE"/>
    <description>
    RSA verification recovery in the EVP_PKEY_verify_recover function in OpenSSL 1.x before 1.0.0a, as used by pkeyutl and possibly other applications, returns uninitialized memory upon failure, which might allow context-dependent attackers to bypass intended key requirements or obtain sensitive information via unspecified vectors.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1633.html">CVE-2010-1633</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1633">SUSE bug 610642</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1635</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1635" source="CVE"/>
    <description>
    The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 field value.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1635.html">CVE-2010-1635</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1635">SUSE bug 605935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1641</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1641" source="CVE"/>
    <description>
    The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1641.html">CVE-2010-1641</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1641">SUSE bug 608576</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1641">SUSE bug 608576</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1641">SUSE bug 608576</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1642</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1642" source="CVE"/>
    <description>
    The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1642.html">CVE-2010-1642</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1642">SUSE bug 605935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1642">SUSE bug 605935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1646</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1646" source="CVE"/>
    <description>
    The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1.7.0 through 1.7.2p6 does not properly handle an environment that contains multiple PATH variables, which might allow local users to gain privileges via a crafted value of the last PATH variable.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1646.html">CVE-2010-1646</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1646">SUSE bug 594738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1646">SUSE bug 594738</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139098" comment="sudo-1.8.10p3-3.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1674</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1674" source="CVE"/>
    <description>
    The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1674.html">CVE-2010-1674</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1674">SUSE bug 654270</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1674">SUSE bug 654270</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1674">SUSE bug 654270</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1674">SUSE bug 685558</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139074" comment="quagga-0.99.24.1-3.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151418" comment="quagga is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1675</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1675" source="CVE"/>
    <description>
    bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (session reset) via a malformed AS_PATHLIMIT path attribute.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1675.html">CVE-2010-1675</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1675">SUSE bug 654270</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1675">SUSE bug 654270</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1675">SUSE bug 654270</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1675">SUSE bug 685558</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139074" comment="quagga-0.99.24.1-3.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151418" comment="quagga is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1748</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-1748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1748" source="CVE"/>
    <description>
    The cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, does not properly handle parameter values containing a % (percent) character without two subsequent hex characters, which allows context-dependent attackers to obtain sensitive information from cupsd process memory via a crafted request, as demonstrated by the (1) /admin?OP=redirect&amp;URL=% and (2) /admin?URL=/admin/&amp;OP=% URIs.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-1748.html">CVE-2010-1748</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 604271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 604271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 604271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 604271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 604271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 604271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 604271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 604271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 644521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 604271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 604271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 604271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 649256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 604271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 601352</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 604271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 601352</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 604271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 657780</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 604271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-1748">SUSE bug 604271</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138200" comment="cups-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138201" comment="cups-client-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138202" comment="cups-devel-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138203" comment="cups-libs-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151187" comment="cups-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138204" comment="cups-libs-32bit-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151188" comment="cups-libs-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2063</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2063" source="CVE"/>
    <description>
    Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2063.html">CVE-2010-2063</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2063">SUSE bug 611927</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2063">SUSE bug 611927</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2063">SUSE bug 611927</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2065</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2065" source="CVE"/>
    <description>
    Integer overflow in the TIFFroundup macro in LibTIFF before 3.9.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TIFF file that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2065.html">CVE-2010-2065</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2065">SUSE bug 612879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2065">SUSE bug 612879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2065">SUSE bug 612879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2065">SUSE bug 612787</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2065">SUSE bug 612879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2065">SUSE bug 612879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2065">SUSE bug 612879</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2066</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2066" source="CVE"/>
    <description>
    The mext_check_arguments function in fs/ext4/move_extent.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a MOVE_EXT ioctl call that specifies this file as a donor.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2066.html">CVE-2010-2066</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2066">SUSE bug 612457</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2067</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2067" source="CVE"/>
    <description>
    Stack-based buffer overflow in the TIFFFetchSubjectDistance function in tif_dirread.c in LibTIFF before 3.9.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long EXIF SubjectDistance field in a TIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2067.html">CVE-2010-2067</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2067">SUSE bug 612787</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2067">SUSE bug 612879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2067">SUSE bug 612787</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2067">SUSE bug 612879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2067">SUSE bug 612787</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2068</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2068" source="CVE"/>
    <description>
    mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2068.html">CVE-2010-2068</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2068">SUSE bug 627030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2068">SUSE bug 627387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2068">SUSE bug 627387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2068">SUSE bug 627030</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2074</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2074" source="CVE"/>
    <description>
    istream.c in w3m 0.5.2 and possibly other versions, when ssl_verify_server is enabled, does not properly handle a '\0' character in a domain name in the (1) subject's Common Name or (2) Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2074.html">CVE-2010-2074</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2074">SUSE bug 609451</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139129" comment="w3m-0.5.3-156.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2156</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2156" source="CVE"/>
    <description>
    ISC DHCP 4.1 before 4.1.1-P1 and 4.0 before 4.0.2-P1 allows remote attackers to cause a denial of service (server exit) via a zero-length client ID.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2156.html">CVE-2010-2156</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2156">SUSE bug 612546</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138235" comment="dhcp-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151310" comment="dhcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138236" comment="dhcp-client-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151311" comment="dhcp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138237" comment="dhcp-doc-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151312" comment="dhcp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138238" comment="dhcp-relay-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151313" comment="dhcp-relay is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138239" comment="dhcp-server-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151314" comment="dhcp-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2225</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2225" source="CVE"/>
    <description>
    Use-after-free vulnerability in the SplObjectStorage unserializer in PHP 5.2.x and 5.3.x through 5.3.2 allows remote attackers to execute arbitrary code or obtain sensitive information via serialized data, related to the PHP unserialize function.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2225.html">CVE-2010-2225</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2225">SUSE bug 616232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2225">SUSE bug 616232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2225">SUSE bug 616232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2225">SUSE bug 616232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2225">SUSE bug 616232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2225">SUSE bug 616232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2225">SUSE bug 616232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2225">SUSE bug 616232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2225">SUSE bug 616232</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2233</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2233" source="CVE"/>
    <description>
    tif_getimage.c in LibTIFF 3.9.0 and 3.9.2 on 64-bit platforms, as used in ImageMagick, does not properly perform vertical flips, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TIFF image, related to "downsampled OJPEG input."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2233.html">CVE-2010-2233</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2233">SUSE bug 612879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2233">SUSE bug 612879</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2240</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2240" source="CVE"/>
    <description>
    The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2240.html">CVE-2010-2240</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 615929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 618152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 618152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 618152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 618152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 618152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 615929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 618152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 211997</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 59807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 618152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 546062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 618152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 643986</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 632737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 746947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 746947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 746947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 746947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 746949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 746949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 615929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 1039348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2240">SUSE bug 1039348</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139149" comment="xorg-x11-server-7.6_1.17.2-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139150" comment="xorg-x11-server-extra-7.6_1.17.2-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139151" comment="xorg-x11-server-sdk-7.6_1.17.2-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2242</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2242" source="CVE"/>
    <description>
    Red Hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest OS users to bypass intended access restrictions by leveraging IP address and source-port values, as demonstrated by copying and deleting an NFS directory tree.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2242.html">CVE-2010-2242</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2242">SUSE bug 618155</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2242">SUSE bug 618155</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2244</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2244" source="CVE"/>
    <description>
    The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in Avahi 0.6.16 and 0.6.25 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNS packet with an invalid checksum followed by a DNS packet with a valid checksum, a different vulnerability than CVE-2008-5081.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2244.html">CVE-2010-2244</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2244">SUSE bug 603289</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2244">SUSE bug 646961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2244">SUSE bug 603289</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138129" comment="avahi-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138130" comment="avahi-autoipd-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151209" comment="avahi-autoipd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138131" comment="avahi-compat-mDNSResponder-devel-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151210" comment="avahi-compat-mDNSResponder-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138132" comment="avahi-lang-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151211" comment="avahi-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138133" comment="libavahi-client3-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138134" comment="libavahi-client3-32bit-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151213" comment="libavahi-client3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138135" comment="libavahi-common3-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138136" comment="libavahi-common3-32bit-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151215" comment="libavahi-common3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138137" comment="libavahi-core7-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138138" comment="libavahi-devel-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151217" comment="libavahi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138139" comment="libdns_sd-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151218" comment="libdns_sd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2252</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2252" source="CVE"/>
    <description>
    GNU Wget 1.12 and earlier uses a server-provided filename instead of the original URL to determine the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a 3xx redirect to a URL with a .wgetrc filename followed by a 3xx redirect to a URL with a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2252.html">CVE-2010-2252</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2252">SUSE bug 606317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2252">SUSE bug 606317</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139130" comment="wget-1.14-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151442" comment="wget is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2494</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2494" source="CVE"/>
    <description>
    Multiple buffer underflows in the base64 decoder in base64.c in (1) bogofilter and (2) bogolexer in bogofilter before 1.2.2 allow remote attackers to cause a denial of service (heap memory corruption and application crash) via an e-mail message with invalid base64 data that begins with an = (equals) character.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2494.html">CVE-2010-2494</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2494">SUSE bug 619847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2494">SUSE bug 619847</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138153" comment="bogofilter-common-1.2.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151443" comment="bogofilter-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138154" comment="bogofilter-db-1.2.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151444" comment="bogofilter-db is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2497</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497" source="CVE"/>
    <description>
    Integer underflow in glyph handling in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2497.html">CVE-2010-2497</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2497">SUSE bug 619562</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2497">SUSE bug 619562</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2497">SUSE bug 619562</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2497">SUSE bug 635692</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2528</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2528" source="CVE"/>
    <description>
    The clientautoresp function in family_icbm.c in the oscar protocol plugin in libpurple in Pidgin before 2.7.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via an X-Status message that lacks the expected end tag for a (1) desc or (2) title element.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2528.html">CVE-2010-2528</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2528">SUSE bug 630965</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2529</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2529" source="CVE"/>
    <description>
    Unspecified vulnerability in ping.c in iputils 20020927, 20070202, 20071127, and 20100214 on Mandriva Linux allows remote attackers to cause a denial of service (hang) via a crafted echo response.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2529.html">CVE-2010-2529</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2529">SUSE bug 620837</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138407" comment="iputils-s20121221-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151445" comment="iputils is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2546</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2546" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in loaders/load_it.c in libmikmod, possibly 3.1.12, might allow remote attackers to execute arbitrary code via (1) crafted samples or (2) crafted instrument definitions in an Impulse Tracker file, related to panpts, pitpts, and IT_ProcessEnvelope.  NOTE: some of these details are obtained from third party information.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-3995.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2546.html">CVE-2010-2546</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2546">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2546">SUSE bug 752802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2546">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2546">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2546">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2546">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2546">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2546">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2546">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2546">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2546">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2546">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2546">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2546">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2546">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2546">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2546">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2546">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2546">SUSE bug 625547</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2546">SUSE bug 625547</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138695" comment="libmikmod3-3.3.7-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151102" comment="libmikmod3 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2547</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2547" source="CVE"/>
    <description>
    Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificate with a large number of Subject Alternate Names, which is not properly handled in a realloc operation when importing the certificate or verifying its signature.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2547.html">CVE-2010-2547</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2547">SUSE bug 625947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2547">SUSE bug 625947</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119616" comment="gpg2-2.0.24-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151446" comment="gpg2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119617" comment="gpg2-lang-2.0.24-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151447" comment="gpg2-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2640</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2640" source="CVE"/>
    <description>
    Array index error in the PK font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2640.html">CVE-2010-2640</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2640">SUSE bug 660555</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138264" comment="evince-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151448" comment="evince is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138265" comment="evince-lang-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151449" comment="evince-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138266" comment="libevdocument3-4-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151450" comment="libevdocument3-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138267" comment="libevview3-3-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151451" comment="libevview3-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138268" comment="nautilus-evince-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151452" comment="nautilus-evince is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138269" comment="typelib-1_0-EvinceDocument-3_0-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151453" comment="typelib-1_0-EvinceDocument-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138270" comment="typelib-1_0-EvinceView-3_0-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151454" comment="typelib-1_0-EvinceView-3_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2641</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2641" source="CVE"/>
    <description>
    Array index error in the VF font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2641.html">CVE-2010-2641</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2641">SUSE bug 660555</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138264" comment="evince-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151448" comment="evince is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138265" comment="evince-lang-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151449" comment="evince-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138266" comment="libevdocument3-4-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151450" comment="libevdocument3-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138267" comment="libevview3-3-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151451" comment="libevview3-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138268" comment="nautilus-evince-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151452" comment="nautilus-evince is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138269" comment="typelib-1_0-EvinceDocument-3_0-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151453" comment="typelib-1_0-EvinceDocument-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138270" comment="typelib-1_0-EvinceView-3_0-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151454" comment="typelib-1_0-EvinceView-3_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2642</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2642" source="CVE"/>
    <description>
    Heap-based buffer overflow in the AFM font parser in the dvi-backend component in Evince 2.32 and earlier, teTeX 3.0, t1lib 5.1.2, and possibly other products allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2642.html">CVE-2010-2642</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2642">SUSE bug 660555</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2642">SUSE bug 661018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2642">SUSE bug 664484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2642">SUSE bug 662411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2642">SUSE bug 790421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2642">SUSE bug 790421</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138264" comment="evince-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151448" comment="evince is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138265" comment="evince-lang-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151449" comment="evince-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138266" comment="libevdocument3-4-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151450" comment="libevdocument3-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138267" comment="libevview3-3-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151451" comment="libevview3-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138268" comment="nautilus-evince-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151452" comment="nautilus-evince is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138269" comment="typelib-1_0-EvinceDocument-3_0-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151453" comment="typelib-1_0-EvinceDocument-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138270" comment="typelib-1_0-EvinceView-3_0-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151454" comment="typelib-1_0-EvinceView-3_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2643</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2643" source="CVE"/>
    <description>
    Integer overflow in the TFM font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2643.html">CVE-2010-2643</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2643">SUSE bug 660555</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138264" comment="evince-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151448" comment="evince is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138265" comment="evince-lang-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151449" comment="evince-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138266" comment="libevdocument3-4-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151450" comment="libevdocument3-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138267" comment="libevview3-3-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151451" comment="libevview3-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138268" comment="nautilus-evince-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151452" comment="nautilus-evince is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138269" comment="typelib-1_0-EvinceDocument-3_0-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151453" comment="typelib-1_0-EvinceDocument-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138270" comment="typelib-1_0-EvinceView-3_0-3.14.2-2.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151454" comment="typelib-1_0-EvinceView-3_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2751</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2751" source="CVE"/>
    <description>
    The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocShell.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to spoof the SSL security status of a document via vectors involving multiple requests, a redirect, and the history.back and history.forward JavaScript functions.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2751.html">CVE-2010-2751</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2751">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2752</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2752" source="CVE"/>
    <description>
    Integer overflow in an array class in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code by placing many Cascading Style Sheets (CSS) values in an array, related to references to external font resources and an inconsistency between 16-bit and 32-bit integers.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2752.html">CVE-2010-2752</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2752">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2753</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2753" source="CVE"/>
    <description>
    Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2753.html">CVE-2010-2753</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2753">SUSE bug 622506</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2753">SUSE bug 637303</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2754</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2754" source="CVE"/>
    <description>
    dom/base/nsJSEnvironment.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 does not properly suppress a script's URL in certain circumstances involving a redirect and an error message, which allows remote attackers to obtain sensitive information about script parameters via a crafted HTML document, related to the window.onerror handler.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2754.html">CVE-2010-2754</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2754">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2755</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2755" source="CVE"/>
    <description>
    layout/generic/nsObjectFrame.cpp in Mozilla Firefox 3.6.7 does not properly free memory in the parameter array of a plugin instance, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted HTML document, related to the DATA and SRC attributes of an OBJECT element. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-1214.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2755.html">CVE-2010-2755</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2755">SUSE bug 622506</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2760</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2760" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTreeSelection function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via vectors involving a XUL tree selection, related to a "dangling pointer vulnerability." NOTE: this issue exists because of an incomplete fix for CVE-2010-2753.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2760.html">CVE-2010-2760</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2760">SUSE bug 638109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2760">SUSE bug 637303</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2761</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2761" source="CVE"/>
    <description>
    The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2761.html">CVE-2010-2761</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2761">SUSE bug 657343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2761">SUSE bug 657343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2761">SUSE bug 657343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2761">SUSE bug 657343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2761">SUSE bug 657731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2761">SUSE bug 657731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2761">SUSE bug 663396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2761">SUSE bug 669245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2761">SUSE bug 670476</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139023" comment="perl-5.18.2-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151455" comment="perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139024" comment="perl-32bit-5.18.2-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151456" comment="perl-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139025" comment="perl-base-5.18.2-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151457" comment="perl-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139026" comment="perl-doc-5.18.2-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151458" comment="perl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2762</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2762" source="CVE"/>
    <description>
    The XPCSafeJSObjectWrapper class in the SafeJSObjectWrapper (aka SJOW) implementation in Mozilla Firefox 3.6.x before 3.6.9 and Thunderbird 3.1.x before 3.1.3 does not properly restrict objects at the end of scope chains, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via vectors related to a chrome privileged object and a chain ending in an outer object.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2762.html">CVE-2010-2762</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2762">SUSE bug 637303</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2764</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2764" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict read access to the statusText property of XMLHttpRequest objects, which allows remote attackers to discover the existence of intranet web servers via cross-origin requests.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2764.html">CVE-2010-2764</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2764">SUSE bug 638109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2764">SUSE bug 637303</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2765</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2765" source="CVE"/>
    <description>
    Integer overflow in the FRAMESET element implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a large number of values in the cols (aka columns) attribute, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2765.html">CVE-2010-2765</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2765">SUSE bug 638109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2765">SUSE bug 637303</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2766</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2766" source="CVE"/>
    <description>
    The normalizeDocument function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle the removal of DOM nodes during normalization, which might allow remote attackers to execute arbitrary code via vectors involving access to a deleted object.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2766.html">CVE-2010-2766</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2766">SUSE bug 638109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2766">SUSE bug 637303</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2767</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2767" source="CVE"/>
    <description>
    The navigator.plugins implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle destruction of the DOM plugin array, which might allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via crafted access to the navigator object, related to a "dangling pointer vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2767.html">CVE-2010-2767</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2767">SUSE bug 638109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2767">SUSE bug 637303</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2768</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2768" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict use of the type attribute of an OBJECT element to set a document's charset, which allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms via UTF-7 encoding.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2768.html">CVE-2010-2768</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2768">SUSE bug 638109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2768">SUSE bug 637303</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2769</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2769" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allows user-assisted remote attackers to inject arbitrary web script or HTML via a selection that is added to a document in which the designMode property is enabled.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2769.html">CVE-2010-2769</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2769">SUSE bug 638109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2769">SUSE bug 637303</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2800</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2800" source="CVE"/>
    <description>
    The MS-ZIP decompressor in cabextract before 1.3 allows remote attackers to cause a denial of service (infinite loop) via a malformed MSZIP archive in a .cab file during a (1) test or (2) extract action, related to the libmspack library.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2800.html">CVE-2010-2800</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2800">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2800">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2800">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2800">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2800">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2800">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2800">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2800">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2800">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2800">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2800">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2800">SUSE bug 627753</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138716" comment="libmspack0-0.5-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151459" comment="libmspack0 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2801</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2801" source="CVE"/>
    <description>
    Integer signedness error in the Quantum decompressor in cabextract before 1.3, when archive test mode is used, allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Quantum archive in a .cab file, related to the libmspack library.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2801.html">CVE-2010-2801</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2801">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2801">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2801">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2801">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2801">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2801">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2801">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2801">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2801">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2801">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2801">SUSE bug 627753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2801">SUSE bug 627753</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138716" comment="libmspack0-0.5-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151459" comment="libmspack0 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2805</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805" source="CVE"/>
    <description>
    The FT_Stream_EnterFrame function in base/ftstream.c in FreeType before 2.4.2 does not properly validate certain position values, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2805.html">CVE-2010-2805</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2805">SUSE bug 629447</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2805">SUSE bug 629447</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2805">SUSE bug 635692</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2891</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2891" source="CVE"/>
    <description>
    Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows context-dependent attackers to execute arbitrary code via an Object Identifier (aka OID) represented as a numerical string containing many components separated by . (dot) characters.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2891.html">CVE-2010-2891</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2891">SUSE bug 649867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2891">SUSE bug 649867</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138852" comment="libsmi-0.4.8-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151460" comment="libsmi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138853" comment="libsmi2-0.4.8-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151461" comment="libsmi2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2935</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2935" source="CVE"/>
    <description>
    simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 does not properly handle integer values associated with dictionary property items, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PowerPoint document that triggers a heap-based buffer overflow, related to an "integer truncation error."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2935.html">CVE-2010-2935</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2935">SUSE bug 629085</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138812" comment="libreoffice-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138813" comment="libreoffice-base-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138814" comment="libreoffice-base-drivers-mysql-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151464" comment="libreoffice-base-drivers-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138815" comment="libreoffice-branding-upstream-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138816" comment="libreoffice-calc-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138817" comment="libreoffice-calc-extensions-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138818" comment="libreoffice-draw-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138819" comment="libreoffice-filters-optional-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138820" comment="libreoffice-gnome-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138821" comment="libreoffice-icon-theme-breeze-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151471" comment="libreoffice-icon-theme-breeze is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138822" comment="libreoffice-icon-theme-galaxy-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151472" comment="libreoffice-icon-theme-galaxy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138823" comment="libreoffice-icon-theme-hicontrast-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151473" comment="libreoffice-icon-theme-hicontrast is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138824" comment="libreoffice-icon-theme-oxygen-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151474" comment="libreoffice-icon-theme-oxygen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138825" comment="libreoffice-icon-theme-sifr-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151475" comment="libreoffice-icon-theme-sifr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138826" comment="libreoffice-icon-theme-tango-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151476" comment="libreoffice-icon-theme-tango is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138827" comment="libreoffice-impress-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138828" comment="libreoffice-kde4-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151478" comment="libreoffice-kde4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138829" comment="libreoffice-l10n-cs-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138830" comment="libreoffice-l10n-da-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138831" comment="libreoffice-l10n-de-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138832" comment="libreoffice-l10n-el-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138833" comment="libreoffice-l10n-en-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138834" comment="libreoffice-l10n-es-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138835" comment="libreoffice-l10n-fr-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138836" comment="libreoffice-l10n-hu-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138837" comment="libreoffice-l10n-it-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138838" comment="libreoffice-l10n-ja-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138839" comment="libreoffice-l10n-pl-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138840" comment="libreoffice-l10n-ru-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138841" comment="libreoffice-mailmerge-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138842" comment="libreoffice-math-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138843" comment="libreoffice-pyuno-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138844" comment="libreoffice-writer-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138845" comment="libreoffice-writer-extensions-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2936</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2936" source="CVE"/>
    <description>
    Integer overflow in simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted polygons in a PowerPoint document that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2936.html">CVE-2010-2936</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2936">SUSE bug 629085</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138812" comment="libreoffice-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138813" comment="libreoffice-base-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138814" comment="libreoffice-base-drivers-mysql-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151464" comment="libreoffice-base-drivers-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138815" comment="libreoffice-branding-upstream-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138816" comment="libreoffice-calc-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138817" comment="libreoffice-calc-extensions-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138818" comment="libreoffice-draw-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138819" comment="libreoffice-filters-optional-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138820" comment="libreoffice-gnome-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138821" comment="libreoffice-icon-theme-breeze-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151471" comment="libreoffice-icon-theme-breeze is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138822" comment="libreoffice-icon-theme-galaxy-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151472" comment="libreoffice-icon-theme-galaxy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138823" comment="libreoffice-icon-theme-hicontrast-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151473" comment="libreoffice-icon-theme-hicontrast is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138824" comment="libreoffice-icon-theme-oxygen-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151474" comment="libreoffice-icon-theme-oxygen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138825" comment="libreoffice-icon-theme-sifr-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151475" comment="libreoffice-icon-theme-sifr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138826" comment="libreoffice-icon-theme-tango-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151476" comment="libreoffice-icon-theme-tango is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138827" comment="libreoffice-impress-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138828" comment="libreoffice-kde4-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151478" comment="libreoffice-kde4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138829" comment="libreoffice-l10n-cs-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138830" comment="libreoffice-l10n-da-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138831" comment="libreoffice-l10n-de-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138832" comment="libreoffice-l10n-el-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138833" comment="libreoffice-l10n-en-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138834" comment="libreoffice-l10n-es-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138835" comment="libreoffice-l10n-fr-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138836" comment="libreoffice-l10n-hu-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138837" comment="libreoffice-l10n-it-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138838" comment="libreoffice-l10n-ja-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138839" comment="libreoffice-l10n-pl-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138840" comment="libreoffice-l10n-ru-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138841" comment="libreoffice-mailmerge-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138842" comment="libreoffice-math-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138843" comment="libreoffice-pyuno-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138844" comment="libreoffice-writer-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138845" comment="libreoffice-writer-extensions-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2939</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2939" source="CVE"/>
    <description>
    Double free vulnerability in the ssl3_get_key_exchange function in the OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and possibly other versions, when using ECDH, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted private key with an invalid prime.  NOTE: some sources refer to this as a use-after-free issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2939.html">CVE-2010-2939</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2939">SUSE bug 629905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2939">SUSE bug 629905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2939">SUSE bug 629905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2939">SUSE bug 629905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2939">SUSE bug 629905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2939">SUSE bug 629905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2939">SUSE bug 629905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2939">SUSE bug 629905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2939">SUSE bug 629905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2939">SUSE bug 629905</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2941</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2941" source="CVE"/>
    <description>
    ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute values with invalid string data types, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly execute arbitrary code via a crafted IPP request.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2941.html">CVE-2010-2941</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2941">SUSE bug 649256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2941">SUSE bug 649256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2941">SUSE bug 649256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2941">SUSE bug 654627</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138200" comment="cups-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138201" comment="cups-client-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138202" comment="cups-devel-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138203" comment="cups-libs-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151187" comment="cups-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138204" comment="cups-libs-32bit-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151188" comment="cups-libs-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2942</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2942" source="CVE"/>
    <description>
    The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2942.html">CVE-2010-2942</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2942">SUSE bug 632309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2942">SUSE bug 642324</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2947</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2947" source="CVE"/>
    <description>
    Heap-based buffer overflow in the HX_split function in string.c in libHX before 3.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a string that is inconsistent with the expected number of fields.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2947.html">CVE-2010-2947</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2947">SUSE bug 631582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2947">SUSE bug 631582</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138455" comment="libHX28-3.18-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151496" comment="libHX28 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138456" comment="libHX28-32bit-3.18-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151497" comment="libHX28-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2950</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2950" source="CVE"/>
    <description>
    Format string vulnerability in stream.c in the phar extension in PHP 5.3.x through 5.3.3 allows context-dependent attackers to obtain sensitive information (memory contents) and possibly execute arbitrary code via a crafted phar:// URI that is not properly handled by the phar_stream_flush function, leading to errors in the php_stream_wrapper_log_error function.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2094.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2950.html">CVE-2010-2950</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2950">SUSE bug 633934</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2954</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2954" source="CVE"/>
    <description>
    The irda_bind function in net/irda/af_irda.c in the Linux kernel before 2.6.36-rc3-next-20100901 does not properly handle failure of the irda_open_tsap function, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via multiple unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA) socket.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2954.html">CVE-2010-2954</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2954">SUSE bug 636112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2954">SUSE bug 636112</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2955</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2955" source="CVE"/>
    <description>
    The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2955.html">CVE-2010-2955</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2955">SUSE bug 635413</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2955">SUSE bug 635413</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2993</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-2993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2993" source="CVE"/>
    <description>
    The IPMI dissector in Wireshark 1.2.0 through 1.2.9 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-2993.html">CVE-2010-2993</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2993">SUSE bug 630599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-2993">SUSE bug 630599</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3053</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053" source="CVE"/>
    <description>
    bdf/bdflib.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) via a crafted BDF font file, related to an attempted modification of a value in a static string.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3053.html">CVE-2010-3053</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3053">SUSE bug 633938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3053">SUSE bug 633938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3053">SUSE bug 635692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3053">SUSE bug 635692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3053">SUSE bug 645982</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3054</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054" source="CVE"/>
    <description>
    Unspecified vulnerability in FreeType 2.3.9, and other versions before 2.4.2, allows remote attackers to cause a denial of service via vectors involving nested Standard Encoding Accented Character (aka seac) calls, related to psaux.h, cffgload.c, cffgload.h, and t1decode.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3054.html">CVE-2010-3054</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3054">SUSE bug 633943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3054">SUSE bug 633943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3054">SUSE bug 633943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3054">SUSE bug 635692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3054">SUSE bug 645982</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3069</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069" source="CVE"/>
    <description>
    Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3069.html">CVE-2010-3069</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3069">SUSE bug 637218</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3069">SUSE bug 637218</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3081</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3081" source="CVE"/>
    <description>
    The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3081.html">CVE-2010-3081</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3081">SUSE bug 639709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3081">SUSE bug 639709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3081">SUSE bug 639709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3081">SUSE bug 641575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3081">SUSE bug 641575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3081">SUSE bug 641575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3081">SUSE bug 641575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3081">SUSE bug 871595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3081">SUSE bug 639709</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3166</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3166" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsTextFrameUtils::TransformText function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a bidirectional text run.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3166.html">CVE-2010-3166</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3166">SUSE bug 638109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3166">SUSE bug 637303</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3167</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3167" source="CVE"/>
    <description>
    The nsTreeContentView function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle node removal in XUL trees, which allows remote attackers to execute arbitrary code via vectors involving access to deleted memory, related to a "dangling pointer vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3167.html">CVE-2010-3167</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3167">SUSE bug 638109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3167">SUSE bug 637303</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3168</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3168" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict the role of property changes in triggering XUL tree removal, which allows remote attackers to cause a denial of service (deleted memory access and application crash) or possibly execute arbitrary code by setting unspecified properties.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3168.html">CVE-2010-3168</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3168">SUSE bug 638109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3168">SUSE bug 637303</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3169</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3169" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3169.html">CVE-2010-3169</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3169">SUSE bug 638109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3169">SUSE bug 637303</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3170</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3170" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3170.html">CVE-2010-3170</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3170">SUSE bug 637290</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3170">SUSE bug 645315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3170">SUSE bug 652858</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3170">SUSE bug 637290</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138623" comment="libfreebl3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138624" comment="libsoftokn3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138625" comment="mozilla-nss-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138626" comment="mozilla-nss-certs-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138627" comment="mozilla-nss-devel-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138628" comment="mozilla-nss-tools-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3173</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3173" source="CVE"/>
    <description>
    The SSL implementation in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly set the minimum key length for Diffie-Hellman Ephemeral (DHE) mode, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3173.html">CVE-2010-3173</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3173">SUSE bug 645315</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3174</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3174" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.14, Thunderbird before 3.0.9, and SeaMonkey before 2.0.9 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3174.html">CVE-2010-3174</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3174">SUSE bug 645315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3174">SUSE bug 652858</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3175</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3175" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.6.x before 3.6.11 and Thunderbird 3.1.x before 3.1.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3175.html">CVE-2010-3175</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3175">SUSE bug 645315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3175">SUSE bug 652858</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3176</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3176" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3176.html">CVE-2010-3176</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3176">SUSE bug 645315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3176">SUSE bug 652858</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3177</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3177" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the Gopher parser in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, and SeaMonkey before 2.0.9, allow remote attackers to inject arbitrary web script or HTML via a crafted name of a (1) file or (2) directory on a Gopher server.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3177.html">CVE-2010-3177</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3177">SUSE bug 645315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3177">SUSE bug 652858</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3178</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3178" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 do not properly handle certain modal calls made by javascript: URLs in circumstances related to opening a new window and performing cross-domain navigation, which allows remote attackers to bypass the Same Origin Policy via a crafted HTML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3178.html">CVE-2010-3178</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3178">SUSE bug 645315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3178">SUSE bug 652858</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3179</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3179" source="CVE"/>
    <description>
    Stack-based buffer overflow in the text-rendering functionality in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a long argument to the document.write method.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3179.html">CVE-2010-3179</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3179">SUSE bug 645315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3179">SUSE bug 652858</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3180</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3180" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsBarProp function in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code by accessing the locationbar property of a closed window.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3180.html">CVE-2010-3180</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3180">SUSE bug 645315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3180">SUSE bug 652858</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3182</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3182" source="CVE"/>
    <description>
    A certain application-launch script in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 on Linux places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3182.html">CVE-2010-3182</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3182">SUSE bug 642502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3182">SUSE bug 645315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3182">SUSE bug 652858</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3183</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3183" source="CVE"/>
    <description>
    The LookupGetterOrSetter function in js3250.dll in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly support window.__lookupGetter__ function calls that lack arguments, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference and application crash) via vectors involving a "dangling pointer" and the JS_ValueToId function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3183.html">CVE-2010-3183</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3183">SUSE bug 645315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3183">SUSE bug 652858</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3296</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3296" source="CVE"/>
    <description>
    The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3296.html">CVE-2010-3296</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3296">SUSE bug 639481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3296">SUSE bug 649187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3296">SUSE bug 649187</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3297</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3297" source="CVE"/>
    <description>
    The eql_g_master_cfg function in drivers/net/eql.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an EQL_GETMASTRCFG ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3297.html">CVE-2010-3297</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3297">SUSE bug 639482</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3297">SUSE bug 649187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3297">SUSE bug 649187</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3298</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3298" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3298" source="CVE"/>
    <description>
    The hso_get_count function in drivers/net/usb/hso.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3298.html">CVE-2010-3298</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3298">SUSE bug 639483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3298">SUSE bug 649187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3298">SUSE bug 649187</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3301</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3301" source="CVE"/>
    <description>
    The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register.  NOTE: this vulnerability exists because of a CVE-2007-4573 regression.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3301.html">CVE-2010-3301</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3301">SUSE bug 639708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3301">SUSE bug 639708</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3310</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3310" source="CVE"/>
    <description>
    Multiple integer signedness errors in net/rose/af_rose.c in the Linux kernel before 2.6.36-rc5-next-20100923 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a rose_getname function call, related to the rose_bind and rose_connect functions.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3310.html">CVE-2010-3310</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3310">SUSE bug 640721</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3311</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311" source="CVE"/>
    <description>
    Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Compact Font Format (CFF) font file that triggers a heap-based buffer overflow, related to an "input stream position error" issue, a different vulnerability than CVE-2010-1797.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3311.html">CVE-2010-3311</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3311">SUSE bug 641580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3311">SUSE bug 635692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3311">SUSE bug 645982</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3315</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3315" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3315" source="CVE"/>
    <description>
    authz.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x before 1.5.8 and 1.6.x before 1.6.13, when SVNPathAuthz short_circuit is enabled, does not properly handle a named repository as a rule scope, which allows remote authenticated users to bypass intended access restrictions via svn commands.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3315.html">CVE-2010-3315</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3315">SUSE bug 649861</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3430</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3430" source="CVE"/>
    <description>
    The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow local users to obtain sensitive information by leveraging unintended group permissions, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3430.html">CVE-2010-3430</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3430">SUSE bug 623457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3430">SUSE bug 631802</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139013" comment="pam-1.1.8-12.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151504" comment="pam is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139014" comment="pam-32bit-1.1.8-12.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151505" comment="pam-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139015" comment="pam-devel-1.1.8-12.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151506" comment="pam-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3431</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3431" source="CVE"/>
    <description>
    The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not check the return value of the setfsuid system call, which might allow local users to obtain sensitive information by leveraging an unintended uid, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3431.html">CVE-2010-3431</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3431">SUSE bug 623457</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139013" comment="pam-1.1.8-12.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151504" comment="pam is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139014" comment="pam-32bit-1.1.8-12.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151505" comment="pam-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139015" comment="pam-devel-1.1.8-12.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151506" comment="pam-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3433</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3433" source="CVE"/>
    <description>
    The PL/perl and PL/Tcl implementations in PostgreSQL 7.4 before 7.4.30, 8.0 before 8.0.26, 8.1 before 8.1.22, 8.2 before 8.2.18, 8.3 before 8.3.12, 8.4 before 8.4.5, and 9.0 before 9.0.1 do not properly protect script execution by a different SQL user identity within the same session, which allows remote authenticated users to gain privileges via crafted script code in a SECURITY DEFINER function, as demonstrated by (1) redefining standard functions or (2) redefining operators, a different vulnerability than CVE-2010-1168, CVE-2010-1169, CVE-2010-1170, and CVE-2010-1447.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3433.html">CVE-2010-3433</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3433">SUSE bug 643771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3433">SUSE bug 648140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3436</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3436" source="CVE"/>
    <description>
    fopen_wrappers.c in PHP 5.3.x through 5.3.3 might allow remote attackers to bypass open_basedir restrictions via vectors related to the length of a filename.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3436.html">CVE-2010-3436</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3436">SUSE bug 642733</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3436">SUSE bug 992991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3445</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3445" source="CVE"/>
    <description>
    Stack consumption vulnerability in the dissect_ber_unknown function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.4.x before 1.4.1 and 1.2.x before 1.2.12 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a long string in an unknown ASN.1/BER encoded packet, as demonstrated using SNMP.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3445.html">CVE-2010-3445</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3445">SUSE bug 643078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3445">SUSE bug 643078</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3609</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3609" source="CVE"/>
    <description>
    The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote attackers to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3609.html">CVE-2010-3609</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3609">SUSE bug 642571</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139003" comment="openslp-2.0.0-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151507" comment="openslp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139004" comment="openslp-devel-2.0.0-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151508" comment="openslp-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139005" comment="openslp-server-2.0.0-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151509" comment="openslp-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3611</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3611" source="CVE"/>
    <description>
    ISC DHCP server 4.0 before 4.0.2, 4.1 before 4.1.2, and 4.2 before 4.2.0-P1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a DHCPv6 packet containing a Relay-Forward message without an address in the Relay-Forward link-address field.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3611.html">CVE-2010-3611</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3611">SUSE bug 650902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3611">SUSE bug 650902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3611">SUSE bug 667655</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138235" comment="dhcp-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151310" comment="dhcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138236" comment="dhcp-client-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151311" comment="dhcp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138237" comment="dhcp-doc-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151312" comment="dhcp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138238" comment="dhcp-relay-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151313" comment="dhcp-relay is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138239" comment="dhcp-server-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151314" comment="dhcp-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3613</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3613" source="CVE"/>
    <description>
    named in ISC BIND 9.6.2 before 9.6.2-P3, 9.6-ESV before 9.6-ESV-R3, and 9.7.x before 9.7.2-P3 does not properly handle the combination of signed negative responses and corresponding RRSIG records in the cache, which allows remote attackers to cause a denial of service (daemon crash) via a query for cached data.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3613.html">CVE-2010-3613</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3613">SUSE bug 657129</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3614</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3614" source="CVE"/>
    <description>
    named in ISC BIND 9.x before 9.6.2-P3, 9.7.x before 9.7.2-P3, 9.4-ESV before 9.4-ESV-R4, and 9.6-ESV before 9.6-ESV-R3 does not properly determine the security status of an NS RRset during a DNSKEY algorithm rollover, which might allow remote attackers to cause a denial of service (DNSSEC validation error) by triggering a rollover.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3614.html">CVE-2010-3614</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3614">SUSE bug 657102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3614">SUSE bug 657102</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3615</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3615" source="CVE"/>
    <description>
    named in ISC BIND 9.7.2-P2 does not check all intended locations for allow-query ACLs, which might allow remote attackers to make successful requests for private DNS records via the standard DNS query mechanism.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3615.html">CVE-2010-3615</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3615">SUSE bug 657120</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3616</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3616" source="CVE"/>
    <description>
    ISC DHCP server 4.2 before 4.2.0-P2, when configured to use failover partnerships, allows remote attackers to cause a denial of service (communications-interrupted state and DHCP client service loss) by connecting to a port that is only intended for a failover peer, as demonstrated by a Nagios check_tcp process check to TCP port 520.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3616.html">CVE-2010-3616</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3616">SUSE bug 659059</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138235" comment="dhcp-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151310" comment="dhcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138236" comment="dhcp-client-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151311" comment="dhcp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138237" comment="dhcp-doc-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151312" comment="dhcp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138238" comment="dhcp-relay-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151313" comment="dhcp-relay is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138239" comment="dhcp-server-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151314" comment="dhcp-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3709</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3709" source="CVE"/>
    <description>
    The ZipArchive::getArchiveComment function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3709.html">CVE-2010-3709</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3709">SUSE bug 660102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3709">SUSE bug 660102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3709">SUSE bug 992991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3710</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3710" source="CVE"/>
    <description>
    Stack consumption vulnerability in the filter_var function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3, when FILTER_VALIDATE_EMAIL mode is used, allows remote attackers to cause a denial of service (memory consumption and application crash) via a long e-mail address string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3710.html">CVE-2010-3710</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3710">SUSE bug 649210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3710">SUSE bug 649210</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3711</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3711" source="CVE"/>
    <description>
    libpurple in Pidgin before 2.7.4 does not properly validate the return value of the purple_base64_decode function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a crafted message, related to the plugins for MSN, MySpaceIM, XMPP, and Yahoo! and the NTLM authentication support.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3711.html">CVE-2010-3711</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3711">SUSE bug 648273</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3765</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3765" source="CVE"/>
    <description>
    Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3765.html">CVE-2010-3765</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3765">SUSE bug 649492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3765">SUSE bug 652858</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3768</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3768" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 do not properly validate downloadable fonts before use within an operating system's font implementation, which allows remote attackers to execute arbitrary code via vectors related to @font-face Cascading Style Sheets (CSS) rules.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3768.html">CVE-2010-3768</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3768">SUSE bug 657016</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3769</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3769" source="CVE"/>
    <description>
    The line-breaking implementation in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 on Windows does not properly handle long strings, which allows remote attackers to execute arbitrary code via a crafted document.write call that triggers a buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3769.html">CVE-2010-3769</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3769">SUSE bug 657016</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3776</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3776" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3776.html">CVE-2010-3776</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3776">SUSE bug 657016</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3777</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3777" source="CVE"/>
    <description>
    Unspecified vulnerability in Mozilla Firefox 3.6.x before 3.6.13 and Thunderbird 3.1.x before 3.1.7 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3777.html">CVE-2010-3777</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3777">SUSE bug 657016</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3778</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3778" source="CVE"/>
    <description>
    Unspecified vulnerability in Mozilla Firefox 3.5.x before 3.5.16, Thunderbird before 3.0.11, and SeaMonkey before 2.0.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3778.html">CVE-2010-3778</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3778">SUSE bug 657016</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3814</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3814" source="CVE"/>
    <description>
    Heap-based buffer overflow in the Ins_SHZ function in ttinterp.c in FreeType 2.4.3 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted SHZ bytecode instruction, related to TrueType opcodes, as demonstrated by a PDF document with a crafted embedded font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3814.html">CVE-2010-3814</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3814">SUSE bug 647375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3814">SUSE bug 647375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3814">SUSE bug 647375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3814">SUSE bug 689174</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3853</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3853" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3853" source="CVE"/>
    <description>
    pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3853.html">CVE-2010-3853</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3853">SUSE bug 647958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3853">SUSE bug 647958</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139013" comment="pam-1.1.8-12.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151504" comment="pam is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139014" comment="pam-32bit-1.1.8-12.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151505" comment="pam-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139015" comment="pam-devel-1.1.8-12.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151506" comment="pam-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3855</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855" source="CVE"/>
    <description>
    Buffer overflow in the ft_var_readpackedpoints function in truetype/ttgxvar.c in FreeType 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TrueType GX font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3855.html">CVE-2010-3855</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3855">SUSE bug 647375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3855">SUSE bug 647375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3855">SUSE bug 647375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3855">SUSE bug 689174</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3864</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-3864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3864" source="CVE"/>
    <description>
    Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-3864.html">CVE-2010-3864</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3864">SUSE bug 651003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3864">SUSE bug 651003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3864">SUSE bug 651003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3864">SUSE bug 629905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3864">SUSE bug 651003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3864">SUSE bug 651003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3864">SUSE bug 651003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3864">SUSE bug 651003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3864">SUSE bug 651003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3864">SUSE bug 651003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3864">SUSE bug 651003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3864">SUSE bug 651003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3864">SUSE bug 651003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3864">SUSE bug 651003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-3864">SUSE bug 651003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4000</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4000" source="CVE"/>
    <description>
    gnome-shell in GNOME Shell 2.31.5 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4000.html">CVE-2010-4000</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4000">SUSE bug 642827</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138365" comment="gnome-shell-3.16.4-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151510" comment="gnome-shell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138366" comment="gnome-shell-browser-plugin-3.16.4-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151511" comment="gnome-shell-browser-plugin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138367" comment="gnome-shell-calendar-3.16.4-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151512" comment="gnome-shell-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138368" comment="gnome-shell-lang-3.16.4-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151513" comment="gnome-shell-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4003</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4003" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Not set</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4003.html">CVE-2010-4003</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4003">SUSE bug 642829</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138351" comment="gnome-games-3.10.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151514" comment="gnome-games is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138352" comment="gnome-games-recommended-3.10.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151515" comment="gnome-games-recommended is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4020</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4020" source="CVE"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4020.html">CVE-2010-4020</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4020">SUSE bug 650650</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4021</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4021" source="CVE"/>
    <description>
    The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 does not properly restrict the use of TGT credentials for armoring TGS requests, which might allow remote authenticated users to impersonate a client by rewriting an inner request, aka a "KrbFastReq forgery issue."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4021.html">CVE-2010-4021</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4021">SUSE bug 650650</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4022</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4022" source="CVE"/>
    <description>
    The do_standalone function in the MIT krb5 KDC database propagation daemon (kpropd) in Kerberos 1.7, 1.8, and 1.9, when running in standalone mode, does not properly handle when a worker child process "exits abnormally," which allows remote attackers to cause a denial of service (listening process termination, no new connections, and lack of updates in slave KVC) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4022.html">CVE-2010-4022</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4022">SUSE bug 662665</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4150</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4150" source="CVE"/>
    <description>
    Double free vulnerability in the imap_do_open function in the IMAP extension (ext/imap/php_imap.c) in PHP 5.2 before 5.2.15 and 5.3 before 5.3.4 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4150.html">CVE-2010-4150</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4150">SUSE bug 655968</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4225</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4225" source="CVE"/>
    <description>
    Unspecified vulnerability in the mod_mono module for XSP in Mono 2.8.x before 2.8.2 allows remote attackers to obtain the source code for .aspx (ASP.NET) applications via unknown vectors related to an "unloading bug."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4225.html">CVE-2010-4225</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4225">SUSE bug 660070</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138700" comment="libmono-2_0-1-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151516" comment="libmono-2_0-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138701" comment="libmono-2_0-devel-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151517" comment="libmono-2_0-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138702" comment="libmonoboehm-2_0-1-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151518" comment="libmonoboehm-2_0-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138703" comment="libmonoboehm-2_0-devel-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151519" comment="libmonoboehm-2_0-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138704" comment="libmonosgen-2_0-1-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151520" comment="libmonosgen-2_0-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138705" comment="mono-core-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151521" comment="mono-core is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138706" comment="mono-data-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151522" comment="mono-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138707" comment="mono-data-sqlite-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151523" comment="mono-data-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138708" comment="mono-extras-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151524" comment="mono-extras is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138709" comment="mono-mvc-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151525" comment="mono-mvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138710" comment="mono-wcf-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151526" comment="mono-wcf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138711" comment="mono-web-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151527" comment="mono-web is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138712" comment="mono-winforms-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151528" comment="mono-winforms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138713" comment="mono-winfxcore-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151529" comment="mono-winfxcore is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4267</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4267" source="CVE"/>
    <description>
    Stack-based buffer overflow in the hpmud_get_pml function in io/hpmud/pml.c in Hewlett-Packard Linux Imaging and Printing (HPLIP) 1.6.7, 3.9.8, 3.10.9, and probably other versions allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SNMP response with a large length value.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4267.html">CVE-2010-4267</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4267">SUSE bug 336658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4267">SUSE bug 336658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4267">SUSE bug 336658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4267">SUSE bug 808355</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138396" comment="hplip-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151009" comment="hplip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138397" comment="hplip-hpijs-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151010" comment="hplip-hpijs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138398" comment="hplip-sane-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151011" comment="hplip-sane is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4300</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4300" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4300" source="CVE"/>
    <description>
    Heap-based buffer overflow in the dissect_ldss_transfer function (epan/dissectors/packet-ldss.c) in the LDSS dissector in Wireshark 1.2.0 through 1.2.12 and 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an LDSS packet with a long digest line that triggers memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4300.html">CVE-2010-4300</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4300">SUSE bug 655448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4300">SUSE bug 655448</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4301</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4301" source="CVE"/>
    <description>
    epan/dissectors/packet-zbee-zcl.c in the ZigBee ZCL dissector in Wireshark 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted ZCL packet, related to Discover Attributes.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4301.html">CVE-2010-4301</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4301">SUSE bug 655448</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4341</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4341" source="CVE"/>
    <description>
    The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4341.html">CVE-2010-4341</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4341">SUSE bug 660481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4341">SUSE bug 660481</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138876" comment="libsss_idmap0-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151530" comment="libsss_idmap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138877" comment="sssd-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151531" comment="sssd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138878" comment="sssd-32bit-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151532" comment="sssd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138879" comment="sssd-krb5-common-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151533" comment="sssd-krb5-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138880" comment="sssd-ldap-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151534" comment="sssd-ldap is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4352</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4352" source="CVE"/>
    <description>
    Stack consumption vulnerability in D-Bus (aka DBus) before 1.4.1 allows local users to cause a denial of service (daemon crash) via a message containing many nested variants.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4352.html">CVE-2010-4352</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4352">SUSE bug 659934</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138227" comment="dbus-1-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138228" comment="dbus-1-devel-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151536" comment="dbus-1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138229" comment="dbus-1-x11-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138230" comment="libdbus-1-3-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138231" comment="libdbus-1-3-32bit-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151539" comment="libdbus-1-3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4410</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4410" source="CVE"/>
    <description>
    CRLF injection vulnerability in the header function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via vectors related to non-whitespace characters preceded by newline characters, a different vulnerability than CVE-2010-2761 and CVE-2010-3172.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4410.html">CVE-2010-4410</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4410">SUSE bug 660127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4410">SUSE bug 657343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4410">SUSE bug 663396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4410">SUSE bug 670476</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139023" comment="perl-5.18.2-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151455" comment="perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139024" comment="perl-32bit-5.18.2-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151456" comment="perl-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139025" comment="perl-base-5.18.2-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151457" comment="perl-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139026" comment="perl-doc-5.18.2-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151458" comment="perl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4411</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4411" source="CVE"/>
    <description>
    Unspecified vulnerability in CGI.pm 3.50 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unknown vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2010-2761.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4411.html">CVE-2010-4411</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4411">SUSE bug 657343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4411">SUSE bug 657343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4411">SUSE bug 657731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4411">SUSE bug 657731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4411">SUSE bug 657343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4411">SUSE bug 657731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4411">SUSE bug 663396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4411">SUSE bug 663396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4411">SUSE bug 669245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4411">SUSE bug 670476</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139023" comment="perl-5.18.2-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151455" comment="perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139024" comment="perl-32bit-5.18.2-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151456" comment="perl-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139025" comment="perl-base-5.18.2-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151457" comment="perl-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139026" comment="perl-doc-5.18.2-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151458" comment="perl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4494</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4494" source="CVE"/>
    <description>
    Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome before 8.0.552.215 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4494.html">CVE-2010-4494</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4494">SUSE bug 661471</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138972" comment="libxml2-2-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138973" comment="libxml2-2-32bit-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138974" comment="libxml2-devel-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138975" comment="libxml2-tools-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4531</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4531" source="CVE"/>
    <description>
    Stack-based buffer overflow in the ATRDecodeAtr function in the Answer-to-Reset (ATR) Handler (atrhandler.c) for pcscd in PCSC-Lite 1.5.3, and possibly other 1.5.x and 1.6.x versions, allows physically proximate attackers to cause a denial of service (crash) and possibly execute arbitrary code via a smart card with an ATR message containing a long attribute value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4531.html">CVE-2010-4531</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4531">SUSE bug 661000</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138740" comment="libpcsclite1-1.8.14-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151385" comment="libpcsclite1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138741" comment="pcsc-lite-1.8.14-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151386" comment="pcsc-lite is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4538</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4538" source="CVE"/>
    <description>
    Buffer overflow in the sect_enttec_dmx_da function in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4538.html">CVE-2010-4538</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4538">SUSE bug 662029</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4538">SUSE bug 662029</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4539</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4539" source="CVE"/>
    <description>
    The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4539.html">CVE-2010-4539</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4539">SUSE bug 662030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4539">SUSE bug 662030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4539">SUSE bug 662030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4539">SUSE bug 662030</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4540</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4540" source="CVE"/>
    <description>
    Stack-based buffer overflow in the load_preset_response function in plug-ins/lighting/lighting-ui.c in the "LIGHTING EFFECTS &gt; LIGHT" plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Position field in a plugin configuration file.  NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4540.html">CVE-2010-4540</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4540">SUSE bug 662043</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4540">SUSE bug 662043</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4540">SUSE bug 662043</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138314" comment="gimp-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138315" comment="gimp-help-browser-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151541" comment="gimp-help-browser is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138316" comment="gimp-lang-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138317" comment="gimp-plugin-aa-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138318" comment="gimp-plugins-python-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151544" comment="gimp-plugins-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138319" comment="libgimp-2_0-0-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151545" comment="libgimp-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138320" comment="libgimpui-2_0-0-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151546" comment="libgimpui-2_0-0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4541</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4541" source="CVE"/>
    <description>
    Stack-based buffer overflow in the loadit function in plug-ins/common/sphere-designer.c in the SPHERE DESIGNER plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long "Number of lights" field in a plugin configuration file.  NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4541.html">CVE-2010-4541</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4541">SUSE bug 662043</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4541">SUSE bug 662043</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4541">SUSE bug 662043</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138314" comment="gimp-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138315" comment="gimp-help-browser-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151541" comment="gimp-help-browser is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138316" comment="gimp-lang-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138317" comment="gimp-plugin-aa-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138318" comment="gimp-plugins-python-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151544" comment="gimp-plugins-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138319" comment="libgimp-2_0-0-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151545" comment="libgimp-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138320" comment="libgimpui-2_0-0-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151546" comment="libgimpui-2_0-0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4542</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4542" source="CVE"/>
    <description>
    Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file.  NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4542.html">CVE-2010-4542</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4542">SUSE bug 662043</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4542">SUSE bug 662043</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4542">SUSE bug 662043</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138314" comment="gimp-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138315" comment="gimp-help-browser-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151541" comment="gimp-help-browser is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138316" comment="gimp-lang-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138317" comment="gimp-plugin-aa-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138318" comment="gimp-plugins-python-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151544" comment="gimp-plugins-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138319" comment="libgimp-2_0-0-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151545" comment="libgimp-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138320" comment="libgimpui-2_0-0-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151546" comment="libgimpui-2_0-0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4543</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4543" source="CVE"/>
    <description>
    Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin in GIMP 2.6.11 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the end of the image.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4543.html">CVE-2010-4543</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4543">SUSE bug 662043</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4543">SUSE bug 662043</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4543">SUSE bug 662043</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4543">SUSE bug 662043</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4543">SUSE bug 692877</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138314" comment="gimp-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138315" comment="gimp-help-browser-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151541" comment="gimp-help-browser is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138316" comment="gimp-lang-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138317" comment="gimp-plugin-aa-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138318" comment="gimp-plugins-python-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151544" comment="gimp-plugins-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138319" comment="libgimp-2_0-0-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151545" comment="libgimp-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138320" comment="libgimpui-2_0-0-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151546" comment="libgimpui-2_0-0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4644</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4644" source="CVE"/>
    <description>
    Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15 allow remote authenticated users to cause a denial of service (memory consumption and daemon crash) via the -g option to the blame command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4644.html">CVE-2010-4644</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4644">SUSE bug 662030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4644">SUSE bug 662030</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4645</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4645" source="CVE"/>
    <description>
    strtod.c, as used in the zend_strtod function in PHP 5.2 before 5.2.17 and 5.3 before 5.3.5, and other products, allows context-dependent attackers to cause a denial of service (infinite loop) via a certain floating-point value in scientific notation, which is not properly handled in x87 FPU registers, as demonstrated using 2.2250738585072011e-308.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4645.html">CVE-2010-4645</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4645">SUSE bug 662932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4645">SUSE bug 662932</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4651</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4651" source="CVE"/>
    <description>
    Directory traversal vulnerability in util.c in GNU patch 2.6.1 and earlier allows user-assisted remote attackers to create or overwrite arbitrary files via a filename that is specified with a .. (dot dot) or full pathname, a related issue to CVE-2010-1679.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4651.html">CVE-2010-4651</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4651">SUSE bug 662957</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4651">SUSE bug 662957</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4651">SUSE bug 662957</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4651">SUSE bug 662957</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4651">SUSE bug 662957</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4651">SUSE bug 662957</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4651">SUSE bug 662957</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4651">SUSE bug 662957</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139022" comment="patch-2.7.5-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151547" comment="patch is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4665</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4665" source="CVE"/>
    <description>
    Integer overflow in the ReadDirectory function in tiffdump.c in tiffdump in LibTIFF before 3.9.5 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF file containing a directory data structure with many directory entries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4665.html">CVE-2010-4665</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4665">SUSE bug 687442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-4665">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4777</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-4777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4777" source="CVE"/>
    <description>
    The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent attackers to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-4777.html">CVE-2010-4777</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139023" comment="perl-5.18.2-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151455" comment="perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139024" comment="perl-32bit-5.18.2-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151456" comment="perl-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139025" comment="perl-base-5.18.2-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151457" comment="perl-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139026" comment="perl-doc-5.18.2-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151458" comment="perl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5298</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2010-5298" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298" source="CVE"/>
    <description>
    Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2010-5298.html">CVE-2010-5298</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-5298">SUSE bug 873351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-5298">SUSE bug 873351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-5298">SUSE bug 873351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-5298">SUSE bug 873351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-5298">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-5298">SUSE bug 883126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-5298">SUSE bug 915913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-5298">SUSE bug 873351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2010-5298">SUSE bug 873351</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0010</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0010" source="CVE"/>
    <description>
    check.c in sudo 1.7.x before 1.7.4p5, when a Runas group is configured, does not require a password for command execution that involves a gid change but no uid change, which allows local users to bypass an intended authentication requirement via the -g option to a sudo command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0010.html">CVE-2011-0010</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0010">SUSE bug 663881</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139098" comment="sudo-1.8.10p3-3.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0014</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0014" source="CVE"/>
    <description>
    ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0 through 1.0.0c allows remote attackers to cause a denial of service (crash), and possibly obtain sensitive information in applications that use OpenSSL, via a malformed ClientHello handshake message that triggers an out-of-bounds memory access, aka "OCSP stapling vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0014.html">CVE-2011-0014</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0014">SUSE bug 670526</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0020</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0020" source="CVE"/>
    <description>
    Heap-based buffer overflow in the pango_ft2_font_render_box_glyph function in pango/pangoft2-render.c in libpango in Pango 1.28.3 and earlier, when the FreeType2 backend is enabled, allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file, related to the glyph box for an FT_Bitmap object.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0020.html">CVE-2011-0020</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0020">SUSE bug 666101</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138734" comment="libpango-1_0-0-1.36.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151548" comment="libpango-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138735" comment="libpango-1_0-0-32bit-1.36.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151549" comment="libpango-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138736" comment="pango-devel-1.36.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151550" comment="pango-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138737" comment="pango-tools-1.36.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151551" comment="pango-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138738" comment="pango-tools-32bit-1.36.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151552" comment="pango-tools-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138739" comment="typelib-1_0-Pango-1_0-1.36.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151553" comment="typelib-1_0-Pango-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0024</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0024" source="CVE"/>
    <description>
    Heap-based buffer overflow in wiretap/pcapng.c in Wireshark before 1.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted capture file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0024.html">CVE-2011-0024</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0024">SUSE bug 683335</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0053</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0053" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0053.html">CVE-2011-0053</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0053">SUSE bug 667155</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0053">SUSE bug 679570</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0061</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0061" source="CVE"/>
    <description>
    Buffer overflow in Mozilla Firefox 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0061.html">CVE-2011-0061</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0061">SUSE bug 667155</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0061">SUSE bug 679570</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0062</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0062" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.6.x before 3.6.14 and Thunderbird 3.1.x before 3.1.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0062.html">CVE-2011-0062</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0062">SUSE bug 667155</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0062">SUSE bug 679570</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0064</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0064" source="CVE"/>
    <description>
    The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted OpenType font data that triggers use of an incorrect index.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0064.html">CVE-2011-0064</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0064">SUSE bug 672502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0064">SUSE bug 666101</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138734" comment="libpango-1_0-0-1.36.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151548" comment="libpango-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138735" comment="libpango-1_0-0-32bit-1.36.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151549" comment="libpango-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138736" comment="pango-devel-1.36.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151550" comment="pango-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138737" comment="pango-tools-1.36.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151551" comment="pango-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138738" comment="pango-tools-32bit-1.36.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151552" comment="pango-tools-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138739" comment="typelib-1_0-Pango-1_0-1.36.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151553" comment="typelib-1_0-Pango-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0068</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0068" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Not set</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0068.html">CVE-2011-0068</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0068">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0069</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0069" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19, 3.6.x before 3.6.17, and 4.x before 4.0.1; Thunderbird before 3.1.10; and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0070.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0069.html">CVE-2011-0069</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0069">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0070</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0070" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19, 3.6.x before 3.6.17, and 4.x before 4.0.1; Thunderbird before 3.1.10; and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0069.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0070.html">CVE-2011-0070</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0070">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0072</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0072" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0074, CVE-2011-0075, CVE-2011-0077, and CVE-2011-0078.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0072.html">CVE-2011-0072</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0072">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0074</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0074" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0075, CVE-2011-0077, and CVE-2011-0078.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0074.html">CVE-2011-0074</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0074">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0075</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0075" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0074, CVE-2011-0077, and CVE-2011-0078.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0075.html">CVE-2011-0075</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0075">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0077</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0077" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0074, CVE-2011-0075, and CVE-2011-0078.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0077.html">CVE-2011-0077</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0077">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0078</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0078" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0074, CVE-2011-0075, and CVE-2011-0077.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0078.html">CVE-2011-0078</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0078">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0079</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0079" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x before 4.0.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to gfx/layers/d3d10/ReadbackManagerD3D10.cpp and unknown other vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0079.html">CVE-2011-0079</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0079">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0080</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0080" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0080.html">CVE-2011-0080</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0080">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0081</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0081" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.17 and 4.x before 4.0.1, and Thunderbird 3.1.x before 3.1.10, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0081.html">CVE-2011-0081</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0081">SUSE bug 689281</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0083</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0083" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0083.html">CVE-2011-0083</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0083">SUSE bug 701296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0083">SUSE bug 704750</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0084</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0084" source="CVE"/>
    <description>
    The SVGTextElement.getCharNumAtPosition function in Mozilla Firefox before 3.6.20, and 4.x through 5; Thunderbird 3.x before 3.1.12 and other versions before 6; SeaMonkey 2.x before 2.3; and possibly other products does not properly handle SVG text, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to a "dangling pointer."
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0084.html">CVE-2011-0084</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0084">SUSE bug 712224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0084">SUSE bug 712224</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0085</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0085" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0085.html">CVE-2011-0085</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0085">SUSE bug 701995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0085">SUSE bug 701296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0085">SUSE bug 704750</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0192</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0192" source="CVE"/>
    <description>
    Buffer overflow in Fax4Decode in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF Internet Fax image file that has been compressed using CCITT Group 4 encoding, related to the EXPAND2D macro in libtiff/tif_fax3.h.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0192.html">CVE-2011-0192</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0192">SUSE bug 672510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0192">SUSE bug 682053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0192">SUSE bug 682871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0192">SUSE bug 682871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0192">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0226</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226" source="CVE"/>
    <description>
    Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0226.html">CVE-2011-0226</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0226">SUSE bug 704612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0226">SUSE bug 704612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0226">SUSE bug 704612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0226">SUSE bug 728044</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0281</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0281" source="CVE"/>
    <description>
    The unparse implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (file descriptor exhaustion and daemon hang) via a principal name that triggers use of a backslash escape sequence, as demonstrated by a \n sequence.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0281.html">CVE-2011-0281</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0281">SUSE bug 663619</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0281">SUSE bug 663619</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0282</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0282" source="CVE"/>
    <description>
    The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (NULL pointer dereference or buffer over-read, and daemon crash) via a crafted principal name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0282.html">CVE-2011-0282</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0282">SUSE bug 663619</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0282">SUSE bug 663619</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0284</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0284" source="CVE"/>
    <description>
    Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0284.html">CVE-2011-0284</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0284">SUSE bug 671717</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0285</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0285" source="CVE"/>
    <description>
    The process_chpw_request function in schpw.c in the password-changing functionality in kadmind in MIT Kerberos 5 (aka krb5) 1.7 through 1.9 frees an invalid pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted request that triggers an error condition.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0285.html">CVE-2011-0285</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0285">SUSE bug 687469</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0413</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0413" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0413" source="CVE"/>
    <description>
    The DHCPv6 server in ISC DHCP 4.0.x and 4.1.x before 4.1.2-P1, 4.0-ESV and 4.1-ESV before 4.1-ESV-R1, and 4.2.x before 4.2.1b1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) by sending a message over IPv6 for a declined and abandoned address.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0413.html">CVE-2011-0413</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0413">SUSE bug 667655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0413">SUSE bug 667655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0413">SUSE bug 680298</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138235" comment="dhcp-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151310" comment="dhcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138236" comment="dhcp-client-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151311" comment="dhcp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138237" comment="dhcp-doc-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151312" comment="dhcp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138238" comment="dhcp-relay-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151313" comment="dhcp-relay is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138239" comment="dhcp-server-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151314" comment="dhcp-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0414</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0414" source="CVE"/>
    <description>
    ISC BIND 9.7.1 through 9.7.2-P3, when configured as an authoritative server, allows remote attackers to cause a denial of service (deadlock and daemon hang) by sending a query at the time of (1) an IXFR transfer or (2) a DDNS update.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0414.html">CVE-2011-0414</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0414">SUSE bug 674431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0414">SUSE bug 674431</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0419</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0419" source="CVE"/>
    <description>
    Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0419.html">CVE-2011-0419</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0419">SUSE bug 693778</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0419">SUSE bug 693778</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0419">SUSE bug 693778</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0419">SUSE bug 693778</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0419">SUSE bug 693778</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0419">SUSE bug 700212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0419">SUSE bug 693778</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0419">SUSE bug 693778</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138543" comment="libapr1-1.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151326" comment="libapr1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138544" comment="libapr1-devel-1.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151327" comment="libapr1-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0420</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0420" source="CVE"/>
    <description>
    The grapheme_extract function in the Internationalization extension (Intl) for ICU for PHP 5.3.5 allows context-dependent attackers to cause a denial of service (crash) via an invalid size argument, which triggers a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0420.html">CVE-2011-0420</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0420">SUSE bug 672933</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0420">SUSE bug 672933</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0421</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0421" source="CVE"/>
    <description>
    The _zip_name_locate function in zip_name_locate.c in the Zip extension in PHP before 5.3.6 does not properly handle a ZIPARCHIVE::FL_UNCHANGED argument, which might allow context-dependent attackers to cause a denial of service (NULL pointer dereference) via an empty ZIP archive that is processed with a (1) locateName or (2) statName operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0421.html">CVE-2011-0421</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0421">SUSE bug 681193</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138977" comment="libzip-devel-0.11.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151554" comment="libzip-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138978" comment="libzip2-0.11.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151555" comment="libzip2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0460</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0460" source="CVE"/>
    <description>
    The init script in kbd, possibly 1.14.1 and earlier, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/defkeymap.map.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0460.html">CVE-2011-0460</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138414" comment="kbd-1.15.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151556" comment="kbd is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0461</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0461" source="CVE"/>
    <description>
    /etc/init.d/boot.localfs in the aaa_base package before 11.2-43.48.1 in SUSE openSUSE 11.2, and before 11.3-8.7.1 in openSUSE 11.3, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/mtab.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0461.html">CVE-2011-0461</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0461">SUSE bug 665479</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138058" comment="aaa_base-13.2+git20140911.61c1681-4.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151557" comment="aaa_base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138059" comment="aaa_base-extras-13.2+git20140911.61c1681-4.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151558" comment="aaa_base-extras is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0465</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0465" source="CVE"/>
    <description>
    xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a (1) DHCP or (2) XDMCP message.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0465.html">CVE-2011-0465</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0465">SUSE bug 674733</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0465">SUSE bug 674733</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0465">SUSE bug 674733</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0465">SUSE bug 674733</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0465">SUSE bug 674733</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0465">SUSE bug 688931</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139145" comment="xorg-x11-7.6_1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151559" comment="xorg-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139146" comment="xorg-x11-essentials-7.6_1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151560" comment="xorg-x11-essentials is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139147" comment="xrdb-1.1.0-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151561" comment="xrdb is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0523</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0523" source="CVE"/>
    <description>
    gypsy 0.8 does not properly restrict the files that can be read while running with root privileges, which allows local users to read otherwise restricted files via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0523.html">CVE-2011-0523</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0523">SUSE bug 666839</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138651" comment="libgypsy0-0.9-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151562" comment="libgypsy0 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0524</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0524" source="CVE"/>
    <description>
    Multiple buffer overflows in the NMEA parser (nmea-gen.c) in gypsy 0.8 allow local users to cause a denial of service (crash) via unspecified vectors related to the sprintf function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0524.html">CVE-2011-0524</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0524">SUSE bug 666839</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138651" comment="libgypsy0-0.9-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151562" comment="libgypsy0 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0538</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0538" source="CVE"/>
    <description>
    Wireshark 1.2.0 through 1.2.14, 1.4.0 through 1.4.3, and 1.5.0 frees an uninitialized pointer during processing of a .pcap file in the pcap-ng format, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0538.html">CVE-2011-0538</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0538">SUSE bug 669908</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0541</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0541" source="CVE"/>
    <description>
    fuse 2.8.5 and earlier does not properly handle when /etc/mtab cannot be updated, which allows local users to unmount arbitrary directories via a symlink attack.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0541.html">CVE-2011-0541</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0541">SUSE bug 668820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0541">SUSE bug 668820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0541">SUSE bug 685055</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138291" comment="fuse-2.9.3-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151346" comment="fuse is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138292" comment="libfuse2-2.9.3-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151347" comment="libfuse2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0707</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0707" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0707.html">CVE-2011-0707</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0707">SUSE bug 671745</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138983" comment="mailman-2.1.20-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151563" comment="mailman is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0708</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0708" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0708" source="CVE"/>
    <description>
    exif.c in the Exif extension in PHP before 5.3.6 on 64-bit platforms performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) via an image with a crafted Image File Directory (IFD) that triggers a buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0708.html">CVE-2011-0708</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0708">SUSE bug 671710</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0711</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0711" source="CVE"/>
    <description>
    The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0711.html">CVE-2011-0711</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0711">SUSE bug 672524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0711">SUSE bug 672505</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0712</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0712" source="CVE"/>
    <description>
    Multiple buffer overflows in the caiaq Native Instruments USB audio functionality in the Linux kernel before 2.6.38-rc4-next-20110215 might allow attackers to cause a denial of service or possibly have unspecified other impact via a long USB device name, related to (1) the snd_usb_caiaq_audio_init function in sound/usb/caiaq/audio.c and (2) the snd_usb_caiaq_midi_init function in sound/usb/caiaq/midi.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0712.html">CVE-2011-0712</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0712">SUSE bug 672499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0712">SUSE bug 672499</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0713</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0713" source="CVE"/>
    <description>
    Heap-based buffer overflow in wiretap/dct3trace.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long record in a Nokia DCT3 trace file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0713.html">CVE-2011-0713</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0713">SUSE bug 672916</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0715</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0715" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0715" source="CVE"/>
    <description>
    The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0715.html">CVE-2011-0715</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0715">SUSE bug 676949</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0719</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719" source="CVE"/>
    <description>
    Samba 3.x before 3.3.15, 3.4.x before 3.4.12, and 3.5.x before 3.5.7 does not perform range checks for file descriptors before use of the FD_SET macro, which allows remote attackers to cause a denial of service (stack memory corruption, and infinite loop or daemon crash) by opening a large number of files, related to (1) Winbind or (2) smbd.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0719.html">CVE-2011-0719</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0719">SUSE bug 670431</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0904</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0904" source="CVE"/>
    <description>
    The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0904.html">CVE-2011-0904</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0904">SUSE bug 690238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0904">SUSE bug 690238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0904">SUSE bug 691207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0904">SUSE bug 690238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0904">SUSE bug 691207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0904">SUSE bug 691356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0904">SUSE bug 690238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0904">SUSE bug 691207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0904">SUSE bug 690238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0904">SUSE bug 691207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0904">SUSE bug 691207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0904">SUSE bug 691207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0904">SUSE bug 690238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0904">SUSE bug 691207</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139120" comment="vino-3.16.0-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151564" comment="vino is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139121" comment="vino-lang-3.16.0-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151565" comment="vino-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0905</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0905" source="CVE"/>
    <description>
    The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0905.html">CVE-2011-0905</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0905">SUSE bug 690238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0905">SUSE bug 690238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0905">SUSE bug 691207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0905">SUSE bug 690238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0905">SUSE bug 691207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0905">SUSE bug 691356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0905">SUSE bug 690238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0905">SUSE bug 691207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0905">SUSE bug 690238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0905">SUSE bug 691207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0905">SUSE bug 691207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0905">SUSE bug 691207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0905">SUSE bug 690238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0905">SUSE bug 691207</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139120" comment="vino-3.16.0-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151564" comment="vino is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139121" comment="vino-lang-3.16.0-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151565" comment="vino-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0997</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-0997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997" source="CVE"/>
    <description>
    dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-0997.html">CVE-2011-0997</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0997">SUSE bug 675052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0997">SUSE bug 675052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0997">SUSE bug 689182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0997">SUSE bug 708527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-0997">SUSE bug 715172</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138235" comment="dhcp-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151310" comment="dhcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138236" comment="dhcp-client-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151311" comment="dhcp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138237" comment="dhcp-doc-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151312" comment="dhcp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138238" comment="dhcp-relay-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151313" comment="dhcp-relay is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138239" comment="dhcp-server-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151314" comment="dhcp-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1000</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1000" source="CVE"/>
    <description>
    jingle-factory.c in Telepathy Gabble 0.11 before 0.11.7, 0.10 before 0.10.5, and 0.8 before 0.8.15 allows remote attackers to sniff audio and video calls via a crafted google:jingleinfo stanza that specifies an alternate server for streamed media.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1000.html">CVE-2011-1000</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1000">SUSE bug 673257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1000">SUSE bug 673257</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139106" comment="telepathy-gabble-0.18.3-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151566" comment="telepathy-gabble is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1002</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1002" source="CVE"/>
    <description>
    avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1002.html">CVE-2011-1002</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1002">SUSE bug 671797</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138129" comment="avahi-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138130" comment="avahi-autoipd-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151209" comment="avahi-autoipd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138131" comment="avahi-compat-mDNSResponder-devel-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151210" comment="avahi-compat-mDNSResponder-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138132" comment="avahi-lang-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151211" comment="avahi-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138133" comment="libavahi-client3-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138134" comment="libavahi-client3-32bit-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151213" comment="libavahi-client3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138135" comment="libavahi-common3-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138136" comment="libavahi-common3-32bit-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151215" comment="libavahi-common3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138137" comment="libavahi-core7-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138138" comment="libavahi-devel-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151217" comment="libavahi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138139" comment="libdns_sd-0.6.31-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151218" comment="libdns_sd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1004</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1004" source="CVE"/>
    <description>
    The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1004.html">CVE-2011-1004</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1004">SUSE bug 673740</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139084" comment="ruby-2.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151366" comment="ruby is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139085" comment="ruby-devel-2.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151367" comment="ruby-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1005</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1005" source="CVE"/>
    <description>
    The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1005.html">CVE-2011-1005</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1005">SUSE bug 673750</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1005">SUSE bug 783511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1005">SUSE bug 783525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1005">SUSE bug 673750</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1005">SUSE bug 880899</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1005">SUSE bug 673750</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1005">SUSE bug 673750</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1005">SUSE bug 673750</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139084" comment="ruby-2.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151366" comment="ruby is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139085" comment="ruby-devel-2.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151367" comment="ruby-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1020</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1020" source="CVE"/>
    <description>
    The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1020.html">CVE-2011-1020</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1020">SUSE bug 674982</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1091</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1091" source="CVE"/>
    <description>
    libymsg.c in the Yahoo! protocol plugin in libpurple in Pidgin 2.6.0 through 2.7.10 allows (1) remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG notification packet, and allows (2) remote Yahoo! servers to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG SMS message.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1091.html">CVE-2011-1091</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1091">SUSE bug 736189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1091">SUSE bug 736189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1091">SUSE bug 736189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1091">SUSE bug 736189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1091">SUSE bug 736189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1091">SUSE bug 736189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1091">SUSE bug 736189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1091">SUSE bug 736189</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1092</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1092" source="CVE"/>
    <description>
    Integer overflow in ext/shmop/shmop.c in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (crash) and possibly read sensitive memory via a large third argument to the shmop_read function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1092.html">CVE-2011-1092</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1092">SUSE bug 677782</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1097</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1097" source="CVE"/>
    <description>
    rsync 3.x before 3.0.8, when certain recursion, deletion, and ownership options are used, allows remote rsync servers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via malformed data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1097.html">CVE-2011-1097</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1097">SUSE bug 684387</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139081" comment="rsync-3.1.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151567" comment="rsync is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1098</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1098" source="CVE"/>
    <description>
    Race condition in the createOutputFile function in logrotate.c in logrotate 3.7.9 and earlier allows local users to read log data by opening a file before the intended permissions are in place.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1098.html">CVE-2011-1098</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1098">SUSE bug 677336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1098">SUSE bug 677335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1098">SUSE bug 677335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1098">SUSE bug 1007000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1098">SUSE bug 677335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1098">SUSE bug 677335</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138981" comment="logrotate-3.8.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151568" comment="logrotate is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1138</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1138" source="CVE"/>
    <description>
    Off-by-one error in the dissect_6lowpan_iphc function in packet-6lowpan.c in Wireshark 1.4.0 through 1.4.3 on 32-bit platforms allows remote attackers to cause a denial of service (application crash) via a malformed 6LoWPAN IPv6 packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1138.html">CVE-2011-1138</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1138">SUSE bug 678567</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1139</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1139" source="CVE"/>
    <description>
    wiretap/pcapng.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) via a pcap-ng file that contains a large packet-length field.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1139.html">CVE-2011-1139</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1139">SUSE bug 678568</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1140</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1140" source="CVE"/>
    <description>
    Multiple stack consumption vulnerabilities in the dissect_ms_compressed_string and dissect_mscldap_string functions in Wireshark 1.0.x, 1.2.0 through 1.2.14, and 1.4.0 through 1.4.3 allow remote attackers to cause a denial of service (infinite recursion) via a crafted (1) SMB or (2) Connection-less LDAP (CLDAP) packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1140.html">CVE-2011-1140</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1140">SUSE bug 678569</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1143</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1143" source="CVE"/>
    <description>
    epan/dissectors/packet-ntlmssp.c in the NTLMSSP dissector in Wireshark before 1.4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted .pcap file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1143.html">CVE-2011-1143</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1143">SUSE bug 678571</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1145</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1145" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1145.html">CVE-2011-1145</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1145">SUSE bug 678796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1145">SUSE bug 764737</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139115" comment="unixODBC-2.3.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151569" comment="unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139116" comment="unixODBC-32bit-2.3.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151570" comment="unixODBC-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1146</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1146" source="CVE"/>
    <description>
    libvirt.c in the API in Red Hat libvirt 0.8.8 does not properly restrict operations in a read-only connection, which allows remote attackers to cause a denial of service (host OS crash) or possibly execute arbitrary code via a (1) virNodeDeviceDettach, (2) virNodeDeviceReset, (3) virDomainRevertToSnapshot, (4) virDomainSnapshotDelete, (5) virNodeDeviceReAttach, or (6) virConnectDomainXMLToNative call, a different vulnerability than CVE-2008-5086.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1146.html">CVE-2011-1146</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1146">SUSE bug 678406</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1153</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1153" source="CVE"/>
    <description>
    Multiple format string vulnerabilities in phar_object.c in the phar extension in PHP 5.3.5 and earlier allow context-dependent attackers to obtain sensitive information from process memory, cause a denial of service (memory corruption), or possibly execute arbitrary code via format string specifiers in an argument to a class method, leading to an incorrect zend_throw_exception_ex call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1153.html">CVE-2011-1153</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1153">SUSE bug 778941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1153">SUSE bug 992991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1154</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1154" source="CVE"/>
    <description>
    The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1154.html">CVE-2011-1154</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1154">SUSE bug 679661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1154">SUSE bug 677335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1154">SUSE bug 681984</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138981" comment="logrotate-3.8.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151568" comment="logrotate is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1155</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1155" source="CVE"/>
    <description>
    The writeState function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to cause a denial of service (rotation outage) via a (1) \n (newline) or (2) \ (backslash) character in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1155.html">CVE-2011-1155</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1155">SUSE bug 679662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1155">SUSE bug 677335</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138981" comment="logrotate-3.8.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151568" comment="logrotate is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1164</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1164" source="CVE"/>
    <description>
    Vino before 2.99.4 can connect external networks contrary to the statement in the vino-preferences dialog box, which might make it easier for remote attackers to perform attacks.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1164.html">CVE-2011-1164</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1164">SUSE bug 680072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1164">SUSE bug 680072</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139120" comment="vino-3.16.0-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151564" comment="vino is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139121" comment="vino-lang-3.16.0-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151565" comment="vino-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1167</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1167" source="CVE"/>
    <description>
    Heap-based buffer overflow in the thunder (aka ThunderScan) decoder in tif_thunder.c in LibTIFF 3.9.4 and earlier allows remote attackers to execute arbitrary code via crafted THUNDER_2BITDELTAS data in a .tiff file that has an unexpected BitsPerSample value.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1167.html">CVE-2011-1167</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1167">SUSE bug 683337</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1167">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1176</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1176" source="CVE"/>
    <description>
    The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk Multi-Processing Module 2.2.11-01 and 2.2.11-02 for the Apache HTTP Server does not properly handle certain configuration sections that specify NiceValue but not AssignUserID, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1176.html">CVE-2011-1176</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1176">SUSE bug 681176</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1180</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1180" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the iriap_getvaluebyclass_indication function in net/irda/iriap.c in the Linux kernel before 2.6.39 allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging connectivity to an IrDA infrared network and sending a large integer value for a (1) name length or (2) attribute length.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1180.html">CVE-2011-1180</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1180">SUSE bug 681497</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1187</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1187" source="CVE"/>
    <description>
    Google Chrome before 10.0.648.127 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, related to an "error message leak."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1187.html">CVE-2011-1187</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1187">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1202</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1202" source="CVE"/>
    <description>
    The xsltGenerateIdFunction function in functions.c in libxslt 1.1.26 and earlier, as used in Google Chrome before 10.0.648.127 and other products, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1202.html">CVE-2011-1202</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1202">SUSE bug 689281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1202">SUSE bug 692619</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1466</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1466" source="CVE"/>
    <description>
    Integer overflow in the SdnToJulian function in the Calendar extension in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (application crash) via a large integer in the first argument to the cal_from_jd function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1466.html">CVE-2011-1466</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 738221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 741520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 742273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 742806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 743308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 746661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 749111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1466">SUSE bug 736169</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1485</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1485" source="CVE"/>
    <description>
    Race condition in the pkexec utility and polkitd daemon in PolicyKit (aka polkit) 0.96 allows local users to gain privileges by executing a setuid program from pkexec, related to the use of the effective user ID instead of the real user ID.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1485.html">CVE-2011-1485</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1485">SUSE bug 688788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1485">SUSE bug 688788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1485">SUSE bug 688788</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138750" comment="libpolkit0-0.112-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151393" comment="libpolkit0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138751" comment="polkit-0.112-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151394" comment="polkit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138752" comment="polkit-devel-0.112-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151395" comment="polkit-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138753" comment="typelib-1_0-Polkit-1_0-0.112-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151396" comment="typelib-1_0-Polkit-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1521</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1521" source="CVE"/>
    <description>
    The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x before 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote attackers to obtain sensitive information or cause a denial of service (resource consumption) via a crafted URL, as demonstrated by the file:///etc/passwd and file:///dev/zero URLs.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1521.html">CVE-2011-1521</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1521">SUSE bug 682554</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1521">SUSE bug 682554</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138784" comment="libpython2_7-1_0-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138785" comment="libpython2_7-1_0-32bit-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138786" comment="python-base-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138787" comment="python-devel-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138788" comment="python-xml-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1523</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1523" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in statusmap.c in statusmap.cgi in Nagios 3.2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the layer parameter.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1523.html">CVE-2011-1523</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1523">SUSE bug 682966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1523">SUSE bug 697895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1523">SUSE bug 682966</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138990" comment="nagios-3.5.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151576" comment="nagios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138991" comment="nagios-www-3.5.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151577" comment="nagios-www is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1527</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1527" source="CVE"/>
    <description>
    The kdb_ldap plugin in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.1, when the LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a kinit operation with incorrect string case for the realm, related to the is_principal_in_realm, krb5_set_error_message, krb5_ldap_get_principal, and process_as_req functions.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1527.html">CVE-2011-1527</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1527">SUSE bug 719393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1527">SUSE bug 743742</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1528</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1528" source="CVE"/>
    <description>
    The krb5_ldap_lockout_audit function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the LDAP back end is used, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via unspecified vectors, related to the locked_check_p function.  NOTE: the Berkeley DB vector is covered by CVE-2011-4151.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1528.html">CVE-2011-1528</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1528">SUSE bug 719393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1528">SUSE bug 743742</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1529</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1529" source="CVE"/>
    <description>
    The lookup_lockout_policy function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the db2 (aka Berkeley DB) or LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger certain process_as_req errors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1529.html">CVE-2011-1529</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1529">SUSE bug 719393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1529">SUSE bug 743742</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1530</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1530" source="CVE"/>
    <description>
    The process_tgs_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS request that triggers an error other than the KRB5_KDB_NOENTRY error.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1530.html">CVE-2011-1530</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1530">SUSE bug 730393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1530">SUSE bug 730393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1577</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1577" source="CVE"/>
    <description>
    Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1577.html">CVE-2011-1577</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1577">SUSE bug 687113</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1577">SUSE bug 692784</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1577">SUSE bug 692784</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1581</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1581" source="CVE"/>
    <description>
    The bond_select_queue function in drivers/net/bonding/bond_main.c in the Linux kernel before 2.6.39, when a network device with a large number of receive queues is installed but the default tx_queues setting is used, does not properly restrict queue indexes, which allows remote attackers to cause a denial of service (BUG and system crash) or possibly have unspecified other impact by sending network traffic.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1581.html">CVE-2011-1581</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1581">SUSE bug 687116</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1581">SUSE bug 687116</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1588</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1588" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1588.html">CVE-2011-1588</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1588">SUSE bug 687874</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138889" comment="libthunarx-2-0-1.6.10-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151578" comment="libthunarx-2-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138890" comment="thunar-1.6.10-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151579" comment="thunar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138891" comment="thunar-lang-1.6.10-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151580" comment="thunar-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1590</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1590" source="CVE"/>
    <description>
    The X.509if dissector in Wireshark 1.2.x before 1.2.16 and 1.4.x before 1.4.5 does not properly initialize certain global variables, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1590.html">CVE-2011-1590</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1590">SUSE bug 688109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1590">SUSE bug 688109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1591</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1591" source="CVE"/>
    <description>
    Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1591.html">CVE-2011-1591</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1591">SUSE bug 688109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1591">SUSE bug 688109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1592</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1592" source="CVE"/>
    <description>
    The NFS dissector in epan/dissectors/packet-nfs.c in Wireshark 1.4.x before 1.4.5 on Windows uses an incorrect integer data type during decoding of SETCLIENTID calls, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1592.html">CVE-2011-1592</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1592">SUSE bug 688109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1592">SUSE bug 688109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1709</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1709" source="CVE"/>
    <description>
    GNOME Display Manager (gdm) before 2.32.2, when glib 2.28 is used, enables execution of a web browser with the uid of the gdm account, which allows local users to gain privileges via vectors involving the x-scheme-handler/http MIME type.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1709.html">CVE-2011-1709</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1709">SUSE bug 694858</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138309" comment="gdm-3.14.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151581" comment="gdm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138310" comment="gdm-lang-3.14.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151582" comment="gdm-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138311" comment="gdmflexiserver-3.14.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151583" comment="gdmflexiserver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138312" comment="libgdm1-3.14.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151584" comment="libgdm1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138313" comment="typelib-1_0-Gdm-1_0-3.14.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151585" comment="typelib-1_0-Gdm-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1752</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1752" source="CVE"/>
    <description>
    The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.17, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request for a baselined WebDAV resource, as exploited in the wild in May 2011.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1752.html">CVE-2011-1752</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1752">SUSE bug 698205</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1758</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1758" source="CVE"/>
    <description>
    The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp directory to obtain the pathname.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1758.html">CVE-2011-1758</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1758">SUSE bug 691135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1758">SUSE bug 691135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1758">SUSE bug 691135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1758">SUSE bug 691135</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138876" comment="libsss_idmap0-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151530" comment="libsss_idmap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138877" comment="sssd-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151531" comment="sssd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138878" comment="sssd-32bit-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151532" comment="sssd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138879" comment="sssd-krb5-common-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151533" comment="sssd-krb5-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138880" comment="sssd-ldap-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151534" comment="sssd-ldap is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1761</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1761" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1761.html">CVE-2011-1761</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1761">SUSE bug 691137</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1761">SUSE bug 710726</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138699" comment="libmodplug1-0.8.8.5-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151586" comment="libmodplug1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1783</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1783" source="CVE"/>
    <description>
    The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1783.html">CVE-2011-1783</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1783">SUSE bug 698205</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1898</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1898" source="CVE"/>
    <description>
    Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1898.html">CVE-2011-1898</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1898">SUSE bug 702025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1898">SUSE bug 724906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1898">SUSE bug 724906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1898">SUSE bug 702025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1898">SUSE bug 724906</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1907</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1907" source="CVE"/>
    <description>
    ISC BIND 9.8.x before 9.8.0-P1, when Response Policy Zones (RPZ) RRset replacement is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an RRSIG query.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1907.html">CVE-2011-1907</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1907">SUSE bug 692210</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1910</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1910" source="CVE"/>
    <description>
    Off-by-one error in named in ISC BIND 9.x before 9.7.3-P1, 9.8.x before 9.8.0-P2, 9.4-ESV before 9.4-ESV-R4-P1, and 9.6-ESV before 9.6-ESV-R4-P1 allows remote DNS servers to cause a denial of service (assertion failure and daemon exit) via a negative response containing large RRSIG RRsets.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1910.html">CVE-2011-1910</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1910">SUSE bug 696585</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1910">SUSE bug 696585</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1910">SUSE bug 698286</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1910">SUSE bug 698286</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1910">SUSE bug 698286</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1921</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1921" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1921" source="CVE"/>
    <description>
    The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is disabled, does not properly enforce permissions for files that had been publicly readable in the past, which allows remote attackers to obtain sensitive information via a replay REPORT operation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1921.html">CVE-2011-1921</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1921">SUSE bug 698205</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1921">SUSE bug 698205</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1928</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1928" source="CVE"/>
    <description>
    The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used.  NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1928.html">CVE-2011-1928</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1928">SUSE bug 693778</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1928">SUSE bug 693778</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1928">SUSE bug 693778</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1928">SUSE bug 693778</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138543" comment="libapr1-1.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151326" comment="libapr1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138544" comment="libapr1-devel-1.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151327" comment="libapr1-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1944</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1944" source="CVE"/>
    <description>
    Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1944.html">CVE-2011-1944</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1944">SUSE bug 697372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1944">SUSE bug 697372</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138972" comment="libxml2-2-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138973" comment="libxml2-2-32bit-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138974" comment="libxml2-devel-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138975" comment="libxml2-tools-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1946</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1946" source="CVE"/>
    <description>
    gnomesu-pam-backend in libgnomesu 1.0.0 prints an error message but proceeds with the non-error code path upon failure of the setgid or setuid function, which allows local users to gain privileges by leveraging access to two unprivileged user accounts, and running many processes under one of these accounts.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1946.html">CVE-2011-1946</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1946">SUSE bug 695627</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138634" comment="libgnomesu-2.0.0-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151593" comment="libgnomesu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138635" comment="libgnomesu-lang-2.0.0-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151594" comment="libgnomesu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138636" comment="libgnomesu0-2.0.0-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151595" comment="libgnomesu0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1947</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1947" source="CVE"/>
    <description>
    fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1947.html">CVE-2011-1947</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1947">SUSE bug 697368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1947">SUSE bug 697368</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138276" comment="fetchmail-6.3.26-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151334" comment="fetchmail is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1957</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1957" source="CVE"/>
    <description>
    The dissect_dcm_main function in epan/dissectors/packet-dcm.c in the DICOM dissector in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (infinite loop) via an invalid PDU length.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1957.html">CVE-2011-1957</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1957">SUSE bug 697516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1957">SUSE bug 697516</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1958</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1958" source="CVE"/>
    <description>
    Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Diameter dictionary file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1958.html">CVE-2011-1958</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1958">SUSE bug 697516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1958">SUSE bug 697516</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1959</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-1959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1959" source="CVE"/>
    <description>
    The snoop_read function in wiretap/snoop.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 does not properly handle certain virtualizable buffers, which allows remote attackers to cause a denial of service (application crash) via a large length value in a snoop file that triggers a stack-based buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-1959.html">CVE-2011-1959</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1959">SUSE bug 697516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-1959">SUSE bug 697516</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2054</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2054" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2054.html">CVE-2011-2054</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2054">SUSE bug 709167</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138863" comment="libsoup-2_4-1-2.50.0-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151596" comment="libsoup-2_4-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138864" comment="libsoup-devel-2.50.0-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151597" comment="libsoup-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138865" comment="libsoup-lang-2.50.0-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151598" comment="libsoup-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138866" comment="typelib-1_0-Soup-2_4-2.50.0-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151599" comment="typelib-1_0-Soup-2_4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2174</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2174" source="CVE"/>
    <description>
    Double free vulnerability in the tvb_uncompress function in epan/tvbuff.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a packet with malformed data that uses zlib compression.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2174.html">CVE-2011-2174</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2174">SUSE bug 697516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2174">SUSE bug 697516</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2175</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2175" source="CVE"/>
    <description>
    Integer underflow in the visual_read function in wiretap/visual.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a malformed Visual Networks file that triggers a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2175.html">CVE-2011-2175</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2175">SUSE bug 697516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2175">SUSE bug 697516</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2186</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2186" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2186.html">CVE-2011-2186</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2186">SUSE bug 698456</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138321" comment="git-2.6.2-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138322" comment="git-core-2.6.2-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138323" comment="git-cvs-2.6.2-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138324" comment="git-daemon-2.6.2-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138325" comment="git-email-2.6.2-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138326" comment="git-gui-2.6.2-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138327" comment="git-svn-2.6.2-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138328" comment="git-web-2.6.2-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138329" comment="gitk-2.6.2-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2199</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2199" source="CVE"/>
    <description>
    Buffer overflow in tftp-hpa before 5.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the utimeout option.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2199.html">CVE-2011-2199</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2199">SUSE bug 699714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2199">SUSE bug 699714</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139108" comment="tftp-5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151609" comment="tftp is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2202</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2202" source="CVE"/>
    <description>
    The rfc1867_post_handler function in main/rfc1867.c in PHP before 5.3.7 does not properly restrict filenames in multipart/form-data POST requests, which allows remote attackers to conduct absolute path traversal attacks, and possibly create or overwrite arbitrary files, via a crafted upload request, related to a "file path injection vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2202.html">CVE-2011-2202</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2202">SUSE bug 699711</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2203</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2203" source="CVE"/>
    <description>
    The hfs_find_init function in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and Oops) by mounting an HFS file system with a malformed MDB extent record.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2203.html">CVE-2011-2203</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2203">SUSE bug 699709</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2362</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2362" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2362.html">CVE-2011-2362</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2362">SUSE bug 701296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2362">SUSE bug 704750</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2363</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2363" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2363" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2363.html">CVE-2011-2363</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2363">SUSE bug 702020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2363">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2364</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2364" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2364.html">CVE-2011-2364</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2364">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2365</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2365" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2365.html">CVE-2011-2365</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2365">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2366</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2366" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2366" source="CVE"/>
    <description>
    Mozilla Gecko before 5.0, as used in Firefox before 5.0 and Thunderbird before 5.0, does not block use of a cross-domain image as a WebGL texture, which allows remote attackers to obtain approximate copies of arbitrary images via a timing attack involving a crafted WebGL fragment shader.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2366.html">CVE-2011-2366</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2366">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2367</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2367" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2367" source="CVE"/>
    <description>
    The WebGL implementation in Mozilla Firefox 4.x through 4.0.1 does not properly restrict read operations, which allows remote attackers to obtain sensitive information from GPU memory associated with an arbitrary process, or cause a denial of service (application crash), via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2367.html">CVE-2011-2367</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2367">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2368</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2368" source="CVE"/>
    <description>
    The WebGL implementation in Mozilla Firefox 4.x through 4.0.1 does not properly restrict write operations, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2368.html">CVE-2011-2368</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2368">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2369</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2369" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2369" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox 4.x through 4.0.1 allows remote attackers to inject arbitrary web script or HTML via an SVG element containing an HTML-encoded entity.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2369.html">CVE-2011-2369</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2369">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2370</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2370" source="CVE"/>
    <description>
    Mozilla Firefox before 5.0 does not properly enforce the whitelist for the xpinstall functionality, which allows remote attackers to trigger an installation dialog for a (1) add-on or (2) theme via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2370.html">CVE-2011-2370</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2370">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2371</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2371" source="CVE"/>
    <description>
    Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2371.html">CVE-2011-2371</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2371">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2372</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2372" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent the starting of a download in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2372.html">CVE-2011-2372</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2372">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2373</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2373" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2373.html">CVE-2011-2373</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2373">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2374</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2374" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2374.html">CVE-2011-2374</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2374">SUSE bug 701296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2374">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2375</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2375" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2375.html">CVE-2011-2375</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2375">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2376</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2376" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2376.html">CVE-2011-2376</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2376">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2377</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2377" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2377.html">CVE-2011-2377</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2377">SUSE bug 701296</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2464</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464" source="CVE"/>
    <description>
    Unspecified vulnerability in ISC BIND 9 9.6.x before 9.6-ESV-R4-P3, 9.7.x before 9.7.3-P3, and 9.8.x before 9.8.0-P4 allows remote attackers to cause a denial of service (named daemon crash) via a crafted UPDATE request.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2464.html">CVE-2011-2464</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2464">SUSE bug 703907</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2464">SUSE bug 703907</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2483</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2483" source="CVE"/>
    <description>
    crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain platforms, PostgreSQL before 8.4.9, and other products, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2483.html">CVE-2011-2483</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2483">SUSE bug 700876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2483">SUSE bug 700876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2483">SUSE bug 701491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2483">SUSE bug 713727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2483">SUSE bug 701491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2483">SUSE bug 738221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2483">SUSE bug 701489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2483">SUSE bug 749299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2483">SUSE bug 749301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2483">SUSE bug 749303</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139101" comment="sysvinit-tools-2.88+-97.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151610" comment="sysvinit-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139102" comment="whois-5.2.10-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151611" comment="whois is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139154" comment="yast2-core-3.1.18-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151612" comment="yast2-core is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139155" comment="yast2-core-devel-3.1.18-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151613" comment="yast2-core-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2485</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2485" source="CVE"/>
    <description>
    The gdk_pixbuf__gif_image_load function in gdk-pixbuf/io-gif.c in gdk-pixbuf before 2.23.5 does not properly handle certain return values, which allows remote attackers to cause a denial of service (memory consumption) via a crafted GIF image file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2485.html">CVE-2011-2485</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2485">SUSE bug 702028</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138298" comment="gdk-pixbuf-devel-2.31.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151614" comment="gdk-pixbuf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138299" comment="gdk-pixbuf-lang-2.31.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151615" comment="gdk-pixbuf-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138300" comment="gdk-pixbuf-query-loaders-2.31.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151616" comment="gdk-pixbuf-query-loaders is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138301" comment="gdk-pixbuf-query-loaders-32bit-2.31.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151617" comment="gdk-pixbuf-query-loaders-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138302" comment="libgdk_pixbuf-2_0-0-2.31.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151618" comment="libgdk_pixbuf-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138303" comment="libgdk_pixbuf-2_0-0-32bit-2.31.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151619" comment="libgdk_pixbuf-2_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138304" comment="typelib-1_0-GdkPixbuf-2_0-2.31.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151620" comment="typelib-1_0-GdkPixbuf-2_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2486</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2486" source="CVE"/>
    <description>
    nspluginwrapper before 1.4.4 does not properly provide access to NPNVprivateModeBool variable settings, which could prevent Firefox plugins from determining if they should run in Private Browsing mode and allow remote attackers to bypass intended access restrictions, as demonstrated using Flash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2486.html">CVE-2011-2486</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2486">SUSE bug 702034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2486">SUSE bug 702034</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138996" comment="nspluginwrapper-1.4.4-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151621" comment="nspluginwrapper is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2489</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2489" source="CVE"/>
    <description>
    Multiple off-by-one errors in opiesu.c in opiesu in OPIE 2.4.1-test1 and earlier might allow local users to gain privileges via a crafted command line.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2489.html">CVE-2011-2489</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2489">SUSE bug 698772</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139009" comment="opie-2.4-726.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151622" comment="opie is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139010" comment="opie-32bit-2.4-726.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151623" comment="opie-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2490</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2490" source="CVE"/>
    <description>
    opielogin.c in opielogin in OPIE 2.4.1-test1 and earlier does not check the return value of the setuid system call, which allows local users to gain privileges by arranging for an account to already be running its maximum number of processes.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2490.html">CVE-2011-2490</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2490">SUSE bug 698772</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139009" comment="opie-2.4-726.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151622" comment="opie is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139010" comment="opie-32bit-2.4-726.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151623" comment="opie-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2501</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2501" source="CVE"/>
    <description>
    The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data.  NOTE: this vulnerability exists because of a CVE-2004-0421 regression. NOTE: this is called an off-by-one error by some sources.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2501.html">CVE-2011-2501</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2501">SUSE bug 702578</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138743" comment="libpng12-0-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151411" comment="libpng12-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138744" comment="libpng12-0-32bit-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151412" comment="libpng12-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138745" comment="libpng12-devel-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151413" comment="libpng12-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138746" comment="libpng16-16-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138747" comment="libpng16-16-32bit-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151415" comment="libpng16-16-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138748" comment="libpng16-compat-devel-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138749" comment="libpng16-devel-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2511</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2511" source="CVE"/>
    <description>
    Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2511.html">CVE-2011-2511</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2511">SUSE bug 703084</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2513</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2513" source="CVE"/>
    <description>
    The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x before 1.9.9 and before 1.8.9, and IcedTea-Web 1.1.x before 1.1.1 and before 1.0.4, allows remote attackers to obtain the username and full path of the home and cache directories by accessing properties of the ClassLoader.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2513.html">CVE-2011-2513</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2513">SUSE bug 704309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2513">SUSE bug 704309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2513">SUSE bug 704309</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138403" comment="icedtea-web-javadoc-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151624" comment="icedtea-web-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138404" comment="java-1_8_0-openjdk-plugin-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151625" comment="java-1_8_0-openjdk-plugin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2514</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2514" source="CVE"/>
    <description>
    The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x before 1.9.9 and before 1.8.9, and IcedTea-Web 1.1.x before 1.1.1 and before 1.0.4, allows remote attackers to trick victims into granting access to local files by modifying the content of the Java Web Start Security Warning dialog box to represent a different filename than the file for which access will be granted.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2514.html">CVE-2011-2514</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2514">SUSE bug 704309</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138403" comment="icedtea-web-javadoc-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151624" comment="icedtea-web-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138404" comment="java-1_8_0-openjdk-plugin-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151625" comment="java-1_8_0-openjdk-plugin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2522</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522" source="CVE"/>
    <description>
    Multiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2522.html">CVE-2011-2522</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2522">SUSE bug 705241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2522">SUSE bug 705241</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2597</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2597" source="CVE"/>
    <description>
    The Lucent/Ascend file parser in Wireshark 1.2.x before 1.2.18, 1.4.x through 1.4.7, and 1.6.0 allows remote attackers to cause a denial of service (infinite loop) via malformed packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2597.html">CVE-2011-2597</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2597">SUSE bug 706728</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2690</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2690" source="CVE"/>
    <description>
    Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2690.html">CVE-2011-2690</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2690">SUSE bug 706387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2690">SUSE bug 706388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2690">SUSE bug 854395</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138746" comment="libpng16-16-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138747" comment="libpng16-16-32bit-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151415" comment="libpng16-16-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138748" comment="libpng16-compat-devel-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138749" comment="libpng16-devel-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2691</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2691" source="CVE"/>
    <description>
    The png_err function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 makes a function call using a NULL pointer argument instead of an empty-string argument, which allows remote attackers to cause a denial of service (application crash) via a crafted PNG image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2691.html">CVE-2011-2691</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2691">SUSE bug 706388</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138746" comment="libpng16-16-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138747" comment="libpng16-16-32bit-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151415" comment="libpng16-16-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138748" comment="libpng16-compat-devel-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138749" comment="libpng16-devel-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2692</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2692" source="CVE"/>
    <description>
    The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2692.html">CVE-2011-2692</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2692">SUSE bug 706389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2692">SUSE bug 854395</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138746" comment="libpng16-16-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138747" comment="libpng16-16-32bit-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151415" comment="libpng16-16-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138748" comment="libpng16-compat-devel-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138749" comment="libpng16-devel-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2694</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the chg_passwd function in web/swat.c in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allows remote authenticated administrators to inject arbitrary web script or HTML via the username parameter to the passwd program (aka the user field to the Change Password page).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2694.html">CVE-2011-2694</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2696</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2696" source="CVE"/>
    <description>
    Integer overflow in libsndfile before 1.0.25 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PARIS Audio Format (PAF) file that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2696.html">CVE-2011-2696</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2696">SUSE bug 705681</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138854" comment="libsndfile-devel-1.0.25-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151189" comment="libsndfile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138855" comment="libsndfile1-1.0.25-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151190" comment="libsndfile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138856" comment="libsndfile1-32bit-1.0.25-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151191" comment="libsndfile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2697</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2697" source="CVE"/>
    <description>
    foomatic-rip-hplip in HP Linux Imaging and Printing (HPLIP) 3.11.5 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2697.html">CVE-2011-2697</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2697">SUSE bug 698451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2697">SUSE bug 698451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2697">SUSE bug 698451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2697">SUSE bug 59233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2697">SUSE bug 698451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2697">SUSE bug 59233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2697">SUSE bug 698451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2697">SUSE bug 59233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2697">SUSE bug 698451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2697">SUSE bug 59233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2697">SUSE bug 698451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2697">SUSE bug 59233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2697">SUSE bug 698451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2697">SUSE bug 704608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2697">SUSE bug 59233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2697">SUSE bug 698451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2697">SUSE bug 704608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2697">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2697">SUSE bug 957531</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138396" comment="hplip-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151009" comment="hplip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138397" comment="hplip-hpijs-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151010" comment="hplip-hpijs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138398" comment="hplip-sane-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151011" comment="hplip-sane is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2698</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2698" source="CVE"/>
    <description>
    Off-by-one error in the elem_cell_id_aux function in epan/dissectors/packet-ansi_a.c in the ANSI MAP dissector in Wireshark 1.4.x before 1.4.8 and 1.6.x before 1.6.1 allows remote attackers to cause a denial of service (infinite loop) via an invalid packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2698.html">CVE-2011-2698</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2698">SUSE bug 706728</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2709</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2709" source="CVE"/>
    <description>
    libgssapi and libgssglue before 0.4 do not properly check privileges, which allows local users to load untrusted configuration files and execute arbitrary code via the GSSAPI_MECH_CONF environment variable, as demonstrated using mount.nfs.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2709.html">CVE-2011-2709</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2709">SUSE bug 694598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2709">SUSE bug 694598</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138637" comment="libgssglue-devel-0.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151626" comment="libgssglue-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138638" comment="libgssglue1-0.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151627" comment="libgssglue1 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2721</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2721" source="CVE"/>
    <description>
    Off-by-one error in the cli_hm_scan function in matcher-hash.c in libclamav in ClamAV before 0.97.2 allows remote attackers to cause a denial of service (daemon crash) via an e-mail message that is not properly handled during certain hash calculations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2721.html">CVE-2011-2721</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2721">SUSE bug 708263</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138164" comment="clamav-0.98.7-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2722</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2722" source="CVE"/>
    <description>
    The send_data_to_stdout function in prnt/hpijs/hpcupsfax.cpp in HP Linux Imaging and Printing (HPLIP) 3.x before 3.11.10 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/hpcupsfax.out temporary file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2722.html">CVE-2011-2722</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2722">SUSE bug 704608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2722">SUSE bug 713717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2722">SUSE bug 59233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2722">SUSE bug 698451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2722">SUSE bug 704608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2722">SUSE bug 59233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2722">SUSE bug 698451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2722">SUSE bug 704608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2722">SUSE bug 808355</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138396" comment="hplip-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151009" comment="hplip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138397" comment="hplip-hpijs-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151010" comment="hplip-hpijs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138398" comment="hplip-sane-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151011" comment="hplip-sane is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2729</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729" source="CVE"/>
    <description>
    native/unix/native/jsvc-unix.c in jsvc in the Daemon component 1.0.3 through 1.0.6 in Apache Commons, as used in Apache Tomcat 5.5.32 through 5.5.33, 6.0.30 through 6.0.32, and 7.0.x before 7.0.20 on Linux, does not drop capabilities, which allows remote attackers to bypass read permissions for files via a request to an application.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2729.html">CVE-2011-2729</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2729">SUSE bug 715656</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138075" comment="apache-commons-daemon-1.0.15-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151628" comment="apache-commons-daemon is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2748</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2748" source="CVE"/>
    <description>
    The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2748.html">CVE-2011-2748</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2748">SUSE bug 712653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2748">SUSE bug 712653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2748">SUSE bug 712653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2748">SUSE bug 712653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2748">SUSE bug 712653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2748">SUSE bug 712653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2748">SUSE bug 712653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2748">SUSE bug 712653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2748">SUSE bug 712653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2748">SUSE bug 712653</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138235" comment="dhcp-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151310" comment="dhcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138236" comment="dhcp-client-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151311" comment="dhcp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138237" comment="dhcp-doc-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151312" comment="dhcp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138238" comment="dhcp-relay-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151313" comment="dhcp-relay is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138239" comment="dhcp-server-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151314" comment="dhcp-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2749</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2749" source="CVE"/>
    <description>
    The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2749.html">CVE-2011-2749</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2749">SUSE bug 712653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2749">SUSE bug 712653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2749">SUSE bug 712653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2749">SUSE bug 712653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2749">SUSE bug 712653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2749">SUSE bug 712653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2749">SUSE bug 712653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2749">SUSE bug 712653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2749">SUSE bug 712653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2749">SUSE bug 712653</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138235" comment="dhcp-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151310" comment="dhcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138236" comment="dhcp-client-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151311" comment="dhcp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138237" comment="dhcp-doc-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151312" comment="dhcp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138238" comment="dhcp-relay-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151313" comment="dhcp-relay is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138239" comment="dhcp-server-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151314" comment="dhcp-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2766</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2766" source="CVE"/>
    <description>
    The FCGI (aka Fast CGI) module 0.70 through 0.73 for Perl, as used by CGI::Fast, uses environment variable values from one request during processing of a later request, which allows remote attackers to bypass authentication via crafted HTTP headers.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2766.html">CVE-2011-2766</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2766">SUSE bug 735882</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138029" comment="FastCGI-2.4.0-170.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151629" comment="FastCGI is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138030" comment="perl-FastCGI-2.4.0-170.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151630" comment="perl-FastCGI is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2895</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2895" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2895" source="CVE"/>
    <description>
    The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2895.html">CVE-2011-2895</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2895">SUSE bug 709851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2895">SUSE bug 711487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2895">SUSE bug 711487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2895">SUSE bug 709851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2895">SUSE bug 709851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2895">SUSE bug 711487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2895">SUSE bug 711487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2895">SUSE bug 711487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2895">SUSE bug 711487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2895">SUSE bug 711487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2895">SUSE bug 711487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2895">SUSE bug 711487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2895">SUSE bug 711487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2895">SUSE bug 711487</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138510" comment="libXfont-devel-1.5.1-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151631" comment="libXfont-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138511" comment="libXfont1-1.5.1-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151632" comment="libXfont1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139148" comment="xorg-x11-devel-7.6-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151633" comment="xorg-x11-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2896</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896" source="CVE"/>
    <description>
    The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2896.html">CVE-2011-2896</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2896">SUSE bug 711490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2896">SUSE bug 601830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2896">SUSE bug 680210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2896">SUSE bug 680212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2896">SUSE bug 700987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2896">SUSE bug 711490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2896">SUSE bug 715643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2896">SUSE bug 601830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2896">SUSE bug 671735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2896">SUSE bug 680210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2896">SUSE bug 711490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2896">SUSE bug 711491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2896">SUSE bug 715643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2896">SUSE bug 711490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2896">SUSE bug 711490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2896">SUSE bug 711490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2896">SUSE bug 711490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2896">SUSE bug 711491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2896">SUSE bug 711490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2896">SUSE bug 711491</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138314" comment="gimp-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138315" comment="gimp-help-browser-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151541" comment="gimp-help-browser is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138316" comment="gimp-lang-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138317" comment="gimp-plugin-aa-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138318" comment="gimp-plugins-python-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151544" comment="gimp-plugins-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138319" comment="libgimp-2_0-0-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151545" comment="libgimp-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138320" comment="libgimpui-2_0-0-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151546" comment="libgimpui-2_0-0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2985</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2985" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2985.html">CVE-2011-2985</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2985">SUSE bug 712224</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2986</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2986" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products, when the Direct2D (aka D2D) API is used on Windows, allows remote attackers to bypass the Same Origin Policy, and obtain sensitive image data from a different domain, by inserting this data into a canvas.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2986.html">CVE-2011-2986</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2986">SUSE bug 712224</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2987</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2987" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2987" source="CVE"/>
    <description>
    Heap-based buffer overflow in Almost Native Graphics Layer Engine (ANGLE), as used in the WebGL implementation in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products might allow remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2987.html">CVE-2011-2987</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2987">SUSE bug 712224</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2988</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2988" source="CVE"/>
    <description>
    Buffer overflow in an unspecified string class in the WebGL shader implementation in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a long source-code block for a shader.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2988.html">CVE-2011-2988</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2988">SUSE bug 712224</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2989</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2989" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, Thunderbird before 6, and possibly other products does not properly implement WebGL, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2989.html">CVE-2011-2989</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2989">SUSE bug 712224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2989">SUSE bug 712224</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2990</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2990" source="CVE"/>
    <description>
    The implementation of Content Security Policy (CSP) violation reports in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, and possibly other products does not remove proxy-authorization credentials from the listed request headers, which allows attackers to obtain sensitive information by reading a report, related to incorrect host resolution that occurs with certain redirects.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2990.html">CVE-2011-2990</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2990">SUSE bug 712224</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2991</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2991" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, Thunderbird before 6, and possibly other products does not properly implement JavaScript, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2991.html">CVE-2011-2991</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2991">SUSE bug 712224</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2992</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2992" source="CVE"/>
    <description>
    The Ogg reader in the browser engine in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, Thunderbird before 6, and possibly other products allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2992.html">CVE-2011-2992</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2992">SUSE bug 712224</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2993</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2993" source="CVE"/>
    <description>
    The implementation of digital signatures for JAR files in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, and possibly other products does not prevent calls from unsigned JavaScript code to signed code, which allows remote attackers to bypass the Same Origin Policy and gain privileges via a crafted web site, a different vulnerability than CVE-2008-2801.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2993.html">CVE-2011-2993</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2993">SUSE bug 712224</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2995</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2995" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2995.html">CVE-2011-2995</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2995">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2996</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2996" source="CVE"/>
    <description>
    Unspecified vulnerability in the plugin API in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2996.html">CVE-2011-2996</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2996">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2997</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-2997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2997" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-2997.html">CVE-2011-2997</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-2997">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3000</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3000" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not properly handle HTTP responses that contain multiple Location, Content-Length, or Content-Disposition headers, which makes it easier for remote attackers to conduct HTTP response splitting attacks via crafted header values.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3000.html">CVE-2011-3000</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3000">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3001</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3001" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent manual add-on installation in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that triggers an unspecified internal error.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3001.html">CVE-2011-3001</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3001">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3002</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3002" source="CVE"/>
    <description>
    Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox before 7.0 and SeaMonkey before 2.4, does not validate the return value of a GrowAtomTable function call, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger a memory-allocation error and a resulting buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3002.html">CVE-2011-3002</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3002">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3003</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3003" source="CVE"/>
    <description>
    Mozilla Firefox before 7.0 and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unspecified WebGL test case that triggers a memory-allocation error and a resulting out-of-bounds write operation.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3003.html">CVE-2011-3003</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3003">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3004</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3004" source="CVE"/>
    <description>
    The JSSubScriptLoader in Mozilla Firefox 4.x through 6 and SeaMonkey before 2.4 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3004.html">CVE-2011-3004</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3004">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3005</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3005" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OGG headers in a .ogg file.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3005.html">CVE-2011-3005</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3005">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3026</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3026" source="CVE"/>
    <description>
    Integer overflow in libpng, as used in Google Chrome before 17.0.963.56, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an integer truncation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3026.html">CVE-2011-3026</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3026">SUSE bug 747311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3026">SUSE bug 747328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3026">SUSE bug 747311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3026">SUSE bug 747311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3026">SUSE bug 747311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3026">SUSE bug 747311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3026">SUSE bug 747327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3026">SUSE bug 773612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3026">SUSE bug 747311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3026">SUSE bug 747311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3026">SUSE bug 747311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3026">SUSE bug 747311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3026">SUSE bug 747311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3026">SUSE bug 854395</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138743" comment="libpng12-0-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151411" comment="libpng12-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138744" comment="libpng12-0-32bit-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151412" comment="libpng12-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138745" comment="libpng12-devel-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151413" comment="libpng12-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3045</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3045" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3045" source="CVE"/>
    <description>
    Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01, as used in Google Chrome before 17.0.963.83 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file, a different vulnerability than CVE-2011-3026.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3045.html">CVE-2011-3045</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3045">SUSE bug 752008</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3045">SUSE bug 752008</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3045">SUSE bug 752008</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3045">SUSE bug 752008</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3045">SUSE bug 754456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3045">SUSE bug 752008</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3045">SUSE bug 752008</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3045">SUSE bug 754456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3045">SUSE bug 752008</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138743" comment="libpng12-0-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151411" comment="libpng12-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138744" comment="libpng12-0-32bit-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151412" comment="libpng12-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138745" comment="libpng12-devel-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151413" comment="libpng12-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3048</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3048" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3048" source="CVE"/>
    <description>
    The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3048.html">CVE-2011-3048</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3048">SUSE bug 754745</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3048">SUSE bug 754745</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3048">SUSE bug 754745</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3048">SUSE bug 754745</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3048">SUSE bug 854395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3048">SUSE bug 754745</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138743" comment="libpng12-0-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151411" comment="libpng12-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138744" comment="libpng12-0-32bit-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151412" comment="libpng12-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138745" comment="libpng12-devel-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151413" comment="libpng12-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3062</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3062" source="CVE"/>
    <description>
    Off-by-one error in the OpenType Sanitizer in Google Chrome before 18.0.1025.142 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted OpenType file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3062.html">CVE-2011-3062</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3062">SUSE bug 754458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3062">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3079</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079" source="CVE"/>
    <description>
    The Inter-process Communication (IPC) implementation in Google Chrome before 18.0.1025.168, as used in Mozilla Firefox before 38.0 and other products, does not properly validate messages, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3079.html">CVE-2011-3079</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3079">SUSE bug 760264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3079">SUSE bug 930622</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3101</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3101" source="CVE"/>
    <description>
    Google Chrome before 19.0.1084.46 on Linux does not properly mitigate an unspecified flaw in an NVIDIA driver, which has unknown impact and attack vectors.  NOTE: see CVE-2012-3105 for the related MFSA 2012-34 issue in Mozilla products.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3101.html">CVE-2011-3101</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3101">SUSE bug 762481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3101">SUSE bug 765204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3146</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3146" source="CVE"/>
    <description>
    librsvg before 2.34.1 uses the node name to identify the type of node, which allows context-dependent attackers to cause a denial of service (NULL pointer dereference) and possibly execute arbitrary code via a SVG file with a node with the element name starting with "fe," which is misidentified as a RsvgFilterPrimitive.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3146.html">CVE-2011-3146</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3146">SUSE bug 714980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3146">SUSE bug 714980</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138305" comment="gdk-pixbuf-loader-rsvg-2.40.10-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151634" comment="gdk-pixbuf-loader-rsvg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138306" comment="librsvg-2-2-2.40.10-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151635" comment="librsvg-2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138307" comment="librsvg-devel-2.40.10-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151636" comment="librsvg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138308" comment="typelib-1_0-Rsvg-2_0-2.40.10-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151637" comment="typelib-1_0-Rsvg-2_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3148</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3148" source="CVE"/>
    <description>
    Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3148.html">CVE-2011-3148</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3148">SUSE bug 724480</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139013" comment="pam-1.1.8-12.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151504" comment="pam is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139014" comment="pam-32bit-1.1.8-12.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151505" comment="pam-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139015" comment="pam-devel-1.1.8-12.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151506" comment="pam-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3149</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3149" source="CVE"/>
    <description>
    The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3149.html">CVE-2011-3149</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3149">SUSE bug 724480</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139013" comment="pam-1.1.8-12.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151504" comment="pam is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139014" comment="pam-32bit-1.1.8-12.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151505" comment="pam-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139015" comment="pam-devel-1.1.8-12.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151506" comment="pam-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3153</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3153" source="CVE"/>
    <description>
    dmrc.c in Light Display Manager (aka LightDM) before 1.1.1 allows local users to read arbitrary files via a symlink attack on ~/.dmrc.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3153.html">CVE-2011-3153</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3153">SUSE bug 728627</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138685" comment="liblightdm-gobject-1-0-1.15.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151638" comment="liblightdm-gobject-1-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138686" comment="lightdm-1.15.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151639" comment="lightdm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138687" comment="lightdm-lang-1.15.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151640" comment="lightdm-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3172</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3172" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3172.html">CVE-2011-3172</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3172">SUSE bug 707645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3172">SUSE bug 707645</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139016" comment="pam-modules-12.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151641" comment="pam-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139017" comment="pam-modules-32bit-12.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151642" comment="pam-modules-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3177</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3177" source="CVE"/>
    <description>
    The YaST2 network created files with world readable permissions which could have allowed local users to read sensitive material out of network configuration files, like passwords for wireless networks.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3177.html">CVE-2011-3177</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3177">SUSE bug 713661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3177">SUSE bug 713661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3177">SUSE bug 713661</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139152" comment="yast2-3.1.155-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151643" comment="yast2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139154" comment="yast2-core-3.1.18-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151612" comment="yast2-core is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139155" comment="yast2-core-devel-3.1.18-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151613" comment="yast2-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139153" comment="yast2-devel-doc-3.1.155-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151644" comment="yast2-devel-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3192</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192" source="CVE"/>
    <description>
    The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3192.html">CVE-2011-3192</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 714306</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 714306</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 716634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 716634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 718106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 716634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 718106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 722545</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 726139</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 716634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 716634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 716634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 732051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 732051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 732051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 732051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 732051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 732051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 732051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 732051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 716634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 718106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 726139</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 732051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 732051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 718106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 726139</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 732051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 713966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3192">SUSE bug 983778</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3193</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3193" source="CVE"/>
    <description>
    Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3193.html">CVE-2011-3193</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3193">SUSE bug 714984</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138791" comment="libqt4-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151228" comment="libqt4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138792" comment="libqt4-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151229" comment="libqt4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138793" comment="libqt4-devel-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151230" comment="libqt4-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138794" comment="libqt4-linguist-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151231" comment="libqt4-linguist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138795" comment="libqt4-qt3support-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151232" comment="libqt4-qt3support is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138796" comment="libqt4-qt3support-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151233" comment="libqt4-qt3support-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138797" comment="libqt4-sql-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151234" comment="libqt4-sql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138798" comment="libqt4-sql-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151235" comment="libqt4-sql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138799" comment="libqt4-sql-mysql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151236" comment="libqt4-sql-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138800" comment="libqt4-sql-mysql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151237" comment="libqt4-sql-mysql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138801" comment="libqt4-sql-postgresql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151238" comment="libqt4-sql-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138802" comment="libqt4-sql-postgresql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151239" comment="libqt4-sql-postgresql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138803" comment="libqt4-sql-sqlite-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151240" comment="libqt4-sql-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138804" comment="libqt4-sql-sqlite-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151241" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138805" comment="libqt4-sql-unixODBC-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151242" comment="libqt4-sql-unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138806" comment="libqt4-sql-unixODBC-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151243" comment="libqt4-sql-unixODBC-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138807" comment="libqt4-x11-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151244" comment="libqt4-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138808" comment="libqt4-x11-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151245" comment="libqt4-x11-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3200</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3200" source="CVE"/>
    <description>
    Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3200.html">CVE-2011-3200</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3200">SUSE bug 714658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3200">SUSE bug 714658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3200">SUSE bug 714658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3200">SUSE bug 714658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3200">SUSE bug 714658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3200">SUSE bug 714658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3200">SUSE bug 714658</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139082" comment="rsyslog-8.4.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151645" comment="rsyslog is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3207</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3207" source="CVE"/>
    <description>
    crypto/x509/x509_vfy.c in OpenSSL 1.0.x before 1.0.0e does not initialize certain structure members, which makes it easier for remote attackers to bypass CRL validation by using a nextUpdate value corresponding to a time in the past.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3207.html">CVE-2011-3207</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3207">SUSE bug 716143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3207">SUSE bug 716143</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3210</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3210" source="CVE"/>
    <description>
    The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 through 0.9.8r and 1.0.x before 1.0.0e does not ensure thread safety during processing of handshake messages from clients, which allows remote attackers to cause a denial of service (daemon crash) via out-of-order messages that violate the TLS protocol.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3210.html">CVE-2011-3210</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3210">SUSE bug 716144</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3232</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3232" source="CVE"/>
    <description>
    YARR, as used in Mozilla Firefox before 7.0, Thunderbird before 7.0, and SeaMonkey before 2.4, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3232.html">CVE-2011-3232</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3232">SUSE bug 720264</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3256</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3256" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256" source="CVE"/>
    <description>
    FreeType 2 before 2.4.7, as used in CoreGraphics in Apple iOS before 5, Mandriva Enterprise Server 5, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font, a different vulnerability than CVE-2011-0226.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3256.html">CVE-2011-3256</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3256">SUSE bug 728044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3256">SUSE bug 730124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3256">SUSE bug 748083</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3266</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3266" source="CVE"/>
    <description>
    The proto_tree_add_item function in Wireshark 1.6.0 through 1.6.1 and 1.4.0 through 1.4.8, when the IKEv1 protocol dissector is used, allows user-assisted remote attackers to cause a denial of service (infinite loop) via vectors involving a malformed IKE packet and many items in a tree.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3266.html">CVE-2011-3266</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3266">SUSE bug 718032</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3328</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3328" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3328" source="CVE"/>
    <description>
    The png_handle_cHRM function in pngrutil.c in libpng 1.5.4, when color-correction support is enabled, allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a malformed PNG image containing a cHRM chunk associated with a certain zero value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3328.html">CVE-2011-3328</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3328">SUSE bug 720017</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138746" comment="libpng16-16-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138747" comment="libpng16-16-32bit-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151415" comment="libpng16-16-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138748" comment="libpng16-compat-devel-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138749" comment="libpng16-devel-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3349</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3349" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Not set</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3349.html">CVE-2011-3349</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3349">SUSE bug 708205</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3349">SUSE bug 708205</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138685" comment="liblightdm-gobject-1-0-1.15.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151638" comment="liblightdm-gobject-1-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138686" comment="lightdm-1.15.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151639" comment="lightdm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138687" comment="lightdm-lang-1.15.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151640" comment="lightdm-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3360</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3360" source="CVE"/>
    <description>
    Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9 and 1.6.x before 1.6.2 allows local users to gain privileges via a Trojan horse Lua script in an unspecified directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3360.html">CVE-2011-3360</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3360">SUSE bug 718032</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3368</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368" source="CVE"/>
    <description>
    The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3368.html">CVE-2011-3368</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3368">SUSE bug 722545</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3368">SUSE bug 722545</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3368">SUSE bug 728876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3368">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3368">SUSE bug 791794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3368">SUSE bug 722545</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3372</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3372" source="CVE"/>
    <description>
    imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3372.html">CVE-2011-3372</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3372">SUSE bug 719998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3372">SUSE bug 719998</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138215" comment="cyradm-2.4.18-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151342" comment="cyradm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138216" comment="cyrus-imapd-2.4.18-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151343" comment="cyrus-imapd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138217" comment="perl-Cyrus-IMAP-2.4.18-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151344" comment="perl-Cyrus-IMAP is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138218" comment="perl-Cyrus-SIEVE-managesieve-2.4.18-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151345" comment="perl-Cyrus-SIEVE-managesieve is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3377</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3377" source="CVE"/>
    <description>
    The web browser plug-in in IcedTea-Web 1.0.x before 1.0.6 and 1.1.x before 1.1.4 allows remote attackers to bypass the Same Origin Policy (SOP) and execute arbitrary script or establish network connections to unintended hosts via an applet whose origin has the same second-level domain, but a different sub-domain than the targeted domain.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3377.html">CVE-2011-3377</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3377">SUSE bug 729870</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138403" comment="icedtea-web-javadoc-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151624" comment="icedtea-web-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138404" comment="java-1_8_0-openjdk-plugin-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151625" comment="java-1_8_0-openjdk-plugin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3379</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3379" source="CVE"/>
    <description>
    The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3379.html">CVE-2011-3379</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3379">SUSE bug 728350</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3379">SUSE bug 728350</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3379">SUSE bug 728350</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3389</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389" source="CVE"/>
    <description>
    The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3389.html">CVE-2011-3389</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 716002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 719047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 725167</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 726096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 726096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 739248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 739256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 742306</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 751718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 759666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 759666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 759666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 759666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 759666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 759666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 759666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 759666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 759666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 759666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 759666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 719047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3389">SUSE bug 719047</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138276" comment="fetchmail-6.3.26-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151334" comment="fetchmail is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138623" comment="libfreebl3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138784" comment="libpython2_7-1_0-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138785" comment="libpython2_7-1_0-32bit-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138789" comment="libpython3_4m1_0-3.4.1-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151646" comment="libpython3_4m1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138624" comment="libsoftokn3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138625" comment="mozilla-nss-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138626" comment="mozilla-nss-certs-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138627" comment="mozilla-nss-devel-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138628" comment="mozilla-nss-tools-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138786" comment="python-base-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138787" comment="python-devel-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138788" comment="python-xml-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138790" comment="python3-base-3.4.1-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3439</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439" source="CVE"/>
    <description>
    FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3439.html">CVE-2011-3439</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3439">SUSE bug 730124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3439">SUSE bug 730124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3439">SUSE bug 748083</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3483</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3483" source="CVE"/>
    <description>
    Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (application crash) via a malformed capture file that leads to an invalid root tvbuff, related to a "buffer exception handling vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3483.html">CVE-2011-3483</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3483">SUSE bug 718032</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3594</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3594" source="CVE"/>
    <description>
    The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3594.html">CVE-2011-3594</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3594">SUSE bug 722199</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3594">SUSE bug 736161</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3602</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3602" source="CVE"/>
    <description>
    Directory traversal vulnerability in device-linux.c in the router advertisement daemon (radvd) before 1.8.2 allows local users to overwrite arbitrary files, and remote attackers to overwrite certain files, via a .. (dot dot) in an interface name.  NOTE: this can be leveraged with a symlink to overwrite arbitrary files.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3602.html">CVE-2011-3602</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3602">SUSE bug 721968</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139075" comment="radvd-2.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151648" comment="radvd is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3607</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3607" source="CVE"/>
    <description>
    Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3607.html">CVE-2011-3607</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 729183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 728876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 806721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3607">SUSE bug 729181</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3627</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3627" source="CVE"/>
    <description>
    The bytecode engine in ClamAV before 0.97.3 allows remote attackers to cause a denial of service (crash) via vectors related to "recursion level" and (1) libclamav/bytecode.c and (2) libclamav/bytecode_api.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3627.html">CVE-2011-3627</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3627">SUSE bug 724856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3627">SUSE bug 809945</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138164" comment="clamav-0.98.7-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3630</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3630" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3630.html">CVE-2011-3630</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138395" comment="hardlink-1.0-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151649" comment="hardlink is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3631</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3631" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3631.html">CVE-2011-3631</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138395" comment="hardlink-1.0-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151649" comment="hardlink is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3632</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3632" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3632.html">CVE-2011-3632</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138395" comment="hardlink-1.0-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151649" comment="hardlink is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3635</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3635" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the theme_adium_append_message function in empathy-theme-adium.c in the Adium theme in libempathy-gtk in Empathy 3.2.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted alias (aka nickname).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3635.html">CVE-2011-3635</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3635">SUSE bug 727003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138261" comment="empathy-3.12.10-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151650" comment="empathy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138262" comment="empathy-lang-3.12.10-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151651" comment="empathy-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138263" comment="telepathy-mission-control-plugin-goa-3.12.10-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151652" comment="telepathy-mission-control-plugin-goa is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3640</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3640" source="CVE"/>
    <description>
    ** DISPUTED ** Untrusted search path vulnerability in Mozilla Network Security Services (NSS), as used in Google Chrome before 17 on Windows and Mac OS X, might allow local users to gain privileges via a Trojan horse pkcs11.txt file in a top-level directory.  NOTE: the vendor's response was "Strange behavior, but we're not treating this as a security bug."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3640.html">CVE-2011-3640</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3640">SUSE bug 726096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3640">SUSE bug 726096</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138623" comment="libfreebl3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138624" comment="libsoftokn3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138625" comment="mozilla-nss-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138626" comment="mozilla-nss-certs-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138627" comment="mozilla-nss-devel-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138628" comment="mozilla-nss-tools-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3648</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3648" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 allows remote attackers to inject arbitrary web script or HTML via crafted text with Shift JIS encoding.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3648.html">CVE-2011-3648</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3650</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3650" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 do not properly handle JavaScript files that contain many functions, which allows user-assisted remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted file that is accessed by debugging APIs, as demonstrated by Firebug.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3650.html">CVE-2011-3650</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3651</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3651" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 7.0 and Thunderbird 7.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3651.html">CVE-2011-3651</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3652</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3652" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox before 8.0 and Thunderbird before 8.0 does not properly allocate memory, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3652.html">CVE-2011-3652</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3654</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3654" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox before 8.0 and Thunderbird before 8.0 does not properly handle links from SVG mpath elements to non-SVG elements, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3654.html">CVE-2011-3654</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3655</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3655" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 7.0 and Thunderbird 5.0 through 7.0 perform access control without checking for use of the NoWaiverWrapper wrapper, which allows remote attackers to gain privileges via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3655.html">CVE-2011-3655</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3658</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3658" source="CVE"/>
    <description>
    The SVG implementation in Mozilla Firefox 8.0, Thunderbird 8.0, and SeaMonkey 2.5 does not properly interact with DOMAttrModified event handlers, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via vectors involving removal of SVG elements.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3658.html">CVE-2011-3658</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3658">SUSE bug 737533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3658">SUSE bug 746591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3658">SUSE bug 747320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3658">SUSE bug 750044</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3659</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3659" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 might allow remote attackers to execute arbitrary code via vectors related to incorrect AttributeChildRemoved notifications that affect access to removed nsDOMAttribute child nodes.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3659.html">CVE-2011-3659</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3659">SUSE bug 744275</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3660</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3660" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors that trigger a compartment mismatch associated with the nsDOMMessageEvent::GetData function, and unknown other vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3660.html">CVE-2011-3660</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3660">SUSE bug 737533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3661</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3661" source="CVE"/>
    <description>
    YARR, as used in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3661.html">CVE-2011-3661</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3661">SUSE bug 737533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3663</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3663" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to capture keystrokes entered on a web page, even when JavaScript is disabled, by using SVG animation accessKey events within that web page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3663.html">CVE-2011-3663</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3663">SUSE bug 737533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3922</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-3922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3922" source="CVE"/>
    <description>
    Stack-based buffer overflow in Google Chrome before 16.0.912.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to glyph handling.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-3922.html">CVE-2011-3922</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3922">SUSE bug 739904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3922">SUSE bug 739904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3922">SUSE bug 739904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3922">SUSE bug 740493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3922">SUSE bug 739904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3922">SUSE bug 739904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3922">SUSE bug 739904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3922">SUSE bug 739904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-3922">SUSE bug 739904</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138791" comment="libqt4-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151228" comment="libqt4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138792" comment="libqt4-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151229" comment="libqt4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138793" comment="libqt4-devel-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151230" comment="libqt4-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138794" comment="libqt4-linguist-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151231" comment="libqt4-linguist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138795" comment="libqt4-qt3support-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151232" comment="libqt4-qt3support is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138796" comment="libqt4-qt3support-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151233" comment="libqt4-qt3support-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138797" comment="libqt4-sql-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151234" comment="libqt4-sql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138798" comment="libqt4-sql-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151235" comment="libqt4-sql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138799" comment="libqt4-sql-mysql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151236" comment="libqt4-sql-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138800" comment="libqt4-sql-mysql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151237" comment="libqt4-sql-mysql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138801" comment="libqt4-sql-postgresql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151238" comment="libqt4-sql-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138802" comment="libqt4-sql-postgresql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151239" comment="libqt4-sql-postgresql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138803" comment="libqt4-sql-sqlite-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151240" comment="libqt4-sql-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138804" comment="libqt4-sql-sqlite-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151241" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138805" comment="libqt4-sql-unixODBC-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151242" comment="libqt4-sql-unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138806" comment="libqt4-sql-unixODBC-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151243" comment="libqt4-sql-unixODBC-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138807" comment="libqt4-x11-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151244" comment="libqt4-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138808" comment="libqt4-x11-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151245" comment="libqt4-x11-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4105</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4105" source="CVE"/>
    <description>
    LightDM before 1.0.6 allows local users to change ownership of arbitrary files via a symlink attack on ~/.Xauthority.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4105.html">CVE-2011-4105</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4105">SUSE bug 730062</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138685" comment="liblightdm-gobject-1-0-1.15.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151638" comment="liblightdm-gobject-1-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138686" comment="lightdm-1.15.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151639" comment="lightdm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138687" comment="lightdm-lang-1.15.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151640" comment="lightdm-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4108</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4108" source="CVE"/>
    <description>
    The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4108.html">CVE-2011-4108</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4108">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4108">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4108">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4108">SUSE bug 742821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4108">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4108">SUSE bug 778825</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4128</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4128" source="CVE"/>
    <description>
    Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of service (application crash) via a large SessionTicket.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4128.html">CVE-2011-4128</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4128">SUSE bug 729486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4128">SUSE bug 729486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4128">SUSE bug 729486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4128">SUSE bug 729486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4128">SUSE bug 729486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4128">SUSE bug 729486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4128">SUSE bug 729486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4128">SUSE bug 729486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4128">SUSE bug 729486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4128">SUSE bug 729486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4128">SUSE bug 729486</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138369" comment="gnutls-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138370" comment="libgnutls-devel-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138371" comment="libgnutls-openssl27-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151158" comment="libgnutls-openssl27 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138372" comment="libgnutls28-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151159" comment="libgnutls28 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138373" comment="libgnutls28-32bit-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151160" comment="libgnutls28-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4153</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4153" source="CVE"/>
    <description>
    PHP 5.3.8 does not always check the return value of the zend_strndup function, which might allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted input to an application that performs strndup operations on untrusted string data, as demonstrated by the define function in zend_builtin_functions.c, and unspecified functions in ext/soap/php_sdl.c, ext/standard/syslog.c, ext/standard/browscap.c, ext/oci8/oci8.c, ext/com_dotnet/com_typeinfo.c, and main/php_open_temporary_file.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4153.html">CVE-2011-4153</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 742273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 741520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 742273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 742806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 743308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 746661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 749111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 738221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 741520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 742273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 742806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 743308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 746661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 749111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4153">SUSE bug 741859</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4182</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4182" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4182.html">CVE-2011-4182</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4182">SUSE bug 735394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4182">SUSE bug 735394</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139099" comment="sysconfig-0.83.8-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151653" comment="sysconfig is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139100" comment="sysconfig-netconfig-0.83.8-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151654" comment="sysconfig-netconfig is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4313</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313" source="CVE"/>
    <description>
    query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4313.html">CVE-2011-4313</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4313">SUSE bug 730995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4313">SUSE bug 730995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4313">SUSE bug 730995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4313">SUSE bug 730995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4313">SUSE bug 730995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4313">SUSE bug 730995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4313">SUSE bug 730995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4313">SUSE bug 730995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4313">SUSE bug 730995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4313">SUSE bug 730995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4313">SUSE bug 730995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4313">SUSE bug 730995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4313">SUSE bug 738156</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4313">SUSE bug 730995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4313">SUSE bug 730995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4313">SUSE bug 730995</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4317</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4317" source="CVE"/>
    <description>
    The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4317.html">CVE-2011-4317</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4317">SUSE bug 722545</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4317">SUSE bug 728876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4317">SUSE bug 729181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4317">SUSE bug 791794</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4349</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4349" source="CVE"/>
    <description>
    Multiple SQL injection vulnerabilities in (1) cd-mapping-db.c and (2) cd-device-db.c in colord before 0.1.15 allow local users to execute arbitrary SQL commands via vectors related to color devices and (a) device id, (b) property, or (c) profile id.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4349.html">CVE-2011-4349</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4349">SUSE bug 732996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4349">SUSE bug 698250</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4349">SUSE bug 732996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4349">SUSE bug 732996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4349">SUSE bug 732996</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138167" comment="colord-1.2.12-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151655" comment="colord is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138168" comment="colord-gtk-lang-0.1.26-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151656" comment="colord-gtk-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138169" comment="colord-lang-1.2.12-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151657" comment="colord-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138170" comment="libcolord-gtk1-0.1.26-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151658" comment="libcolord-gtk1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138171" comment="libcolord2-1.2.12-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151659" comment="libcolord2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138172" comment="libcolorhug2-1.2.12-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151660" comment="libcolorhug2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4405</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4405" source="CVE"/>
    <description>
    The cupshelpers scripts in system-config-printer in Ubuntu 11.04 and 11.10, as used by the automatic printer driver download service, uses an "insecure connection" for queries to the OpenPrinting database, which allows remote attackers to execute arbitrary code via a man-in-the-middle (MITM) attack that modifies packages or repositories.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4405.html">CVE-2011-4405</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4405">SUSE bug 733542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4405">SUSE bug 733542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4405">SUSE bug 733542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4405">SUSE bug 733542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4405">SUSE bug 733542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4405">SUSE bug 735322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4405">SUSE bug 733542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4405">SUSE bug 733542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4405">SUSE bug 733542</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139048" comment="python-cupshelpers-1.5.7-3.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151661" comment="python-cupshelpers is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139049" comment="system-config-printer-1.5.7-3.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151662" comment="system-config-printer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139050" comment="system-config-printer-applet-1.5.7-3.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151663" comment="system-config-printer-applet is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139051" comment="system-config-printer-common-1.5.7-3.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151664" comment="system-config-printer-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139052" comment="system-config-printer-common-lang-1.5.7-3.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151665" comment="system-config-printer-common-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139053" comment="system-config-printer-dbus-service-1.5.7-3.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151666" comment="system-config-printer-dbus-service is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139054" comment="udev-configure-printer-1.5.7-3.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151667" comment="udev-configure-printer is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4539</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4539" source="CVE"/>
    <description>
    dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4539.html">CVE-2011-4539</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4539">SUSE bug 735610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4539">SUSE bug 735610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4539">SUSE bug 735610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4539">SUSE bug 741239</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138235" comment="dhcp-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151310" comment="dhcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138236" comment="dhcp-client-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151311" comment="dhcp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138237" comment="dhcp-doc-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151312" comment="dhcp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138238" comment="dhcp-relay-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151313" comment="dhcp-relay is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138239" comment="dhcp-server-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151314" comment="dhcp-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4566</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4566" source="CVE"/>
    <description>
    Integer overflow in the exif_process_IFD_TAG function in exif.c in the exif extension in PHP 5.4.0beta2 on 32-bit platforms allows remote attackers to read the contents of arbitrary memory locations or cause a denial of service via a crafted offset_val value in an EXIF header in a JPEG file, a different vulnerability than CVE-2011-0708.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4566.html">CVE-2011-4566</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 738221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 741520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 742273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 742806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 743308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 746661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 749111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4566">SUSE bug 733590</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4576</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4576" source="CVE"/>
    <description>
    The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4576.html">CVE-2011-4576</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4576">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4576">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4576">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4576">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4576">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4576">SUSE bug 778825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4576">SUSE bug 758060</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4577</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4577" source="CVE"/>
    <description>
    OpenSSL before 0.9.8s and 1.x before 1.0.0f, when RFC 3779 support is enabled, allows remote attackers to cause a denial of service (assertion failure) via an X.509 certificate containing certificate-extension data associated with (1) IP address blocks or (2) Autonomous System (AS) identifiers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4577.html">CVE-2011-4577</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4577">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4577">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4577">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4577">SUSE bug 758060</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4600</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4600" source="CVE"/>
    <description>
    The networkReloadIptablesRules function in network/bridge_driver.c in libvirt before 0.9.9 does not properly handle firewall rules on bridge networks when libvirtd is restarted, which might allow remote attackers to bypass intended access restrictions via a (1) DNS or (2) DHCP query.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4600.html">CVE-2011-4600</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4600">SUSE bug 736082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4600">SUSE bug 736082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4600">SUSE bug 736082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4600">SUSE bug 736082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4600">SUSE bug 736082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4600">SUSE bug 736082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4600">SUSE bug 736082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4600">SUSE bug 736082</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4604</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4604" source="CVE"/>
    <description>
    The bat_socket_read function in net/batman-adv/icmp_socket.c in the Linux kernel before 3.3 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted batman-adv ICMP packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4604.html">CVE-2011-4604</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4604">SUSE bug 736149</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4604">SUSE bug 736149</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4604">SUSE bug 736149</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4604">SUSE bug 736149</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4604">SUSE bug 736149</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4604">SUSE bug 736149</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4619</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4619" source="CVE"/>
    <description>
    The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4619.html">CVE-2011-4619</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4619">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4619">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4619">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4619">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4619">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4619">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4619">SUSE bug 799454</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4718</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4718" source="CVE"/>
    <description>
    Session fixation vulnerability in the Sessions subsystem in PHP before 5.5.2 allows remote attackers to hijack web sessions by specifying a session ID.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4718.html">CVE-2011-4718</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4718">SUSE bug 834813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4718">SUSE bug 834813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4718">SUSE bug 834813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4718">SUSE bug 834813</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4815</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4815" source="CVE"/>
    <description>
    Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4815.html">CVE-2011-4815</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4815">SUSE bug 739122</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139084" comment="ruby-2.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151366" comment="ruby is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139085" comment="ruby-devel-2.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151367" comment="ruby-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4868</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4868" source="CVE"/>
    <description>
    The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4868.html">CVE-2011-4868</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4868">SUSE bug 741239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4868">SUSE bug 741239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4868">SUSE bug 741239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4868">SUSE bug 741239</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138235" comment="dhcp-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151310" comment="dhcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138236" comment="dhcp-client-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151311" comment="dhcp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138237" comment="dhcp-doc-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151312" comment="dhcp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138238" comment="dhcp-relay-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151313" comment="dhcp-relay is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138239" comment="dhcp-server-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151314" comment="dhcp-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4885</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4885" source="CVE"/>
    <description>
    PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4885.html">CVE-2011-4885</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 738221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 749111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 749111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 741520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 742273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 742806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 743308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 746661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 749111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 738221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 741520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 742273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 742806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 743308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 746661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4885">SUSE bug 749111</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4944</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2011-4944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4944" source="CVE"/>
    <description>
    Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2011-4944.html">CVE-2011-4944</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2011-4944">SUSE bug 754447</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138784" comment="libpython2_7-1_0-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138785" comment="libpython2_7-1_0-32bit-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138789" comment="libpython3_4m1_0-3.4.1-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151646" comment="libpython3_4m1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138786" comment="python-base-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138787" comment="python-devel-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138788" comment="python-xml-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138790" comment="python3-base-3.4.1-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0021</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0021" source="CVE"/>
    <description>
    The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0021.html">CVE-2012-0021</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0021">SUSE bug 743744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0021">SUSE bug 743744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0021">SUSE bug 743744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0021">SUSE bug 743744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0021">SUSE bug 743744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0021">SUSE bug 743744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0021">SUSE bug 743744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0021">SUSE bug 743744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0021">SUSE bug 743744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0021">SUSE bug 743744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0021">SUSE bug 1078450</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0027</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0027" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0027" source="CVE"/>
    <description>
    The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0027.html">CVE-2012-0027</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0027">SUSE bug 739719</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0029</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0029" source="CVE"/>
    <description>
    Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0029.html">CVE-2012-0029</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0029">SUSE bug 740165</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0029">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0029">SUSE bug 740165</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0029">SUSE bug 747331</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0031</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0031" source="CVE"/>
    <description>
    scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0031.html">CVE-2012-0031</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0031">SUSE bug 741243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0031">SUSE bug 741243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0031">SUSE bug 741243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0031">SUSE bug 741243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0031">SUSE bug 741243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0031">SUSE bug 741243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0031">SUSE bug 741243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0031">SUSE bug 741243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0031">SUSE bug 741243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0031">SUSE bug 741243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0031">SUSE bug 741243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0031">SUSE bug 741243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0031">SUSE bug 741243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0031">SUSE bug 806721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0031">SUSE bug 741243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0031">SUSE bug 741243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0031">SUSE bug 741243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0031">SUSE bug 741243</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0035</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0035" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0035" source="CVE"/>
    <description>
    Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0035.html">CVE-2012-0035</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0035">SUSE bug 740447</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138256" comment="emacs-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151668" comment="emacs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138257" comment="emacs-info-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151669" comment="emacs-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138258" comment="emacs-nox-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151670" comment="emacs-nox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138259" comment="emacs-x11-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151671" comment="emacs-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138260" comment="etags-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151672" comment="etags is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0037</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0037" source="CVE"/>
    <description>
    Redland Raptor (aka libraptor) before 2.0.7, as used by OpenOffice 3.3 and 3.4 Beta, LibreOffice before 3.4.6 and 3.5.x before 3.5.1, and other products, allows user-assisted remote attackers to read arbitrary files via a crafted XML external entity (XXE) declaration and reference in an RDF document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0037.html">CVE-2012-0037</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0037">SUSE bug 740453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0037">SUSE bug 745298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0037">SUSE bug 734781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0037">SUSE bug 740453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0037">SUSE bug 37195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0037">SUSE bug 734781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0037">SUSE bug 740453</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138809" comment="libraptor2-0-2.0.15-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151673" comment="libraptor2-0 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0050</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0050" source="CVE"/>
    <description>
    OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS applications, which allows remote attackers to cause a denial of service (crash) via unspecified vectors related to an out-of-bounds read.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4108.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0050.html">CVE-2012-0050</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0050">SUSE bug 742821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0050">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0050">SUSE bug 739719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0050">SUSE bug 758060</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0053</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053" source="CVE"/>
    <description>
    protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0053.html">CVE-2012-0053</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0053">SUSE bug 743743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0053">SUSE bug 743743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0053">SUSE bug 743743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0053">SUSE bug 743743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0053">SUSE bug 743743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0053">SUSE bug 743743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0053">SUSE bug 743743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0053">SUSE bug 743743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0053">SUSE bug 743743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0053">SUSE bug 743743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0053">SUSE bug 743743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0053">SUSE bug 743743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0053">SUSE bug 743743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0053">SUSE bug 743743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0053">SUSE bug 743743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0053">SUSE bug 743743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0053">SUSE bug 743743</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0056</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0056" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0056" source="CVE"/>
    <description>
    The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/&lt;pid&gt;/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0056.html">CVE-2012-0056</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0056">SUSE bug 742028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0056">SUSE bug 742279</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0056">SUSE bug 742279</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0056">SUSE bug 742279</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0056">SUSE bug 653148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0056">SUSE bug 742279</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0217</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0217" source="CVE"/>
    <description>
    The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application.  NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0217.html">CVE-2012-0217</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 764077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 785429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 785434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 785434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0217">SUSE bug 757537</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0247</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0247" source="CVE"/>
    <description>
    ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset and count values in the ResolutionUnit tag in the EXIF IFD0 of an image.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0247.html">CVE-2012-0247</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0247">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0247">SUSE bug 752879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0247">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0247">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0247">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0247">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0247">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0247">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0247">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0247">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0247">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0247">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0247">SUSE bug 746880</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138035" comment="ImageMagick-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138036" comment="ImageMagick-devel-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138037" comment="ImageMagick-doc-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138038" comment="ImageMagick-extra-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138039" comment="libMagick++-6_Q16-3-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138040" comment="libMagickCore-6_Q16-1-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138041" comment="libMagickWand-6_Q16-1-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138042" comment="perl-PerlMagick-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0248</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0248" source="CVE"/>
    <description>
    ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted image whose IFD contains IOP tags that all reference the beginning of the IDF.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0248.html">CVE-2012-0248</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0248">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0248">SUSE bug 752879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0248">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0248">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0248">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0248">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0248">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0248">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0248">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0248">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0248">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0248">SUSE bug 746880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0248">SUSE bug 746880</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138035" comment="ImageMagick-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138036" comment="ImageMagick-devel-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138037" comment="ImageMagick-doc-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138038" comment="ImageMagick-extra-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138039" comment="libMagick++-6_Q16-3-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138040" comment="libMagickCore-6_Q16-1-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138041" comment="libMagickWand-6_Q16-1-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138042" comment="perl-PerlMagick-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0390</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0390" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0390" source="CVE"/>
    <description>
    The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote attackers to recover partial plaintext via a timing side-channel attack, a related issue to CVE-2011-4108.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0390.html">CVE-2012-0390</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0390">SUSE bug 739898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0390">SUSE bug 739898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0390">SUSE bug 739898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0390">SUSE bug 739898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0390">SUSE bug 739898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0390">SUSE bug 739898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0390">SUSE bug 739898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0390">SUSE bug 739898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0390">SUSE bug 739898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0390">SUSE bug 739898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0390">SUSE bug 739898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0390">SUSE bug 739898</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138369" comment="gnutls-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138370" comment="libgnutls-devel-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138371" comment="libgnutls-openssl27-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151158" comment="libgnutls-openssl27 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138372" comment="libgnutls28-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151159" comment="libgnutls28 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138373" comment="libgnutls28-32bit-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151160" comment="libgnutls28-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0441</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0441" source="CVE"/>
    <description>
    The ASN.1 decoder in the QuickDER decoder in Mozilla Network Security Services (NSS) before 3.13.4, as used in Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10, allows remote attackers to cause a denial of service (application crash) via a zero-length item, as demonstrated by (1) a zero-length basic constraint or (2) a zero-length field in an OCSP response.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0441.html">CVE-2012-0441</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0441">SUSE bug 765204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0442</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0442" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0442.html">CVE-2012-0442</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0442">SUSE bug 744275</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0443</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0443" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0443.html">CVE-2012-0443</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0443">SUSE bug 744275</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0444</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0444" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 do not properly initialize nsChildView data structures, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Ogg Vorbis file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0444.html">CVE-2012-0444</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0444">SUSE bug 744275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0444">SUSE bug 747912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0444">SUSE bug 747912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0444">SUSE bug 747912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0444">SUSE bug 747912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0444">SUSE bug 747912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0444">SUSE bug 747912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0444">SUSE bug 747912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0444">SUSE bug 747912</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138925" comment="libvorbis-devel-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151121" comment="libvorbis-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138926" comment="libvorbis0-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151122" comment="libvorbis0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138927" comment="libvorbis0-32bit-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151123" comment="libvorbis0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138928" comment="libvorbisenc2-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151124" comment="libvorbisenc2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138929" comment="libvorbisenc2-32bit-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151125" comment="libvorbisenc2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138930" comment="libvorbisfile3-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151126" comment="libvorbisfile3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138931" comment="libvorbisfile3-32bit-1.3.3-3.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151127" comment="libvorbisfile3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0445</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0445" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to bypass the HTML5 frame-navigation policy and replace arbitrary sub-frames by creating a form submission target with a sub-frame's name attribute.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0445.html">CVE-2012-0445</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0445">SUSE bug 744275</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0446</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0446" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to inject arbitrary web script or HTML via a (1) web page or (2) Firefox extension, related to improper enforcement of XPConnect security restrictions for frame scripts that call untrusted objects.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0446.html">CVE-2012-0446</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0446">SUSE bug 744275</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0447</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0447" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 do not properly initialize data for image/vnd.microsoft.icon images, which allows remote attackers to obtain potentially sensitive information by reading a PNG image that was created through conversion from an ICO image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0447.html">CVE-2012-0447</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0447">SUSE bug 744275</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0449</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0449" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a malformed XSLT stylesheet that is embedded in a document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0449.html">CVE-2012-0449</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0449">SUSE bug 744275</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0451</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0451" source="CVE"/>
    <description>
    CRLF injection vulnerability in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote web servers to bypass intended Content Security Policy (CSP) restrictions and possibly conduct cross-site scripting (XSS) attacks via crafted HTTP headers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0451.html">CVE-2012-0451</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0451">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0451">SUSE bug 752168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0451">SUSE bug 746591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0451">SUSE bug 747320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0451">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0451">SUSE bug 750044</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0452</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0452" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox 10.x before 10.0.1, Thunderbird 10.x before 10.0.1, and SeaMonkey 2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger failure of an nsXBLDocumentInfo::ReadPrototypeBindings function call, related to the cycle collector's access to a hash table containing a stale XBL binding.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0452.html">CVE-2012-0452</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0452">SUSE bug 746616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0452">SUSE bug 746616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0452">SUSE bug 746663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0452">SUSE bug 746616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0452">SUSE bug 746616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0452">SUSE bug 746616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0452">SUSE bug 746616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0452">SUSE bug 746616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0452">SUSE bug 746616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0452">SUSE bug 746616</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0455</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0455" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict drag-and-drop operations on javascript: URLs, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web page, related to a "DragAndDropJacking" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0455.html">CVE-2012-0455</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0455">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0455">SUSE bug 752168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0455">SUSE bug 746591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0455">SUSE bug 747320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0455">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0455">SUSE bug 750044</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0456</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0456" source="CVE"/>
    <description>
    The SVG Filters implementation in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 might allow remote attackers to obtain sensitive information from process memory via vectors that trigger an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0456.html">CVE-2012-0456</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0456">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0456">SUSE bug 752168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0456">SUSE bug 746591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0456">SUSE bug 747320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0456">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0456">SUSE bug 750044</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0457</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0457" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsSMILTimeValueSpec::ConvertBetweenTimeContainer function in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 might allow remote attackers to execute arbitrary code via an SVG animation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0457.html">CVE-2012-0457</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0457">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0457">SUSE bug 752168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0457">SUSE bug 746591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0457">SUSE bug 747320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0457">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0457">SUSE bug 750044</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0458</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0458" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict setting the home page through the dragging of a URL to the home button, which allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a javascript: URL that is later interpreted in the about:sessionrestore context.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0458.html">CVE-2012-0458</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0458">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0458">SUSE bug 752168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0458">SUSE bug 746591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0458">SUSE bug 747320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0458">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0458">SUSE bug 750044</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0459</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0459" source="CVE"/>
    <description>
    The Cascading Style Sheets (CSS) implementation in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via dynamic modification of a keyframe followed by access to the cssText of the keyframe.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0459.html">CVE-2012-0459</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0459">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0459">SUSE bug 752168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0459">SUSE bug 746591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0459">SUSE bug 747320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0459">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0459">SUSE bug 750044</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0460</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0460" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict write access to the window.fullScreen object, which allows remote attackers to spoof the user interface via a crafted web page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0460.html">CVE-2012-0460</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0460">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0460">SUSE bug 752168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0460">SUSE bug 746591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0460">SUSE bug 747320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0460">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0460">SUSE bug 750044</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0461</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0461" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0461.html">CVE-2012-0461</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0461">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0461">SUSE bug 752168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0461">SUSE bug 746591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0461">SUSE bug 747320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0461">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0461">SUSE bug 750044</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0462</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0462" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0462.html">CVE-2012-0462</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0462">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0462">SUSE bug 752168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0462">SUSE bug 746591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0462">SUSE bug 747320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0462">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0462">SUSE bug 750044</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0463</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0463" source="CVE"/>
    <description>
    The nsWindow implementation in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 does not check the validity of an instance after event dispatching, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, as demonstrated by Mobile Firefox on Android.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0463.html">CVE-2012-0463</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0463">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0463">SUSE bug 752168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0463">SUSE bug 746591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0463">SUSE bug 747320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0463">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0463">SUSE bug 750044</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0464</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0464" source="CVE"/>
    <description>
    Use-after-free vulnerability in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to execute arbitrary code via vectors involving an empty argument to the array.join function in conjunction with the triggering of garbage collection.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0464.html">CVE-2012-0464</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0464">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0464">SUSE bug 752168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0464">SUSE bug 746591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0464">SUSE bug 747320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0464">SUSE bug 750044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0464">SUSE bug 750044</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0467</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0467" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0467.html">CVE-2012-0467</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0467">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0468</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0468" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox 4.x through 11.0, Thunderbird 5.0 through 11.0, and SeaMonkey before 2.9 allows remote attackers to cause a denial of service (assertion failure and memory corruption) or possibly execute arbitrary code via vectors related to jsval.h and the js::array_shift function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0468.html">CVE-2012-0468</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0468">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0469</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0469" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::indexedDB::IDBKeyRange::cycleCollection::Trace function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to execute arbitrary code via vectors related to crafted IndexedDB data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0469.html">CVE-2012-0469</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0469">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0470</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0470" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsSVGFEDiffuseLightingElement::LightPixel function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to cause a denial of service (invalid gfxImageSurface free operation) or possibly execute arbitrary code by leveraging the use of "different number systems."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0470.html">CVE-2012-0470</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0470">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0471</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0471" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to inject arbitrary web script or HTML via a multibyte character set.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0471.html">CVE-2012-0471</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0471">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0472</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0472" source="CVE"/>
    <description>
    The cairo-dwrite implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9, when certain Windows Vista and Windows 7 configurations are used, does not properly restrict font-rendering attempts, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0472.html">CVE-2012-0472</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0472">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0473</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0473" source="CVE"/>
    <description>
    The WebGLBuffer::FindMaxUshortElement function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 calls the FindMaxElementInSubArray function with incorrect template arguments, which allows remote attackers to obtain sensitive information from video memory via a crafted WebGL.drawElements call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0473.html">CVE-2012-0473</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0473">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0474</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0474" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the docshell implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to inject arbitrary web script or HTML via vectors related to short-circuited page loads, aka "Universal XSS (UXSS)."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0474.html">CVE-2012-0474</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0474">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0475</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0475" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 11.0, Thunderbird 5.0 through 11.0, and SeaMonkey before 2.9 do not properly construct the Origin and Sec-WebSocket-Origin HTTP headers, which might allow remote attackers to bypass an IPv6 literal ACL via a cross-site (1) XMLHttpRequest or (2) WebSocket operation involving a nonstandard port number and an IPv6 address that contains certain zero fields.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0475.html">CVE-2012-0475</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0475">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0477</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0477" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to inject arbitrary web script or HTML via the (1) ISO-2022-KR or (2) ISO-2022-CN character set.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0477.html">CVE-2012-0477</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0477">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0478</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0478" source="CVE"/>
    <description>
    The texImage2D implementation in the WebGL subsystem in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 does not properly restrict JSVAL_TO_OBJECT casts, which might allow remote attackers to execute arbitrary code via a crafted web page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0478.html">CVE-2012-0478</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0478">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0479</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0479" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to spoof the address bar via an https URL for invalid (1) RSS or (2) Atom XML content.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0479.html">CVE-2012-0479</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0479">SUSE bug 758408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0759</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0759" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0759" source="CVE"/>
    <description>
    Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0771.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0759.html">CVE-2012-0759</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0759">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0786</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0786" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0786" source="CVE"/>
    <description>
    The transform_save function in transform.c in Augeas before 1.0.0 allows local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on a .augnew file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0786.html">CVE-2012-0786</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0786">SUSE bug 853044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0786">SUSE bug 885003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0786">SUSE bug 885003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0786">SUSE bug 885003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0786">SUSE bug 885003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0786">SUSE bug 885003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0786">SUSE bug 885003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0786">SUSE bug 885003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0786">SUSE bug 885003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0786">SUSE bug 885003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138124" comment="augeas-lenses-1.2.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151682" comment="augeas-lenses is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138125" comment="libaugeas0-1.2.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151683" comment="libaugeas0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0804</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0804" source="CVE"/>
    <description>
    Heap-based buffer overflow in the proxy_connect function in src/client.c in CVS 1.11 and 1.12 allows remote HTTP proxy servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP response.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0804.html">CVE-2012-0804</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0804">SUSE bug 744059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0804">SUSE bug 744059</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138214" comment="cvs-1.12.12-183.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151684" comment="cvs is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0817</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0817" source="CVE"/>
    <description>
    Memory leak in smbd in Samba 3.6.x before 3.6.3 allows remote attackers to cause a denial of service (memory and CPU consumption) by making many connection requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0817.html">CVE-2012-0817</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0817">SUSE bug 743986</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0830</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0830" source="CVE"/>
    <description>
    The php_register_variable_ex function in php_variables.c in PHP 5.3.9 allows remote attackers to execute arbitrary code via a request containing a large number of variables, related to improper handling of array variables.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4885.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0830.html">CVE-2012-0830</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 749111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 749111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 741520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 742273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 742806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 743308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 746661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 749111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 733590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 736169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 738221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 741520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 741859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 742273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 742806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 743308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 744966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 746661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0830">SUSE bug 749111</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0845</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0845" source="CVE"/>
    <description>
    SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0845.html">CVE-2012-0845</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0845">SUSE bug 747125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0845">SUSE bug 747125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0845">SUSE bug 747125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0845">SUSE bug 747125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0845">SUSE bug 747125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0845">SUSE bug 747125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0845">SUSE bug 747125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0845">SUSE bug 747125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0845">SUSE bug 747125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0845">SUSE bug 747125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0845">SUSE bug 747125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0845">SUSE bug 747125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0845">SUSE bug 747125</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138784" comment="libpython2_7-1_0-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138785" comment="libpython2_7-1_0-32bit-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138789" comment="libpython3_4m1_0-3.4.1-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151646" comment="libpython3_4m1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138786" comment="python-base-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138787" comment="python-devel-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138788" comment="python-xml-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138790" comment="python3-base-3.4.1-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0862</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0862" source="CVE"/>
    <description>
    builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0862.html">CVE-2012-0862</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 762294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 762294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 762294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 762294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 762294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 762294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 762294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 762294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 762294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 762294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 855685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 762294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 762294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 762294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 762294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 762294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 762294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 762294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 762294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0862">SUSE bug 762294</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139143" comment="xinetd-2.3.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151685" comment="xinetd is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0866</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0866" source="CVE"/>
    <description>
    CREATE TRIGGER in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 does not properly check the execute permission for trigger functions marked SECURITY DEFINER, which allows remote authenticated users to execute otherwise restricted triggers on arbitrary data by installing the trigger on an attacker-owned table.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0866.html">CVE-2012-0866</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0866">SUSE bug 749299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0866">SUSE bug 749299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0866">SUSE bug 749299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0866">SUSE bug 749299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0866">SUSE bug 749301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0866">SUSE bug 749299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0866">SUSE bug 701489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0866">SUSE bug 749299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0866">SUSE bug 749301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0866">SUSE bug 749303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0866">SUSE bug 749299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0866">SUSE bug 749299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0866">SUSE bug 749299</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0867</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0867" source="CVE"/>
    <description>
    PostgreSQL 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 truncates the common name to only 32 characters when verifying SSL certificates, which allows remote attackers to spoof connections when the host name is exactly 32 characters.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0867.html">CVE-2012-0867</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0867">SUSE bug 749301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0867">SUSE bug 749301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0867">SUSE bug 749301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0867">SUSE bug 749301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0867">SUSE bug 749301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0867">SUSE bug 701489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0867">SUSE bug 749299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0867">SUSE bug 749301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0867">SUSE bug 749303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0867">SUSE bug 749301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0867">SUSE bug 749301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0867">SUSE bug 749301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0867">SUSE bug 749301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0867">SUSE bug 749301</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0868</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0868" source="CVE"/>
    <description>
    CRLF injection vulnerability in pg_dump in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 allows user-assisted remote attackers to execute arbitrary SQL commands via a crafted file containing object names with newlines, which are inserted into an SQL script that is used when the database is restored.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0868.html">CVE-2012-0868</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0868">SUSE bug 749301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0868">SUSE bug 749303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0868">SUSE bug 749303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0868">SUSE bug 749303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0868">SUSE bug 749301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0868">SUSE bug 749303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0868">SUSE bug 749303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0868">SUSE bug 701489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0868">SUSE bug 749299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0868">SUSE bug 749301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0868">SUSE bug 749303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0868">SUSE bug 749303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0868">SUSE bug 749303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0868">SUSE bug 749303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0868">SUSE bug 749303</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0870</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0870" source="CVE"/>
    <description>
    Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0870.html">CVE-2012-0870</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0870">SUSE bug 747934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0870">SUSE bug 747934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0870">SUSE bug 747934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0870">SUSE bug 747934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0870">SUSE bug 747934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0870">SUSE bug 747934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0870">SUSE bug 747934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0870">SUSE bug 747934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0870">SUSE bug 747934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0870">SUSE bug 752797</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0870">SUSE bug 747934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0870">SUSE bug 747934</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0876</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0876" source="CVE"/>
    <description>
    The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0876.html">CVE-2012-0876</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 751464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 751465</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 983215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0876">SUSE bug 983216</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138272" comment="expat-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151330" comment="expat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138273" comment="libexpat-devel-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151331" comment="libexpat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138274" comment="libexpat1-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138275" comment="libexpat1-32bit-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151333" comment="libexpat1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0884</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-0884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0884" source="CVE"/>
    <description>
    The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL before 0.9.8u and 1.x before 1.0.0h does not properly restrict certain oracle behavior, which makes it easier for context-dependent attackers to decrypt data via a Million Message Attack (MMA) adaptive chosen ciphertext attack.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-0884.html">CVE-2012-0884</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0884">SUSE bug 751977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0884">SUSE bug 749210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0884">SUSE bug 754640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0884">SUSE bug 754640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0884">SUSE bug 754640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0884">SUSE bug 749735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0884">SUSE bug 751977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0884">SUSE bug 761819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-0884">SUSE bug 761819</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1012</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1012" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1012" source="CVE"/>
    <description>
    server/server_stubs.c in the kadmin protocol implementation in MIT Kerberos 5 (aka krb5) 1.10 before 1.10.1 does not properly restrict access to (1) SET_STRING and (2) GET_STRINGS operations, which might allow remote authenticated administrators to modify or read string attributes by leveraging the global list privilege.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1012.html">CVE-2012-1012</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1012">SUSE bug 766109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1013</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1013" source="CVE"/>
    <description>
    The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a password.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1013.html">CVE-2012-1013</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1013">SUSE bug 765485</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1013">SUSE bug 765485</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1013">SUSE bug 765485</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1013">SUSE bug 765485</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1013">SUSE bug 765485</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1013">SUSE bug 765485</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1013">SUSE bug 765485</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1016</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1016" source="CVE"/>
    <description>
    The pkinit_server_return_padata function in plugins/preauth/pkinit/pkinit_srv.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 attempts to find an agility KDF identifier in inappropriate circumstances, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted Draft 9 request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1016.html">CVE-2012-1016</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1016">SUSE bug 807556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1016">SUSE bug 807556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1016">SUSE bug 807556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1016">SUSE bug 807556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1016">SUSE bug 807556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1016">SUSE bug 807556</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1095</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1095" source="CVE"/>
    <description>
    osc before 0.134 might allow remote OBS repository servers or package maintainers to execute arbitrary commands via a crafted (1) build log or (2) build status that contains an escape sequence for a terminal emulator.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1095.html">CVE-2012-1095</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1095">SUSE bug 749335</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139011" comment="osc-0.152.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151686" comment="osc is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1111</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1111" source="CVE"/>
    <description>
    lightdm before 1.0.9 does not properly close file descriptors before opening a child process, which allows local users to write to the lightdm log or have other unspecified impact.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1111.html">CVE-2012-1111</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1111">SUSE bug 745339</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138685" comment="liblightdm-gobject-1-0-1.15.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151638" comment="liblightdm-gobject-1-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138686" comment="lightdm-1.15.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151639" comment="lightdm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138687" comment="lightdm-lang-1.15.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151640" comment="lightdm-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1126</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a BDF font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1126.html">CVE-2012-1126</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1126">SUSE bug 750937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1126">SUSE bug 750937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1126">SUSE bug 750937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1126">SUSE bug 750937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1126">SUSE bug 750937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1126">SUSE bug 750937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1126">SUSE bug 750937</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1127</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1127.html">CVE-2012-1127</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1127">SUSE bug 750947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1127">SUSE bug 750947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1127">SUSE bug 750947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1127">SUSE bug 750947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1127">SUSE bug 750947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1127">SUSE bug 750947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1127">SUSE bug 750947</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1128</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1128.html">CVE-2012-1128</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1128">SUSE bug 750942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1128">SUSE bug 750942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1128">SUSE bug 750942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1128">SUSE bug 750942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1128">SUSE bug 750942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1128">SUSE bug 750942</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1129</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1129" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted SFNT string in a Type 42 font.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1129.html">CVE-2012-1129</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1129">SUSE bug 750952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1129">SUSE bug 750952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1129">SUSE bug 750952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1129">SUSE bug 750952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1129">SUSE bug 750952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1129">SUSE bug 750952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1129">SUSE bug 750952</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1130</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a PCF font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1130.html">CVE-2012-1130</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1130">SUSE bug 750951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1130">SUSE bug 750951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1130">SUSE bug 750951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1130">SUSE bug 750951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1130">SUSE bug 750951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1130">SUSE bug 750951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1130">SUSE bug 750951</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1131</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, on 64-bit platforms allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors related to the cell table of a font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1131.html">CVE-2012-1131</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1131">SUSE bug 750953</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1131">SUSE bug 750953</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1131">SUSE bug 750953</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1131">SUSE bug 750953</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1131">SUSE bug 750953</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1131">SUSE bug 750953</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1131">SUSE bug 750953</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1132</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted dictionary data in a Type 1 font.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1132.html">CVE-2012-1132</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1132">SUSE bug 750950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1132">SUSE bug 750950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1132">SUSE bug 750950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1132">SUSE bug 750950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1132">SUSE bug 750950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1132">SUSE bug 750950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1132">SUSE bug 750950</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1133</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1133.html">CVE-2012-1133</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1133">SUSE bug 750940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1133">SUSE bug 750940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1133">SUSE bug 750940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1133">SUSE bug 750940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1133">SUSE bug 750940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1133">SUSE bug 750940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1133">SUSE bug 750940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1134</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted private-dictionary data in a Type 1 font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1134.html">CVE-2012-1134</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1134">SUSE bug 750945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1134">SUSE bug 750945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1134">SUSE bug 750945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1134">SUSE bug 750945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1134">SUSE bug 750945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1134">SUSE bug 750945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1134">SUSE bug 750945</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1135</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the NPUSHB and NPUSHW instructions in a TrueType font.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1135.html">CVE-2012-1135</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1135">SUSE bug 750946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1135">SUSE bug 750946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1135">SUSE bug 750946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1135">SUSE bug 750946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1135">SUSE bug 750946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1135">SUSE bug 750946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1135">SUSE bug 750946</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1136</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font that lacks an ENCODING field.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1136.html">CVE-2012-1136</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1136">SUSE bug 750939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1136">SUSE bug 750939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1136">SUSE bug 750939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1136">SUSE bug 750939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1136">SUSE bug 750939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1136">SUSE bug 750939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1136">SUSE bug 750939</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1137</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted header in a BDF font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1137.html">CVE-2012-1137</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1137">SUSE bug 750943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1137">SUSE bug 750943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1137">SUSE bug 750943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1137">SUSE bug 750943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1137">SUSE bug 750943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1137">SUSE bug 750943</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1138</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the MIRP instruction in a TrueType font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1138.html">CVE-2012-1138</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1138">SUSE bug 750941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1138">SUSE bug 750941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1138">SUSE bug 750941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1138">SUSE bug 750941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1138">SUSE bug 750941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1138">SUSE bug 750941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1138">SUSE bug 750941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1139</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139" source="CVE"/>
    <description>
    Array index error in FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid stack read operation and memory corruption) or possibly execute arbitrary code via crafted glyph data in a BDF font.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1139.html">CVE-2012-1139</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1139">SUSE bug 750938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1139">SUSE bug 750938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1139">SUSE bug 750938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1139">SUSE bug 750938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1139">SUSE bug 750938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1139">SUSE bug 750938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1139">SUSE bug 750938</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1140</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted PostScript font object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1140.html">CVE-2012-1140</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1140">SUSE bug 750954</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1140">SUSE bug 750954</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1140">SUSE bug 750954</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1140">SUSE bug 750954</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1140">SUSE bug 750954</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1141</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted ASCII string in a BDF font.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1141.html">CVE-2012-1141</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1141">SUSE bug 750955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1141">SUSE bug 750955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1141">SUSE bug 750955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1141">SUSE bug 750955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1141">SUSE bug 750955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1141">SUSE bug 750955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1141">SUSE bug 750955</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1142</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph-outline data in a font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1142.html">CVE-2012-1142</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1142">SUSE bug 750948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1142">SUSE bug 750948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1142">SUSE bug 750948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1142">SUSE bug 750948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1142">SUSE bug 750948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1142">SUSE bug 750948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1142">SUSE bug 750948</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1143</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1143.html">CVE-2012-1143</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1143">SUSE bug 750949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1143">SUSE bug 750949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1143">SUSE bug 750949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1143">SUSE bug 750949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1143">SUSE bug 750949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1143">SUSE bug 750949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1143">SUSE bug 750949</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1144</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1144.html">CVE-2012-1144</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1144">SUSE bug 750944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1144">SUSE bug 750944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1144">SUSE bug 750944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1144">SUSE bug 750944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1144">SUSE bug 750944</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1147</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1147" source="CVE"/>
    <description>
    readfilemap.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (file descriptor consumption) via a large number of crafted XML files.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1147.html">CVE-2012-1147</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1147">SUSE bug 751464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1147">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1147">SUSE bug 751464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1147">SUSE bug 751465</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138272" comment="expat-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151330" comment="expat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138273" comment="libexpat-devel-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151331" comment="libexpat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138274" comment="libexpat1-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138275" comment="libexpat1-32bit-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151333" comment="libexpat1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1148</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1148" source="CVE"/>
    <description>
    Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1148.html">CVE-2012-1148</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1148">SUSE bug 751465</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1148">SUSE bug 750914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1148">SUSE bug 751464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1148">SUSE bug 751465</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138272" comment="expat-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151330" comment="expat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138273" comment="libexpat-devel-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151331" comment="libexpat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138274" comment="libexpat1-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138275" comment="libexpat1-32bit-2.1.0-15.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151333" comment="libexpat1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1150</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1150" source="CVE"/>
    <description>
    Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1150.html">CVE-2012-1150</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1150">SUSE bug 751718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1150">SUSE bug 755383</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1150">SUSE bug 826682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1150">SUSE bug 826682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1150">SUSE bug 826682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1150">SUSE bug 826682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1150">SUSE bug 826682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1150">SUSE bug 826682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1150">SUSE bug 826682</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138784" comment="libpython2_7-1_0-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138785" comment="libpython2_7-1_0-32bit-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138789" comment="libpython3_4m1_0-3.4.1-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151646" comment="libpython3_4m1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138786" comment="python-base-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138787" comment="python-devel-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138788" comment="python-xml-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138790" comment="python3-base-3.4.1-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1152</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1152" source="CVE"/>
    <description>
    Multiple format string vulnerabilities in the error reporting functionality in the YAML::LibYAML (aka YAML-LibYAML and perl-YAML-LibYAML) module 0.38 for Perl allow remote attackers to cause a denial of service (process crash) via format string specifiers in a (1) YAML stream to the Load function, (2) YAML node to the load_node function, (3) YAML mapping to the load_mapping function, or (4) YAML sequence to the load_sequence function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1152.html">CVE-2012-1152</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1152">SUSE bug 751503</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139032" comment="perl-YAML-LibYAML-0.38-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151687" comment="perl-YAML-LibYAML is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1162</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1162" source="CVE"/>
    <description>
    Heap-based buffer overflow in the _zip_readcdir function in zip_open.c in libzip 0.10 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a zip archive with the number of directories set to 0, related to an "incorrect loop construct."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1162.html">CVE-2012-1162</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1162">SUSE bug 751829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1162">SUSE bug 751829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1162">SUSE bug 751830</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138977" comment="libzip-devel-0.11.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151554" comment="libzip-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138978" comment="libzip2-0.11.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151555" comment="libzip2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1163</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1163" source="CVE"/>
    <description>
    Integer overflow in the _zip_readcdir function in zip_open.c in libzip 0.10 allows remote attackers to execute arbitrary code via the size and offset values for the central directory in a zip archive, which triggers "improper restrictions of operations within the bounds of a memory buffer" and an information leak.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1163.html">CVE-2012-1163</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1163">SUSE bug 751830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1163">SUSE bug 751829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1163">SUSE bug 751830</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138977" comment="libzip-devel-0.11.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151554" comment="libzip-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138978" comment="libzip2-0.11.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151555" comment="libzip2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1165</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1165" source="CVE"/>
    <description>
    The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulnerability than CVE-2006-7250.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1165.html">CVE-2012-1165</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1165">SUSE bug 751946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1165">SUSE bug 754640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1165">SUSE bug 754640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1165">SUSE bug 749210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1165">SUSE bug 749213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1165">SUSE bug 751946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1165">SUSE bug 754640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1165">SUSE bug 751946</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1173</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1173" source="CVE"/>
    <description>
    Multiple integer overflows in tiff_getimage.c in LibTIFF 3.9.4 allow remote attackers to execute arbitrary code via a crafted tile size in a TIFF file, which is not properly handled by the (1) gtTileSeparate or (2) gtStripSeparate function, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1173.html">CVE-2012-1173</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1173">SUSE bug 753362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1173">SUSE bug 753362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1173">SUSE bug 753362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1173">SUSE bug 753362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1173">SUSE bug 854393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1173">SUSE bug 753362</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1174</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1174" source="CVE"/>
    <description>
    The rm_rf_children function in util.c in the systemd-logind login manager in systemd before 44, when logging out, allows local users to delete arbitrary files via a symlink attack on unspecified files, related to "particular records related with user session."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1174.html">CVE-2012-1174</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1174">SUSE bug 752281</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138639" comment="libgudev-1_0-0-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151688" comment="libgudev-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138640" comment="libgudev-1_0-devel-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151689" comment="libgudev-1_0-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138641" comment="libudev-devel-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151690" comment="libudev-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138642" comment="libudev1-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151691" comment="libudev1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138643" comment="libudev1-32bit-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151692" comment="libudev1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138644" comment="systemd-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151693" comment="systemd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138645" comment="systemd-32bit-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151694" comment="systemd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138646" comment="systemd-bash-completion-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151695" comment="systemd-bash-completion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138647" comment="systemd-logger-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151696" comment="systemd-logger is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138648" comment="systemd-sysvinit-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151697" comment="systemd-sysvinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138649" comment="typelib-1_0-GUdev-1_0-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151698" comment="typelib-1_0-GUdev-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138650" comment="udev-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151699" comment="udev is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1182</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182" source="CVE"/>
    <description>
    The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1182.html">CVE-2012-1182</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1182">SUSE bug 752797</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1182">SUSE bug 747934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1182">SUSE bug 752797</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1182">SUSE bug 754443</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1185</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1185" source="CVE"/>
    <description>
    Multiple integer overflows in (1) magick/profile.c or (2) magick/property.c in ImageMagick 6.7.5 and earlier allow remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset value in the ResolutionUnit tag in the EXIF IFD0 of an image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0247.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1185.html">CVE-2012-1185</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1185">SUSE bug 752879</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138035" comment="ImageMagick-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138036" comment="ImageMagick-devel-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138037" comment="ImageMagick-doc-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138038" comment="ImageMagick-extra-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138039" comment="libMagick++-6_Q16-3-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138040" comment="libMagickCore-6_Q16-1-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138041" comment="libMagickWand-6_Q16-1-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138042" comment="perl-PerlMagick-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1186</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1186" source="CVE"/>
    <description>
    Integer overflow in the SyncImageProfiles function in profile.c in ImageMagick 6.7.5-8 and earlier allows remote attackers to cause a denial of service (infinite loop) via crafted IOP tag offsets in the IFD in an image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0248.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1186.html">CVE-2012-1186</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1186">SUSE bug 752879</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138035" comment="ImageMagick-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138036" comment="ImageMagick-devel-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138037" comment="ImageMagick-doc-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138038" comment="ImageMagick-extra-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138039" comment="libMagick++-6_Q16-3-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138040" comment="libMagickCore-6_Q16-1-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138041" comment="libMagickWand-6_Q16-1-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138042" comment="perl-PerlMagick-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1457</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1457" source="CVE"/>
    <description>
    The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1457.html">CVE-2012-1457</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1457">SUSE bug 753611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1457">SUSE bug 767574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1457">SUSE bug 753611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1457">SUSE bug 753611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1457">SUSE bug 753611</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138164" comment="clamav-0.98.7-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1458</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1458" source="CVE"/>
    <description>
    The Microsoft CHM file parser in ClamAV 0.96.4 and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via a crafted reset interval in the LZXC header of a CHM file.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CHM parser implementations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1458.html">CVE-2012-1458</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1458">SUSE bug 753613</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1458">SUSE bug 767574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1458">SUSE bug 753613</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1458">SUSE bug 753613</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1458">SUSE bug 753613</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138164" comment="clamav-0.98.7-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1459</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1459" source="CVE"/>
    <description>
    The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1459.html">CVE-2012-1459</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1459">SUSE bug 753610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1459">SUSE bug 753610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1459">SUSE bug 767574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1459">SUSE bug 753610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1459">SUSE bug 753610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1459">SUSE bug 753610</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138164" comment="clamav-0.98.7-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1569</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1569" source="CVE"/>
    <description>
    The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1569.html">CVE-2012-1569</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1569">SUSE bug 753301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1569">SUSE bug 752193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1569">SUSE bug 752193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1569">SUSE bug 924966</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138369" comment="gnutls-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138370" comment="libgnutls-devel-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138371" comment="libgnutls-openssl27-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151158" comment="libgnutls-openssl27 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138372" comment="libgnutls28-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151159" comment="libgnutls28 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138373" comment="libgnutls28-32bit-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151160" comment="libgnutls28-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1571</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1571" source="CVE"/>
    <description>
    file before 5.11 and libmagic allow remote attackers to cause a denial of service (crash) via a crafted Composite Document File (CDF) file that triggers (1) an out-of-bounds read or (2) an invalid pointer dereference.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1571.html">CVE-2012-1571</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1571">SUSE bug 753303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1571">SUSE bug 753303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1571">SUSE bug 883306</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1571">SUSE bug 883306</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1571">SUSE bug 884986</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1571">SUSE bug 884986</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1571">SUSE bug 987530</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138277" comment="file-5.19-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151700" comment="file is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138278" comment="file-devel-5.19-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151701" comment="file-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138279" comment="file-magic-5.19-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151702" comment="file-magic is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138280" comment="libmagic1-5.19-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151703" comment="libmagic1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138281" comment="libmagic1-32bit-5.19-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151704" comment="libmagic1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1573</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1573" source="CVE"/>
    <description>
    gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1573.html">CVE-2012-1573</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1573">SUSE bug 754223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1573">SUSE bug 752193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1573">SUSE bug 752193</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138369" comment="gnutls-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138370" comment="libgnutls-devel-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138371" comment="libgnutls-openssl27-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151158" comment="libgnutls-openssl27 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138372" comment="libgnutls28-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151159" comment="libgnutls28 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138373" comment="libgnutls28-32bit-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151160" comment="libgnutls28-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1586</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1586" source="CVE"/>
    <description>
    mount.cifs in cifs-utils 2.6 allows local users to determine the existence of arbitrary files or directories via the file path in the second argument, which reveals their existence in an error message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1586.html">CVE-2012-1586</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1586">SUSE bug 754443</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1586">SUSE bug 754443</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138163" comment="cifs-utils-6.4-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151261" comment="cifs-utils is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1616</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1616" source="CVE"/>
    <description>
    Use-after-free vulnerability in icclib before 2.13, as used by Argyll CMS before 1.4 and possibly other programs, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted ICC profile file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1616.html">CVE-2012-1616</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1616">SUSE bug 768322</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138121" comment="argyllcms-1.6.3-3.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151705" comment="argyllcms is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1667</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667" source="CVE"/>
    <description>
    ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1667.html">CVE-2012-1667</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1667">SUSE bug 765315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1667">SUSE bug 792926</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1823</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1823" source="CVE"/>
    <description>
    sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1823.html">CVE-2012-1823</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1823">SUSE bug 760536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1823">SUSE bug 761631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1823">SUSE bug 761631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1823">SUSE bug 761631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1823">SUSE bug 760536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1823">SUSE bug 850694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1823">SUSE bug 850694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1823">SUSE bug 850694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1823">SUSE bug 850694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1823">SUSE bug 850694</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1937</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1937" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1937.html">CVE-2012-1937</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1937">SUSE bug 765204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1938</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1938" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 13.0, Thunderbird before 13.0, and SeaMonkey before 2.10 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) methodjit/ImmutableSync.cpp, (2) the JSObject::makeDenseArraySlow function in js/src/jsarray.cpp, and unknown other components.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1938.html">CVE-2012-1938</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1938">SUSE bug 765204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1940</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1940" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsFrameList::FirstChild function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) by changing the size of a container of absolutely positioned elements in a column.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1940.html">CVE-2012-1940</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1940">SUSE bug 765204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1941</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1941" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsHTMLReflowState::CalculateHypotheticalBox function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code by resizing a window displaying absolutely positioned and relatively positioned elements in nested columns.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1941.html">CVE-2012-1941</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1941">SUSE bug 765204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1944</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1944" source="CVE"/>
    <description>
    The Content Security Policy (CSP) implementation in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 does not block inline event handlers, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted HTML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1944.html">CVE-2012-1944</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1944">SUSE bug 765204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1945</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1945" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1945.html">CVE-2012-1945</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1945">SUSE bug 765204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1946</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1946" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsINode::ReplaceOrInsertBefore function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 might allow remote attackers to execute arbitrary code via document changes involving replacement or insertion of a node.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1946.html">CVE-2012-1946</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1946">SUSE bug 765204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1947</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1947" source="CVE"/>
    <description>
    Heap-based buffer overflow in the utf16_to_isolatin1 function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code via vectors that trigger a character-set conversion failure.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1947.html">CVE-2012-1947</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1947">SUSE bug 765204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1948</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1948" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1948.html">CVE-2012-1948</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1948">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1949</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1949" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 13.0, Thunderbird 5.0 through 13.0, and SeaMonkey before 2.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1949.html">CVE-2012-1949</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1949">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1950</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1950" source="CVE"/>
    <description>
    The drag-and-drop implementation in Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 allows remote attackers to spoof the address bar by canceling a page load.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1950.html">CVE-2012-1950</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1950">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1951</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1951" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1951" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsSMILTimeValueSpec::IsEventBased function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code by interacting with objects used for SMIL Timing.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1951.html">CVE-2012-1951</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1951">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1952</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1952" source="CVE"/>
    <description>
    The nsTableFrame::InsertFrames function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly perform a cast of a frame variable during processing of mixed row-group and column-group frames, which might allow remote attackers to execute arbitrary code via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1952.html">CVE-2012-1952</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1952">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1953</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1953" source="CVE"/>
    <description>
    The ElementAnimations::EnsureStyleRuleFor function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (buffer over-read, incorrect pointer dereference, and heap-based buffer overflow) or possibly execute arbitrary code via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1953.html">CVE-2012-1953</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1953">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1954</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1954" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsDocument::AdoptNode function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code via vectors involving multiple adoptions and empty documents.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1954.html">CVE-2012-1954</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1954">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1955</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1955" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allow remote attackers to spoof the address bar via vectors involving history.forward and history.back calls.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1955.html">CVE-2012-1955</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1955">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1956</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1956" source="CVE"/>
    <description>
    Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12 do not prevent use of the Object.defineProperty method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1956.html">CVE-2012-1956</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1956">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1957</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1957" source="CVE"/>
    <description>
    An unspecified parser-utility class in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly handle EMBED elements within description elements in RSS feeds, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a feed.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1957.html">CVE-2012-1957</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1957">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1958</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1958" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsGlobalWindow::PageHidden function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 might allow remote attackers to execute arbitrary code via vectors related to focused content.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1958.html">CVE-2012-1958</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1958">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1959</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1959" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not consider the presence of same-compartment security wrappers (SCSW) during the cross-compartment wrapping of objects, which allows remote attackers to bypass intended XBL access restrictions via crafted content.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1959.html">CVE-2012-1959</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1959">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1960</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1960" source="CVE"/>
    <description>
    The qcms_transform_data_rgb_out_lut_sse2 function in the QCMS implementation in Mozilla Firefox 4.x through 13.0, Thunderbird 5.0 through 13.0, and SeaMonkey before 2.11 might allow remote attackers to obtain sensitive information from process memory via a crafted color profile that triggers an out-of-bounds read operation.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1960.html">CVE-2012-1960</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1960">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1961</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1961" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not properly handle duplicate values in X-Frame-Options headers, which makes it easier for remote attackers to conduct clickjacking attacks via a FRAME element referencing a web site that produces these duplicate values.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1961.html">CVE-2012-1961</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1961">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1962</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1962" source="CVE"/>
    <description>
    Use-after-free vulnerability in the JSDependentString::undepend function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via vectors involving strings with multiple dependencies.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1962.html">CVE-2012-1962</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1962">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1963</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1963" source="CVE"/>
    <description>
    The Content Security Policy (CSP) functionality in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly restrict the strings placed into the blocked-uri parameter of a violation report, which allows remote web servers to capture OpenID credentials and OAuth 2.0 access tokens by triggering a violation.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1963.html">CVE-2012-1963</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1963">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1965</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1965" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 do not properly establish the security context of a feed: URL, which allows remote attackers to bypass unspecified cross-site scripting (XSS) protection mechanisms via a feed:javascript: URL.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1965.html">CVE-2012-1965</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1965">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1966</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1966" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 do not have the same context-menu restrictions for data: URLs as for javascript: URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1966.html">CVE-2012-1966</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1966">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1967</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1967" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1967" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not properly implement the JavaScript sandbox utility, which allows remote attackers to execute arbitrary JavaScript code with improper privileges via a javascript: URL.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1967.html">CVE-2012-1967</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1967">SUSE bug 771583</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1970</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1970" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1970.html">CVE-2012-1970</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1970">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1972</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1972" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHTMLEditor::CollapseAdjacentTextNodes function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1972.html">CVE-2012-1972</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1972">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1973</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1973" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsObjectLoadingContent::LoadObject function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1973.html">CVE-2012-1973</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1973">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1974</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1974" source="CVE"/>
    <description>
    Use-after-free vulnerability in the gfxTextRun::CanBreakLineBefore function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1974.html">CVE-2012-1974</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1974">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1975</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1975" source="CVE"/>
    <description>
    Use-after-free vulnerability in the PresShell::CompleteMove function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1975.html">CVE-2012-1975</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1975">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1976</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-1976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1976" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHTMLSelectElement::SubmitNamesValues function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-1976.html">CVE-2012-1976</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-1976">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2110</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110" source="CVE"/>
    <description>
    The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2110.html">CVE-2012-2110</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 778825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2110">SUSE bug 758060</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2111</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111" source="CVE"/>
    <description>
    The (1) CreateAccount, (2) OpenAccount, (3) AddAccountRights, and (4) RemoveAccountRights LSA RPC procedures in smbd in Samba 3.4.x before 3.4.17, 3.5.x before 3.5.15, and 3.6.x before 3.6.5 do not properly restrict modifications to the privileges database, which allows remote authenticated users to obtain the "take ownership" privilege via an LSA connection.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2111.html">CVE-2012-2111</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2111">SUSE bug 757576</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2111">SUSE bug 757576</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2111">SUSE bug 757576</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2111">SUSE bug 757576</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2111">SUSE bug 757576</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2111">SUSE bug 757576</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2111">SUSE bug 757576</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2111">SUSE bug 754443</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2111">SUSE bug 757576</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2111">SUSE bug 757576</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2111">SUSE bug 757576</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2111">SUSE bug 757576</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2113</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2113" source="CVE"/>
    <description>
    Multiple integer overflows in tiff2pdf in libtiff before 4.0.2 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2113.html">CVE-2012-2113</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2113">SUSE bug 767852</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2113">SUSE bug 767852</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2113">SUSE bug 767852</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2113">SUSE bug 767852</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2113">SUSE bug 767852</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2113">SUSE bug 767852</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2113">SUSE bug 767852</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2113">SUSE bug 854393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2113">SUSE bug 767852</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2113">SUSE bug 767852</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2141</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2141" source="CVE"/>
    <description>
    Array index error in the handle_nsExtendOutput2Table function in agent/mibgroup/agent/extend.c in Net-SNMP 5.7.1 allows remote authenticated users to cause a denial of service (out-of-bounds read and snmpd crash) via an SNMP GET request for an entry not in the extension table.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2141.html">CVE-2012-2141</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2141">SUSE bug 759352</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2141">SUSE bug 826684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2141">SUSE bug 826684</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138857" comment="libsnmp30-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151706" comment="libsnmp30 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138858" comment="libsnmp30-32bit-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151707" comment="libsnmp30-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138859" comment="net-snmp-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151708" comment="net-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138860" comment="net-snmp-devel-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151709" comment="net-snmp-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138861" comment="perl-SNMP-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151710" comment="perl-SNMP is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138862" comment="snmp-mibs-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151711" comment="snmp-mibs is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2143</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2143" source="CVE"/>
    <description>
    The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2143.html">CVE-2012-2143</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2143">SUSE bug 766797</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2143">SUSE bug 766798</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2143">SUSE bug 766799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2143">SUSE bug 766798</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2143">SUSE bug 766798</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2143">SUSE bug 766799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2143">SUSE bug 766797</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2143">SUSE bug 766798</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2143">SUSE bug 766799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2143">SUSE bug 766798</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2143">SUSE bug 766798</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2143">SUSE bug 766797</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2143">SUSE bug 766797</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2143">SUSE bug 766797</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2143">SUSE bug 766799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2143">SUSE bug 766797</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2143">SUSE bug 766799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2143">SUSE bug 766797</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2150</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2150" source="CVE"/>
    <description>
    xfs_metadump in xfsprogs before 3.2.4 does not properly obfuscate file data, which allows remote attackers to obtain sensitive information by reading a generated image.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2150.html">CVE-2012-2150</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2150">SUSE bug 939367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2150">SUSE bug 939367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2150">SUSE bug 939367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2150">SUSE bug 939367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2150">SUSE bug 939367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2150">SUSE bug 939367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2150">SUSE bug 939367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2150">SUSE bug 939367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2150">SUSE bug 939367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2150">SUSE bug 939367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2150">SUSE bug 939367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2150">SUSE bug 939367</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120999" comment="xfsprogs-3.2.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151712" comment="xfsprogs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121000" comment="xfsprogs-devel-3.2.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151713" comment="xfsprogs-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2214</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2214" source="CVE"/>
    <description>
    proxy.c in libpurple in Pidgin before 2.10.4 does not properly handle canceled SOCKS5 connection attempts, which allows user-assisted remote authenticated users to cause a denial of service (application crash) via a sequence of XMPP file-transfer requests.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2214.html">CVE-2012-2214</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2214">SUSE bug 760890</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2311</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2311" source="CVE"/>
    <description>
    sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that contain a %3D sequence but no = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2311.html">CVE-2012-2311</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2311">SUSE bug 760536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2311">SUSE bug 761631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2311">SUSE bug 761631</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2335</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2335" source="CVE"/>
    <description>
    php-wrapper.fcgi does not properly handle command-line arguments, which allows remote attackers to bypass a protection mechanism in PHP 5.3.12 and 5.4.2 and execute arbitrary code by leveraging improper interaction between the PHP sapi/cgi/cgi_main.c component and a query string beginning with a +- sequence.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2335.html">CVE-2012-2335</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2335">SUSE bug 761631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2335">SUSE bug 761631</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2336</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2336" source="CVE"/>
    <description>
    sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to cause a denial of service (resource consumption) by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'T' case.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2336.html">CVE-2012-2336</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2336">SUSE bug 761631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2336">SUSE bug 761631</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2337</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2337" source="CVE"/>
    <description>
    sudo 1.6.x and 1.7.x before 1.7.9p1, and 1.8.x before 1.8.4p5, does not properly support configurations that use a netmask syntax, which allows local users to bypass intended command restrictions in opportunistic circumstances by executing a command on a host that has an IPv4 address.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2337.html">CVE-2012-2337</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2337">SUSE bug 762327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2337">SUSE bug 762327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2337">SUSE bug 762327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2337">SUSE bug 762327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2337">SUSE bug 762327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2337">SUSE bug 762327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2337">SUSE bug 762327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2337">SUSE bug 762327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2337">SUSE bug 826687</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139098" comment="sudo-1.8.10p3-3.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2385</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2385" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2385" source="CVE"/>
    <description>
    The terminal dispatcher in mosh before 1.2.1 allows remote authenticated users to cause a denial of service (long loop and CPU consumption) via an escape sequence with a large repeat count value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2385.html">CVE-2012-2385</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138986" comment="mosh-1.2.5-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151714" comment="mosh is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2392</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2392" source="CVE"/>
    <description>
    Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 allows remote attackers to cause a denial of service (infinite loop) via vectors related to the (1) ANSI MAP, (2) ASF, (3) IEEE 802.11, (4) IEEE 802.3, and (5) LTP dissectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2392.html">CVE-2012-2392</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2392">SUSE bug 763634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2392">SUSE bug 763855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2392">SUSE bug 763855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2392">SUSE bug 763855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2392">SUSE bug 763855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2392">SUSE bug 763855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2392">SUSE bug 763855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2392">SUSE bug 769578</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2392">SUSE bug 763855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2392">SUSE bug 769578</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2392">SUSE bug 763855</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2393</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2393" source="CVE"/>
    <description>
    epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 does not properly construct certain array data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers incorrect memory allocation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2393.html">CVE-2012-2393</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2393">SUSE bug 763634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2393">SUSE bug 763857</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2393">SUSE bug 763857</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2393">SUSE bug 763857</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2393">SUSE bug 763857</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2393">SUSE bug 763855</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2394</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2394" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2394" source="CVE"/>
    <description>
    Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 on the SPARC and Itanium platforms does not properly perform data alignment for a certain structure member, which allows remote attackers to cause a denial of service (application crash) via a (1) ICMP or (2) ICMPv6 Echo Request packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2394.html">CVE-2012-2394</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2394">SUSE bug 763634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2394">SUSE bug 763859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2394">SUSE bug 763859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2394">SUSE bug 763859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2394">SUSE bug 763859</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2396</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2396" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2396" source="CVE"/>
    <description>
    VideoLAN VLC media player 2.0.1 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted MP4 file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2396.html">CVE-2012-2396</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2396">SUSE bug 760496</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138881" comment="libtag-devel-1.9.1-4.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151715" comment="libtag-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138882" comment="libtag1-1.9.1-4.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151716" comment="libtag1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138883" comment="libtag_c0-1.9.1-4.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151717" comment="libtag_c0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138884" comment="taglib-1.9.1-4.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151718" comment="taglib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2417</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2417" source="CVE"/>
    <description>
    PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2417.html">CVE-2012-2417</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2417">SUSE bug 764127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2417">SUSE bug 764127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2417">SUSE bug 764127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2417">SUSE bug 764127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2417">SUSE bug 764127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2417">SUSE bug 764127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2417">SUSE bug 764127</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139057" comment="python-pycrypto-2.6.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151719" comment="python-pycrypto is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2451</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2451" source="CVE"/>
    <description>
    The Config::IniFiles module before 2.71 for Perl creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack.  NOTE: some of these details are obtained from third party information.  NOTE: it has been reported that this might only be exploitable by writing in the same directory as the .ini file. If this is the case, then this issue might not cross privilege boundaries.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2451.html">CVE-2012-2451</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2451">SUSE bug 760459</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139028" comment="perl-Config-IniFiles-2.82-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151720" comment="perl-Config-IniFiles is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2625</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2625" source="CVE"/>
    <description>
    The PyGrub boot loader in Xen unstable before changeset 25589:60f09d1ab1fe, 4.2.x, and 4.1.x allows local para-virtualized guest users to cause a denial of service (memory consumption) via a large (1) bzip2 or (2) lzma compressed kernel image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2625.html">CVE-2012-2625</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2625">SUSE bug 762484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2625">SUSE bug 762484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2625">SUSE bug 762484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2625">SUSE bug 762484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2625">SUSE bug 762484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2625">SUSE bug 762484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2625">SUSE bug 773393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2625">SUSE bug 773393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2625">SUSE bug 773401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2625">SUSE bug 762484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2625">SUSE bug 762484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2625">SUSE bug 762484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2625">SUSE bug 762484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2625">SUSE bug 762484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2625">SUSE bug 762484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2625">SUSE bug 787163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2625">SUSE bug 762484</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2655</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2655" source="CVE"/>
    <description>
    PostgreSQL 8.3.x before 8.3.19, 8.4.x before 8.4.12, 9.0.x before 9.0.8, and 9.1.x before 9.1.4 allows remote authenticated users to cause a denial of service (server crash) by adding the (1) SECURITY DEFINER or (2) SET attributes to a procedural language's call handler.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2655.html">CVE-2012-2655</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2655">SUSE bug 765069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2655">SUSE bug 765069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2655">SUSE bug 765069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2655">SUSE bug 765069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2655">SUSE bug 765069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2655">SUSE bug 765069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2655">SUSE bug 765069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2655">SUSE bug 765069</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2669</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2669" source="CVE"/>
    <description>
    The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2669.html">CVE-2012-2669</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2669">SUSE bug 761200</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138400" comment="hyper-v-6-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151721" comment="hyper-v is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2673</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2673" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2673.html">CVE-2012-2673</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2673">SUSE bug 765444</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136646" comment="libgc1-7.2d-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151722" comment="libgc1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2686</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2686" source="CVE"/>
    <description>
    crypto/evp/e_aes_cbc_hmac_sha1.c in the AES-NI functionality in the TLS 1.1 and 1.2 implementations in OpenSSL 1.0.1 before 1.0.1d allows remote attackers to cause a denial of service (application crash) via crafted CBC data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2686.html">CVE-2012-2686</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2686">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2686">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2686">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2686">SUSE bug 802648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2687</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2687" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2687.html">CVE-2012-2687</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2687">SUSE bug 777260</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2688</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2688" source="CVE"/>
    <description>
    Unspecified vulnerability in the _php_stream_scandir function in the stream implementation in PHP before 5.3.15 and 5.4.x before 5.4.5 has unknown impact and remote attack vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2688.html">CVE-2012-2688</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2688">SUSE bug 772582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2688">SUSE bug 772582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2688">SUSE bug 772582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2688">SUSE bug 772582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2688">SUSE bug 772582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2688">SUSE bug 772582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2688">SUSE bug 772582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2688">SUSE bug 772582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2688">SUSE bug 772582</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2737</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2737" source="CVE"/>
    <description>
    The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2737.html">CVE-2012-2737</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2737">SUSE bug 768807</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138060" comment="accountsservice-0.6.40-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151723" comment="accountsservice is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138061" comment="accountsservice-lang-0.6.40-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151724" comment="accountsservice-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138062" comment="libaccountsservice0-0.6.40-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151725" comment="libaccountsservice0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138063" comment="typelib-1_0-AccountsService-1_0-0.6.40-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151726" comment="typelib-1_0-AccountsService-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2738</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2738" source="CVE"/>
    <description>
    The VteTerminal in gnome-terminal (vte) before 0.32.2 allows remote authenticated users to cause a denial of service (long loop and CPU consumption) via an escape sequence with a large repeat count value.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2738.html">CVE-2012-2738</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2738">SUSE bug 772761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2738">SUSE bug 772761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2738">SUSE bug 772761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2738">SUSE bug 772761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2738">SUSE bug 772761</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138932" comment="libvte9-0.28.2-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151727" comment="libvte9 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138933" comment="vte2-lang-0.28.2-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151728" comment="vte2-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2808</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2808" source="CVE"/>
    <description>
    The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2015-0800.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2808.html">CVE-2012-2808</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2812</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2812" source="CVE"/>
    <description>
    The exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2812.html">CVE-2012-2812</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2812">SUSE bug 771229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2812">SUSE bug 831515</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138617" comment="libexif-devel-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151729" comment="libexif-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138618" comment="libexif12-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151730" comment="libexif12 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138619" comment="libexif12-32bit-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151731" comment="libexif12-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2813</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2813" source="CVE"/>
    <description>
    The exif_convert_utf16_to_utf8 function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2813.html">CVE-2012-2813</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2813">SUSE bug 771229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2813">SUSE bug 831515</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138617" comment="libexif-devel-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151729" comment="libexif-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138618" comment="libexif12-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151730" comment="libexif12 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138619" comment="libexif12-32bit-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151731" comment="libexif12-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2814</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2814" source="CVE"/>
    <description>
    Buffer overflow in the exif_entry_format_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) 0.6.20 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted EXIF tags in an image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2814.html">CVE-2012-2814</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2814">SUSE bug 771229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2814">SUSE bug 831515</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138617" comment="libexif-devel-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151729" comment="libexif-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138618" comment="libexif12-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151730" comment="libexif12 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138619" comment="libexif12-32bit-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151731" comment="libexif12-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2836</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2836" source="CVE"/>
    <description>
    The exif_data_load_data function in exif-data.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2836.html">CVE-2012-2836</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2836">SUSE bug 771229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2836">SUSE bug 831515</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138617" comment="libexif-devel-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151729" comment="libexif-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138618" comment="libexif12-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151730" comment="libexif12 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138619" comment="libexif12-32bit-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151731" comment="libexif12-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2837</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2837" source="CVE"/>
    <description>
    The mnote_olympus_entry_get_value function in olympus/mnote-olympus-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (divide-by-zero error) via an image with crafted EXIF tags that are not properly handled during the formatting of EXIF maker note tags.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2837.html">CVE-2012-2837</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2837">SUSE bug 771229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2837">SUSE bug 831515</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138617" comment="libexif-devel-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151729" comment="libexif-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138618" comment="libexif12-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151730" comment="libexif12 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138619" comment="libexif12-32bit-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151731" comment="libexif12-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2840</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2840" source="CVE"/>
    <description>
    Off-by-one error in the exif_convert_utf16_to_utf8 function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted EXIF tags in an image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2840.html">CVE-2012-2840</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2840">SUSE bug 771229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2840">SUSE bug 831515</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138617" comment="libexif-devel-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151729" comment="libexif-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138618" comment="libexif12-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151730" comment="libexif12 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138619" comment="libexif12-32bit-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151731" comment="libexif12-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2841</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2841" source="CVE"/>
    <description>
    Integer underflow in the exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) 0.6.20 might allow remote attackers to execute arbitrary code via vectors involving a crafted buffer-size parameter during the formatting of an EXIF tag, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2841.html">CVE-2012-2841</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2841">SUSE bug 771229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2841">SUSE bug 831515</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138617" comment="libexif-devel-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151729" comment="libexif-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138618" comment="libexif12-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151730" comment="libexif12 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138619" comment="libexif12-32bit-0.6.21-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151731" comment="libexif12-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2845</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2845" source="CVE"/>
    <description>
    Integer overflow in the jpeg_data_load_data function in jpeg-data.c in libjpeg in exif 0.6.20 allows remote attackers to cause a denial of service (buffer over-read and application crash) or obtain potentially sensitive information via a crafted JPEG file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2845.html">CVE-2012-2845</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2845">SUSE bug 771229</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138271" comment="exif-0.6.21-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151732" comment="exif is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2944</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-2944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2944" source="CVE"/>
    <description>
    Buffer overflow in the addchar function in common/parseconf.c in upsd in Network UPS Tools (NUT) before 2.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (electric-power outage) via a long string containing non-printable characters.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-2944.html">CVE-2012-2944</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2944">SUSE bug 764699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2944">SUSE bug 764699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2944">SUSE bug 764699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2944">SUSE bug 764699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2944">SUSE bug 764699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2944">SUSE bug 764699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2944">SUSE bug 764699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2944">SUSE bug 764699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2944">SUSE bug 764699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2944">SUSE bug 764699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2944">SUSE bug 764699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2944">SUSE bug 764699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2944">SUSE bug 764699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2944">SUSE bug 764699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2944">SUSE bug 764699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2944">SUSE bug 764699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2944">SUSE bug 764699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-2944">SUSE bug 764699</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138902" comment="libupsclient1-2.7.1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151733" comment="libupsclient1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138903" comment="nut-2.7.1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151734" comment="nut is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138904" comment="nut-cgi-2.7.1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151735" comment="nut-cgi is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3236</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3236" source="CVE"/>
    <description>
    fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3236.html">CVE-2012-3236</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3236">SUSE bug 768376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3236">SUSE bug 769565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3236">SUSE bug 769565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3236">SUSE bug 769565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3236">SUSE bug 769565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3236">SUSE bug 769565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3236">SUSE bug 763595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3236">SUSE bug 769565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3236">SUSE bug 769565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3236">SUSE bug 769565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3236">SUSE bug 769565</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138314" comment="gimp-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138315" comment="gimp-help-browser-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151541" comment="gimp-help-browser is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138316" comment="gimp-lang-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138317" comment="gimp-plugin-aa-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138318" comment="gimp-plugins-python-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151544" comment="gimp-plugins-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138319" comment="libgimp-2_0-0-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151545" comment="libgimp-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138320" comment="libgimpui-2_0-0-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151546" comment="libgimpui-2_0-0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3291</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3291" source="CVE"/>
    <description>
    Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3291.html">CVE-2012-3291</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3291">SUSE bug 767616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3291">SUSE bug 767616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3291">SUSE bug 767616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3291">SUSE bug 767616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3291">SUSE bug 767616</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139000" comment="openconnect-7.06-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151736" comment="openconnect is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139001" comment="openconnect-devel-7.06-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151737" comment="openconnect-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3356</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3356" source="CVE"/>
    <description>
    The remote SVN views functionality (lib/vclib/svn/svn_ra.py) in ViewVC before 1.1.15 does not properly perform authorization, which allows remote attackers to bypass intended access restrictions via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3356.html">CVE-2012-3356</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3356">SUSE bug 768680</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139119" comment="viewvc-1.1.23-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151738" comment="viewvc is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3357</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3357" source="CVE"/>
    <description>
    The SVN revision view (lib/vclib/svn/svn_repos.py) in ViewVC before 1.1.15 does not properly handle log messages when a readable path is copied from an unreadable path, which allows remote attackers to obtain sensitive information, related to a "log msg leak."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3357.html">CVE-2012-3357</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3357">SUSE bug 768680</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139119" comment="viewvc-1.1.23-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151738" comment="viewvc is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3358</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3358" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the j2k_read_sot function in j2k.c in OpenJPEG 1.5 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted (1) tile number or (2) tile length in a JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3358.html">CVE-2012-3358</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3358">SUSE bug 770649</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138729" comment="libopenjpeg1-1.5.2-3.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151376" comment="libopenjpeg1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3365</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3365" source="CVE"/>
    <description>
    The SQLite functionality in PHP before 5.3.15 allows remote attackers to bypass the open_basedir protection mechanism via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3365.html">CVE-2012-3365</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3365">SUSE bug 772580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3365">SUSE bug 772580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3365">SUSE bug 772580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3365">SUSE bug 772580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3365">SUSE bug 772580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3365">SUSE bug 772580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3365">SUSE bug 772580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3365">SUSE bug 772580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3365">SUSE bug 772580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3365">SUSE bug 772582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3365">SUSE bug 772580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3365">SUSE bug 772580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3365">SUSE bug 772580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3365">SUSE bug 772580</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3374</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3374" source="CVE"/>
    <description>
    Buffer overflow in markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.5 allows remote attackers to execute arbitrary code via a crafted inline image in a message.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3374.html">CVE-2012-3374</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3374">SUSE bug 770304</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3374">SUSE bug 770304</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3374">SUSE bug 770304</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3386</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3386" source="CVE"/>
    <description>
    The "make distcheck" rule in GNU Automake before 1.11.6 and 1.12.x before 1.12.2 grants world-writable permissions to the extraction directory, which introduces a race condition that allows local users to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3386.html">CVE-2012-3386</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 786745</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3386">SUSE bug 770618</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138388" comment="gv-3.7.4-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151739" comment="gv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138743" comment="libpng12-0-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151411" comment="libpng12-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138744" comment="libpng12-0-32bit-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151412" comment="libpng12-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138745" comment="libpng12-devel-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151413" comment="libpng12-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138389" comment="wdiff-1.2.2-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151740" comment="wdiff is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138390" comment="wdiff-lang-1.2.2-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151741" comment="wdiff-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3401</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3401" source="CVE"/>
    <description>
    The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf.c) in LibTIFF 4.0.2 and earlier does not properly initialize the T2P context struct pointer in certain error conditions, which allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3401.html">CVE-2012-3401</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3401">SUSE bug 770816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3401">SUSE bug 770816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3401">SUSE bug 770816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3401">SUSE bug 770816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3401">SUSE bug 770816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3401">SUSE bug 770816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3401">SUSE bug 770816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3401">SUSE bug 770816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3401">SUSE bug 770816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3401">SUSE bug 770816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3401">SUSE bug 770816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3401">SUSE bug 770816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3401">SUSE bug 770816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3401">SUSE bug 854393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3401">SUSE bug 770816</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3412</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3412" source="CVE"/>
    <description>
    The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3412.html">CVE-2012-3412</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3412">SUSE bug 774523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3412">SUSE bug 774523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3412">SUSE bug 774523</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3422</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3422" source="CVE"/>
    <description>
    The getFirstInTableInstance function in the IcedTea-Web plugin before 1.2.1 returns an uninitialized pointer when the instance_to_id_map hash is empty, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted web page, which causes an uninitialized memory location to be read.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3422.html">CVE-2012-3422</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3422">SUSE bug 773458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3422">SUSE bug 818768</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138403" comment="icedtea-web-javadoc-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151624" comment="icedtea-web-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138404" comment="java-1_8_0-openjdk-plugin-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151625" comment="java-1_8_0-openjdk-plugin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3423</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3423" source="CVE"/>
    <description>
    The IcedTea-Web plugin before 1.2.1 does not properly handle NPVariant NPStrings without NUL terminators, which allows remote attackers to cause a denial of service (crash), obtain sensitive information from memory, or execute arbitrary code via a crafted Java applet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3423.html">CVE-2012-3423</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3423">SUSE bug 773458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3423">SUSE bug 818768</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138403" comment="icedtea-web-javadoc-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151624" comment="icedtea-web-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138404" comment="java-1_8_0-openjdk-plugin-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151625" comment="java-1_8_0-openjdk-plugin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3432</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3432" source="CVE"/>
    <description>
    The handle_mmio function in arch/x86/hvm/io.c in the MMIO operations emulator for Xen 3.3 and 4.x, when running an HVM guest, does not properly reset certain state information between emulation cycles, which allows local guest OS users to cause a denial of service (guest OS crash) via unspecified operations on MMIO regions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3432.html">CVE-2012-3432</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3432">SUSE bug 773401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3432">SUSE bug 773393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3432">SUSE bug 773401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3432">SUSE bug 773401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3432">SUSE bug 773401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3432">SUSE bug 773401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3432">SUSE bug 773401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3432">SUSE bug 773401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3432">SUSE bug 773401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3432">SUSE bug 773401</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3433</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3433" source="CVE"/>
    <description>
    Xen 4.0 and 4.1 allows local HVM guest OS kernels to cause a denial of service (domain 0 VCPU hang and kernel panic) by modifying the physical address space in a way that triggers excessive shared page search time during the p2m teardown.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3433.html">CVE-2012-3433</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3433">SUSE bug 773393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3433">SUSE bug 773393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3433">SUSE bug 773393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3433">SUSE bug 773393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3433">SUSE bug 773393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3433">SUSE bug 773401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3433">SUSE bug 773393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3433">SUSE bug 773393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3433">SUSE bug 773393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3433">SUSE bug 773393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3433">SUSE bug 773393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3433">SUSE bug 773393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3433">SUSE bug 773393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3433">SUSE bug 773393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3438</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3438" source="CVE"/>
    <description>
    The Magick_png_malloc function in coders/png.c in GraphicsMagick 6.7.8-6 does not use the proper variable type for the allocation size, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG file that triggers incorrect memory allocation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3438.html">CVE-2012-3438</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3438">SUSE bug 785093</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3438">SUSE bug 785093</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3438">SUSE bug 773612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3438">SUSE bug 785093</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3438">SUSE bug 773612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3438">SUSE bug 773612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3438">SUSE bug 773612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3438">SUSE bug 773612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3438">SUSE bug 773612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3438">SUSE bug 773612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3438">SUSE bug 785093</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3438">SUSE bug 773612</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138031" comment="GraphicsMagick-devel-1.3.21-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138032" comment="libGraphicsMagick-Q16-3-1.3.21-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138033" comment="libGraphicsMagick3-config-1.3.21-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138034" comment="libGraphicsMagickWand-Q16-2-1.3.21-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3445</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3445" source="CVE"/>
    <description>
    The virTypedParameterArrayClear function in libvirt 0.9.13 does not properly handle virDomain* API calls with typed parameters, which might allow remote authenticated users to cause a denial of service (libvirtd crash) via an RPC command with nparams set to zero, which triggers an out-of-bounds read or a free of an invalid pointer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3445.html">CVE-2012-3445</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3445">SUSE bug 773955</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3466</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3466" source="CVE"/>
    <description>
    GNOME gnome-keyring 3.4.0 through 3.4.1, when gpg-cache-method is set to "idle" or "timeout," does not properly limit the amount of time a passphrase is cached, which allows attackers to have an unspecified impact via unknown attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3466.html">CVE-2012-3466</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3466">SUSE bug 775235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3466">SUSE bug 775235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3466">SUSE bug 775235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3466">SUSE bug 775235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3466">SUSE bug 775235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3466">SUSE bug 775235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3466">SUSE bug 775235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3466">SUSE bug 775235</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138353" comment="gnome-keyring-3.16.0-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151742" comment="gnome-keyring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138354" comment="gnome-keyring-32bit-3.16.0-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151743" comment="gnome-keyring-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138355" comment="gnome-keyring-lang-3.16.0-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151744" comment="gnome-keyring-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138356" comment="gnome-keyring-pam-3.16.0-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151745" comment="gnome-keyring-pam is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138357" comment="gnome-keyring-pam-32bit-3.16.0-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151746" comment="gnome-keyring-pam-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138358" comment="libgck-modules-gnome-keyring-3.16.0-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151747" comment="libgck-modules-gnome-keyring is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3482</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3482" source="CVE"/>
    <description>
    Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3482.html">CVE-2012-3482</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3482">SUSE bug 775988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3482">SUSE bug 775988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3482">SUSE bug 775988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3482">SUSE bug 775988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3482">SUSE bug 775988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3482">SUSE bug 775988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3482">SUSE bug 775988</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138276" comment="fetchmail-6.3.26-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151334" comment="fetchmail is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3488</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3488" source="CVE"/>
    <description>
    The libxslt support in contrib/xml2 in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 does not properly restrict access to files and URLs, which allows remote authenticated users to modify data, obtain sensitive information, or trigger outbound traffic to arbitrary external hosts by leveraging (1) stylesheet commands that are permitted by the libxslt security options or (2) an xslt_process feature, related to an XML External Entity (aka XXE) issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3488.html">CVE-2012-3488</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3488">SUSE bug 776523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3488">SUSE bug 776523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3488">SUSE bug 776523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3488">SUSE bug 776523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3488">SUSE bug 776523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3488">SUSE bug 776523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3488">SUSE bug 776523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3488">SUSE bug 776523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3488">SUSE bug 776523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3488">SUSE bug 776523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3488">SUSE bug 776523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3488">SUSE bug 776523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3488">SUSE bug 776523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3488">SUSE bug 776523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3488">SUSE bug 776523</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3489</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3489" source="CVE"/>
    <description>
    The xml_parse function in the libxml2 support in the core server component in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 allows remote authenticated users to determine the existence of arbitrary files or URLs, and possibly obtain file or URL content that triggers a parsing error, via an XML value that refers to (1) a DTD or (2) an entity, related to an XML External Entity (aka XXE) issue.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3489.html">CVE-2012-3489</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3489">SUSE bug 776524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3489">SUSE bug 776524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3489">SUSE bug 776524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3489">SUSE bug 776524</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3499</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3499" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3499.html">CVE-2012-3499</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3499">SUSE bug 806458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3499">SUSE bug 807511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3499">SUSE bug 806458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3499">SUSE bug 806458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3499">SUSE bug 806458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3499">SUSE bug 806458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3499">SUSE bug 806458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3499">SUSE bug 806458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3499">SUSE bug 806458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3499">SUSE bug 806458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3499">SUSE bug 806458</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3502</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3502" source="CVE"/>
    <description>
    The proxy functionality in (1) mod_proxy_ajp.c in the mod_proxy_ajp module and (2) mod_proxy_http.c in the mod_proxy_http module in the Apache HTTP Server 2.4.x before 2.4.3 does not properly determine the situations that require closing a back-end connection, which allows remote attackers to obtain sensitive information in opportunistic circumstances by reading a response that was intended for a different client.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3502.html">CVE-2012-3502</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3502">SUSE bug 777119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3502">SUSE bug 777119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3502">SUSE bug 777119</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3515</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515" source="CVE"/>
    <description>
    Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3515.html">CVE-2012-3515</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3515">SUSE bug 777084</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139073" comment="qemu-linux-user-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3520</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3520" source="CVE"/>
    <description>
    The Netlink implementation in the Linux kernel before 3.2.30 does not properly handle messages that lack SCM_CREDENTIALS data, which might allow local users to spoof Netlink communication via a crafted message, as demonstrated by a message to (1) Avahi or (2) NetworkManager.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3520.html">CVE-2012-3520</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3520">SUSE bug 776925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3520">SUSE bug 776925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3520">SUSE bug 776925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3520">SUSE bug 776925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3520">SUSE bug 776925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3520">SUSE bug 776925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3520">SUSE bug 776925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3520">SUSE bug 776925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3520">SUSE bug 776925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3520">SUSE bug 776925</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3524</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3524" source="CVE"/>
    <description>
    libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X.org and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable.  NOTE: libdbus maintainers state that this is a vulnerability in the applications that do not cleanse environment variables, not in libdbus itself: "we do not support use of libdbus in setuid binaries that do not sanitize their environment before their first call into libdbus."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3524.html">CVE-2012-3524</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3524">SUSE bug 697105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3524">SUSE bug 852781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3524">SUSE bug 852781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3524">SUSE bug 852781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3524">SUSE bug 852781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3524">SUSE bug 852781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3524">SUSE bug 852781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3524">SUSE bug 852781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3524">SUSE bug 852781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3524">SUSE bug 697105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3524">SUSE bug 912016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3524">SUSE bug 697105</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138227" comment="dbus-1-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138228" comment="dbus-1-devel-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151536" comment="dbus-1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138229" comment="dbus-1-x11-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138330" comment="glib2-devel-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151142" comment="glib2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138331" comment="glib2-lang-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151143" comment="glib2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138332" comment="glib2-tools-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151144" comment="glib2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138230" comment="libdbus-1-3-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138231" comment="libdbus-1-3-32bit-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151539" comment="libdbus-1-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138333" comment="libgio-2_0-0-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151145" comment="libgio-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138334" comment="libgio-2_0-0-32bit-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151146" comment="libgio-2_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138335" comment="libglib-2_0-0-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151147" comment="libglib-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138336" comment="libglib-2_0-0-32bit-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151148" comment="libglib-2_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138337" comment="libgmodule-2_0-0-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151149" comment="libgmodule-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138338" comment="libgmodule-2_0-0-32bit-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151150" comment="libgmodule-2_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138339" comment="libgobject-2_0-0-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151151" comment="libgobject-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138340" comment="libgobject-2_0-0-32bit-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151152" comment="libgobject-2_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138341" comment="libgthread-2_0-0-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151153" comment="libgthread-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138342" comment="libgthread-2_0-0-32bit-2.44.1-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151154" comment="libgthread-2_0-0-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3534</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3534" source="CVE"/>
    <description>
    GNU Gatekeeper before 3.1 does not limit the number of connections to the status port, which allows remote attackers to cause a denial of service (connection and thread consumption) via a large number of connections.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3534.html">CVE-2012-3534</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3534">SUSE bug 777486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3534">SUSE bug 777486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3534">SUSE bug 777486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3534">SUSE bug 777486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3534">SUSE bug 777486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3534">SUSE bug 777486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3534">SUSE bug 777486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3534">SUSE bug 777486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3534">SUSE bug 777486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3534">SUSE bug 777486</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130654" comment="gnugk-4.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151748" comment="gnugk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130655" comment="h323plus-1.26.5-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151749" comment="h323plus is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130656" comment="h323plus-devel-1.26.5-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151750" comment="h323plus-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130657" comment="libh323-1_26_5-1.26.5-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151751" comment="libh323-1_26_5 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3535</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3535" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3535" source="CVE"/>
    <description>
    Heap-based buffer overflow in OpenJPEG 1.5.0 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted JPEG2000 file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3535.html">CVE-2012-3535</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3535">SUSE bug 777445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3535">SUSE bug 777445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3535">SUSE bug 777445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3535">SUSE bug 777445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3535">SUSE bug 777445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3535">SUSE bug 777445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3535">SUSE bug 777445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3535">SUSE bug 777445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3535">SUSE bug 777445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3535">SUSE bug 777445</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138729" comment="libopenjpeg1-1.5.2-3.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151376" comment="libopenjpeg1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3548</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3548" source="CVE"/>
    <description>
    The dissect_drda function in epan/dissectors/packet-drda.c in Wireshark 1.6.x through 1.6.10 and 1.8.x through 1.8.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a small value for a certain length field in a capture file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3548.html">CVE-2012-3548</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3548">SUSE bug 778000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3548">SUSE bug 778000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3548">SUSE bug 778000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3548">SUSE bug 778000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3548">SUSE bug 783275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3548">SUSE bug 778000</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3570</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3570" source="CVE"/>
    <description>
    Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3570.html">CVE-2012-3570</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3570">SUSE bug 772924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3570">SUSE bug 772924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3570">SUSE bug 772924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3570">SUSE bug 772924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3570">SUSE bug 772924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3570">SUSE bug 772924</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138235" comment="dhcp-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151310" comment="dhcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138236" comment="dhcp-client-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151311" comment="dhcp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138237" comment="dhcp-doc-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151312" comment="dhcp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138238" comment="dhcp-relay-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151313" comment="dhcp-relay is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138239" comment="dhcp-server-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151314" comment="dhcp-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3571</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3571" source="CVE"/>
    <description>
    ISC DHCP 4.1.2 through 4.2.4 and 4.1-ESV before 4.1-ESV-R6 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed client identifier.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3571.html">CVE-2012-3571</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3571">SUSE bug 772924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3571">SUSE bug 772924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3571">SUSE bug 772924</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138235" comment="dhcp-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151310" comment="dhcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138236" comment="dhcp-client-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151311" comment="dhcp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138237" comment="dhcp-doc-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151312" comment="dhcp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138238" comment="dhcp-relay-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151313" comment="dhcp-relay is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138239" comment="dhcp-server-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151314" comment="dhcp-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3817</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3817" source="CVE"/>
    <description>
    ISC BIND 9.4.x, 9.5.x, 9.6.x, and 9.7.x before 9.7.6-P2; 9.8.x before 9.8.3-P2; 9.9.x before 9.9.1-P2; and 9.6-ESV before 9.6-ESV-R7-P2, when DNSSEC validation is enabled, does not properly initialize the failing-query cache, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) by sending many queries.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3817.html">CVE-2012-3817</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3817">SUSE bug 772945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3817">SUSE bug 772945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3817">SUSE bug 772945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3817">SUSE bug 772945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3817">SUSE bug 772945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3817">SUSE bug 772945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3817">SUSE bug 772945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3817">SUSE bug 772945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3817">SUSE bug 792926</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3868</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3868" source="CVE"/>
    <description>
    Race condition in the ns_client structure management in ISC BIND 9.9.x before 9.9.1-P2 allows remote attackers to cause a denial of service (memory consumption or process exit) via a large volume of TCP queries.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3868.html">CVE-2012-3868</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3868">SUSE bug 772946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3868">SUSE bug 772946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3868">SUSE bug 772946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3868">SUSE bug 772946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3868">SUSE bug 792926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3868">SUSE bug 772946</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3954</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3954" source="CVE"/>
    <description>
    Multiple memory leaks in ISC DHCP 4.1.x and 4.2.x before 4.2.4-P1 and 4.1-ESV before 4.1-ESV-R6 allow remote attackers to cause a denial of service (memory consumption) by sending many requests.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3954.html">CVE-2012-3954</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3954">SUSE bug 772924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3954">SUSE bug 772924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3954">SUSE bug 772924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3954">SUSE bug 772924</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138235" comment="dhcp-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151310" comment="dhcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138236" comment="dhcp-client-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151311" comment="dhcp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138237" comment="dhcp-doc-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151312" comment="dhcp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138238" comment="dhcp-relay-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151313" comment="dhcp-relay is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138239" comment="dhcp-server-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151314" comment="dhcp-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3955</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3955" source="CVE"/>
    <description>
    ISC DHCP 4.1.x before 4.1-ESV-R7 and 4.2.x before 4.2.4-P2 allows remote attackers to cause a denial of service (daemon crash) in opportunistic circumstances by establishing an IPv6 lease in an environment where the lease expiration time is later reduced.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3955.html">CVE-2012-3955</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3955">SUSE bug 780167</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3955">SUSE bug 780167</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3955">SUSE bug 780167</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3955">SUSE bug 780167</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3955">SUSE bug 780167</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3955">SUSE bug 780167</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138235" comment="dhcp-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151310" comment="dhcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138236" comment="dhcp-client-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151311" comment="dhcp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138237" comment="dhcp-doc-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151312" comment="dhcp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138238" comment="dhcp-relay-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151313" comment="dhcp-relay is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138239" comment="dhcp-server-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151314" comment="dhcp-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3956</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3956" source="CVE"/>
    <description>
    Use-after-free vulnerability in the MediaStreamGraphThreadRunnable::Run function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3956.html">CVE-2012-3956</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3956">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3957</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3957" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsBlockFrame::MarkLineDirty function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3957.html">CVE-2012-3957</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3957">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3958</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3958" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHTMLEditRules::DeleteNonTableElements function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3958.html">CVE-2012-3958</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3958">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3959</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3959" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsRangeUpdater::SelAdjDeleteNode function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3959.html">CVE-2012-3959</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3959">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3960</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3960" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozSpellChecker::SetCurrentDictionary function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3960.html">CVE-2012-3960</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3960">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3961</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3961" source="CVE"/>
    <description>
    Use-after-free vulnerability in the RangeData implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3961.html">CVE-2012-3961</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3961">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3962</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3962" source="CVE"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly iterate through the characters in a text run, which allows remote attackers to execute arbitrary code via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3962.html">CVE-2012-3962</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3962">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3963</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3963" source="CVE"/>
    <description>
    Use-after-free vulnerability in the js::gc::MapAllocToTraceKind function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3963.html">CVE-2012-3963</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3963">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3964</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3964" source="CVE"/>
    <description>
    Use-after-free vulnerability in the gfxTextRun::GetUserData function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3964.html">CVE-2012-3964</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3964">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3965</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3965" source="CVE"/>
    <description>
    Mozilla Firefox before 15.0 does not properly restrict navigation to the about:newtab page, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers creation of a new tab and then a new window.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3965.html">CVE-2012-3965</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3965">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3966</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3966" source="CVE"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a negative height value in a BMP image within a .ICO file, related to (1) improper handling of the transparency bitmask by the nsICODecoder component and (2) improper processing of the alpha channel by the nsBMPDecoder component.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3966.html">CVE-2012-3966</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3966">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3967</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3967" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3967" source="CVE"/>
    <description>
    The WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 on Linux, when a large number of sampler uniforms are used, does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3967.html">CVE-2012-3967</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3967">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3968</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3968" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3968" source="CVE"/>
    <description>
    Use-after-free vulnerability in the WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via vectors related to deletion of a fragment shader by its accessor.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3968.html">CVE-2012-3968</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3968">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3969</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3969" source="CVE"/>
    <description>
    Integer overflow in the nsSVGFEMorphologyElement::Filter function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via a crafted SVG filter that triggers an incorrect sum calculation, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3969.html">CVE-2012-3969</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3969">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3970</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3970" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTArray_base::Length function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving movement of a requiredFeatures attribute from one SVG document to another.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3970.html">CVE-2012-3970</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3970">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3971</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3971" source="CVE"/>
    <description>
    Summer Institute of Linguistics (SIL) Graphite 2, as used in Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the (1) Silf::readClassMap and (2) Pass::readPass functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3971.html">CVE-2012-3971</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3971">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3972</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3972" source="CVE"/>
    <description>
    The format-number functionality in the XSLT implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to obtain sensitive information via unspecified vectors that trigger a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3972.html">CVE-2012-3972</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3972">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3973</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3973" source="CVE"/>
    <description>
    The debugger in the developer-tools subsystem in Mozilla Firefox before 15.0, when remote debugging is disabled, does not properly restrict access to the remote-debugging service, which allows remote attackers to execute arbitrary code by leveraging the presence of the HTTPMonitor extension and connecting to that service through the HTTPMonitor port.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3973.html">CVE-2012-3973</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3973">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3975</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3975" source="CVE"/>
    <description>
    The DOMParser component in Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12 loads subresources during parsing of text/html data within an extension, which allows remote attackers to obtain sensitive information by providing crafted data to privileged extension code.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3975.html">CVE-2012-3975</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3975">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3976</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3976" source="CVE"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote attackers to spoof the X.509 certificate information in the address bar via a crafted web page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3976.html">CVE-2012-3976</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3976">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3978</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3978" source="CVE"/>
    <description>
    The nsLocation::CheckURL function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 does not properly follow the security model of the location object, which allows remote attackers to bypass intended content-loading restrictions or possibly have unspecified other impact via vectors involving chrome code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3978.html">CVE-2012-3978</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3978">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3980</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3980" source="CVE"/>
    <description>
    The web console in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, and Thunderbird ESR 10.x before 10.0.7 allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that injects this code and triggers an eval operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3980.html">CVE-2012-3980</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3980">SUSE bug 777588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3982</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3982" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3982.html">CVE-2012-3982</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3982">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3983</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3983" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3983.html">CVE-2012-3983</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3983">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3984</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3984" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly handle navigation away from a web page that has a SELECT element's menu active, which allows remote attackers to spoof page content via vectors involving absolute positioning and scrolling.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3984.html">CVE-2012-3984</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3984">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3985</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3985" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly implement the HTML5 Same Origin Policy, which allows remote attackers to conduct cross-site scripting (XSS) attacks by leveraging initial-origin access after document.domain has been set.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3985.html">CVE-2012-3985</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3985">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3986</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3986" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict calls to DOMWindowUtils (aka nsDOMWindowUtils) methods, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3986.html">CVE-2012-3986</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3986">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3988</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3988" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 might allow user-assisted remote attackers to execute arbitrary code via vectors involving use of mozRequestFullScreen to enter full-screen mode, and use of the history.back method for backwards history navigation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3988.html">CVE-2012-3988</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3988">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3989</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3989" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly perform a cast of an unspecified variable during use of the instanceof operator on a JavaScript object, which allows remote attackers to execute arbitrary code or cause a denial of service (assertion failure) via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3989.html">CVE-2012-3989</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3989">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3990</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3990" source="CVE"/>
    <description>
    Use-after-free vulnerability in the IME State Manager implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors, related to the nsIContent::GetNameSpaceID function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3990.html">CVE-2012-3990</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3990">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3991</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3991" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict JSAPI access to the GetProperty function, which allows remote attackers to bypass the Same Origin Policy and possibly have unspecified other impact via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3991.html">CVE-2012-3991</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3991">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3992</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3992" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage history data, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive POST content via vectors involving a location.hash write operation and history navigation that triggers the loading of a URL into the history object.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3992.html">CVE-2012-3992</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3992">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3993</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3993" source="CVE"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not properly interact with failures of InstallTrigger methods, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site, related to an "XrayWrapper pollution" issue.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3993.html">CVE-2012-3993</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3993">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3994</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3994" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3994" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to conduct cross-site scripting (XSS) attacks via a binary plugin that uses Object.defineProperty to shadow the top object, and leverages the relationship between top.location and the location property.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3994.html">CVE-2012-3994</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3994">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3995</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-3995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3995" source="CVE"/>
    <description>
    The IsCSSWordSpacingSpace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-3995.html">CVE-2012-3995</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-3995">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4024</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4024" source="CVE"/>
    <description>
    Stack-based buffer overflow in the get_component function in unsquashfs.c in unsquashfs in Squashfs 4.2 and earlier allows remote attackers to execute arbitrary code via a crafted list file (aka a crafted file for the -ef option).  NOTE: probably in most cases, the list file is a trusted file constructed by the program's user; however, there are some realistic situations in which a list file would be obtained from an untrusted remote source.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4024.html">CVE-2012-4024</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4024">SUSE bug 773015</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139091" comment="squashfs-4.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151752" comment="squashfs is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4025</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4025" source="CVE"/>
    <description>
    Integer overflow in the queue_init function in unsquashfs.c in unsquashfs in Squashfs 4.2 and earlier allows remote attackers to execute arbitrary code via a crafted block_log field in the superblock of a .sqsh file, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4025.html">CVE-2012-4025</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4025">SUSE bug 773015</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139091" comment="squashfs-4.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151752" comment="squashfs is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4048</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4048" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4048" source="CVE"/>
    <description>
    The PPP dissector in Wireshark 1.4.x before 1.4.14, 1.6.x before 1.6.9, and 1.8.x before 1.8.1 allows remote attackers to cause a denial of service (invalid pointer dereference and application crash) via a crafted packet, as demonstrated by a usbmon dump.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4048.html">CVE-2012-4048</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4048">SUSE bug 772738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4048">SUSE bug 772738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4048">SUSE bug 772738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4048">SUSE bug 772738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4048">SUSE bug 772738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4048">SUSE bug 772738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4048">SUSE bug 772738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4048">SUSE bug 772738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4048">SUSE bug 772738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4048">SUSE bug 772738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4048">SUSE bug 772738</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4049</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4049" source="CVE"/>
    <description>
    epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.4.x before 1.4.14, 1.6.x before 1.6.9, and 1.8.x before 1.8.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4049.html">CVE-2012-4049</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4049">SUSE bug 772738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4049">SUSE bug 772738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4049">SUSE bug 772738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4049">SUSE bug 772738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4049">SUSE bug 772738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4049">SUSE bug 772738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4049">SUSE bug 772738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4049">SUSE bug 772738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4049">SUSE bug 772738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4049">SUSE bug 772738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4049">SUSE bug 772738</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4179</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4179" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHTMLCSSUtils::CreateCSSPropertyTxn function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4179.html">CVE-2012-4179</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4179">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4180</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4180" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsHTMLEditor::IsPrevCharInNodeWhitespace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4180.html">CVE-2012-4180</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4180">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4181</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4181" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsSMILAnimationController::DoSample function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4181.html">CVE-2012-4181</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4181">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4182</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4182" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTextEditRules::WillInsert function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4182.html">CVE-2012-4182</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4182">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4183</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4183" source="CVE"/>
    <description>
    Use-after-free vulnerability in the DOMSVGTests::GetRequiredFeatures function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4183.html">CVE-2012-4183</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4183">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4184</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4184" source="CVE"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not prevent access to properties of a prototype for a standard class, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4184.html">CVE-2012-4184</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4184">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4185</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4185" source="CVE"/>
    <description>
    Buffer overflow in the nsCharTraits::length function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4185.html">CVE-2012-4185</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4185">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4186</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4186" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsWaveReader::DecodeAudioData function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4186.html">CVE-2012-4186</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4186">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4187</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4187" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage a certain insPos variable, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and assertion failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4187.html">CVE-2012-4187</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4187">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4188</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4188" source="CVE"/>
    <description>
    Heap-based buffer overflow in the Convolve3x3 function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4188.html">CVE-2012-4188</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4188">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4191</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4191" source="CVE"/>
    <description>
    The mozilla::net::FailDelayManager::Lookup function in the WebSockets implementation in Mozilla Firefox before 16.0.1, Thunderbird before 16.0.1, and SeaMonkey before 2.13.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4191.html">CVE-2012-4191</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4192</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4192" source="CVE"/>
    <description>
    Mozilla Firefox 16.0, Thunderbird 16.0, and SeaMonkey 2.13 allow remote attackers to bypass the Same Origin Policy and read the properties of a Location object via a crafted web site, a related issue to CVE-2012-4193.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4192.html">CVE-2012-4192</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4193</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4193" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4193.html">CVE-2012-4193</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4193">SUSE bug 783533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4194</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4194" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 do not prevent use of the valueOf method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4194.html">CVE-2012-4194</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4194">SUSE bug 786522</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4195</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4195" source="CVE"/>
    <description>
    The nsLocation::CheckURL function in Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 does not properly determine the calling document and principal in its return value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site, and makes it easier for remote attackers to execute arbitrary JavaScript code by leveraging certain add-on behavior.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4195.html">CVE-2012-4195</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4195">SUSE bug 786522</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4196</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4196" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 allow remote attackers to bypass the Same Origin Policy and read the Location object via a prototype property-injection attack that defeats certain protection mechanisms for this object.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4196.html">CVE-2012-4196</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4196">SUSE bug 786522</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4201</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4201" source="CVE"/>
    <description>
    The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4201.html">CVE-2012-4201</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4201">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4202</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4202" source="CVE"/>
    <description>
    Heap-based buffer overflow in the image::RasterImage::DrawFrameTo function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via a crafted GIF image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4202.html">CVE-2012-4202</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4202">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4203</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4203" source="CVE"/>
    <description>
    The New Tab page in Mozilla Firefox before 17.0 uses a privileged context for execution of JavaScript code by bookmarklets, which allows user-assisted remote attackers to run arbitrary programs by leveraging a javascript: URL in a bookmark.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4203.html">CVE-2012-4203</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4203">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4204</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4204" source="CVE"/>
    <description>
    The str_unescape function in the JavaScript engine in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4204.html">CVE-2012-4204</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4204">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4205</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4205" source="CVE"/>
    <description>
    Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 assign the system principal, rather than the sandbox principal, to XMLHttpRequest objects created in sandboxes, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks or obtain sensitive information by leveraging a sandboxed add-on.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4205.html">CVE-2012-4205</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4205">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4207</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4207" source="CVE"/>
    <description>
    The HZ-GB-2312 character-set implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly handle a ~ (tilde) character in proximity to a chunk delimiter, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4207.html">CVE-2012-4207</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4207">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4208</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4208" source="CVE"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 does not consider the compartment during property filtering, which allows remote attackers to bypass intended chrome-only restrictions on reading DOM object properties via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4208.html">CVE-2012-4208</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4208">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4209</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4209" source="CVE"/>
    <description>
    Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 do not prevent use of a "top" frame name-attribute value to access the location property, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a binary plugin.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4209.html">CVE-2012-4209</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4209">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4210</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4210" source="CVE"/>
    <description>
    The Style Inspector in Mozilla Firefox before 17.0 and Firefox ESR 10.x before 10.0.11 does not properly restrict the context of HTML markup and Cascading Style Sheets (CSS) token sequences, which allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted stylesheet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4210.html">CVE-2012-4210</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4210">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4212</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4212" source="CVE"/>
    <description>
    Use-after-free vulnerability in the XPCWrappedNative::Mark function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4212.html">CVE-2012-4212</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4212">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4213</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4213" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEditor::FindNextLeafNode function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4213.html">CVE-2012-4213</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4213">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4214</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4214" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-5840.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4214.html">CVE-2012-4214</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4214">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4215</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4215" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsPlaintextEditor::FireClipboardEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4215.html">CVE-2012-4215</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4215">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4216</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4216" source="CVE"/>
    <description>
    Use-after-free vulnerability in the gfxFont::GetFontEntry function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4216.html">CVE-2012-4216</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4216">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4217</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4217" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsViewManager::ProcessPendingUpdates function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4217.html">CVE-2012-4217</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4217">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4218</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4218" source="CVE"/>
    <description>
    Use-after-free vulnerability in the BuildTextRunsScanner::BreakSink::SetBreaks function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4218.html">CVE-2012-4218</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4218">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4244</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4244" source="CVE"/>
    <description>
    ISC BIND 9.x before 9.7.6-P3, 9.8.x before 9.8.3-P3, 9.9.x before 9.9.1-P3, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P3 allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a long resource record.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4244.html">CVE-2012-4244</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4244">SUSE bug 780157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4244">SUSE bug 780157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4244">SUSE bug 780157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4244">SUSE bug 780157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4244">SUSE bug 780157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4244">SUSE bug 780157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4244">SUSE bug 780157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4244">SUSE bug 780157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4244">SUSE bug 780157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4244">SUSE bug 780157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4244">SUSE bug 780157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4244">SUSE bug 780157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4244">SUSE bug 792926</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4285</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4285" source="CVE"/>
    <description>
    The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a zero-length message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4285.html">CVE-2012-4285</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4285">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4286</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4286" source="CVE"/>
    <description>
    The pcapng_read_packet_block function in wiretap/pcapng.c in the pcap-ng file parser in Wireshark 1.8.x before 1.8.2 allows user-assisted remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted pcap-ng file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4286.html">CVE-2012-4286</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4286">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4287</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4287" source="CVE"/>
    <description>
    epan/dissectors/packet-mongo.c in the MongoDB dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a small value for a BSON document length.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4287.html">CVE-2012-4287</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4287">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4288</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4288" source="CVE"/>
    <description>
    Integer overflow in the dissect_xtp_ecntl function in epan/dissectors/packet-xtp.c in the XTP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop or application crash) via a large value for a span length.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4288.html">CVE-2012-4288</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4288">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4289</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4289" source="CVE"/>
    <description>
    epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a large number of ACL entries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4289.html">CVE-2012-4289</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4289">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4290</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4290" source="CVE"/>
    <description>
    The CTDB dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4290.html">CVE-2012-4290</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4290">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4291</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4291" source="CVE"/>
    <description>
    The CIP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4291.html">CVE-2012-4291</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4291">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4292</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4292" source="CVE"/>
    <description>
    The dissect_stun_message function in epan/dissectors/packet-stun.c in the STUN dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 does not properly interact with key-destruction behavior in a certain tree library, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4292.html">CVE-2012-4292</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4292">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4293</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4293" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4293" source="CVE"/>
    <description>
    plugins/ethercat/packet-ecatmb.c in the EtherCAT Mailbox dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 does not properly handle certain integer fields, which allows remote attackers to cause a denial of service (application exit) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4293.html">CVE-2012-4293</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4293">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4294</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4294" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4294" source="CVE"/>
    <description>
    Buffer overflow in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a large speed (aka rate) value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4294.html">CVE-2012-4294</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4294">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4295</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4295" source="CVE"/>
    <description>
    Array index error in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 might allow remote attackers to cause a denial of service (application crash) via a crafted speed (aka rate) value.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4295.html">CVE-2012-4295</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4295">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4296</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4296" source="CVE"/>
    <description>
    Buffer overflow in epan/dissectors/packet-rtps2.c in the RTPS2 dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (CPU consumption) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4296.html">CVE-2012-4296</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4296">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4297</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4297" source="CVE"/>
    <description>
    Buffer overflow in the dissect_gsm_rlcmac_downlink function in epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC MAC dissector in Wireshark 1.6.x before 1.6.10 and 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4297.html">CVE-2012-4297</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4297">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4298</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4298" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4298" source="CVE"/>
    <description>
    Integer signedness error in the vwr_read_rec_data_ethernet function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.2 allows user-assisted remote attackers to execute arbitrary code via a crafted packet-trace file that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4298.html">CVE-2012-4298</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4298">SUSE bug 776083</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4411</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411" source="CVE"/>
    <description>
    The graphical console in Xen 4.0, 4.1 and 4.2 allows local OS guest administrators to obtain sensitive host resource information via the qemu monitor.  NOTE: this might be a duplicate of CVE-2007-0998.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4411.html">CVE-2012-4411</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4411">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4411">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4411">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4411">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4411">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4411">SUSE bug 786518</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4411">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4411">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4411">SUSE bug 787163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4411">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4411">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4411">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4411">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4411">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4411">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4411">SUSE bug 779212</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4412</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412" source="CVE"/>
    <description>
    Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4412.html">CVE-2012-4412</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 779320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 779320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 779320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 779320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 779320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 779320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 779320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 848783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 779320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 779320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 779320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 779320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 779320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 779320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 920055</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 920169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 920338</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 920169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4412">SUSE bug 920338</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138343" comment="glibc-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138344" comment="glibc-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138345" comment="glibc-devel-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138346" comment="glibc-extra-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138347" comment="glibc-info-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138348" comment="glibc-locale-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138349" comment="glibc-locale-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138350" comment="nscd-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4425</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4425" source="CVE"/>
    <description>
    libgio, when used in setuid or other privileged programs in spice-gtk and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable.  NOTE: it could be argued that this is a vulnerability in the applications that do not cleanse environment variables, not in libgio itself.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4425.html">CVE-2012-4425</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138867" comment="libspice-client-glib-2_0-8-0.29-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151753" comment="libspice-client-glib-2_0-8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138868" comment="libspice-client-gtk-2_0-4-0.29-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151754" comment="libspice-client-gtk-2_0-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138869" comment="libspice-client-gtk-3_0-4-0.29-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151755" comment="libspice-client-gtk-3_0-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138870" comment="libspice-controller0-0.29-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151756" comment="libspice-controller0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138871" comment="python-SpiceClientGtk-0.29-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151757" comment="python-SpiceClientGtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138872" comment="typelib-1_0-SpiceClientGlib-2_0-0.29-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151758" comment="typelib-1_0-SpiceClientGlib-2_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138873" comment="typelib-1_0-SpiceClientGtk-3_0-0.29-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151759" comment="typelib-1_0-SpiceClientGtk-3_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4453</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4453" source="CVE"/>
    <description>
    dracut.sh in dracut, as used in Red Hat Enterprise Linux 6, Fedora 16 and 17, and possibly other products, creates initramfs images with world-readable permissions, which might allow local users to obtain sensitive information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4453.html">CVE-2012-4453</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4453">SUSE bug 782734</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4453">SUSE bug 1008340</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138243" comment="dracut-037-66.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151760" comment="dracut is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4504</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4504" source="CVE"/>
    <description>
    Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4504.html">CVE-2012-4504</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4504">SUSE bug 784523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4504">SUSE bug 784523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4504">SUSE bug 784523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4504">SUSE bug 784523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4504">SUSE bug 784523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4504">SUSE bug 784523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4504">SUSE bug 784523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4504">SUSE bug 784523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4504">SUSE bug 784523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4504">SUSE bug 784523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4504">SUSE bug 784523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4504">SUSE bug 784523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4504">SUSE bug 795039</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138759" comment="libproxy-devel-0.4.11-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151761" comment="libproxy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138760" comment="libproxy1-0.4.11-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151762" comment="libproxy1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138761" comment="libproxy1-config-gnome3-0.4.11-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151763" comment="libproxy1-config-gnome3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138762" comment="libproxy1-config-kde4-0.4.11-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151764" comment="libproxy1-config-kde4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138763" comment="libproxy1-networkmanager-0.4.11-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151765" comment="libproxy1-networkmanager is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138764" comment="libproxy1-pacrunner-webkit-0.4.11-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151766" comment="libproxy1-pacrunner-webkit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4507</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4507" source="CVE"/>
    <description>
    The strchr function in procmime.c in Claws Mail (aka claws-mail) 3.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted email.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4507.html">CVE-2012-4507</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4507">SUSE bug 784463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4507">SUSE bug 784463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4507">SUSE bug 784463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4507">SUSE bug 784463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4507">SUSE bug 784463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4507">SUSE bug 784463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4507">SUSE bug 784463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4507">SUSE bug 784463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4507">SUSE bug 784463</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138165" comment="claws-mail-3.12.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151767" comment="claws-mail is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138166" comment="claws-mail-lang-3.12.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151768" comment="claws-mail-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4510</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4510" source="CVE"/>
    <description>
    cups-pk-helper before 0.2.3 does not properly wrap the (1) cupsGetFile and (2) cupsPutFile function calls, which allows user-assisted remote attackers to read or overwrite sensitive files using CUPS resources.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4510.html">CVE-2012-4510</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4510">SUSE bug 783488</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138209" comment="cups-pk-helper-0.2.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151769" comment="cups-pk-helper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138210" comment="cups-pk-helper-lang-0.2.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151770" comment="cups-pk-helper-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4535</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4535" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535" source="CVE"/>
    <description>
    Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4535.html">CVE-2012-4535</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4535">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4535">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4535">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4535">SUSE bug 786518</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4535">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4535">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4535">SUSE bug 787163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4535">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4535">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4535">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4535">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4535">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4535">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4535">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4535">SUSE bug 786516</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4536</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536" source="CVE"/>
    <description>
    The (1) domain_pirq_to_emuirq and (2) physdev_unmap_pirq functions in Xen 2.2 allows local guest OS administrators to cause a denial of service (Xen crash) via a crafted pirq value that triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4536.html">CVE-2012-4536</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4536">SUSE bug 786518</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4536">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4536">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4536">SUSE bug 786518</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4536">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4536">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4536">SUSE bug 787163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4536">SUSE bug 786518</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4536">SUSE bug 786518</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4536">SUSE bug 786518</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4536">SUSE bug 786518</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4536">SUSE bug 786518</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4537</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537" source="CVE"/>
    <description>
    Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assertion failure), aka "Memory mapping failure DoS vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4537.html">CVE-2012-4537</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4537">SUSE bug 786517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4537">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4537">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4537">SUSE bug 786517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4537">SUSE bug 786518</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4537">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4537">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4537">SUSE bug 787163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4537">SUSE bug 786517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4537">SUSE bug 786517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4537">SUSE bug 786517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4537">SUSE bug 786517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4537">SUSE bug 786517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4537">SUSE bug 786517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4537">SUSE bug 786517</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4538</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538" source="CVE"/>
    <description>
    The HVMOP_pagetable_dying hypercall in Xen 4.0, 4.1, and 4.2 does not properly check the pagetable state when running on shadow pagetables, which allows a local HVM guest OS to cause a denial of service (hypervisor crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4538.html">CVE-2012-4538</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4538">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4538">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4538">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4538">SUSE bug 786518</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4538">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4538">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4538">SUSE bug 787163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4538">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4538">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4538">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4538">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4538">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4538">SUSE bug 786519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4539</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539" source="CVE"/>
    <description>
    Xen 4.0 through 4.2, when running 32-bit x86 PV guests on 64-bit hypervisors, allows local guest OS administrators to cause a denial of service (infinite loop and hang or crash) via invalid arguments to GNTTABOP_get_status_frames, aka "Grant table hypercall infinite loop DoS vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4539.html">CVE-2012-4539</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4539">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4539">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4539">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4539">SUSE bug 786518</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4539">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4539">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4539">SUSE bug 787163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4539">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4539">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4539">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4539">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4539">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4539">SUSE bug 786520</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4540</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4540" source="CVE"/>
    <description>
    Off-by-one error in the invoke function in IcedTeaScriptablePluginObject.cc in IcedTea-Web 1.1.x before 1.1.7, 1.2.x before 1.2.2, 1.3.x before 1.3.1, and 1.4.x before 1.4.1 allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly execute arbitrary code via a crafted webpage that triggers a heap-based buffer overflow, related to an error message and a "triggering event attached to applet." NOTE: the 1.4.x versions were originally associated with CVE-2013-4349, but that entry has been MERGED with this one.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4540.html">CVE-2012-4540</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4540">SUSE bug 787846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4540">SUSE bug 787846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4540">SUSE bug 787846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4540">SUSE bug 787846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4540">SUSE bug 787846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4540">SUSE bug 787846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4540">SUSE bug 787846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4540">SUSE bug 787846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4540">SUSE bug 787846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4540">SUSE bug 787846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4540">SUSE bug 787846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4540">SUSE bug 787846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4540">SUSE bug 840572</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138403" comment="icedtea-web-javadoc-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151624" comment="icedtea-web-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138404" comment="java-1_8_0-openjdk-plugin-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151625" comment="java-1_8_0-openjdk-plugin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4544</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544" source="CVE"/>
    <description>
    The PV domain builder in Xen 4.2 and earlier does not validate the size of the kernel or ramdisk (1) before or (2) after decompression, which allows local guest administrators to cause a denial of service (domain 0 memory consumption) via a crafted (a) kernel or (b) ramdisk.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4544.html">CVE-2012-4544</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4544">SUSE bug 787163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4544">SUSE bug 779212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4544">SUSE bug 786516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4544">SUSE bug 786518</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4544">SUSE bug 786519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4544">SUSE bug 786520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4544">SUSE bug 787163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4544">SUSE bug 787163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4544">SUSE bug 787163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4544">SUSE bug 787163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4544">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4544">SUSE bug 787163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4544">SUSE bug 787163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4544">SUSE bug 787163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4544">SUSE bug 787163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4544">SUSE bug 787163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4544">SUSE bug 787163</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4559</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4559" source="CVE"/>
    <description>
    Multiple double free vulnerabilities in the (1) agent_sign_data function in agent.c, (2) channel_request function in channels.c, (3) ssh_userauth_pubkey function in auth.c, (4) sftp_parse_attr_3 function in sftp.c, and (5) try_publickey_from_file function in keyfiles.c in libssh before 0.5.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4559.html">CVE-2012-4559</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4559">SUSE bug 789827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4559">SUSE bug 789827</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009114955" comment="libssh-devel-0.6.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151771" comment="libssh-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009114957" comment="libssh4-0.6.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151772" comment="libssh4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4560</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4560" source="CVE"/>
    <description>
    Multiple buffer overflows in libssh before 0.5.3 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4560.html">CVE-2012-4560</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4560">SUSE bug 789827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4560">SUSE bug 789827</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009114955" comment="libssh-devel-0.6.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151771" comment="libssh-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009114957" comment="libssh4-0.6.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151772" comment="libssh4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4561</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4561" source="CVE"/>
    <description>
    The (1) publickey_make_dss, (2) publickey_make_rsa, (3) signature_from_string, (4) ssh_do_sign, and (5) ssh_sign_session_id functions in keys.c in libssh before 0.5.3 free "an invalid pointer on an error path," which might allow remote attackers to cause a denial of service (crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4561.html">CVE-2012-4561</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4561">SUSE bug 789827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4561">SUSE bug 789827</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009114955" comment="libssh-devel-0.6.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151771" comment="libssh-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009114957" comment="libssh4-0.6.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151772" comment="libssh4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4564</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4564" source="CVE"/>
    <description>
    ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4564.html">CVE-2012-4564</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4564">SUSE bug 787892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4564">SUSE bug 787892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4564">SUSE bug 787892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4564">SUSE bug 781995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4564">SUSE bug 787892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4564">SUSE bug 787892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4564">SUSE bug 791607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4564">SUSE bug 787892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4564">SUSE bug 787892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4564">SUSE bug 787892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4564">SUSE bug 787892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4564">SUSE bug 787892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4564">SUSE bug 787892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4564">SUSE bug 787892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4564">SUSE bug 787892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4564">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4929</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-4929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929" source="CVE"/>
    <description>
    The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-4929.html">CVE-2012-4929</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 779952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 779952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 779952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 779952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 779952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 779952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 779952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 779952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 779952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 793420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 793420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 803004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 779952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 779952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 779952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 779952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 779952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 793420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 779952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 793420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 779952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 779952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 779952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 779952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 793420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 793420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 793420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 793420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 847895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 793420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 793420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 793420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-4929">SUSE bug 1011293</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138791" comment="libqt4-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151228" comment="libqt4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138792" comment="libqt4-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151229" comment="libqt4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138793" comment="libqt4-devel-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151230" comment="libqt4-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138794" comment="libqt4-linguist-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151231" comment="libqt4-linguist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138795" comment="libqt4-qt3support-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151232" comment="libqt4-qt3support is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138796" comment="libqt4-qt3support-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151233" comment="libqt4-qt3support-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138797" comment="libqt4-sql-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151234" comment="libqt4-sql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138798" comment="libqt4-sql-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151235" comment="libqt4-sql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138799" comment="libqt4-sql-mysql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151236" comment="libqt4-sql-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138800" comment="libqt4-sql-mysql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151237" comment="libqt4-sql-mysql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138801" comment="libqt4-sql-postgresql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151238" comment="libqt4-sql-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138802" comment="libqt4-sql-postgresql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151239" comment="libqt4-sql-postgresql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138803" comment="libqt4-sql-sqlite-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151240" comment="libqt4-sql-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138804" comment="libqt4-sql-sqlite-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151241" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138805" comment="libqt4-sql-unixODBC-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151242" comment="libqt4-sql-unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138806" comment="libqt4-sql-unixODBC-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151243" comment="libqt4-sql-unixODBC-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138807" comment="libqt4-x11-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151244" comment="libqt4-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138808" comment="libqt4-x11-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151245" comment="libqt4-x11-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138979" comment="links-2.8-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151773" comment="links is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138982" comment="lynx-2.8.7-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151020" comment="lynx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139129" comment="w3m-0.5.3-156.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139130" comment="wget-1.14-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151442" comment="wget is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5112</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5112" source="CVE"/>
    <description>
    Use-after-free vulnerability in the SVG implementation in WebKit, as used in Google Chrome before 22.0.1229.94, allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5112.html">CVE-2012-5112</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5112">SUSE bug 786698</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138661" comment="libjavascriptcoregtk-1_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138662" comment="libjavascriptcoregtk-3_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138663" comment="libwebkitgtk-1_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138664" comment="libwebkitgtk-3_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138665" comment="libwebkitgtk-devel-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138666" comment="libwebkitgtk2-lang-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138667" comment="libwebkitgtk3-lang-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138668" comment="typelib-1_0-JavaScriptCore-1_0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138669" comment="typelib-1_0-WebKit-1_0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5133</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5133" source="CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 23.0.1271.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG filters.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5133.html">CVE-2012-5133</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5133">SUSE bug 791234</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138661" comment="libjavascriptcoregtk-1_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138662" comment="libjavascriptcoregtk-3_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138663" comment="libwebkitgtk-1_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138664" comment="libwebkitgtk-3_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138665" comment="libwebkitgtk-devel-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138666" comment="libwebkitgtk2-lang-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138667" comment="libwebkitgtk3-lang-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138668" comment="typelib-1_0-JavaScriptCore-1_0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138669" comment="typelib-1_0-WebKit-1_0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5134</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134" source="CVE"/>
    <description>
    Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5134.html">CVE-2012-5134</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5134">SUSE bug 791234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5134">SUSE bug 793334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5134">SUSE bug 793334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5134">SUSE bug 793334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5134">SUSE bug 793334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5134">SUSE bug 793334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5134">SUSE bug 793334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5134">SUSE bug 793334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5134">SUSE bug 795039</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5134">SUSE bug 793334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5134">SUSE bug 804033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5134">SUSE bug 793334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5134">SUSE bug 804033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5134">SUSE bug 804033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5134">SUSE bug 793334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5134">SUSE bug 793334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5134">SUSE bug 793334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5134">SUSE bug 793334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5134">SUSE bug 793334</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138972" comment="libxml2-2-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138973" comment="libxml2-2-32bit-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138974" comment="libxml2-devel-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138975" comment="libxml2-tools-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139055" comment="python-libxml2-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5166</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5166" source="CVE"/>
    <description>
    ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5166.html">CVE-2012-5166</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5166">SUSE bug 784602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5166">SUSE bug 784602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5166">SUSE bug 784602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5166">SUSE bug 784602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5166">SUSE bug 784602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5166">SUSE bug 784602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5166">SUSE bug 784602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5166">SUSE bug 792926</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5237</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5237" source="CVE"/>
    <description>
    The dissect_hsrp function in epan/dissectors/packet-hsrp.c in the HSRP dissector in Wireshark 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5237.html">CVE-2012-5237</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5237">SUSE bug 783275</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5238</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5238" source="CVE"/>
    <description>
    epan/dissectors/packet-ppp.c in the PPP dissector in Wireshark 1.8.x before 1.8.3 uses incorrect OUI data structures during the decoding of (1) PPP and (2) LCP data, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5238.html">CVE-2012-5238</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5238">SUSE bug 783275</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5239</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5239" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-3548.  Reason: This candidate is a reservation duplicate of CVE-2012-3548.  Notes: All CVE users should reference CVE-2012-3548 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5239.html">CVE-2012-5239</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5239">SUSE bug 783275</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5240</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5240" source="CVE"/>
    <description>
    Buffer overflow in the dissect_tlv function in epan/dissectors/packet-ldp.c in the LDP dissector in Wireshark 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5240.html">CVE-2012-5240</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5240">SUSE bug 783275</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5468</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5468" source="CVE"/>
    <description>
    Heap-based buffer overflow in iconvert.c in the bogolexer component in Bogofilter before 1.2.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an email containing a base64 string that is decoded to incomplete multibyte characters.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5468.html">CVE-2012-5468</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5468">SUSE bug 792939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5468">SUSE bug 792939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5468">SUSE bug 792939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5468">SUSE bug 792939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5468">SUSE bug 792939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5468">SUSE bug 792939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5468">SUSE bug 792939</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138153" comment="bogofilter-common-1.2.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151443" comment="bogofilter-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138154" comment="bogofilter-db-1.2.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151444" comment="bogofilter-db is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5510</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5510" source="CVE"/>
    <description>
    Xen 4.x, when downgrading the grant table version, does not properly remove the status page from the tracking list when freeing the page, which allows local guest OS administrators to cause a denial of service (hypervisor crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5510.html">CVE-2012-5510</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5510">SUSE bug 789945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5510">SUSE bug 789945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5510">SUSE bug 789945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5510">SUSE bug 789945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5510">SUSE bug 789945</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5511</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5511" source="CVE"/>
    <description>
    Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 through 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5511.html">CVE-2012-5511</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5511">SUSE bug 789944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5511">SUSE bug 789944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5511">SUSE bug 789944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5511">SUSE bug 789944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5511">SUSE bug 789944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5511">SUSE bug 789944</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5513</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5513" source="CVE"/>
    <description>
    The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5513.html">CVE-2012-5513</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5513">SUSE bug 789951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5513">SUSE bug 789951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5513">SUSE bug 789951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5513">SUSE bug 789951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5513">SUSE bug 789951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5513">SUSE bug 789951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5513">SUSE bug 789951</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5514</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5514" source="CVE"/>
    <description>
    The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5514.html">CVE-2012-5514</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5514">SUSE bug 789948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5514">SUSE bug 789948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5514">SUSE bug 789948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5514">SUSE bug 789948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5514">SUSE bug 789948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5514">SUSE bug 789948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5514">SUSE bug 789948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5514">SUSE bug 789988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5514">SUSE bug 789948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5514">SUSE bug 789948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5514">SUSE bug 789948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5514">SUSE bug 789948</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5515</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5515" source="CVE"/>
    <description>
    The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5515.html">CVE-2012-5515</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5515">SUSE bug 789950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5515">SUSE bug 789950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5515">SUSE bug 789950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5515">SUSE bug 789950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5515">SUSE bug 789950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5515">SUSE bug 789950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5515">SUSE bug 789950</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5519</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519" source="CVE"/>
    <description>
    CUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web interface administrator key in /var/run/cups/certs/0 using certain permissions, which allows local users in the lpadmin group to read or write arbitrary files as root by leveraging the web interface.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5519.html">CVE-2012-5519</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 882905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 882905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 882905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 882905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 882905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 882905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 882905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 789566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 882905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 882905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5519">SUSE bug 924208</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138200" comment="cups-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138201" comment="cups-client-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138202" comment="cups-devel-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138203" comment="cups-libs-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151187" comment="cups-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138204" comment="cups-libs-32bit-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151188" comment="cups-libs-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5525</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5525" source="CVE"/>
    <description>
    The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5525.html">CVE-2012-5525</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5525">SUSE bug 789952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5525">SUSE bug 789952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5525">SUSE bug 789952</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5532</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5532" source="CVE"/>
    <description>
    The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.8-rc1, allows local users to cause a denial of service (daemon exit) via a crafted application that sends a Netlink message.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-2669.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5532.html">CVE-2012-5532</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5532">SUSE bug 791605</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138400" comment="hyper-v-6-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151721" comment="hyper-v is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5576</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5576" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.8.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large (1) red, (2) green, or (3) blue color mask in an XWD file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5576.html">CVE-2012-5576</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5576">SUSE bug 791372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5576">SUSE bug 791372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5576">SUSE bug 791372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5576">SUSE bug 791372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5576">SUSE bug 791372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5576">SUSE bug 791372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5576">SUSE bug 791372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5576">SUSE bug 791372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5576">SUSE bug 791372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5576">SUSE bug 791372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5576">SUSE bug 791372</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138314" comment="gimp-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138315" comment="gimp-help-browser-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151541" comment="gimp-help-browser is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138316" comment="gimp-lang-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138317" comment="gimp-plugin-aa-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138318" comment="gimp-plugins-python-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151544" comment="gimp-plugins-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138319" comment="libgimp-2_0-0-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151545" comment="libgimp-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138320" comment="libgimpui-2_0-0-2.8.14-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151546" comment="libgimpui-2_0-0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5592</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5592" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6052.  Reason: This candidate is a reservation duplicate of CVE-2012-6052.  Notes: All CVE users should reference CVE-2012-6052 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5592.html">CVE-2012-5592</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5592">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5593</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5593" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6053.  Reason: This candidate is a reservation duplicate of CVE-2012-6053.  Notes: All CVE users should reference CVE-2012-6053 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5593.html">CVE-2012-5593</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5593">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5594</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5594" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6054.  Reason: This candidate is a reservation duplicate of CVE-2012-6054.  Notes: All CVE users should reference CVE-2012-6054 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5594.html">CVE-2012-5594</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5594">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5595</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5595" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6056.  Reason: This candidate is a reservation duplicate of CVE-2012-6056.  Notes: All CVE users should reference CVE-2012-6056 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5595.html">CVE-2012-5595</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5595">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5596</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5596" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6057.  Reason: This candidate is a reservation duplicate of CVE-2012-6057.  Notes: All CVE users should reference CVE-2012-6057 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5596.html">CVE-2012-5596</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5596">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5597</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5597" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6059.  Reason: This candidate is a reservation duplicate of CVE-2012-6059.  Notes: All CVE users should reference CVE-2012-6059 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5597.html">CVE-2012-5597</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5597">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5598</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5598" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6060.  Reason: This candidate is a reservation duplicate of CVE-2012-6060.  Notes: All CVE users should reference CVE-2012-6060 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5598.html">CVE-2012-5598</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5598">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5599</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5599" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6061.  Reason: This candidate is a reservation duplicate of CVE-2012-6061.  Notes: All CVE users should reference CVE-2012-6061 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5599.html">CVE-2012-5599</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5599">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5600</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5600" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6062.  Reason: This candidate is a reservation duplicate of CVE-2012-6062.  Notes: All CVE users should reference CVE-2012-6062 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5600.html">CVE-2012-5600</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5600">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5601</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5601" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6055.  Reason: This candidate is a reservation duplicate of CVE-2012-6055.  Notes: All CVE users should reference CVE-2012-6055 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5601.html">CVE-2012-5601</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5601">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5602</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5602" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6058.  Reason: This candidate is a reservation duplicate of CVE-2012-6058.  Notes: All CVE users should reference CVE-2012-6058 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5602.html">CVE-2012-5602</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5602">SUSE bug 792005</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5615</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5615" source="CVE"/>
    <description>
    Oracle MySQL 5.5.38 and earlier, 5.6.19 and earlier, and MariaDB 5.5.28a, 5.3.11, 5.2.13, 5.1.66, and possibly other versions, generates different error messages with different time delays depending on whether a user name exists, which allows remote attackers to enumerate valid usernames.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5615.html">CVE-2012-5615</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5615">SUSE bug 792440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5615">SUSE bug 792440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5615">SUSE bug 792440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5615">SUSE bug 792440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5615">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5615">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5615">SUSE bug 915913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5615">SUSE bug 792440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5615">SUSE bug 792440</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5634</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5634" source="CVE"/>
    <description>
    Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, does not properly configure VT-d when supporting a device that is behind a legacy PCI Bridge, which allows local guests to cause a denial of service to other guests by injecting an interrupt.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5634.html">CVE-2012-5634</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5634">SUSE bug 794316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5634">SUSE bug 794316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5634">SUSE bug 794316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5634">SUSE bug 800275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5634">SUSE bug 794316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5634">SUSE bug 794316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5634">SUSE bug 794316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5634">SUSE bug 794316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5634">SUSE bug 794316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5634">SUSE bug 794316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5634">SUSE bug 794316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5634">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5634">SUSE bug 794316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5634">SUSE bug 794316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5634">SUSE bug 794316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5634">SUSE bug 794316</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5668</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668" source="CVE"/>
    <description>
    FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to BDF fonts and the improper handling of an "allocation error" in the bdf_free_font function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5668.html">CVE-2012-5668</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5668">SUSE bug 795826</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5669</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669" source="CVE"/>
    <description>
    The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to BDF fonts and an incorrect calculation that triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5669.html">CVE-2012-5669</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5669">SUSE bug 795826</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5670</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670" source="CVE"/>
    <description>
    The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5670.html">CVE-2012-5670</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5670">SUSE bug 795826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5670">SUSE bug 795826</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5688</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5688" source="CVE"/>
    <description>
    ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5688.html">CVE-2012-5688</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5688">SUSE bug 792926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5688">SUSE bug 792926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5688">SUSE bug 792926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5688">SUSE bug 792926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5688">SUSE bug 792926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5688">SUSE bug 792926</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5689</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5689" source="CVE"/>
    <description>
    ISC BIND 9.8.x through 9.8.4-P1 and 9.9.x through 9.9.2-P1, in certain configurations involving DNS64 with a Response Policy Zone that lacks an AAAA rewrite rule, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for an AAAA record.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5689.html">CVE-2012-5689</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5689">SUSE bug 800822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5689">SUSE bug 800822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5689">SUSE bug 800822</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5783</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5783" source="CVE"/>
    <description>
    Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5783.html">CVE-2012-5783</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5783">SUSE bug 803332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5783">SUSE bug 803333</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5783">SUSE bug 803332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5783">SUSE bug 803332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5783">SUSE bug 803332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5783">SUSE bug 803332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5783">SUSE bug 803332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5783">SUSE bug 803332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5783">SUSE bug 803332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5783">SUSE bug 803332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5783">SUSE bug 803332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5783">SUSE bug 803332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5783">SUSE bug 803332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5783">SUSE bug 803332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5783">SUSE bug 803332</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138076" comment="apache-commons-httpclient-3.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151783" comment="apache-commons-httpclient is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5829</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsWindow::OnExposeEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5829.html">CVE-2012-5829</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5829">SUSE bug 790140</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5829">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5830</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5830" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 on Mac OS X allows remote attackers to execute arbitrary code via an HTML document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5830.html">CVE-2012-5830</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5830">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5833</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5833" source="CVE"/>
    <description>
    The texImage2D implementation in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via function calls involving certain values of the level parameter.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5833.html">CVE-2012-5833</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5833">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5835</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5835" source="CVE"/>
    <description>
    Integer overflow in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (invalid write operation) via crafted data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5835.html">CVE-2012-5835</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5835">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5836</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5836" source="CVE"/>
    <description>
    Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving the setting of Cascading Style Sheets (CSS) properties in conjunction with SVG text.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5836.html">CVE-2012-5836</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5836">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5837</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5837" source="CVE"/>
    <description>
    The Web Developer Toolbar in Mozilla Firefox before 17.0 executes script with chrome privileges, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5837.html">CVE-2012-5837</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5837">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5838</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5838" source="CVE"/>
    <description>
    The copyTexImage2D implementation in the WebGL subsystem in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via large image dimensions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5838.html">CVE-2012-5838</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5838">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5839</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5839" source="CVE"/>
    <description>
    Heap-based buffer overflow in the gfxShapedWord::CompressedGlyph::IsClusterStart function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5839.html">CVE-2012-5839</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5839">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5840</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5840" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-4214.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5840.html">CVE-2012-5840</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5840">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5841</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5841" source="CVE"/>
    <description>
    Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 implement cross-origin wrappers with a filtering behavior that does not properly restrict write actions, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5841.html">CVE-2012-5841</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5841">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5842</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5842" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5842.html">CVE-2012-5842</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5842">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5843</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-5843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5843" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-5843.html">CVE-2012-5843</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-5843">SUSE bug 790140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6075</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-6075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075" source="CVE"/>
    <description>
    Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6075.html">CVE-2012-6075</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 797523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 797523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 797523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 797523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 797523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 800275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 797523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 797523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 797523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 797523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 797523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 797523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 797523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 797523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 797523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 797523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 797523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 797523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 797523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6075">SUSE bug 797523</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6093</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-6093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6093" source="CVE"/>
    <description>
    The QSslSocket::sslErrors function in Qt before 4.6.5, 4.7.x before 4.7.6, 4.8.x before 4.8.5, when using certain versions of openSSL, uses an "incompatible structure layout" that can read memory from the wrong location, which causes Qt to report an incorrect error when certificate validation fails and might cause users to make unsafe security decisions to accept a certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6093.html">CVE-2012-6093</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6093">SUSE bug 797006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6093">SUSE bug 802634</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138791" comment="libqt4-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151228" comment="libqt4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138792" comment="libqt4-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151229" comment="libqt4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138793" comment="libqt4-devel-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151230" comment="libqt4-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138794" comment="libqt4-linguist-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151231" comment="libqt4-linguist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138795" comment="libqt4-qt3support-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151232" comment="libqt4-qt3support is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138796" comment="libqt4-qt3support-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151233" comment="libqt4-qt3support-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138797" comment="libqt4-sql-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151234" comment="libqt4-sql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138798" comment="libqt4-sql-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151235" comment="libqt4-sql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138799" comment="libqt4-sql-mysql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151236" comment="libqt4-sql-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138800" comment="libqt4-sql-mysql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151237" comment="libqt4-sql-mysql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138801" comment="libqt4-sql-postgresql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151238" comment="libqt4-sql-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138802" comment="libqt4-sql-postgresql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151239" comment="libqt4-sql-postgresql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138803" comment="libqt4-sql-sqlite-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151240" comment="libqt4-sql-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138804" comment="libqt4-sql-sqlite-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151241" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138805" comment="libqt4-sql-unixODBC-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151242" comment="libqt4-sql-unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138806" comment="libqt4-sql-unixODBC-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151243" comment="libqt4-sql-unixODBC-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138807" comment="libqt4-x11-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151244" comment="libqt4-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138808" comment="libqt4-x11-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151245" comment="libqt4-x11-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6094</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-6094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6094" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6094.html">CVE-2012-6094</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 795624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 795624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 795624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6094">SUSE bug 857372</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138200" comment="cups-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138201" comment="cups-client-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138202" comment="cups-devel-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138203" comment="cups-libs-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151187" comment="cups-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138204" comment="cups-libs-32bit-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151188" comment="cups-libs-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6096</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-6096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6096" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the get_history function in history.cgi in Nagios Core before 3.4.4, and Icinga 1.6.x before 1.6.2, 1.7.x before 1.7.4, and 1.8.x before 1.8.4, might allow remote attackers to execute arbitrary code via a long (1) host_name variable (host parameter) or (2) svc_description variable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6096.html">CVE-2012-6096</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6096">SUSE bug 797237</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138985" comment="monitoring-tools-1.13.3-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151784" comment="monitoring-tools is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6128</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-6128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6128" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in http.c in OpenConnect before 4.08 allow remote VPN gateways to cause a denial of service (application crash) via a long (1) hostname, (2) path, or (3) cookie list in a response.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6128.html">CVE-2012-6128</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6128">SUSE bug 803347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6128">SUSE bug 803347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6128">SUSE bug 803347</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139000" comment="openconnect-7.06-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151736" comment="openconnect is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139001" comment="openconnect-devel-7.06-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151737" comment="openconnect-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6150</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-6150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150" source="CVE"/>
    <description>
    The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6150.html">CVE-2012-6150</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6150">SUSE bug 853347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6150">SUSE bug 853347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6150">SUSE bug 853347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6150">SUSE bug 853347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6150">SUSE bug 853347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6150">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6150">SUSE bug 853347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6150">SUSE bug 853347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6150">SUSE bug 853347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6150">SUSE bug 853347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6150">SUSE bug 853347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6150">SUSE bug 853347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6150">SUSE bug 853347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6150">SUSE bug 853347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6150">SUSE bug 853347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6150">SUSE bug 853347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6150">SUSE bug 853347</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6152</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-6152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152" source="CVE"/>
    <description>
    The Yahoo! protocol plugin in libpurple in Pidgin before 2.10.8 does not properly validate UTF-8 data, which allows remote attackers to cause a denial of service (application crash) via crafted byte sequences.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6152.html">CVE-2012-6152</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6152">SUSE bug 861019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6152">SUSE bug 861019</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6702</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2012-6702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702" source="CVE"/>
    <description>
    Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2012-6702.html">CVE-2012-6702</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6702">SUSE bug 983215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6702">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6702">SUSE bug 983215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6702">SUSE bug 983215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6702">SUSE bug 983215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6702">SUSE bug 983215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6702">SUSE bug 983215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6702">SUSE bug 983215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6702">SUSE bug 983215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6702">SUSE bug 983215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6702">SUSE bug 983215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6702">SUSE bug 983215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6702">SUSE bug 983215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6702">SUSE bug 983215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6702">SUSE bug 983215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2012-6702">SUSE bug 983215</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148518" comment="expat-2.1.0-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151330" comment="expat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148519" comment="libexpat-devel-2.1.0-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151331" comment="libexpat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148520" comment="libexpat-devel-32bit-2.1.0-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151785" comment="libexpat-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148521" comment="libexpat1-2.1.0-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148522" comment="libexpat1-32bit-2.1.0-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151333" comment="libexpat1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0151</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0151" source="CVE"/>
    <description>
    The do_hvm_op function in xen/arch/x86/hvm/hvm.c in Xen 4.2.x on the x86_32 platform does not prevent HVM_PARAM_NESTEDHVM (aka nested virtualization) operations, which allows guest OS users to cause a denial of service (long-duration page mappings and host OS crash) by leveraging administrative access to an HVM guest in a domain with a large number of VCPUs.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0151.html">CVE-2013-0151</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0151">SUSE bug 797285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0151">SUSE bug 797285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0151">SUSE bug 797285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0151">SUSE bug 797285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0151">SUSE bug 797285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0151">SUSE bug 797285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0151">SUSE bug 797285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0151">SUSE bug 797285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0151">SUSE bug 797285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0151">SUSE bug 797285</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0152</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0152" source="CVE"/>
    <description>
    Memory leak in Xen 4.2 and unstable allows local HVM guests to cause a denial of service (host memory consumption) by performing nested virtualization in a way that triggers errors that are not properly handled.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0152.html">CVE-2013-0152</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0152">SUSE bug 797287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0152">SUSE bug 797287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0152">SUSE bug 797287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0152">SUSE bug 797287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0152">SUSE bug 797287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0152">SUSE bug 797287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0152">SUSE bug 800798</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0153</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0153" source="CVE"/>
    <description>
    The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0153.html">CVE-2013-0153</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0153">SUSE bug 800275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0153">SUSE bug 800275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0153">SUSE bug 800802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0153">SUSE bug 800275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0153">SUSE bug 800275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0153">SUSE bug 800275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0153">SUSE bug 800275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0153">SUSE bug 800275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0153">SUSE bug 800275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0153">SUSE bug 800275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0153">SUSE bug 800275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0153">SUSE bug 800275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0153">SUSE bug 800275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0153">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0153">SUSE bug 800275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0153">SUSE bug 800275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0153">SUSE bug 800275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0153">SUSE bug 800275</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0157</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0157" source="CVE"/>
    <description>
    (a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether the directory exists.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0157.html">CVE-2013-0157</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0157">SUSE bug 797002</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138545" comment="libblkid-devel-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151786" comment="libblkid-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138546" comment="libblkid1-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151787" comment="libblkid1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138547" comment="libblkid1-32bit-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151788" comment="libblkid1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138548" comment="libmount1-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151789" comment="libmount1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138549" comment="libmount1-32bit-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151790" comment="libmount1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138550" comment="libsmartcols1-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151791" comment="libsmartcols1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138551" comment="libuuid-devel-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151792" comment="libuuid-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138552" comment="libuuid1-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151793" comment="libuuid1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138553" comment="libuuid1-32bit-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151794" comment="libuuid1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138554" comment="util-linux-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151795" comment="util-linux is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138555" comment="util-linux-lang-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151796" comment="util-linux-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138556" comment="util-linux-systemd-2.25-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151797" comment="util-linux-systemd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0160</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0160" source="CVE"/>
    <description>
    The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0160.html">CVE-2013-0160</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 841063</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 841063</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 841063</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 841063</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 841063</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 871595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0160">SUSE bug 797175</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0166</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0166" source="CVE"/>
    <description>
    OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0166.html">CVE-2013-0166</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 802746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 802746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 802746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 802746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 802746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 802746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 802746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 802746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 802746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 802746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 802746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 802746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 802746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 813366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 821818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 833408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 802746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 802746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 833408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 833408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0166">SUSE bug 911906</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0169</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169" source="CVE"/>
    <description>
    The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0169.html">CVE-2013-0169</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 804654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 803379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 809839</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 813939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 813366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 821818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 802184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 977584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 977616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 977616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 977616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 977616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0169">SUSE bug 1070148</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0170</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0170" source="CVE"/>
    <description>
    Use-after-free vulnerability in the virNetMessageFree function in rpc/virnetserverclient.c in libvirt 1.0.x before 1.0.2, 0.10.2 before 0.10.2.3, 0.9.11 before 0.9.11.9, and 0.9.6 before 0.9.6.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering certain errors during an RPC connection, which causes a message to be freed without being removed from the message queue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0170.html">CVE-2013-0170</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0170">SUSE bug 800976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0170">SUSE bug 800976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0170">SUSE bug 800976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0170">SUSE bug 800976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0170">SUSE bug 800976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0170">SUSE bug 800976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0170">SUSE bug 800976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0170">SUSE bug 800976</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0172</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0172" source="CVE"/>
    <description>
    Samba 4.0.x before 4.0.1, in certain Active Directory domain-controller configurations, does not properly interpret Access Control Entries that are based on an objectClass, which allows remote authenticated users to bypass intended restrictions on modifying LDAP directory objects by leveraging (1) objectClass access by a user, (2) objectClass access by a group, or (3) write access to an attribute.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0172.html">CVE-2013-0172</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0172">SUSE bug 798364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0172">SUSE bug 798364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0172">SUSE bug 798364</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0176</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0176" source="CVE"/>
    <description>
    The publickey_from_privatekey function in libssh before 0.5.4, when no algorithm is matched during negotiations, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a "Client: Diffie-Hellman Key Exchange Init" packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0176.html">CVE-2013-0176</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0176">SUSE bug 802631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0176">SUSE bug 802631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0176">SUSE bug 802631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0176">SUSE bug 928323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0176">SUSE bug 802631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0176">SUSE bug 802631</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009114955" comment="libssh-devel-0.6.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151771" comment="libssh-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009114957" comment="libssh4-0.6.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151772" comment="libssh4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0211</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0211" source="CVE"/>
    <description>
    Integer signedness error in the archive_write_zip_data function in archive_write_set_format_zip.c in libarchive 3.1.2 and earlier, when running on 64-bit machines, allows context-dependent attackers to cause a denial of service (crash) via unspecified vectors, which triggers an improper conversion between unsigned and signed types, leading to a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0211.html">CVE-2013-0211</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0211">SUSE bug 800024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0211">SUSE bug 800024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0211">SUSE bug 800024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0211">SUSE bug 800024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0211">SUSE bug 800024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0211">SUSE bug 800024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0211">SUSE bug 800024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0211">SUSE bug 800024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0211">SUSE bug 800024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0211">SUSE bug 800024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0211">SUSE bug 800024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0211">SUSE bug 800024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0211">SUSE bug 800024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0211">SUSE bug 800024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0211">SUSE bug 800024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0211">SUSE bug 979005</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138155" comment="bsdtar-3.1.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138156" comment="libarchive-devel-3.1.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138157" comment="libarchive13-3.1.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0213</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213" source="CVE"/>
    <description>
    The Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to conduct clickjacking attacks via a (1) FRAME or (2) IFRAME element.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0213.html">CVE-2013-0213</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0213">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0213">SUSE bug 800982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0213">SUSE bug 800982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0213">SUSE bug 800982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0213">SUSE bug 800982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0213">SUSE bug 800982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0213">SUSE bug 800982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0213">SUSE bug 800982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0213">SUSE bug 800982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0213">SUSE bug 800982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0213">SUSE bug 800982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0213">SUSE bug 800982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0213">SUSE bug 880220</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0214</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214" source="CVE"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to hijack the authentication of arbitrary users by leveraging knowledge of a password and composing requests that perform SWAT actions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0214.html">CVE-2013-0214</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0214">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0214">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0214">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0214">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0214">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0214">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0214">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0214">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0214">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0214">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0214">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0214">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0214">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0214">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0214">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0214">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0214">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0214">SUSE bug 799641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0214">SUSE bug 880220</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0219</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0219" source="CVE"/>
    <description>
    System Security Services Daemon (SSSD) before 1.9.4, when (1) creating, (2) copying, or (3) removing a user home directory tree, allows local users to create, modify, or delete arbitrary files via a symlink attack on another user's files.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0219.html">CVE-2013-0219</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0219">SUSE bug 801036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0219">SUSE bug 801036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0219">SUSE bug 801036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0219">SUSE bug 801036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0219">SUSE bug 801036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0219">SUSE bug 801036</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138876" comment="libsss_idmap0-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151530" comment="libsss_idmap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138877" comment="sssd-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151531" comment="sssd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138878" comment="sssd-32bit-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151532" comment="sssd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138879" comment="sssd-krb5-common-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151533" comment="sssd-krb5-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138880" comment="sssd-ldap-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151534" comment="sssd-ldap is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0220</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0220" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0220" source="CVE"/>
    <description>
    The (1) sss_autofs_cmd_getautomntent and (2) sss_autofs_cmd_getautomntbyname function in responder/autofs/autofssrv_cmd.c and the (3) ssh_cmd_parse_request function in responder/ssh/sshsrv_cmd.c in System Security Services Daemon (SSSD) before 1.9.4 allow remote attackers to cause a denial of service (out-of-bounds read, crash, and restart) via a crafted SSSD packet.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2013-0220.html">CVE-2013-0220</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0220">SUSE bug 801036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0220">SUSE bug 801036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0220">SUSE bug 801036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0220">SUSE bug 801036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0220">SUSE bug 801036</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138876" comment="libsss_idmap0-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151530" comment="libsss_idmap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138877" comment="sssd-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151531" comment="sssd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138878" comment="sssd-32bit-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151532" comment="sssd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138879" comment="sssd-krb5-common-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151533" comment="sssd-krb5-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138880" comment="sssd-ldap-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151534" comment="sssd-ldap is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0221</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0221" source="CVE"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0221.html">CVE-2013-0221</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0221">SUSE bug 798538</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138173" comment="coreutils-8.22-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151803" comment="coreutils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138174" comment="coreutils-lang-8.22-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151804" comment="coreutils-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0222</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0222" source="CVE"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0222.html">CVE-2013-0222</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 796243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 796243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 796243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 796243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 798541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 796243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 796243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 796243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 796243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 796243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 798541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 796243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 796243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 796243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 798541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 796243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 796243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0222">SUSE bug 796243</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138173" comment="coreutils-8.22-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151803" comment="coreutils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138174" comment="coreutils-lang-8.22-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151804" comment="coreutils-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0223</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0223" source="CVE"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0223.html">CVE-2013-0223</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0223">SUSE bug 798541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0223">SUSE bug 798541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0223">SUSE bug 798541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0223">SUSE bug 798541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0223">SUSE bug 798541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0223">SUSE bug 798541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0223">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0223">SUSE bug 798541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0223">SUSE bug 798541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0223">SUSE bug 798541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0223">SUSE bug 798538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0223">SUSE bug 798541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0223">SUSE bug 798541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0223">SUSE bug 798541</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138173" comment="coreutils-8.22-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151803" comment="coreutils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138174" comment="coreutils-lang-8.22-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151804" comment="coreutils-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0231</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0231" source="CVE"/>
    <description>
    The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0231.html">CVE-2013-0231</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 841063</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 841063</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 841063</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 841063</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 841063</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 871595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0231">SUSE bug 801178</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0240</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0240" source="CVE"/>
    <description>
    Gnome Online Accounts (GOA) 3.4.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.5, does not properly validate SSL certificates when creating accounts such as Windows Live and Facebook accounts, which allows man-in-the-middle attackers to obtain sensitive information such as credentials by sniffing the network.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0240.html">CVE-2013-0240</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0240">SUSE bug 802409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0240">SUSE bug 802409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0240">SUSE bug 802409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0240">SUSE bug 808534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0240">SUSE bug 802409</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138359" comment="gnome-online-accounts-3.16.4.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151805" comment="gnome-online-accounts is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138360" comment="gnome-online-accounts-devel-3.16.4.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151806" comment="gnome-online-accounts-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138361" comment="gnome-online-accounts-lang-3.16.4.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151807" comment="gnome-online-accounts-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138362" comment="libgoa-1_0-0-3.16.4.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151808" comment="libgoa-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138363" comment="libgoa-backend-1_0-1-3.16.4.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151809" comment="libgoa-backend-1_0-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138364" comment="typelib-1_0-Goa-1_0-3.16.4.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151810" comment="typelib-1_0-Goa-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0242</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242" source="CVE"/>
    <description>
    Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0242.html">CVE-2013-0242</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 801246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 801246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 801246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 801246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 801246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 801246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 801246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 801246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 801246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 801246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 801246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 801246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 801246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 801246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 848783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 801246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 801246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 801246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0242">SUSE bug 801246</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138343" comment="glibc-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138344" comment="glibc-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138345" comment="glibc-devel-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138346" comment="glibc-extra-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138347" comment="glibc-info-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138348" comment="glibc-locale-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138349" comment="glibc-locale-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138350" comment="nscd-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0249</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0249" source="CVE"/>
    <description>
    Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the realm parameter in a (1) POP3, (2) SMTP or (3) IMAP message.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0249.html">CVE-2013-0249</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0249">SUSE bug 802411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0249">SUSE bug 802411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0249">SUSE bug 802411</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138211" comment="curl-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138212" comment="libcurl-devel-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138213" comment="libcurl4-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0254</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0254" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0254" source="CVE"/>
    <description>
    The QSharedMemory class in Qt 5.0.0, 4.8.x before 4.8.5, 4.7.x before 4.7.6, and other versions including 4.4.0 uses weak permissions (world-readable and world-writable) for shared memory segments, which allows local users to read sensitive information or modify critical program data, as demonstrated by reading a pixmap being sent to an X server.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0254.html">CVE-2013-0254</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0254">SUSE bug 802634</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138791" comment="libqt4-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151228" comment="libqt4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138792" comment="libqt4-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151229" comment="libqt4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138793" comment="libqt4-devel-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151230" comment="libqt4-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138794" comment="libqt4-linguist-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151231" comment="libqt4-linguist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138795" comment="libqt4-qt3support-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151232" comment="libqt4-qt3support is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138796" comment="libqt4-qt3support-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151233" comment="libqt4-qt3support-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138797" comment="libqt4-sql-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151234" comment="libqt4-sql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138798" comment="libqt4-sql-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151235" comment="libqt4-sql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138799" comment="libqt4-sql-mysql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151236" comment="libqt4-sql-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138800" comment="libqt4-sql-mysql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151237" comment="libqt4-sql-mysql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138801" comment="libqt4-sql-postgresql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151238" comment="libqt4-sql-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138802" comment="libqt4-sql-postgresql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151239" comment="libqt4-sql-postgresql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138803" comment="libqt4-sql-sqlite-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151240" comment="libqt4-sql-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138804" comment="libqt4-sql-sqlite-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151241" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138805" comment="libqt4-sql-unixODBC-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151242" comment="libqt4-sql-unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138806" comment="libqt4-sql-unixODBC-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151243" comment="libqt4-sql-unixODBC-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138807" comment="libqt4-x11-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151244" comment="libqt4-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138808" comment="libqt4-x11-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151245" comment="libqt4-x11-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0255</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0255" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0255" source="CVE"/>
    <description>
    PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service (server crash) or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0255.html">CVE-2013-0255</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0255">SUSE bug 802679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0255">SUSE bug 802679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0255">SUSE bug 803057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0255">SUSE bug 802679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0255">SUSE bug 802679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0255">SUSE bug 802679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0255">SUSE bug 802679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0255">SUSE bug 802679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0255">SUSE bug 802679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0255">SUSE bug 802679</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0271</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271" source="CVE"/>
    <description>
    The MXit protocol plugin in libpurple in Pidgin before 2.10.7 might allow remote attackers to create or overwrite files via a crafted (1) mxit or (2) mxit/imagestrips pathname.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0271.html">CVE-2013-0271</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0271">SUSE bug 804742</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0272</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272" source="CVE"/>
    <description>
    Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0272.html">CVE-2013-0272</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0272">SUSE bug 804742</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0273</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273" source="CVE"/>
    <description>
    sametime.c in the Sametime protocol plugin in libpurple in Pidgin before 2.10.7 does not properly terminate long user IDs, which allows remote servers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0273.html">CVE-2013-0273</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0273">SUSE bug 804742</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0274</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274" source="CVE"/>
    <description>
    upnp.c in libpurple in Pidgin before 2.10.7 does not properly terminate long strings in UPnP responses, which allows remote attackers to cause a denial of service (application crash) by leveraging access to the local network.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0274.html">CVE-2013-0274</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0274">SUSE bug 804742</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0287</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0287" source="CVE"/>
    <description>
    The Simple Access Provider in System Security Services Daemon (SSSD) 1.9.0 through 1.9.4, when the Active Directory provider is used, does not properly enforce the simple_deny_groups option, which allows remote authenticated users to bypass intended access restrictions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0287.html">CVE-2013-0287</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0287">SUSE bug 809153</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0287">SUSE bug 809153</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0287">SUSE bug 809153</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0287">SUSE bug 809153</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0287">SUSE bug 809153</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0287">SUSE bug 809153</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0287">SUSE bug 809153</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138876" comment="libsss_idmap0-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151530" comment="libsss_idmap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138877" comment="sssd-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151531" comment="sssd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138878" comment="sssd-32bit-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151532" comment="sssd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138879" comment="sssd-krb5-common-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151533" comment="sssd-krb5-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138880" comment="sssd-ldap-1.11.5.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151534" comment="sssd-ldap is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0292</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0292" source="CVE"/>
    <description>
    The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0292.html">CVE-2013-0292</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0292">SUSE bug 804392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0292">SUSE bug 804392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0292">SUSE bug 804392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0292">SUSE bug 792095</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0292">SUSE bug 804392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0292">SUSE bug 792095</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0292">SUSE bug 804392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0292">SUSE bug 804392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0292">SUSE bug 804392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0292">SUSE bug 804392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0292">SUSE bug 804392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0292">SUSE bug 804392</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138232" comment="dbus-1-glib-0.100.2-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151408" comment="dbus-1-glib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138233" comment="dbus-1-glib-32bit-0.100.2-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151409" comment="dbus-1-glib-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138234" comment="dbus-1-glib-devel-0.100.2-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151410" comment="dbus-1-glib-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0338</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0338" source="CVE"/>
    <description>
    libxml2 2.9.0 and earlier allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka "internal entity expansion" with linear complexity.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0338.html">CVE-2013-0338</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0338">SUSE bug 805233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0338">SUSE bug 805233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0338">SUSE bug 805233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0338">SUSE bug 805233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0338">SUSE bug 805233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0338">SUSE bug 805233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0338">SUSE bug 805233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0338">SUSE bug 805233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0338">SUSE bug 805233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0338">SUSE bug 805233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0338">SUSE bug 805233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0338">SUSE bug 805233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0338">SUSE bug 805233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0338">SUSE bug 805233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0338">SUSE bug 805233</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0338">SUSE bug 805233</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138972" comment="libxml2-2-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138973" comment="libxml2-2-32bit-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138974" comment="libxml2-devel-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138975" comment="libxml2-tools-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0454</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0454" source="CVE"/>
    <description>
    The SMB2 implementation in Samba 3.6.x before 3.6.6, as used on the IBM Storwize V7000 Unified 1.3 before 1.3.2.3 and 1.4 before 1.4.0.1 and possibly other products, does not properly enforce CIFS share attributes, which allows remote authenticated users to (1) write to a read-only share; (2) trigger data-integrity problems related to the oplock, locking, coherency, or leases attribute; or (3) have an unspecified impact by leveraging incorrect handling of the browseable or "hide unreadable" parameter.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0454.html">CVE-2013-0454</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0454">SUSE bug 811975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0454">SUSE bug 811975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0454">SUSE bug 811975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0454">SUSE bug 811975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0454">SUSE bug 811975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0454">SUSE bug 811975</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0743</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA at the suggestion of the CVE project team.  The candidate had been associated with a correct report of a security problem, but not a problem that is categorized as a vulnerability within CVE.  Compromised or unauthorized SSL certificates are not within CVE's scope.  Notes: none.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0743.html">CVE-2013-0743</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0743">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138623" comment="libfreebl3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138624" comment="libsoftokn3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138625" comment="mozilla-nss-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138626" comment="mozilla-nss-certs-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138627" comment="mozilla-nss-devel-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138628" comment="mozilla-nss-tools-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0744</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744" source="CVE"/>
    <description>
    Use-after-free vulnerability in the TableBackgroundPainter::TableBackgroundData::Destroy function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an HTML document with a table containing many columns and column groups.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0744.html">CVE-2013-0744</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0744">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0745</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745" source="CVE"/>
    <description>
    The AutoWrapperChanger class in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not properly interact with garbage collection, which allows remote attackers to execute arbitrary code via a crafted HTML document referencing JavaScript objects.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0745.html">CVE-2013-0745</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0745">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0746</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746" source="CVE"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 do not properly implement quickstubs that use the jsval data type for their return values, which allows remote attackers to execute arbitrary code or cause a denial of service (compartment mismatch and application crash) via crafted JavaScript code that is not properly handled during garbage collection.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0746.html">CVE-2013-0746</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0746">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0747</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747" source="CVE"/>
    <description>
    The gPluginHandler.handleEvent function in the plugin handler in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not properly enforce the Same Origin Policy, which allows remote attackers to conduct clickjacking attacks via crafted JavaScript code that listens for a mutation event.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0747.html">CVE-2013-0747</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0747">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0748</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748" source="CVE"/>
    <description>
    The XBL.__proto__.toString implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 makes it easier for remote attackers to bypass the ASLR protection mechanism by calling the toString function of an XBL object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0748.html">CVE-2013-0748</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0748">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0749</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0749.html">CVE-2013-0749</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0749">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0750</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0750" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750" source="CVE"/>
    <description>
    Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0750.html">CVE-2013-0750</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0750">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0751</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751" source="CVE"/>
    <description>
    Mozilla Firefox before 18.0 on Android and SeaMonkey before 2.15 do not restrict a touch event to a single IFRAME element, which allows remote attackers to obtain sensitive information or possibly conduct cross-site scripting (XSS) attacks via a crafted HTML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0751.html">CVE-2013-0751</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0751">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0752</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752" source="CVE"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XBL file with multiple bindings that have SVG content.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0752.html">CVE-2013-0752</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0752">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0753</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753" source="CVE"/>
    <description>
    Use-after-free vulnerability in the serializeToStream implementation in the XMLSerializer component in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via crafted web content.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0753.html">CVE-2013-0753</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0753">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0754</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754" source="CVE"/>
    <description>
    Use-after-free vulnerability in the ListenerManager implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors involving the triggering of garbage collection after memory allocation for listener objects.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0754.html">CVE-2013-0754</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0754">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0755</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozVibrate implementation in the Vibrate library in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors related to the domDoc pointer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0755.html">CVE-2013-0755</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0755">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0756</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756" source="CVE"/>
    <description>
    Use-after-free vulnerability in the obj_toSource function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted web page referencing JavaScript Proxy objects that are not properly handled during garbage collection.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0756.html">CVE-2013-0756</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0756">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0757</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0757" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757" source="CVE"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not prevent modifications to the prototype of an object, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by referencing Object.prototype.__proto__ in a crafted HTML document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0757.html">CVE-2013-0757</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0757">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0758</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758" source="CVE"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging improper interaction between plugin objects and SVG elements.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0758.html">CVE-2013-0758</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0758">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0760</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760" source="CVE"/>
    <description>
    Buffer overflow in the CharDistributionAnalysis::HandleOneChar function in Mozilla Firefox before 18.0, Thunderbird before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0760.html">CVE-2013-0760</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0760">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0761</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::TrackUnionStream::EndTrack implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0761.html">CVE-2013-0761</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0761">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0762</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762" source="CVE"/>
    <description>
    Use-after-free vulnerability in the imgRequest::OnStopFrame function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0762.html">CVE-2013-0762</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0762">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0763</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0763" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to Mesa drivers and a resized WebGL canvas.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0763.html">CVE-2013-0763</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0763">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0764</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764" source="CVE"/>
    <description>
    The nsSOCKSSocketInfo::ConnectToProxy function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not ensure thread safety for SSL sessions, which allows remote attackers to execute arbitrary code via crafted data, as demonstrated by e-mail message data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0764.html">CVE-2013-0764</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0764">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0765</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0765" source="CVE"/>
    <description>
    Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 do not prevent multiple wrapping of WebIDL objects, which allows remote attackers to bypass intended access restrictions via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0765.html">CVE-2013-0765</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0765">SUSE bug 804248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0766</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766" source="CVE"/>
    <description>
    Use-after-free vulnerability in the ~nsHTMLEditRules implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0766.html">CVE-2013-0766</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0766">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0767</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767" source="CVE"/>
    <description>
    The nsSVGPathElement::GetPathLengthScale function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0767.html">CVE-2013-0767</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0767">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0768</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768" source="CVE"/>
    <description>
    Stack-based buffer overflow in the Canvas implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via an HTML document that specifies invalid width and height values.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0768.html">CVE-2013-0768</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0768">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0769</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0769.html">CVE-2013-0769</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0769">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0770</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Thunderbird before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0770.html">CVE-2013-0770</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0770">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0771</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771" source="CVE"/>
    <description>
    Heap-based buffer overflow in the gfxTextRun::ShrinkToLigatureBoundaries function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0771.html">CVE-2013-0771</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0771">SUSE bug 796895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0772</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0772" source="CVE"/>
    <description>
    The RasterImage::DrawFrameTo function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) via a crafted GIF image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0772.html">CVE-2013-0772</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0772">SUSE bug 804248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0773</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0773" source="CVE"/>
    <description>
    The Chrome Object Wrapper (COW) and System Only Wrapper (SOW) implementations in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 do not prevent modifications to a prototype, which allows remote attackers to obtain sensitive information from chrome objects or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0773.html">CVE-2013-0773</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0773">SUSE bug 804248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0774</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0774" source="CVE"/>
    <description>
    Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 do not prevent JavaScript workers from reading the browser-profile directory name, which has unspecified impact and remote attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0774.html">CVE-2013-0774</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0774">SUSE bug 804248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0775</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0775" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsImageLoadingContent::OnStopContainer function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code via crafted web script.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0775.html">CVE-2013-0775</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0775">SUSE bug 804248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0776</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0776" source="CVE"/>
    <description>
    Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow man-in-the-middle attackers to spoof the address bar by operating a proxy server that provides a 407 HTTP status code accompanied by web script, as demonstrated by a phishing attack on an HTTPS site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0776.html">CVE-2013-0776</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0776">SUSE bug 804248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0777</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0777" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsDisplayBoxShadowOuter::Paint function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0777.html">CVE-2013-0777</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0777">SUSE bug 804248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0778</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0778" source="CVE"/>
    <description>
    The ClusterIterator::NextCluster function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0778.html">CVE-2013-0778</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0778">SUSE bug 804248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0779</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0779" source="CVE"/>
    <description>
    The nsCodingStateMachine::NextState function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0779.html">CVE-2013-0779</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0779">SUSE bug 804248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0780</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0780" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0780" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsOverflowContinuationTracker::Finish function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted document that uses Cascading Style Sheets (CSS) -moz-column-* properties.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0780.html">CVE-2013-0780</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0780">SUSE bug 804248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0781</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0781" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsPrintEngine::CommonPrint function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0781.html">CVE-2013-0781</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0781">SUSE bug 804248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0782</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0782" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsSaveAsCharset::DoCharsetConversion function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0782.html">CVE-2013-0782</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0782">SUSE bug 804248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0783</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0783" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0783.html">CVE-2013-0783</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0783">SUSE bug 804248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0787</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEditor::IsPreformatted function in editor/libeditor/base/nsEditor.cpp in Mozilla Firefox before 19.0.2, Firefox ESR 17.x before 17.0.4, Thunderbird before 17.0.4, Thunderbird ESR 17.x before 17.0.4, and SeaMonkey before 2.16.1 allows remote attackers to execute arbitrary code via vectors involving an execCommand call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0787.html">CVE-2013-0787</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0787">SUSE bug 808243</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0788</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0788.html">CVE-2013-0788</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0788">SUSE bug 813026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0788">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0789</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0789" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0 and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsContentUtils::HoldJSObjects function and the nsAutoPtr class, and other vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0789.html">CVE-2013-0789</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0789">SUSE bug 813026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0789">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0791</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791" source="CVE"/>
    <description>
    The CERT_DecodeCertPackage function in Mozilla Network Security Services (NSS), as used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0791.html">CVE-2013-0791</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0791">SUSE bug 813026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0791">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138623" comment="libfreebl3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138624" comment="libsoftokn3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138625" comment="mozilla-nss-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138626" comment="mozilla-nss-certs-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138627" comment="mozilla-nss-devel-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138628" comment="mozilla-nss-tools-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0792</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792" source="CVE"/>
    <description>
    Mozilla Firefox before 20.0 and SeaMonkey before 2.17, when gfx.color_management.enablev4 is used, do not properly handle color profiles during PNG rendering, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption) via a grayscale PNG image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0792.html">CVE-2013-0792</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0792">SUSE bug 813026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0792">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0793</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793" source="CVE"/>
    <description>
    Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 do not ensure the correctness of the address bar during history navigation, which allows remote attackers to conduct cross-site scripting (XSS) attacks or phishing attacks by leveraging control over navigation timing.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0793.html">CVE-2013-0793</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0793">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0794</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794" source="CVE"/>
    <description>
    Mozilla Firefox before 20.0 and SeaMonkey before 2.17 do not prevent origin spoofing of tab-modal dialogs, which allows remote attackers to conduct phishing attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0794.html">CVE-2013-0794</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0794">SUSE bug 813026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0794">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0795</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0795" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795" source="CVE"/>
    <description>
    The System Only Wrapper (SOW) implementation in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 does not prevent use of the cloneNode method for cloning a protected node, which allows remote attackers to bypass the Same Origin Policy or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0795.html">CVE-2013-0795</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0795">SUSE bug 813026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0795">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0796</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796" source="CVE"/>
    <description>
    The WebGL subsystem in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 on Linux does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (free of unallocated memory) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0796.html">CVE-2013-0796</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0796">SUSE bug 813026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0796">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0800</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800" source="CVE"/>
    <description>
    Integer signedness error in the pixman_fill_sse2 function in pixman-sse2.c in Pixman, as distributed with Cairo and used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to execute arbitrary code via crafted values that trigger attempted use of a (1) negative box boundary or (2) negative box size, leading to an out-of-bounds write operation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0800.html">CVE-2013-0800</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0800">SUSE bug 813026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0800">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0801</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0801.html">CVE-2013-0801</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0801">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0913</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-0913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0913" source="CVE"/>
    <description>
    Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel through 3.8.3, as used in Google Chrome OS before 25.0.1364.173 and other products, allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-0913.html">CVE-2013-0913</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0913">SUSE bug 808829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0913">SUSE bug 808829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0913">SUSE bug 808829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0913">SUSE bug 808829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0913">SUSE bug 808829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0913">SUSE bug 808829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0913">SUSE bug 808829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0913">SUSE bug 808829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0913">SUSE bug 808829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0913">SUSE bug 808829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0913">SUSE bug 808829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0913">SUSE bug 808829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0913">SUSE bug 808829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0913">SUSE bug 808829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0913">SUSE bug 808829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-0913">SUSE bug 871595</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1415</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1415" source="CVE"/>
    <description>
    The pkinit_check_kdc_pkid function in plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during extraction of fields from an X.509 certificate, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1415.html">CVE-2013-1415</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1415">SUSE bug 806715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1415">SUSE bug 806715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1415">SUSE bug 806715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1415">SUSE bug 806715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1415">SUSE bug 806715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1415">SUSE bug 806715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1415">SUSE bug 806715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1415">SUSE bug 806715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1415">SUSE bug 806715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1415">SUSE bug 806715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1415">SUSE bug 806715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1415">SUSE bug 806715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1415">SUSE bug 806715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1415">SUSE bug 806715</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1417</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1417" source="CVE"/>
    <description>
    do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.11 before 1.11.4, when a single-component realm name is used, allows remote authenticated users to cause a denial of service (daemon crash) via a TGS-REQ request that triggers an attempted cross-realm referral for a host-based service principal.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1417.html">CVE-2013-1417</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1417">SUSE bug 850660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1417">SUSE bug 850660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1417">SUSE bug 850660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1417">SUSE bug 850660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1417">SUSE bug 850660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1417">SUSE bug 879587</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1418</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418" source="CVE"/>
    <description>
    The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1418.html">CVE-2013-1418</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1418">SUSE bug 849240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1418">SUSE bug 849240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1418">SUSE bug 849240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1418">SUSE bug 849240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1418">SUSE bug 849240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1418">SUSE bug 849240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1418">SUSE bug 849240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1418">SUSE bug 849240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1418">SUSE bug 849240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1418">SUSE bug 849240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1418">SUSE bug 849240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1418">SUSE bug 849240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1418">SUSE bug 849240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1418">SUSE bug 849240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1418">SUSE bug 866059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1418">SUSE bug 849240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1418">SUSE bug 879587</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1431</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1431" source="CVE"/>
    <description>
    The Wocky module in Telepathy Gabble before 0.16.6 and 0.17.x before 0.17.4, when connecting to a "legacy Jabber server," does not properly enforce the WockyConnector:tls-required flag, which allows remote attackers to bypass TLS verification and perform a man-in-the-middle attacks.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1431.html">CVE-2013-1431</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1431">SUSE bug 822586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1431">SUSE bug 822586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1431">SUSE bug 822586</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139106" comment="telepathy-gabble-0.18.3-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151566" comment="telepathy-gabble is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1442</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442" source="CVE"/>
    <description>
    Xen 4.0 through 4.3.x, when using AVX or LWP capable CPUs, does not properly clear previous data from registers when using an XSAVE or XRSTOR to extend the state components of a saved or restored vCPU after touching other restored extended registers, which allows local guest OSes to obtain sensitive information by reading the registers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1442.html">CVE-2013-1442</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1442">SUSE bug 839596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1442">SUSE bug 839596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1442">SUSE bug 839596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1442">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1442">SUSE bug 839596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1442">SUSE bug 839596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1442">SUSE bug 839596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1442">SUSE bug 839596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1442">SUSE bug 839596</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1445</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1445" source="CVE"/>
    <description>
    The Crypto.Random.atfork function in PyCrypto before 2.6.1 does not properly reseed the pseudo-random number generator (PRNG) before allowing a child process to access it, which makes it easier for context-dependent attackers to obtain sensitive information by leveraging a race condition in which a child process is created and accesses the PRNG within the same rate-limit period as another process.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1445.html">CVE-2013-1445</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1445">SUSE bug 846214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1445">SUSE bug 846214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1445">SUSE bug 846214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1445">SUSE bug 846214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1445">SUSE bug 846214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1445">SUSE bug 846214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1445">SUSE bug 846214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1445">SUSE bug 846214</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139057" comment="python-pycrypto-2.6.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151719" comment="python-pycrypto is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1447</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1447" source="CVE"/>
    <description>
    OpenJPEG 1.3 and earlier allows remote attackers to cause a denial of service (memory consumption or crash) via unspecified vectors related to NULL pointer dereferences, division-by-zero, and other errors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1447.html">CVE-2013-1447</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1447">SUSE bug 853644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1447">SUSE bug 853834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1447">SUSE bug 853834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1447">SUSE bug 853834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1447">SUSE bug 853834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1447">SUSE bug 853834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1447">SUSE bug 871412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1447">SUSE bug 853834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1447">SUSE bug 853834</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138729" comment="libopenjpeg1-1.5.2-3.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151376" comment="libopenjpeg1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1571</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1571" source="CVE"/>
    <description>
    Unspecified vulnerability in the Javadoc component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Javadoc. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to frame injection in HTML that is generated by Javadoc.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1571.html">CVE-2013-1571</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1571">SUSE bug 824397</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1571">SUSE bug 824397</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1571">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1571">SUSE bug 828665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1571">SUSE bug 829708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1571">SUSE bug 829212</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1571">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1571">SUSE bug 824397</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1571">SUSE bug 824397</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1571">SUSE bug 825624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1571">SUSE bug 824397</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1571">SUSE bug 825624</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138069" comment="ant-1.9.4-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151811" comment="ant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138070" comment="ant-jmf-1.9.4-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151812" comment="ant-jmf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138071" comment="ant-junit-1.9.4-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151813" comment="ant-junit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138072" comment="ant-scripts-1.9.4-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151814" comment="ant-scripts is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138073" comment="ant-swing-1.9.4-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151815" comment="ant-swing is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1572</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1572" source="CVE"/>
    <description>
    The dissect_oampdu_event_notification function in epan/dissectors/packet-slowprotocols.c in the IEEE 802.3 Slow Protocols dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle certain short lengths, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1572.html">CVE-2013-1572</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1572">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1573</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1573" source="CVE"/>
    <description>
    The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a large number of padding bits, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1573.html">CVE-2013-1573</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1573">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1574</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1574" source="CVE"/>
    <description>
    The dissect_bthci_eir_ad_data function in epan/dissectors/packet-bthci_cmd.c in the Bluetooth HCI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 uses an incorrect data type for a counter variable, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1574.html">CVE-2013-1574</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1574">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1575</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1575" source="CVE"/>
    <description>
    The dissect_r3_cmd_alarmconfigure function in epan/dissectors/packet-assa_r3.c in the R3 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a certain alarm length, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1575.html">CVE-2013-1575</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1575">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1576</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1576" source="CVE"/>
    <description>
    The dissect_sdp_media_attribute function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly process crypto-suite parameters, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1576.html">CVE-2013-1576</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1576">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1577</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1577" source="CVE"/>
    <description>
    The dissect_sip_p_charging_func_addresses function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle offset data associated with a quoted string, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1577.html">CVE-2013-1577</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1577">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1578</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1578" source="CVE"/>
    <description>
    The dissect_pw_eth_heuristic function in epan/dissectors/packet-pw-eth.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle apparent Ethernet address values at the beginning of MPLS data, which allows remote attackers to cause a denial of service (loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1578.html">CVE-2013-1578</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1578">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1579</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1579" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1579" source="CVE"/>
    <description>
    The rtps_util_add_bitmap function in epan/dissectors/packet-rtps.c in the RTPS dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly implement certain nested loops for processing bitmap data, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1579.html">CVE-2013-1579</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1579">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1580</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1580" source="CVE"/>
    <description>
    The dissect_cmstatus_tlv function in plugins/docsis/packet-cmstatus.c in the DOCSIS CM-STATUS dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 uses an incorrect data type for a position variable, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1580.html">CVE-2013-1580</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1580">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1581</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1581" source="CVE"/>
    <description>
    The dissect_pft_fec_detailed function in epan/dissectors/packet-dcp-etsi.c in the DCP-ETSI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle fragment gaps, which allows remote attackers to cause a denial of service (loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1581.html">CVE-2013-1581</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1581">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1582</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1582" source="CVE"/>
    <description>
    The dissect_clnp function in epan/dissectors/packet-clnp.c in the CLNP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly manage an offset variable, which allows remote attackers to cause a denial of service (infinite loop or application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1582.html">CVE-2013-1582</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1582">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1583</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1583" source="CVE"/>
    <description>
    The dissect_version_4_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 accesses an inappropriate pointer, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1583.html">CVE-2013-1583</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1583">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1584</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1584" source="CVE"/>
    <description>
    The dissect_version_5_and_6_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 accesses an inappropriate pointer, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1584.html">CVE-2013-1584</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1584">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1585</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1585" source="CVE"/>
    <description>
    epan/tvbuff.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly validate certain length values for the MS-MMC dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1585.html">CVE-2013-1585</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1585">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1586</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1586" source="CVE"/>
    <description>
    The fragment_set_tot_len function in epan/reassemble.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly determine the length of a reassembled packet for the DTLS dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1586.html">CVE-2013-1586</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1586">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1587</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1587" source="CVE"/>
    <description>
    The dissect_rohc_ir_packet function in epan/dissectors/packet-rohc.c in the ROHC dissector in Wireshark 1.8.x before 1.8.5 does not properly handle unknown profiles, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1587.html">CVE-2013-1587</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1587">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1588</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1588" source="CVE"/>
    <description>
    Multiple buffer overflows in the dissect_pft_fec_detailed function in the DCP-ETSI dissector in epan/dissectors/packet-dcp-etsi.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1588.html">CVE-2013-1588</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1588">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1589</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1589" source="CVE"/>
    <description>
    Double free vulnerability in epan/proto.c in the dissection engine in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1589.html">CVE-2013-1589</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1589">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1590</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1590" source="CVE"/>
    <description>
    Buffer overflow in the NTLMSSP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1590.html">CVE-2013-1590</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1590">SUSE bug 801131</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1620</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1620" source="CVE"/>
    <description>
    The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1620.html">CVE-2013-1620</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1620">SUSE bug 802184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1620">SUSE bug 802184</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138623" comment="libfreebl3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138624" comment="libsoftokn3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138625" comment="mozilla-nss-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138626" comment="mozilla-nss-certs-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138627" comment="mozilla-nss-devel-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138628" comment="mozilla-nss-tools-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1635</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1635" source="CVE"/>
    <description>
    ext/soap/soap.c in PHP before 5.3.22 and 5.4.x before 5.4.13 does not validate the relationship between the soap.wsdl_cache_dir directive and the open_basedir directive, which allows remote attackers to bypass intended access restrictions by triggering the creation of cached SOAP WSDL files in an arbitrary directory.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1635.html">CVE-2013-1635</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1635">SUSE bug 807707</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1643</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1643" source="CVE"/>
    <description>
    The SOAP parser in PHP before 5.3.23 and 5.4.x before 5.4.13 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-1824.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1643.html">CVE-2013-1643</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1643">SUSE bug 807707</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1667</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667" source="CVE"/>
    <description>
    The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1667.html">CVE-2013-1667</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1667">SUSE bug 804415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1667">SUSE bug 804415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1667">SUSE bug 804415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1667">SUSE bug 804415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1667">SUSE bug 804415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1667">SUSE bug 804415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1667">SUSE bug 804415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1667">SUSE bug 804415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1667">SUSE bug 804415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1667">SUSE bug 804415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1667">SUSE bug 804415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1667">SUSE bug 804415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1667">SUSE bug 804415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1667">SUSE bug 804415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1667">SUSE bug 804415</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138077" comment="apache2-mod_perl-2.0.9-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151816" comment="apache2-mod_perl is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1669</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1669" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 21.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1669.html">CVE-2013-1669</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1669">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1670</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670" source="CVE"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 does not prevent acquisition of chrome privileges during calls to content level constructors, which allows remote attackers to bypass certain read-only restrictions and conduct cross-site scripting (XSS) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1670.html">CVE-2013-1670</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1670">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1671</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1671" source="CVE"/>
    <description>
    Mozilla Firefox before 21.0 does not properly implement the INPUT element, which allows remote attackers to obtain the full pathname via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1671.html">CVE-2013-1671</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1671">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1674</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code via vectors involving an onresize event during the playing of a video.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1674.html">CVE-2013-1674</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1674">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1675</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675" source="CVE"/>
    <description>
    Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 do not properly initialize data structures for the nsDOMSVGZoomEvent::mPreviousScale and nsDOMSVGZoomEvent::mNewScale functions, which allows remote attackers to obtain sensitive information from process memory via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1675.html">CVE-2013-1675</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1675">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1676</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1676" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676" source="CVE"/>
    <description>
    The SelectionIterator::GetNextSegment function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1676.html">CVE-2013-1676</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1676">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1677</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677" source="CVE"/>
    <description>
    The gfxSkipCharsIterator::SetOffsets function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1677.html">CVE-2013-1677</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1677">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1678</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1678" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678" source="CVE"/>
    <description>
    The _cairo_xlib_surface_add_glyph function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (invalid write operation) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1678.html">CVE-2013-1678</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1678">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1679</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::plugins::child::_geturlnotify function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1679.html">CVE-2013-1679</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1679">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1680</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsFrameList::FirstChild function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1680.html">CVE-2013-1680</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1680">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1681</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsContentUtils::RemoveScriptBlocker function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1681.html">CVE-2013-1681</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1681">SUSE bug 819204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1682</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1682.html">CVE-2013-1682</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1682">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1683</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1683" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 22.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1683.html">CVE-2013-1683</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1683">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1684</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::HTMLMediaElement::LookupMediaElementURITable function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1684.html">CVE-2013-1684</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1684">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1685</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsIDocument::GetRootElement function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1685.html">CVE-2013-1685</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1685">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1686</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::ResetDir function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1686.html">CVE-2013-1686</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1686">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1687</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687" source="CVE"/>
    <description>
    The System Only Wrapper (SOW) and Chrome Object Wrapper (COW) implementations in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly restrict XBL user-defined functions, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges, or conduct cross-site scripting (XSS) attacks, via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1687.html">CVE-2013-1687</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1687">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1688</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1688" source="CVE"/>
    <description>
    The Profiler implementation in Mozilla Firefox before 22.0 parses untrusted data during UI rendering, which allows user-assisted remote attackers to execute arbitrary JavaScript code via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1688.html">CVE-2013-1688</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1688">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1690</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690" source="CVE"/>
    <description>
    Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1690.html">CVE-2013-1690</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1690">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1692</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692" source="CVE"/>
    <description>
    Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not prevent the inclusion of body data in an XMLHttpRequest HEAD request, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1692.html">CVE-2013-1692</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1692">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1693</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693" source="CVE"/>
    <description>
    The SVG filter implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to read pixel values, and possibly bypass the Same Origin Policy and read text from a different domain, by observing timing differences in execution of filter code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1693.html">CVE-2013-1693</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1693">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1694</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1694" source="CVE"/>
    <description>
    The PreserveWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly handle the lack of a wrapper, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by leveraging unintended clearing of the wrapper cache's preserved-wrapper flag.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1694.html">CVE-2013-1694</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1694">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1695</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1695" source="CVE"/>
    <description>
    Mozilla Firefox before 22.0 does not properly implement certain DocShell inheritance behavior for the sandbox attribute of an IFRAME element, which allows remote attackers to bypass intended access restrictions via a FRAME element within an IFRAME element.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1695.html">CVE-2013-1695</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1695">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1696</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1696" source="CVE"/>
    <description>
    Mozilla Firefox before 22.0 does not properly enforce the X-Frame-Options protection mechanism, which allows remote attackers to conduct clickjacking attacks via a crafted web site that uses the HTTP server push feature with multipart responses.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1696.html">CVE-2013-1696</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1696">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1697</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697" source="CVE"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1697.html">CVE-2013-1697</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1697">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1698</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1698" source="CVE"/>
    <description>
    The getUserMedia permission implementation in Mozilla Firefox before 22.0 references the URL of a top-level document instead of the URL of a specific page, which makes it easier for remote attackers to trick users into permitting camera or microphone access via a crafted web site that uses IFRAME elements.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1698.html">CVE-2013-1698</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1698">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1699</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1699" source="CVE"/>
    <description>
    The Internationalized Domain Name (IDN) display algorithm in Mozilla Firefox before 22.0 does not properly handle the .com, .name, and .net top-level domains, which allows remote attackers to spoof the address bar via unspecified homograph characters.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1699.html">CVE-2013-1699</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1699">SUSE bug 825935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1701</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1701.html">CVE-2013-1701</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1701">SUSE bug 833389</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1702</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1702" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1702.html">CVE-2013-1702</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1702">SUSE bug 833389</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1704</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1704" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsINode::GetParentNode function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a DOM modification at the time of a SetBody mutation event.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1704.html">CVE-2013-1704</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1704">SUSE bug 833389</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1705</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705" source="CVE"/>
    <description>
    Heap-based buffer underflow in the cryptojs_interpret_key_gen_type function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Certificate Request Message Format (CRMF) request.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1705.html">CVE-2013-1705</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1705">SUSE bug 840485</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1705">SUSE bug 833389</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1708</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1708" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1708" source="CVE"/>
    <description>
    Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (application crash) via a crafted WAV file that is not properly handled by the nsCString::CharAt function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1708.html">CVE-2013-1708</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1708">SUSE bug 833389</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1709</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709" source="CVE"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly handle the interaction between FRAME elements and history, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving spoofing a relative location in a previously visited document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1709.html">CVE-2013-1709</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1709">SUSE bug 833389</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1710</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710" source="CVE"/>
    <description>
    The crypto.generateCRMFRequest function in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allows remote attackers to execute arbitrary JavaScript code or conduct cross-site scripting (XSS) attacks via vectors related to Certificate Request Message Format (CRMF) request generation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1710.html">CVE-2013-1710</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1710">SUSE bug 833389</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1711</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1711" source="CVE"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 does not properly address the possibility of an XBL scope bypass resulting from non-native arguments in XBL function calls, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks by leveraging access to an unprivileged object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1711.html">CVE-2013-1711</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1711">SUSE bug 833389</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1713</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713" source="CVE"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 use an incorrect URI within unspecified comparisons during enforcement of the Same Origin Policy, which allows remote attackers to conduct cross-site scripting (XSS) attacks or install arbitrary add-ons via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1713.html">CVE-2013-1713</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1713">SUSE bug 833389</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1714</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714" source="CVE"/>
    <description>
    The Web Workers implementation in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 does not properly restrict XMLHttpRequest calls, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1714.html">CVE-2013-1714</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1714">SUSE bug 833389</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1717</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717" source="CVE"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly restrict local-filesystem access by Java applets, which allows user-assisted remote attackers to read arbitrary files by leveraging a download to a fixed pathname or other predictable pathname.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1717.html">CVE-2013-1717</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1717">SUSE bug 833389</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1718</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1718.html">CVE-2013-1718</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1718">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1719</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1719" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1719.html">CVE-2013-1719</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1719">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1720</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1720" source="CVE"/>
    <description>
    The nsHtml5TreeBuilder::resetTheInsertionMode function in the HTML5 Tree Builder in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 does not properly maintain the state of the insertion-mode stack for template elements, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer over-read) by triggering use of this stack in its empty state.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1720.html">CVE-2013-1720</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1720">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1721</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1721" source="CVE"/>
    <description>
    Integer overflow in the drawLineLoop function in the libGLESv2 library in Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox before 24.0 and SeaMonkey before 2.21, allows remote attackers to execute arbitrary code via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1721.html">CVE-2013-1721</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1721">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1722</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsAnimationManager::BuildAnimations function in the Animation Manager in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving stylesheet cloning.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1722.html">CVE-2013-1722</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1722">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1723</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1723" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1723" source="CVE"/>
    <description>
    The NativeKey widget in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 processes key messages after destruction by a dispatched event listener, which allows remote attackers to cause a denial of service (application crash) by leveraging incorrect event usage after widget-memory reallocation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1723.html">CVE-2013-1723</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1723">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1724</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1724" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1724" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::HTMLFormElement::IsDefaultSubmitElement function in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a destroyed SELECT element.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1724.html">CVE-2013-1724</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1724">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1725</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725" source="CVE"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not ensure that initialization occurs for JavaScript objects with compartments, which allows remote attackers to execute arbitrary code by leveraging incorrect scope handling.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1725.html">CVE-2013-1725</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1725">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1728</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1728" source="CVE"/>
    <description>
    The IonMonkey JavaScript engine in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21, when Valgrind mode is used, does not properly initialize memory, which makes it easier for remote attackers to obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1728.html">CVE-2013-1728</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1728">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1730</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730" source="CVE"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly handle movement of XBL-backed nodes between documents, which allows remote attackers to execute arbitrary code or cause a denial of service (JavaScript compartment mismatch, or assertion failure and application exit) via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1730.html">CVE-2013-1730</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1730">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1732</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732" source="CVE"/>
    <description>
    Buffer overflow in the nsFloatManager::GetFlowArea function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via crafted use of lists and floats within a multi-column layout.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1732.html">CVE-2013-1732</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1732">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1735</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::layout::ScrollbarActivity function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via vectors related to image-document scrolling.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1735.html">CVE-2013-1735</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1735">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1736</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736" source="CVE"/>
    <description>
    The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to improperly establishing parent-child relationships of range-request nodes.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1736.html">CVE-2013-1736</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1736">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1737</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737" source="CVE"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly identify the "this" object during use of user-defined getter methods on DOM proxies, which might allow remote attackers to bypass intended access restrictions via vectors involving an expando object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1737.html">CVE-2013-1737</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1737">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1738</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1738" source="CVE"/>
    <description>
    Use-after-free vulnerability in the JS_GetGlobalForScopeChain function in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code by leveraging incorrect garbage collection in situations involving default compartments and frame-chain restoration.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1738.html">CVE-2013-1738</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1738">SUSE bug 840485</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1739</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.15.2 does not ensure that data structures are initialized before read operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a decryption failure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1739.html">CVE-2013-1739</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1739">SUSE bug 842979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1739">SUSE bug 842979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1739">SUSE bug 842979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1739">SUSE bug 842979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1739">SUSE bug 842979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1739">SUSE bug 847708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1739">SUSE bug 842979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1739">SUSE bug 842979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1739">SUSE bug 842979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138623" comment="libfreebl3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138624" comment="libsoftokn3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138625" comment="mozilla-nss-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138626" comment="mozilla-nss-certs-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138627" comment="mozilla-nss-devel-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138628" comment="mozilla-nss-tools-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1740</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1740" source="CVE"/>
    <description>
    The ssl_Do1stHandshake function in sslsecur.c in libssl in Mozilla Network Security Services (NSS) before 3.15.4, when the TLS False Start feature is enabled, allows man-in-the-middle attackers to spoof SSL servers by using an arbitrary X.509 certificate during certain handshake traffic.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1740.html">CVE-2013-1740</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1740">SUSE bug 859055</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1740">SUSE bug 859055</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1740">SUSE bug 859055</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1740">SUSE bug 859055</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1740">SUSE bug 859055</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1740">SUSE bug 859055</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1740">SUSE bug 859055</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138623" comment="libfreebl3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138624" comment="libsoftokn3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138625" comment="mozilla-nss-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138626" comment="mozilla-nss-certs-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138627" comment="mozilla-nss-devel-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138628" comment="mozilla-nss-tools-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1752</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1752" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1752.html">CVE-2013-1752</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1752">SUSE bug 856836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1752">SUSE bug 856836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1752">SUSE bug 856836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1752">SUSE bug 856836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1752">SUSE bug 856836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1752">SUSE bug 856836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1752">SUSE bug 856836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1752">SUSE bug 856836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1752">SUSE bug 856836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1752">SUSE bug 856836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1752">SUSE bug 856836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1752">SUSE bug 856836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1752">SUSE bug 856836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1752">SUSE bug 856836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1752">SUSE bug 856836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1752">SUSE bug 856836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1752">SUSE bug 856836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1752">SUSE bug 856836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1752">SUSE bug 856836</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138784" comment="libpython2_7-1_0-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138785" comment="libpython2_7-1_0-32bit-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138789" comment="libpython3_4m1_0-3.4.1-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151646" comment="libpython3_4m1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138786" comment="python-base-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138787" comment="python-devel-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138788" comment="python-xml-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138790" comment="python3-base-3.4.1-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1753</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1753" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1753.html">CVE-2013-1753</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1753">SUSE bug 856835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1753">SUSE bug 856835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1753">SUSE bug 856835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1753">SUSE bug 856835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1753">SUSE bug 856835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1753">SUSE bug 856835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1753">SUSE bug 856835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1753">SUSE bug 856835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1753">SUSE bug 856835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1753">SUSE bug 856835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1753">SUSE bug 856835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1753">SUSE bug 856835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1753">SUSE bug 856835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1753">SUSE bug 856835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1753">SUSE bug 856835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1753">SUSE bug 856835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1753">SUSE bug 856835</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138784" comment="libpython2_7-1_0-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138785" comment="libpython2_7-1_0-32bit-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138786" comment="python-base-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138787" comment="python-devel-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138788" comment="python-xml-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1775</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775" source="CVE"/>
    <description>
    sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1775.html">CVE-2013-1775</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 806919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 806919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 806919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 815325</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 806919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 815325</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 806919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 815325</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 806919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 815325</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 806919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 806919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 806919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 806919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 806919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 806919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 806919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 815325</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 806919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 806919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 806919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 815325</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 845568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 854381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 806919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 854381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1775">SUSE bug 815325</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139098" comment="sudo-1.8.10p3-3.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1776</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776" source="CVE"/>
    <description>
    sudo 1.3.5 through 1.7.10 and 1.8.0 through 1.8.5, when the tty_tickets option is enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to connecting to the standard input, output, and error file descriptors of another terminal.  NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1776.html">CVE-2013-1776</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 817349</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 817350</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 806921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1776">SUSE bug 806921</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139098" comment="sudo-1.8.10p3-3.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1788</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1788" source="CVE"/>
    <description>
    poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1788.html">CVE-2013-1788</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1788">SUSE bug 806793</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138754" comment="libpoppler-devel-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151223" comment="libpoppler-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138755" comment="libpoppler-glib8-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151224" comment="libpoppler-glib8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138756" comment="libpoppler-qt4-4-0.24.4-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151225" comment="libpoppler-qt4-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138757" comment="libpoppler44-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151226" comment="libpoppler44 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138758" comment="poppler-tools-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151227" comment="poppler-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1789</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1789" source="CVE"/>
    <description>
    splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1789.html">CVE-2013-1789</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1789">SUSE bug 806793</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138754" comment="libpoppler-devel-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151223" comment="libpoppler-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138755" comment="libpoppler-glib8-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151224" comment="libpoppler-glib8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138756" comment="libpoppler-qt4-4-0.24.4-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151225" comment="libpoppler-qt4-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138757" comment="libpoppler44-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151226" comment="libpoppler44 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138758" comment="poppler-tools-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151227" comment="poppler-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1790</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790" source="CVE"/>
    <description>
    poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1790.html">CVE-2013-1790</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1790">SUSE bug 806793</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1790">SUSE bug 806793</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138754" comment="libpoppler-devel-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151223" comment="libpoppler-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138755" comment="libpoppler-glib8-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151224" comment="libpoppler-glib8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138756" comment="libpoppler-qt4-4-0.24.4-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151225" comment="libpoppler-qt4-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138757" comment="libpoppler44-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151226" comment="libpoppler44 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138758" comment="poppler-tools-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151227" comment="poppler-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1799</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1799" source="CVE"/>
    <description>
    Gnome Online Accounts (GOA) 3.6.x before 3.6.3 and 3.7.x before 3.7.91, does not properly validate SSL certificates when creating accounts for providers who use the libsoup library, which allows man-in-the-middle attackers to obtain sensitive information such as credentials by sniffing the network.  NOTE: this issue exists because of an incomplete fix for CVE-2013-0240.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1799.html">CVE-2013-1799</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1799">SUSE bug 808534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1799">SUSE bug 808534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1799">SUSE bug 808534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1799">SUSE bug 808534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1799">SUSE bug 808534</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138359" comment="gnome-online-accounts-3.16.4.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151805" comment="gnome-online-accounts is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138360" comment="gnome-online-accounts-devel-3.16.4.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151806" comment="gnome-online-accounts-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138361" comment="gnome-online-accounts-lang-3.16.4.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151807" comment="gnome-online-accounts-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138362" comment="libgoa-1_0-0-3.16.4.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151808" comment="libgoa-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138363" comment="libgoa-backend-1_0-1-3.16.4.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151809" comment="libgoa-backend-1_0-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138364" comment="typelib-1_0-Goa-1_0-3.16.4.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151810" comment="typelib-1_0-Goa-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1824</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1824" source="CVE"/>
    <description>
    The SOAP parser in PHP before 5.3.22 and 5.4.x before 5.4.12 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1824.html">CVE-2013-1824</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1824">SUSE bug 807707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1824">SUSE bug 807707</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1845</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1845" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (memory consumption) by (1) setting or (2) deleting a large number of properties for a file or directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1845.html">CVE-2013-1845</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1845">SUSE bug 813913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1846</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1846" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a LOCK on an activity URL.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1846.html">CVE-2013-1846</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1846">SUSE bug 813913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1846">SUSE bug 813913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1847</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1847" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.6.0 through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an anonymous LOCK for a URL that does not exist.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1847.html">CVE-2013-1847</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1847">SUSE bug 813913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1847">SUSE bug 813913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1849</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1849" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1849.html">CVE-2013-1849</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1849">SUSE bug 813913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1863</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1863" source="CVE"/>
    <description>
    Samba 4.x before 4.0.4, when configured as an Active Directory domain controller, uses world-writable permissions on non-default CIFS shares, which allows remote authenticated users to read, modify, create, or delete arbitrary files via standard filesystem operations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1863.html">CVE-2013-1863</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1863">SUSE bug 809624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1863">SUSE bug 809624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1863">SUSE bug 809624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1863">SUSE bug 809624</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1881</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1881" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1881" source="CVE"/>
    <description>
    GNOME libsvg before 2.39.0 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1881.html">CVE-2013-1881</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1881">SUSE bug 840753</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138305" comment="gdk-pixbuf-loader-rsvg-2.40.10-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151634" comment="gdk-pixbuf-loader-rsvg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138306" comment="librsvg-2-2-2.40.10-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151635" comment="librsvg-2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138307" comment="librsvg-devel-2.40.10-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151636" comment="librsvg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138308" comment="typelib-1_0-Rsvg-2_0-2.40.10-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151637" comment="typelib-1_0-Rsvg-2_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1884</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1884" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (segmentation fault and crash) via a log REPORT request with an invalid limit, which triggers an access of an uninitialized variable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1884.html">CVE-2013-1884</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1884">SUSE bug 813913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1896</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896" source="CVE"/>
    <description>
    mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1896.html">CVE-2013-1896</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1896">SUSE bug 829056</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1899</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1899" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899" source="CVE"/>
    <description>
    Argument injection vulnerability in PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, and 9.0.x before 9.0.13 allows remote attackers to cause a denial of service (file corruption), and allows remote authenticated users to modify configuration settings and execute arbitrary code, via a connection request using a database name that begins with a "-" (hyphen).
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1899.html">CVE-2013-1899</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1899">SUSE bug 812525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1899">SUSE bug 812525</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1900</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1900" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900" source="CVE"/>
    <description>
    PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, 9.0.x before 9.0.13, and 8.4.x before 8.4.17, when using OpenSSL, generates insufficiently random numbers, which might allow remote authenticated users to have an unspecified impact via vectors related to the "contrib/pgcrypto functions."
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1900.html">CVE-2013-1900</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1900">SUSE bug 812525</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1901</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901" source="CVE"/>
    <description>
    PostgreSQL 9.2.x before 9.2.4 and 9.1.x before 9.1.9 does not properly check REPLICATION privileges, which allows remote authenticated users to bypass intended backup restrictions by calling the (1) pg_start_backup or (2) pg_stop_backup functions.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1901.html">CVE-2013-1901</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1901">SUSE bug 812525</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1914</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914" source="CVE"/>
    <description>
    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1914.html">CVE-2013-1914</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 826666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 920055</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 937231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 937231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1914">SUSE bug 813121</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138343" comment="glibc-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138344" comment="glibc-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138345" comment="glibc-devel-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138346" comment="glibc-extra-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138347" comment="glibc-info-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138348" comment="glibc-locale-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138349" comment="glibc-locale-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138350" comment="nscd-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1917</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1917" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1917" source="CVE"/>
    <description>
    Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1917.html">CVE-2013-1917</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1917">SUSE bug 813673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1917">SUSE bug 813673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1917">SUSE bug 813673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1917">SUSE bug 813673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1917">SUSE bug 813673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1917">SUSE bug 813673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1917">SUSE bug 813673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1917">SUSE bug 813673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1917">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1917">SUSE bug 813673</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1918</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1918" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918" source="CVE"/>
    <description>
    Certain page table manipulation operations in Xen 4.1.x, 4.2.x, and earlier are not preemptible, which allows local PV kernels to cause a denial of service via vectors related to "deep page table traversal."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1918.html">CVE-2013-1918</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1918">SUSE bug 816159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1918">SUSE bug 816159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1918">SUSE bug 816159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1918">SUSE bug 816159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1918">SUSE bug 813673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1918">SUSE bug 816159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1918">SUSE bug 826882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1918">SUSE bug 823011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1918">SUSE bug 826882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1918">SUSE bug 816159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1918">SUSE bug 826882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1918">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1918">SUSE bug 826882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1918">SUSE bug 826882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1918">SUSE bug 826882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1918">SUSE bug 826882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1918">SUSE bug 816159</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1919</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1919" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1919" source="CVE"/>
    <description>
    Xen 4.2.x and 4.1.x does not properly restrict access to IRQs, which allows local stub domain clients to gain access to IRQs and cause a denial of service via vectors related to "passed-through IRQs or PCI devices."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1919.html">CVE-2013-1919</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1919">SUSE bug 813675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1919">SUSE bug 813675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1919">SUSE bug 813675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1919">SUSE bug 813675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1919">SUSE bug 813675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1919">SUSE bug 813675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1919">SUSE bug 813675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1919">SUSE bug 813675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1919">SUSE bug 813673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1919">SUSE bug 813675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1919">SUSE bug 813675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1919">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1919">SUSE bug 813675</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1922</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1922" source="CVE"/>
    <description>
    qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1922.html">CVE-2013-1922</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1922">SUSE bug 814059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1922">SUSE bug 814059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1922">SUSE bug 814059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1922">SUSE bug 814059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1922">SUSE bug 814059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1922">SUSE bug 814059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1922">SUSE bug 814059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1922">SUSE bug 934753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1922">SUSE bug 934768</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1926</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1926" source="CVE"/>
    <description>
    The IcedTea-Web plugin before 1.2.3 and 1.3.x before 1.3.2 uses the same class loader for applets with the same codebase path but from different domains, which allows remote attackers to obtain sensitive information or possibly alter other applets via a crafted applet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1926.html">CVE-2013-1926</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1926">SUSE bug 815596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1926">SUSE bug 815596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1926">SUSE bug 815596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1926">SUSE bug 815596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1926">SUSE bug 818768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1926">SUSE bug 815596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1926">SUSE bug 815596</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138403" comment="icedtea-web-javadoc-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151624" comment="icedtea-web-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138404" comment="java-1_8_0-openjdk-plugin-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151625" comment="java-1_8_0-openjdk-plugin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1927</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1927" source="CVE"/>
    <description>
    The IcedTea-Web plugin before 1.2.3 and 1.3.x before 1.3.2 allows remote attackers to execute arbitrary code via a crafted file that validates as both a GIF and a Java JAR file, aka "GIFAR."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1927.html">CVE-2013-1927</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1927">SUSE bug 815596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1927">SUSE bug 815596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1927">SUSE bug 815596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1927">SUSE bug 815596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1927">SUSE bug 818768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1927">SUSE bug 815596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1927">SUSE bug 815596</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138403" comment="icedtea-web-javadoc-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151624" comment="icedtea-web-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138404" comment="java-1_8_0-openjdk-plugin-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151625" comment="java-1_8_0-openjdk-plugin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1940</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940" source="CVE"/>
    <description>
    X.Org X server before 1.13.4 and 1.4.x before 1.14.1 does not properly restrict access to input events when adding a new hot-plug device, which might allow physically proximate attackers to obtain sensitive information, as demonstrated by reading passwords from a tty.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1940.html">CVE-2013-1940</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1940">SUSE bug 814653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1940">SUSE bug 814653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1940">SUSE bug 814653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1940">SUSE bug 814653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1940">SUSE bug 815870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1940">SUSE bug 814653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1940">SUSE bug 814653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1940">SUSE bug 814653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1940">SUSE bug 814653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1940">SUSE bug 814653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1940">SUSE bug 814653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1940">SUSE bug 814653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1940">SUSE bug 814653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1940">SUSE bug 815870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1940">SUSE bug 814653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1940">SUSE bug 815870</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139149" comment="xorg-x11-server-7.6_1.17.2-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139150" comment="xorg-x11-server-extra-7.6_1.17.2-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139151" comment="xorg-x11-server-sdk-7.6_1.17.2-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1944</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944" source="CVE"/>
    <description>
    The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1944.html">CVE-2013-1944</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1944">SUSE bug 814655</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138211" comment="curl-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138212" comment="libcurl-devel-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138213" comment="libcurl4-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1952</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952" source="CVE"/>
    <description>
    Xen 4.x, when using Intel VT-d for a bus mastering capable PCI device, does not properly check the source when accessing a bridge device's interrupt remapping table entries for MSI interrupts, which allows local guest domains to cause a denial of service (interrupt injection) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1952.html">CVE-2013-1952</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1952">SUSE bug 816163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1952">SUSE bug 816163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1952">SUSE bug 813673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1952">SUSE bug 816163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1952">SUSE bug 816163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1952">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1952">SUSE bug 816163</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1960</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1960" source="CVE"/>
    <description>
    Heap-based buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1960.html">CVE-2013-1960</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1960">SUSE bug 817573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1960">SUSE bug 817573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1960">SUSE bug 817573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1960">SUSE bug 817573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1960">SUSE bug 817573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1960">SUSE bug 817573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1960">SUSE bug 817573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1960">SUSE bug 817573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1960">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1961</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1961" source="CVE"/>
    <description>
    Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1961.html">CVE-2013-1961</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1961">SUSE bug 817573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1961">SUSE bug 817573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1961">SUSE bug 817573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1961">SUSE bug 818117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1961">SUSE bug 817573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1961">SUSE bug 818117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1961">SUSE bug 818117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1961">SUSE bug 818117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1961">SUSE bug 818117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1961">SUSE bug 818117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1961">SUSE bug 818117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1961">SUSE bug 818117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1961">SUSE bug 818117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1961">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1962</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1962" source="CVE"/>
    <description>
    The remoteDispatchStoragePoolListAllVolumes function in the storage pool manager in libvirt 1.0.5 allows remote attackers to cause a denial of service (file descriptor consumption) via a large number of requests "to list all volumes for the particular pool."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1962.html">CVE-2013-1962</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1962">SUSE bug 820397</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1962">SUSE bug 820397</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1962">SUSE bug 820397</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1962">SUSE bug 820397</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1962">SUSE bug 820397</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1968</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1968" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1968" source="CVE"/>
    <description>
    Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote authenticated users to cause a denial of service (FSFS repository corruption) via a newline character in a file name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1968.html">CVE-2013-1968</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1968">SUSE bug 821505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1968">SUSE bug 821505</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1969</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1969" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2) xmldecl_done functions, as demonstrated by a buffer overflow in the xmlBufGetInputBase function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1969.html">CVE-2013-1969</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1969">SUSE bug 815665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1969">SUSE bug 815665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1969">SUSE bug 815665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1969">SUSE bug 815665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1969">SUSE bug 815665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1969">SUSE bug 815665</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138972" comment="libxml2-2-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138973" comment="libxml2-2-32bit-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138974" comment="libxml2-devel-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138975" comment="libxml2-tools-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1976</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1976" source="CVE"/>
    <description>
    The (1) tomcat5, (2) tomcat6, and (3) tomcat7 init scripts, as used in the RPM distribution of Tomcat for JBoss Enterprise Web Server 1.0.2 and 2.0.0, and Red Hat Enterprise Linux 5 and 6, allow local users to change the ownership of arbitrary files via a symlink attack on (a) tomcat5-initd.log, (b) tomcat6-initd.log, (c) catalina.out, or (d) tomcat7-initd.log.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1976.html">CVE-2013-1976</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1976">SUSE bug 822177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1976">SUSE bug 822177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1976">SUSE bug 822177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1976">SUSE bug 822177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1976">SUSE bug 822177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1976">SUSE bug 822177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1976">SUSE bug 822177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1976">SUSE bug 822177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1976">SUSE bug 822177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1976">SUSE bug 822177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1976">SUSE bug 822177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1976">SUSE bug 822177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1976">SUSE bug 822177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1976">SUSE bug 822177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1976">SUSE bug 824284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1976">SUSE bug 822177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1976">SUSE bug 822177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1976">SUSE bug 822177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1976">SUSE bug 822177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1976">SUSE bug 822177</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1981</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XQueryFont, (2) _XF86BigfontQueryFont, (3) XListFontsWithInfo, (4) XGetMotionEvents, (5) XListHosts, (6) XGetModifierMapping, (7) XGetPointerMapping, (8) XGetKeyboardMapping, (9) XGetWindowProperty, (10) XGetImage, (11) LoadColornameDB, (12) XrmGetFileDatabase, (13) _XimParseStringFile, or (14) TransFileName functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1981.html">CVE-2013-1981</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1981">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1981">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1981">SUSE bug 821664</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138493" comment="libX11-6-1.6.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138494" comment="libX11-6-32bit-1.6.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151818" comment="libX11-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138495" comment="libX11-data-1.6.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138496" comment="libX11-devel-1.6.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151820" comment="libX11-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138497" comment="libX11-xcb1-1.6.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138498" comment="libX11-xcb1-32bit-1.6.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151822" comment="libX11-xcb1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1982</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXext 1.3.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XcupGetReservedColormapEntries, (2) XcupStoreColors, (3) XdbeGetVisualInfo, (4) XeviGetVisualInfo, (5) XShapeGetRectangles, and (6) XSyncListSystemCounters functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1982.html">CVE-2013-1982</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1982">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1982">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1982">SUSE bug 821665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1982">SUSE bug 821665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1982">SUSE bug 821665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1982">SUSE bug 821665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1982">SUSE bug 821665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1982">SUSE bug 821665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1982">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1982">SUSE bug 821665</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138504" comment="libXext-devel-1.3.3-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151823" comment="libXext-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138505" comment="libXext6-1.3.3-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151824" comment="libXext6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138506" comment="libXext6-32bit-1.3.3-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151825" comment="libXext6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1983</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983" source="CVE"/>
    <description>
    Integer overflow in X.org libXfixes 5.0 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XFixesGetCursorImage function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1983.html">CVE-2013-1983</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1983">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1983">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1983">SUSE bug 821667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1983">SUSE bug 821667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1983">SUSE bug 821667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1983">SUSE bug 821667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1983">SUSE bug 821667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1983">SUSE bug 821667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1983">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1983">SUSE bug 821667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1983">SUSE bug 880221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138507" comment="libXfixes-devel-5.0.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151826" comment="libXfixes-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138508" comment="libXfixes3-5.0.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151827" comment="libXfixes3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138509" comment="libXfixes3-32bit-5.0.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151828" comment="libXfixes3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1984</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXi 1.7.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XGetDeviceControl, (2) XGetFeedbackControl, (3) XGetDeviceDontPropagateList, (4) XGetDeviceMotionEvents, (5) XIGetProperty, (6) XIGetSelectedEvents, (7) XGetDeviceProperties, and (8) XListInputDevices functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1984.html">CVE-2013-1984</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1984">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1984">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1984">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138512" comment="libXi-devel-1.7.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151829" comment="libXi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138513" comment="libXi6-1.7.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151830" comment="libXi6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138514" comment="libXi6-32bit-1.7.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151831" comment="libXi6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1985</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985" source="CVE"/>
    <description>
    Integer overflow in X.org libXinerama 1.1.2 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XineramaQueryScreens function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1985.html">CVE-2013-1985</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1985">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1985">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1985">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138515" comment="libXinerama-devel-1.1.3-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151832" comment="libXinerama-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138516" comment="libXinerama1-1.1.3-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151833" comment="libXinerama1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138517" comment="libXinerama1-32bit-1.1.3-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151834" comment="libXinerama1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1986</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1986" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXrandr 1.4.0 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRRQueryOutputProperty and (2) XRRQueryProviderProperty functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1986.html">CVE-2013-1986</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1986">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1986">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1986">SUSE bug 821663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1986">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1986">SUSE bug 815451</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138520" comment="libXrandr-devel-1.5.0-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151835" comment="libXrandr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138521" comment="libXrandr2-1.5.0-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151836" comment="libXrandr2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138522" comment="libXrandr2-32bit-1.5.0-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151837" comment="libXrandr2-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1987</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1987" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXrender 0.9.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRenderQueryFilters, (2) XRenderQueryFormats, and (3) XRenderQueryPictIndexValues functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1987.html">CVE-2013-1987</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1987">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1987">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1987">SUSE bug 821669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1987">SUSE bug 821669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1987">SUSE bug 821669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1987">SUSE bug 821669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1987">SUSE bug 821669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1987">SUSE bug 821669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1987">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1987">SUSE bug 821669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1987">SUSE bug 880221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138523" comment="libXrender-devel-0.9.9-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151838" comment="libXrender-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138524" comment="libXrender1-0.9.9-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151839" comment="libXrender1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138525" comment="libXrender1-32bit-0.9.9-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151840" comment="libXrender1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1988</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXRes 1.0.6 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XResQueryClients and (2) XResQueryClientResources functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1988.html">CVE-2013-1988</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1988">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1988">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1988">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138499" comment="libXRes1-1.0.7-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151841" comment="libXRes1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138500" comment="libXres-devel-1.0.7-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151842" comment="libXres-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1989</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXv 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvQueryPortAttributes, (2) XvListImageFormats, and (3) XvCreateImage function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1989.html">CVE-2013-1989</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1989">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1989">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1989">SUSE bug 821671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1989">SUSE bug 880221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138531" comment="libXv-devel-1.0.10-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151843" comment="libXv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138532" comment="libXv1-1.0.10-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151844" comment="libXv1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138533" comment="libXv1-32bit-1.0.10-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151845" comment="libXv1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1990</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXvMC 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvMCListSurfaceTypes and (2) XvMCListSubpictureTypes functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1990.html">CVE-2013-1990</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1990">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1990">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1990">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138534" comment="libXvMC-devel-1.0.9-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151846" comment="libXvMC-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138535" comment="libXvMC1-1.0.9-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151847" comment="libXvMC1 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1991</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XDGAQueryModes and (2) XDGASetMode functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1991.html">CVE-2013-1991</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1991">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1991">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1991">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138536" comment="libXxf86dga-devel-1.1.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151848" comment="libXxf86dga-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138537" comment="libXxf86dga1-1.1.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151849" comment="libXxf86dga1 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1992</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1992.html">CVE-2013-1992</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1992">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1992">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1992">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138606" comment="libdmx-devel-1.1.3-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151850" comment="libdmx-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138607" comment="libdmx1-1.1.3-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151851" comment="libdmx1 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1995</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995" source="CVE"/>
    <description>
    X.org libXi 1.7.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the XListInputDevices function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1995.html">CVE-2013-1995</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1995">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1995">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1995">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138512" comment="libXi-devel-1.7.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151829" comment="libXi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138513" comment="libXi6-1.7.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151830" comment="libXi6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138514" comment="libXi6-32bit-1.7.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151831" comment="libXi6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1996</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1996" source="CVE"/>
    <description>
    X.org libFS 1.0.4 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the FSOpenServer function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1996.html">CVE-2013-1996</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1996">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1996">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1996">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138454" comment="libFS6-1.0.7-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151852" comment="libFS6 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1997</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997" source="CVE"/>
    <description>
    Multiple buffer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XAllocColorCells, (2) _XkbReadGetDeviceInfoReply, (3) _XkbReadGeomShapes, (4) _XkbReadGetGeometryReply, (5) _XkbReadKeySyms, (6) _XkbReadKeyActions, (7) _XkbReadKeyBehaviors, (8) _XkbReadModifierMap, (9) _XkbReadExplicitComponents, (10) _XkbReadVirtualModMap, (11) _XkbReadGetNamesReply, (12) _XkbReadGetMapReply, (13) _XimXGetReadData, (14) XListFonts, (15) XListExtensions, and (16) XGetFontPath functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1997.html">CVE-2013-1997</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1997">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1997">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1997">SUSE bug 821664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1997">SUSE bug 824294</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138493" comment="libX11-6-1.6.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138494" comment="libX11-6-32bit-1.6.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151818" comment="libX11-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138495" comment="libX11-data-1.6.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138496" comment="libX11-devel-1.6.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151820" comment="libX11-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138497" comment="libX11-xcb1-1.6.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138498" comment="libX11-xcb1-32bit-1.6.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151822" comment="libX11-xcb1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1998</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1998" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998" source="CVE"/>
    <description>
    Multiple buffer overflows in X.org libXi 1.7.1 and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XGetDeviceButtonMapping, (2) XIPassiveGrabDevice, and (3) XQueryDeviceState functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1998.html">CVE-2013-1998</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1998">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1998">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1998">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138512" comment="libXi-devel-1.7.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151829" comment="libXi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138513" comment="libXi6-1.7.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151830" comment="libXi6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138514" comment="libXi6-32bit-1.7.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151831" comment="libXi6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1999</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-1999" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999" source="CVE"/>
    <description>
    Buffer overflow in X.org libXvMC 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvMCGetDRInfo function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-1999.html">CVE-2013-1999</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1999">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1999">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-1999">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138534" comment="libXvMC-devel-1.0.9-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151846" comment="libXvMC-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138535" comment="libXvMC1-1.0.9-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151847" comment="libXvMC1 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2000</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000" source="CVE"/>
    <description>
    Multiple buffer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XDGAQueryModes and (2) XDGASetMode functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2000.html">CVE-2013-2000</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2000">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2000">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2000">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138536" comment="libXxf86dga-devel-1.1.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151848" comment="libXxf86dga-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138537" comment="libXxf86dga1-1.1.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151849" comment="libXxf86dga1 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2001</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001" source="CVE"/>
    <description>
    Buffer overflow in X.org libXxf86vm 1.1.2 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XF86VidModeGetGammaRamp function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2001.html">CVE-2013-2001</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2001">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2001">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2001">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138538" comment="libXxf86vm-devel-1.1.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151853" comment="libXxf86vm-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138539" comment="libXxf86vm1-1.1.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151854" comment="libXxf86vm1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138540" comment="libXxf86vm1-32bit-1.1.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151855" comment="libXxf86vm1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2002</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002" source="CVE"/>
    <description>
    Buffer overflow in X.org libXt 1.1.3 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the _XtResourceConfigurationEH function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2002.html">CVE-2013-2002</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2002">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2002">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2002">SUSE bug 821670</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138526" comment="libXt-devel-1.1.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151856" comment="libXt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138527" comment="libXt6-1.1.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151857" comment="libXt6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138528" comment="libXt6-32bit-1.1.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151858" comment="libXt6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2003</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003" source="CVE"/>
    <description>
    Integer overflow in X.org libXcursor 1.1.13 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the _XcursorFileHeaderCreate function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2003.html">CVE-2013-2003</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2003">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2003">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2003">SUSE bug 821663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2003">SUSE bug 1065386</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138501" comment="libXcursor-devel-1.1.14-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151859" comment="libXcursor-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138502" comment="libXcursor1-1.1.14-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151860" comment="libXcursor1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138503" comment="libXcursor1-32bit-1.1.14-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151861" comment="libXcursor1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2004</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004" source="CVE"/>
    <description>
    The (1) GetDatabase and (2) _XimParseStringFile functions in X.org libX11 1.5.99.901 (1.6 RC1) and earlier do not restrict the recursion depth when processing directives to include files, which allows X servers to cause a denial of service (stack consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2004.html">CVE-2013-2004</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2004">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2004">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2004">SUSE bug 821664</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138493" comment="libX11-6-1.6.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138494" comment="libX11-6-32bit-1.6.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151818" comment="libX11-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138495" comment="libX11-data-1.6.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138496" comment="libX11-devel-1.6.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151820" comment="libX11-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138497" comment="libX11-xcb1-1.6.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138498" comment="libX11-xcb1-32bit-1.6.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151822" comment="libX11-xcb1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2005</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005" source="CVE"/>
    <description>
    X.org libXt 1.1.3 and earlier does not check the return value of the XGetWindowProperty function, which allows X servers to trigger use of an uninitialized pointer and memory corruption via vectors related to the (1) ReqCleanup, (2) HandleSelectionEvents, (3) ReqTimedOut, (4) HandleNormal, and (5) HandleSelectionReplies functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2005.html">CVE-2013-2005</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2005">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2005">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2005">SUSE bug 821670</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138526" comment="libXt-devel-1.1.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151856" comment="libXt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138527" comment="libXt6-1.1.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151857" comment="libXt6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138528" comment="libXt6-32bit-1.1.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151858" comment="libXt6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2007</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2007" source="CVE"/>
    <description>
    The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2007.html">CVE-2013-2007</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2007">SUSE bug 818181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2007">SUSE bug 818182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2007">SUSE bug 818183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2007">SUSE bug 818181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2007">SUSE bug 818182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2007">SUSE bug 818183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2007">SUSE bug 818183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2007">SUSE bug 818181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2007">SUSE bug 818182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2007">SUSE bug 818183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2007">SUSE bug 818182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2007">SUSE bug 818183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2007">SUSE bug 818183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2007">SUSE bug 818181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2007">SUSE bug 818181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2007">SUSE bug 818182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2007">SUSE bug 818182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2007">SUSE bug 818183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2007">SUSE bug 818183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2007">SUSE bug 818183</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2062</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXp 1.0.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XpGetAttributes, (2) XpGetOneAttribute, (3) XpGetPrinterList, and (4) XpQueryScreens functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2062.html">CVE-2013-2062</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2062">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2062">SUSE bug 821668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2062">SUSE bug 821668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2062">SUSE bug 821668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2062">SUSE bug 821668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2062">SUSE bug 821668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2062">SUSE bug 821668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2062">SUSE bug 821668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2062">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2062">SUSE bug 821668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2062">SUSE bug 880221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138518" comment="libXp-devel-1.0.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151862" comment="libXp-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138519" comment="libXp6-1.0.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151863" comment="libXp6 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2063</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063" source="CVE"/>
    <description>
    Integer overflow in X.org libXtst 1.2.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XRecordGetContext function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2063.html">CVE-2013-2063</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2063">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2063">SUSE bug 821663</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138529" comment="libXtst-devel-1.2.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151864" comment="libXtst-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138530" comment="libXtst6-1.2.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151865" comment="libXtst6 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2064</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064" source="CVE"/>
    <description>
    Integer overflow in X.org libxcb 1.9 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the read_packet function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2064.html">CVE-2013-2064</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2064">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2064">SUSE bug 821584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2064">SUSE bug 821584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2064">SUSE bug 821584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2064">SUSE bug 821584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2064">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2064">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2064">SUSE bug 821584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2064">SUSE bug 821584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2064">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2064">SUSE bug 821584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2064">SUSE bug 821584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2064">SUSE bug 821584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2064">SUSE bug 821584</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138936" comment="libxcb-composite0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151866" comment="libxcb-composite0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138937" comment="libxcb-damage0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151867" comment="libxcb-damage0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138938" comment="libxcb-devel-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151868" comment="libxcb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138939" comment="libxcb-dpms0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151869" comment="libxcb-dpms0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138940" comment="libxcb-dri2-0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151870" comment="libxcb-dri2-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138941" comment="libxcb-dri2-0-32bit-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151871" comment="libxcb-dri2-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138942" comment="libxcb-dri3-0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151872" comment="libxcb-dri3-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138943" comment="libxcb-dri3-0-32bit-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151873" comment="libxcb-dri3-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138944" comment="libxcb-glx0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151874" comment="libxcb-glx0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138945" comment="libxcb-glx0-32bit-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151875" comment="libxcb-glx0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138946" comment="libxcb-present0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151876" comment="libxcb-present0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138947" comment="libxcb-present0-32bit-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151877" comment="libxcb-present0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138948" comment="libxcb-randr0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151878" comment="libxcb-randr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138949" comment="libxcb-record0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151879" comment="libxcb-record0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138950" comment="libxcb-render0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151880" comment="libxcb-render0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138951" comment="libxcb-render0-32bit-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151881" comment="libxcb-render0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138952" comment="libxcb-res0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151882" comment="libxcb-res0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138953" comment="libxcb-screensaver0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151883" comment="libxcb-screensaver0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138954" comment="libxcb-shape0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151884" comment="libxcb-shape0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138955" comment="libxcb-shm0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151885" comment="libxcb-shm0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138956" comment="libxcb-shm0-32bit-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151886" comment="libxcb-shm0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138957" comment="libxcb-sync1-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151887" comment="libxcb-sync1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138958" comment="libxcb-sync1-32bit-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151888" comment="libxcb-sync1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138959" comment="libxcb-xevie0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151889" comment="libxcb-xevie0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138960" comment="libxcb-xf86dri0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151890" comment="libxcb-xf86dri0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138961" comment="libxcb-xfixes0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151891" comment="libxcb-xfixes0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138962" comment="libxcb-xfixes0-32bit-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151892" comment="libxcb-xfixes0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138963" comment="libxcb-xinerama0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151893" comment="libxcb-xinerama0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138964" comment="libxcb-xkb1-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151894" comment="libxcb-xkb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138965" comment="libxcb-xprint0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151895" comment="libxcb-xprint0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138966" comment="libxcb-xtest0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151896" comment="libxcb-xtest0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138967" comment="libxcb-xv0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151897" comment="libxcb-xv0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138968" comment="libxcb-xvmc0-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151898" comment="libxcb-xvmc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138969" comment="libxcb1-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151899" comment="libxcb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138970" comment="libxcb1-32bit-1.11.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151900" comment="libxcb1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2066</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066" source="CVE"/>
    <description>
    Buffer overflow in X.org libXv 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvQueryPortAttributes function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2066.html">CVE-2013-2066</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2066">SUSE bug 815451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2066">SUSE bug 821671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2066">SUSE bug 880221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138531" comment="libXv-devel-1.0.10-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151843" comment="libXv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138532" comment="libXv1-1.0.10-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151844" comment="libXv1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138533" comment="libXv1-32bit-1.0.10-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151845" comment="libXv1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2088</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2088" source="CVE"/>
    <description>
    contrib/hook-scripts/svn-keyword-check.pl in Subversion before 1.6.23 allows remote authenticated users with commit permissions to execute arbitrary commands via shell metacharacters in a filename.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2088.html">CVE-2013-2088</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2088">SUSE bug 821505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2088">SUSE bug 821505</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2112</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2112" source="CVE"/>
    <description>
    The svnserve server in Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote attackers to cause a denial of service (exit) by aborting a connection.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2112.html">CVE-2013-2112</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2112">SUSE bug 821505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2112">SUSE bug 821505</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2126</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2126" source="CVE"/>
    <description>
    Multiple double free vulnerabilities in the LibRaw::unpack function in libraw_cxx.cpp in LibRaw before 0.15.2 allow context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed full-color (1) Foveon or (2) sRAW image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2126.html">CVE-2013-2126</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2126">SUSE bug 822665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2126">SUSE bug 822665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2126">SUSE bug 822665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2126">SUSE bug 823113</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2126">SUSE bug 823114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2126">SUSE bug 823114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2126">SUSE bug 823114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2126">SUSE bug 823114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2126">SUSE bug 822665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2126">SUSE bug 822665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2126">SUSE bug 822665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2126">SUSE bug 822665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2126">SUSE bug 823113</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2126">SUSE bug 823114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2126">SUSE bug 822665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2126">SUSE bug 823113</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2126">SUSE bug 823113</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2126">SUSE bug 823113</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2126">SUSE bug 822665</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138810" comment="libraw-devel-0.16.2-2.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151901" comment="libraw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138811" comment="libraw10-0.16.2-2.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151902" comment="libraw10 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2127</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2127" source="CVE"/>
    <description>
    Buffer overflow in the exposure correction code in LibRaw before 0.15.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2127.html">CVE-2013-2127</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2127">SUSE bug 822665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2127">SUSE bug 822665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2127">SUSE bug 822665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2127">SUSE bug 822665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2127">SUSE bug 822665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2127">SUSE bug 822665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2127">SUSE bug 822665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2127">SUSE bug 822665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2127">SUSE bug 822665</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138810" comment="libraw-devel-0.16.2-2.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151901" comment="libraw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138811" comment="libraw10-0.16.2-2.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151902" comment="libraw10 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2142</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2142" source="CVE"/>
    <description>
    userpref.c in libimobiledevice 1.1.4, when $HOME and $XDG_CONFIG_HOME are not set, allows local users to overwrite arbitrary files via a symlink attack on (1) HostCertificate.pem, (2) HostPrivateKey.pem, (3) libimobiledevicerc, (4) RootCertificate.pem, or (5) RootPrivateKey.pem in /tmp/root/.config/libimobiledevice/.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2142.html">CVE-2013-2142</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2142">SUSE bug 823250</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2142">SUSE bug 823250</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2142">SUSE bug 823250</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2142">SUSE bug 823250</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2142">SUSE bug 823250</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2142">SUSE bug 823250</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2142">SUSE bug 823250</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2142">SUSE bug 823250</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2142">SUSE bug 823250</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138656" comment="libimobiledevice-devel-1.2.0-4.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151903" comment="libimobiledevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138657" comment="libimobiledevice6-1.2.0-4.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151904" comment="libimobiledevice6 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2168</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2168" source="CVE"/>
    <description>
    The _dbus_printf_string_upper_bound function in dbus/dbus-sysdeps-unix.c in D-Bus (aka DBus) 1.4.x before 1.4.26, 1.6.x before 1.6.12, and 1.7.x before 1.7.4 allows local users to cause a denial of service (service crash) via a crafted message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2168.html">CVE-2013-2168</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2168">SUSE bug 824607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2168">SUSE bug 824607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2168">SUSE bug 824607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2168">SUSE bug 824607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2168">SUSE bug 824607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2168">SUSE bug 824607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2168">SUSE bug 824607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2168">SUSE bug 824607</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138227" comment="dbus-1-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138228" comment="dbus-1-devel-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151536" comment="dbus-1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138229" comment="dbus-1-x11-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138230" comment="libdbus-1-3-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138231" comment="libdbus-1-3-32bit-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151539" comment="libdbus-1-3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2174</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174" source="CVE"/>
    <description>
    Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a "%" (percent) character.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2174.html">CVE-2013-2174</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2174">SUSE bug 824517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2174">SUSE bug 824517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2174">SUSE bug 824517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2174">SUSE bug 824517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2174">SUSE bug 824517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2174">SUSE bug 824517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2174">SUSE bug 824517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2174">SUSE bug 824517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2174">SUSE bug 824517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2174">SUSE bug 824517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2174">SUSE bug 917692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2174">SUSE bug 824517</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138211" comment="curl-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138212" comment="libcurl-devel-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138213" comment="libcurl4-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2186</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2186" source="CVE"/>
    <description>
    The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2186.html">CVE-2013-2186</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2186">SUSE bug 846174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2186">SUSE bug 846174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2186">SUSE bug 846174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2186">SUSE bug 846174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2186">SUSE bug 846174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2186">SUSE bug 846174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2186">SUSE bug 846174</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138409" comment="jakarta-commons-fileupload-1.1.1-1.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151905" comment="jakarta-commons-fileupload is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2207</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207" source="CVE"/>
    <description>
    pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2207.html">CVE-2013-2207</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2207">SUSE bug 830257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2207">SUSE bug 830257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2207">SUSE bug 830257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2207">SUSE bug 830257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2207">SUSE bug 830257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2207">SUSE bug 830257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2207">SUSE bug 830257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2207">SUSE bug 830257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2207">SUSE bug 830257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2207">SUSE bug 830257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2207">SUSE bug 830257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2207">SUSE bug 830257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2207">SUSE bug 830257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2207">SUSE bug 830257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2207">SUSE bug 830257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2207">SUSE bug 830257</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138343" comment="glibc-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138344" comment="glibc-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138345" comment="glibc-devel-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138346" comment="glibc-extra-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138347" comment="glibc-info-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138348" comment="glibc-locale-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138349" comment="glibc-locale-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138350" comment="nscd-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2214</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2214" source="CVE"/>
    <description>
    status.cgi in Nagios 4.0 before 4.0 beta4 and 3.x before 3.5.1 does not properly restrict access to certain users that are a contact for a service, which allows remote authenticated users to obtain sensitive information about hostnames via the servicegroup (1) overview, (2) summary, or (3) grid style in status.cgi.  NOTE: this behavior is by design in most 3.x versions, but the upstream vendor "decided to change it for Nagios 4" and 3.5.1.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2214.html">CVE-2013-2214</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2214">SUSE bug 827020</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138990" comment="nagios-3.5.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151576" comment="nagios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138991" comment="nagios-www-3.5.1-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151577" comment="nagios-www is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2217</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2217" source="CVE"/>
    <description>
    cache.py in Suds 0.4, when tempdir is set to None, allows local users to redirect SOAP queries and possibly have other unspecified impact via a symlink attack on a cache file with a predictable name in /tmp/suds/.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2217.html">CVE-2013-2217</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2217">SUSE bug 827568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2217">SUSE bug 827568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2217">SUSE bug 827568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2217">SUSE bug 827568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2217">SUSE bug 827568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2217">SUSE bug 827568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2217">SUSE bug 827568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2217">SUSE bug 827568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2217">SUSE bug 827568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2217">SUSE bug 827568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2217">SUSE bug 827568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2217">SUSE bug 827568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2217">SUSE bug 827568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2217">SUSE bug 827568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2217">SUSE bug 827568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2217">SUSE bug 827568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2217">SUSE bug 827568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2217">SUSE bug 827568</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134765" comment="python-suds-jurko-0.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151906" comment="python-suds-jurko is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2218</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2218" source="CVE"/>
    <description>
    Double free vulnerability in the virConnectListAllInterfaces method in interface/interface_backend_netcf.c in libvirt 1.0.6 allows remote attackers to cause a denial of service (libvirtd crash) via a filtering flag that causes an interface to be skipped, as demonstrated by the "virsh iface-list --inactive" command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2218.html">CVE-2013-2218</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2218">SUSE bug 827741</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2230</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2230" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2230" source="CVE"/>
    <description>
    The qemu driver (qemu/qemu_driver.c) in libvirt before 1.1.1 allows remote authenticated users to cause a denial of service (daemon crash) via unspecified vectors involving "multiple events registration."
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2230.html">CVE-2013-2230</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2230">SUSE bug 827801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2230">SUSE bug 827801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2230">SUSE bug 827801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2230">SUSE bug 827801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2230">SUSE bug 827801</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2236</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2236" source="CVE"/>
    <description>
    Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2236.html">CVE-2013-2236</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2236">SUSE bug 828117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2236">SUSE bug 828117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2236">SUSE bug 828117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2236">SUSE bug 828117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2236">SUSE bug 828117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2236">SUSE bug 828117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2236">SUSE bug 828117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2236">SUSE bug 828117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2236">SUSE bug 828117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2236">SUSE bug 828117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2236">SUSE bug 828117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2236">SUSE bug 828117</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139074" comment="quagga-0.99.24.1-3.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151418" comment="quagga is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2249</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2249" source="CVE"/>
    <description>
    mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2249.html">CVE-2013-2249</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2249">SUSE bug 831113</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2249">SUSE bug 831113</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2249">SUSE bug 831113</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2266</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266" source="CVE"/>
    <description>
    libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2266.html">CVE-2013-2266</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2266">SUSE bug 811876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2266">SUSE bug 811934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2266">SUSE bug 811876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2266">SUSE bug 811934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2266">SUSE bug 811876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2266">SUSE bug 811934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2266">SUSE bug 811876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2266">SUSE bug 811934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2266">SUSE bug 811876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2266">SUSE bug 811934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2266">SUSE bug 811876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2266">SUSE bug 811934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2266">SUSE bug 811934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2266">SUSE bug 811934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2266">SUSE bug 811934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2266">SUSE bug 811876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2266">SUSE bug 811934</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138235" comment="dhcp-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151310" comment="dhcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138236" comment="dhcp-client-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151311" comment="dhcp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138237" comment="dhcp-doc-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151312" comment="dhcp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138238" comment="dhcp-relay-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151313" comment="dhcp-relay is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138239" comment="dhcp-server-4.3.3-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151314" comment="dhcp-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2475</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2475" source="CVE"/>
    <description>
    The TCP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2475.html">CVE-2013-2475</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2475">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2476</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2476" source="CVE"/>
    <description>
    The dissect_hartip function in epan/dissectors/packet-hartip.c in the HART/IP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a packet with a header that is too short.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2476.html">CVE-2013-2476</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2476">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2477</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2477" source="CVE"/>
    <description>
    The CSN.1 dissector in Wireshark 1.8.x before 1.8.6 does not properly manage function pointers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2477.html">CVE-2013-2477</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2477">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2478</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2478" source="CVE"/>
    <description>
    The dissect_server_info function in epan/dissectors/packet-ms-mms.c in the MS-MMS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not properly manage string lengths, which allows remote attackers to cause a denial of service (application crash) via a malformed packet that (1) triggers an integer overflow or (2) has embedded '\0' characters in a string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2478.html">CVE-2013-2478</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2478">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2479</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2479" source="CVE"/>
    <description>
    The dissect_mpls_echo_tlv_dd_map function in epan/dissectors/packet-mpls-echo.c in the MPLS Echo dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via invalid Sub-tlv data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2479.html">CVE-2013-2479</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2479">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2480</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2480" source="CVE"/>
    <description>
    The RTPS and RTPS2 dissectors in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2480.html">CVE-2013-2480</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2480">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2481</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2481" source="CVE"/>
    <description>
    Integer signedness error in the dissect_mount_dirpath_call function in epan/dissectors/packet-mount.c in the Mount dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6, when nfs_file_name_snooping is enabled, allows remote attackers to cause a denial of service (application crash) via a negative length value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2481.html">CVE-2013-2481</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2481">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2482</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2482" source="CVE"/>
    <description>
    The AMPQ dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2482.html">CVE-2013-2482</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2482">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2483</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2483" source="CVE"/>
    <description>
    The acn_add_dmp_data function in epan/dissectors/packet-acn.c in the ACN dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via an invalid count value in ACN_DMP_ADT_D_RE DMP data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2483.html">CVE-2013-2483</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2483">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2484</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2484" source="CVE"/>
    <description>
    The CIMD dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2484.html">CVE-2013-2484</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2484">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2485</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2485" source="CVE"/>
    <description>
    The FCSP dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2485.html">CVE-2013-2485</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2485">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2486</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2486" source="CVE"/>
    <description>
    The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2486.html">CVE-2013-2486</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2486">SUSE bug 807942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2486">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2486">SUSE bug 820973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2486">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2486">SUSE bug 820973</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2487</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2487" source="CVE"/>
    <description>
    epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet, related to the (1) dissect_icecandidates, (2) dissect_kinddata, (3) dissect_nodeid_list, (4) dissect_storeans, (5) dissect_storereq, (6) dissect_storeddataspecifier, (7) dissect_fetchreq, (8) dissect_findans, (9) dissect_diagnosticinfo, (10) dissect_diagnosticresponse, (11) dissect_reload_messagecontents, and (12) dissect_reload_message functions, a different vulnerability than CVE-2013-2486.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2487.html">CVE-2013-2487</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2487">SUSE bug 807942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2487">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2487">SUSE bug 820973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2487">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2487">SUSE bug 820973</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2488</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2488" source="CVE"/>
    <description>
    The DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2488.html">CVE-2013-2488</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2488">SUSE bug 807942</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2492</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2492" source="CVE"/>
    <description>
    Stack-based buffer overflow in Firebird 2.1.3 through 2.1.5 before 18514, and 2.5.1 through 2.5.3 before 26623, on Windows allows remote attackers to execute arbitrary code via a crafted packet to TCP port 3050, related to a missing size check during extraction of a group number from CNCT information.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2492.html">CVE-2013-2492</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2492">SUSE bug 808268</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2492">SUSE bug 808268</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2492">SUSE bug 808268</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2492">SUSE bug 808268</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2492">SUSE bug 808268</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138622" comment="libfbembed2_5-2.5.4.26856-5.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151907" comment="libfbembed2_5 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2850</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-2850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2850" source="CVE"/>
    <description>
    Heap-based buffer overflow in the iscsi_add_notunderstood_response function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI target subsystem in the Linux kernel through 3.9.4 allows remote attackers to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled during construction of an error-response packet.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-2850.html">CVE-2013-2850</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2850">SUSE bug 821560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2850">SUSE bug 821560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2850">SUSE bug 821560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2850">SUSE bug 821560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2850">SUSE bug 821560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2850">SUSE bug 821560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2850">SUSE bug 821560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2850">SUSE bug 821560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2850">SUSE bug 821560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2850">SUSE bug 821560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2850">SUSE bug 821560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2850">SUSE bug 821560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2850">SUSE bug 821560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-2850">SUSE bug 821560</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3495</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-3495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3495" source="CVE"/>
    <description>
    The Intel VT-d Interrupt Remapping engine in Xen 3.3.x through 4.3.x allows local guests to cause a denial of service (kernel panic) via a malformed Message Signaled Interrupt (MSI) from a PCI device that is bus mastering capable that triggers a System Error Reporting (SERR) Non-Maskable Interrupt (NMI).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3495.html">CVE-2013-3495</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3495">SUSE bug 826717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3495">SUSE bug 826717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3495">SUSE bug 826717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3495">SUSE bug 826717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3495">SUSE bug 826717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3495">SUSE bug 826717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3495">SUSE bug 903970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3495">SUSE bug 826717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3495">SUSE bug 826717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3495">SUSE bug 826717</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3555</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555" source="CVE"/>
    <description>
    epan/dissectors/packet-gtpv2.c in the GTPv2 dissector in Wireshark 1.8.x before 1.8.7 calls incorrect functions in certain contexts related to ciphers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3555.html">CVE-2013-3555</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3555">SUSE bug 820973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3555">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3555">SUSE bug 820973</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3556</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-3556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3556" source="CVE"/>
    <description>
    The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3556.html">CVE-2013-3556</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3556">SUSE bug 820973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3556">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3556">SUSE bug 820973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3556">SUSE bug 820973</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3557</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-3557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557" source="CVE"/>
    <description>
    The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3557.html">CVE-2013-3557</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3557">SUSE bug 820973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3557">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3557">SUSE bug 820973</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3558</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-3558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558" source="CVE"/>
    <description>
    The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x before 1.8.7 does not terminate a bit-field list, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3558.html">CVE-2013-3558</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3558">SUSE bug 820973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3558">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3558">SUSE bug 820973</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3559</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-3559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559" source="CVE"/>
    <description>
    epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3559.html">CVE-2013-3559</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3559">SUSE bug 820973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3559">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3559">SUSE bug 820973</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3560</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560" source="CVE"/>
    <description>
    The dissect_dsmcc_un_download function in epan/dissectors/packet-mpeg-dsmcc.c in the MPEG DSM-CC dissector in Wireshark 1.8.x before 1.8.7 uses an incorrect format string, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3560.html">CVE-2013-3560</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3560">SUSE bug 820973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3560">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3560">SUSE bug 820973</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3561</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-3561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3561" source="CVE"/>
    <description>
    Multiple integer overflows in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (loop or application crash) via a malformed packet, related to a crash of the Websocket dissector, an infinite loop in the MySQL dissector, and a large loop in the ETCH dissector.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3561.html">CVE-2013-3561</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3561">SUSE bug 820973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3561">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3561">SUSE bug 820973</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3562</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-3562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3562" source="CVE"/>
    <description>
    Multiple integer signedness errors in the tvb_unmasked function in epan/dissectors/packet-websocket.c in the Websocket dissector in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-3562.html">CVE-2013-3562</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3562">SUSE bug 820973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3562">SUSE bug 820566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-3562">SUSE bug 820973</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4083</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083" source="CVE"/>
    <description>
    The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4083.html">CVE-2013-4083</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4083">SUSE bug 824900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4083">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4113</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4113" source="CVE"/>
    <description>
    ext/xml/xml.c in PHP before 5.3.27 does not properly consider parsing depth, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted document that is processed by the xml_parse_into_struct function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4113.html">CVE-2013-4113</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4113">SUSE bug 829207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4113">SUSE bug 829207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4113">SUSE bug 829207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4113">SUSE bug 829207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4113">SUSE bug 829207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4113">SUSE bug 829207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4113">SUSE bug 829207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4113">SUSE bug 829207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4113">SUSE bug 829207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4113">SUSE bug 829207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4113">SUSE bug 829207</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4118</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4118" source="CVE"/>
    <description>
    FreeRDP before 1.1.0-beta1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4118.html">CVE-2013-4118</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4118">SUSE bug 829013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4118">SUSE bug 829013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4118">SUSE bug 829013</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134609" comment="freerdp-1.0.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134610" comment="freerdp-devel-1.0.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134611" comment="libfreerdp-1_0-1.0.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151910" comment="libfreerdp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134612" comment="libfreerdp-1_0-plugins-1.0.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151911" comment="libfreerdp-1_0-plugins is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4124</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4124" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124" source="CVE"/>
    <description>
    Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4124.html">CVE-2013-4124</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4124">SUSE bug 829969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4124">SUSE bug 829969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4124">SUSE bug 829969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4124">SUSE bug 829969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4124">SUSE bug 829969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4124">SUSE bug 829969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4124">SUSE bug 829969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4124">SUSE bug 829969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4124">SUSE bug 829969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4124">SUSE bug 829969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4124">SUSE bug 829969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4124">SUSE bug 829969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4124">SUSE bug 829969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4124">SUSE bug 829969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4124">SUSE bug 829969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4124">SUSE bug 829969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4124">SUSE bug 829969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4124">SUSE bug 829969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4124">SUSE bug 829969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4124">SUSE bug 829969</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4131</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4131" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.10 and 1.8.x before 1.8.1 allows remote authenticated users to cause a denial of service (assertion failure or out-of-bounds read) via a certain (1) COPY, (2) DELETE, or (3) MOVE request against a revision root.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4131.html">CVE-2013-4131</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4131">SUSE bug 830031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4131">SUSE bug 830031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4131">SUSE bug 830031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4131">SUSE bug 830031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4131">SUSE bug 830031</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4143</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4143" source="CVE"/>
    <description>
    The (1) checkPasswd and (2) checkGroupXlockPasswds functions in xlockmore before 5.43 do not properly handle when a NULL value is returned upon an error by the crypt or dispcrypt function as implemented in glibc 2.17 and later, which allows attackers to bypass the screen lock via vectors related to invalid salts.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4143.html">CVE-2013-4143</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4143">SUSE bug 829859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4143">SUSE bug 829859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4143">SUSE bug 829859</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139144" comment="xlockmore-5.43-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151912" comment="xlockmore is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4148</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4148" source="CVE"/>
    <description>
    Integer signedness error in the virtio_net_load function in hw/net/virtio-net.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4148.html">CVE-2013-4148</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4148">SUSE bug 864812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4148">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4148">SUSE bug 864812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4148">SUSE bug 864812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4148">SUSE bug 864812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4148">SUSE bug 864812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4148">SUSE bug 864812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4148">SUSE bug 864812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4148">SUSE bug 864812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4148">SUSE bug 964630</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4148">SUSE bug 964630</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4149</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4149" source="CVE"/>
    <description>
    Buffer overflow in virtio_net_load function in net/virtio-net.c in QEMU 1.3.0 through 1.7.x before 1.7.2 might allow remote attackers to execute arbitrary code via a large MAC table.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4149.html">CVE-2013-4149</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4149">SUSE bug 864649</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4149">SUSE bug 864649</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4149">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4149">SUSE bug 864649</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4149">SUSE bug 864649</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4149">SUSE bug 864649</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4149">SUSE bug 864649</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4149">SUSE bug 864649</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4149">SUSE bug 864649</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4149">SUSE bug 864649</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4149">SUSE bug 864649</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4149">SUSE bug 864649</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4149">SUSE bug 964443</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4149">SUSE bug 864649</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4149">SUSE bug 964443</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4150</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4150" source="CVE"/>
    <description>
    The virtio_net_load function in hw/net/virtio-net.c in QEMU 1.5.0 through 1.7.x before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors in which the value of curr_queues is greater than max_queues, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4150.html">CVE-2013-4150</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4150">SUSE bug 864650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4150">SUSE bug 864650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4150">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4150">SUSE bug 864650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4150">SUSE bug 864650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4150">SUSE bug 864650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4150">SUSE bug 864650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4150">SUSE bug 864650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4150">SUSE bug 864650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4150">SUSE bug 864650</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4151</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4151" source="CVE"/>
    <description>
    The virtio_load function in virtio/virtio.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4151.html">CVE-2013-4151</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4151">SUSE bug 864653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4151">SUSE bug 864653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4151">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4151">SUSE bug 864653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4151">SUSE bug 864653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4151">SUSE bug 864653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4151">SUSE bug 864653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4151">SUSE bug 864653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4151">SUSE bug 864653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4151">SUSE bug 864653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4151">SUSE bug 864653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4151">SUSE bug 864653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4151">SUSE bug 964636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4151">SUSE bug 964636</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4153</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4153" source="CVE"/>
    <description>
    Double free vulnerability in the qemuAgentGetVCPUs function in qemu/qemu_agent.c in libvirt 1.0.6 through 1.1.0 allows remote attackers to cause a denial of service (daemon crash) via a cpu count request, as demonstrated by the "virsh vcpucount dom --guest" command.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4153.html">CVE-2013-4153</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4153">SUSE bug 830497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4153">SUSE bug 830498</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4153">SUSE bug 830497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4153">SUSE bug 830497</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4154</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4154" source="CVE"/>
    <description>
    The qemuAgentCommand function in libvirt before 1.1.1, when a guest agent is not configured, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to "agent based cpu (un)plug," as demonstrated by the "virsh vcpucount foobar --guest" command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4154.html">CVE-2013-4154</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4154">SUSE bug 830498</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4154">SUSE bug 830498</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4154">SUSE bug 830498</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4231</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231" source="CVE"/>
    <description>
    Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c.  NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4231.html">CVE-2013-4231</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4231">SUSE bug 834477</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4231">SUSE bug 834477</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4231">SUSE bug 834477</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4231">SUSE bug 834477</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4231">SUSE bug 834477</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4231">SUSE bug 834477</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4231">SUSE bug 834477</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4231">SUSE bug 854393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4231">SUSE bug 834477</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4232</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232" source="CVE"/>
    <description>
    Use-after-free vulnerability in the t2p_readwrite_pdf_image function in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4232.html">CVE-2013-4232</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4232">SUSE bug 834477</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4232">SUSE bug 834477</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4232">SUSE bug 834477</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4232">SUSE bug 834477</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4232">SUSE bug 834477</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4232">SUSE bug 834477</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4232">SUSE bug 834477</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4232">SUSE bug 854393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4232">SUSE bug 834477</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4233</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4233" source="CVE"/>
    <description>
    Integer overflow in the abc_set_parts function in load_abc.cpp in libmodplug 0.8.8.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted P header in an ABC file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4233.html">CVE-2013-4233</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4233">SUSE bug 834483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4233">SUSE bug 834483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4233">SUSE bug 834483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4233">SUSE bug 834483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4233">SUSE bug 834483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4233">SUSE bug 834483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4233">SUSE bug 834483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4233">SUSE bug 834483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4233">SUSE bug 834483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4233">SUSE bug 834483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4233">SUSE bug 1022032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4233">SUSE bug 834483</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138699" comment="libmodplug1-0.8.8.5-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151586" comment="libmodplug1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4234</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4234" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the (1) abc_MIDI_drum and (2) abc_MIDI_gchord functions in load_abc.cpp in libmodplug 0.8.8.4 and earlier allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted ABC.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4234.html">CVE-2013-4234</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4234">SUSE bug 834483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4234">SUSE bug 834483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4234">SUSE bug 834483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4234">SUSE bug 834483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4234">SUSE bug 834483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4234">SUSE bug 834483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4234">SUSE bug 834483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4234">SUSE bug 834483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4234">SUSE bug 834483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4234">SUSE bug 834483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4234">SUSE bug 1022032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4234">SUSE bug 834483</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138699" comment="libmodplug1-0.8.8.5-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151586" comment="libmodplug1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4237</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237" source="CVE"/>
    <description>
    sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4237.html">CVE-2013-4237</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 834594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4237">SUSE bug 920055</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138343" comment="glibc-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138344" comment="glibc-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138345" comment="glibc-devel-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138346" comment="glibc-extra-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138347" comment="glibc-info-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138348" comment="glibc-locale-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138349" comment="glibc-locale-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138350" comment="nscd-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4238</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238" source="CVE"/>
    <description>
    The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4238.html">CVE-2013-4238</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 834601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 834601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 834601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 834601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 834601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 834601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 834601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 834601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 834601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 834601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 834601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 834601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 834601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 834601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 834601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 834601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 882915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 834601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 834601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4238">SUSE bug 834601</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138784" comment="libpython2_7-1_0-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138785" comment="libpython2_7-1_0-32bit-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138789" comment="libpython3_4m1_0-3.4.1-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151646" comment="libpython3_4m1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139040" comment="python-2.7.9-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138786" comment="python-base-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139041" comment="python-curses-2.7.9-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138787" comment="python-devel-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139042" comment="python-gdbm-2.7.9-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138788" comment="python-xml-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139043" comment="python3-3.4.1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138790" comment="python3-base-3.4.1-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139044" comment="python3-curses-3.4.1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139045" comment="python3-dbm-3.4.1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139046" comment="python3-tk-3.4.1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4239</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4239" source="CVE"/>
    <description>
    The xenDaemonListDefinedDomains function in xen/xend_internal.c in libvirt 1.1.1 allows remote authenticated users to cause a denial of service (memory corruption and crash) via vectors involving the virConnectListDefinedDomains API function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4239.html">CVE-2013-4239</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4239">SUSE bug 834598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4239">SUSE bug 834598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4239">SUSE bug 834598</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4242</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242" source="CVE"/>
    <description>
    GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4242.html">CVE-2013-4242</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4242">SUSE bug 831359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4242">SUSE bug 831359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4242">SUSE bug 831359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4242">SUSE bug 831359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4242">SUSE bug 831359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4242">SUSE bug 831359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4242">SUSE bug 831359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4242">SUSE bug 831359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4242">SUSE bug 831359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4242">SUSE bug 831359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4242">SUSE bug 831359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4242">SUSE bug 831359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4242">SUSE bug 831359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4242">SUSE bug 831359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4242">SUSE bug 831359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4242">SUSE bug 831359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4242">SUSE bug 831359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4242">SUSE bug 831359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4242">SUSE bug 831359</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138631" comment="libgcrypt-devel-1.6.1-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151920" comment="libgcrypt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138632" comment="libgcrypt20-1.6.1-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151921" comment="libgcrypt20 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138633" comment="libgcrypt20-32bit-1.6.1-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151922" comment="libgcrypt20-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4243</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243" source="CVE"/>
    <description>
    Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4243.html">CVE-2013-4243</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4243">SUSE bug 834779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4243">SUSE bug 834779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4243">SUSE bug 834779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4243">SUSE bug 834779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4243">SUSE bug 834779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4243">SUSE bug 834779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4243">SUSE bug 834779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4243">SUSE bug 834779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4243">SUSE bug 834779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4243">SUSE bug 854393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4244</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244" source="CVE"/>
    <description>
    The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4244.html">CVE-2013-4244</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4244">SUSE bug 834788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4244">SUSE bug 834788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4244">SUSE bug 834788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4244">SUSE bug 834788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4244">SUSE bug 834788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4244">SUSE bug 834788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4244">SUSE bug 854393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4244">SUSE bug 834788</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4246</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4246" source="CVE"/>
    <description>
    libsvn_fs_fs/fs_fs.c in Apache Subversion 1.8.x before 1.8.2 might allow remote authenticated users with commit access to corrupt FSFS repositories and cause a denial of service or obtain sensitive information by editing packed revision properties.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4246.html">CVE-2013-4246</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4246">SUSE bug 836245</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4248</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248" source="CVE"/>
    <description>
    The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4248.html">CVE-2013-4248</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4248">SUSE bug 837746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4248">SUSE bug 837746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4248">SUSE bug 837746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4248">SUSE bug 837746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4248">SUSE bug 837746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4248">SUSE bug 837746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4248">SUSE bug 837746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4248">SUSE bug 837746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4248">SUSE bug 837746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4248">SUSE bug 837746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4248">SUSE bug 837746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4248">SUSE bug 837746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4248">SUSE bug 837746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4248">SUSE bug 837746</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4262</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4262" source="CVE"/>
    <description>
    svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file.  NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-2013-7393.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4262.html">CVE-2013-4262</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4262">SUSE bug 844201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4262">SUSE bug 844201</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4276</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4276" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in LittleCMS (aka lcms or liblcms) 1.19 and earlier allow remote attackers to cause a denial of service (crash) via a crafted (1) ICC color profile to the icctrans utility or (2) TIFF image to the tiffdiff utility.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4276.html">CVE-2013-4276</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4276">SUSE bug 843716</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4276">SUSE bug 843716</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4276">SUSE bug 843716</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4276">SUSE bug 843716</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4276">SUSE bug 843716</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4276">SUSE bug 843716</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4276">SUSE bug 843716</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4276">SUSE bug 843716</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4276">SUSE bug 843716</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4276">SUSE bug 843716</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138681" comment="liblcms-devel-1.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151219" comment="liblcms-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138682" comment="liblcms1-1.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151220" comment="liblcms1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138683" comment="liblcms1-32bit-1.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151221" comment="liblcms1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138684" comment="python-lcms-1.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151222" comment="python-lcms is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4277</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4277" source="CVE"/>
    <description>
    Svnserve in Apache Subversion 1.4.0 through 1.7.12 and 1.8.0 through 1.8.1 allows local users to overwrite arbitrary files or kill arbitrary processes via a symlink attack on the file specified by the --pid-file option.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4277.html">CVE-2013-4277</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4277">SUSE bug 836245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4277">SUSE bug 836245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4277">SUSE bug 836245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4277">SUSE bug 836245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4277">SUSE bug 836245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4277">SUSE bug 836245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4277">SUSE bug 836245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4277">SUSE bug 836245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4277">SUSE bug 836245</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4282</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4282" source="CVE"/>
    <description>
    Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4282.html">CVE-2013-4282</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4282">SUSE bug 848279</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4282">SUSE bug 848279</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4282">SUSE bug 848279</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4282">SUSE bug 848279</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4282">SUSE bug 848279</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4282">SUSE bug 848279</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4282">SUSE bug 848279</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4282">SUSE bug 848279</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4282">SUSE bug 848279</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4282">SUSE bug 848279</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4282">SUSE bug 848279</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4282">SUSE bug 848279</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4282">SUSE bug 848279</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138874" comment="libspice-server1-0.12.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151923" comment="libspice-server1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4288</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4288" source="CVE"/>
    <description>
    Race condition in PolicyKit (aka polkit) allows local users to bypass intended PolicyKit restrictions and gain privileges by starting a setuid or pkexec process before the authorization check is performed, related to (1) the polkit_unix_process_new API function, (2) the dbus API, or (3) the --process (unix-process) option for authorization to pkcheck.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4288.html">CVE-2013-4288</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4288">SUSE bug 835827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4288">SUSE bug 836931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4288">SUSE bug 836932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4288">SUSE bug 836937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4288">SUSE bug 836931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4288">SUSE bug 835827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4288">SUSE bug 835827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4288">SUSE bug 844967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4288">SUSE bug 835827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4288">SUSE bug 836931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4288">SUSE bug 836932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4288">SUSE bug 836937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4288">SUSE bug 836939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4288">SUSE bug 854144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4288">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4288">SUSE bug 864716</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4288">SUSE bug 864716</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138639" comment="libgudev-1_0-0-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151688" comment="libgudev-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138640" comment="libgudev-1_0-devel-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151689" comment="libgudev-1_0-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138750" comment="libpolkit0-0.112-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151393" comment="libpolkit0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138641" comment="libudev-devel-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151690" comment="libudev-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138642" comment="libudev1-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151691" comment="libudev1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138643" comment="libudev1-32bit-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151692" comment="libudev1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138751" comment="polkit-0.112-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151394" comment="polkit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138752" comment="polkit-devel-0.112-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151395" comment="polkit-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138644" comment="systemd-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151693" comment="systemd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138645" comment="systemd-32bit-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151694" comment="systemd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138646" comment="systemd-bash-completion-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151695" comment="systemd-bash-completion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138647" comment="systemd-logger-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151696" comment="systemd-logger is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138648" comment="systemd-sysvinit-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151697" comment="systemd-sysvinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138649" comment="typelib-1_0-GUdev-1_0-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151698" comment="typelib-1_0-GUdev-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138753" comment="typelib-1_0-Polkit-1_0-0.112-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151396" comment="typelib-1_0-Polkit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138650" comment="udev-210-84.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151699" comment="udev is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4289</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4289" source="CVE"/>
    <description>
    Multiple integer overflows in lib/openjp3d/jp3d.c in OpenJPEG before 1.5.2 allow remote attackers to have unspecified impact and vectors, which trigger a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4289.html">CVE-2013-4289</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4289">SUSE bug 839879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4289">SUSE bug 839879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4289">SUSE bug 839879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4289">SUSE bug 839879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4289">SUSE bug 839879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4289">SUSE bug 839879</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138729" comment="libopenjpeg1-1.5.2-3.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151376" comment="libopenjpeg1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4290</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4290" source="CVE"/>
    <description>
    Stack-based buffer overflow in OpenJPEG before 1.5.2 allows remote attackers to have unspecified impact via unknown vectors to (1) lib/openjp3d/opj_jp3d_compress.c, (2) bin/jp3d/convert.c, or (3) lib/openjp3d/event.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4290.html">CVE-2013-4290</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4290">SUSE bug 839879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4290">SUSE bug 839879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4290">SUSE bug 839879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4290">SUSE bug 839879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4290">SUSE bug 839879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4290">SUSE bug 839879</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138729" comment="libopenjpeg1-1.5.2-3.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151376" comment="libopenjpeg1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4296</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4296" source="CVE"/>
    <description>
    The remoteDispatchDomainMemoryStats function in daemon/remote.c in libvirt 0.9.1 through 0.10.1.x, 0.10.2.x before 0.10.2.8, 1.0.x before 1.0.5.6, and 1.1.x before 1.1.2 allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a crafted RPC call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4296.html">CVE-2013-4296</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4296">SUSE bug 838638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4296">SUSE bug 838638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4296">SUSE bug 838638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4296">SUSE bug 836931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4296">SUSE bug 838638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4296">SUSE bug 838638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4296">SUSE bug 838638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4296">SUSE bug 838638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4296">SUSE bug 838638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4296">SUSE bug 838638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4296">SUSE bug 838638</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4297</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4297" source="CVE"/>
    <description>
    The virFileNBDDeviceAssociate function in util/virfile.c in libvirt 1.1.2 and earlier allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4297.html">CVE-2013-4297</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4297">SUSE bug 838642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4297">SUSE bug 838642</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4311</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4311" source="CVE"/>
    <description>
    libvirt 1.0.5.x before 1.0.5.6, 0.10.2.x before 0.10.2.8, and 0.9.12.x before 0.9.12.2 allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition in pkcheck via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4311.html">CVE-2013-4311</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4311">SUSE bug 836931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4311">SUSE bug 838638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4311">SUSE bug 836931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4311">SUSE bug 836931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4311">SUSE bug 836931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4311">SUSE bug 836931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4311">SUSE bug 836931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4311">SUSE bug 836931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4311">SUSE bug 836931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4311">SUSE bug 836931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4311">SUSE bug 864716</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4314</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4314" source="CVE"/>
    <description>
    The X509Extension in pyOpenSSL before 0.13.1 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4314.html">CVE-2013-4314</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4314">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4314">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4314">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4314">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4314">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4314">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4314">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4314">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4314">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4314">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4314">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4314">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4314">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4314">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4314">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4314">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4314">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4314">SUSE bug 839107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4314">SUSE bug 839107</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139056" comment="python-pyOpenSSL-0.14-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151924" comment="python-pyOpenSSL is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4325</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4325" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325" source="CVE"/>
    <description>
    The check_permission_v1 function in base/pkit.py in HP Linux Imaging and Printing (HPLIP) through 3.13.9 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4325.html">CVE-2013-4325</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4325">SUSE bug 836937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4325">SUSE bug 836937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4325">SUSE bug 836937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4325">SUSE bug 836937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4325">SUSE bug 836937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4325">SUSE bug 808355</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4325">SUSE bug 836937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4325">SUSE bug 836937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4325">SUSE bug 836937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4325">SUSE bug 836931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4325">SUSE bug 836932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4325">SUSE bug 836937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4325">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4325">SUSE bug 836937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4325">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4325">SUSE bug 836937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4325">SUSE bug 836937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4325">SUSE bug 836937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4325">SUSE bug 864716</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138396" comment="hplip-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151009" comment="hplip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138397" comment="hplip-hpijs-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151010" comment="hplip-hpijs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138398" comment="hplip-sane-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151011" comment="hplip-sane is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4326</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4326" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4326" source="CVE"/>
    <description>
    RealtimeKit (aka rtkit) 0.5 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4326.html">CVE-2013-4326</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4326">SUSE bug 836939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4326">SUSE bug 836939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4326">SUSE bug 836931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4326">SUSE bug 836932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4326">SUSE bug 836937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4326">SUSE bug 836939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4326">SUSE bug 864716</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139083" comment="rtkit-0.11_git201205151338-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151925" comment="rtkit is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4332</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4332" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332" source="CVE"/>
    <description>
    Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4332.html">CVE-2013-4332</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4332">SUSE bug 839870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4332">SUSE bug 839870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4332">SUSE bug 839870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4332">SUSE bug 839870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4332">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4332">SUSE bug 882910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4332">SUSE bug 839870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4332">SUSE bug 839870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4332">SUSE bug 839870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4332">SUSE bug 839870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4332">SUSE bug 839870</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138343" comment="glibc-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138344" comment="glibc-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138345" comment="glibc-devel-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138346" comment="glibc-extra-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138347" comment="glibc-info-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138348" comment="glibc-locale-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138349" comment="glibc-locale-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138350" comment="nscd-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4342</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4342" source="CVE"/>
    <description>
    xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4342.html">CVE-2013-4342</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 855685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 882917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 882917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 882917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 882917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 882917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 882917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4342">SUSE bug 844230</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139143" comment="xinetd-2.3.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151685" comment="xinetd is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4349</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4349" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-4540.  Reason: This candidate was MERGED into CVE-2012-4540, since it was later discovered that it affected an additional version, but it does not constitute a regression error.  Notes: All CVE users should reference CVE-2012-4540 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4349.html">CVE-2013-4349</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4349">SUSE bug 840572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4349">SUSE bug 840572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4349">SUSE bug 840572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4349">SUSE bug 840572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4349">SUSE bug 840572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4349">SUSE bug 840572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4349">SUSE bug 840572</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138403" comment="icedtea-web-javadoc-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151624" comment="icedtea-web-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138404" comment="java-1_8_0-openjdk-plugin-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151625" comment="java-1_8_0-openjdk-plugin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4351</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4351" source="CVE"/>
    <description>
    GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4351.html">CVE-2013-4351</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4351">SUSE bug 840510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4351">SUSE bug 840510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4351">SUSE bug 840510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4351">SUSE bug 840510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4351">SUSE bug 840510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4351">SUSE bug 840510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4351">SUSE bug 840510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4351">SUSE bug 840510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4351">SUSE bug 840510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4351">SUSE bug 840510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4351">SUSE bug 840510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4351">SUSE bug 840510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4351">SUSE bug 840510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4351">SUSE bug 840510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4351">SUSE bug 840510</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119616" comment="gpg2-2.0.24-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151446" comment="gpg2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119617" comment="gpg2-lang-2.0.24-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151447" comment="gpg2-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4353</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353" source="CVE"/>
    <description>
    The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4353.html">CVE-2013-4353</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4353">SUSE bug 857640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4353">SUSE bug 857640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4353">SUSE bug 857640</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4355</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355" source="CVE"/>
    <description>
    Xen 4.3.x and earlier does not properly handle certain errors, which allows local HVM guests to obtain hypervisor stack memory via a (1) port or (2) memory mapped I/O write or (3) other unspecified operations related to addresses without associated memory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4355.html">CVE-2013-4355</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4355">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4355">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4355">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4355">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4355">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4355">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4355">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4355">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4355">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4355">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4355">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4355">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4355">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4355">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4355">SUSE bug 840592</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4356</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4356" source="CVE"/>
    <description>
    Xen 4.3.x writes hypervisor mappings to certain shadow pagetables when live migration is performed on hosts with more than 5TB of RAM, which allows local 64-bit PV guests to read or write to invalid memory and cause a denial of service (crash).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4356.html">CVE-2013-4356</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4356">SUSE bug 840593</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4356">SUSE bug 840593</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4356">SUSE bug 840593</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4356">SUSE bug 840593</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4361</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4361" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361" source="CVE"/>
    <description>
    The fbld instruction emulation in Xen 3.3.x through 4.3.x does not use the correct variable for the source effective address, which allows local HVM guests to obtain hypervisor stack information by reading the values used by the instruction.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4361.html">CVE-2013-4361</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4361">SUSE bug 841766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4361">SUSE bug 841766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4361">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4361">SUSE bug 841766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4361">SUSE bug 841766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4361">SUSE bug 841766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4361">SUSE bug 841766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4361">SUSE bug 841766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4361">SUSE bug 841766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4361">SUSE bug 841766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4361">SUSE bug 841766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4361">SUSE bug 841766</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4375</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375" source="CVE"/>
    <description>
    The qdisk PV disk backend in qemu-xen in Xen 4.2.x and 4.3.x before 4.3.1, and qemu 1.1 and other versions, allows local HVM guests to cause a denial of service (domain grant reference consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4375.html">CVE-2013-4375</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4375">SUSE bug 842515</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4375">SUSE bug 842515</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4375">SUSE bug 842515</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4375">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4375">SUSE bug 842515</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4375">SUSE bug 842515</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4375">SUSE bug 842515</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4375">SUSE bug 842515</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4375">SUSE bug 842515</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4396</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4396" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396" source="CVE"/>
    <description>
    Use-after-free vulnerability in the doImageText function in dix/dixfonts.c in the xorg-server module before 1.14.4 in X.Org X11 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted ImageText request that triggers memory-allocation failure.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4396.html">CVE-2013-4396</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4396">SUSE bug 843652</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139149" comment="xorg-x11-server-7.6_1.17.2-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139150" comment="xorg-x11-server-extra-7.6_1.17.2-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139151" comment="xorg-x11-server-sdk-7.6_1.17.2-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4399</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4399" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4399" source="CVE"/>
    <description>
    The remoteClientFreeFunc function in daemon/remote.c in libvirt before 1.1.3, when ACLs are used, does not set an identity, which causes event handler removal to be denied and remote attackers to cause a denial of service (use-after-free and crash) by registering an event handler and then closing the connection.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4399.html">CVE-2013-4399</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4399">SUSE bug 844052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4399">SUSE bug 844052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4399">SUSE bug 842300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4399">SUSE bug 844052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4399">SUSE bug 844052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4399">SUSE bug 844052</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4400</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4400" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4400" source="CVE"/>
    <description>
    virt-login-shell in libvirt 1.1.2 through 1.1.3 allows local users to overwrite arbitrary files and possibly gain privileges via unspecified environment variables or command-line arguments.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4400.html">CVE-2013-4400</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4400">SUSE bug 837609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4400">SUSE bug 837609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4400">SUSE bug 837609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4400">SUSE bug 837609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4400">SUSE bug 837609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4400">SUSE bug 837609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4400">SUSE bug 837609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4400">SUSE bug 837609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4400">SUSE bug 837609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4400">SUSE bug 837609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4400">SUSE bug 837609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4400">SUSE bug 837609</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4401</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4401" source="CVE"/>
    <description>
    The virConnectDomainXMLToNative API function in libvirt 1.1.0 through 1.1.3 checks for the connect:read permission instead of the connect:write permission, which allows attackers to gain domain:write privileges and execute Qemu binaries via crafted XML.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4401.html">CVE-2013-4401</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4401">SUSE bug 845704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4401">SUSE bug 845704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4401">SUSE bug 845704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4401">SUSE bug 845704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4401">SUSE bug 845704</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4402</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402" source="CVE"/>
    <description>
    The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4402.html">CVE-2013-4402</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4402">SUSE bug 844175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4402">SUSE bug 844175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4402">SUSE bug 844175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4402">SUSE bug 844175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4402">SUSE bug 844175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4402">SUSE bug 844175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4402">SUSE bug 844175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4402">SUSE bug 844175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4402">SUSE bug 844175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4402">SUSE bug 844175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4402">SUSE bug 844175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4402">SUSE bug 844175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4402">SUSE bug 844175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4402">SUSE bug 844175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4402">SUSE bug 941439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4402">SUSE bug 941439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4402">SUSE bug 941439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4402">SUSE bug 941439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4402">SUSE bug 941439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4402">SUSE bug 941439</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119616" comment="gpg2-2.0.24-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151446" comment="gpg2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119617" comment="gpg2-lang-2.0.24-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151447" comment="gpg2-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4408</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408" source="CVE"/>
    <description>
    Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4408.html">CVE-2013-4408</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 882906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4408">SUSE bug 844720</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4416</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416" source="CVE"/>
    <description>
    The Ocaml xenstored implementation (oxenstored) in Xen 4.1.x, 4.2.x, and 4.3.x allows local guest domains to cause a denial of service (domain shutdown) via a large message reply.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4416.html">CVE-2013-4416</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4416">SUSE bug 845520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4416">SUSE bug 845520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4416">SUSE bug 845520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4416">SUSE bug 840592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4416">SUSE bug 845520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4416">SUSE bug 845520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4416">SUSE bug 845520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4416">SUSE bug 845520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4416">SUSE bug 845520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4416">SUSE bug 845520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4416">SUSE bug 845520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4416">SUSE bug 845520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4416">SUSE bug 845520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4416">SUSE bug 845520</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4440</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4440" source="CVE"/>
    <description>
    Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4440.html">CVE-2013-4440</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4440">SUSE bug 846397</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4440">SUSE bug 846397</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4440">SUSE bug 846397</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4440">SUSE bug 846397</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139039" comment="pwgen-2.07-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151926" comment="pwgen is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4442</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4442" source="CVE"/>
    <description>
    Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4442.html">CVE-2013-4442</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4442">SUSE bug 846397</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139039" comment="pwgen-2.07-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151926" comment="pwgen is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4458</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458" source="CVE"/>
    <description>
    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4458.html">CVE-2013-4458</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 883217</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 955181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 955181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 955181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 955181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 955181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 955181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 967023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 955181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 980483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 941444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 955181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4458">SUSE bug 847227</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138343" comment="glibc-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138344" comment="glibc-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138345" comment="glibc-devel-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138346" comment="glibc-extra-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138347" comment="glibc-info-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138348" comment="glibc-locale-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138349" comment="glibc-locale-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138350" comment="nscd-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4473</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4473" source="CVE"/>
    <description>
    Stack-based buffer overflow in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a source filename.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4473.html">CVE-2013-4473</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4473">SUSE bug 847907</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4473">SUSE bug 847907</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4473">SUSE bug 847907</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138754" comment="libpoppler-devel-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151223" comment="libpoppler-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138755" comment="libpoppler-glib8-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151224" comment="libpoppler-glib8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138756" comment="libpoppler-qt4-4-0.24.4-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151225" comment="libpoppler-qt4-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138757" comment="libpoppler44-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151226" comment="libpoppler44 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138758" comment="poppler-tools-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151227" comment="poppler-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4474</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4474" source="CVE"/>
    <description>
    Format string vulnerability in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.3 allows remote attackers to cause a denial of service (crash) via format string specifiers in a destination filename.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4474.html">CVE-2013-4474</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4474">SUSE bug 847907</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4474">SUSE bug 847907</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4474">SUSE bug 847907</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138754" comment="libpoppler-devel-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151223" comment="libpoppler-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138755" comment="libpoppler-glib8-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151224" comment="libpoppler-glib8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138756" comment="libpoppler-qt4-4-0.24.4-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151225" comment="libpoppler-qt4-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138757" comment="libpoppler44-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151226" comment="libpoppler44 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138758" comment="poppler-tools-0.24.4-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151227" comment="poppler-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4475</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475" source="CVE"/>
    <description>
    Samba 3.2.x through 3.6.x before 3.6.20, 4.0.x before 4.0.11, and 4.1.x before 4.1.1, when vfs_streams_depot or vfs_streams_xattr is enabled, allows remote attackers to bypass intended file restrictions by leveraging ACL differences between a file and an associated alternate data stream (ADS).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4475.html">CVE-2013-4475</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 880220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4475">SUSE bug 848101</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4476</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476" source="CVE"/>
    <description>
    Samba 4.0.x before 4.0.11 and 4.1.x before 4.1.1, when LDAP or HTTP is provided over SSL, uses world-readable permissions for a private key, which allows local users to obtain sensitive information by reading the key file, as demonstrated by access to the local filesystem on an AD domain controller.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4476.html">CVE-2013-4476</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4476">SUSE bug 848103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4476">SUSE bug 848103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4476">SUSE bug 848103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4476">SUSE bug 848103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4476">SUSE bug 848103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4476">SUSE bug 848103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4476">SUSE bug 848103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4476">SUSE bug 848103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4476">SUSE bug 848103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4476">SUSE bug 848103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4476">SUSE bug 848103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4476">SUSE bug 848103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4476">SUSE bug 848103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4476">SUSE bug 848103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4476">SUSE bug 848103</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4494</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494" source="CVE"/>
    <description>
    Xen before 4.1.x, 4.2.x, and 4.3.x does not take the page_alloc_lock and grant_table.lock in the same order, which allows local guest administrators with access to multiple vcpus to cause a denial of service (host deadlock) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4494.html">CVE-2013-4494</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4494">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4494">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4494">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4494">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4494">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4494">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4494">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4494">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4494">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4494">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4494">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4494">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4494">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4494">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4494">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4494">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4494">SUSE bug 848657</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4496</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496" source="CVE"/>
    <description>
    Samba 3.x before 3.6.23, 4.0.x before 4.0.16, and 4.1.x before 4.1.6 does not enforce the password-guessing protection mechanism for all interfaces, which makes it easier for remote attackers to obtain access via brute-force ChangePasswordUser2 (1) SAMR or (2) RAP attempts.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4496.html">CVE-2013-4496</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 849224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 849224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 849224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 849224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 866844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 849224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 866844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 849224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 849224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 866844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 849224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 866844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 849224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 849224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 849224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 866844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 849224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 849224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 849224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 849224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 849224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 866844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 849224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 849224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4496">SUSE bug 849224</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4505</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4505" source="CVE"/>
    <description>
    The is_this_legal function in mod_dontdothat for Apache Subversion 1.4.0 through 1.7.13 and 1.8.0 through 1.8.4 allows remote attackers to bypass intended access restrictions and possibly cause a denial of service (resource consumption) via a relative URL in a REPORT request.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4505.html">CVE-2013-4505</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4505">SUSE bug 850667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4505">SUSE bug 850667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4505">SUSE bug 850667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4505">SUSE bug 850667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4505">SUSE bug 850747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4505">SUSE bug 850667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4505">SUSE bug 850667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4505">SUSE bug 850667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4505">SUSE bug 850667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4505">SUSE bug 850667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4505">SUSE bug 850667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4505">SUSE bug 850667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4505">SUSE bug 850667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4505">SUSE bug 850667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4505">SUSE bug 850667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4505">SUSE bug 850667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4505">SUSE bug 862459</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4509</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4509" source="CVE"/>
    <description>
    The default configuration of IBUS 1.5.4, and possibly 1.5.2 and earlier, when IBus.InputPurpose.PASSWORD is not set and used with GNOME 3, does not obscure the entered password characters, which allows physically proximate attackers to obtain a user password by reading the lockscreen.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4509.html">CVE-2013-4509</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4509">SUSE bug 847718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4509">SUSE bug 847718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4509">SUSE bug 847718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4509">SUSE bug 847718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4509">SUSE bug 847718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4509">SUSE bug 847718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4509">SUSE bug 847718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4509">SUSE bug 847718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4509">SUSE bug 847718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4509">SUSE bug 847718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4509">SUSE bug 847718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4509">SUSE bug 847718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4509">SUSE bug 847718</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4509">SUSE bug 847718</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138401" comment="ibus-chewing-1.4.14-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151927" comment="ibus-chewing is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138402" comment="ibus-pinyin-1.5.0-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151928" comment="ibus-pinyin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4526</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4526" source="CVE"/>
    <description>
    Buffer overflow in hw/ide/ahci.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via vectors related to migrating ports.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4526.html">CVE-2013-4526</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4526">SUSE bug 864671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4526">SUSE bug 864671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4526">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4526">SUSE bug 864671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4526">SUSE bug 864671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4526">SUSE bug 864671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4526">SUSE bug 864671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4526">SUSE bug 864671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4526">SUSE bug 864671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4526">SUSE bug 864671</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4527</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4527" source="CVE"/>
    <description>
    Buffer overflow in hw/timer/hpet.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via vectors related to the number of timers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4527.html">CVE-2013-4527</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4527">SUSE bug 864673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4527">SUSE bug 864673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4527">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4527">SUSE bug 864673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4527">SUSE bug 864673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4527">SUSE bug 864673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4527">SUSE bug 864673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4527">SUSE bug 864673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4527">SUSE bug 864673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4527">SUSE bug 864673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4527">SUSE bug 864673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4527">SUSE bug 864673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4527">SUSE bug 964746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4527">SUSE bug 964746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4527">SUSE bug 964746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4527">SUSE bug 964746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4527">SUSE bug 964746</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4529</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4529" source="CVE"/>
    <description>
    Buffer overflow in hw/pci/pcie_aer.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4529.html">CVE-2013-4529</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4529">SUSE bug 864678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4529">SUSE bug 864678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4529">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4529">SUSE bug 864678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4529">SUSE bug 864678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4529">SUSE bug 864678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4529">SUSE bug 864678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4529">SUSE bug 864678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4529">SUSE bug 864678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4529">SUSE bug 864678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4529">SUSE bug 964929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4529">SUSE bug 964929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4529">SUSE bug 964929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4529">SUSE bug 964929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4529">SUSE bug 964929</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4530</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4530" source="CVE"/>
    <description>
    Buffer overflow in hw/ssi/pl022.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4530.html">CVE-2013-4530</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4530">SUSE bug 864682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4530">SUSE bug 864682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4530">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4530">SUSE bug 864682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4530">SUSE bug 864682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4530">SUSE bug 864682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4530">SUSE bug 864682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4530">SUSE bug 864682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4530">SUSE bug 864682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4530">SUSE bug 864682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4530">SUSE bug 964950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4530">SUSE bug 964950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4530">SUSE bug 964950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4530">SUSE bug 964950</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4531</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4531" source="CVE"/>
    <description>
    Buffer overflow in target-arm/machine.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a negative value in cpreg_vmstate_array_len in a savevm image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4531.html">CVE-2013-4531</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4531">SUSE bug 864796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4531">SUSE bug 864796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4531">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4531">SUSE bug 864796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4531">SUSE bug 864796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4531">SUSE bug 864796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4531">SUSE bug 864796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4531">SUSE bug 864796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4531">SUSE bug 864796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4531">SUSE bug 864796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4531">SUSE bug 864796</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4533</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4533" source="CVE"/>
    <description>
    Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4533.html">CVE-2013-4533</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4533">SUSE bug 864655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4533">SUSE bug 864655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4533">SUSE bug 864655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4533">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4533">SUSE bug 864655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4533">SUSE bug 864655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4533">SUSE bug 864655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4533">SUSE bug 864655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4533">SUSE bug 864655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4533">SUSE bug 864655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4533">SUSE bug 864655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4533">SUSE bug 964644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4533">SUSE bug 964644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4533">SUSE bug 964644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4533">SUSE bug 964644</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4534</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4534" source="CVE"/>
    <description>
    Buffer overflow in hw/intc/openpic.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4534.html">CVE-2013-4534</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4534">SUSE bug 864811</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4534">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4534">SUSE bug 864811</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4534">SUSE bug 864811</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4534">SUSE bug 864811</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4534">SUSE bug 864811</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4534">SUSE bug 864811</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4534">SUSE bug 864811</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4534">SUSE bug 864811</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4534">SUSE bug 964452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4534">SUSE bug 864811</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4534">SUSE bug 964452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4534">SUSE bug 964452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4534">SUSE bug 964452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4534">SUSE bug 964452</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4535</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4535" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4535" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4535.html">CVE-2013-4535</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4535">SUSE bug 864665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4535">SUSE bug 964676</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4536</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4536" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4536.html">CVE-2013-4536</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4536">SUSE bug 864665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4536">SUSE bug 864665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4536">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4536">SUSE bug 864665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4536">SUSE bug 864665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4536">SUSE bug 864665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4536">SUSE bug 864665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4536">SUSE bug 864665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4536">SUSE bug 864665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4536">SUSE bug 864665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4536">SUSE bug 964676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4536">SUSE bug 964676</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4537</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4537" source="CVE"/>
    <description>
    The ssi_sd_transfer function in hw/sd/ssi-sd.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted arglen value in a savevm image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4537.html">CVE-2013-4537</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4537">SUSE bug 864391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4537">SUSE bug 864391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4537">SUSE bug 864391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4537">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4537">SUSE bug 864391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4537">SUSE bug 864391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4537">SUSE bug 864391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4537">SUSE bug 864391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4537">SUSE bug 864391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4537">SUSE bug 864391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4537">SUSE bug 864391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4537">SUSE bug 962642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4537">SUSE bug 864391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4537">SUSE bug 962642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4537">SUSE bug 962642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4537">SUSE bug 962642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4537">SUSE bug 962642</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4538</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4538" source="CVE"/>
    <description>
    Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c in QEMU before 1.7.2 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4538.html">CVE-2013-4538</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4538">SUSE bug 864769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4538">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4538">SUSE bug 864769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4538">SUSE bug 864769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4538">SUSE bug 864769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4538">SUSE bug 864769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4538">SUSE bug 864769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4538">SUSE bug 864769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4538">SUSE bug 864769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4538">SUSE bug 864769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4538">SUSE bug 864769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4538">SUSE bug 962335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4538">SUSE bug 864769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4538">SUSE bug 962335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4538">SUSE bug 962335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4538">SUSE bug 962335</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4539</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4539" source="CVE"/>
    <description>
    Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4539.html">CVE-2013-4539</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4539">SUSE bug 864805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4539">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4539">SUSE bug 864805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4539">SUSE bug 864805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4539">SUSE bug 864805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4539">SUSE bug 864805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4539">SUSE bug 864805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4539">SUSE bug 864805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4539">SUSE bug 864805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4539">SUSE bug 962758</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4539">SUSE bug 864805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4539">SUSE bug 962758</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4539">SUSE bug 962758</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4539">SUSE bug 962758</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4539">SUSE bug 962758</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4540</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4540" source="CVE"/>
    <description>
    Buffer overflow in scoop_gpio_handler_update in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a large (1) prev_level, (2) gpio_level, or (3) gpio_dir value in a savevm image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4540.html">CVE-2013-4540</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4540">SUSE bug 864801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4540">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4540">SUSE bug 864801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4540">SUSE bug 864801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4540">SUSE bug 864801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4540">SUSE bug 864801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4540">SUSE bug 864801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4540">SUSE bug 864801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4540">SUSE bug 880751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4540">SUSE bug 880751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4540">SUSE bug 864801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4540">SUSE bug 864801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4540">SUSE bug 864801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4540">SUSE bug 864801</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4541</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4541" source="CVE"/>
    <description>
    The usb_device_post_load function in hw/usb/bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, related to a negative setup_len or setup_index value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4541.html">CVE-2013-4541</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4541">SUSE bug 864802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4541">SUSE bug 864802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4541">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4541">SUSE bug 864802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4541">SUSE bug 864802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4541">SUSE bug 864802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4541">SUSE bug 864802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4541">SUSE bug 864802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4541">SUSE bug 864802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4541">SUSE bug 864802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4541">SUSE bug 864802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4541">SUSE bug 864802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4541">SUSE bug 864802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4541">SUSE bug 864802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4541">SUSE bug 864802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4541">SUSE bug 864802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4541">SUSE bug 864802</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4542</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4542" source="CVE"/>
    <description>
    The virtio_scsi_load_request function in hw/scsi/scsi-bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds array access.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4542.html">CVE-2013-4542</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4542">SUSE bug 864804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4542">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4542">SUSE bug 864804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4542">SUSE bug 864804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4542">SUSE bug 864804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4542">SUSE bug 864804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4542">SUSE bug 864804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4542">SUSE bug 864804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4542">SUSE bug 864804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4542">SUSE bug 864804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4542">SUSE bug 864804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4542">SUSE bug 864804</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4544</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4544" source="CVE"/>
    <description>
    hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and earlier allows local guest users to cause a denial of service or possibly execute arbitrary code via vectors related to (1) RX or (2) TX queue numbers or (3) interrupt indices.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4544.html">CVE-2013-4544</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4544">SUSE bug 873613</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4544">SUSE bug 873613</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4544">SUSE bug 873613</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4544">SUSE bug 873613</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4545</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4545" source="CVE"/>
    <description>
    cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4545.html">CVE-2013-4545</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4545">SUSE bug 849596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4545">SUSE bug 849596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4545">SUSE bug 849596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4545">SUSE bug 849596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4545">SUSE bug 849596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4545">SUSE bug 849596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4545">SUSE bug 849596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4545">SUSE bug 849596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4545">SUSE bug 849596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4545">SUSE bug 870444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4545">SUSE bug 849596</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4545">SUSE bug 882520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4545">SUSE bug 880252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4545">SUSE bug 924250</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4545">SUSE bug 924250</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4545">SUSE bug 924250</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138211" comment="curl-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138212" comment="libcurl-devel-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138213" comment="libcurl4-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4549</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4549" source="CVE"/>
    <description>
    QXmlSimpleReader in Qt before 5.2 allows context-dependent attackers to cause a denial of service (memory consumption) via an XML Entity Expansion (XEE) attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4549.html">CVE-2013-4549</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4549">SUSE bug 856832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4549">SUSE bug 856832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4549">SUSE bug 856832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4549">SUSE bug 856832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4549">SUSE bug 856832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4549">SUSE bug 856832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4549">SUSE bug 856832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4549">SUSE bug 856832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4549">SUSE bug 856832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4549">SUSE bug 856832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4549">SUSE bug 856832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4549">SUSE bug 856832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4549">SUSE bug 856832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4549">SUSE bug 856832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4549">SUSE bug 856832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4549">SUSE bug 856832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4549">SUSE bug 1039291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4549">SUSE bug 1039291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4549">SUSE bug 1039291</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138791" comment="libqt4-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151228" comment="libqt4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138792" comment="libqt4-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151229" comment="libqt4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138793" comment="libqt4-devel-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151230" comment="libqt4-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138794" comment="libqt4-linguist-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151231" comment="libqt4-linguist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138795" comment="libqt4-qt3support-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151232" comment="libqt4-qt3support is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138796" comment="libqt4-qt3support-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151233" comment="libqt4-qt3support-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138797" comment="libqt4-sql-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151234" comment="libqt4-sql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138798" comment="libqt4-sql-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151235" comment="libqt4-sql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138799" comment="libqt4-sql-mysql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151236" comment="libqt4-sql-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138800" comment="libqt4-sql-mysql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151237" comment="libqt4-sql-mysql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138801" comment="libqt4-sql-postgresql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151238" comment="libqt4-sql-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138802" comment="libqt4-sql-postgresql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151239" comment="libqt4-sql-postgresql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138803" comment="libqt4-sql-sqlite-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151240" comment="libqt4-sql-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138804" comment="libqt4-sql-sqlite-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151241" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138805" comment="libqt4-sql-unixODBC-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151242" comment="libqt4-sql-unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138806" comment="libqt4-sql-unixODBC-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151243" comment="libqt4-sql-unixODBC-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138807" comment="libqt4-x11-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151244" comment="libqt4-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138808" comment="libqt4-x11-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151245" comment="libqt4-x11-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4551</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4551" source="CVE"/>
    <description>
    Xen 4.2.x and 4.3.x, when nested virtualization is disabled, does not properly check the emulation paths for (1) VMLAUNCH and (2) VMRESUME, which allows local HVM guest users to cause a denial of service (host crash) via unspecified vectors related to "guest VMX instruction execution."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4551.html">CVE-2013-4551</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4551">SUSE bug 849665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4551">SUSE bug 849665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4551">SUSE bug 849665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4551">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4551">SUSE bug 849665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4551">SUSE bug 849665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4551">SUSE bug 849665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4551">SUSE bug 849665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4551">SUSE bug 849665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4551">SUSE bug 849665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4551">SUSE bug 849665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4551">SUSE bug 849665</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4553</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553" source="CVE"/>
    <description>
    The XEN_DOMCTL_getmemlist hypercall in Xen 3.4.x through 4.3.x (possibly 4.3.1) does not always obtain the page_alloc_lock and mm_rwlock in the same order, which allows local guest administrators to cause a denial of service (host deadlock).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4553.html">CVE-2013-4553</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4553">SUSE bug 849667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4553">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4553">SUSE bug 849667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4553">SUSE bug 849667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4553">SUSE bug 849667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4553">SUSE bug 849667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4553">SUSE bug 849667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4553">SUSE bug 849668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4553">SUSE bug 849667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4553">SUSE bug 849667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4553">SUSE bug 849667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4553">SUSE bug 849667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4553">SUSE bug 849667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4553">SUSE bug 849667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4553">SUSE bug 849667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4553">SUSE bug 849667</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4554</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4554" source="CVE"/>
    <description>
    Xen 3.0.3 through 4.1.x (possibly 4.1.6.1), 4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly prevent access to hypercalls, which allows local guest users to gain privileges via a crafted application running in ring 1 or 2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4554.html">CVE-2013-4554</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4554">SUSE bug 849668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4554">SUSE bug 848657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4554">SUSE bug 849668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4554">SUSE bug 849668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4554">SUSE bug 849668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4554">SUSE bug 849668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4554">SUSE bug 849668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4554">SUSE bug 849668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4554">SUSE bug 849668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4554">SUSE bug 849668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4554">SUSE bug 849668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4554">SUSE bug 849668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4554">SUSE bug 849668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4554">SUSE bug 849668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4554">SUSE bug 849668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4554">SUSE bug 849668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4554">SUSE bug 849668</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4558</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4558" source="CVE"/>
    <description>
    The get_parent_resource function in repos.c in mod_dav_svn Apache HTTPD server module in Subversion 1.7.11 through 1.7.13 and 1.8.1 through 1.8.4, when built with assertions enabled and SVNAutoversioning is enabled, allows remote attackers to cause a denial of service (assertion failure and Apache process abort) via a non-canonical URL in a request, as demonstrated using a trailing /.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4558.html">CVE-2013-4558</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4558">SUSE bug 850667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4558">SUSE bug 850667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4558">SUSE bug 850747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4558">SUSE bug 862459</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4701</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4701" source="CVE"/>
    <description>
    Auth/Yadis/XML.php in PHP OpenID Library 2.2.2 and earlier allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via XRDS data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4701.html">CVE-2013-4701</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4701">SUSE bug 1082714</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133256" comment="typo3-cms-4_7-4.7.20-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151931" comment="typo3-cms-4_7 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4758</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4758" source="CVE"/>
    <description>
    Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4758.html">CVE-2013-4758</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4758">SUSE bug 828140</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4758">SUSE bug 828140</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4758">SUSE bug 828140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139082" comment="rsyslog-8.4.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151645" comment="rsyslog is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4854</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4854" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4854" source="CVE"/>
    <description>
    The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4854.html">CVE-2013-4854</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4854">SUSE bug 831899</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4854">SUSE bug 831899</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4854">SUSE bug 831899</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4854">SUSE bug 831899</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4854">SUSE bug 831899</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4854">SUSE bug 831899</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4854">SUSE bug 831899</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4854">SUSE bug 831899</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4854">SUSE bug 831899</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4854">SUSE bug 831899</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4854">SUSE bug 831899</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4854">SUSE bug 831899</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4920</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4920" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4920" source="CVE"/>
    <description>
    The P1 dissector in Wireshark 1.10.x before 1.10.1 does not properly initialize a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4920.html">CVE-2013-4920</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4920">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4921</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4921" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4921" source="CVE"/>
    <description>
    Off-by-one error in the dissect_radiotap function in epan/dissectors/packet-ieee80211-radiotap.c in the Radiotap dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4921.html">CVE-2013-4921</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4921">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4922</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4922" source="CVE"/>
    <description>
    Double free vulnerability in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4922.html">CVE-2013-4922</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4922">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4923</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4923" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4923" source="CVE"/>
    <description>
    Memory leak in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (memory consumption) via crafted packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4923.html">CVE-2013-4923</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4923">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4924</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4924" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4924" source="CVE"/>
    <description>
    epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly validate certain index values, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4924.html">CVE-2013-4924</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4924">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4925</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4925" source="CVE"/>
    <description>
    Integer signedness error in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4925.html">CVE-2013-4925</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4925">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4926</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4926" source="CVE"/>
    <description>
    epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly determine whether there is remaining packet data to process, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4926.html">CVE-2013-4926</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4926">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4927</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4927" source="CVE"/>
    <description>
    Integer signedness error in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4927.html">CVE-2013-4927</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4927">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4928</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4928" source="CVE"/>
    <description>
    Integer signedness error in the dissect_headers function in epan/dissectors/packet-btobex.c in the Bluetooth OBEX dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4928.html">CVE-2013-4928</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4928">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4929</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4929" source="CVE"/>
    <description>
    The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4929.html">CVE-2013-4929</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4929">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4930</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930" source="CVE"/>
    <description>
    The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4930.html">CVE-2013-4930</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4930">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4931</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4931" source="CVE"/>
    <description>
    epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4931.html">CVE-2013-4931</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4931">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4932</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932" source="CVE"/>
    <description>
    Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4932.html">CVE-2013-4932</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4932">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4933</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933" source="CVE"/>
    <description>
    The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4933.html">CVE-2013-4933</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4933">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4934</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934" source="CVE"/>
    <description>
    The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4934.html">CVE-2013-4934</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4934">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4935</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935" source="CVE"/>
    <description>
    The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4935.html">CVE-2013-4935</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4935">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4936</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-4936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4936" source="CVE"/>
    <description>
    The IsDFP_Frame function in plugins/profinet/packet-pn-rt.c in the PROFINET Real-Time dissector in Wireshark 1.10.x before 1.10.1 does not validate MAC addresses, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-4936.html">CVE-2013-4936</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-4936">SUSE bug 831718</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5123</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5123" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5123" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5123.html">CVE-2013-5123</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5123">SUSE bug 864406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5123">SUSE bug 864406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5123">SUSE bug 864406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5123">SUSE bug 864406</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139058" comment="python3-pip-7.1.2-4.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151932" comment="python3-pip is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5211</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211" source="CVE"/>
    <description>
    The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5211.html">CVE-2013-5211</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 889447</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 889447</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 857195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5211">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138997" comment="ntp-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138998" comment="ntp-doc-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5590</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5590.html">CVE-2013-5590</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5590">SUSE bug 847708</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5591</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5591" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5591.html">CVE-2013-5591</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5591">SUSE bug 847708</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5592</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5592" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5592.html">CVE-2013-5592</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5592">SUSE bug 847708</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5593</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5593" source="CVE"/>
    <description>
    The SELECT element implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly restrict the nature or placement of HTML within a dropdown menu, which allows remote attackers to spoof the address bar or conduct clickjacking attacks via vectors that trigger navigation off of a page containing this element.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5593.html">CVE-2013-5593</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5593">SUSE bug 847708</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5595</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595" source="CVE"/>
    <description>
    The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly allocate memory for unspecified functions, which allows remote attackers to conduct buffer overflow attacks via a crafted web page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5595.html">CVE-2013-5595</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5595">SUSE bug 847708</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5596</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5596" source="CVE"/>
    <description>
    The cycle collection (CC) implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly determine the thread for release of an image object, which allows remote attackers to execute arbitrary code or cause a denial of service (race condition and application crash) via a large HTML document containing IMG elements, as demonstrated by the Never-Ending Reddit on reddit.com.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5596.html">CVE-2013-5596</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5596">SUSE bug 847708</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5597</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsDocLoader::doStopDocumentLoad function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a state-change event during an update of the offline cache.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5597.html">CVE-2013-5597</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5597">SUSE bug 847708</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5598</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5598" source="CVE"/>
    <description>
    PDF.js in Mozilla Firefox before 25.0 and Firefox ESR 24.x before 24.1 does not properly handle the appending of an IFRAME element, which allows remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges by using this element within an embedded PDF object.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5598.html">CVE-2013-5598</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5598">SUSE bug 847708</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5599</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsIPresShell::GetPresContext function in the PresShell (aka presentation shell) implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a CANVAS element, a mozTextStyle attribute, and an onresize event.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5599.html">CVE-2013-5599</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5599">SUSE bug 847708</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5600</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsIOService::NewChannelFromURIWithProxyFlags function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors involving a blob: URL.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5600.html">CVE-2013-5600</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5600">SUSE bug 847708</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5601</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEventListenerManager::SetEventHandler function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors related to a memory allocation through the garbage collection (GC) API.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5601.html">CVE-2013-5601</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5601">SUSE bug 847708</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5602</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602" source="CVE"/>
    <description>
    The Worker::SetEventListener function in the Web workers implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to direct proxies.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5602.html">CVE-2013-5602</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5602">SUSE bug 847708</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5603</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5603" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5603" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsContentUtils::ContentIsHostIncludingDescendantOf function in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving HTML document templates.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5603.html">CVE-2013-5603</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5603">SUSE bug 847708</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5604</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604" source="CVE"/>
    <description>
    The txXPathNodeUtils::getBaseURI function in the XSLT processor in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly initialize data, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via crafted documents.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5604.html">CVE-2013-5604</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5604">SUSE bug 847708</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5605</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) 3.14 before 3.14.5 and 3.15 before 3.15.3 allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid handshake packets.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5605.html">CVE-2013-5605</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5605">SUSE bug 850148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5605">SUSE bug 850148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5605">SUSE bug 850148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5605">SUSE bug 850148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5605">SUSE bug 850148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5605">SUSE bug 850148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5605">SUSE bug 850148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5605">SUSE bug 850148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5605">SUSE bug 850148</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138623" comment="libfreebl3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138624" comment="libsoftokn3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138625" comment="mozilla-nss-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138626" comment="mozilla-nss-certs-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138627" comment="mozilla-nss-devel-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138628" comment="mozilla-nss-tools-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5609</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5609.html">CVE-2013-5609</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5609">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5610</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5610" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5610.html">CVE-2013-5610</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5610">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5611</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5611" source="CVE"/>
    <description>
    Mozilla Firefox before 26.0 does not properly remove the Application Installation doorhanger, which makes it easier for remote attackers to spoof a Web App installation site by controlling the timing of page navigation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5611.html">CVE-2013-5611</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5611">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5612</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 makes it easier for remote attackers to inject arbitrary web script or HTML by leveraging a Same Origin Policy violation triggered by lack of a charset parameter in a Content-Type HTTP header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5612.html">CVE-2013-5612</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5612">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5613</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613" source="CVE"/>
    <description>
    Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving synthetic mouse movement, related to the RestyleManager::GetHoverGeneration function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5613.html">CVE-2013-5613</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5613">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5614</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614" source="CVE"/>
    <description>
    Mozilla Firefox before 26.0 and SeaMonkey before 2.23 do not properly consider the sandbox attribute of an IFRAME element during processing of a contained OBJECT element, which allows remote attackers to bypass intended sandbox restrictions via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5614.html">CVE-2013-5614</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5614">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5615</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615" source="CVE"/>
    <description>
    The JavaScript implementation in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 does not properly enforce certain typeset restrictions on the generation of GetElementIC typed array stubs, which has unspecified impact and remote attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5615.html">CVE-2013-5615</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5615">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5616</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEventListenerManager::HandleEventSubType function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to mListeners event listeners.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5616.html">CVE-2013-5616</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5616">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5618</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsNodeUtils::LastRelease function in the table-editing user interface in the editor component in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code by triggering improper garbage collection.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5618.html">CVE-2013-5618</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5618">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5619</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619" source="CVE"/>
    <description>
    Multiple integer overflows in the binary-search implementation in SpiderMonkey in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 might allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5619.html">CVE-2013-5619</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5619">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5653</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5653" source="CVE"/>
    <description>
    The getenv and filenameforall functions in Ghostscript 9.10 ignore the "-dSAFER" argument, which allows remote attackers to read data via a crafted postscript file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5653.html">CVE-2013-5653</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5653">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5653">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5653">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5653">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5653">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5653">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5653">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5653">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5653">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5653">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5653">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5653">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5653">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5653">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5653">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5653">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5653">SUSE bug 1001951</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131293" comment="ghostscript-9.15-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131841" comment="ghostscript-devel-9.15-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130958" comment="ghostscript-mini-9.15-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130959" comment="ghostscript-mini-devel-9.15-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131294" comment="ghostscript-x11-9.15-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5704</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704" source="CVE"/>
    <description>
    The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding.  NOTE: the vendor states "this is not a security issue in httpd as such."
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5704.html">CVE-2013-5704</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 914535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 930944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 930944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 930944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 930944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 915666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 871310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 938728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 938728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 938728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 930944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 930944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 930944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 930944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 930944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5704">SUSE bug 930944</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5717</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5717" source="CVE"/>
    <description>
    The Bluetooth HCI ACL dissector in Wireshark 1.10.x before 1.10.2 does not properly maintain a certain free list, which allows remote attackers to cause a denial of service (application crash) via a crafted packet that is not properly handled by the wmem_block_alloc function in epan/wmem/wmem_allocator_block.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5717.html">CVE-2013-5717</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5717">SUSE bug 839607</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5718</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718" source="CVE"/>
    <description>
    The dissect_nbap_T_dCH_ID function in epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not restrict the dch_id value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5718.html">CVE-2013-5718</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5718">SUSE bug 839607</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5719</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5719" source="CVE"/>
    <description>
    epan/dissectors/packet-assa_r3.c in the ASSA R3 dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5719.html">CVE-2013-5719</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5719">SUSE bug 839607</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5720</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720" source="CVE"/>
    <description>
    Buffer overflow in the RTPS dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5720.html">CVE-2013-5720</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5720">SUSE bug 839607</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5721</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721" source="CVE"/>
    <description>
    The dissect_mq_rr function in epan/dissectors/packet-mq.c in the MQ dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not properly determine when to enter a certain loop, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5721.html">CVE-2013-5721</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5721">SUSE bug 839607</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5722</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-5722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722" source="CVE"/>
    <description>
    Unspecified vulnerability in the LDAP dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-5722.html">CVE-2013-5722</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-5722">SUSE bug 839607</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6045</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6045" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6045" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in OpenJPEG 1.3 and earlier might allow remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6045.html">CVE-2013-6045</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6045">SUSE bug 853644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6045">SUSE bug 853838</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6045">SUSE bug 853838</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6045">SUSE bug 853838</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6045">SUSE bug 853838</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6045">SUSE bug 853838</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6045">SUSE bug 853838</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6045">SUSE bug 853838</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138729" comment="libopenjpeg1-1.5.2-3.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151376" comment="libopenjpeg1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6052</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6052" source="CVE"/>
    <description>
    OpenJPEG 1.3 and earlier allows remote attackers to obtain sensitive information via unspecified vectors that trigger a heap-based out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6052.html">CVE-2013-6052</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6052">SUSE bug 853644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6052">SUSE bug 853644</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138729" comment="libopenjpeg1-1.5.2-3.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151376" comment="libopenjpeg1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6053</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6053" source="CVE"/>
    <description>
    OpenJPEG 1.5.1 allows remote attackers to obtain sensitive information via unspecified vectors that trigger a heap-based out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6053.html">CVE-2013-6053</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6053">SUSE bug 853644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6053">SUSE bug 853644</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138729" comment="libopenjpeg1-1.5.2-3.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151376" comment="libopenjpeg1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6054</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6054" source="CVE"/>
    <description>
    Heap-based buffer overflow in OpenJPEG 1.3 has unspecified impact and remote vectors, a different vulnerability than CVE-2013-6045.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6054.html">CVE-2013-6054</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6054">SUSE bug 853644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6054">SUSE bug 853644</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138729" comment="libopenjpeg1-1.5.2-3.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151376" comment="libopenjpeg1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6336</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336" source="CVE"/>
    <description>
    The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 uses an incorrect pointer chain, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6336.html">CVE-2013-6336</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6337</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337" source="CVE"/>
    <description>
    Unspecified vulnerability in the NBAP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6337.html">CVE-2013-6337</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6337">SUSE bug 848738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6337">SUSE bug 848738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6337">SUSE bug 848738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6337">SUSE bug 848738</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6338</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338" source="CVE"/>
    <description>
    The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6338.html">CVE-2013-6338</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6339</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6339" source="CVE"/>
    <description>
    The dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6339.html">CVE-2013-6339</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6340</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340" source="CVE"/>
    <description>
    epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6340.html">CVE-2013-6340</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6369</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6369" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6369" source="CVE"/>
    <description>
    Stack-based buffer overflow in the jbg_dec_in function in libjbig/jbig.c in JBIG-KIT before 2.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6369.html">CVE-2013-6369</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6369">SUSE bug 870855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6369">SUSE bug 870855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6369">SUSE bug 870855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6369">SUSE bug 870855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6369">SUSE bug 870855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6369">SUSE bug 870855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6369">SUSE bug 870855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6369">SUSE bug 870855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6369">SUSE bug 870855</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138670" comment="libjbig2-2.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151938" comment="libjbig2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138671" comment="libjbig2-32bit-2.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151939" comment="libjbig2-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6370</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6370" source="CVE"/>
    <description>
    Buffer overflow in the printbuf APIs in json-c before 0.12 allows remote attackers to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6370.html">CVE-2013-6370</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6370">SUSE bug 870147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6370">SUSE bug 870147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6370">SUSE bug 870147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6370">SUSE bug 870147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6370">SUSE bug 870147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6370">SUSE bug 870147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6370">SUSE bug 870147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6370">SUSE bug 870147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6370">SUSE bug 870147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6370">SUSE bug 870147</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138678" comment="libjson-c2-0.12-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151940" comment="libjson-c2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138679" comment="libjson-c2-32bit-0.12-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151941" comment="libjson-c2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139082" comment="rsyslog-8.4.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151645" comment="rsyslog is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6371</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6371" source="CVE"/>
    <description>
    The hash functionality in json-c before 0.12 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6371.html">CVE-2013-6371</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6371">SUSE bug 870147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6371">SUSE bug 870147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6371">SUSE bug 870147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6371">SUSE bug 870147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6371">SUSE bug 870147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6371">SUSE bug 870147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6371">SUSE bug 870147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6371">SUSE bug 870147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6371">SUSE bug 870147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6371">SUSE bug 870147</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138678" comment="libjson-c2-0.12-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151940" comment="libjson-c2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138679" comment="libjson-c2-32bit-0.12-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151941" comment="libjson-c2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139082" comment="rsyslog-8.4.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151645" comment="rsyslog is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6393</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6393" source="CVE"/>
    <description>
    The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6393.html">CVE-2013-6393</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 911782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6393">SUSE bug 860617</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138976" comment="libyaml-0-2-0.1.6-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151942" comment="libyaml-0-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139032" comment="perl-YAML-LibYAML-0.38-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151687" comment="perl-YAML-LibYAML is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6399</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6399" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6399" source="CVE"/>
    <description>
    Array index error in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6399.html">CVE-2013-6399</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6399">SUSE bug 864814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6399">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6399">SUSE bug 864814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6399">SUSE bug 864814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6399">SUSE bug 864814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6399">SUSE bug 864814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6399">SUSE bug 864814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6399">SUSE bug 864814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6399">SUSE bug 864814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6399">SUSE bug 864814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6399">SUSE bug 864814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6399">SUSE bug 964643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6399">SUSE bug 964643</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6402</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402" source="CVE"/>
    <description>
    base/pkit.py in HP Linux Imaging and Printing (HPLIP) through 3.13.11 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/hp-pkservice.log temporary file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6402.html">CVE-2013-6402</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6402">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6402">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6402">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6402">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6402">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6402">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6402">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6402">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6402">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6402">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6402">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6402">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6402">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6402">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6402">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6402">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6402">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6402">SUSE bug 852368</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138396" comment="hplip-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151009" comment="hplip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138397" comment="hplip-hpijs-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151010" comment="hplip-hpijs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138398" comment="hplip-sane-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151011" comment="hplip-sane is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6420</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420" source="CVE"/>
    <description>
    The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6420.html">CVE-2013-6420</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6420">SUSE bug 854880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6420">SUSE bug 854880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6420">SUSE bug 854880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6420">SUSE bug 854880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6420">SUSE bug 854880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6420">SUSE bug 854880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6420">SUSE bug 854880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6420">SUSE bug 854880</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6424</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424" source="CVE"/>
    <description>
    Integer underflow in the xTrapezoidValid macro in render/picture.h in X.Org allows context-dependent attackers to cause a denial of service (crash) via a negative bottom value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6424.html">CVE-2013-6424</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6424">SUSE bug 853846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6424">SUSE bug 853846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6424">SUSE bug 853846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6424">SUSE bug 853846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6424">SUSE bug 853846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6424">SUSE bug 853846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6424">SUSE bug 853846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6424">SUSE bug 853846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6424">SUSE bug 853846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6424">SUSE bug 853846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6424">SUSE bug 853846</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139149" comment="xorg-x11-server-7.6_1.17.2-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139150" comment="xorg-x11-server-extra-7.6_1.17.2-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139151" comment="xorg-x11-server-sdk-7.6_1.17.2-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6427</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427" source="CVE"/>
    <description>
    upgrade.py in the hp-upgrade service in HP Linux Imaging and Printing (HPLIP) 3.x through 3.13.11 launches a program from an http URL, which allows man-in-the-middle attackers to execute arbitrary code by gaining control over the client-server data stream.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6427.html">CVE-2013-6427</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6427">SUSE bug 853405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6427">SUSE bug 853405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6427">SUSE bug 853405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6427">SUSE bug 852368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6427">SUSE bug 853405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6427">SUSE bug 853405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6427">SUSE bug 853405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6427">SUSE bug 853405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6427">SUSE bug 853405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6427">SUSE bug 900460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6427">SUSE bug 853405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6427">SUSE bug 933191</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138396" comment="hplip-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151009" comment="hplip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138397" comment="hplip-hpijs-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151010" comment="hplip-hpijs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138398" comment="hplip-sane-3.14.6-3.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151011" comment="hplip-sane is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6435</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6435" source="CVE"/>
    <description>
    Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6435.html">CVE-2013-6435</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6435">SUSE bug 906803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6435">SUSE bug 906803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6435">SUSE bug 906803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6435">SUSE bug 906803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6435">SUSE bug 906803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6435">SUSE bug 906803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6435">SUSE bug 906803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6435">SUSE bug 906803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6435">SUSE bug 906803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6435">SUSE bug 906803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6435">SUSE bug 906803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6435">SUSE bug 906803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6435">SUSE bug 906803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6435">SUSE bug 906803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6435">SUSE bug 908128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6435">SUSE bug 908128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6435">SUSE bug 906803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6435">SUSE bug 906803</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139077" comment="rpm-4.11.2-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151943" comment="rpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139078" comment="rpm-32bit-4.11.2-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151944" comment="rpm-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139079" comment="rpm-build-4.11.2-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151945" comment="rpm-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139080" comment="rpm-devel-4.11.2-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151946" comment="rpm-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6436</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6436" source="CVE"/>
    <description>
    The lxcDomainGetMemoryParameters method in lxc/lxc_driver.c in libvirt 1.0.5 through 1.2.0 does not properly check the status of LXC guests when reading memory tunables, which allows local users to cause a denial of service (NULL pointer dereference and libvirtd crash) via a guest in the shutdown status, as demonstrated by the "virsh memtune" command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6436.html">CVE-2013-6436</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6436">SUSE bug 854486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6436">SUSE bug 854486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6436">SUSE bug 854486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6436">SUSE bug 854486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6436">SUSE bug 854486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6436">SUSE bug 854486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6436">SUSE bug 854486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6436">SUSE bug 854486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6436">SUSE bug 854486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6436">SUSE bug 854486</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6438</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438" source="CVE"/>
    <description>
    The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6438.html">CVE-2013-6438</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6438">SUSE bug 869105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6438">SUSE bug 869105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6438">SUSE bug 869105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6438">SUSE bug 869105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6438">SUSE bug 869105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6438">SUSE bug 869105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6438">SUSE bug 887765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6438">SUSE bug 869105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6438">SUSE bug 869105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6438">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6438">SUSE bug 869105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6438">SUSE bug 869105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6438">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6438">SUSE bug 869105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6438">SUSE bug 869105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6438">SUSE bug 869105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6438">SUSE bug 869105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6438">SUSE bug 869105</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6442</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6442" source="CVE"/>
    <description>
    The owner_set function in smbcacls.c in smbcacls in Samba 4.0.x before 4.0.16 and 4.1.x before 4.1.6 removes an ACL during use of a --chown or --chgrp option, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging an unintended administrative change.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6442.html">CVE-2013-6442</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6442">SUSE bug 855866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6442">SUSE bug 855866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6442">SUSE bug 855866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6442">SUSE bug 855866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6442">SUSE bug 855866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6442">SUSE bug 855866</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6449</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6449" source="CVE"/>
    <description>
    The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6449.html">CVE-2013-6449</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6449">SUSE bug 856687</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6449">SUSE bug 856687</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6450</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450" source="CVE"/>
    <description>
    The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6450.html">CVE-2013-6450</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6450">SUSE bug 857203</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6450">SUSE bug 857203</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6450">SUSE bug 857203</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6450">SUSE bug 861384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6450">SUSE bug 857203</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6450">SUSE bug 857203</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6450">SUSE bug 986238</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6456</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6456" source="CVE"/>
    <description>
    The LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through 1.2.1 allows local users to (1) delete arbitrary host devices via the virDomainDeviceDettach API and a symlink attack on /dev in the container; (2) create arbitrary nodes (mknod) via the virDomainDeviceAttach API and a symlink attack on /dev in the container; and cause a denial of service (shutdown or reboot host OS) via the (3) virDomainShutdown or (4) virDomainReboot API and a symlink attack on /dev/initctl in the container, related to "paths under /proc/$PID/root" and the virInitctlSetRunLevel function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6456.html">CVE-2013-6456</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6456">SUSE bug 857490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6456">SUSE bug 857490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6456">SUSE bug 857490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6456">SUSE bug 857490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6456">SUSE bug 857490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6456">SUSE bug 857490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6456">SUSE bug 857490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6456">SUSE bug 868943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6456">SUSE bug 857490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6456">SUSE bug 857490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6456">SUSE bug 857490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6456">SUSE bug 857490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6456">SUSE bug 857490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6456">SUSE bug 857490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6456">SUSE bug 857490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6456">SUSE bug 857490</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6457</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6457" source="CVE"/>
    <description>
    The libxlDomainGetNumaParameters function in the libxl driver (libxl/libxl_driver.c) in libvirt before 1.2.1 does not properly initialize the nodemap, which allows local users to cause a denial of service (invalid free operation and crash) or possibly execute arbitrary code via an inactive domain to the virsh numatune command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6457.html">CVE-2013-6457</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6457">SUSE bug 858824</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6457">SUSE bug 858824</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6457">SUSE bug 858824</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6457">SUSE bug 858824</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6458</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6458" source="CVE"/>
    <description>
    Multiple race conditions in the (1) virDomainBlockStats, (2) virDomainGetBlockInf, (3) qemuDomainBlockJobImpl, and (4) virDomainGetBlockIoTune functions in libvirt before 1.2.1 do not properly verify that the disk is attached, which allows remote read-only attackers to cause a denial of service (libvirtd crash) via the virDomainDetachDeviceFlags command.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6458.html">CVE-2013-6458</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6458">SUSE bug 857492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6458">SUSE bug 857492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6458">SUSE bug 857492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6458">SUSE bug 857492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6458">SUSE bug 857492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6458">SUSE bug 857492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6458">SUSE bug 857492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6458">SUSE bug 857492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6458">SUSE bug 857492</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6462</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462" source="CVE"/>
    <description>
    Stack-based buffer overflow in the bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont 1.1 through 1.4.6 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in a character name in a BDF font file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6462.html">CVE-2013-6462</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6462">SUSE bug 854915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6462">SUSE bug 854915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6462">SUSE bug 854915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6462">SUSE bug 854915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6462">SUSE bug 854915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6462">SUSE bug 854915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6462">SUSE bug 882908</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6462">SUSE bug 882908</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6462">SUSE bug 854915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6462">SUSE bug 854915</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138510" comment="libXfont-devel-1.5.1-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151631" comment="libXfont-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138511" comment="libXfont1-1.5.1-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151632" comment="libXfont1 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6473</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6473" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the urftopdf filter in cups-filters 1.0.25 before 1.0.47 allow remote attackers to execute arbitrary code via a large (1) page or (2) line in a URF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6473.html">CVE-2013-6473</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6473">SUSE bug 866302</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6473">SUSE bug 866302</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6473">SUSE bug 866302</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138205" comment="cups-filters-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151947" comment="cups-filters is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138206" comment="cups-filters-cups-browsed-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151948" comment="cups-filters-cups-browsed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138207" comment="cups-filters-foomatic-rip-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151949" comment="cups-filters-foomatic-rip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138208" comment="cups-filters-ghostscript-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151950" comment="cups-filters-ghostscript is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6474</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474" source="CVE"/>
    <description>
    Heap-based buffer overflow in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allows remote attackers to execute arbitrary code via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6474.html">CVE-2013-6474</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6474">SUSE bug 866302</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6474">SUSE bug 866302</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6474">SUSE bug 866302</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138205" comment="cups-filters-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151947" comment="cups-filters is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138206" comment="cups-filters-cups-browsed-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151948" comment="cups-filters-cups-browsed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138207" comment="cups-filters-foomatic-rip-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151949" comment="cups-filters-foomatic-rip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138208" comment="cups-filters-ghostscript-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151950" comment="cups-filters-ghostscript is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6475</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475" source="CVE"/>
    <description>
    Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6475.html">CVE-2013-6475</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6475">SUSE bug 866302</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6475">SUSE bug 866302</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6475">SUSE bug 866302</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138205" comment="cups-filters-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151947" comment="cups-filters is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138206" comment="cups-filters-cups-browsed-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151948" comment="cups-filters-cups-browsed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138207" comment="cups-filters-foomatic-rip-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151949" comment="cups-filters-foomatic-rip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138208" comment="cups-filters-ghostscript-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151950" comment="cups-filters-ghostscript is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6476</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476" source="CVE"/>
    <description>
    The OPVPWrapper::loadDriver function in oprs/OPVPWrapper.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allows local users to gain privileges via a Trojan horse driver in the same directory as the PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6476.html">CVE-2013-6476</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6476">SUSE bug 866302</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6476">SUSE bug 866302</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6476">SUSE bug 866302</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138205" comment="cups-filters-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151947" comment="cups-filters is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138206" comment="cups-filters-cups-browsed-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151948" comment="cups-filters-cups-browsed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138207" comment="cups-filters-foomatic-rip-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151949" comment="cups-filters-foomatic-rip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138208" comment="cups-filters-ghostscript-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151950" comment="cups-filters-ghostscript is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6477</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" source="CVE"/>
    <description>
    Multiple integer signedness errors in libpurple in Pidgin before 2.10.8 allow remote attackers to cause a denial of service (application crash) via a crafted timestamp value in an XMPP message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6477.html">CVE-2013-6477</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6477">SUSE bug 861019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6477">SUSE bug 861019</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6478</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" source="CVE"/>
    <description>
    gtkimhtml.c in Pidgin before 2.10.8 does not properly interact with underlying library support for wide Pango layouts, which allows user-assisted remote attackers to cause a denial of service (application crash) via a long URL that is examined with a tooltip.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6478.html">CVE-2013-6478</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6478">SUSE bug 861019</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6479</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" source="CVE"/>
    <description>
    util.c in libpurple in Pidgin before 2.10.8 does not properly allocate memory for HTTP responses that are inconsistent with the Content-Length header, which allows remote HTTP servers to cause a denial of service (application crash) via a crafted response.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6479.html">CVE-2013-6479</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6479">SUSE bug 861019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6479">SUSE bug 861019</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6481</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" source="CVE"/>
    <description>
    libpurple/protocols/yahoo/libymsg.c in Pidgin before 2.10.8 allows remote attackers to cause a denial of service (crash) via a Yahoo! P2P message with a crafted length field, which triggers a buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6481.html">CVE-2013-6481</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6481">SUSE bug 861019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6481">SUSE bug 861019</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6482</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" source="CVE"/>
    <description>
    Pidgin before 2.10.8 allows remote MSN servers to cause a denial of service (NULL pointer dereference and crash) via a crafted (1) SOAP response, (2) OIM XML response, or (3) Content-Length header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6482.html">CVE-2013-6482</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6482">SUSE bug 861019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6482">SUSE bug 861019</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6483</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" source="CVE"/>
    <description>
    The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6483.html">CVE-2013-6483</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6483">SUSE bug 861019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6483">SUSE bug 861019</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6484</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" source="CVE"/>
    <description>
    The STUN protocol implementation in libpurple in Pidgin before 2.10.8 allows remote STUN servers to cause a denial of service (out-of-bounds write operation and application crash) by triggering a socket read error.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6484.html">CVE-2013-6484</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6484">SUSE bug 861019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6484">SUSE bug 861019</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6485</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" source="CVE"/>
    <description>
    Buffer overflow in util.c in libpurple in Pidgin before 2.10.8 allows remote HTTP servers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid chunk-size field in chunked transfer-coding data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6485.html">CVE-2013-6485</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6485">SUSE bug 861019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6485">SUSE bug 861019</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6486</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6486" source="CVE"/>
    <description>
    gtkutils.c in Pidgin before 2.10.8 on Windows allows user-assisted remote attackers to execute arbitrary programs via a message containing a file: URL that is improperly handled during construction of an explorer.exe command.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3185.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6486.html">CVE-2013-6486</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6486">SUSE bug 861019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6486">SUSE bug 861019</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6487</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" source="CVE"/>
    <description>
    Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6487.html">CVE-2013-6487</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6487">SUSE bug 861019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6487">SUSE bug 861019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6487">SUSE bug 878540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6487">SUSE bug 878540</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138629" comment="libgadu-devel-1.12.1-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151951" comment="libgadu-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138630" comment="libgadu3-1.12.1-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151952" comment="libgadu3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6497</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6497" source="CVE"/>
    <description>
    clamscan in ClamAV before 0.98.5, when using -a option, allows remote attackers to cause a denial of service (crash) as demonstrated by the jwplayer.js file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6497.html">CVE-2013-6497</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6497">SUSE bug 906077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6497">SUSE bug 906077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6497">SUSE bug 906077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6497">SUSE bug 906077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6497">SUSE bug 906077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6497">SUSE bug 906077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6497">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6497">SUSE bug 906077</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138164" comment="clamav-0.98.7-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6629</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629" source="CVE"/>
    <description>
    The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6629.html">CVE-2013-6629</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6629">SUSE bug 850430</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6629">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6629">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6629">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6629">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6630</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6630" source="CVE"/>
    <description>
    The get_dht function in jdmarker.c in libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48 and other products, does not set all elements of a certain Huffman value array during the reading of segments that follow Define Huffman Table (DHT) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6630.html">CVE-2013-6630</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6630">SUSE bug 850430</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6671</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671" source="CVE"/>
    <description>
    The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6671.html">CVE-2013-6671</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6671">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6672</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672" source="CVE"/>
    <description>
    Mozilla Firefox before 26.0 and SeaMonkey before 2.23 on Linux allow user-assisted remote attackers to read clipboard data by leveraging certain middle-click paste operations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6672.html">CVE-2013-6672</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6672">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6673</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673" source="CVE"/>
    <description>
    Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6673.html">CVE-2013-6673</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6673">SUSE bug 854370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6712</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6712" source="CVE"/>
    <description>
    The scan function in ext/date/lib/parse_iso_intervals.c in PHP through 5.5.6 does not properly restrict creation of DateInterval objects, which might allow remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted interval specification.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6712.html">CVE-2013-6712</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6712">SUSE bug 853045</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6712">SUSE bug 853045</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6712">SUSE bug 853045</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6712">SUSE bug 853045</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6712">SUSE bug 853045</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6712">SUSE bug 853045</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6712">SUSE bug 853045</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6712">SUSE bug 853045</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6887</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6887" source="CVE"/>
    <description>
    OpenJPEG 1.5.1 allows remote attackers to cause a denial of service via unspecified vectors that trigger NULL pointer dereferences, division-by-zero, and other errors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6887.html">CVE-2013-6887</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6887">SUSE bug 853644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6887">SUSE bug 853644</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138729" comment="libopenjpeg1-1.5.2-3.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151376" comment="libopenjpeg1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6954</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-6954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954" source="CVE"/>
    <description>
    The png_do_expand_palette function in libpng before 1.6.8 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via (1) a PLTE chunk of zero bytes or (2) a NULL palette, related to pngrtran.c and pngset.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-6954.html">CVE-2013-6954</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6954">SUSE bug 856522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6954">SUSE bug 856522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6954">SUSE bug 856522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6954">SUSE bug 856522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6954">SUSE bug 856522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6954">SUSE bug 873872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6954">SUSE bug 873873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6954">SUSE bug 877429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-6954">SUSE bug 877430</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138746" comment="libpng16-16-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138747" comment="libpng16-16-32bit-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151415" comment="libpng16-16-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138748" comment="libpng16-compat-devel-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138749" comment="libpng16-devel-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7073</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-7073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073" source="CVE"/>
    <description>
    The Content Editing Wizards component in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, 6.0.0 through 6.0.11, and 6.1.0 through 6.1.6 does not check permissions, which allows remote authenticated editors to read arbitrary TYPO3 table columns via unspecified parameters.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7073.html">CVE-2013-7073</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7073">SUSE bug 1082714</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133371" comment="typo3-cms-4_5-4.5.40-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151953" comment="typo3-cms-4_5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133256" comment="typo3-cms-4_7-4.7.20-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151931" comment="typo3-cms-4_7 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7098</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-7098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7098" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2013-7098.html">CVE-2013-7098</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139000" comment="openconnect-7.06-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151736" comment="openconnect is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139001" comment="openconnect-devel-7.06-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151737" comment="openconnect-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7107</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-7107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7107" source="CVE"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in cmd.cgi in Icinga 1.8.5, 1.9.4, 1.10.2, and earlier allows remote attackers to hijack the authentication of users for unspecified commands via unspecified vectors, as demonstrated by bypassing authentication requirements for CVE-2013-7106.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7107.html">CVE-2013-7107</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7107">SUSE bug 859424</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7107">SUSE bug 859424</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7107">SUSE bug 859424</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7107">SUSE bug 859424</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138985" comment="monitoring-tools-1.13.3-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151784" comment="monitoring-tools is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7108</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-7108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7108" source="CVE"/>
    <description>
    Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7108.html">CVE-2013-7108</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7108">SUSE bug 856837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7108">SUSE bug 856837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7108">SUSE bug 856837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7108">SUSE bug 856837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7108">SUSE bug 856837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7108">SUSE bug 856837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7108">SUSE bug 856837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7108">SUSE bug 856837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7108">SUSE bug 856837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7108">SUSE bug 856837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7108">SUSE bug 856837</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138985" comment="monitoring-tools-1.13.3-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151784" comment="monitoring-tools is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7112</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-7112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112" source="CVE"/>
    <description>
    The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7112.html">CVE-2013-7112</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7112">SUSE bug 856498</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7112">SUSE bug 856498</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7112">SUSE bug 856498</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7113</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-7113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113" source="CVE"/>
    <description>
    epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7113.html">CVE-2013-7113</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7113">SUSE bug 856495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7113">SUSE bug 856495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7113">SUSE bug 856495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7113">SUSE bug 856495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7113">SUSE bug 856495</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7114</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-7114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114" source="CVE"/>
    <description>
    Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service (application crash) via a long domain name in a packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7114.html">CVE-2013-7114</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7114">SUSE bug 856496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7114">SUSE bug 856496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7114">SUSE bug 856496</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7327</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-7327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7327" source="CVE"/>
    <description>
    The gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 does not check return values, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via invalid imagecrop arguments that lead to use of a NULL pointer as a return value, a different vulnerability than CVE-2013-7226.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7327.html">CVE-2013-7327</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7327">SUSE bug 864879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7327">SUSE bug 864879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7327">SUSE bug 864879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7327">SUSE bug 864879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7327">SUSE bug 864879</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7345</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-7345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7345" source="CVE"/>
    <description>
    The BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7345.html">CVE-2013-7345</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7345">SUSE bug 869906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7345">SUSE bug 869906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7345">SUSE bug 869906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7345">SUSE bug 869906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7345">SUSE bug 869906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7345">SUSE bug 869906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7345">SUSE bug 883306</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7345">SUSE bug 883306</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7345">SUSE bug 987530</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7353</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-7353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7353" source="CVE"/>
    <description>
    Integer overflow in the png_set_unknown_chunks function in libpng/pngset.c in libpng before 1.5.14beta08 allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a crafted image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7353.html">CVE-2013-7353</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7353">SUSE bug 873124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7353">SUSE bug 873124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7353">SUSE bug 873124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7353">SUSE bug 873124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7353">SUSE bug 873124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7353">SUSE bug 873124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7353">SUSE bug 873124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7353">SUSE bug 873124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7353">SUSE bug 873124</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138743" comment="libpng12-0-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151411" comment="libpng12-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138744" comment="libpng12-0-32bit-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151412" comment="libpng12-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138745" comment="libpng12-devel-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151413" comment="libpng12-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7354</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-7354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7354" source="CVE"/>
    <description>
    Multiple integer overflows in libpng before 1.5.14rc03 allow remote attackers to cause a denial of service (crash) via a crafted image to the (1) png_set_sPLT or (2) png_set_text_2 function, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7354.html">CVE-2013-7354</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7354">SUSE bug 873123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7354">SUSE bug 873123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7354">SUSE bug 873123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7354">SUSE bug 873123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7354">SUSE bug 873123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7354">SUSE bug 873123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7354">SUSE bug 873123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7354">SUSE bug 873123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7354">SUSE bug 873123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7354">SUSE bug 873123</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138743" comment="libpng12-0-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151411" comment="libpng12-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138744" comment="libpng12-0-32bit-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151412" comment="libpng12-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138745" comment="libpng12-devel-1.2.50-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151413" comment="libpng12-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7423</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-7423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7423" source="CVE"/>
    <description>
    The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7423.html">CVE-2013-7423</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7423">SUSE bug 915526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7423">SUSE bug 915526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7423">SUSE bug 915526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7423">SUSE bug 915526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7423">SUSE bug 915526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7423">SUSE bug 915526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7423">SUSE bug 915526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7423">SUSE bug 915526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7423">SUSE bug 915526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7423">SUSE bug 915526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7423">SUSE bug 915526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7423">SUSE bug 915526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7423">SUSE bug 915526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7423">SUSE bug 915526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7423">SUSE bug 915526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7423">SUSE bug 915526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7423">SUSE bug 915526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7423">SUSE bug 915526</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138343" comment="glibc-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138344" comment="glibc-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138345" comment="glibc-devel-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138346" comment="glibc-extra-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138347" comment="glibc-info-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138348" comment="glibc-locale-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138349" comment="glibc-locale-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138350" comment="nscd-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7437</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-7437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7437" source="CVE"/>
    <description>
    Multiple integer overflows in potrace 1.11 allow remote attackers to cause a denial of service (crash) via large dimensions in a BMP image, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7437.html">CVE-2013-7437</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7437">SUSE bug 924904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7437">SUSE bug 924904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7437">SUSE bug 924904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7437">SUSE bug 924904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7437">SUSE bug 924904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7437">SUSE bug 924904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7437">SUSE bug 924904</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117644" comment="libpotrace0-1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151954" comment="libpotrace0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117645" comment="potrace-1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151955" comment="potrace is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117646" comment="potrace-devel-1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151956" comment="potrace-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7446</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-7446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7446" source="CVE"/>
    <description>
    Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7446.html">CVE-2013-7446</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7446">SUSE bug 955654</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129149" comment="kernel-debug-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129150" comment="kernel-debug-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129151" comment="kernel-debug-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129152" comment="kernel-default-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129153" comment="kernel-default-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129154" comment="kernel-default-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129155" comment="kernel-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129156" comment="kernel-docs-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129157" comment="kernel-docs-html-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129158" comment="kernel-docs-pdf-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129159" comment="kernel-ec2-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129160" comment="kernel-ec2-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129161" comment="kernel-ec2-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129162" comment="kernel-macros-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129163" comment="kernel-obs-build-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129164" comment="kernel-obs-qa-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129165" comment="kernel-obs-qa-xen-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129166" comment="kernel-pae-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129167" comment="kernel-pae-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129168" comment="kernel-pae-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129169" comment="kernel-pv-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129170" comment="kernel-pv-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129171" comment="kernel-pv-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129172" comment="kernel-source-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129173" comment="kernel-source-vanilla-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129174" comment="kernel-syms-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129175" comment="kernel-vanilla-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129176" comment="kernel-vanilla-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129177" comment="kernel-xen-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129178" comment="kernel-xen-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129179" comment="kernel-xen-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7447</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-7447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7447" source="CVE"/>
    <description>
    Integer overflow in the gdk_cairo_set_source_pixbuf function in gdk/gdkcairo.c in GTK+ before 3.9.8, as used in eom, gnome-photos, eog, gambas3, thunar, pinpoint, and possibly other applications, allows remote attackers to cause a denial of service (crash) via a large image file, which triggers a large memory allocation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7447.html">CVE-2013-7447</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7447">SUSE bug 966682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7447">SUSE bug 966682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7447">SUSE bug 966682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7447">SUSE bug 966682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7447">SUSE bug 966682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7447">SUSE bug 966682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7447">SUSE bug 966682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7447">SUSE bug 966682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7447">SUSE bug 966682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7447">SUSE bug 966682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7447">SUSE bug 966682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7447">SUSE bug 966682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7447">SUSE bug 966682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7447">SUSE bug 966682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7447">SUSE bug 966682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7447">SUSE bug 966682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7447">SUSE bug 966682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7447">SUSE bug 966682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7447">SUSE bug 966682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7447">SUSE bug 966682</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124415" comment="eog-3.16.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151978" comment="eog is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124416" comment="eog-devel-3.16.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151979" comment="eog-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124417" comment="eog-lang-3.16.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151980" comment="eog-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134554" comment="gtk2-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151981" comment="gtk2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134555" comment="gtk2-branding-SLED-42.1-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151982" comment="gtk2-branding-SLED is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134556" comment="gtk2-branding-openSUSE-42.1-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151983" comment="gtk2-branding-openSUSE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134557" comment="gtk2-branding-upstream-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151984" comment="gtk2-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134558" comment="gtk2-data-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151985" comment="gtk2-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134559" comment="gtk2-devel-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151986" comment="gtk2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134560" comment="gtk2-devel-32bit-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151987" comment="gtk2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134561" comment="gtk2-engine-clearlooks-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151988" comment="gtk2-engine-clearlooks is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134562" comment="gtk2-engine-clearlooks-32bit-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151989" comment="gtk2-engine-clearlooks-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134563" comment="gtk2-engine-crux-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151990" comment="gtk2-engine-crux is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134564" comment="gtk2-engine-crux-32bit-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151991" comment="gtk2-engine-crux-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134565" comment="gtk2-engine-glide-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151992" comment="gtk2-engine-glide is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134566" comment="gtk2-engine-glide-32bit-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151993" comment="gtk2-engine-glide-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134567" comment="gtk2-engine-hcengine-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151994" comment="gtk2-engine-hcengine is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134568" comment="gtk2-engine-industrial-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151995" comment="gtk2-engine-industrial is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134569" comment="gtk2-engine-industrial-32bit-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151996" comment="gtk2-engine-industrial-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134570" comment="gtk2-engine-mist-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151997" comment="gtk2-engine-mist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134571" comment="gtk2-engine-mist-32bit-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151998" comment="gtk2-engine-mist-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134572" comment="gtk2-engine-redmond95-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151999" comment="gtk2-engine-redmond95 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134573" comment="gtk2-engine-redmond95-32bit-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152000" comment="gtk2-engine-redmond95-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134574" comment="gtk2-engine-thinice-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152001" comment="gtk2-engine-thinice is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134575" comment="gtk2-engine-thinice-32bit-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152002" comment="gtk2-engine-thinice-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134576" comment="gtk2-engines-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152003" comment="gtk2-engines is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134577" comment="gtk2-engines-devel-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152004" comment="gtk2-engines-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134578" comment="gtk2-immodule-amharic-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152005" comment="gtk2-immodule-amharic is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134579" comment="gtk2-immodule-amharic-32bit-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152006" comment="gtk2-immodule-amharic-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134580" comment="gtk2-immodule-inuktitut-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152007" comment="gtk2-immodule-inuktitut is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134581" comment="gtk2-immodule-inuktitut-32bit-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152008" comment="gtk2-immodule-inuktitut-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134582" comment="gtk2-immodule-multipress-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152009" comment="gtk2-immodule-multipress is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134583" comment="gtk2-immodule-multipress-32bit-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152010" comment="gtk2-immodule-multipress-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134584" comment="gtk2-immodule-thai-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152011" comment="gtk2-immodule-thai is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134585" comment="gtk2-immodule-thai-32bit-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152012" comment="gtk2-immodule-thai-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134586" comment="gtk2-immodule-vietnamese-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152013" comment="gtk2-immodule-vietnamese is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134587" comment="gtk2-immodule-vietnamese-32bit-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152014" comment="gtk2-immodule-vietnamese-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134588" comment="gtk2-immodule-xim-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152015" comment="gtk2-immodule-xim is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134589" comment="gtk2-immodule-xim-32bit-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152016" comment="gtk2-immodule-xim-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134590" comment="gtk2-immodules-tigrigna-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152017" comment="gtk2-immodules-tigrigna is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134591" comment="gtk2-immodules-tigrigna-32bit-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152018" comment="gtk2-immodules-tigrigna-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134592" comment="gtk2-lang-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152019" comment="gtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134593" comment="gtk2-theme-clearlooks-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152020" comment="gtk2-theme-clearlooks is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134594" comment="gtk2-theme-crux-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152021" comment="gtk2-theme-crux is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134595" comment="gtk2-theme-industrial-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152022" comment="gtk2-theme-industrial is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134596" comment="gtk2-theme-mist-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152023" comment="gtk2-theme-mist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134597" comment="gtk2-theme-redmond95-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152024" comment="gtk2-theme-redmond95 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134598" comment="gtk2-theme-thinice-2.20.2-29.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152025" comment="gtk2-theme-thinice is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134599" comment="gtk2-tools-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152026" comment="gtk2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134600" comment="gtk2-tools-32bit-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152027" comment="gtk2-tools-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134601" comment="libgtk-2_0-0-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152028" comment="libgtk-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134602" comment="libgtk-2_0-0-32bit-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152029" comment="libgtk-2_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134603" comment="typelib-1_0-Gtk-2_0-2.24.31-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152030" comment="typelib-1_0-Gtk-2_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7456</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-7456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456" source="CVE"/>
    <description>
    gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.1.1, as used in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x before 7.0.7, allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted image that is mishandled by the imagescale function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7456.html">CVE-2013-7456</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7456">SUSE bug 982009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7456">SUSE bug 982009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7456">SUSE bug 982009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7456">SUSE bug 982009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7456">SUSE bug 982009</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126792" comment="apache2-mod_php5-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129316" comment="imap-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152031" comment="imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129317" comment="imap-devel-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152032" comment="imap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129318" comment="libc-client2007e_suse-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152033" comment="libc-client2007e_suse is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126793" comment="php5-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126794" comment="php5-bcmath-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126795" comment="php5-bz2-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126796" comment="php5-calendar-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126797" comment="php5-ctype-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126798" comment="php5-curl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126799" comment="php5-dba-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126843" comment="php5-devel-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126800" comment="php5-dom-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126801" comment="php5-enchant-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126802" comment="php5-exif-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126803" comment="php5-fastcgi-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126804" comment="php5-fileinfo-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129319" comment="php5-firebird-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126805" comment="php5-fpm-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126806" comment="php5-ftp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126807" comment="php5-gd-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126808" comment="php5-gettext-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126809" comment="php5-gmp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126810" comment="php5-iconv-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129320" comment="php5-imap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126811" comment="php5-intl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126812" comment="php5-json-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126813" comment="php5-ldap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126814" comment="php5-mbstring-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126815" comment="php5-mcrypt-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129321" comment="php5-mssql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126816" comment="php5-mysql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126817" comment="php5-odbc-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126818" comment="php5-opcache-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126819" comment="php5-openssl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126820" comment="php5-pcntl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126821" comment="php5-pdo-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126822" comment="php5-pear-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126823" comment="php5-pgsql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129322" comment="php5-phar-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126824" comment="php5-posix-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126825" comment="php5-pspell-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129323" comment="php5-readline-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126826" comment="php5-shmop-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126827" comment="php5-snmp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126828" comment="php5-soap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126829" comment="php5-sockets-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126830" comment="php5-sqlite-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126831" comment="php5-suhosin-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126832" comment="php5-sysvmsg-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126833" comment="php5-sysvsem-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126834" comment="php5-sysvshm-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129324" comment="php5-tidy-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126835" comment="php5-tokenizer-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126836" comment="php5-wddx-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126837" comment="php5-xmlreader-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126838" comment="php5-xmlrpc-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126839" comment="php5-xmlwriter-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126840" comment="php5-xsl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126841" comment="php5-zip-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126842" comment="php5-zlib-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7458</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-7458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7458" source="CVE"/>
    <description>
    linenoise, as used in Redis before 3.2.3, uses world-readable permissions for .rediscli_history, which allows local users to obtain sensitive information by reading the file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7458.html">CVE-2013-7458</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7458">SUSE bug 991250</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7458">SUSE bug 991250</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7458">SUSE bug 991387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7458">SUSE bug 991250</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130871" comment="redis-3.0.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152049" comment="redis is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7459</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2013-7459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7459" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2013-7459.html">CVE-2013-7459</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1047666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1047666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1047666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1047666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1047666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1047666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1047666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1047666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1087140</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1087140</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1087140</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1087140</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1087140</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1087140</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1087140</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1087140</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2013-7459">SUSE bug 1017420</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147182" comment="python-pycrypto-2.6.1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151719" comment="python-pycrypto is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0004</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004" source="CVE"/>
    <description>
    Stack-based buffer overflow in udisks before 1.0.5 and 2.x before 2.1.3 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long mount point.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0004.html">CVE-2014-0004</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0004">SUSE bug 865854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0004">SUSE bug 865854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0004">SUSE bug 865854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0004">SUSE bug 865854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0004">SUSE bug 865854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0004">SUSE bug 865854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0004">SUSE bug 865854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0004">SUSE bug 865854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0004">SUSE bug 865854</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138899" comment="libudisks2-0-2.1.6-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152050" comment="libudisks2-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138900" comment="udisks2-2.1.6-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152051" comment="udisks2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138901" comment="udisks2-lang-2.1.6-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152052" comment="udisks2-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0011</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0011" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0011" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0011.html">CVE-2014-0011</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0011">SUSE bug 869307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0011">SUSE bug 869307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0011">SUSE bug 869307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0011">SUSE bug 869307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0011">SUSE bug 900896</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139109" comment="tigervnc-1.5.0-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152053" comment="tigervnc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139110" comment="xorg-x11-Xvnc-1.5.0-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152054" comment="xorg-x11-Xvnc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0015</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015" source="CVE"/>
    <description>
    cURL and libcurl 7.10.6 through 7.34.0, when more than one authentication method is enabled, re-uses NTLM connections, which might allow context-dependent attackers to authenticate as other users via a request.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0015.html">CVE-2014-0015</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 858673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 858673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 858673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 858673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 858673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 858673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 858673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 858673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 858673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 858673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 858673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 858673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 858673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 868627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 858673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 868627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 880252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 882520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 880252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 880252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 880252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 880252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 858673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 880252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 858673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 927556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 858673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 962983</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0015">SUSE bug 858673</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138211" comment="curl-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138212" comment="libcurl-devel-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138213" comment="libcurl4-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0017</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0017" source="CVE"/>
    <description>
    The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0017.html">CVE-2014-0017</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0017">SUSE bug 866278</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0017">SUSE bug 866286</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0017">SUSE bug 866278</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0017">SUSE bug 866278</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0017">SUSE bug 866278</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0017">SUSE bug 866278</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0017">SUSE bug 866286</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0017">SUSE bug 866278</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0017">SUSE bug 866278</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0017">SUSE bug 866278</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0017">SUSE bug 866278</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0017">SUSE bug 866278</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0017">SUSE bug 866278</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0017">SUSE bug 866286</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009114955" comment="libssh-devel-0.6.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151771" comment="libssh-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009114957" comment="libssh4-0.6.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151772" comment="libssh4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0020</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" source="CVE"/>
    <description>
    The IRC protocol plugin in libpurple in Pidgin before 2.10.8 does not validate argument counts, which allows remote IRC servers to cause a denial of service (application crash) via a crafted message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0020.html">CVE-2014-0020</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0020">SUSE bug 861019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0020">SUSE bug 861019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0020">SUSE bug 861019</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0028</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0028" source="CVE"/>
    <description>
    libvirt 1.1.1 through 1.2.0 allows context-dependent attackers to bypass the domain:getattr and connect:search_domains restrictions in ACLs and obtain sensitive domain object information via a request to the (1) virConnectDomainEventRegister and (2) virConnectDomainEventRegisterAny functions in the event registration API.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0028.html">CVE-2014-0028</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0028">SUSE bug 859051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0028">SUSE bug 859051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0028">SUSE bug 859051</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0032</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0032" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0032" source="CVE"/>
    <description>
    The get_resource function in repos.c in the mod_dav_svn module in Apache Subversion before 1.7.15 and 1.8.x before 1.8.6, when SVNListParentPath is enabled, allows remote attackers to cause a denial of service (crash) via vectors related to the server root and request methods other than GET, as demonstrated by the "svn ls http://svn.example.com" command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0032.html">CVE-2014-0032</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0032">SUSE bug 862459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0032">SUSE bug 862459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0032">SUSE bug 862459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0032">SUSE bug 862459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0032">SUSE bug 862459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0032">SUSE bug 862459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0032">SUSE bug 862459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0032">SUSE bug 862459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0032">SUSE bug 862459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0032">SUSE bug 862459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0032">SUSE bug 862459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0032">SUSE bug 862459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0032">SUSE bug 862459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0032">SUSE bug 862459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0032">SUSE bug 862459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0032">SUSE bug 862459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0032">SUSE bug 862459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0032">SUSE bug 862459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0032">SUSE bug 862459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0032">SUSE bug 862459</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0038</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0038" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0038" source="CVE"/>
    <description>
    The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0038.html">CVE-2014-0038</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0038">SUSE bug 860993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0038">SUSE bug 860993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0038">SUSE bug 860993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0038">SUSE bug 860993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0038">SUSE bug 860993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0038">SUSE bug 860993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0038">SUSE bug 860993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0038">SUSE bug 860993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0038">SUSE bug 860993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0038">SUSE bug 860993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0038">SUSE bug 860993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0038">SUSE bug 860993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0038">SUSE bug 860993</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0050</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050" source="CVE"/>
    <description>
    MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0050.html">CVE-2014-0050</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0050">SUSE bug 862781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0050">SUSE bug 862781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0050">SUSE bug 862781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0050">SUSE bug 862781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0050">SUSE bug 862781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0050">SUSE bug 862781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0050">SUSE bug 862781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0050">SUSE bug 862781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0050">SUSE bug 862781</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138409" comment="jakarta-commons-fileupload-1.1.1-1.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151905" comment="jakarta-commons-fileupload is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0060</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0060" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060" source="CVE"/>
    <description>
    PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly enforce the ADMIN OPTION restriction, which allows remote authenticated members of a role to add or remove arbitrary users to that role by calling the SET ROLE command before the associated GRANT command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0060.html">CVE-2014-0060</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0060">SUSE bug 864845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0060">SUSE bug 864856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0060">SUSE bug 864845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0060">SUSE bug 864845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0060">SUSE bug 864845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0060">SUSE bug 864856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0060">SUSE bug 864845</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0061</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061" source="CVE"/>
    <description>
    The validator functions for the procedural languages (PLs) in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to gain privileges via a function that is (1) defined in another language or (2) not allowed to be directly called by the user due to permissions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0061.html">CVE-2014-0061</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0061">SUSE bug 864846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0061">SUSE bug 864856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0061">SUSE bug 864846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0061">SUSE bug 864846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0061">SUSE bug 864846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0061">SUSE bug 864846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0061">SUSE bug 864856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0061">SUSE bug 864846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0061">SUSE bug 864846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0061">SUSE bug 864846</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0061">SUSE bug 864856</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0062</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062" source="CVE"/>
    <description>
    Race condition in the (1) CREATE INDEX and (2) unspecified ALTER TABLE commands in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allows remote authenticated users to create an unauthorized index or read portions of unauthorized tables by creating or deleting a table with the same name during the timing window.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0062.html">CVE-2014-0062</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0062">SUSE bug 864847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0062">SUSE bug 864856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0062">SUSE bug 864847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0062">SUSE bug 864847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0062">SUSE bug 864847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0062">SUSE bug 864847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0062">SUSE bug 864856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0062">SUSE bug 864847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0062">SUSE bug 864847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0062">SUSE bug 864847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0062">SUSE bug 864856</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0063</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via vectors related to an incorrect MAXDATELEN constant and datetime values involving (1) intervals, (2) timestamps, or (3) timezones, a different vulnerability than CVE-2014-0065.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0063.html">CVE-2014-0063</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0063">SUSE bug 864850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0063">SUSE bug 864856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0063">SUSE bug 864850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0063">SUSE bug 864850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0063">SUSE bug 864850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0063">SUSE bug 864850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0063">SUSE bug 864850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0063">SUSE bug 864850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0063">SUSE bug 864850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0063">SUSE bug 864856</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0064</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064" source="CVE"/>
    <description>
    Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow.  NOTE: this identifier has been SPLIT due to different affected versions; use CVE-2014-2669 for the hstore vector.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0064.html">CVE-2014-0064</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0064">SUSE bug 864851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0064">SUSE bug 864856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0064">SUSE bug 864851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0064">SUSE bug 864851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0064">SUSE bug 871307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0064">SUSE bug 864851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0064">SUSE bug 864851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0064">SUSE bug 864851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0064">SUSE bug 864851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0064">SUSE bug 864851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0064">SUSE bug 864856</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0065</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065" source="CVE"/>
    <description>
    Multiple buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, a different vulnerability than CVE-2014-0063.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0065.html">CVE-2014-0065</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0065">SUSE bug 864852</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0065">SUSE bug 864856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0065">SUSE bug 864852</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0065">SUSE bug 864852</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0065">SUSE bug 864852</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0065">SUSE bug 864852</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0065">SUSE bug 864852</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0065">SUSE bug 864852</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0065">SUSE bug 864852</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0065">SUSE bug 864856</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0066</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066" source="CVE"/>
    <description>
    The chkpass extension in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly check the return value of the crypt library function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0066.html">CVE-2014-0066</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0066">SUSE bug 864853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0066">SUSE bug 864856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0066">SUSE bug 864853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0066">SUSE bug 864853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0066">SUSE bug 864853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0066">SUSE bug 864853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0066">SUSE bug 864853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0066">SUSE bug 864853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0066">SUSE bug 864853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0066">SUSE bug 864853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0066">SUSE bug 864853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0066">SUSE bug 864856</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0067</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067" source="CVE"/>
    <description>
    The "make check" command for the test suites in PostgreSQL 9.3.3 and earlier does not properly invoke initdb to specify the authentication requirements for a database cluster to be used for the tests, which allows local users to gain privileges by leveraging access to this cluster.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0067.html">CVE-2014-0067</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0067">SUSE bug 864856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0067">SUSE bug 872783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0067">SUSE bug 872783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0067">SUSE bug 872783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0067">SUSE bug 872783</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201400691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-00691</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-00691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-00691" source="CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2014-00691.html">CVE-2014-00691</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0076</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076" source="CVE"/>
    <description>
    The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0076.html">CVE-2014-0076</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0076">SUSE bug 869945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0076">SUSE bug 869945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0076">SUSE bug 869945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0076">SUSE bug 869945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0076">SUSE bug 869945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0076">SUSE bug 869945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0076">SUSE bug 869945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0076">SUSE bug 869945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0076">SUSE bug 869945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0076">SUSE bug 869945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0076">SUSE bug 869945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0076">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0076">SUSE bug 869945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0076">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0076">SUSE bug 869945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0076">SUSE bug 883126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0076">SUSE bug 905106</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0092</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092" source="CVE"/>
    <description>
    lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0092.html">CVE-2014-0092</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0092">SUSE bug 865804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0092">SUSE bug 865804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0092">SUSE bug 865804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0092">SUSE bug 865804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0092">SUSE bug 865804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0092">SUSE bug 865804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0092">SUSE bug 865804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0092">SUSE bug 865804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0092">SUSE bug 865804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0092">SUSE bug 915878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0092">SUSE bug 915878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0092">SUSE bug 865804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0092">SUSE bug 915878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0092">SUSE bug 915878</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138369" comment="gnutls-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138370" comment="libgnutls-devel-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138371" comment="libgnutls-openssl27-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151158" comment="libgnutls-openssl27 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138372" comment="libgnutls28-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151159" comment="libgnutls28 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138373" comment="libgnutls28-32bit-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151160" comment="libgnutls28-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0098</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098" source="CVE"/>
    <description>
    The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0098.html">CVE-2014-0098</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0098">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0098">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0098">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0098">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0098">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0098">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0098">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0098">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0098">SUSE bug 887765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0098">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0098">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0098">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0098">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0098">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0098">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0098">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0098">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0098">SUSE bug 869106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0098">SUSE bug 869106</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0107</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107" source="CVE"/>
    <description>
    The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0107.html">CVE-2014-0107</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0107">SUSE bug 870082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0107">SUSE bug 870082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0107">SUSE bug 870082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0107">SUSE bug 870082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0107">SUSE bug 870082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0107">SUSE bug 870082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0107">SUSE bug 870082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0107">SUSE bug 870082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0107">SUSE bug 870082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0107">SUSE bug 870082</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139135" comment="xalan-j2-2.7.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152055" comment="xalan-j2 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0117</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117" source="CVE"/>
    <description>
    The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0117.html">CVE-2014-0117</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0117">SUSE bug 887767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0117">SUSE bug 887767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0117">SUSE bug 887767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0117">SUSE bug 887767</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0118</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118" source="CVE"/>
    <description>
    The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0118.html">CVE-2014-0118</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0118">SUSE bug 887769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0118">SUSE bug 887769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0118">SUSE bug 887769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0118">SUSE bug 887769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0118">SUSE bug 1078450</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0138</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138" source="CVE"/>
    <description>
    The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connect as other users via a request, a similar issue to CVE-2014-0015.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0138.html">CVE-2014-0138</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0138">SUSE bug 868627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0138">SUSE bug 868627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0138">SUSE bug 868627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0138">SUSE bug 868627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0138">SUSE bug 868627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0138">SUSE bug 868627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0138">SUSE bug 868627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0138">SUSE bug 868627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0138">SUSE bug 868627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0138">SUSE bug 868627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0138">SUSE bug 868627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0138">SUSE bug 868627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0138">SUSE bug 868627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0138">SUSE bug 868627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0138">SUSE bug 882520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0138">SUSE bug 880252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0138">SUSE bug 868627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0138">SUSE bug 868627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0138">SUSE bug 868627</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138211" comment="curl-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138212" comment="libcurl-devel-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138213" comment="libcurl4-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0139</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139" source="CVE"/>
    <description>
    cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls, qsossl or gskit libraries for TLS, recognize a wildcard IP address in the subject's Common Name (CN) field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0139.html">CVE-2014-0139</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0139">SUSE bug 868629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0139">SUSE bug 868629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0139">SUSE bug 868629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0139">SUSE bug 868629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0139">SUSE bug 868629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0139">SUSE bug 868629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0139">SUSE bug 868629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0139">SUSE bug 868629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0139">SUSE bug 868629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0139">SUSE bug 868629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0139">SUSE bug 868629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0139">SUSE bug 868629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0139">SUSE bug 882520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0139">SUSE bug 880252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0139">SUSE bug 868629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0139">SUSE bug 868629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0139">SUSE bug 868629</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138211" comment="curl-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138453" comment="lftp-4.6.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152056" comment="lftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138212" comment="libcurl-devel-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138213" comment="libcurl4-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0142</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142" source="CVE"/>
    <description>
    QEMU, possibly before 2.0.0, allows local users to cause a denial of service (divide-by-zero error and crash) via a zero value in the (1) tracks field to the seek_to_sector function in block/parallels.c or (2) extent_size field in the bochs function in block/bochs.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0142.html">CVE-2014-0142</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0142">SUSE bug 870439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0142">SUSE bug 871442</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0143</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143" source="CVE"/>
    <description>
    Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0143.html">CVE-2014-0143</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0143">SUSE bug 870439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0143">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0143">SUSE bug 870439</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0144</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0144.html">CVE-2014-0144</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0144">SUSE bug 870439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0144">SUSE bug 871442</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0145</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145" source="CVE"/>
    <description>
    Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) number of sectors in the DMG block driver (block/dmg.c).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0145.html">CVE-2014-0145</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0145">SUSE bug 870439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0145">SUSE bug 871442</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0146</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146" source="CVE"/>
    <description>
    The qcow2_open function in the (block/qcow2.c) in QEMU before 1.7.2 and 2.x before 2.0.0 allows local users to cause a denial of service (NULL pointer dereference) via a crafted image which causes an error, related to the initialization of the snapshot_offset and nb_snapshots fields.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0146.html">CVE-2014-0146</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0146">SUSE bug 870439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0146">SUSE bug 871442</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0147</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0147.html">CVE-2014-0147</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0147">SUSE bug 870439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0147">SUSE bug 871442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0147">SUSE bug 870439</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0150</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0150" source="CVE"/>
    <description>
    Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0150.html">CVE-2014-0150</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0150">SUSE bug 873235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0150">SUSE bug 873235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0150">SUSE bug 873235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0150">SUSE bug 873235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0150">SUSE bug 873235</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0160</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160" source="CVE"/>
    <description>
    The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0160.html">CVE-2014-0160</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0160">SUSE bug 872299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0160">SUSE bug 872299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0160">SUSE bug 872299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0160">SUSE bug 872299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0160">SUSE bug 872299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0160">SUSE bug 872299</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0172</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0172" source="CVE"/>
    <description>
    Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0172.html">CVE-2014-0172</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0172">SUSE bug 872785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0172">SUSE bug 872785</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138251" comment="elfutils-0.158-9.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138252" comment="libasm1-0.158-9.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138253" comment="libdw1-0.158-9.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138254" comment="libelf1-0.158-9.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138255" comment="libelf1-32bit-0.158-9.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152061" comment="libelf1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0178</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178" source="CVE"/>
    <description>
    Samba 3.6.6 through 3.6.23, 4.0.x before 4.0.18, and 4.1.x before 4.1.8, when a certain vfs shadow copy configuration is enabled, does not properly initialize the SRV_SNAPSHOT_ARRAY response field, which allows remote authenticated users to obtain potentially sensitive information from process memory via a (1) FSCTL_GET_SHADOW_COPY_DATA or (2) FSCTL_SRV_ENUMERATE_SNAPSHOTS request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0178.html">CVE-2014-0178</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0178">SUSE bug 872396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0178">SUSE bug 872396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0178">SUSE bug 872396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0178">SUSE bug 872396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0178">SUSE bug 872396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0178">SUSE bug 872396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0178">SUSE bug 872396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0178">SUSE bug 872396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0178">SUSE bug 872396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0178">SUSE bug 872396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0178">SUSE bug 872396</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0179</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179" source="CVE"/>
    <description>
    libvirt 0.7.5 through 1.2.x before 1.2.5 allows local users to cause a denial of service (read block and hang) via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virConnectCompareCPU or (2) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue.  NOTE: this issue was SPLIT per ADT3 due to different affected versions of some vectors. CVE-2014-5177 is used for other API methods.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0179.html">CVE-2014-0179</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0179">SUSE bug 873705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0179">SUSE bug 873705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0179">SUSE bug 873705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0179">SUSE bug 873705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0179">SUSE bug 873705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0179">SUSE bug 873705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0179">SUSE bug 873705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0179">SUSE bug 873705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0179">SUSE bug 873705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0179">SUSE bug 873705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0179">SUSE bug 873705</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0182</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0182" source="CVE"/>
    <description>
    Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted config length in a savevm image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0182.html">CVE-2014-0182</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0182">SUSE bug 874788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0182">SUSE bug 874788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0182">SUSE bug 874788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0182">SUSE bug 874788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0182">SUSE bug 874788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0182">SUSE bug 874788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0182">SUSE bug 874788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0182">SUSE bug 874788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0182">SUSE bug 964693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0182">SUSE bug 964693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0182">SUSE bug 874788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0182">SUSE bug 874788</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0185</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0185" source="CVE"/>
    <description>
    sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP before 5.4.28 and 5.5.x before 5.5.12 uses 0666 permissions for the UNIX socket, which allows local users to gain privileges via a crafted FastCGI client.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0185.html">CVE-2014-0185</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0185">SUSE bug 875826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0185">SUSE bug 875826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0185">SUSE bug 875826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0185">SUSE bug 875826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0185">SUSE bug 875826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0185">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0185">SUSE bug 875826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0185">SUSE bug 875826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0185">SUSE bug 875826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0185">SUSE bug 875826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0185">SUSE bug 875826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0185">SUSE bug 875826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0185">SUSE bug 992991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0190</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0190" source="CVE"/>
    <description>
    The GIF decoder in QtGui in Qt before 5.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via invalid width and height values in a GIF image.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0190.html">CVE-2014-0190</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0190">SUSE bug 875470</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0190">SUSE bug 875470</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0190">SUSE bug 875470</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138791" comment="libqt4-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151228" comment="libqt4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138792" comment="libqt4-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151229" comment="libqt4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138793" comment="libqt4-devel-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151230" comment="libqt4-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138794" comment="libqt4-linguist-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151231" comment="libqt4-linguist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138795" comment="libqt4-qt3support-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151232" comment="libqt4-qt3support is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138796" comment="libqt4-qt3support-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151233" comment="libqt4-qt3support-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138797" comment="libqt4-sql-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151234" comment="libqt4-sql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138798" comment="libqt4-sql-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151235" comment="libqt4-sql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138799" comment="libqt4-sql-mysql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151236" comment="libqt4-sql-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138800" comment="libqt4-sql-mysql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151237" comment="libqt4-sql-mysql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138801" comment="libqt4-sql-postgresql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151238" comment="libqt4-sql-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138802" comment="libqt4-sql-postgresql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151239" comment="libqt4-sql-postgresql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138803" comment="libqt4-sql-sqlite-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151240" comment="libqt4-sql-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138804" comment="libqt4-sql-sqlite-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151241" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138805" comment="libqt4-sql-unixODBC-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151242" comment="libqt4-sql-unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138806" comment="libqt4-sql-unixODBC-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151243" comment="libqt4-sql-unixODBC-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138807" comment="libqt4-x11-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151244" comment="libqt4-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138808" comment="libqt4-x11-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151245" comment="libqt4-x11-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0191</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0191" source="CVE"/>
    <description>
    The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0191.html">CVE-2014-0191</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 877506</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 877506</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 877506</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 877506</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 996079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 996079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 996079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 996079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 996079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 996079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 1014873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 1014873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0191">SUSE bug 876652</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138972" comment="libxml2-2-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138973" comment="libxml2-2-32bit-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138974" comment="libxml2-devel-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138975" comment="libxml2-tools-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0195</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195" source="CVE"/>
    <description>
    The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0195.html">CVE-2014-0195</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0195">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0195">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0195">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0195">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0196</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196" source="CVE"/>
    <description>
    The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO &amp; !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0196.html">CVE-2014-0196</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 875690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 875690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 875690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 875690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 875690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 875690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 871252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 875690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 877345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 875690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 875690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 877345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 875690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 875690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 875690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 875690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 875690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 875690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 876463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 876463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 879878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 875690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 875690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 875690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 875690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0196">SUSE bug 933423</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0198</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198" source="CVE"/>
    <description>
    The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0198.html">CVE-2014-0198</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0198">SUSE bug 876282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0198">SUSE bug 876282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0198">SUSE bug 876282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0198">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0198">SUSE bug 876282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0198">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0198">SUSE bug 876282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0198">SUSE bug 876282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0198">SUSE bug 876282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0198">SUSE bug 876282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0198">SUSE bug 915913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0198">SUSE bug 876282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0198">SUSE bug 876282</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0209</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) FontFileAddEntry and (2) lexAlias functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 might allow local users to gain privileges by adding a directory with a large fonts.dir or fonts.alias file to the font path, which triggers a heap-based buffer overflow, related to metadata.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0209.html">CVE-2014-0209</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0209">SUSE bug 857544</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138510" comment="libXfont-devel-1.5.1-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151631" comment="libXfont-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138511" comment="libXfont1-1.5.1-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151632" comment="libXfont1 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0210</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210" source="CVE"/>
    <description>
    Multiple buffer overflows in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs protocol reply to the (1) _fs_recv_conn_setup, (2) fs_read_open_font, (3) fs_read_query_info, (4) fs_read_extent_info, (5) fs_read_glyphs, (6) fs_read_list, or (7) fs_read_list_info function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0210.html">CVE-2014-0210</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0210">SUSE bug 857544</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138510" comment="libXfont-devel-1.5.1-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151631" comment="libXfont-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138511" comment="libXfont1-1.5.1-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151632" comment="libXfont1 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0211</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) fs_get_reply, (2) fs_alloc_glyphs, and (3) fs_read_extent_info functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs reply, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0211.html">CVE-2014-0211</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0211">SUSE bug 857544</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138510" comment="libXfont-devel-1.5.1-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151631" comment="libXfont-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138511" comment="libXfont1-1.5.1-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151632" comment="libXfont1 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0221</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221" source="CVE"/>
    <description>
    The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0221.html">CVE-2014-0221</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0221">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0221">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0221">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0221">SUSE bug 883126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0221">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0221">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0222</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222" source="CVE"/>
    <description>
    Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0222.html">CVE-2014-0222</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0222">SUSE bug 877642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0222">SUSE bug 877642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0222">SUSE bug 877642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0222">SUSE bug 877642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0222">SUSE bug 877642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0222">SUSE bug 877642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0222">SUSE bug 877642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0222">SUSE bug 877642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0222">SUSE bug 877642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0222">SUSE bug 877642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0222">SUSE bug 877642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0222">SUSE bug 877642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0222">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0222">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0222">SUSE bug 877642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0222">SUSE bug 877642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0222">SUSE bug 964925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0222">SUSE bug 964925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0222">SUSE bug 964925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0222">SUSE bug 964925</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0223</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223" source="CVE"/>
    <description>
    Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0223.html">CVE-2014-0223</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0223">SUSE bug 877645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0223">SUSE bug 877645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0223">SUSE bug 877645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0223">SUSE bug 877645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0223">SUSE bug 877645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0223">SUSE bug 877645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0223">SUSE bug 877645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0223">SUSE bug 877645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0223">SUSE bug 877645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0223">SUSE bug 877645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0223">SUSE bug 877645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0223">SUSE bug 877645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0223">SUSE bug 877645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0223">SUSE bug 877645</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0224</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224" source="CVE"/>
    <description>
    OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0224.html">CVE-2014-0224</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0224">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0224">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0224">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0224">SUSE bug 883126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0224">SUSE bug 885777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0224">SUSE bug 885777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0224">SUSE bug 892403</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0224">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0224">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0224">SUSE bug 905018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0224">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0224">SUSE bug 914447</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0224">SUSE bug 915913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0224">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0224">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0224">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0224">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0224">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0224">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0224">SUSE bug 916239</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139122" comment="virtualbox-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139123" comment="virtualbox-guest-kmp-default-5.0.6_k4.1.12_1-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139124" comment="virtualbox-guest-tools-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139125" comment="virtualbox-guest-x11-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139126" comment="virtualbox-host-kmp-default-5.0.6_k4.1.12_1-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139127" comment="virtualbox-qt-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0226</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226" source="CVE"/>
    <description>
    Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0226.html">CVE-2014-0226</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0226">SUSE bug 887765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0226">SUSE bug 887765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0226">SUSE bug 887765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0226">SUSE bug 887765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0226">SUSE bug 887765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0226">SUSE bug 887765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0226">SUSE bug 887765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0226">SUSE bug 887765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0226">SUSE bug 887765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0226">SUSE bug 887765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0226">SUSE bug 887765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0226">SUSE bug 887765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0226">SUSE bug 887765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0226">SUSE bug 887765</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0231</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231" source="CVE"/>
    <description>
    The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0231.html">CVE-2014-0231</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0231">SUSE bug 887768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0231">SUSE bug 887768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0231">SUSE bug 887768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0231">SUSE bug 887768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0231">SUSE bug 887768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0231">SUSE bug 887768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0231">SUSE bug 887768</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0237</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0237" source="CVE"/>
    <description>
    The cdf_unpack_summary_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (performance degradation) by triggering many file_printf calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0237.html">CVE-2014-0237</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0237">SUSE bug 880905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0237">SUSE bug 880905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0237">SUSE bug 880905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0237">SUSE bug 880905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0237">SUSE bug 880905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0237">SUSE bug 992991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0238</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238" source="CVE"/>
    <description>
    The cdf_read_property_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (infinite loop or out-of-bounds memory access) via a vector that (1) has zero length or (2) is too long.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0238.html">CVE-2014-0238</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0238">SUSE bug 880904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0238">SUSE bug 880904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0238">SUSE bug 880904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0238">SUSE bug 880904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0238">SUSE bug 880904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0238">SUSE bug 992991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0239</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239" source="CVE"/>
    <description>
    The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related issue to CVE-1999-0103.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0239.html">CVE-2014-0239</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0239">SUSE bug 878642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0239">SUSE bug 878642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0239">SUSE bug 878642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0239">SUSE bug 878642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0239">SUSE bug 878642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0239">SUSE bug 878642</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0244</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244" source="CVE"/>
    <description>
    The sys_recvfrom function in nmbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed UDP packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0244.html">CVE-2014-0244</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0244">SUSE bug 880962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0244">SUSE bug 880962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0244">SUSE bug 880962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0244">SUSE bug 880962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0244">SUSE bug 883758</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0244">SUSE bug 880962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0244">SUSE bug 880962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0244">SUSE bug 880962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0244">SUSE bug 880962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0244">SUSE bug 880962</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0247</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0247" source="CVE"/>
    <description>
    LibreOffice 4.2.4 executes unspecified VBA macros automatically, which has unspecified impact and attack vectors, possibly related to doc/docmacromode.cxx.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0247.html">CVE-2014-0247</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0247">SUSE bug 879996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0247">SUSE bug 879996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0247">SUSE bug 879996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0247">SUSE bug 879996</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138812" comment="libreoffice-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138813" comment="libreoffice-base-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138814" comment="libreoffice-base-drivers-mysql-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151464" comment="libreoffice-base-drivers-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138815" comment="libreoffice-branding-upstream-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138816" comment="libreoffice-calc-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138817" comment="libreoffice-calc-extensions-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138818" comment="libreoffice-draw-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138819" comment="libreoffice-filters-optional-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138820" comment="libreoffice-gnome-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138821" comment="libreoffice-icon-theme-breeze-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151471" comment="libreoffice-icon-theme-breeze is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138822" comment="libreoffice-icon-theme-galaxy-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151472" comment="libreoffice-icon-theme-galaxy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138823" comment="libreoffice-icon-theme-hicontrast-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151473" comment="libreoffice-icon-theme-hicontrast is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138824" comment="libreoffice-icon-theme-oxygen-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151474" comment="libreoffice-icon-theme-oxygen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138825" comment="libreoffice-icon-theme-sifr-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151475" comment="libreoffice-icon-theme-sifr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138826" comment="libreoffice-icon-theme-tango-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151476" comment="libreoffice-icon-theme-tango is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138827" comment="libreoffice-impress-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138828" comment="libreoffice-kde4-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151478" comment="libreoffice-kde4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138829" comment="libreoffice-l10n-cs-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138830" comment="libreoffice-l10n-da-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138831" comment="libreoffice-l10n-de-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138832" comment="libreoffice-l10n-el-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138833" comment="libreoffice-l10n-en-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138834" comment="libreoffice-l10n-es-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138835" comment="libreoffice-l10n-fr-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138836" comment="libreoffice-l10n-hu-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138837" comment="libreoffice-l10n-it-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138838" comment="libreoffice-l10n-ja-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138839" comment="libreoffice-l10n-pl-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138840" comment="libreoffice-l10n-ru-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138841" comment="libreoffice-mailmerge-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138842" comment="libreoffice-math-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138843" comment="libreoffice-pyuno-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138844" comment="libreoffice-writer-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138845" comment="libreoffice-writer-extensions-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0249</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0249" source="CVE"/>
    <description>
    The System Security Services Daemon (SSSD) 1.11.6 does not properly identify group membership when a non-POSIX group is in a group membership chain, which allows local users to bypass access restrictions via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0249.html">CVE-2014-0249</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0249">SUSE bug 880245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0249">SUSE bug 880245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0249">SUSE bug 880245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0249">SUSE bug 880245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0249">SUSE bug 880245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0249">SUSE bug 880245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0249">SUSE bug 880245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0249">SUSE bug 880245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0249">SUSE bug 880245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0249">SUSE bug 880245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0249">SUSE bug 880245</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135137" comment="libipa_hbac-devel-1.11.5.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152068" comment="libipa_hbac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135138" comment="libipa_hbac0-1.11.5.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152069" comment="libipa_hbac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135139" comment="libsss_idmap-devel-1.11.5.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152070" comment="libsss_idmap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135140" comment="libsss_idmap0-1.11.5.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151530" comment="libsss_idmap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135141" comment="libsss_nss_idmap-devel-1.11.5.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152071" comment="libsss_nss_idmap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135142" comment="libsss_nss_idmap0-1.11.5.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152072" comment="libsss_nss_idmap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135143" comment="libsss_sudo-1.11.5.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152073" comment="libsss_sudo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135144" comment="python-ipa_hbac-1.11.5.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152074" comment="python-ipa_hbac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135145" comment="python-sss_nss_idmap-1.11.5.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152075" comment="python-sss_nss_idmap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135146" comment="python-sssd-config-1.11.5.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152076" comment="python-sssd-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135147" comment="sssd-1.11.5.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151531" comment="sssd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135148" comment="sssd-32bit-1.11.5.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151532" comment="sssd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135149" comment="sssd-ad-1.11.5.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152077" comment="sssd-ad is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135150" comment="sssd-ipa-1.11.5.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152078" comment="sssd-ipa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135151" comment="sssd-krb5-1.11.5.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152079" comment="sssd-krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135152" comment="sssd-krb5-common-1.11.5.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151533" comment="sssd-krb5-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135153" comment="sssd-ldap-1.11.5.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151534" comment="sssd-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135154" comment="sssd-proxy-1.11.5.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152080" comment="sssd-proxy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135155" comment="sssd-tools-1.11.5.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152081" comment="sssd-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0250</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0250" source="CVE"/>
    <description>
    Multiple integer overflows in client/X11/xf_graphics.c in FreeRDP allow remote attackers to have an unspecified impact via the width and height to the (1) xf_Pointer_New or (2) xf_Bitmap_Decompress function, which causes an incorrect amount of memory to be allocated.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0250.html">CVE-2014-0250</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0250">SUSE bug 880317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0250">SUSE bug 880317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0250">SUSE bug 880317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0250">SUSE bug 880317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0250">SUSE bug 880317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0250">SUSE bug 880317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0250">SUSE bug 880317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0250">SUSE bug 975218</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0250">SUSE bug 880317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0250">SUSE bug 880317</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131214" comment="freerdp-1.0.2-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131215" comment="libfreerdp-1_0-1.0.2-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151910" comment="libfreerdp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131216" comment="libfreerdp-1_0-plugins-1.0.2-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151911" comment="libfreerdp-1_0-plugins is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0333</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0333" source="CVE"/>
    <description>
    The png_push_read_chunk function in pngpread.c in the progressive decoder in libpng 1.6.x through 1.6.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an IDAT chunk with a length of zero.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0333.html">CVE-2014-0333</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0333">SUSE bug 866298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0333">SUSE bug 866298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0333">SUSE bug 866298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0333">SUSE bug 866298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0333">SUSE bug 866298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0333">SUSE bug 866298</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138746" comment="libpng16-16-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138747" comment="libpng16-16-32bit-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151415" comment="libpng16-16-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138748" comment="libpng16-compat-devel-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138749" comment="libpng16-devel-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0466</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0466" source="CVE"/>
    <description>
    The fixps script in a2ps 4.14 does not use the -dSAFER option when executing gs, which allows context-dependent attackers to delete arbitrary files or execute arbitrary commands via a crafted PostScript file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0466.html">CVE-2014-0466</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0466">SUSE bug 871097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0466">SUSE bug 871097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0466">SUSE bug 871097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0466">SUSE bug 871097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0466">SUSE bug 871097</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138057" comment="a2ps-4.14-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151012" comment="a2ps is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0467</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467" source="CVE"/>
    <description>
    Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0467.html">CVE-2014-0467</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0467">SUSE bug 868115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0467">SUSE bug 868115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0467">SUSE bug 868115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0467">SUSE bug 868115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0467">SUSE bug 868115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0467">SUSE bug 868115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0467">SUSE bug 868115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0467">SUSE bug 868115</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138989" comment="mutt-1.5.24-1.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152082" comment="mutt is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0475</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475" source="CVE"/>
    <description>
    Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0475.html">CVE-2014-0475</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0475">SUSE bug 887022</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138343" comment="glibc-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138344" comment="glibc-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138345" comment="glibc-devel-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138346" comment="glibc-extra-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138347" comment="glibc-info-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138348" comment="glibc-locale-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138349" comment="glibc-locale-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138350" comment="nscd-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0591</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591" source="CVE"/>
    <description>
    The query_findclosestnsec3 function in query.c in named in ISC BIND 9.6, 9.7, and 9.8 before 9.8.6-P2 and 9.9 before 9.9.4-P2, and 9.6-ESV before 9.6-ESV-R10-P2, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a crafted DNS query to an authoritative nameserver that uses the NSEC3 signing feature.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0591.html">CVE-2014-0591</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0591">SUSE bug 858639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0591">SUSE bug 858639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0591">SUSE bug 858639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0591">SUSE bug 858639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0591">SUSE bug 858639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0591">SUSE bug 858639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0591">SUSE bug 858639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0591">SUSE bug 858639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0591">SUSE bug 858639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0591">SUSE bug 858639</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0593</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0593" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0593.html">CVE-2014-0593</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0593">SUSE bug 866966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0593">SUSE bug 866966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0593">SUSE bug 866966</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138999" comment="obs-service-set_version-0.5.3-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152083" comment="obs-service-set_version is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0791</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-0791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0791" source="CVE"/>
    <description>
    Integer overflow in the license_read_scope_list function in libfreerdp/core/license.c in FreeRDP through 1.0.2 allows remote RDP servers to cause a denial of service (application crash) or possibly have unspecified other impact via a large ScopeCount value in a Scope List in a Server License Request packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-0791.html">CVE-2014-0791</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0791">SUSE bug 857491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0791">SUSE bug 857491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0791">SUSE bug 857491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0791">SUSE bug 857491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0791">SUSE bug 857491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0791">SUSE bug 857491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0791">SUSE bug 857491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0791">SUSE bug 857491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0791">SUSE bug 975218</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0791">SUSE bug 857491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-0791">SUSE bug 857491</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131214" comment="freerdp-1.0.2-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134610" comment="freerdp-devel-1.0.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131215" comment="libfreerdp-1_0-1.0.2-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151910" comment="libfreerdp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131216" comment="libfreerdp-1_0-plugins-1.0.2-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151911" comment="libfreerdp-1_0-plugins is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1344</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1344" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1344" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.4 and 7.x before 7.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-05-21-1.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1344.html">CVE-2014-1344</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1344">SUSE bug 879607</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138661" comment="libjavascriptcoregtk-1_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138662" comment="libjavascriptcoregtk-3_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138663" comment="libwebkitgtk-1_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138664" comment="libwebkitgtk-3_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138665" comment="libwebkitgtk-devel-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138666" comment="libwebkitgtk2-lang-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138667" comment="libwebkitgtk3-lang-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138668" comment="typelib-1_0-JavaScriptCore-1_0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138669" comment="typelib-1_0-WebKit-1_0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1384</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1384" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1384.html">CVE-2014-1384</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1384">SUSE bug 892084</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138661" comment="libjavascriptcoregtk-1_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138662" comment="libjavascriptcoregtk-3_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138663" comment="libwebkitgtk-1_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138664" comment="libwebkitgtk-3_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138665" comment="libwebkitgtk-devel-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138666" comment="libwebkitgtk2-lang-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138667" comment="libwebkitgtk3-lang-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138668" comment="typelib-1_0-JavaScriptCore-1_0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138669" comment="typelib-1_0-WebKit-1_0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1385</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1385" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1385" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1385.html">CVE-2014-1385</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1385">SUSE bug 892084</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138661" comment="libjavascriptcoregtk-1_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138662" comment="libjavascriptcoregtk-3_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138663" comment="libwebkitgtk-1_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138664" comment="libwebkitgtk-3_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138665" comment="libwebkitgtk-devel-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138666" comment="libwebkitgtk2-lang-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138667" comment="libwebkitgtk3-lang-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138668" comment="typelib-1_0-JavaScriptCore-1_0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138669" comment="typelib-1_0-WebKit-1_0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1386</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1386" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1386.html">CVE-2014-1386</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1386">SUSE bug 892084</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138661" comment="libjavascriptcoregtk-1_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138662" comment="libjavascriptcoregtk-3_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138663" comment="libwebkitgtk-1_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138664" comment="libwebkitgtk-3_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138665" comment="libwebkitgtk-devel-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138666" comment="libwebkitgtk2-lang-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138667" comment="libwebkitgtk3-lang-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138668" comment="typelib-1_0-JavaScriptCore-1_0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138669" comment="typelib-1_0-WebKit-1_0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1387</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1387" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1387.html">CVE-2014-1387</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1387">SUSE bug 892084</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138661" comment="libjavascriptcoregtk-1_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138662" comment="libjavascriptcoregtk-3_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138663" comment="libwebkitgtk-1_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138664" comment="libwebkitgtk-3_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138665" comment="libwebkitgtk-devel-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138666" comment="libwebkitgtk2-lang-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138667" comment="libwebkitgtk3-lang-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138668" comment="typelib-1_0-JavaScriptCore-1_0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138669" comment="typelib-1_0-WebKit-1_0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1388</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1388" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1388.html">CVE-2014-1388</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1388">SUSE bug 892084</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138661" comment="libjavascriptcoregtk-1_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138662" comment="libjavascriptcoregtk-3_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138663" comment="libwebkitgtk-1_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138664" comment="libwebkitgtk-3_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138665" comment="libwebkitgtk-devel-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138666" comment="libwebkitgtk2-lang-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138667" comment="libwebkitgtk3-lang-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138668" comment="typelib-1_0-JavaScriptCore-1_0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138669" comment="typelib-1_0-WebKit-1_0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1389</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1389" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1389.html">CVE-2014-1389</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1389">SUSE bug 892084</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138661" comment="libjavascriptcoregtk-1_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138662" comment="libjavascriptcoregtk-3_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138663" comment="libwebkitgtk-1_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138664" comment="libwebkitgtk-3_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138665" comment="libwebkitgtk-devel-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138666" comment="libwebkitgtk2-lang-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138667" comment="libwebkitgtk3-lang-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138668" comment="typelib-1_0-JavaScriptCore-1_0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138669" comment="typelib-1_0-WebKit-1_0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1390</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1390" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1390" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1390.html">CVE-2014-1390</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1390">SUSE bug 892084</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138661" comment="libjavascriptcoregtk-1_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138662" comment="libjavascriptcoregtk-3_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138663" comment="libwebkitgtk-1_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138664" comment="libwebkitgtk-3_0-0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138665" comment="libwebkitgtk-devel-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138666" comment="libwebkitgtk2-lang-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138667" comment="libwebkitgtk3-lang-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138668" comment="typelib-1_0-JavaScriptCore-1_0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138669" comment="typelib-1_0-WebKit-1_0-2.4.9-4.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1447</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1447" source="CVE"/>
    <description>
    Race condition in the virNetServerClientStartKeepAlive function in libvirt before 1.2.1 allows remote attackers to cause a denial of service (libvirtd crash) by closing a connection before a keepalive response is sent.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1447.html">CVE-2014-1447</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1447">SUSE bug 858817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1447">SUSE bug 858817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1447">SUSE bug 858817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1447">SUSE bug 858817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1447">SUSE bug 858817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1447">SUSE bug 858817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1447">SUSE bug 858817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1447">SUSE bug 858817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1447">SUSE bug 858817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1447">SUSE bug 858817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1447">SUSE bug 858817</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1477</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1477.html">CVE-2014-1477</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1477">SUSE bug 862345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1477">SUSE bug 861847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1477">SUSE bug 862345</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1478</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1478" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the MPostWriteBarrier class in js/src/jit/MIR.h and stack alignment in js/src/jit/AsmJS.cpp in OdinMonkey, and unknown other vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1478.html">CVE-2014-1478</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1478">SUSE bug 861847</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1479</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479" source="CVE"/>
    <description>
    The System Only Wrapper (SOW) implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent certain cloning operations, which allows remote attackers to bypass intended restrictions on XUL content via vectors involving XBL content scopes.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1479.html">CVE-2014-1479</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1479">SUSE bug 862348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1479">SUSE bug 861847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1479">SUSE bug 862348</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1480</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480" source="CVE"/>
    <description>
    The file-download implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 does not properly restrict the timing of button selections, which allows remote attackers to conduct clickjacking attacks, and trigger unintended launching of a downloaded file, via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1480.html">CVE-2014-1480</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1480">SUSE bug 861847</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1481</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481" source="CVE"/>
    <description>
    Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to bypass intended restrictions on window objects by leveraging inconsistency in native getter methods across different JavaScript engines.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1481.html">CVE-2014-1481</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1481">SUSE bug 861847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1481">SUSE bug 862309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1481">SUSE bug 861847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1481">SUSE bug 862309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1481">SUSE bug 862309</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1482</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482" source="CVE"/>
    <description>
    RasterImage.cpp in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent access to discarded data, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect write operations) via crafted image data, as demonstrated by Goo Create.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1482.html">CVE-2014-1482</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1482">SUSE bug 862356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1482">SUSE bug 861847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1482">SUSE bug 862356</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1483</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483" source="CVE"/>
    <description>
    Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allow remote attackers to bypass the Same Origin Policy and obtain sensitive information by using an IFRAME element in conjunction with certain timing measurements involving the document.caretPositionFromPoint and document.elementFromPoint functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1483.html">CVE-2014-1483</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1483">SUSE bug 862360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1483">SUSE bug 861847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1483">SUSE bug 862360</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1484</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1484" source="CVE"/>
    <description>
    Mozilla Firefox before 27.0 on Android 4.2 and earlier creates system-log entries containing profile paths, which allows attackers to obtain sensitive information via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1484.html">CVE-2014-1484</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1484">SUSE bug 861847</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1485</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485" source="CVE"/>
    <description>
    The Content Security Policy (CSP) implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 operates on XSLT stylesheets according to style-src directives instead of script-src directives, which might allow remote attackers to execute arbitrary XSLT code by leveraging insufficient style-src restrictions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1485.html">CVE-2014-1485</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1485">SUSE bug 861847</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1486</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486" source="CVE"/>
    <description>
    Use-after-free vulnerability in the imgRequestProxy function in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving unspecified Content-Type values for image data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1486.html">CVE-2014-1486</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1486">SUSE bug 861847</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1487</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487" source="CVE"/>
    <description>
    The Web workers implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to bypass the Same Origin Policy and obtain sensitive authentication information via vectors involving error messages.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1487.html">CVE-2014-1487</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1487">SUSE bug 861847</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1488</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488" source="CVE"/>
    <description>
    The Web workers implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving termination of a worker process that has performed a cross-thread object-passing operation in conjunction with use of asm.js.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1488.html">CVE-2014-1488</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1488">SUSE bug 861847</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1489</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489" source="CVE"/>
    <description>
    Mozilla Firefox before 27.0 does not properly restrict access to about:home buttons by script on other pages, which allows user-assisted remote attackers to cause a denial of service (session restore) via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1489.html">CVE-2014-1489</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1489">SUSE bug 861847</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1490</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490" source="CVE"/>
    <description>
    Race condition in libssl in Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors involving a resumption handshake that triggers incorrect replacement of a session ticket.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1490.html">CVE-2014-1490</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1490">SUSE bug 861847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1490">SUSE bug 862300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1490">SUSE bug 861847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1490">SUSE bug 862300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1490">SUSE bug 862300</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138623" comment="libfreebl3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138624" comment="libsoftokn3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138625" comment="mozilla-nss-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138626" comment="mozilla-nss-certs-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138627" comment="mozilla-nss-devel-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138628" comment="mozilla-nss-tools-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1491</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1491.html">CVE-2014-1491</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1491">SUSE bug 861847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1491">SUSE bug 862289</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1491">SUSE bug 861847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1491">SUSE bug 862289</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138623" comment="libfreebl3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138624" comment="libsoftokn3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138625" comment="mozilla-nss-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138626" comment="mozilla-nss-certs-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138627" comment="mozilla-nss-devel-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138628" comment="mozilla-nss-tools-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1492</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492" source="CVE"/>
    <description>
    The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name's U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1492.html">CVE-2014-1492</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1492">SUSE bug 869827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1492">SUSE bug 869827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1492">SUSE bug 869827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1492">SUSE bug 869827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1492">SUSE bug 869827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1492">SUSE bug 869827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1492">SUSE bug 869827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1492">SUSE bug 869827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1492">SUSE bug 869827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1492">SUSE bug 869827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1492">SUSE bug 926974</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138623" comment="libfreebl3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138624" comment="libsoftokn3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138625" comment="mozilla-nss-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138626" comment="mozilla-nss-certs-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138627" comment="mozilla-nss-devel-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138628" comment="mozilla-nss-tools-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1493</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1493.html">CVE-2014-1493</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1493">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1494</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1494" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1494.html">CVE-2014-1494</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1494">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1497</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497" source="CVE"/>
    <description>
    The mozilla::WaveReader::DecodeAudioData function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process heap memory, cause a denial of service (out-of-bounds read and application crash), or possibly have unspecified other impact via a crafted WAV file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1497.html">CVE-2014-1497</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1497">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1498</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1498" source="CVE"/>
    <description>
    The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1498.html">CVE-2014-1498</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1498">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1499</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1499" source="CVE"/>
    <description>
    Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to spoof the domain name in the WebRTC (1) camera or (2) microphone permission prompt by triggering navigation at a certain time during generation of this prompt.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1499.html">CVE-2014-1499</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1499">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1500</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1500" source="CVE"/>
    <description>
    Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (resource consumption and application hang) via onbeforeunload events that trigger background JavaScript execution.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1500.html">CVE-2014-1500</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1500">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1502</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1502" source="CVE"/>
    <description>
    The (1) WebGL.compressedTexImage2D and (2) WebGL.compressedTexSubImage2D functions in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to bypass the Same Origin Policy and render content in a different domain via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1502.html">CVE-2014-1502</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1502">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1504</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1504" source="CVE"/>
    <description>
    The session-restore feature in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not consider the Content Security Policy of a data: URL, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document that is accessed after a browser restart.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1504.html">CVE-2014-1504</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1504">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1505</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505" source="CVE"/>
    <description>
    The SVG filter implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive displacement-correlation information, and possibly bypass the Same Origin Policy and read text from a different domain, via a timing attack involving feDisplacementMap elements, a related issue to CVE-2013-1693.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1505.html">CVE-2014-1505</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1505">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1508</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508" source="CVE"/>
    <description>
    The libxul.so!gfxContext::Polygon function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process memory, cause a denial of service (out-of-bounds read and application crash), or possibly bypass the Same Origin Policy via vectors involving MathML polygon rendering.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1508.html">CVE-2014-1508</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1508">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1509</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509" source="CVE"/>
    <description>
    Buffer overflow in the _cairo_truetype_index_to_ucs4 function in cairo, as used in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25, allows remote attackers to execute arbitrary code via a crafted extension that renders fonts in a PDF document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1509.html">CVE-2014-1509</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1509">SUSE bug 868603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1509">SUSE bug 869339</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1510</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510" source="CVE"/>
    <description>
    The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary JavaScript code with chrome privileges by using an IDL fragment to trigger a window.open call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1510.html">CVE-2014-1510</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1510">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1511</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511" source="CVE"/>
    <description>
    Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to bypass the popup blocker via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1511.html">CVE-2014-1511</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1511">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1512</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512" source="CVE"/>
    <description>
    Use-after-free vulnerability in the TypeObject class in the JavaScript engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary code by triggering extensive memory consumption while garbage collection is occurring, as demonstrated by improper handling of BumpChunk objects.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1512.html">CVE-2014-1512</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1512">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1513</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513" source="CVE"/>
    <description>
    TypedArrayObject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based out-of-bounds write or read) via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1513.html">CVE-2014-1513</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1513">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1514</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514" source="CVE"/>
    <description>
    vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1514.html">CVE-2014-1514</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1514">SUSE bug 868603</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1518</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1518.html">CVE-2014-1518</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1518">SUSE bug 875803</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1519</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1519" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1519.html">CVE-2014-1519</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1522</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1522" source="CVE"/>
    <description>
    The mozilla::dom::OscillatorNodeEngine::ComputeCustom function in the Web Audio subsystem in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read, memory corruption, and application crash) via crafted content.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1522.html">CVE-2014-1522</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1523</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523" source="CVE"/>
    <description>
    Heap-based buffer overflow in the read_u32 function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1523.html">CVE-2014-1523</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1523">SUSE bug 875803</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1524</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524" source="CVE"/>
    <description>
    The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1524.html">CVE-2014-1524</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1524">SUSE bug 875803</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1525</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1525" source="CVE"/>
    <description>
    The mozilla::dom::TextTrack::AddCue function in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 does not properly perform garbage collection for Text Track Manager variables, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and heap memory corruption) via a crafted VIDEO element in an HTML document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1525.html">CVE-2014-1525</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1526</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1526" source="CVE"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that is visited in the debugger, leading to unwrapping operations and calls to DOM methods on the unwrapped objects.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1526.html">CVE-2014-1526</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1528</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1528" source="CVE"/>
    <description>
    The sse2_composite_src_x888_8888 function in Pixman, as used in Cairo in Mozilla Firefox 28.0 and SeaMonkey 2.25 on Windows, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by painting on a CANVAS element.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1528.html">CVE-2014-1528</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1529</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529" source="CVE"/>
    <description>
    The Web Notification API in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to bypass intended source-component restrictions and execute arbitrary JavaScript code in a privileged context via a crafted web page for which Notification.permission is granted.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1529.html">CVE-2014-1529</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1529">SUSE bug 875803</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1530</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530" source="CVE"/>
    <description>
    The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1530.html">CVE-2014-1530</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1530">SUSE bug 875803</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1531</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsGenericHTMLElement::GetWidthHeightForImage function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving an imgLoader object that is not properly handled during an image-resize operation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1531.html">CVE-2014-1531</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1531">SUSE bug 875803</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1532</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHostResolver::ConditionallyRefreshRecord function in libxul.so in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to host resolution.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1532.html">CVE-2014-1532</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1532">SUSE bug 875803</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1533</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1533.html">CVE-2014-1533</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1533">SUSE bug 881874</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1534</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 30.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1534.html">CVE-2014-1534</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1536</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536" source="CVE"/>
    <description>
    The PropertyProvider::FindJustificationRange function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1536.html">CVE-2014-1536</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1537</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::workers::WorkerPrivateParent function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1537.html">CVE-2014-1537</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1538</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTextEditRules::CreateMozBR function in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1538.html">CVE-2014-1538</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1539</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1539" source="CVE"/>
    <description>
    Mozilla Firefox before 30.0 and Thunderbird through 24.6 on OS X do not ensure visibility of the cursor after interaction with a Flash object and a DIV element, which makes it easier for remote attackers to conduct clickjacking attacks via JavaScript code that produces a fake cursor image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1539.html">CVE-2014-1539</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1540</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1540" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEventListenerManager::CompileEventHandlerInternal function in the Event Listener Manager in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted web content.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1540.html">CVE-2014-1540</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1541</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541" source="CVE"/>
    <description>
    Use-after-free vulnerability in the RefreshDriverTimer::TickDriver function in the SMIL Animation Controller in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted web content.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1541.html">CVE-2014-1541</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1542</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1542" source="CVE"/>
    <description>
    Buffer overflow in the Speex resampler in the Web Audio subsystem in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code via vectors related to a crafted AudioBuffer channel count and sample rate.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1542.html">CVE-2014-1542</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1543</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1543" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the navigator.getGamepads function in the Gamepad API in Mozilla Firefox before 30.0 allow remote attackers to execute arbitrary code by using non-contiguous axes with a (1) physical or (2) virtual Gamepad device.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1543.html">CVE-2014-1543</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1544</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger certain improper removal of an NSSCertificate structure from a trust domain.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1544.html">CVE-2014-1544</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1544">SUSE bug 887746</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1545</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545" source="CVE"/>
    <description>
    Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via vectors involving the sprintf and console functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1545.html">CVE-2014-1545</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138987" comment="mozilla-nspr-4.10.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138988" comment="mozilla-nspr-devel-4.10.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1547</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1547.html">CVE-2014-1547</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1548</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1548.html">CVE-2014-1548</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1548">SUSE bug 887746</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1549</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1549" source="CVE"/>
    <description>
    The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via crafted audio content that is improperly handled during playback buffering.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1549.html">CVE-2014-1549</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1549">SUSE bug 887746</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1550</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1550" source="CVE"/>
    <description>
    Use-after-free vulnerability in the MediaInputPort class in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging incorrect Web Audio control-message ordering.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1550.html">CVE-2014-1550</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1550">SUSE bug 887746</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1552</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1552" source="CVE"/>
    <description>
    Mozilla Firefox before 31.0 and Thunderbird before 31.0 do not properly implement the sandbox attribute of the IFRAME element, which allows remote attackers to bypass intended restrictions on same-origin content via a crafted web site in conjunction with a redirect.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1552.html">CVE-2014-1552</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1552">SUSE bug 887746</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1553</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1553" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1553.html">CVE-2014-1553</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1553">SUSE bug 894370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1554</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1554" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 32.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1554.html">CVE-2014-1554</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1554">SUSE bug 894370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1555</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsDocLoader::OnProgress function in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allows remote attackers to execute arbitrary code via vectors that trigger a FireOnStateChange event.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1555.html">CVE-2014-1555</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1555">SUSE bug 887746</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1556</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556" source="CVE"/>
    <description>
    Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to execute arbitrary code via crafted WebGL content constructed with the Cesium JavaScript library.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1556.html">CVE-2014-1556</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1556">SUSE bug 887746</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1557</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557" source="CVE"/>
    <description>
    The ConvolveHorizontally function in Skia, as used in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, does not properly handle the discarding of image data during function execution, which allows remote attackers to execute arbitrary code by triggering prolonged image scaling, as demonstrated by scaling of a high-quality image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1557.html">CVE-2014-1557</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1557">SUSE bug 887746</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1558</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1558" source="CVE"/>
    <description>
    Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use UTF-8 character encoding in a required context, a different vulnerability than CVE-2014-1559.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1558.html">CVE-2014-1558</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1558">SUSE bug 887746</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1559</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1559" source="CVE"/>
    <description>
    Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use UTF-8 character encoding in a required context, a different vulnerability than CVE-2014-1558.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1559.html">CVE-2014-1559</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1559">SUSE bug 887746</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1560</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1560" source="CVE"/>
    <description>
    Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use ASCII character encoding in a required context.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1560.html">CVE-2014-1560</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1560">SUSE bug 887746</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1561</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1561" source="CVE"/>
    <description>
    Mozilla Firefox before 31.0 does not properly restrict use of drag-and-drop events to spoof customization events, which allows remote attackers to alter the placement of UI icons via crafted JavaScript code that is encountered during (1) page, (2) panel, or (3) toolbar customization.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1561.html">CVE-2014-1561</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1561">SUSE bug 887746</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1562</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1562.html">CVE-2014-1562</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1562">SUSE bug 894370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1563</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1563" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::DOMSVGLength::GetTearOff function in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG animation with DOM interaction that triggers incorrect cycle collection.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1563.html">CVE-2014-1563</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1563">SUSE bug 894370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1564</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1564" source="CVE"/>
    <description>
    Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 do not properly initialize memory for GIF rendering, which allows remote attackers to obtain sensitive information from process memory via crafted web script that interacts with a CANVAS element associated with a malformed GIF image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1564.html">CVE-2014-1564</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1564">SUSE bug 894370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1565</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1565" source="CVE"/>
    <description>
    The mozilla::dom::AudioEventTimeline function in the Web Audio API implementation in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 does not properly create audio timelines, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via crafted API calls.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1565.html">CVE-2014-1565</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1565">SUSE bug 894370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1567</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567" source="CVE"/>
    <description>
    Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1567.html">CVE-2014-1567</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1567">SUSE bug 894370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1568</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1568.html">CVE-2014-1568</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1568">SUSE bug 897890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1568">SUSE bug 897890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1568">SUSE bug 897890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1568">SUSE bug 897890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1568">SUSE bug 897890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1568">SUSE bug 897890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1568">SUSE bug 897890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1568">SUSE bug 897890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1568">SUSE bug 897890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1568">SUSE bug 897890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1568">SUSE bug 897890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1568">SUSE bug 897890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1568">SUSE bug 897890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1568">SUSE bug 897890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1568">SUSE bug 897890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1568">SUSE bug 897890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1568">SUSE bug 897890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1568">SUSE bug 897890</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138623" comment="libfreebl3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138624" comment="libsoftokn3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138625" comment="mozilla-nss-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138626" comment="mozilla-nss-certs-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138627" comment="mozilla-nss-devel-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138628" comment="mozilla-nss-tools-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1569</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569" source="CVE"/>
    <description>
    The definite_length_decoder function in lib/util/quickder.c in Mozilla Network Security Services (NSS) before 3.16.2.4 and 3.17.x before 3.17.3 does not ensure that the DER encoding of an ASN.1 length is properly formed, which allows remote attackers to conduct data-smuggling attacks by using a long byte sequence for an encoding, as demonstrated by the SEC_QuickDERDecodeItem function's improper handling of an arbitrary-length encoding of 0x00.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1569.html">CVE-2014-1569</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1569">SUSE bug 910647</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1569">SUSE bug 910647</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1569">SUSE bug 910647</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1569">SUSE bug 910647</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1569">SUSE bug 910647</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1569">SUSE bug 910647</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1569">SUSE bug 910647</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1569">SUSE bug 910647</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1569">SUSE bug 913096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1569">SUSE bug 910647</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1569">SUSE bug 910647</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1569">SUSE bug 910647</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1569">SUSE bug 910647</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1569">SUSE bug 917597</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138623" comment="libfreebl3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138624" comment="libsoftokn3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138625" comment="mozilla-nss-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138626" comment="mozilla-nss-certs-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138627" comment="mozilla-nss-devel-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138628" comment="mozilla-nss-tools-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1574</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1574.html">CVE-2014-1574</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1574">SUSE bug 900941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1574">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1575</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to improper interaction between threading and garbage collection in the GCRuntime::triggerGC function in js/src/jsgc.cpp, and unknown other vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1575.html">CVE-2014-1575</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1575">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1576</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1576.html">CVE-2014-1576</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1576">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1577</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" source="CVE"/>
    <description>
    The mozilla::dom::OscillatorNodeEngine::ComputeCustom function in the Web Audio subsystem in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read, memory corruption, and application crash) via an invalid custom waveform that triggers a calculation of a negative frequency value.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1577.html">CVE-2014-1577</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1577">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1578</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" source="CVE"/>
    <description>
    The get_tile function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly execute arbitrary code via WebM frames with invalid tile sizes that are improperly handled in buffering operations during video playback.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1578.html">CVE-2014-1578</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1578">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1580</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1580" source="CVE"/>
    <description>
    Mozilla Firefox before 33.0 does not properly initialize memory for GIF images, which allows remote attackers to obtain sensitive information from process memory via a crafted web page that triggers a sequence of rendering operations for truncated GIF data within a CANVAS element.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1580.html">CVE-2014-1580</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1580">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1581</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" source="CVE"/>
    <description>
    Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1581.html">CVE-2014-1581</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1581">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1582</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1582" source="CVE"/>
    <description>
    The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 does not properly consider the connection-coalescing behavior of SPDY and HTTP/2 in the case of a shared IP address, which allows man-in-the-middle attackers to bypass an intended pinning configuration and spoof a web site by providing a valid certificate from an arbitrary recognized Certification Authority.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1582.html">CVE-2014-1582</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1582">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1583</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" source="CVE"/>
    <description>
    The Alarm API in Mozilla Firefox before 33.0 and Firefox ESR 31.x before 31.2 does not properly restrict toJSON calls, which allows remote attackers to bypass the Same Origin Policy via crafted API calls that access sensitive information within the JSON data of an alarm.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1583.html">CVE-2014-1583</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1583">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1584</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1584" source="CVE"/>
    <description>
    The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 skips pinning checks upon an unspecified issuer-verification error, which makes it easier for remote attackers to bypass an intended pinning configuration and spoof a web site via a crafted certificate that leads to presentation of the Untrusted Connection dialog to the user.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1584.html">CVE-2014-1584</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1584">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1585</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585" source="CVE"/>
    <description>
    The WebRTC video-sharing feature in dom/media/MediaManager.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 does not properly recognize Stop Sharing actions for videos in IFRAME elements, which allows remote attackers to obtain sensitive information from the local camera by maintaining a session after the user tries to discontinue streaming.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1585.html">CVE-2014-1585</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1585">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1586</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586" source="CVE"/>
    <description>
    content/base/src/nsDocument.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 does not consider whether WebRTC video sharing is occurring, which allows remote attackers to obtain sensitive information from the local camera in certain IFRAME situations by maintaining a session after the user temporarily navigates away.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1586.html">CVE-2014-1586</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1586">SUSE bug 900941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1587</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1587.html">CVE-2014-1587</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1587">SUSE bug 908009</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1588</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1588.html">CVE-2014-1588</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1588">SUSE bug 908009</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1589</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589" source="CVE"/>
    <description>
    Mozilla Firefox before 34.0 and SeaMonkey before 2.31 provide stylesheets with an incorrect primary namespace, which allows remote attackers to bypass intended access restrictions via an XBL binding.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1589.html">CVE-2014-1589</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1589">SUSE bug 908009</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1590</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" source="CVE"/>
    <description>
    The XMLHttpRequest.prototype.send method in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to cause a denial of service (application crash) via a crafted JavaScript object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1590.html">CVE-2014-1590</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1590">SUSE bug 908009</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1591</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591" source="CVE"/>
    <description>
    Mozilla Firefox 33.0 and SeaMonkey before 2.31 include path strings in CSP violation reports, which allows remote attackers to obtain sensitive information via a web site that receives a report after a redirect.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1591.html">CVE-2014-1591</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1591">SUSE bug 908009</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1592</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHtml5TreeOperation function in xul.dll in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code by adding a second root element to an HTML5 document during parsing.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1592.html">CVE-2014-1592</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1592">SUSE bug 908009</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1593</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" source="CVE"/>
    <description>
    Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1593.html">CVE-2014-1593</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1593">SUSE bug 908009</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1594</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" source="CVE"/>
    <description>
    Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 might allow remote attackers to execute arbitrary code by leveraging an incorrect cast from the BasicThebesLayer data type to the BasicContainerLayer data type.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1594.html">CVE-2014-1594</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1594">SUSE bug 908009</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1748</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1748" source="CVE"/>
    <description>
    The ScrollView::paint function in platform/scroll/ScrollView.cpp in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to spoof the UI by extending scrollbar painting into the parent frame.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1748.html">CVE-2014-1748</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1748">SUSE bug 909707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1748">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1829</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1829" source="CVE"/>
    <description>
    Requests (aka python-requests) before 2.3.0 allows remote servers to obtain a netrc password by reading the Authorization header in a redirected request.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1829.html">CVE-2014-1829</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1829">SUSE bug 897658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1829">SUSE bug 897658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1829">SUSE bug 897658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1829">SUSE bug 897658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1829">SUSE bug 897658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1829">SUSE bug 897658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1829">SUSE bug 897658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1829">SUSE bug 897658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1829">SUSE bug 897658</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139059" comment="python3-requests-2.7.0-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152097" comment="python3-requests is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1830</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1830" source="CVE"/>
    <description>
    Requests (aka python-requests) before 2.3.0 allows remote servers to obtain sensitive information by reading the Proxy-Authorization header in a redirected request.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1830.html">CVE-2014-1830</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1830">SUSE bug 897658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1830">SUSE bug 897658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1830">SUSE bug 897658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1830">SUSE bug 897658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1830">SUSE bug 897658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1830">SUSE bug 897658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1830">SUSE bug 897658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1830">SUSE bug 897658</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1830">SUSE bug 897658</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139059" comment="python3-requests-2.7.0-2.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152097" comment="python3-requests is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1875</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1875" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1875" source="CVE"/>
    <description>
    The Capture::Tiny module before 0.24 for Perl allows local users to write to arbitrary files via a symlink attack on a temporary file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1875.html">CVE-2014-1875</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1875">SUSE bug 862743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1875">SUSE bug 862743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1875">SUSE bug 862743</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139027" comment="perl-Capture-Tiny-0.23-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152098" comment="perl-Capture-Tiny is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1909</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1909" source="CVE"/>
    <description>
    Integer signedness error in system/core/adb/adb_client.c in Android Debug Bridge (ADB) for Android 4.4 in the Android SDK Platform Tools 18.0.1 allows ADB servers to execute arbitrary code via a negative length value, which bypasses a signed comparison and triggers a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1909.html">CVE-2014-1909</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1909">SUSE bug 863074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1909">SUSE bug 863074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1909">SUSE bug 863074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1909">SUSE bug 863074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1909">SUSE bug 863074</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138068" comment="android-tools-5.1.1_r8-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152099" comment="android-tools is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1912</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1912" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1912" source="CVE"/>
    <description>
    Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1912.html">CVE-2014-1912</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 882915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 882915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 882915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 882915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 882915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 882915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 882915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 882915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 882915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 882915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 882915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 863741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 1049392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 1049422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 1049392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1912">SUSE bug 1049422</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138784" comment="libpython2_7-1_0-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138785" comment="libpython2_7-1_0-32bit-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138786" comment="python-base-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138787" comment="python-devel-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138788" comment="python-xml-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1943</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1943" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1943" source="CVE"/>
    <description>
    Fine Free file before 5.17 allows context-dependent attackers to cause a denial of service (infinite recursion, CPU consumption, and crash) via a crafted indirect offset value in the magic of a file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1943.html">CVE-2014-1943</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1943">SUSE bug 864343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1943">SUSE bug 864343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1943">SUSE bug 864589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1943">SUSE bug 864589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1943">SUSE bug 864589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1943">SUSE bug 864589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1943">SUSE bug 883306</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1943">SUSE bug 883306</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1943">SUSE bug 864589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1943">SUSE bug 864589</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1959</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-1959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1959" source="CVE"/>
    <description>
    lib/x509/verify.c in GnuTLS before 3.1.21 and 3.2.x before 3.2.11 treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-1959.html">CVE-2014-1959</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1959">SUSE bug 863989</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1959">SUSE bug 863989</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1959">SUSE bug 863989</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-1959">SUSE bug 865993</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138369" comment="gnutls-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138370" comment="libgnutls-devel-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138371" comment="libgnutls-openssl27-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151158" comment="libgnutls-openssl27 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138372" comment="libgnutls28-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151159" comment="libgnutls28 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138373" comment="libgnutls28-32bit-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151160" comment="libgnutls28-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2240</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240" source="CVE"/>
    <description>
    Stack-based buffer overflow in the cf2_hintmap_build function in cff/cf2hints.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number of stem hints in a font file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2240.html">CVE-2014-2240</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2240">SUSE bug 867620</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2240">SUSE bug 867620</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2240">SUSE bug 867620</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2240">SUSE bug 867620</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2240">SUSE bug 867620</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2240">SUSE bug 867620</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2240">SUSE bug 916867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2240">SUSE bug 916867</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2241</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2241" source="CVE"/>
    <description>
    The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2241.html">CVE-2014-2241</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2241">SUSE bug 867620</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2241">SUSE bug 867620</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2241">SUSE bug 867620</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2241">SUSE bug 867620</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2241">SUSE bug 867620</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2241">SUSE bug 867620</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2270</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2270" source="CVE"/>
    <description>
    softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2270.html">CVE-2014-2270</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2270">SUSE bug 866750</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2270">SUSE bug 866750</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2270">SUSE bug 866750</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2270">SUSE bug 866750</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2270">SUSE bug 866750</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2270">SUSE bug 866750</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2270">SUSE bug 866750</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2270">SUSE bug 866750</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2270">SUSE bug 866750</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2270">SUSE bug 866750</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2270">SUSE bug 866750</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2270">SUSE bug 866750</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2270">SUSE bug 883306</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2270">SUSE bug 883306</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2270">SUSE bug 866750</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2281</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281" source="CVE"/>
    <description>
    The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2281.html">CVE-2014-2281</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2281">SUSE bug 867485</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2282</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2282" source="CVE"/>
    <description>
    The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua.c in the M3UA dissector in Wireshark 1.10.x before 1.10.6 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted SS7 MTP3 packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2282.html">CVE-2014-2282</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2282">SUSE bug 867485</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2283</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283" source="CVE"/>
    <description>
    epan/dissectors/packet-rlc in the RLC dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 uses inconsistent memory-management approaches, which allows remote attackers to cause a denial of service (use-after-free error and application crash) via a crafted UMTS Radio Link Control packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2283.html">CVE-2014-2283</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2283">SUSE bug 867485</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2284</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2284" source="CVE"/>
    <description>
    The Linux implementation of the ICMP-MIB in Net-SNMP 5.5 before 5.5.2.1, 5.6.x before 5.6.2.1, and 5.7.x before 5.7.2.1 does not properly validate input, which allows remote attackers to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2284.html">CVE-2014-2284</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2284">SUSE bug 866942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2284">SUSE bug 866942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2284">SUSE bug 866942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2284">SUSE bug 866942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2284">SUSE bug 866942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2284">SUSE bug 866942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2284">SUSE bug 866942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2284">SUSE bug 866942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2284">SUSE bug 875217</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2284">SUSE bug 875217</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2284">SUSE bug 875217</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2284">SUSE bug 866942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2284">SUSE bug 875217</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2284">SUSE bug 866942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2284">SUSE bug 875217</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2284">SUSE bug 866942</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138857" comment="libsnmp30-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151706" comment="libsnmp30 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138858" comment="libsnmp30-32bit-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151707" comment="libsnmp30-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138859" comment="net-snmp-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151708" comment="net-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138860" comment="net-snmp-devel-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151709" comment="net-snmp-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138861" comment="perl-SNMP-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151710" comment="perl-SNMP is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138862" comment="snmp-mibs-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151711" comment="snmp-mibs is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2285</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2285" source="CVE"/>
    <description>
    The perl_trapd_handler function in perl/TrapReceiver/TrapReceiver.xs in Net-SNMP 5.7.3.pre3 and earlier, when using certain Perl versions, allows remote attackers to cause a denial of service (snmptrapd crash) via an empty community string in an SNMP trap, which triggers a NULL pointer dereference within the newSVpv function in Perl.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2285.html">CVE-2014-2285</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2285">SUSE bug 866942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2285">SUSE bug 866942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2285">SUSE bug 866942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2285">SUSE bug 875217</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2285">SUSE bug 875217</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2285">SUSE bug 875217</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2285">SUSE bug 866942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2285">SUSE bug 875217</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2285">SUSE bug 866942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2285">SUSE bug 875217</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2285">SUSE bug 866942</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138857" comment="libsnmp30-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151706" comment="libsnmp30 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138858" comment="libsnmp30-32bit-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151707" comment="libsnmp30-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138859" comment="net-snmp-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151708" comment="net-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138860" comment="net-snmp-devel-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151709" comment="net-snmp-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138861" comment="perl-SNMP-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151710" comment="perl-SNMP is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138862" comment="snmp-mibs-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151711" comment="snmp-mibs is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2299</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2299" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299" source="CVE"/>
    <description>
    Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2299.html">CVE-2014-2299</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2299">SUSE bug 867485</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2386</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2386" source="CVE"/>
    <description>
    Multiple off-by-one errors in Icinga, possibly 1.10.2 and earlier, allow remote attackers to cause a denial of service (crash) via unspecified vectors to the (1) display_nav_table, (2) print_export_link, (3) page_num_selector, or (4) page_limit_selector function in cgi/cgiutils.c or (5) status_page_num_selector function in cgi/status.c, which triggers a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2386.html">CVE-2014-2386</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2386">SUSE bug 868426</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2386">SUSE bug 868426</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2386">SUSE bug 868426</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2386">SUSE bug 868426</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138985" comment="monitoring-tools-1.13.3-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151784" comment="monitoring-tools is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2494</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2494" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to ENARC.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2494.html">CVE-2014-2494</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2494">SUSE bug 887580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2494">SUSE bug 915914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2494">SUSE bug 915914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2494">SUSE bug 915914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2494">SUSE bug 915914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2494">SUSE bug 915914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2494">SUSE bug 915914</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2497</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497" source="CVE"/>
    <description>
    The gdImageCreateFromXpm function in gdxpm.c in libgd, as used in PHP 5.4.26 and earlier, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted color table in an XPM file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2497.html">CVE-2014-2497</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2497">SUSE bug 868624</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138296" comment="gd-2.1.0-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138297" comment="gd-32bit-2.1.0-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152101" comment="gd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2524</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2524" source="CVE"/>
    <description>
    The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2524.html">CVE-2014-2524</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2524">SUSE bug 868822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2524">SUSE bug 868822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2524">SUSE bug 868822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2524">SUSE bug 868822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2524">SUSE bug 868822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2524">SUSE bug 868822</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138140" comment="bash-4.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152102" comment="bash is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138141" comment="bash-doc-4.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152103" comment="bash-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138142" comment="bash-lang-4.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152104" comment="bash-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138195" comment="crash-kmp-default-7.1.3_k4.1.12_1-4.14 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152105" comment="crash-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138196" comment="crash-kmp-xen-7.1.3_k4.1.12_1-4.14 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152106" comment="crash-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138143" comment="libreadline6-6.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152107" comment="libreadline6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138144" comment="readline-devel-6.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152108" comment="readline-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138145" comment="readline-doc-6.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152109" comment="readline-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2525</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2525" source="CVE"/>
    <description>
    Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2525.html">CVE-2014-2525</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2525">SUSE bug 868944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2525">SUSE bug 868944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2525">SUSE bug 868944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2525">SUSE bug 868944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2525">SUSE bug 868944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2525">SUSE bug 868944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2525">SUSE bug 868944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2525">SUSE bug 868944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2525">SUSE bug 911782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2525">SUSE bug 868944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2525">SUSE bug 868944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2525">SUSE bug 868944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2525">SUSE bug 868944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2525">SUSE bug 868944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2525">SUSE bug 868944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2525">SUSE bug 868944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2525">SUSE bug 868944</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138976" comment="libyaml-0-2-0.1.6-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151942" comment="libyaml-0-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139032" comment="perl-YAML-LibYAML-0.38-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151687" comment="perl-YAML-LibYAML is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2583</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2583" source="CVE"/>
    <description>
    Multiple directory traversal vulnerabilities in pam_timestamp.c in the pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create arbitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAM_RUSER value to the get_ruser function or (2) PAM_TTY value to the check_tty function, which is used by the format_timestamp_name function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2583.html">CVE-2014-2583</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2583">SUSE bug 870433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2583">SUSE bug 870433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2583">SUSE bug 870433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2583">SUSE bug 870433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2583">SUSE bug 870433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2583">SUSE bug 870433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2583">SUSE bug 870433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2583">SUSE bug 870433</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139013" comment="pam-1.1.8-12.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151504" comment="pam is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139014" comment="pam-32bit-1.1.8-12.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151505" comment="pam-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139015" comment="pam-devel-1.1.8-12.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151506" comment="pam-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2653</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653" source="CVE"/>
    <description>
    The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2653.html">CVE-2014-2653</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 870532</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 870532</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 870532</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 870532</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 870532</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 870532</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 870532</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 870532</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 870532</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 870532</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2653">SUSE bug 1074631</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139006" comment="openssh-6.6p1-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139007" comment="openssh-helpers-6.6p1-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152111" comment="openssh-helpers is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2667</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2667" source="CVE"/>
    <description>
    Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2667.html">CVE-2014-2667</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2667">SUSE bug 871152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2667">SUSE bug 871152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2667">SUSE bug 871152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2667">SUSE bug 871152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2667">SUSE bug 871152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2667">SUSE bug 871152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2667">SUSE bug 871152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2667">SUSE bug 871152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2667">SUSE bug 871152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2667">SUSE bug 871152</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138789" comment="libpython3_4m1_0-3.4.1-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151646" comment="libpython3_4m1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138790" comment="python3-base-3.4.1-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2707</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2707" source="CVE"/>
    <description>
    cups-browsed in cups-filters 1.0.41 before 1.0.51 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the (1) model or (2) PDL, related to "System V interface scripts generated for queues."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2707.html">CVE-2014-2707</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 871327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 871327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 871327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 871327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 871327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 871327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 871327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 871327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 871327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 871327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 883543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 871327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 883543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 883543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 871327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 883543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 871327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 937018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2707">SUSE bug 921753</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138205" comment="cups-filters-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151947" comment="cups-filters is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138206" comment="cups-filters-cups-browsed-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151948" comment="cups-filters-cups-browsed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138207" comment="cups-filters-foomatic-rip-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151949" comment="cups-filters-foomatic-rip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138208" comment="cups-filters-ghostscript-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151950" comment="cups-filters-ghostscript is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2855</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2855" source="CVE"/>
    <description>
    The check_secret function in authenticate.c in rsync 3.1.0 and earlier allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a user name which does not exist in the secrets file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2855.html">CVE-2014-2855</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2855">SUSE bug 873740</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2855">SUSE bug 873740</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2855">SUSE bug 873740</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2855">SUSE bug 873740</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2855">SUSE bug 873740</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139081" comment="rsync-3.1.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151567" comment="rsync is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2856</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2856" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2856" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in scheduler/client.c in Common Unix Printing System (CUPS) before 1.7.2 allows remote attackers to inject arbitrary web script or HTML via the URL path, related to the is_path_absolute function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2856.html">CVE-2014-2856</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2856">SUSE bug 873899</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2856">SUSE bug 873899</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2856">SUSE bug 873899</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138200" comment="cups-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138201" comment="cups-client-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138202" comment="cups-devel-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138203" comment="cups-libs-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151187" comment="cups-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138204" comment="cups-libs-32bit-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151188" comment="cups-libs-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2892</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2892" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2892" source="CVE"/>
    <description>
    Heap-based buffer overflow in the get_answer function in mmsh.c in libmms before 0.6.4 allows remote attackers to execute arbitrary code via a long line in an MMS over HTTP (MMSH) server response.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2892.html">CVE-2014-2892</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2892">SUSE bug 874723</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2892">SUSE bug 874723</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2892">SUSE bug 874723</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138697" comment="libmms-devel-0.6.4-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152112" comment="libmms-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138698" comment="libmms0-0.6.4-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152113" comment="libmms0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2907</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2907" source="CVE"/>
    <description>
    The srtp_add_address function in epan/dissectors/packet-rtp.c in the RTP dissector in Wireshark 1.10.x before 1.10.7 does not properly update SRTP conversation data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2907.html">CVE-2014-2907</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2907">SUSE bug 874693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2907">SUSE bug 874760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2907">SUSE bug 874760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2907">SUSE bug 874760</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2977</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2977" source="CVE"/>
    <description>
    Multiple integer signedness errors in the Dispatch_Write function in proxy/dispatcher/idirectfbsurface_dispatcher.c in DirectFB 1.4.13 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the Voodoo interface, which triggers a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2977.html">CVE-2014-2977</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2977">SUSE bug 878345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2977">SUSE bug 878345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2977">SUSE bug 878345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2977">SUSE bug 878345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2977">SUSE bug 878345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2977">SUSE bug 878345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2977">SUSE bug 878345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2977">SUSE bug 878345</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109243" comment="libdirectfb-1_7-1-1.7.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152114" comment="libdirectfb-1_7-1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2978</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-2978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2978" source="CVE"/>
    <description>
    The Dispatch_Write function in proxy/dispatcher/idirectfbsurface_dispatcher.c in DirectFB 1.4.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the Voodoo interface, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-2978.html">CVE-2014-2978</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2978">SUSE bug 878349</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2978">SUSE bug 878349</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2978">SUSE bug 878349</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2978">SUSE bug 878349</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2978">SUSE bug 878349</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2978">SUSE bug 878349</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2978">SUSE bug 878349</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-2978">SUSE bug 878349</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109243" comment="libdirectfb-1_7-1-1.7.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152114" comment="libdirectfb-1_7-1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3121</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3121" source="CVE"/>
    <description>
    rxvt-unicode before 9.20 does not properly handle OSC escape sequences, which allows user-assisted remote attackers to manipulate arbitrary X window properties and execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3121.html">CVE-2014-3121</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3121">SUSE bug 876101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3121">SUSE bug 876101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3121">SUSE bug 876101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3121">SUSE bug 876101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3121">SUSE bug 876101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3121">SUSE bug 876101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3121">SUSE bug 876101</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139086" comment="rxvt-unicode-9.21-4.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151120" comment="rxvt-unicode is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3124</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3124" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124" source="CVE"/>
    <description>
    The HVMOP_set_mem_type control in Xen 4.1 through 4.4.x allows local guest HVM administrators to cause a denial of service (hypervisor crash) or possibly execute arbitrary code by leveraging a separate qemu-dm vulnerability to trigger invalid page table translations for unspecified memory page types.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3124.html">CVE-2014-3124</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3124">SUSE bug 875668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3124">SUSE bug 875668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3124">SUSE bug 875668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3124">SUSE bug 880751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3124">SUSE bug 903970</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3158</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158" source="CVE"/>
    <description>
    Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3158.html">CVE-2014-3158</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3158">SUSE bug 891489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3158">SUSE bug 891489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3158">SUSE bug 891489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3158">SUSE bug 891489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3158">SUSE bug 891489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3158">SUSE bug 891489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3158">SUSE bug 891489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3158">SUSE bug 891489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3158">SUSE bug 969773</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139036" comment="ppp-2.4.7-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152115" comment="ppp is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3230</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3230" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3230" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3230.html">CVE-2014-3230</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3230">SUSE bug 876862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3230">SUSE bug 876862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3230">SUSE bug 876862</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139030" comment="perl-LWP-Protocol-https-6.04-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152116" comment="perl-LWP-Protocol-https is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3421</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3421" source="CVE"/>
    <description>
    lisp/gnus/gnus-fun.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gnus.face.ppm temporary file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3421.html">CVE-2014-3421</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3421">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3421">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3421">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3421">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3421">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3421">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3421">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3421">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3421">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3421">SUSE bug 876847</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138256" comment="emacs-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151668" comment="emacs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138257" comment="emacs-info-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151669" comment="emacs-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138258" comment="emacs-nox-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151670" comment="emacs-nox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138259" comment="emacs-x11-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151671" comment="emacs-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138260" comment="etags-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151672" comment="etags is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3422</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3422" source="CVE"/>
    <description>
    lisp/emacs-lisp/find-gc.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file under /tmp/esrc/.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3422.html">CVE-2014-3422</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3422">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3422">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3422">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3422">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3422">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3422">SUSE bug 876847</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138256" comment="emacs-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151668" comment="emacs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138257" comment="emacs-info-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151669" comment="emacs-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138258" comment="emacs-nox-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151670" comment="emacs-nox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138259" comment="emacs-x11-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151671" comment="emacs-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138260" comment="etags-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151672" comment="etags is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3423</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3423" source="CVE"/>
    <description>
    lisp/net/browse-url.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/Mosaic.##### temporary file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3423.html">CVE-2014-3423</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3423">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3423">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3423">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3423">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3423">SUSE bug 876847</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138256" comment="emacs-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151668" comment="emacs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138257" comment="emacs-info-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151669" comment="emacs-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138258" comment="emacs-nox-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151670" comment="emacs-nox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138259" comment="emacs-x11-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151671" comment="emacs-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138260" comment="etags-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151672" comment="etags is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3424</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3424" source="CVE"/>
    <description>
    lisp/net/tramp-sh.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/tramp.##### temporary file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3424.html">CVE-2014-3424</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3424">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3424">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3424">SUSE bug 876847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3424">SUSE bug 876847</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138256" comment="emacs-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151668" comment="emacs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138257" comment="emacs-info-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151669" comment="emacs-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138258" comment="emacs-nox-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151670" comment="emacs-nox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138259" comment="emacs-x11-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151671" comment="emacs-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138260" comment="etags-24.3-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151672" comment="etags is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3461</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461" source="CVE"/>
    <description>
    hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3461.html">CVE-2014-3461</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3461">SUSE bug 878541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3461">SUSE bug 878541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3461">SUSE bug 878541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3461">SUSE bug 878541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3461">SUSE bug 878541</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3462</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3462" source="CVE"/>
    <description>
    The ".encfs6.xml" configuration file in encfs before 1.7.5 allows remote attackers to access sensitive data by setting "blockMACBytes" to 0 and adding 8 to "blockMACRandBytes".
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3462.html">CVE-2014-3462</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3462">SUSE bug 878257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3462">SUSE bug 878257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3462">SUSE bug 878257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3462">SUSE bug 878257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3462">SUSE bug 878257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3462">SUSE bug 878257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3462">SUSE bug 878257</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147183" comment="encfs-1.8.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152117" comment="encfs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147184" comment="encfs-lang-1.8.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152118" comment="encfs-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3466</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466" source="CVE"/>
    <description>
    Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3466.html">CVE-2014-3466</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3466">SUSE bug 880730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3466">SUSE bug 880730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3466">SUSE bug 880730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3466">SUSE bug 880730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3466">SUSE bug 880730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3466">SUSE bug 880730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3466">SUSE bug 880730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3466">SUSE bug 880730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3466">SUSE bug 880730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3466">SUSE bug 880730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3466">SUSE bug 880730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3466">SUSE bug 880730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3466">SUSE bug 880730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3466">SUSE bug 880730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3466">SUSE bug 880730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3466">SUSE bug 880730</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138369" comment="gnutls-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138370" comment="libgnutls-devel-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138371" comment="libgnutls-openssl27-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151158" comment="libgnutls-openssl27 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138372" comment="libgnutls28-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151159" comment="libgnutls28 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138373" comment="libgnutls28-32bit-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151160" comment="libgnutls28-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3467</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3467.html">CVE-2014-3467</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3467">SUSE bug 880737</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138885" comment="libtasn1-3.7-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152119" comment="libtasn1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138886" comment="libtasn1-6-3.7-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152120" comment="libtasn1-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138887" comment="libtasn1-6-32bit-3.7-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152121" comment="libtasn1-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138888" comment="libtasn1-devel-3.7-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152122" comment="libtasn1-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3468</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468" source="CVE"/>
    <description>
    The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3468.html">CVE-2014-3468</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3468">SUSE bug 880735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3468">SUSE bug 880735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3468">SUSE bug 880910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3468">SUSE bug 880735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3468">SUSE bug 880735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3468">SUSE bug 880735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3468">SUSE bug 880735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3468">SUSE bug 880735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3468">SUSE bug 880735</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138885" comment="libtasn1-3.7-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152119" comment="libtasn1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138886" comment="libtasn1-6-3.7-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152120" comment="libtasn1-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138887" comment="libtasn1-6-32bit-3.7-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152121" comment="libtasn1-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138888" comment="libtasn1-devel-3.7-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152122" comment="libtasn1-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3469</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469" source="CVE"/>
    <description>
    The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3469.html">CVE-2014-3469</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3469">SUSE bug 880738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3469">SUSE bug 880738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3469">SUSE bug 880738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3469">SUSE bug 880910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3469">SUSE bug 880738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3469">SUSE bug 880738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3469">SUSE bug 880738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3469">SUSE bug 880738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3469">SUSE bug 880738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3469">SUSE bug 880738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3469">SUSE bug 880738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3469">SUSE bug 880738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3469">SUSE bug 880738</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138885" comment="libtasn1-3.7-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152119" comment="libtasn1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138886" comment="libtasn1-6-3.7-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152120" comment="libtasn1-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138887" comment="libtasn1-6-32bit-3.7-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152121" comment="libtasn1-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138888" comment="libtasn1-devel-3.7-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152122" comment="libtasn1-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3470</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470" source="CVE"/>
    <description>
    The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3470.html">CVE-2014-3470</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3470">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3470">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3470">SUSE bug 880891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3470">SUSE bug 883126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3470">SUSE bug 885777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3470">SUSE bug 885777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3470">SUSE bug 885777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3470">SUSE bug 885777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3470">SUSE bug 885777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3470">SUSE bug 885777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3470">SUSE bug 885777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3470">SUSE bug 885777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3470">SUSE bug 885777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3470">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3470">SUSE bug 915913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3470">SUSE bug 885777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3470">SUSE bug 885777</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3477</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477" source="CVE"/>
    <description>
    The dbus-daemon in D-Bus 1.2.x through 1.4.x, 1.6.x before 1.6.20, and 1.8.x before 1.8.4, sends an AccessDenied error to the service instead of a client when the client is prohibited from accessing the service, which allows local users to cause a denial of service (initialization failure and exit) or possibly conduct a side-channel attack via a D-Bus message to an inactive service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3477.html">CVE-2014-3477</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3477">SUSE bug 881137</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3477">SUSE bug 881137</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3477">SUSE bug 881137</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3477">SUSE bug 881137</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3477">SUSE bug 881137</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3477">SUSE bug 1010769</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138227" comment="dbus-1-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138228" comment="dbus-1-devel-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151536" comment="dbus-1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138229" comment="dbus-1-x11-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138230" comment="libdbus-1-3-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138231" comment="libdbus-1-3-32bit-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151539" comment="libdbus-1-3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3493</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493" source="CVE"/>
    <description>
    The push_ascii function in smbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) via an attempt to read a Unicode pathname without specifying use of Unicode, leading to a character-set conversion failure that triggers an invalid pointer dereference.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3493.html">CVE-2014-3493</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3493">SUSE bug 880962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3493">SUSE bug 883758</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3493">SUSE bug 883758</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3493">SUSE bug 883758</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3493">SUSE bug 883758</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3493">SUSE bug 883758</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3493">SUSE bug 883758</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3493">SUSE bug 883758</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3493">SUSE bug 878642</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3494</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3494" source="CVE"/>
    <description>
    kio/usernotificationhandler.cpp in the POP3 kioslave in kdelibs 4.10.95 before 4.13.3 does not properly generate warning notifications, which allows man-in-the-middle attackers to obtain sensitive information via an invalid certificate.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3494.html">CVE-2014-3494</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3494">SUSE bug 883374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3494">SUSE bug 883374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3494">SUSE bug 883374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3494">SUSE bug 883374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3494">SUSE bug 883374</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138417" comment="kdelibs4-4.14.10-2.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152123" comment="kdelibs4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138418" comment="kdelibs4-core-4.14.10-2.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152124" comment="kdelibs4-core is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138419" comment="kdelibs4-doc-4.14.10-2.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152125" comment="kdelibs4-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138420" comment="libkde4-4.14.10-2.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152126" comment="libkde4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138421" comment="libkde4-devel-4.14.10-2.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152127" comment="libkde4-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138422" comment="libkdecore4-4.14.10-2.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152128" comment="libkdecore4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138423" comment="libkdecore4-devel-4.14.10-2.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152129" comment="libkdecore4-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138424" comment="libksuseinstall1-4.14.10-2.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152130" comment="libksuseinstall1 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3504</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3504" source="CVE"/>
    <description>
    The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3504.html">CVE-2014-3504</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3504">SUSE bug 890510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3504">SUSE bug 890511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3504">SUSE bug 890510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3504">SUSE bug 890510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3504">SUSE bug 890510</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3504">SUSE bug 890510</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138851" comment="libserf-1-1-1.3.8-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152131" comment="libserf-1-1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3505</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505" source="CVE"/>
    <description>
    Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3505.html">CVE-2014-3505</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 890767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 890767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 890767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 890767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 890767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 890767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 890767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 890767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 890767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 890767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 890767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 890767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 890767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 890767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 890767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3505">SUSE bug 890767</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3506</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506" source="CVE"/>
    <description>
    d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3506.html">CVE-2014-3506</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3506">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3506">SUSE bug 890768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3506">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3506">SUSE bug 890768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3506">SUSE bug 890768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3506">SUSE bug 890768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3506">SUSE bug 890768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3506">SUSE bug 890768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3506">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3506">SUSE bug 890768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3506">SUSE bug 890768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3506">SUSE bug 890768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3506">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3506">SUSE bug 890768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3506">SUSE bug 890768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3506">SUSE bug 890768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3506">SUSE bug 890768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3506">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3506">SUSE bug 890768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3506">SUSE bug 890768</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3507</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507" source="CVE"/>
    <description>
    Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3507.html">CVE-2014-3507</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 890769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 890769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 890769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 890769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 890769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 890769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 890769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 890769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 890769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 890769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 890769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 890769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 890769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 890769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 890769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3507">SUSE bug 890769</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3508</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508" source="CVE"/>
    <description>
    The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3508.html">CVE-2014-3508</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3508">SUSE bug 950708</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3509</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509" source="CVE"/>
    <description>
    Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3509.html">CVE-2014-3509</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3509">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3509">SUSE bug 890766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3509">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3509">SUSE bug 890766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3509">SUSE bug 890766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3509">SUSE bug 890766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3509">SUSE bug 890766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3509">SUSE bug 890766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3509">SUSE bug 890766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3509">SUSE bug 890766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3509">SUSE bug 890766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3509">SUSE bug 890766</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3510</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510" source="CVE"/>
    <description>
    The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3510.html">CVE-2014-3510</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 890770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 890770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 890770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 890770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 890770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 890770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 890770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 890770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 890770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 890764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 890770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 890770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 890770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 890770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 890770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 890770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3510">SUSE bug 890770</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3511</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511" source="CVE"/>
    <description>
    The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3511.html">CVE-2014-3511</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3511">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3511">SUSE bug 890771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3511">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3511">SUSE bug 890771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3511">SUSE bug 890771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3511">SUSE bug 890771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3511">SUSE bug 890771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3511">SUSE bug 890771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3511">SUSE bug 890771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3511">SUSE bug 890771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3511">SUSE bug 890771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3511">SUSE bug 890771</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3512</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512" source="CVE"/>
    <description>
    Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3512.html">CVE-2014-3512</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3512">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3512">SUSE bug 890772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3512">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3512">SUSE bug 890772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3512">SUSE bug 890772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3512">SUSE bug 890772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3512">SUSE bug 890772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3512">SUSE bug 890772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3512">SUSE bug 890772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3512">SUSE bug 890772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3512">SUSE bug 890772</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3513</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513" source="CVE"/>
    <description>
    Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3513.html">CVE-2014-3513</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 902912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 902912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 903690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 903692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 903690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 903692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 903690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 903692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 903690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 903692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 903690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 903692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 903690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3513">SUSE bug 901277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3522</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3522" source="CVE"/>
    <description>
    The Serf RA layer in Apache Subversion 1.4.0 through 1.7.x before 1.7.18 and 1.8.x before 1.8.10 does not properly handle wildcards in the Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3522.html">CVE-2014-3522</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3522">SUSE bug 890511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3522">SUSE bug 890511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3522">SUSE bug 890511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3522">SUSE bug 890511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3522">SUSE bug 890511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3522">SUSE bug 890511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3522">SUSE bug 890511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3522">SUSE bug 890511</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3523</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3523" source="CVE"/>
    <description>
    Memory leak in the winnt_accept function in server/mpm/winnt/child.c in the WinNT MPM in the Apache HTTP Server 2.4.x before 2.4.10 on Windows, when the default AcceptFilter is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3523.html">CVE-2014-3523</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3524</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3524" source="CVE"/>
    <description>
    Apache OpenOffice before 4.1.1 allows remote attackers to execute arbitrary commands and possibly have other unspecified impact via a crafted Calc spreadsheet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3524.html">CVE-2014-3524</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3524">SUSE bug 893133</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3524">SUSE bug 893133</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3524">SUSE bug 893133</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3524">SUSE bug 893133</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3524">SUSE bug 893133</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138812" comment="libreoffice-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138813" comment="libreoffice-base-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138814" comment="libreoffice-base-drivers-mysql-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151464" comment="libreoffice-base-drivers-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138815" comment="libreoffice-branding-upstream-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138816" comment="libreoffice-calc-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138817" comment="libreoffice-calc-extensions-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138818" comment="libreoffice-draw-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138819" comment="libreoffice-filters-optional-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138820" comment="libreoffice-gnome-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138821" comment="libreoffice-icon-theme-breeze-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151471" comment="libreoffice-icon-theme-breeze is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138822" comment="libreoffice-icon-theme-galaxy-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151472" comment="libreoffice-icon-theme-galaxy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138823" comment="libreoffice-icon-theme-hicontrast-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151473" comment="libreoffice-icon-theme-hicontrast is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138824" comment="libreoffice-icon-theme-oxygen-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151474" comment="libreoffice-icon-theme-oxygen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138825" comment="libreoffice-icon-theme-sifr-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151475" comment="libreoffice-icon-theme-sifr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138826" comment="libreoffice-icon-theme-tango-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151476" comment="libreoffice-icon-theme-tango is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138827" comment="libreoffice-impress-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138828" comment="libreoffice-kde4-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151478" comment="libreoffice-kde4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138829" comment="libreoffice-l10n-cs-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138830" comment="libreoffice-l10n-da-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138831" comment="libreoffice-l10n-de-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138832" comment="libreoffice-l10n-el-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138833" comment="libreoffice-l10n-en-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138834" comment="libreoffice-l10n-es-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138835" comment="libreoffice-l10n-fr-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138836" comment="libreoffice-l10n-hu-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138837" comment="libreoffice-l10n-it-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138838" comment="libreoffice-l10n-ja-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138839" comment="libreoffice-l10n-pl-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138840" comment="libreoffice-l10n-ru-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138841" comment="libreoffice-mailmerge-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138842" comment="libreoffice-math-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138843" comment="libreoffice-pyuno-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138844" comment="libreoffice-writer-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138845" comment="libreoffice-writer-extensions-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3528</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3528" source="CVE"/>
    <description>
    Apache Subversion 1.0.0 through 1.7.x before 1.7.17 and 1.8.x before 1.8.10 uses an MD5 hash of the URL and authentication realm to store cached credentials, which makes it easier for remote servers to obtain the credentials via a crafted authentication realm.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3528.html">CVE-2014-3528</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3528">SUSE bug 889849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3528">SUSE bug 889849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3528">SUSE bug 890511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3528">SUSE bug 889849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3528">SUSE bug 889849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3528">SUSE bug 889849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3528">SUSE bug 889849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3528">SUSE bug 889849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3528">SUSE bug 889849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3528">SUSE bug 889849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3528">SUSE bug 889849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3528">SUSE bug 889849</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3532</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532" source="CVE"/>
    <description>
    dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6, when running on Linux 2.6.37-rc4 or later, allows local users to cause a denial of service (system-bus disconnect of other services or applications) by sending a message containing a file descriptor, then exceeding the maximum recursion depth before the initial message is forwarded.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3532.html">CVE-2014-3532</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3532">SUSE bug 885241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3532">SUSE bug 885241</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138227" comment="dbus-1-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138228" comment="dbus-1-devel-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151536" comment="dbus-1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138229" comment="dbus-1-x11-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138230" comment="libdbus-1-3-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138231" comment="libdbus-1-3-32bit-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151539" comment="libdbus-1-3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3533</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533" source="CVE"/>
    <description>
    dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6 allows local users to cause a denial of service (disconnect) via a certain sequence of crafted messages that cause the dbus-daemon to forward a message containing an invalid file descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3533.html">CVE-2014-3533</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3533">SUSE bug 885241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3533">SUSE bug 885241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3533">SUSE bug 885241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3533">SUSE bug 885241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3533">SUSE bug 885241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3533">SUSE bug 885241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3533">SUSE bug 885241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3533">SUSE bug 885241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3533">SUSE bug 885241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3533">SUSE bug 885241</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138227" comment="dbus-1-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138228" comment="dbus-1-devel-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151536" comment="dbus-1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138229" comment="dbus-1-x11-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138230" comment="libdbus-1-3-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138231" comment="libdbus-1-3-32bit-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151539" comment="libdbus-1-3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3537</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537" source="CVE"/>
    <description>
    The web interface in CUPS before 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3537.html">CVE-2014-3537</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3537">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3537">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3537">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3537">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3537">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3537">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3537">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3537">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3537">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3537">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3537">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3537">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3537">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3537">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3537">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3537">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3537">SUSE bug 887240</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138200" comment="cups-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138201" comment="cups-client-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138202" comment="cups-devel-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138203" comment="cups-libs-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151187" comment="cups-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138204" comment="cups-libs-32bit-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151188" comment="cups-libs-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3540</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3540" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2014-0114.  Reason: This candidate is a duplicate of CVE-2014-0114.  CVE abstraction content decisions did not require a second ID.  Notes: All CVE users should reference CVE-2014-0114 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3540.html">CVE-2014-3540</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3540">SUSE bug 885963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3540">SUSE bug 885963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3540">SUSE bug 885963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3540">SUSE bug 885963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3540">SUSE bug 885963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3540">SUSE bug 885963</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138074" comment="apache-commons-beanutils-1.9.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152132" comment="apache-commons-beanutils is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3560</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560" source="CVE"/>
    <description>
    NetBIOS name services daemon (nmbd) in Samba 4.0.x before 4.0.21 and 4.1.x before 4.1.11 allows remote attackers to execute arbitrary code via unspecified vectors that modify heap memory, involving a sizeof operation on an incorrect variable in the unstrcpy macro in string_wrappers.h.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3560.html">CVE-2014-3560</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3560">SUSE bug 889429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3560">SUSE bug 889429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3560">SUSE bug 889429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3560">SUSE bug 889429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3560">SUSE bug 889429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3560">SUSE bug 889429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3560">SUSE bug 889429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3560">SUSE bug 889429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3560">SUSE bug 889429</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3564</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3564" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3564.html">CVE-2014-3564</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3564">SUSE bug 890123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3564">SUSE bug 890123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3564">SUSE bug 890123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3564">SUSE bug 890123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3564">SUSE bug 890123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3564">SUSE bug 890123</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138374" comment="gpgme-1.6.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152133" comment="gpgme is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138375" comment="libgpgme-devel-1.6.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152134" comment="libgpgme-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138376" comment="libgpgme11-1.6.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152135" comment="libgpgme11 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3565</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3565" source="CVE"/>
    <description>
    snmplib/mib.c in net-snmp 5.7.0 and earlier, when the -OQ option is used, allows remote attackers to cause a denial of service (snmptrapd crash) via a crafted SNMP trap message, which triggers a conversion to the variable type designated in the MIB file, as demonstrated by a NULL type in an ifMtu trap message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3565.html">CVE-2014-3565</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3565">SUSE bug 894361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3565">SUSE bug 894361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3565">SUSE bug 894361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3565">SUSE bug 894361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3565">SUSE bug 894361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3565">SUSE bug 894361</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138857" comment="libsnmp30-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151706" comment="libsnmp30 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138858" comment="libsnmp30-32bit-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151707" comment="libsnmp30-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138859" comment="net-snmp-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151708" comment="net-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138860" comment="net-snmp-devel-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151709" comment="net-snmp-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138861" comment="perl-SNMP-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151710" comment="perl-SNMP is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138862" comment="snmp-mibs-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151711" comment="snmp-mibs is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3566</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" source="CVE"/>
    <description>
    The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3566.html">CVE-2014-3566</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901254</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901757</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901254</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901757</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901757</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901889</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901254</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901889</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 902476</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 902912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 902912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 902229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 902229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 902229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 904889</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901757</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 902229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901757</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901757</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 902229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 902229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901757</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 914041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901254</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 902229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 903405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901889</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 1031023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 1031023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 1031023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 1031023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 1031023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 1031023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901889</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3566">SUSE bug 901889</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138165" comment="claws-mail-3.12.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151767" comment="claws-mail is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138166" comment="claws-mail-lang-3.12.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151768" comment="claws-mail-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135893" comment="monit-5.20.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152136" comment="monit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135894" comment="monit-doc-5.20.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152137" comment="monit-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150927" comment="slrn-1.0.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152138" comment="slrn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150928" comment="slrn-lang-1.0.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152139" comment="slrn-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3567</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567" source="CVE"/>
    <description>
    Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3567.html">CVE-2014-3567</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 902912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 902912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 903690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 903692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 903690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 903692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 903690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 903692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 903690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 903692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 903690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 903692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 903690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3567">SUSE bug 877506</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3568</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568" source="CVE"/>
    <description>
    OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3568.html">CVE-2014-3568</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3568">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3568">SUSE bug 901277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3568">SUSE bug 902912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3568">SUSE bug 905106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3568">SUSE bug 911399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3568">SUSE bug 986238</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3569</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569" source="CVE"/>
    <description>
    The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling.  NOTE: this issue became relevant after the CVE-2014-3568 fix.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3569.html">CVE-2014-3569</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3569">SUSE bug 911399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3569">SUSE bug 911399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3569">SUSE bug 911399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3569">SUSE bug 912316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3569">SUSE bug 911399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3569">SUSE bug 911399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3569">SUSE bug 911399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3569">SUSE bug 920339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3569">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3569">SUSE bug 986238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3569">SUSE bug 986238</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3570</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570" source="CVE"/>
    <description>
    The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3570.html">CVE-2014-3570</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 920339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 937891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 944456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3570">SUSE bug 912296</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3571</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571" source="CVE"/>
    <description>
    OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3571.html">CVE-2014-3571</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3571">SUSE bug 912294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3571">SUSE bug 912294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3571">SUSE bug 912316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3571">SUSE bug 912294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3571">SUSE bug 912294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3571">SUSE bug 912294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3571">SUSE bug 912294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3571">SUSE bug 912294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3571">SUSE bug 912294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3571">SUSE bug 912294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3571">SUSE bug 912294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3571">SUSE bug 912294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3571">SUSE bug 912294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3571">SUSE bug 912294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3571">SUSE bug 912294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3571">SUSE bug 920339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3571">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3571">SUSE bug 912294</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3572</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572" source="CVE"/>
    <description>
    The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3572.html">CVE-2014-3572</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 920339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 937891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3572">SUSE bug 912015</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3575</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3575" source="CVE"/>
    <description>
    The OLE preview generation in Apache OpenOffice before 4.1.1 and OpenOffice.org (OOo) might allow remote attackers to embed arbitrary data into documents via crafted OLE objects.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3575.html">CVE-2014-3575</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3575">SUSE bug 893141</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3575">SUSE bug 893141</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3575">SUSE bug 893141</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3575">SUSE bug 893141</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3575">SUSE bug 893141</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3575">SUSE bug 893141</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3575">SUSE bug 893141</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3575">SUSE bug 893141</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3575">SUSE bug 893141</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3575">SUSE bug 893141</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3575">SUSE bug 934423</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3575">SUSE bug 893141</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3575">SUSE bug 893141</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138812" comment="libreoffice-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138813" comment="libreoffice-base-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138814" comment="libreoffice-base-drivers-mysql-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151464" comment="libreoffice-base-drivers-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138815" comment="libreoffice-branding-upstream-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138816" comment="libreoffice-calc-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138817" comment="libreoffice-calc-extensions-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138818" comment="libreoffice-draw-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138819" comment="libreoffice-filters-optional-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138820" comment="libreoffice-gnome-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138821" comment="libreoffice-icon-theme-breeze-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151471" comment="libreoffice-icon-theme-breeze is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138822" comment="libreoffice-icon-theme-galaxy-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151472" comment="libreoffice-icon-theme-galaxy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138823" comment="libreoffice-icon-theme-hicontrast-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151473" comment="libreoffice-icon-theme-hicontrast is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138824" comment="libreoffice-icon-theme-oxygen-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151474" comment="libreoffice-icon-theme-oxygen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138825" comment="libreoffice-icon-theme-sifr-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151475" comment="libreoffice-icon-theme-sifr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138826" comment="libreoffice-icon-theme-tango-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151476" comment="libreoffice-icon-theme-tango is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138827" comment="libreoffice-impress-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138828" comment="libreoffice-kde4-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151478" comment="libreoffice-kde4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138829" comment="libreoffice-l10n-cs-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138830" comment="libreoffice-l10n-da-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138831" comment="libreoffice-l10n-de-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138832" comment="libreoffice-l10n-el-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138833" comment="libreoffice-l10n-en-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138834" comment="libreoffice-l10n-es-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138835" comment="libreoffice-l10n-fr-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138836" comment="libreoffice-l10n-hu-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138837" comment="libreoffice-l10n-it-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138838" comment="libreoffice-l10n-ja-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138839" comment="libreoffice-l10n-pl-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138840" comment="libreoffice-l10n-ru-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138841" comment="libreoffice-mailmerge-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138842" comment="libreoffice-math-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138843" comment="libreoffice-pyuno-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138844" comment="libreoffice-writer-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138845" comment="libreoffice-writer-extensions-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3580</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3580" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3580.html">CVE-2014-3580</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3580">SUSE bug 909935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3580">SUSE bug 910376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3580">SUSE bug 909935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3580">SUSE bug 909935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3580">SUSE bug 909935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3580">SUSE bug 909935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3580">SUSE bug 909935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3580">SUSE bug 910376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3580">SUSE bug 909935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3580">SUSE bug 910376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3580">SUSE bug 910376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3580">SUSE bug 909935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3581</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3581" source="CVE"/>
    <description>
    The cache_merge_headers_out function in modules/cache/cache_util.c in the mod_cache module in the Apache HTTP Server before 2.4.11 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty HTTP Content-Type header.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3581.html">CVE-2014-3581</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3581">SUSE bug 899836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3581">SUSE bug 899836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3581">SUSE bug 899836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3581">SUSE bug 899836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3581">SUSE bug 899836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3581">SUSE bug 899836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3581">SUSE bug 899836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3581">SUSE bug 914956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3581">SUSE bug 899836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3581">SUSE bug 899836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3581">SUSE bug 899836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3581">SUSE bug 899836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3581">SUSE bug 899836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3581">SUSE bug 914956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3581">SUSE bug 914956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3581">SUSE bug 899836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3581">SUSE bug 914956</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3583</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3583" source="CVE"/>
    <description>
    The handle_headers function in mod_proxy_fcgi.c in the mod_proxy_fcgi module in the Apache HTTP Server 2.4.10 allows remote FastCGI servers to cause a denial of service (buffer over-read and daemon crash) via long response headers.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3583.html">CVE-2014-3583</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3587</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3587" source="CVE"/>
    <description>
    Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1571.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3587.html">CVE-2014-3587</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3587">SUSE bug 987530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3587">SUSE bug 987530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3587">SUSE bug 987530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3587">SUSE bug 987530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3587">SUSE bug 987530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3587">SUSE bug 987530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3587">SUSE bug 987530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3587">SUSE bug 987530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3587">SUSE bug 987530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3587">SUSE bug 992991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3587">SUSE bug 987530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3587">SUSE bug 987530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3587">SUSE bug 987530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3587">SUSE bug 987530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3587">SUSE bug 998845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3587">SUSE bug 987530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3587">SUSE bug 987530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3587">SUSE bug 987530</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3589</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3589" source="CVE"/>
    <description>
    PIL/IcnsImagePlugin.py in Python Imaging Library (PIL) and Pillow before 2.3.2 and 2.5.x before 2.5.2 allows remote attackers to cause a denial of service via a crafted block size.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3589.html">CVE-2014-3589</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3589">SUSE bug 921566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3589">SUSE bug 921566</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139047" comment="python-Pillow-2.9.0-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152140" comment="python-Pillow is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3591</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3591.html">CVE-2014-3591</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 949135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3591">SUSE bug 920057</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138631" comment="libgcrypt-devel-1.6.1-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151920" comment="libgcrypt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138632" comment="libgcrypt20-1.6.1-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151921" comment="libgcrypt20 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138633" comment="libgcrypt20-32bit-1.6.1-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151922" comment="libgcrypt20-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3597</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3597" source="CVE"/>
    <description>
    Multiple buffer overflows in the php_parserr function in ext/standard/dns.c in PHP before 5.4.32 and 5.5.x before 5.5.16 allow remote DNS servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted DNS record, related to the dns_get_record function and the dn_expand function.  NOTE: this issue exists because of an incomplete fix for CVE-2014-4049.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3597.html">CVE-2014-3597</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3597">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3597">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3597">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3597">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3597">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3597">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3597">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3597">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3597">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3597">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3597">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3597">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3597">SUSE bug 992991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3598</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3598" source="CVE"/>
    <description>
    The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3598.html">CVE-2014-3598</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3598">SUSE bug 921566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3598">SUSE bug 921566</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139047" comment="python-Pillow-2.9.0-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152140" comment="python-Pillow is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3613</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613" source="CVE"/>
    <description>
    cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3613.html">CVE-2014-3613</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3613">SUSE bug 894575</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138211" comment="curl-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138212" comment="libcurl-devel-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138213" comment="libcurl4-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3615</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615" source="CVE"/>
    <description>
    The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3615.html">CVE-2014-3615</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 918998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3615">SUSE bug 895528</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3618</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618" source="CVE"/>
    <description>
    Heap-based buffer overflow in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted email header, related to "unbalanced quotes."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3618.html">CVE-2014-3618</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3618">SUSE bug 894999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3618">SUSE bug 894999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3618">SUSE bug 894999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3618">SUSE bug 894999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3618">SUSE bug 894999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3618">SUSE bug 898303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3618">SUSE bug 898303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3618">SUSE bug 898303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3618">SUSE bug 898303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3618">SUSE bug 894999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3618">SUSE bug 898303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3618">SUSE bug 898303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3618">SUSE bug 898303</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3618">SUSE bug 1068648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139038" comment="procmail-3.22-267.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152141" comment="procmail is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3620</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3620" source="CVE"/>
    <description>
    cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3620.html">CVE-2014-3620</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3620">SUSE bug 894575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3620">SUSE bug 895991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3620">SUSE bug 895991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3620">SUSE bug 895991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3620">SUSE bug 895991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3620">SUSE bug 895991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3620">SUSE bug 894575</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138211" comment="curl-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138212" comment="libcurl-devel-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138213" comment="libcurl4-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3633</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633" source="CVE"/>
    <description>
    The qemuDomainGetBlockIoTune function in qemu/qemu_driver.c in libvirt before 1.2.9, when a disk has been hot-plugged or removed from the live image, allows remote attackers to cause a denial of service (crash) or read sensitive heap information via a crafted blkiotune query, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3633.html">CVE-2014-3633</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3633">SUSE bug 897783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3633">SUSE bug 897783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3633">SUSE bug 897783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3633">SUSE bug 897783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3633">SUSE bug 897783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3633">SUSE bug 897783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3633">SUSE bug 897783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3633">SUSE bug 897783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3633">SUSE bug 897783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3633">SUSE bug 897783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3633">SUSE bug 897783</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3634</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3634" source="CVE"/>
    <description>
    rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3634.html">CVE-2014-3634</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 897262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 897262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 897262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 897262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 897262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 897262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 897262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 897262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 899756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 899756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 897262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 899756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 897262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 897262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 899756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 897262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 899756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 897262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 899756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 899756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 899756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 899756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 897262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3634">SUSE bug 899756</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138445" comment="klogd-1.4.1-779.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152142" comment="klogd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139082" comment="rsyslog-8.4.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151645" comment="rsyslog is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138446" comment="syslog-service-2.0-779.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152143" comment="syslog-service is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3635</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635" source="CVE"/>
    <description>
    Off-by-one error in D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8, when running on a 64-bit system and the max_message_unix_fds limit is set to an odd number, allows local users to cause a denial of service (dbus-daemon crash) or possibly execute arbitrary code by sending one more file descriptor than the limit, which triggers a heap-based buffer overflow or an assertion failure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3635.html">CVE-2014-3635</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3635">SUSE bug 896453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3635">SUSE bug 896453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3635">SUSE bug 896453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3635">SUSE bug 896453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3635">SUSE bug 896453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3635">SUSE bug 896453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3635">SUSE bug 896453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3635">SUSE bug 896453</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138227" comment="dbus-1-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138228" comment="dbus-1-devel-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151536" comment="dbus-1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138229" comment="dbus-1-x11-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138230" comment="libdbus-1-3-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138231" comment="libdbus-1-3-32bit-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151539" comment="libdbus-1-3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3636</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636" source="CVE"/>
    <description>
    D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 allows local users to (1) cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors or (2) cause a denial of service (disconnect) via multiple messages that combine to have more than the allowed number of file descriptors for a single sendmsg call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3636.html">CVE-2014-3636</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3636">SUSE bug 896453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3636">SUSE bug 904017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3636">SUSE bug 904017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3636">SUSE bug 904017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3636">SUSE bug 904017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3636">SUSE bug 904017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3636">SUSE bug 904017</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138227" comment="dbus-1-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138228" comment="dbus-1-devel-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151536" comment="dbus-1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138229" comment="dbus-1-x11-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138230" comment="libdbus-1-3-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138231" comment="libdbus-1-3-32bit-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151539" comment="libdbus-1-3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3637</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637" source="CVE"/>
    <description>
    D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 does not properly close connections for processes that have terminated, which allows local users to cause a denial of service via a D-bus message containing a D-Bus connection file descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3637.html">CVE-2014-3637</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3637">SUSE bug 896453</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138227" comment="dbus-1-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138228" comment="dbus-1-devel-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151536" comment="dbus-1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138229" comment="dbus-1-x11-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138230" comment="libdbus-1-3-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138231" comment="libdbus-1-3-32bit-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151539" comment="libdbus-1-3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3638</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638" source="CVE"/>
    <description>
    The bus_connections_check_reply function in config-parser.c in D-Bus before 1.6.24 and 1.8.x before 1.8.8 allows local users to cause a denial of service (CPU consumption) via a large number of method calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3638.html">CVE-2014-3638</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3638">SUSE bug 896453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3638">SUSE bug 902912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3638">SUSE bug 903057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3638">SUSE bug 903055</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3638">SUSE bug 903055</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3638">SUSE bug 903055</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3638">SUSE bug 903055</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138227" comment="dbus-1-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138228" comment="dbus-1-devel-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151536" comment="dbus-1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138229" comment="dbus-1-x11-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138230" comment="libdbus-1-3-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138231" comment="libdbus-1-3-32bit-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151539" comment="libdbus-1-3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3639</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639" source="CVE"/>
    <description>
    The dbus-daemon in D-Bus before 1.6.24 and 1.8.x before 1.8.8 does not properly close old connections, which allows local users to cause a denial of service (incomplete connection consumption and prevention of new connections) via a large number of incomplete connections.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3639.html">CVE-2014-3639</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3639">SUSE bug 896453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3639">SUSE bug 896453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3639">SUSE bug 896453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3639">SUSE bug 896453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3639">SUSE bug 896453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3639">SUSE bug 896453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3639">SUSE bug 902912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3639">SUSE bug 903057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3639">SUSE bug 896453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3639">SUSE bug 896453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3639">SUSE bug 903055</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3639">SUSE bug 903055</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3639">SUSE bug 903055</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3639">SUSE bug 903055</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138227" comment="dbus-1-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138228" comment="dbus-1-devel-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151536" comment="dbus-1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138229" comment="dbus-1-x11-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138230" comment="libdbus-1-3-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138231" comment="libdbus-1-3-32bit-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151539" comment="libdbus-1-3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3640</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640" source="CVE"/>
    <description>
    The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2014-3640.html">CVE-2014-3640</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 965112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 965112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 965112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 965112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 965112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 965112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 965112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 965112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 965112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 965112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 965112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 965112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 965112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 965112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 965112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3640">SUSE bug 897654</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3657</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657" source="CVE"/>
    <description>
    The virDomainListPopulate function in conf/domain_conf.c in libvirt before 1.2.9 does not clean up the lock on the list of domains, which allows remote attackers to cause a denial of service (deadlock) via a NULL value in the second parameter in the virConnectListAllDomains API command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3657.html">CVE-2014-3657</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3657">SUSE bug 897783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3657">SUSE bug 897783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3657">SUSE bug 897783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3657">SUSE bug 899484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3657">SUSE bug 899484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3657">SUSE bug 899484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3657">SUSE bug 899484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3657">SUSE bug 899484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3657">SUSE bug 899484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3657">SUSE bug 899484</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3660</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660" source="CVE"/>
    <description>
    parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3660.html">CVE-2014-3660</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3660">SUSE bug 901546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3660">SUSE bug 901546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3660">SUSE bug 901546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3660">SUSE bug 901546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3660">SUSE bug 901546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3660">SUSE bug 901546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3660">SUSE bug 901546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3660">SUSE bug 901546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3660">SUSE bug 901546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3660">SUSE bug 901546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3660">SUSE bug 901546</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138972" comment="libxml2-2-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138973" comment="libxml2-2-32bit-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138974" comment="libxml2-devel-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138975" comment="libxml2-tools-2.9.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3668</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3668" source="CVE"/>
    <description>
    Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument to the xmlrpc_set_type function or (2) a crafted argument to the xmlrpc_decode function, related to an out-of-bounds read operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3668.html">CVE-2014-3668</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3668">SUSE bug 902368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3668">SUSE bug 902368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3668">SUSE bug 902368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3668">SUSE bug 902368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3668">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3668">SUSE bug 992991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3669</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3669" source="CVE"/>
    <description>
    Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function that triggers calculation of a large length value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3669.html">CVE-2014-3669</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3669">SUSE bug 902360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3669">SUSE bug 902360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3669">SUSE bug 902360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3669">SUSE bug 902360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3669">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3669">SUSE bug 992991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3670</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3670" source="CVE"/>
    <description>
    The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted JPEG image with TIFF thumbnail data that is improperly handled by the exif_thumbnail function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3670.html">CVE-2014-3670</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3670">SUSE bug 902357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3670">SUSE bug 902357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3670">SUSE bug 902357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3670">SUSE bug 902357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3670">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3670">SUSE bug 992991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3672</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3672" source="CVE"/>
    <description>
    The qemu implementation in libvirt before 1.3.0 and Xen allows local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3672.html">CVE-2014-3672</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3672">SUSE bug 981264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3672">SUSE bug 981264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3672">SUSE bug 981264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3672">SUSE bug 981264</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3675</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3675" source="CVE"/>
    <description>
    Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3675.html">CVE-2014-3675</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3675">SUSE bug 889332</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139090" comment="shim-0.9-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152144" comment="shim is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3676</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3676" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3676" source="CVE"/>
    <description>
    Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3676.html">CVE-2014-3676</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3676">SUSE bug 889332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3676">SUSE bug 889332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3676">SUSE bug 889332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3676">SUSE bug 889332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3676">SUSE bug 889332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3676">SUSE bug 889332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3676">SUSE bug 889332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3676">SUSE bug 889332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3676">SUSE bug 889332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3676">SUSE bug 889332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3676">SUSE bug 889332</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139090" comment="shim-0.9-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152144" comment="shim is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3677</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3677" source="CVE"/>
    <description>
    Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3677.html">CVE-2014-3677</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3677">SUSE bug 889332</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139090" comment="shim-0.9-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152144" comment="shim is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3683</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3683" source="CVE"/>
    <description>
    Integer overflow in rsyslog before 7.6.7 and 8.x before 8.4.2 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash) via a large priority (PRI) value.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3634.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3683.html">CVE-2014-3683</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3683">SUSE bug 897262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3683">SUSE bug 899756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3683">SUSE bug 899756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3683">SUSE bug 897262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3683">SUSE bug 899756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3683">SUSE bug 899756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3683">SUSE bug 897262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3683">SUSE bug 899756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3683">SUSE bug 899756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3683">SUSE bug 899756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3683">SUSE bug 899756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3683">SUSE bug 899756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3683">SUSE bug 899756</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139082" comment="rsyslog-8.4.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151645" comment="rsyslog is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3686</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686" source="CVE"/>
    <description>
    wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3686.html">CVE-2014-3686</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3686">SUSE bug 900611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3686">SUSE bug 900611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3686">SUSE bug 900611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3686">SUSE bug 900611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3686">SUSE bug 900611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3686">SUSE bug 900611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3686">SUSE bug 900611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3686">SUSE bug 900611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3686">SUSE bug 900611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3686">SUSE bug 900611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3686">SUSE bug 1063667</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139133" comment="wpa_supplicant-2.2-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139134" comment="wpa_supplicant-gui-2.2-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3689</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3689" source="CVE"/>
    <description>
    The vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3689.html">CVE-2014-3689</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3689">SUSE bug 901508</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3689">SUSE bug 901508</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3689">SUSE bug 901508</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3689">SUSE bug 901508</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3689">SUSE bug 962611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3689">SUSE bug 901508</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3689">SUSE bug 962611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3689">SUSE bug 901508</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3689">SUSE bug 962611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3689">SUSE bug 962611</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3693</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3693" source="CVE"/>
    <description>
    Use-after-free vulnerability in the socket manager of Impress Remote in LibreOffice 4.x before 4.2.7 and 4.3.x before 4.3.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to TCP port 1599.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3693.html">CVE-2014-3693</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3693">SUSE bug 900214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3693">SUSE bug 900214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3693">SUSE bug 900214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3693">SUSE bug 900214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3693">SUSE bug 900214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3693">SUSE bug 900214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3693">SUSE bug 900214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3693">SUSE bug 900214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3693">SUSE bug 900214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3693">SUSE bug 900214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3693">SUSE bug 900214</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138812" comment="libreoffice-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138813" comment="libreoffice-base-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138814" comment="libreoffice-base-drivers-mysql-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151464" comment="libreoffice-base-drivers-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138815" comment="libreoffice-branding-upstream-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138816" comment="libreoffice-calc-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138817" comment="libreoffice-calc-extensions-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138818" comment="libreoffice-draw-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138819" comment="libreoffice-filters-optional-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138820" comment="libreoffice-gnome-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138821" comment="libreoffice-icon-theme-breeze-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151471" comment="libreoffice-icon-theme-breeze is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138822" comment="libreoffice-icon-theme-galaxy-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151472" comment="libreoffice-icon-theme-galaxy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138823" comment="libreoffice-icon-theme-hicontrast-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151473" comment="libreoffice-icon-theme-hicontrast is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138824" comment="libreoffice-icon-theme-oxygen-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151474" comment="libreoffice-icon-theme-oxygen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138825" comment="libreoffice-icon-theme-sifr-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151475" comment="libreoffice-icon-theme-sifr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138826" comment="libreoffice-icon-theme-tango-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151476" comment="libreoffice-icon-theme-tango is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138827" comment="libreoffice-impress-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138828" comment="libreoffice-kde4-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151478" comment="libreoffice-kde4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138829" comment="libreoffice-l10n-cs-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138830" comment="libreoffice-l10n-da-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138831" comment="libreoffice-l10n-de-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138832" comment="libreoffice-l10n-el-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138833" comment="libreoffice-l10n-en-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138834" comment="libreoffice-l10n-es-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138835" comment="libreoffice-l10n-fr-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138836" comment="libreoffice-l10n-hu-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138837" comment="libreoffice-l10n-it-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138838" comment="libreoffice-l10n-ja-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138839" comment="libreoffice-l10n-pl-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138840" comment="libreoffice-l10n-ru-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138841" comment="libreoffice-mailmerge-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138842" comment="libreoffice-math-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138843" comment="libreoffice-pyuno-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138844" comment="libreoffice-writer-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138845" comment="libreoffice-writer-extensions-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3694</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694" source="CVE"/>
    <description>
    The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly consider the Basic Constraints extension during verification of X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3694.html">CVE-2014-3694</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3694">SUSE bug 902495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3694">SUSE bug 902495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3694">SUSE bug 902495</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3695</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695" source="CVE"/>
    <description>
    markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a large length value in an emoticon response.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3695.html">CVE-2014-3695</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3695">SUSE bug 902409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3695">SUSE bug 902409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3695">SUSE bug 902409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3695">SUSE bug 902409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3695">SUSE bug 902409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3695">SUSE bug 902409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3695">SUSE bug 902409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3695">SUSE bug 902409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3695">SUSE bug 902409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3695">SUSE bug 902409</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150541" comment="finch-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152147" comment="finch is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150542" comment="finch-devel-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152148" comment="finch-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150544" comment="libpurple-branding-upstream-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152149" comment="libpurple-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150545" comment="libpurple-devel-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152150" comment="libpurple-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150550" comment="pidgin-devel-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152151" comment="pidgin-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3696</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696" source="CVE"/>
    <description>
    nmevent.c in the Novell GroupWise protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a crafted server message that triggers a large memory allocation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3696.html">CVE-2014-3696</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3696">SUSE bug 902410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3696">SUSE bug 902410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3696">SUSE bug 902410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3696">SUSE bug 902410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3696">SUSE bug 902410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3696">SUSE bug 902410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3696">SUSE bug 902410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3696">SUSE bug 902410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3696">SUSE bug 902410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3696">SUSE bug 902410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3696">SUSE bug 902410</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150541" comment="finch-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152147" comment="finch is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150542" comment="finch-devel-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152148" comment="finch-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150544" comment="libpurple-branding-upstream-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152149" comment="libpurple-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150545" comment="libpurple-devel-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152150" comment="libpurple-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150550" comment="pidgin-devel-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152151" comment="pidgin-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3697</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3697" source="CVE"/>
    <description>
    Absolute path traversal vulnerability in the untar_block function in win32/untar.c in Pidgin before 2.10.10 on Windows allows remote attackers to write to arbitrary files via a drive name in a tar archive of a smiley theme.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3697.html">CVE-2014-3697</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3698</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698" source="CVE"/>
    <description>
    The jabber_idn_validate function in jutil.c in the Jabber protocol plugin in libpurple in Pidgin before 2.10.10 allows remote attackers to obtain sensitive information from process memory via a crafted XMPP message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3698.html">CVE-2014-3698</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3698">SUSE bug 902408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3698">SUSE bug 902408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3698">SUSE bug 902408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3698">SUSE bug 902408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3698">SUSE bug 902408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3698">SUSE bug 902408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3698">SUSE bug 902408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3698">SUSE bug 902408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3698">SUSE bug 902408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150541" comment="finch-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152147" comment="finch is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150542" comment="finch-devel-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152148" comment="finch-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138779" comment="libpurple-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150544" comment="libpurple-branding-upstream-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152149" comment="libpurple-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150545" comment="libpurple-devel-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152150" comment="libpurple-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138780" comment="libpurple-lang-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138781" comment="libpurple-meanwhile-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138782" comment="libpurple-tcl-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138783" comment="pidgin-2.10.11-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150550" comment="pidgin-devel-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152151" comment="pidgin-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3707</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707" source="CVE"/>
    <description>
    The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3707.html">CVE-2014-3707</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3707">SUSE bug 901924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3707">SUSE bug 901924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3707">SUSE bug 901924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3707">SUSE bug 901924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3707">SUSE bug 901924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3707">SUSE bug 901924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3707">SUSE bug 901924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3707">SUSE bug 901924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3707">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138211" comment="curl-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138212" comment="libcurl-devel-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138213" comment="libcurl4-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3710</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710" source="CVE"/>
    <description>
    The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3710.html">CVE-2014-3710</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3710">SUSE bug 902367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3710">SUSE bug 902367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3710">SUSE bug 902367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3710">SUSE bug 902367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3710">SUSE bug 902367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3710">SUSE bug 902367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3710">SUSE bug 902367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3710">SUSE bug 902367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3710">SUSE bug 902367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3710">SUSE bug 910252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3710">SUSE bug 902367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3710">SUSE bug 902367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3710">SUSE bug 902367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3710">SUSE bug 902367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3710">SUSE bug 902367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3710">SUSE bug 902367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3710">SUSE bug 902367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3710">SUSE bug 902367</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138277" comment="file-5.19-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151700" comment="file is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138278" comment="file-devel-5.19-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151701" comment="file-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138279" comment="file-magic-5.19-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151702" comment="file-magic is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138280" comment="libmagic1-5.19-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151703" comment="libmagic1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138281" comment="libmagic1-32bit-5.19-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151704" comment="libmagic1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3775</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3775" source="CVE"/>
    <description>
    libgadu before 1.11.4 and 1.12.0 before 1.12.0-rc3, as used in Pidgin and other products, allows remote Gadu-Gadu file relay servers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3775.html">CVE-2014-3775</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3775">SUSE bug 878540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3775">SUSE bug 878540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3775">SUSE bug 878540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3775">SUSE bug 878540</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138629" comment="libgadu-devel-1.12.1-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151951" comment="libgadu-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138630" comment="libgadu3-1.12.1-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151952" comment="libgadu3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3941</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3941" source="CVE"/>
    <description>
    TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allows remote attackers to have unspecified impact via a crafted HTTP Host header, related to "Host Spoofing."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3941.html">CVE-2014-3941</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3941">SUSE bug 881282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3941">SUSE bug 881282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3941">SUSE bug 1082714</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133256" comment="typo3-cms-4_7-4.7.20-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151931" comment="typo3-cms-4_7 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3970</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3970" source="CVE"/>
    <description>
    The pa_rtp_recv function in modules/rtp/rtp.c in the module-rtp-recv module in PulseAudio 5.0 and earlier allows remote attackers to cause a denial of service (assertion failure and abort) via an empty UDP packet.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2014-3970.html">CVE-2014-3970</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3970">SUSE bug 881524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3970">SUSE bug 881524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3970">SUSE bug 881524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3970">SUSE bug 881524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3970">SUSE bug 881524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3970">SUSE bug 881524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3970">SUSE bug 881524</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138765" comment="libpulse-devel-7.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152152" comment="libpulse-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138766" comment="libpulse-mainloop-glib0-7.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152153" comment="libpulse-mainloop-glib0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138767" comment="libpulse0-7.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152154" comment="libpulse0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138768" comment="libpulse0-32bit-7.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152155" comment="libpulse0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138769" comment="pulseaudio-7.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152156" comment="pulseaudio is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138770" comment="pulseaudio-bash-completion-7.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152157" comment="pulseaudio-bash-completion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138771" comment="pulseaudio-lang-7.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152158" comment="pulseaudio-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138772" comment="pulseaudio-module-bluetooth-7.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152159" comment="pulseaudio-module-bluetooth is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138773" comment="pulseaudio-module-gconf-7.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152160" comment="pulseaudio-module-gconf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138774" comment="pulseaudio-module-jack-7.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152161" comment="pulseaudio-module-jack is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138775" comment="pulseaudio-module-lirc-7.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152162" comment="pulseaudio-module-lirc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138776" comment="pulseaudio-module-x11-7.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152163" comment="pulseaudio-module-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138777" comment="pulseaudio-module-zeroconf-7.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152164" comment="pulseaudio-module-zeroconf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138778" comment="pulseaudio-utils-7.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152165" comment="pulseaudio-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3985</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-3985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3985" source="CVE"/>
    <description>
    The getHTTPResponse function in miniwget.c in MiniUPnP 1.9 allows remote attackers to cause a denial of service (crash) via crafted headers that trigger an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-3985.html">CVE-2014-3985</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3985">SUSE bug 881990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3985">SUSE bug 881990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3985">SUSE bug 881990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-3985">SUSE bug 881990</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138696" comment="libminiupnpc10-1.9-4.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152166" comment="libminiupnpc10 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4000</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4000" source="CVE"/>
    <description>
    Cacti before 1.0.0 allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object, related to calling unserialize(stripslashes()).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4000.html">CVE-2014-4000</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4000">SUSE bug 1022564</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4000">SUSE bug 1022564</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149462" comment="cacti-1.0.4-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149463" comment="cacti-doc-1.0.4-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152168" comment="cacti-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4020</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4020" source="CVE"/>
    <description>
    The dissect_frame function in epan/dissectors/packet-frame.c in the frame metadissector in Wireshark 1.10.x before 1.10.8 interprets a negative integer as a length value even though it was intended to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4020.html">CVE-2014-4020</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4020">SUSE bug 882602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4020">SUSE bug 882602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4020">SUSE bug 882602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4020">SUSE bug 882602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4020">SUSE bug 882602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4020">SUSE bug 882602</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4043</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4043" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043" source="CVE"/>
    <description>
    The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4043.html">CVE-2014-4043</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4043">SUSE bug 882600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4043">SUSE bug 882600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4043">SUSE bug 882600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4043">SUSE bug 882600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4043">SUSE bug 882600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4043">SUSE bug 882600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4043">SUSE bug 882600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4043">SUSE bug 882600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4043">SUSE bug 882600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4043">SUSE bug 882600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4043">SUSE bug 882600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4043">SUSE bug 882600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4043">SUSE bug 882600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4043">SUSE bug 939797</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4043">SUSE bug 882600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4043">SUSE bug 882600</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138343" comment="glibc-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138344" comment="glibc-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138345" comment="glibc-devel-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138346" comment="glibc-extra-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138347" comment="glibc-info-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138348" comment="glibc-locale-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138349" comment="glibc-locale-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138350" comment="nscd-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4049</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4049" source="CVE"/>
    <description>
    Heap-based buffer overflow in the php_parserr function in ext/standard/dns.c in PHP 5.6.0beta4 and earlier allows remote servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS TXT record, related to the dns_get_record function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4049.html">CVE-2014-4049</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4049">SUSE bug 882992</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4049">SUSE bug 882992</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4049">SUSE bug 882992</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4049">SUSE bug 882992</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4049">SUSE bug 882992</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4049">SUSE bug 882992</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4049">SUSE bug 882992</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4049">SUSE bug 882992</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4049">SUSE bug 882992</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4049">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4049">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4049">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4049">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4049">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4049">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4049">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4049">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4049">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4049">SUSE bug 893853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4049">SUSE bug 893853</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4207</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4207" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to SROPTZR.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4207.html">CVE-2014-4207</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4207">SUSE bug 887580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4207">SUSE bug 915914</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4258</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4258" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4258" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier and 5.6.17 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SRINFOSC.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4258.html">CVE-2014-4258</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4258">SUSE bug 887580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4258">SUSE bug 915914</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4260</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4260" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4260" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier, and 5.6.17 and earlier, allows remote authenticated users to affect integrity and availability via vectors related to SRCHAR.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4260.html">CVE-2014-4260</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4260">SUSE bug 887580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4260">SUSE bug 915914</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4274</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4274" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to SERVER:MyISAM.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4274.html">CVE-2014-4274</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 896400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 896400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 857678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 896400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 896400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 896400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 896400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 896400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 896400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 857678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 915913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 857678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 896400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 857678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 896400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 896400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 857678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 857678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 857678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 857678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 896400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 896400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4274">SUSE bug 896400</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4287</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4287" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:CHARACTER SETS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4287.html">CVE-2014-4287</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4287">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4287">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4287">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4336</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4336" source="CVE"/>
    <description>
    The generate_local_queue function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the host name.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4336.html">CVE-2014-4336</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4336">SUSE bug 883543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4336">SUSE bug 871327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4336">SUSE bug 883543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4336">SUSE bug 883543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4336">SUSE bug 883543</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138205" comment="cups-filters-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151947" comment="cups-filters is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138206" comment="cups-filters-cups-browsed-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151948" comment="cups-filters-cups-browsed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138207" comment="cups-filters-foomatic-rip-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151949" comment="cups-filters-foomatic-rip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138208" comment="cups-filters-ghostscript-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151950" comment="cups-filters-ghostscript is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4337</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4337" source="CVE"/>
    <description>
    The process_browse_data function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted packet data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4337.html">CVE-2014-4337</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4337">SUSE bug 883543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4337">SUSE bug 871327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4337">SUSE bug 883543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4337">SUSE bug 883543</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138205" comment="cups-filters-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151947" comment="cups-filters is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138206" comment="cups-filters-cups-browsed-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151948" comment="cups-filters-cups-browsed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138207" comment="cups-filters-foomatic-rip-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151949" comment="cups-filters-foomatic-rip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138208" comment="cups-filters-ghostscript-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151950" comment="cups-filters-ghostscript is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4338</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4338" source="CVE"/>
    <description>
    cups-browsed in cups-filters before 1.0.53 allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a malformed cups-browsed.conf BrowseAllow directive that is interpreted as granting browse access to all IP addresses.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4338.html">CVE-2014-4338</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4338">SUSE bug 883536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4338">SUSE bug 871327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4338">SUSE bug 883536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4338">SUSE bug 883536</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138205" comment="cups-filters-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151947" comment="cups-filters is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138206" comment="cups-filters-cups-browsed-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151948" comment="cups-filters-cups-browsed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138207" comment="cups-filters-foomatic-rip-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151949" comment="cups-filters-foomatic-rip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138208" comment="cups-filters-ghostscript-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151950" comment="cups-filters-ghostscript is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4341</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341" source="CVE"/>
    <description>
    MIT Kerberos 5 (aka krb5) before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) by injecting invalid tokens into a GSSAPI application session.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4341.html">CVE-2014-4341</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4341">SUSE bug 886016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4341">SUSE bug 886016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4341">SUSE bug 886016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4341">SUSE bug 886016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4341">SUSE bug 886016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4341">SUSE bug 886016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4341">SUSE bug 886016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4341">SUSE bug 770172</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4342</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342" source="CVE"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.7.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read or NULL pointer dereference, and application crash) by injecting invalid tokens into a GSSAPI application session.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4342.html">CVE-2014-4342</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4342">SUSE bug 886016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4342">SUSE bug 886016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4342">SUSE bug 886016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4342">SUSE bug 886016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4342">SUSE bug 886016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4342">SUSE bug 886016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4342">SUSE bug 886016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4342">SUSE bug 770172</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4343</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343" source="CVE"/>
    <description>
    Double free vulnerability in the init_ctx_reselect function in the SPNEGO initiator in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.10.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via network traffic that appears to come from an intended acceptor, but specifies a security mechanism different from the one proposed by the initiator.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4343.html">CVE-2014-4343</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4343">SUSE bug 888697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4343">SUSE bug 888697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4343">SUSE bug 888697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4343">SUSE bug 888697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4343">SUSE bug 888697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4343">SUSE bug 888697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4343">SUSE bug 888697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4343">SUSE bug 888697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4343">SUSE bug 770172</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4344</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4344" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344" source="CVE"/>
    <description>
    The acc_ctx_cont function in the SPNEGO acceptor in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty continuation token at a certain point during a SPNEGO negotiation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4344.html">CVE-2014-4344</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4344">SUSE bug 888697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4344">SUSE bug 888697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4344">SUSE bug 888697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4344">SUSE bug 888697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4344">SUSE bug 888697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4344">SUSE bug 888697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4344">SUSE bug 888697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4344">SUSE bug 888697</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4345</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345" source="CVE"/>
    <description>
    Off-by-one error in the krb5_encode_krbsecretkey function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) 1.6.x through 1.11.x before 1.11.6 and 1.12.x before 1.12.2 allows remote authenticated users to cause a denial of service (buffer overflow) or possibly execute arbitrary code via a series of "cpw -keepold" commands.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4345.html">CVE-2014-4345</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4345">SUSE bug 891082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4345">SUSE bug 891082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4345">SUSE bug 891082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4345">SUSE bug 891082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4345">SUSE bug 770172</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4607</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4607" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4607.html">CVE-2014-4607</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4607">SUSE bug 883947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4607">SUSE bug 883947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4607">SUSE bug 883947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4607">SUSE bug 883947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4607">SUSE bug 883947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4607">SUSE bug 883947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4607">SUSE bug 883947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4607">SUSE bug 883947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4607">SUSE bug 883947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4607">SUSE bug 883947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4607">SUSE bug 883947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4607">SUSE bug 883947</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138694" comment="liblzo2-2-2.08-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152169" comment="liblzo2-2 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4617</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617" source="CVE"/>
    <description>
    The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4617.html">CVE-2014-4617</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4617">SUSE bug 884130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4617">SUSE bug 884130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4617">SUSE bug 884130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4617">SUSE bug 884130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4617">SUSE bug 884130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4617">SUSE bug 884130</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119616" comment="gpg2-2.0.24-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151446" comment="gpg2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119617" comment="gpg2-lang-2.0.24-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151447" comment="gpg2-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4650</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4650.html">CVE-2014-4650</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4650">SUSE bug 885882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4650">SUSE bug 885882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4650">SUSE bug 885882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4650">SUSE bug 885882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4650">SUSE bug 885882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4650">SUSE bug 885882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4650">SUSE bug 885882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4650">SUSE bug 885882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4650">SUSE bug 885882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4650">SUSE bug 885882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4650">SUSE bug 885882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4650">SUSE bug 885882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4650">SUSE bug 885882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4650">SUSE bug 885882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4650">SUSE bug 885882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4650">SUSE bug 885882</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138784" comment="libpython2_7-1_0-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138785" comment="libpython2_7-1_0-32bit-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138789" comment="libpython3_4m1_0-3.4.1-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151646" comment="libpython3_4m1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134105" comment="libpython3_4m1_0-32bit-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152170" comment="libpython3_4m1_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138786" comment="python-base-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138787" comment="python-devel-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138788" comment="python-xml-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134106" comment="python3-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134107" comment="python3-32bit-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138790" comment="python3-base-3.4.1-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134109" comment="python3-base-32bit-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134110" comment="python3-curses-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134111" comment="python3-dbm-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134112" comment="python3-devel-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134113" comment="python3-doc-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134114" comment="python3-doc-pdf-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152175" comment="python3-doc-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134115" comment="python3-idle-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134116" comment="python3-testsuite-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134117" comment="python3-tk-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134118" comment="python3-tools-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4670</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4670" source="CVE"/>
    <description>
    Use-after-free vulnerability in ext/spl/spl_dllist.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted iterator usage within applications in certain web-hosting environments.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4670.html">CVE-2014-4670</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4670">SUSE bug 886059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4670">SUSE bug 886059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4670">SUSE bug 886059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4670">SUSE bug 886059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4670">SUSE bug 886059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4670">SUSE bug 886059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4670">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4670">SUSE bug 992991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4698</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4698" source="CVE"/>
    <description>
    Use-after-free vulnerability in ext/spl/spl_array.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted ArrayIterator usage within applications in certain web-hosting environments.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4698.html">CVE-2014-4698</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4698">SUSE bug 886060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4698">SUSE bug 886060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4698">SUSE bug 886060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4698">SUSE bug 886060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4698">SUSE bug 886060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4698">SUSE bug 886060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4698">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4877</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4877" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877" source="CVE"/>
    <description>
    Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4877.html">CVE-2014-4877</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 902709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 902709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 902709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 902709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 902709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 902709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 902709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 902709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 902709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 902709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 902709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 902709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 910180</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 902709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 910180</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 911056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 911056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 910180</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 910180</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 910180</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 911056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 910180</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 915835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 915835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 915835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 915835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4877">SUSE bug 902709</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139130" comment="wget-1.14-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151442" comment="wget is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4909</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4909" source="CVE"/>
    <description>
    Integer overflow in the tr_bitfieldEnsureNthBitAlloced function in bitfield.c in Transmission before 2.84 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted peer message, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4909.html">CVE-2014-4909</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4909">SUSE bug 887079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4909">SUSE bug 887079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4909">SUSE bug 887079</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139112" comment="transmission-common-2.84-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152179" comment="transmission-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139113" comment="transmission-gtk-2.84-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152180" comment="transmission-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139114" comment="transmission-gtk-lang-2.84-5.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152181" comment="transmission-gtk-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4910</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4910" source="CVE"/>
    <description>
    Directory traversal vulnerability in tools/backlight_helper.c in X.Org xf86-video-intel 2.99.911 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in the interface name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4910.html">CVE-2014-4910</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139142" comment="xf86-video-intel-2.99.917-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152182" comment="xf86-video-intel is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4975</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-4975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4975" source="CVE"/>
    <description>
    Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-4975.html">CVE-2014-4975</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4975">SUSE bug 887877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4975">SUSE bug 887877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4975">SUSE bug 887877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4975">SUSE bug 887877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4975">SUSE bug 887877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4975">SUSE bug 887877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4975">SUSE bug 887877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4975">SUSE bug 887877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4975">SUSE bug 887877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-4975">SUSE bug 887877</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154833" comment="libruby2_1-2_1-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152217" comment="libruby2_1-2_1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154834" comment="ruby2.1-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152218" comment="ruby2.1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154835" comment="ruby2.1-devel-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152219" comment="ruby2.1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154836" comment="ruby2.1-devel-extra-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154837" comment="ruby2.1-devel-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154838" comment="ruby2.1-doc-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154839" comment="ruby2.1-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154840" comment="ruby2.1-doc-ri-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154841" comment="ruby2.1-doc-ri is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154842" comment="ruby2.1-stdlib-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152220" comment="ruby2.1-stdlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5029</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029" source="CVE"/>
    <description>
    The web interface in CUPS 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/ and language[0] set to null.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3537.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2014-5029.html">CVE-2014-5029</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5029">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5029">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5029">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5029">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5029">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5029">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5029">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5029">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5029">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5029">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5029">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5029">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5029">SUSE bug 887240</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138200" comment="cups-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138201" comment="cups-client-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138202" comment="cups-devel-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138203" comment="cups-libs-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151187" comment="cups-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138204" comment="cups-libs-32bit-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151188" comment="cups-libs-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5030</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030" source="CVE"/>
    <description>
    CUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (2) index.class, (3) index.pl, (4) index.php, (5) index.pyc, or (6) index.py.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2014-5030.html">CVE-2014-5030</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5030">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5030">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5030">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5030">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5030">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5030">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5030">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5030">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5030">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5030">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5030">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5030">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5030">SUSE bug 887240</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138200" comment="cups-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138201" comment="cups-client-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138202" comment="cups-devel-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138203" comment="cups-libs-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151187" comment="cups-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138204" comment="cups-libs-32bit-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151188" comment="cups-libs-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5031</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031" source="CVE"/>
    <description>
    The web interface in CUPS before 2.0 does not check that files have world-readable permissions, which allows remote attackers to obtains sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2014-5031.html">CVE-2014-5031</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5031">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5031">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5031">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5031">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5031">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5031">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5031">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5031">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5031">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5031">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5031">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5031">SUSE bug 887240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5031">SUSE bug 887240</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138200" comment="cups-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138201" comment="cups-client-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138202" comment="cups-devel-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138203" comment="cups-libs-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151187" comment="cups-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138204" comment="cups-libs-32bit-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151188" comment="cups-libs-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5044</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044" source="CVE"/>
    <description>
    Multiple integer overflows in libgfortran might allow remote attackers to execute arbitrary code or cause a denial of service (Fortran application crash) via vectors related to array allocation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5044.html">CVE-2014-5044</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5044">SUSE bug 888791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5044">SUSE bug 888791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5044">SUSE bug 888791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5044">SUSE bug 888791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5044">SUSE bug 888791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5044">SUSE bug 888791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5044">SUSE bug 888791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5044">SUSE bug 888791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5044">SUSE bug 888791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5044">SUSE bug 888791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5044">SUSE bug 888791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5044">SUSE bug 888791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5044">SUSE bug 888791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5044">SUSE bug 888791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5044">SUSE bug 888791</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138177" comment="cpp48-4.8.5-16.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152183" comment="cpp48 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138178" comment="gcc48-4.8.5-16.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152184" comment="gcc48 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138179" comment="gcc48-c++-4.8.5-16.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152185" comment="gcc48-c++ is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138180" comment="gcc48-fortran-4.8.5-16.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152186" comment="gcc48-fortran is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138181" comment="gcc48-gij-4.8.5-16.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152187" comment="gcc48-gij is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138182" comment="gcc48-info-4.8.5-16.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152188" comment="gcc48-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138183" comment="gcc48-java-4.8.5-16.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152189" comment="gcc48-java is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138184" comment="gcc48-locale-4.8.5-16.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152190" comment="gcc48-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138185" comment="gcc48-objc-4.8.5-16.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152191" comment="gcc48-objc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138186" comment="libasan0-4.8.5-16.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152192" comment="libasan0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138187" comment="libgcc_s1-gcc48-32bit-4.8.5-16.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152193" comment="libgcc_s1-gcc48-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138188" comment="libgcj48-4.8.5-16.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152194" comment="libgcj48 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138189" comment="libgcj48-devel-4.8.5-16.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152195" comment="libgcj48-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138190" comment="libgcj48-jar-4.8.5-16.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152196" comment="libgcj48-jar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138191" comment="libgcj_bc1-gcc48-4.8.5-16.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152197" comment="libgcj_bc1-gcc48 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138192" comment="libobjc4-4.8.5-16.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152198" comment="libobjc4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138193" comment="libstdc++48-devel-4.8.5-16.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152199" comment="libstdc++48-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138194" comment="libstdc++6-gcc48-locale-4.8.5-16.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152200" comment="libstdc++6-gcc48-locale is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5119</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5119" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119" source="CVE"/>
    <description>
    Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the CHARSET environment variable and gconv transliteration modules.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5119.html">CVE-2014-5119</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5119">SUSE bug 892073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5119">SUSE bug 892073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5119">SUSE bug 892073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5119">SUSE bug 892073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5119">SUSE bug 892073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5119">SUSE bug 892073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5119">SUSE bug 892073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5119">SUSE bug 892073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5119">SUSE bug 892073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5119">SUSE bug 892073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5119">SUSE bug 892073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5119">SUSE bug 892073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5119">SUSE bug 892073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5119">SUSE bug 892073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5119">SUSE bug 903057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5119">SUSE bug 903057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5119">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5119">SUSE bug 920055</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138343" comment="glibc-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138344" comment="glibc-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138345" comment="glibc-devel-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138346" comment="glibc-extra-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138347" comment="glibc-info-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138348" comment="glibc-locale-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138349" comment="glibc-locale-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138350" comment="nscd-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5120</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5120" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5120" source="CVE"/>
    <description>
    gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5120.html">CVE-2014-5120</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5120">SUSE bug 893855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5120">SUSE bug 893855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5120">SUSE bug 893855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5120">SUSE bug 893855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5120">SUSE bug 893855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5120">SUSE bug 893855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5120">SUSE bug 1067090</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5139</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139" source="CVE"/>
    <description>
    The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5139.html">CVE-2014-5139</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5139">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5139">SUSE bug 890765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5139">SUSE bug 890759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5139">SUSE bug 890765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5139">SUSE bug 886831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5139">SUSE bug 890765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5139">SUSE bug 890765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5139">SUSE bug 890765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5139">SUSE bug 890765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5139">SUSE bug 890765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5139">SUSE bug 890765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5139">SUSE bug 890765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5139">SUSE bug 890765</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5146</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5146" source="CVE"/>
    <description>
    Certain MMU virtualization operations in Xen 4.2.x through 4.4.x before the xsa97-hap patch, when using Hardware Assisted Paging (HAP), are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page assigned to a guest, a different vulnerability than CVE-2014-5149.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5146.html">CVE-2014-5146</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5146">SUSE bug 889526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5146">SUSE bug 889526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5146">SUSE bug 889526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5146">SUSE bug 903970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5146">SUSE bug 889526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5146">SUSE bug 918998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5146">SUSE bug 889526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5146">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5146">SUSE bug 889526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5146">SUSE bug 889526</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5149</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5149" source="CVE"/>
    <description>
    Certain MMU virtualization operations in Xen 4.2.x through 4.4.x, when using shadow pagetables, are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page assigned to a guest, a different vulnerability than CVE-2014-5146.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5149.html">CVE-2014-5149</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5149">SUSE bug 889526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5149">SUSE bug 889526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5149">SUSE bug 889526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5149">SUSE bug 903970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5149">SUSE bug 889526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5149">SUSE bug 918998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5149">SUSE bug 889526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5149">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5149">SUSE bug 889526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5149">SUSE bug 889526</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5161</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5161" source="CVE"/>
    <description>
    The dissect_log function in plugins/irda/packet-irda.c in the IrDA dissector in Wireshark 1.10.x before 1.10.9 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5161.html">CVE-2014-5161</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5161">SUSE bug 889854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5161">SUSE bug 889901</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5161">SUSE bug 889901</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5162</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5162" source="CVE"/>
    <description>
    The read_new_line function in wiretap/catapult_dct2000.c in the Catapult DCT2000 dissector in Wireshark 1.10.x before 1.10.9 does not properly strip '\n' and '\r' characters, which allows remote attackers to cause a denial of service (off-by-one buffer underflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5162.html">CVE-2014-5162</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5162">SUSE bug 889854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5162">SUSE bug 889901</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5162">SUSE bug 889901</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5163</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5163" source="CVE"/>
    <description>
    The APN decode functionality in (1) epan/dissectors/packet-gtp.c and (2) epan/dissectors/packet-gsm_a_gm.c in the GTP and GSM Management dissectors in Wireshark 1.10.x before 1.10.9 does not completely initialize a certain buffer, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5163.html">CVE-2014-5163</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5163">SUSE bug 889854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5163">SUSE bug 889906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5163">SUSE bug 889906</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5164</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5164" source="CVE"/>
    <description>
    The rlc_decode_li function in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.10.x before 1.10.9 initializes a certain structure member only after this member is used, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5164.html">CVE-2014-5164</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5164">SUSE bug 889854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5164">SUSE bug 889900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5164">SUSE bug 889900</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5165</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5165" source="CVE"/>
    <description>
    The dissect_ber_constrained_bitstring function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.10.x before 1.10.9 does not properly validate padding values, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5165.html">CVE-2014-5165</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5165">SUSE bug 889854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5165">SUSE bug 889899</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5165">SUSE bug 889899</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5351</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351" source="CVE"/>
    <description>
    The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13 sends old keys in a response to a -randkey -keepold request, which allows remote authenticated users to forge tickets by leveraging administrative access.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5351.html">CVE-2014-5351</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5351">SUSE bug 897874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5351">SUSE bug 897874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5351">SUSE bug 897874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5351">SUSE bug 897874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5351">SUSE bug 897874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5351">SUSE bug 897874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5351">SUSE bug 897874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5351">SUSE bug 897874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5351">SUSE bug 897874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5351">SUSE bug 897874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5351">SUSE bug 897874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5351">SUSE bug 897874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5351">SUSE bug 897874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5351">SUSE bug 897874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5351">SUSE bug 897874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5351">SUSE bug 897874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5351">SUSE bug 897874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5351">SUSE bug 897874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5351">SUSE bug 897874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5351">SUSE bug 897874</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5352</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352" source="CVE"/>
    <description>
    The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via crafted GSSAPI traffic, as demonstrated by traffic to kadmind.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5352.html">CVE-2014-5352</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 1005509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 1005509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 1005509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 770172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5352">SUSE bug 912002</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5353</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5353" source="CVE"/>
    <description>
    The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5353.html">CVE-2014-5353</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5353">SUSE bug 910457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5353">SUSE bug 910457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5353">SUSE bug 910457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5353">SUSE bug 910457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5353">SUSE bug 910457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5353">SUSE bug 910457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5353">SUSE bug 910457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5353">SUSE bug 910457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5353">SUSE bug 910457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5353">SUSE bug 910457</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5354</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5354" source="CVE"/>
    <description>
    plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, as demonstrated by a kadmin "add_principal -nokey" or "purgekeys -all" command.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5354.html">CVE-2014-5354</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5354">SUSE bug 910458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5354">SUSE bug 910458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5354">SUSE bug 910458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5354">SUSE bug 910458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5354">SUSE bug 910458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5354">SUSE bug 910458</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5355</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5355" source="CVE"/>
    <description>
    MIT Kerberos 5 (aka krb5) through 1.13.1 incorrectly expects that a krb5_read_message data field is represented as a string ending with a '\0' character, which allows remote attackers to (1) cause a denial of service (NULL pointer dereference) via a zero-byte version string or (2) cause a denial of service (out-of-bounds read) by omitting the '\0' character, related to appl/user_user/server.c and lib/krb5/krb/recvauth.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5355.html">CVE-2014-5355</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5355">SUSE bug 918595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5355">SUSE bug 918595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5355">SUSE bug 918595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5355">SUSE bug 918595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5355">SUSE bug 918595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5355">SUSE bug 918595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5355">SUSE bug 918595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5355">SUSE bug 918595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5355">SUSE bug 918595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5355">SUSE bug 918595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5355">SUSE bug 918595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5355">SUSE bug 770172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5355">SUSE bug 918595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5355">SUSE bug 918595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5355">SUSE bug 918595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5355">SUSE bug 918595</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5459</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5459" source="CVE"/>
    <description>
    The PEAR_REST class in REST.php in PEAR in PHP through 5.6.0 allows local users to write to arbitrary files via a symlink attack on a (1) rest.cachefile or (2) rest.cacheid file in /tmp/pear/cache/, related to the retrieveCacheFirst and useLocalCache functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5459.html">CVE-2014-5459</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5459">SUSE bug 893849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5459">SUSE bug 893849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5459">SUSE bug 893849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5459">SUSE bug 893849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5459">SUSE bug 893849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5459">SUSE bug 893849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5459">SUSE bug 893849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5459">SUSE bug 893849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5459">SUSE bug 893849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5459">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5459">SUSE bug 893849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5459">SUSE bug 893849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5459">SUSE bug 992991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5461</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-5461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5461" source="CVE"/>
    <description>
    Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-5461.html">CVE-2014-5461</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5461">SUSE bug 893824</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5461">SUSE bug 893824</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5461">SUSE bug 893824</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5461">SUSE bug 893824</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5461">SUSE bug 893824</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-5461">SUSE bug 893824</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138691" comment="liblua5_2-5.2.2-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152201" comment="liblua5_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138692" comment="lua-5.2.2-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152202" comment="lua is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138693" comment="lua-devel-5.2.2-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152203" comment="lua-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6040</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040" source="CVE"/>
    <description>
    GNU C Library (aka glibc) before 2.20 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a multibyte character value of "0xffff" to the iconv function when converting (1) IBM933, (2) IBM935, (3) IBM937, (4) IBM939, or (5) IBM1364 encoded data to UTF-8.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6040.html">CVE-2014-6040</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6040">SUSE bug 894553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6040">SUSE bug 894553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6040">SUSE bug 894553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6040">SUSE bug 894553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6040">SUSE bug 894553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6040">SUSE bug 903057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6040">SUSE bug 903057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6040">SUSE bug 894553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6040">SUSE bug 894553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6040">SUSE bug 894553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6040">SUSE bug 894553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6040">SUSE bug 894553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6040">SUSE bug 894553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6040">SUSE bug 894553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6040">SUSE bug 894553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6040">SUSE bug 916222</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138343" comment="glibc-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138344" comment="glibc-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138345" comment="glibc-devel-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138346" comment="glibc-extra-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138347" comment="glibc-info-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138348" comment="glibc-locale-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138349" comment="glibc-locale-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138350" comment="nscd-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6051</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051" source="CVE"/>
    <description>
    Integer overflow in the MallocFrameBuffer function in vncviewer.c in LibVNCServer 0.9.9 and earlier allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code via an advertisement for a large screen size, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6051.html">CVE-2014-6051</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6051">SUSE bug 897031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6051">SUSE bug 897031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6051">SUSE bug 897031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6051">SUSE bug 900896</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118828" comment="LibVNCServer-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152204" comment="LibVNCServer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118829" comment="LibVNCServer-devel-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118830" comment="libvncclient0-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118831" comment="libvncserver0-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118832" comment="linuxvnc-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152208" comment="linuxvnc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6052</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052" source="CVE"/>
    <description>
    The HandleRFBServerMessage function in libvncclient/rfbproto.c in LibVNCServer 0.9.9 and earlier does not check certain malloc return values, which allows remote VNC servers to cause a denial of service (application crash) or possibly execute arbitrary code by specifying a large screen size in a (1) FramebufferUpdate, (2) ResizeFrameBuffer, or (3) PalmVNCReSizeFrameBuffer message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6052.html">CVE-2014-6052</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6052">SUSE bug 897031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6052">SUSE bug 897031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6052">SUSE bug 897031</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118828" comment="LibVNCServer-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152204" comment="LibVNCServer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118829" comment="LibVNCServer-devel-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118830" comment="libvncclient0-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118831" comment="libvncserver0-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118832" comment="linuxvnc-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152208" comment="linuxvnc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6053</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053" source="CVE"/>
    <description>
    The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier does not properly handle attempts to send a large amount of ClientCutText data, which allows remote attackers to cause a denial of service (memory consumption or daemon crash) via a crafted message that is processed by using a single unchecked malloc.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6053.html">CVE-2014-6053</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6053">SUSE bug 897031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6053">SUSE bug 897031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6053">SUSE bug 897031</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118828" comment="LibVNCServer-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152204" comment="LibVNCServer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118829" comment="LibVNCServer-devel-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118830" comment="libvncclient0-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118831" comment="libvncserver0-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118832" comment="linuxvnc-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152208" comment="linuxvnc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6054</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054" source="CVE"/>
    <description>
    The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier allows remote attackers to cause a denial of service (divide-by-zero error and server crash) via a zero value in the scaling factor in a (1) PalmVNCSetScaleFactor or (2) SetScale message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6054.html">CVE-2014-6054</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6054">SUSE bug 897031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6054">SUSE bug 897031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6054">SUSE bug 897031</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118828" comment="LibVNCServer-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152204" comment="LibVNCServer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118829" comment="LibVNCServer-devel-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118830" comment="libvncclient0-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118831" comment="libvncserver0-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118832" comment="linuxvnc-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152208" comment="linuxvnc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6055</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6055" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the File Transfer feature in rfbserver.c in LibVNCServer 0.9.9 and earlier allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a (1) long file or (2) directory name or the (3) FileTime attribute in a rfbFileTransferOffer message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6055.html">CVE-2014-6055</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6055">SUSE bug 897031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6055">SUSE bug 897031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6055">SUSE bug 897031</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118828" comment="LibVNCServer-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152204" comment="LibVNCServer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118829" comment="LibVNCServer-devel-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118830" comment="libvncclient0-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118831" comment="libvncserver0-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118832" comment="linuxvnc-0.9.9-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152208" comment="linuxvnc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6268</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6268" source="CVE"/>
    <description>
    The evtchn_fifo_set_pending function in Xen 4.4.x allows local guest users to cause a denial of service (host crash) via vectors involving an uninitialized FIFO-based event channel control block when (1) binding or (2) moving an event to a different VCPU.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6268.html">CVE-2014-6268</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6268">SUSE bug 895804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6268">SUSE bug 895804</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6268">SUSE bug 895804</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6271</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271" source="CVE"/>
    <description>
    GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock."  NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6271.html">CVE-2014-6271</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 898346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 898604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 898346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 900127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 900127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 900454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 1024628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6271">SUSE bug 870618</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138140" comment="bash-4.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152102" comment="bash is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138141" comment="bash-doc-4.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152103" comment="bash-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138142" comment="bash-lang-4.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152104" comment="bash-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138143" comment="libreadline6-6.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152107" comment="libreadline6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138144" comment="readline-devel-6.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152108" comment="readline-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138145" comment="readline-doc-6.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152109" comment="readline-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6272</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6272" source="CVE"/>
    <description>
    Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop.  NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6272.html">CVE-2014-6272</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 897243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 897243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 897243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 897243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 897243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 897243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 897243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 897243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 897243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 897243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 897243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 897243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 897243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 897243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 897243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 943011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 947373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 947373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 947373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 947373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 947373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 897243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 947373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 897243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 943011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 1041410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 897243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6272">SUSE bug 943011</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138616" comment="libevent-2_0-5-2.0.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152209" comment="libevent-2_0-5 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6277</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277" source="CVE"/>
    <description>
    GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6277.html">CVE-2014-6277</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 900127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 900127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 900454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 900454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 900454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 900454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 900454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 900127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 900454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 900454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 900127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 900454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 900127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 900454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 900454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6277">SUSE bug 898812</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136190" comment="bash-4.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152102" comment="bash is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136191" comment="bash-devel-4.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152210" comment="bash-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136192" comment="bash-doc-4.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152103" comment="bash-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136193" comment="bash-lang-4.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152104" comment="bash-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136194" comment="bash-loadables-4.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152211" comment="bash-loadables is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136195" comment="libreadline6-6.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152107" comment="libreadline6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136196" comment="libreadline6-32bit-6.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152212" comment="libreadline6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136197" comment="readline-devel-6.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152108" comment="readline-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136198" comment="readline-devel-32bit-6.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152213" comment="readline-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136199" comment="readline-doc-6.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152109" comment="readline-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6278</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6278" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278" source="CVE"/>
    <description>
    GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6278.html">CVE-2014-6278</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 900127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6278">SUSE bug 898884</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136190" comment="bash-4.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152102" comment="bash is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136191" comment="bash-devel-4.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152210" comment="bash-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136192" comment="bash-doc-4.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152103" comment="bash-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136193" comment="bash-lang-4.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152104" comment="bash-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136194" comment="bash-loadables-4.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152211" comment="bash-loadables is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136195" comment="libreadline6-6.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152107" comment="libreadline6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136196" comment="libreadline6-32bit-6.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152212" comment="libreadline6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136197" comment="readline-devel-6.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152108" comment="readline-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136198" comment="readline-devel-32bit-6.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152213" comment="readline-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136199" comment="readline-doc-6.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152109" comment="readline-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6423</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6423" source="CVE"/>
    <description>
    The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6423.html">CVE-2014-6423</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6423">SUSE bug 897055</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6424</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6424" source="CVE"/>
    <description>
    The dissect_v9_v10_pdu_data function in epan/dissectors/packet-netflow.c in the Netflow dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 refers to incorrect offset and start variables, which allows remote attackers to cause a denial of service (uninitialized memory read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6424.html">CVE-2014-6424</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6424">SUSE bug 897055</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6425</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6425" source="CVE"/>
    <description>
    The (1) get_quoted_string and (2) get_unquoted_string functions in epan/dissectors/packet-cups.c in the CUPS dissector in Wireshark 1.12.x before 1.12.1 allow remote attackers to cause a denial of service (buffer over-read and application crash) via a CUPS packet that lacks a trailing '\0' character.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6425.html">CVE-2014-6425</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6426</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6426" source="CVE"/>
    <description>
    The dissect_hip_tlv function in epan/dissectors/packet-hip.c in the HIP dissector in Wireshark 1.12.x before 1.12.1 does not properly handle a NULL tree, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6426.html">CVE-2014-6426</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6427</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6427" source="CVE"/>
    <description>
    Off-by-one error in the is_rtsp_request_or_reply function in epan/dissectors/packet-rtsp.c in the RTSP dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers parsing of a token located one position beyond the current position.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6427.html">CVE-2014-6427</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6427">SUSE bug 897055</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6428</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6428" source="CVE"/>
    <description>
    The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6428.html">CVE-2014-6428</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6428">SUSE bug 897055</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6429</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6429" source="CVE"/>
    <description>
    The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6429.html">CVE-2014-6429</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6429">SUSE bug 897055</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6430</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6430" source="CVE"/>
    <description>
    The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6430.html">CVE-2014-6430</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6430">SUSE bug 897055</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6431</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6431" source="CVE"/>
    <description>
    Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6431.html">CVE-2014-6431</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6431">SUSE bug 897055</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6432</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6432" source="CVE"/>
    <description>
    The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6432.html">CVE-2014-6432</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6432">SUSE bug 897055</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6463</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6463" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6463.html">CVE-2014-6463</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6463">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6463">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6463">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6464</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6464" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB DML FOREIGN KEYS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6464.html">CVE-2014-6464</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6464">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6464">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6464">SUSE bug 915912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6464">SUSE bug 915912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6464">SUSE bug 915912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6464">SUSE bug 915912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6464">SUSE bug 915912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6464">SUSE bug 915912</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6469</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6469" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:OPTIMIZER.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6469.html">CVE-2014-6469</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6469">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6469">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6469">SUSE bug 915912</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6474</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6474" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:MEMCACHED.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6474.html">CVE-2014-6474</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6474">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6474">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6474">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6478</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6478" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect integrity via vectors related to SERVER:SSL:yaSSL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6478.html">CVE-2014-6478</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6478">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6478">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6478">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6484</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6484" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6484.html">CVE-2014-6484</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6484">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6484">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6484">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6489</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6489" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect integrity and availability via vectors related to SERVER:SP.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6489.html">CVE-2014-6489</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6489">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6489">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6489">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6491</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6491" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6500.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6491.html">CVE-2014-6491</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6491">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6491">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6491">SUSE bug 915912</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6494</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6494" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6496.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6494.html">CVE-2014-6494</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6494">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6494">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6494">SUSE bug 915912</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6495</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6495" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect availability via vectors related to SERVER:SSL:yaSSL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6495.html">CVE-2014-6495</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6495">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6495">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6495">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6496</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6496" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6494.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6496.html">CVE-2014-6496</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6496">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6496">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6496">SUSE bug 915912</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6500</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6500" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6491.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6500.html">CVE-2014-6500</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6500">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6500">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6500">SUSE bug 915912</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6505</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6505" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:MEMORY STORAGE ENGINE.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6505.html">CVE-2014-6505</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6505">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6505">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6505">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6507</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6507" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6507.html">CVE-2014-6507</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6507">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6507">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6507">SUSE bug 915912</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6520</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6520" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:DDL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6520.html">CVE-2014-6520</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6520">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6520">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6520">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6530</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6530" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to CLIENT:MYSQLDUMP.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6530.html">CVE-2014-6530</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6530">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6530">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6530">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6551</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6551" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality via vectors related to CLIENT:MYSQLADMIN.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6551.html">CVE-2014-6551</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6551">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6551">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6551">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6555</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6555" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6555.html">CVE-2014-6555</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6555">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6555">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6555">SUSE bug 915912</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6559</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6559" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality via vectors related to C API SSL CERTIFICATE HANDLING.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6559.html">CVE-2014-6559</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6559">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6559">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6559">SUSE bug 915912</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6564</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6564" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB FULLTEXT SEARCH DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6564.html">CVE-2014-6564</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6564">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6564">SUSE bug 901237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6564">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6568</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6568" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6568.html">CVE-2014-6568</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6568">SUSE bug 914058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6568">SUSE bug 915911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6568">SUSE bug 915911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6568">SUSE bug 915911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6568">SUSE bug 915911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6568">SUSE bug 915911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6568">SUSE bug 915911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6568">SUSE bug 915911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6568">SUSE bug 915911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6568">SUSE bug 915911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6568">SUSE bug 915911</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6588</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6588" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.3.20 allows local users to affect integrity and availability via vectors related to VMSVGA virtual graphics device, a different vulnerability than CVE-2014-6589, CVE-2014-6590, CVE-2014-6595, and CVE-2015-0427.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6588.html">CVE-2014-6588</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6588">SUSE bug 914447</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139122" comment="virtualbox-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139123" comment="virtualbox-guest-kmp-default-5.0.6_k4.1.12_1-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139124" comment="virtualbox-guest-tools-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139125" comment="virtualbox-guest-x11-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139126" comment="virtualbox-host-kmp-default-5.0.6_k4.1.12_1-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139127" comment="virtualbox-qt-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6589</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6589" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.3.20 allows local users to affect integrity and availability via vectors related to VMSVGA virtual graphics device, a different vulnerability than CVE-2014-6588, CVE-2014-6590, CVE-2014-6595, and CVE-2015-0427.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6589.html">CVE-2014-6589</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6589">SUSE bug 914447</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139122" comment="virtualbox-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139123" comment="virtualbox-guest-kmp-default-5.0.6_k4.1.12_1-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139124" comment="virtualbox-guest-tools-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139125" comment="virtualbox-guest-x11-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139126" comment="virtualbox-host-kmp-default-5.0.6_k4.1.12_1-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139127" comment="virtualbox-qt-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6590</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6590" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.3.20 allows local users to affect integrity and availability via vectors related to VMSVGA virtual graphics device, a different vulnerability than CVE-2014-6588, CVE-2014-6589, CVE-2014-6595, and CVE-2015-0427.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6590.html">CVE-2014-6590</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6590">SUSE bug 914447</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139122" comment="virtualbox-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139123" comment="virtualbox-guest-kmp-default-5.0.6_k4.1.12_1-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139124" comment="virtualbox-guest-tools-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139125" comment="virtualbox-guest-x11-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139126" comment="virtualbox-host-kmp-default-5.0.6_k4.1.12_1-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139127" comment="virtualbox-qt-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6595</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-6595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6595" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.3.20 allows local users to affect integrity and availability via vectors related to VMSVGA virtual graphics device, a different vulnerability than CVE-2014-6588, CVE-2014-6589, CVE-2014-6590, and CVE-2015-0427.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-6595.html">CVE-2014-6595</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-6595">SUSE bug 914447</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139122" comment="virtualbox-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139123" comment="virtualbox-guest-kmp-default-5.0.6_k4.1.12_1-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139124" comment="virtualbox-guest-tools-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139125" comment="virtualbox-guest-x11-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139126" comment="virtualbox-host-kmp-default-5.0.6_k4.1.12_1-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139127" comment="virtualbox-qt-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7154</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-7154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7154" source="CVE"/>
    <description>
    Race condition in HVMOP_track_dirty_vram in Xen 4.0.0 through 4.4.x does not ensure possession of the guarding lock for dirty video RAM tracking, which allows certain local guest domains to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7154.html">CVE-2014-7154</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7154">SUSE bug 895798</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7154">SUSE bug 895798</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7154">SUSE bug 880751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7154">SUSE bug 880751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7154">SUSE bug 895798</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7154">SUSE bug 895798</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7154">SUSE bug 895798</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7154">SUSE bug 895798</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7154">SUSE bug 895798</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7154">SUSE bug 895798</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7154">SUSE bug 895798</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7154">SUSE bug 895798</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7155</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-7155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7155" source="CVE"/>
    <description>
    The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7155.html">CVE-2014-7155</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7155">SUSE bug 895799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7155">SUSE bug 895799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7155">SUSE bug 880751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7155">SUSE bug 880751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7155">SUSE bug 895799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7155">SUSE bug 895799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7155">SUSE bug 895799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7155">SUSE bug 895799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7155">SUSE bug 895799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7155">SUSE bug 895799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7155">SUSE bug 895799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7155">SUSE bug 895799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7155">SUSE bug 895799</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7156</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-7156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7156" source="CVE"/>
    <description>
    The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 3.3.x through 4.4.x does not check the supervisor mode permissions for instructions that generate software interrupts, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7156.html">CVE-2014-7156</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7156">SUSE bug 895802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7156">SUSE bug 895802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7156">SUSE bug 880751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7156">SUSE bug 880751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7156">SUSE bug 895802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7156">SUSE bug 895802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7156">SUSE bug 895802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7156">SUSE bug 895802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7156">SUSE bug 895802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7156">SUSE bug 895802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7156">SUSE bug 895802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7156">SUSE bug 895802</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7169</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-7169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169" source="CVE"/>
    <description>
    GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7169.html">CVE-2014-7169</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 896776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 900127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 902237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 899266</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 902237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 902237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 926146</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 926146</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 926146</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 926146</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 926146</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 926146</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 926146</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 926146</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 926146</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 926146</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 926146</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 900127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 900454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 1024628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7169">SUSE bug 870618</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138140" comment="bash-4.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152102" comment="bash is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138141" comment="bash-doc-4.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152103" comment="bash-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138142" comment="bash-lang-4.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152104" comment="bash-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138143" comment="libreadline6-6.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152107" comment="libreadline6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138144" comment="readline-devel-6.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152108" comment="readline-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138145" comment="readline-doc-6.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152109" comment="readline-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7185</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-7185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7185" source="CVE"/>
    <description>
    Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7185.html">CVE-2014-7185</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 955182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 955182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 955182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 955182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 955182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 955182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 955182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 898572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 955182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7185">SUSE bug 913479</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138784" comment="libpython2_7-1_0-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138785" comment="libpython2_7-1_0-32bit-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138786" comment="python-base-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138787" comment="python-devel-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138788" comment="python-xml-2.7.9-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7186</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-7186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186" source="CVE"/>
    <description>
    The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7186.html">CVE-2014-7186</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7186">SUSE bug 1024628</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138140" comment="bash-4.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152102" comment="bash is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138141" comment="bash-doc-4.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152103" comment="bash-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138142" comment="bash-lang-4.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152104" comment="bash-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138143" comment="libreadline6-6.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152107" comment="libreadline6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138144" comment="readline-devel-6.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152108" comment="readline-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138145" comment="readline-doc-6.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152109" comment="readline-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7187</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-7187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187" source="CVE"/>
    <description>
    Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7187.html">CVE-2014-7187</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 898812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 898884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 898762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 898664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 900057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 898603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7187">SUSE bug 1024628</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138140" comment="bash-4.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152102" comment="bash is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138141" comment="bash-doc-4.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152103" comment="bash-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138142" comment="bash-lang-4.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152104" comment="bash-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138143" comment="libreadline6-6.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152107" comment="libreadline6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138144" comment="readline-devel-6.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152108" comment="readline-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138145" comment="readline-doc-6.2-76.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152109" comment="readline-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7188</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-7188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7188" source="CVE"/>
    <description>
    The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7188.html">CVE-2014-7188</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7188">SUSE bug 897657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7188">SUSE bug 880751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7188">SUSE bug 880751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7188">SUSE bug 897657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7188">SUSE bug 897657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7188">SUSE bug 897657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7188">SUSE bug 897657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7188">SUSE bug 897657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7188">SUSE bug 897657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7188">SUSE bug 897657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7188">SUSE bug 903970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7188">SUSE bug 897657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7188">SUSE bug 897657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7188">SUSE bug 897657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7188">SUSE bug 897657</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7204</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-7204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7204" source="CVE"/>
    <description>
    jscript.c in Exuberant Ctags 5.8 allows remote attackers to cause a denial of service (infinite loop and CPU and disk consumption) via a crafted JavaScript file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7204.html">CVE-2014-7204</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7204">SUSE bug 899486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7204">SUSE bug 899486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7204">SUSE bug 899486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7204">SUSE bug 899486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7204">SUSE bug 899486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7204">SUSE bug 899486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7204">SUSE bug 899486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7204">SUSE bug 899486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7204">SUSE bug 899486</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138199" comment="ctags-5.8-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152214" comment="ctags is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7271</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-7271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7271" source="CVE"/>
    <description>
    Simple Desktop Display Manager (SDDM) before 0.10.0 allows local users to log in as user "sddm" without authentication.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7271.html">CVE-2014-7271</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7271">SUSE bug 897788</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139088" comment="sddm-0.12.0-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152215" comment="sddm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139089" comment="sddm-branding-openSUSE-0.12.0-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152216" comment="sddm-branding-openSUSE is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7272</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-7272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7272" source="CVE"/>
    <description>
    Simple Desktop Display Manager (SDDM) before 0.10.0 allows local users to gain root privileges because code running as root performs write operations within a user home directory, and this user may have created links in advance (exploitation requires the user to win a race condition in the ~/.Xauthority chown case, but not other cases).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7272.html">CVE-2014-7272</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7272">SUSE bug 897788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7272">SUSE bug 897788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7272">SUSE bug 897788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7272">SUSE bug 897788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7272">SUSE bug 897788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7272">SUSE bug 897788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7272">SUSE bug 897788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7272">SUSE bug 897788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7272">SUSE bug 897788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7272">SUSE bug 897788</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7272">SUSE bug 897788</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139088" comment="sddm-0.12.0-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152215" comment="sddm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139089" comment="sddm-branding-openSUSE-0.12.0-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152216" comment="sddm-branding-openSUSE is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7815</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-7815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7815" source="CVE"/>
    <description>
    The set_pixel_format function in ui/vnc.c in QEMU allows remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7815.html">CVE-2014-7815</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7815">SUSE bug 902737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7815">SUSE bug 902737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7815">SUSE bug 902737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7815">SUSE bug 902737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7815">SUSE bug 902737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7815">SUSE bug 902737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7815">SUSE bug 962627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7815">SUSE bug 962627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7815">SUSE bug 962627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7815">SUSE bug 962627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7815">SUSE bug 902737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7815">SUSE bug 902737</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7817</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-7817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817" source="CVE"/>
    <description>
    The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7817.html">CVE-2014-7817</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7817">SUSE bug 906371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7817">SUSE bug 906371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7817">SUSE bug 906371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7817">SUSE bug 906371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7817">SUSE bug 906371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7817">SUSE bug 906371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7817">SUSE bug 906371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7817">SUSE bug 906371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7817">SUSE bug 906371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7817">SUSE bug 906371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7817">SUSE bug 906371</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138343" comment="glibc-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138344" comment="glibc-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138345" comment="glibc-devel-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138346" comment="glibc-extra-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138347" comment="glibc-info-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138348" comment="glibc-locale-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138349" comment="glibc-locale-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138350" comment="nscd-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7823</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-7823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823" source="CVE"/>
    <description>
    The virDomainGetXMLDesc API in Libvirt before 1.2.11 allows remote read-only users to obtain the VNC password by using the VIR_DOMAIN_XML_MIGRATABLE flag, which triggers the use of the VIR_DOMAIN_XML_SECURE flag.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7823.html">CVE-2014-7823</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7823">SUSE bug 904176</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7823">SUSE bug 904176</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7823">SUSE bug 904176</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7823">SUSE bug 904176</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7823">SUSE bug 904176</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7824</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-7824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7824" source="CVE"/>
    <description>
    D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7824.html">CVE-2014-7824</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7824">SUSE bug 904017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7824">SUSE bug 904017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7824">SUSE bug 904017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7824">SUSE bug 904017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7824">SUSE bug 904017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7824">SUSE bug 904017</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138227" comment="dbus-1-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138228" comment="dbus-1-devel-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151536" comment="dbus-1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138229" comment="dbus-1-x11-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138230" comment="libdbus-1-3-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138231" comment="libdbus-1-3-32bit-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151539" comment="libdbus-1-3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7840</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-7840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7840" source="CVE"/>
    <description>
    The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7840.html">CVE-2014-7840</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7840">SUSE bug 905097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7840">SUSE bug 905097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7840">SUSE bug 905097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7840">SUSE bug 905097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7840">SUSE bug 905097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7840">SUSE bug 905097</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7844</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-7844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7844" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-7844.html">CVE-2014-7844</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7844">SUSE bug 909208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7844">SUSE bug 909208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7844">SUSE bug 909208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7844">SUSE bug 909208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7844">SUSE bug 909208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7844">SUSE bug 909208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7844">SUSE bug 909208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-7844">SUSE bug 909208</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138984" comment="mailx-12.5-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151013" comment="mailx is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8080</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8080" source="CVE"/>
    <description>
    The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8080.html">CVE-2014-8080</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8080">SUSE bug 902851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8080">SUSE bug 902851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8080">SUSE bug 902851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8080">SUSE bug 902851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8080">SUSE bug 902851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8080">SUSE bug 902851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8080">SUSE bug 902851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8080">SUSE bug 902851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8080">SUSE bug 902851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8080">SUSE bug 902851</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138847" comment="libruby2_1-2_1-2.1.2-5.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152217" comment="libruby2_1-2_1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138848" comment="ruby2.1-2.1.2-5.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152218" comment="ruby2.1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138849" comment="ruby2.1-devel-2.1.2-5.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152219" comment="ruby2.1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138850" comment="ruby2.1-stdlib-2.1.2-5.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152220" comment="ruby2.1-stdlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8090</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8090" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8090" source="CVE"/>
    <description>
    The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8090.html">CVE-2014-8090</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8090">SUSE bug 905326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8090">SUSE bug 905326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8090">SUSE bug 905326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8090">SUSE bug 905326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8090">SUSE bug 905326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8090">SUSE bug 905326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8090">SUSE bug 905326</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138847" comment="libruby2_1-2_1-2.1.2-5.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152217" comment="libruby2_1-2_1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138848" comment="ruby2.1-2.1.2-5.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152218" comment="ruby2.1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138849" comment="ruby2.1-devel-2.1.2-5.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152219" comment="ruby2.1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138850" comment="ruby2.1-stdlib-2.1.2-5.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152220" comment="ruby2.1-stdlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8104</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8104" source="CVE"/>
    <description>
    OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8104.html">CVE-2014-8104</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8104">SUSE bug 907764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8104">SUSE bug 907764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8104">SUSE bug 907764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8104">SUSE bug 907764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8104">SUSE bug 907764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8104">SUSE bug 907764</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139008" comment="openvpn-2.3.8-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152221" comment="openvpn is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8106</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8106" source="CVE"/>
    <description>
    Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8106.html">CVE-2014-8106</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8106">SUSE bug 907805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8106">SUSE bug 907805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8106">SUSE bug 907805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8106">SUSE bug 907805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8106">SUSE bug 907805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8106">SUSE bug 907805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8106">SUSE bug 907805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8106">SUSE bug 907805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8106">SUSE bug 907805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8106">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8106">SUSE bug 1023004</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8108</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8108" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.7.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request for a URI that triggers a lookup for a virtual transaction name that does not exist.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8108.html">CVE-2014-8108</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8108">SUSE bug 909935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8108">SUSE bug 909935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8108">SUSE bug 909935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8108">SUSE bug 909935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8108">SUSE bug 909935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8108">SUSE bug 909935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8108">SUSE bug 909935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8108">SUSE bug 909935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8109</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8109" source="CVE"/>
    <description>
    mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multiple Require directives, as demonstrated by a configuration that specifies authorization for one group to access a certain directory, and authorization for a second group to access a second directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8109.html">CVE-2014-8109</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8109">SUSE bug 909715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8109">SUSE bug 909715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8109">SUSE bug 909715</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8116</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8116" source="CVE"/>
    <description>
    The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8116.html">CVE-2014-8116</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8116">SUSE bug 910252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8116">SUSE bug 910253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8116">SUSE bug 910252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8116">SUSE bug 910252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8116">SUSE bug 910252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8116">SUSE bug 910252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8116">SUSE bug 910252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8116">SUSE bug 910252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8116">SUSE bug 910252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8116">SUSE bug 910252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8116">SUSE bug 910252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8116">SUSE bug 917152</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138277" comment="file-5.19-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151700" comment="file is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138278" comment="file-devel-5.19-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151701" comment="file-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138279" comment="file-magic-5.19-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151702" comment="file-magic is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138280" comment="libmagic1-5.19-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151703" comment="libmagic1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138281" comment="libmagic1-32bit-5.19-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151704" comment="libmagic1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8117</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8117" source="CVE"/>
    <description>
    softmagic.c in file before 5.21 does not properly limit recursion, which allows remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8117.html">CVE-2014-8117</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8117">SUSE bug 910252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8117">SUSE bug 910253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8117">SUSE bug 910253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8117">SUSE bug 910253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8117">SUSE bug 910253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8117">SUSE bug 910253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8117">SUSE bug 910253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8117">SUSE bug 910253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8117">SUSE bug 910253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8117">SUSE bug 910253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8117">SUSE bug 917152</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138277" comment="file-5.19-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151700" comment="file is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138278" comment="file-devel-5.19-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151701" comment="file-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138279" comment="file-magic-5.19-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151702" comment="file-magic is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138280" comment="libmagic1-5.19-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151703" comment="libmagic1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138281" comment="libmagic1-32bit-5.19-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151704" comment="libmagic1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8118</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8118" source="CVE"/>
    <description>
    Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8118.html">CVE-2014-8118</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8118">SUSE bug 908128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8118">SUSE bug 908128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8118">SUSE bug 908128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8118">SUSE bug 908128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8118">SUSE bug 906803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8118">SUSE bug 908128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8118">SUSE bug 908128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8118">SUSE bug 908128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8118">SUSE bug 908128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8118">SUSE bug 908128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8118">SUSE bug 908128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8118">SUSE bug 908128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8118">SUSE bug 908128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8118">SUSE bug 908128</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139077" comment="rpm-4.11.2-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151943" comment="rpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139078" comment="rpm-32bit-4.11.2-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151944" comment="rpm-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139079" comment="rpm-build-4.11.2-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151945" comment="rpm-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139080" comment="rpm-devel-4.11.2-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151946" comment="rpm-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8119</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8119" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8119" source="CVE"/>
    <description>
    The find_ifcfg_path function in netcf before 0.2.7 might allow attackers to cause a denial of service (application crash) via vectors involving augeas path expressions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8119.html">CVE-2014-8119</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8119">SUSE bug 925225</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138124" comment="augeas-lenses-1.2.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151682" comment="augeas-lenses is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138125" comment="libaugeas0-1.2.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151683" comment="libaugeas0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8121</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" source="CVE"/>
    <description>
    DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up on a database while iterating over it, which triggers the file pointer to be reset.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8121.html">CVE-2014-8121</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 939211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 945779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8121">SUSE bug 918187</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138343" comment="glibc-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138344" comment="glibc-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138345" comment="glibc-devel-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138346" comment="glibc-extra-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138347" comment="glibc-info-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138348" comment="glibc-locale-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138349" comment="glibc-locale-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138350" comment="nscd-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8127</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8127" source="CVE"/>
    <description>
    LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted TIFF image to the (1) checkInkNamesString function in tif_dir.c in the thumbnail tool, (2) compresscontig function in tiff2bw.c in the tiff2bw tool, (3) putcontig8bitCIELab function in tif_getimage.c in the tiff2rgba tool, LZWPreDecode function in tif_lzw.c in the (4) tiff2ps or (5) tiffdither tool, (6) NeXTDecode function in tif_next.c in the tiffmedian tool, or (7) TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8127.html">CVE-2014-8127</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 942690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8127">SUSE bug 914890</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146601" comment="libtiff-devel-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8128</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8128" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8128.html">CVE-2014-8128</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 942690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 983436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 983436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 1017690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 1017690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 983436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8128">SUSE bug 960341</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8129</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8129" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8129" source="CVE"/>
    <description>
    LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by failure of tif_next.c to verify that the BitsPerSample value is 2, and the t2p_sample_lab_signed_to_unsigned function in tiff2pdf.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8129.html">CVE-2014-8129</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 942690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8129">SUSE bug 914890</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8130</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130" source="CVE"/>
    <description>
    The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8130.html">CVE-2014-8130</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 942690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8130">SUSE bug 914890</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8131</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8131" source="CVE"/>
    <description>
    The qemu implementation of virConnectGetAllDomainStats in libvirt before 1.2.11 does not properly handle locks when a domain is skipped due to ACL restrictions, which allows a remote authenticated users to cause a denial of service (deadlock or segmentation fault and crash) via a request to access the users does not have privileges to access.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8131.html">CVE-2014-8131</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8131">SUSE bug 909274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8131">SUSE bug 909274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8131">SUSE bug 909274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8131">SUSE bug 909274</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8132</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8132" source="CVE"/>
    <description>
    Double free vulnerability in the ssh_packet_kexinit function in kex.c in libssh 0.5.x and 0.6.x before 0.6.4 allows remote attackers to cause a denial of service via a crafted kexinit packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8132.html">CVE-2014-8132</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8132">SUSE bug 910790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8132">SUSE bug 910790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8132">SUSE bug 910790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8132">SUSE bug 910790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8132">SUSE bug 910790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8132">SUSE bug 910790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8132">SUSE bug 910790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8132">SUSE bug 928323</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009114955" comment="libssh-devel-0.6.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151771" comment="libssh-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009114957" comment="libssh4-0.6.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151772" comment="libssh4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8133</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133" source="CVE"/>
    <description>
    arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8133.html">CVE-2014-8133</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 907818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 817142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 906545</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 923485</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 923485</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8133">SUSE bug 909077</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8137</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137" source="CVE"/>
    <description>
    Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8137.html">CVE-2014-8137</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8137">SUSE bug 909474</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8137">SUSE bug 909475</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8137">SUSE bug 909474</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8137">SUSE bug 909474</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8137">SUSE bug 909474</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8137">SUSE bug 909474</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8137">SUSE bug 909474</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8137">SUSE bug 909474</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8137">SUSE bug 911837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8137">SUSE bug 909474</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8137">SUSE bug 909474</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8137">SUSE bug 968373</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138658" comment="libjasper-devel-1.900.1-164.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138659" comment="libjasper1-1.900.1-164.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138660" comment="libjasper1-32bit-1.900.1-164.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8138</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138" source="CVE"/>
    <description>
    Heap-based buffer overflow in the jp2_decode function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8138.html">CVE-2014-8138</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8138">SUSE bug 909475</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8138">SUSE bug 909474</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8138">SUSE bug 909475</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8138">SUSE bug 909475</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8138">SUSE bug 909475</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8138">SUSE bug 909475</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8138">SUSE bug 909475</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8138">SUSE bug 909475</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8138">SUSE bug 911837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8138">SUSE bug 909475</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8138">SUSE bug 909475</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138658" comment="libjasper-devel-1.900.1-164.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138659" comment="libjasper1-1.900.1-164.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138660" comment="libjasper1-32bit-1.900.1-164.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8139</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8139" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8139.html">CVE-2014-8139</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8139">SUSE bug 909214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8139">SUSE bug 909214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8139">SUSE bug 909214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8139">SUSE bug 909214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8139">SUSE bug 909214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8139">SUSE bug 909214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8139">SUSE bug 909214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8139">SUSE bug 909214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8139">SUSE bug 909214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8139">SUSE bug 909214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8139">SUSE bug 909214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8139">SUSE bug 909214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8139">SUSE bug 915880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8139">SUSE bug 909214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8139">SUSE bug 915880</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139117" comment="unzip-6.00-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152223" comment="unzip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139118" comment="unzip-doc-6.00-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152224" comment="unzip-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8140</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8140" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8140.html">CVE-2014-8140</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8140">SUSE bug 909214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8140">SUSE bug 909214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8140">SUSE bug 914442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8140">SUSE bug 915880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8140">SUSE bug 915880</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139117" comment="unzip-6.00-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152223" comment="unzip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139118" comment="unzip-doc-6.00-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152224" comment="unzip-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8141</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8141" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8141.html">CVE-2014-8141</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8141">SUSE bug 909214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8141">SUSE bug 909214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8141">SUSE bug 915880</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8141">SUSE bug 915880</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139117" comment="unzip-6.00-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152223" comment="unzip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139118" comment="unzip-doc-6.00-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152224" comment="unzip-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8142</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8142" source="CVE"/>
    <description>
    Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys within the serialized properties of an object, a different vulnerability than CVE-2004-1019.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8142.html">CVE-2014-8142</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8142">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8142">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8142">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8142">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8142">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8142">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8142">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8142">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8142">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8142">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8142">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8142">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8142">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8142">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8142">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8142">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8142">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8142">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8142">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8142">SUSE bug 910659</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8143</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8143" source="CVE"/>
    <description>
    Samba 4.0.x before 4.0.24, 4.1.x before 4.1.16, and 4.2.x before 4.2rc4, when an Active Directory Domain Controller (AD DC) is configured, allows remote authenticated users to set the LDB userAccountControl UF_SERVER_TRUST_ACCOUNT bit, and consequently gain privileges, by leveraging delegation of authority for user-account or computer-account creation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8143.html">CVE-2014-8143</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8143">SUSE bug 914279</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8146</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8146" source="CVE"/>
    <description>
    The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 does not properly track directionally isolated pieces of text, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via crafted text.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8146.html">CVE-2014-8146</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 910805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 910805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 910805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 910805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 910805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 927951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 927951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 910805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 927951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 910805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 929629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 929629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 910805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 910805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 910805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 910805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 910805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 910805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 959178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 959178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 910805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 929629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 929629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 929629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 929629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 929629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 929629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 929629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8146">SUSE bug 929629</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120451" comment="calibre-2.46.0-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152225" comment="calibre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120452" comment="fcitx-qt5-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152226" comment="fcitx-qt5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120453" comment="fcitx-qt5-32bit-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152227" comment="fcitx-qt5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120454" comment="fcitx-qt5-devel-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152228" comment="fcitx-qt5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120455" comment="frameworkintegration-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152229" comment="frameworkintegration is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120456" comment="frameworkintegration-devel-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152230" comment="frameworkintegration-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120457" comment="frameworkintegration-devel-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152231" comment="frameworkintegration-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120458" comment="frameworkintegration-plugin-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152232" comment="frameworkintegration-plugin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120459" comment="frameworkintegration-plugin-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152233" comment="frameworkintegration-plugin-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120460" comment="kwayland-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152234" comment="kwayland is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120461" comment="kwayland-32bit-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152235" comment="kwayland-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120462" comment="kwayland-devel-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152236" comment="kwayland-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120463" comment="kwayland-devel-32bit-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152237" comment="kwayland-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120464" comment="kwin5-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152238" comment="kwin5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120465" comment="kwin5-devel-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152239" comment="kwin5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120466" comment="kwin5-lang-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152240" comment="kwin5-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120467" comment="libKF5Style5-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152241" comment="libKF5Style5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120468" comment="libKF5Style5-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152242" comment="libKF5Style5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120469" comment="libKF5Style5-lang-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152243" comment="libKF5Style5-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120470" comment="libQt53DCollision-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152244" comment="libQt53DCollision-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120471" comment="libQt53DCollision5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152245" comment="libQt53DCollision5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120472" comment="libQt53DCollision5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152246" comment="libQt53DCollision5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120473" comment="libQt53DCore-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152247" comment="libQt53DCore-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120474" comment="libQt53DCore5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152248" comment="libQt53DCore5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120475" comment="libQt53DCore5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152249" comment="libQt53DCore5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120476" comment="libQt53DInput-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152250" comment="libQt53DInput-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120477" comment="libQt53DInput5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152251" comment="libQt53DInput5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120478" comment="libQt53DInput5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152252" comment="libQt53DInput5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120479" comment="libQt53DLogic-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152253" comment="libQt53DLogic-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120480" comment="libQt53DLogic5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152254" comment="libQt53DLogic5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120481" comment="libQt53DLogic5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152255" comment="libQt53DLogic5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120482" comment="libQt53DQuick-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152256" comment="libQt53DQuick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120483" comment="libQt53DQuick5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152257" comment="libQt53DQuick5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120484" comment="libQt53DQuick5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152258" comment="libQt53DQuick5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120485" comment="libQt53DQuickRenderer-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152259" comment="libQt53DQuickRenderer-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120486" comment="libQt53DQuickRenderer5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152260" comment="libQt53DQuickRenderer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120487" comment="libQt53DQuickRenderer5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152261" comment="libQt53DQuickRenderer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120488" comment="libQt53DRenderer-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152262" comment="libQt53DRenderer-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120489" comment="libQt53DRenderer5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152263" comment="libQt53DRenderer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120490" comment="libQt53DRenderer5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152264" comment="libQt53DRenderer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120491" comment="libQt5Bluetooth5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152265" comment="libQt5Bluetooth5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120492" comment="libQt5Bluetooth5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152266" comment="libQt5Bluetooth5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120493" comment="libQt5Bluetooth5-imports-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152267" comment="libQt5Bluetooth5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120494" comment="libQt5Bootstrap-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152268" comment="libQt5Bootstrap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120495" comment="libQt5Bootstrap-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152269" comment="libQt5Bootstrap-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120496" comment="libQt5CLucene5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152270" comment="libQt5CLucene5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120497" comment="libQt5CLucene5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152271" comment="libQt5CLucene5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120498" comment="libQt5Compositor5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152272" comment="libQt5Compositor5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120499" comment="libQt5Compositor5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152273" comment="libQt5Compositor5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120500" comment="libQt5Concurrent-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152274" comment="libQt5Concurrent-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120501" comment="libQt5Concurrent-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152275" comment="libQt5Concurrent-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120502" comment="libQt5Concurrent5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152276" comment="libQt5Concurrent5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120503" comment="libQt5Concurrent5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152277" comment="libQt5Concurrent5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120504" comment="libQt5Core-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152278" comment="libQt5Core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120505" comment="libQt5Core-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152279" comment="libQt5Core-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120506" comment="libQt5Core-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152280" comment="libQt5Core-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120507" comment="libQt5Core5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152281" comment="libQt5Core5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120508" comment="libQt5Core5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152282" comment="libQt5Core5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120509" comment="libQt5DBus-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152283" comment="libQt5DBus-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120510" comment="libQt5DBus-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152284" comment="libQt5DBus-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120511" comment="libQt5DBus-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152285" comment="libQt5DBus-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120512" comment="libQt5DBus5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152286" comment="libQt5DBus5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120513" comment="libQt5DBus5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152287" comment="libQt5DBus5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120514" comment="libQt5Declarative5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152288" comment="libQt5Declarative5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120515" comment="libQt5Declarative5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152289" comment="libQt5Declarative5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120516" comment="libQt5Designer5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152290" comment="libQt5Designer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120517" comment="libQt5Designer5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152291" comment="libQt5Designer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120518" comment="libQt5DesignerComponents5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152292" comment="libQt5DesignerComponents5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120519" comment="libQt5DesignerComponents5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152293" comment="libQt5DesignerComponents5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120520" comment="libQt5Gui-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152294" comment="libQt5Gui-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120521" comment="libQt5Gui-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152295" comment="libQt5Gui-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120522" comment="libQt5Gui-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152296" comment="libQt5Gui-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120523" comment="libQt5Gui5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152297" comment="libQt5Gui5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120524" comment="libQt5Gui5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152298" comment="libQt5Gui5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120525" comment="libQt5Help5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152299" comment="libQt5Help5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120526" comment="libQt5Help5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152300" comment="libQt5Help5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120527" comment="libQt5Location5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152301" comment="libQt5Location5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120528" comment="libQt5Location5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152302" comment="libQt5Location5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120529" comment="libQt5Multimedia5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152303" comment="libQt5Multimedia5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120530" comment="libQt5Multimedia5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152304" comment="libQt5Multimedia5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120531" comment="libQt5Network-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152305" comment="libQt5Network-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120532" comment="libQt5Network-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152306" comment="libQt5Network-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120533" comment="libQt5Network-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152307" comment="libQt5Network-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120534" comment="libQt5Network5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152308" comment="libQt5Network5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120535" comment="libQt5Network5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152309" comment="libQt5Network5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120536" comment="libQt5Nfc5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152310" comment="libQt5Nfc5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120537" comment="libQt5Nfc5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152311" comment="libQt5Nfc5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120538" comment="libQt5Nfc5-imports-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152312" comment="libQt5Nfc5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120539" comment="libQt5OpenGL-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152313" comment="libQt5OpenGL-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120540" comment="libQt5OpenGL-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152314" comment="libQt5OpenGL-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120541" comment="libQt5OpenGL-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152315" comment="libQt5OpenGL-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120542" comment="libQt5OpenGL5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152316" comment="libQt5OpenGL5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120543" comment="libQt5OpenGL5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152317" comment="libQt5OpenGL5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120544" comment="libQt5OpenGLExtensions-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152318" comment="libQt5OpenGLExtensions-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120545" comment="libQt5OpenGLExtensions-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152319" comment="libQt5OpenGLExtensions-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120546" comment="libQt5PlatformHeaders-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152320" comment="libQt5PlatformHeaders-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120547" comment="libQt5PlatformSupport-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152321" comment="libQt5PlatformSupport-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120548" comment="libQt5PlatformSupport-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152322" comment="libQt5PlatformSupport-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120549" comment="libQt5PlatformSupport-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152323" comment="libQt5PlatformSupport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120550" comment="libQt5Positioning5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152324" comment="libQt5Positioning5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120551" comment="libQt5Positioning5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152325" comment="libQt5Positioning5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120552" comment="libQt5PrintSupport-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152326" comment="libQt5PrintSupport-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120553" comment="libQt5PrintSupport-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152327" comment="libQt5PrintSupport-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120554" comment="libQt5PrintSupport-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152328" comment="libQt5PrintSupport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120555" comment="libQt5PrintSupport5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152329" comment="libQt5PrintSupport5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120556" comment="libQt5PrintSupport5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152330" comment="libQt5PrintSupport5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120557" comment="libQt5Script5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152331" comment="libQt5Script5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120558" comment="libQt5Script5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152332" comment="libQt5Script5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120559" comment="libQt5Sensors5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152333" comment="libQt5Sensors5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120560" comment="libQt5Sensors5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152334" comment="libQt5Sensors5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120561" comment="libQt5Sensors5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152335" comment="libQt5Sensors5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120562" comment="libQt5SerialPort5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152336" comment="libQt5SerialPort5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120563" comment="libQt5SerialPort5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152337" comment="libQt5SerialPort5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120564" comment="libQt5Sql-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152338" comment="libQt5Sql-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120565" comment="libQt5Sql-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152339" comment="libQt5Sql-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120566" comment="libQt5Sql-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152340" comment="libQt5Sql-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120567" comment="libQt5Sql5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152341" comment="libQt5Sql5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120568" comment="libQt5Sql5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152342" comment="libQt5Sql5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120569" comment="libQt5Sql5-mysql-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152343" comment="libQt5Sql5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120570" comment="libQt5Sql5-mysql-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152344" comment="libQt5Sql5-mysql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120571" comment="libQt5Sql5-postgresql-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152345" comment="libQt5Sql5-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120572" comment="libQt5Sql5-postgresql-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152346" comment="libQt5Sql5-postgresql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120573" comment="libQt5Sql5-sqlite-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152347" comment="libQt5Sql5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120574" comment="libQt5Sql5-sqlite-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152348" comment="libQt5Sql5-sqlite-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120575" comment="libQt5Sql5-unixODBC-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152349" comment="libQt5Sql5-unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120576" comment="libQt5Sql5-unixODBC-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152350" comment="libQt5Sql5-unixODBC-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120577" comment="libQt5Svg5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152351" comment="libQt5Svg5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120578" comment="libQt5Svg5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152352" comment="libQt5Svg5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120579" comment="libQt5Test-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152353" comment="libQt5Test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120580" comment="libQt5Test-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152354" comment="libQt5Test-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120581" comment="libQt5Test-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152355" comment="libQt5Test-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120582" comment="libQt5Test5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152356" comment="libQt5Test5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120583" comment="libQt5Test5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152357" comment="libQt5Test5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120584" comment="libQt5WaylandClient5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152358" comment="libQt5WaylandClient5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120585" comment="libQt5WaylandClient5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152359" comment="libQt5WaylandClient5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120586" comment="libQt5WebChannel5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152360" comment="libQt5WebChannel5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120587" comment="libQt5WebChannel5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152361" comment="libQt5WebChannel5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120588" comment="libQt5WebChannel5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152362" comment="libQt5WebChannel5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120589" comment="libQt5WebKit-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152363" comment="libQt5WebKit-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120590" comment="libQt5WebKit5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152364" comment="libQt5WebKit5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120591" comment="libQt5WebKit5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152365" comment="libQt5WebKit5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120592" comment="libQt5WebKit5-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152366" comment="libQt5WebKit5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120593" comment="libQt5WebKit5-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152367" comment="libQt5WebKit5-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120594" comment="libQt5WebKit5-imports-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152368" comment="libQt5WebKit5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120595" comment="libQt5WebKitWidgets-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152369" comment="libQt5WebKitWidgets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120596" comment="libQt5WebKitWidgets-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152370" comment="libQt5WebKitWidgets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120597" comment="libQt5WebKitWidgets-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152371" comment="libQt5WebKitWidgets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120598" comment="libQt5WebKitWidgets5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152372" comment="libQt5WebKitWidgets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120599" comment="libQt5WebKitWidgets5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152373" comment="libQt5WebKitWidgets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120600" comment="libQt5WebSockets5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152374" comment="libQt5WebSockets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120601" comment="libQt5WebSockets5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152375" comment="libQt5WebSockets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120602" comment="libQt5WebSockets5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152376" comment="libQt5WebSockets5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120603" comment="libQt5Widgets-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152377" comment="libQt5Widgets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120604" comment="libQt5Widgets-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152378" comment="libQt5Widgets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120605" comment="libQt5Widgets-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152379" comment="libQt5Widgets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120606" comment="libQt5Widgets5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152380" comment="libQt5Widgets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120607" comment="libQt5Widgets5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152381" comment="libQt5Widgets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120608" comment="libQt5X11Extras5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152382" comment="libQt5X11Extras5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120609" comment="libQt5X11Extras5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152383" comment="libQt5X11Extras5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120610" comment="libQt5Xml-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152384" comment="libQt5Xml-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120611" comment="libQt5Xml-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152385" comment="libQt5Xml-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120612" comment="libQt5Xml5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152386" comment="libQt5Xml5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120613" comment="libQt5Xml5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152387" comment="libQt5Xml5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120614" comment="libQt5XmlPatterns5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152388" comment="libQt5XmlPatterns5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120615" comment="libQt5XmlPatterns5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152389" comment="libQt5XmlPatterns5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120616" comment="libQtQuick5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152390" comment="libQtQuick5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120617" comment="libQtQuick5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152391" comment="libQtQuick5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120618" comment="libqt5-creator-3.5.1-6.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152392" comment="libqt5-creator is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120619" comment="libqt5-linguist-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152393" comment="libqt5-linguist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120620" comment="libqt5-linguist-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152394" comment="libqt5-linguist-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120621" comment="libqt5-qt3d-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152395" comment="libqt5-qt3d is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120622" comment="libqt5-qt3d-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152396" comment="libqt5-qt3d-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120623" comment="libqt5-qt3d-examples-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152397" comment="libqt5-qt3d-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120624" comment="libqt5-qt3d-imports-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152398" comment="libqt5-qt3d-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120625" comment="libqt5-qt3d-private-headers-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152399" comment="libqt5-qt3d-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120626" comment="libqt5-qtbase-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152400" comment="libqt5-qtbase is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120627" comment="libqt5-qtbase-common-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152401" comment="libqt5-qtbase-common-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120628" comment="libqt5-qtbase-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152402" comment="libqt5-qtbase-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120629" comment="libqt5-qtbase-doc-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152403" comment="libqt5-qtbase-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120630" comment="libqt5-qtbase-examples-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152404" comment="libqt5-qtbase-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120631" comment="libqt5-qtbase-examples-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152405" comment="libqt5-qtbase-examples-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120632" comment="libqt5-qtbase-platformtheme-gtk2-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152406" comment="libqt5-qtbase-platformtheme-gtk2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120633" comment="libqt5-qtbase-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152407" comment="libqt5-qtbase-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120634" comment="libqt5-qtconnectivity-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152408" comment="libqt5-qtconnectivity is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120635" comment="libqt5-qtconnectivity-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152409" comment="libqt5-qtconnectivity-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120636" comment="libqt5-qtconnectivity-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152410" comment="libqt5-qtconnectivity-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120637" comment="libqt5-qtconnectivity-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152411" comment="libqt5-qtconnectivity-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120638" comment="libqt5-qtconnectivity-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152412" comment="libqt5-qtconnectivity-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120639" comment="libqt5-qtconnectivity-tools-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152413" comment="libqt5-qtconnectivity-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120640" comment="libqt5-qtct-0.20-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152414" comment="libqt5-qtct is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120641" comment="libqt5-qtdeclarative-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152415" comment="libqt5-qtdeclarative is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120642" comment="libqt5-qtdeclarative-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152416" comment="libqt5-qtdeclarative-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120643" comment="libqt5-qtdeclarative-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152417" comment="libqt5-qtdeclarative-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120644" comment="libqt5-qtdeclarative-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152418" comment="libqt5-qtdeclarative-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120645" comment="libqt5-qtdeclarative-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152419" comment="libqt5-qtdeclarative-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120646" comment="libqt5-qtdeclarative-tools-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152420" comment="libqt5-qtdeclarative-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120647" comment="libqt5-qtdoc-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152421" comment="libqt5-qtdoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120648" comment="libqt5-qtgraphicaleffects-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152422" comment="libqt5-qtgraphicaleffects is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120649" comment="libqt5-qtimageformats-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152423" comment="libqt5-qtimageformats is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120650" comment="libqt5-qtimageformats-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152424" comment="libqt5-qtimageformats-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120651" comment="libqt5-qtimageformats-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152425" comment="libqt5-qtimageformats-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120652" comment="libqt5-qtlocation-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152426" comment="libqt5-qtlocation is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120653" comment="libqt5-qtlocation-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152427" comment="libqt5-qtlocation-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120654" comment="libqt5-qtlocation-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152428" comment="libqt5-qtlocation-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120655" comment="libqt5-qtlocation-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152429" comment="libqt5-qtlocation-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120656" comment="libqt5-qtlocation-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152430" comment="libqt5-qtlocation-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120657" comment="libqt5-qtmultimedia-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152431" comment="libqt5-qtmultimedia is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120658" comment="libqt5-qtmultimedia-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152432" comment="libqt5-qtmultimedia-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120659" comment="libqt5-qtmultimedia-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152433" comment="libqt5-qtmultimedia-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120660" comment="libqt5-qtmultimedia-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152434" comment="libqt5-qtmultimedia-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120661" comment="libqt5-qtmultimedia-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152435" comment="libqt5-qtmultimedia-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120662" comment="libqt5-qtquick1-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152436" comment="libqt5-qtquick1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120663" comment="libqt5-qtquick1-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152437" comment="libqt5-qtquick1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120664" comment="libqt5-qtquick1-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152438" comment="libqt5-qtquick1-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120665" comment="libqt5-qtquick1-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152439" comment="libqt5-qtquick1-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120666" comment="libqt5-qtquick1-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152440" comment="libqt5-qtquick1-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120667" comment="libqt5-qtquickcontrols-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152441" comment="libqt5-qtquickcontrols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120668" comment="libqt5-qtquickcontrols-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152442" comment="libqt5-qtquickcontrols-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120669" comment="libqt5-qtscript-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152443" comment="libqt5-qtscript is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120670" comment="libqt5-qtscript-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152444" comment="libqt5-qtscript-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120671" comment="libqt5-qtscript-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152445" comment="libqt5-qtscript-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120672" comment="libqt5-qtscript-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152446" comment="libqt5-qtscript-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120673" comment="libqt5-qtscript-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152447" comment="libqt5-qtscript-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120674" comment="libqt5-qtsensors-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152448" comment="libqt5-qtsensors is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120675" comment="libqt5-qtsensors-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152449" comment="libqt5-qtsensors-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120676" comment="libqt5-qtsensors-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152450" comment="libqt5-qtsensors-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120677" comment="libqt5-qtsensors-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152451" comment="libqt5-qtsensors-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120678" comment="libqt5-qtsensors-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152452" comment="libqt5-qtsensors-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120679" comment="libqt5-qtserialport-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152453" comment="libqt5-qtserialport is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120680" comment="libqt5-qtserialport-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152454" comment="libqt5-qtserialport-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120681" comment="libqt5-qtserialport-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152455" comment="libqt5-qtserialport-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120682" comment="libqt5-qtserialport-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152456" comment="libqt5-qtserialport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120683" comment="libqt5-qtsvg-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152457" comment="libqt5-qtsvg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120684" comment="libqt5-qtsvg-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152458" comment="libqt5-qtsvg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120685" comment="libqt5-qtsvg-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152459" comment="libqt5-qtsvg-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120686" comment="libqt5-qtsvg-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152460" comment="libqt5-qtsvg-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120687" comment="libqt5-qtsvg-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152461" comment="libqt5-qtsvg-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120688" comment="libqt5-qttools-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152462" comment="libqt5-qttools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120689" comment="libqt5-qttools-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152463" comment="libqt5-qttools-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120690" comment="libqt5-qttools-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152464" comment="libqt5-qttools-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120691" comment="libqt5-qttools-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152465" comment="libqt5-qttools-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120692" comment="libqt5-qttools-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152466" comment="libqt5-qttools-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120693" comment="libqt5-qttools-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152467" comment="libqt5-qttools-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120694" comment="libqt5-qttranslations-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152468" comment="libqt5-qttranslations is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120695" comment="libqt5-qtwayland-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152469" comment="libqt5-qtwayland is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120696" comment="libqt5-qtwayland-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152470" comment="libqt5-qtwayland-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120697" comment="libqt5-qtwayland-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152471" comment="libqt5-qtwayland-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120698" comment="libqt5-qtwayland-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152472" comment="libqt5-qtwayland-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120699" comment="libqt5-qtwayland-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152473" comment="libqt5-qtwayland-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120700" comment="libqt5-qtwayland-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152474" comment="libqt5-qtwayland-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120701" comment="libqt5-qtwebchannel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152475" comment="libqt5-qtwebchannel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120702" comment="libqt5-qtwebchannel-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152476" comment="libqt5-qtwebchannel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120703" comment="libqt5-qtwebchannel-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152477" comment="libqt5-qtwebchannel-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120704" comment="libqt5-qtwebchannel-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152478" comment="libqt5-qtwebchannel-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120705" comment="libqt5-qtwebchannel-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152479" comment="libqt5-qtwebchannel-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120706" comment="libqt5-qtwebengine-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120707" comment="libqt5-qtwebengine-32bit-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152481" comment="libqt5-qtwebengine-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120708" comment="libqt5-qtwebengine-devel-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120709" comment="libqt5-qtwebengine-devel-32bit-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152483" comment="libqt5-qtwebengine-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120710" comment="libqt5-qtwebengine-examples-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120711" comment="libqt5-qtwebengine-private-headers-devel-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120712" comment="libqt5-qtwebkit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152486" comment="libqt5-qtwebkit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120713" comment="libqt5-qtwebkit-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152487" comment="libqt5-qtwebkit-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120714" comment="libqt5-qtwebsockets-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152488" comment="libqt5-qtwebsockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120715" comment="libqt5-qtwebsockets-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152489" comment="libqt5-qtwebsockets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120716" comment="libqt5-qtwebsockets-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152490" comment="libqt5-qtwebsockets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120717" comment="libqt5-qtwebsockets-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152491" comment="libqt5-qtwebsockets-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120718" comment="libqt5-qtwebsockets-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152492" comment="libqt5-qtwebsockets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120719" comment="libqt5-qtx11extras-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152493" comment="libqt5-qtx11extras is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120720" comment="libqt5-qtx11extras-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152494" comment="libqt5-qtx11extras-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120721" comment="libqt5-qtx11extras-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152495" comment="libqt5-qtx11extras-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120722" comment="libqt5-qtxmlpatterns-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152496" comment="libqt5-qtxmlpatterns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120723" comment="libqt5-qtxmlpatterns-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152497" comment="libqt5-qtxmlpatterns-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120724" comment="libqt5-qtxmlpatterns-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152498" comment="libqt5-qtxmlpatterns-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120725" comment="libqt5-qtxmlpatterns-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152499" comment="libqt5-qtxmlpatterns-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120726" comment="libqt5-qtxmlpatterns-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152500" comment="libqt5-qtxmlpatterns-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120727" comment="lxqt-powermanagement-0.9.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152501" comment="lxqt-powermanagement is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120728" comment="lxqt-powermanagement-lang-0.9.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152502" comment="lxqt-powermanagement-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120729" comment="lxqt-qtplugin-0.9.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152503" comment="lxqt-qtplugin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8147</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8147" source="CVE"/>
    <description>
    The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 uses an integer data type that is inconsistent with a header file, which allows remote attackers to cause a denial of service (incorrect malloc followed by invalid free) or possibly execute arbitrary code via crafted text.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8147.html">CVE-2014-8147</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 910806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 910806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 910806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 910806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 927951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 927951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 910805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 927951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 910805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 929629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 910806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 929629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 910805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 910806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 910806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 910805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 910806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 910806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 910806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 910806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 910806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 959178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 959178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 910806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 929629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 929629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 929629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 929629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 929629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 929629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 929629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1079317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1079317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1079317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1079317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1079317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1079317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1079317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1079317</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 1066493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8147">SUSE bug 929629</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120451" comment="calibre-2.46.0-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152225" comment="calibre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120452" comment="fcitx-qt5-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152226" comment="fcitx-qt5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120453" comment="fcitx-qt5-32bit-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152227" comment="fcitx-qt5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120454" comment="fcitx-qt5-devel-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152228" comment="fcitx-qt5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120455" comment="frameworkintegration-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152229" comment="frameworkintegration is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120456" comment="frameworkintegration-devel-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152230" comment="frameworkintegration-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120457" comment="frameworkintegration-devel-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152231" comment="frameworkintegration-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120458" comment="frameworkintegration-plugin-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152232" comment="frameworkintegration-plugin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120459" comment="frameworkintegration-plugin-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152233" comment="frameworkintegration-plugin-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120460" comment="kwayland-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152234" comment="kwayland is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120461" comment="kwayland-32bit-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152235" comment="kwayland-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120462" comment="kwayland-devel-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152236" comment="kwayland-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120463" comment="kwayland-devel-32bit-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152237" comment="kwayland-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120464" comment="kwin5-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152238" comment="kwin5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120465" comment="kwin5-devel-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152239" comment="kwin5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120466" comment="kwin5-lang-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152240" comment="kwin5-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120467" comment="libKF5Style5-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152241" comment="libKF5Style5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120468" comment="libKF5Style5-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152242" comment="libKF5Style5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120469" comment="libKF5Style5-lang-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152243" comment="libKF5Style5-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120470" comment="libQt53DCollision-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152244" comment="libQt53DCollision-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120471" comment="libQt53DCollision5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152245" comment="libQt53DCollision5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120472" comment="libQt53DCollision5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152246" comment="libQt53DCollision5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120473" comment="libQt53DCore-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152247" comment="libQt53DCore-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120474" comment="libQt53DCore5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152248" comment="libQt53DCore5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120475" comment="libQt53DCore5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152249" comment="libQt53DCore5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120476" comment="libQt53DInput-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152250" comment="libQt53DInput-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120477" comment="libQt53DInput5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152251" comment="libQt53DInput5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120478" comment="libQt53DInput5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152252" comment="libQt53DInput5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120479" comment="libQt53DLogic-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152253" comment="libQt53DLogic-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120480" comment="libQt53DLogic5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152254" comment="libQt53DLogic5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120481" comment="libQt53DLogic5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152255" comment="libQt53DLogic5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120482" comment="libQt53DQuick-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152256" comment="libQt53DQuick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120483" comment="libQt53DQuick5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152257" comment="libQt53DQuick5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120484" comment="libQt53DQuick5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152258" comment="libQt53DQuick5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120485" comment="libQt53DQuickRenderer-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152259" comment="libQt53DQuickRenderer-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120486" comment="libQt53DQuickRenderer5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152260" comment="libQt53DQuickRenderer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120487" comment="libQt53DQuickRenderer5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152261" comment="libQt53DQuickRenderer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120488" comment="libQt53DRenderer-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152262" comment="libQt53DRenderer-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120489" comment="libQt53DRenderer5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152263" comment="libQt53DRenderer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120490" comment="libQt53DRenderer5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152264" comment="libQt53DRenderer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120491" comment="libQt5Bluetooth5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152265" comment="libQt5Bluetooth5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120492" comment="libQt5Bluetooth5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152266" comment="libQt5Bluetooth5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120493" comment="libQt5Bluetooth5-imports-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152267" comment="libQt5Bluetooth5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120494" comment="libQt5Bootstrap-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152268" comment="libQt5Bootstrap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120495" comment="libQt5Bootstrap-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152269" comment="libQt5Bootstrap-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120496" comment="libQt5CLucene5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152270" comment="libQt5CLucene5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120497" comment="libQt5CLucene5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152271" comment="libQt5CLucene5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120498" comment="libQt5Compositor5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152272" comment="libQt5Compositor5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120499" comment="libQt5Compositor5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152273" comment="libQt5Compositor5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120500" comment="libQt5Concurrent-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152274" comment="libQt5Concurrent-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120501" comment="libQt5Concurrent-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152275" comment="libQt5Concurrent-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120502" comment="libQt5Concurrent5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152276" comment="libQt5Concurrent5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120503" comment="libQt5Concurrent5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152277" comment="libQt5Concurrent5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120504" comment="libQt5Core-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152278" comment="libQt5Core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120505" comment="libQt5Core-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152279" comment="libQt5Core-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120506" comment="libQt5Core-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152280" comment="libQt5Core-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120507" comment="libQt5Core5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152281" comment="libQt5Core5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120508" comment="libQt5Core5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152282" comment="libQt5Core5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120509" comment="libQt5DBus-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152283" comment="libQt5DBus-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120510" comment="libQt5DBus-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152284" comment="libQt5DBus-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120511" comment="libQt5DBus-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152285" comment="libQt5DBus-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120512" comment="libQt5DBus5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152286" comment="libQt5DBus5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120513" comment="libQt5DBus5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152287" comment="libQt5DBus5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120514" comment="libQt5Declarative5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152288" comment="libQt5Declarative5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120515" comment="libQt5Declarative5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152289" comment="libQt5Declarative5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120516" comment="libQt5Designer5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152290" comment="libQt5Designer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120517" comment="libQt5Designer5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152291" comment="libQt5Designer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120518" comment="libQt5DesignerComponents5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152292" comment="libQt5DesignerComponents5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120519" comment="libQt5DesignerComponents5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152293" comment="libQt5DesignerComponents5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120520" comment="libQt5Gui-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152294" comment="libQt5Gui-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120521" comment="libQt5Gui-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152295" comment="libQt5Gui-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120522" comment="libQt5Gui-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152296" comment="libQt5Gui-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120523" comment="libQt5Gui5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152297" comment="libQt5Gui5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120524" comment="libQt5Gui5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152298" comment="libQt5Gui5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120525" comment="libQt5Help5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152299" comment="libQt5Help5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120526" comment="libQt5Help5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152300" comment="libQt5Help5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120527" comment="libQt5Location5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152301" comment="libQt5Location5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120528" comment="libQt5Location5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152302" comment="libQt5Location5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120529" comment="libQt5Multimedia5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152303" comment="libQt5Multimedia5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120530" comment="libQt5Multimedia5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152304" comment="libQt5Multimedia5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120531" comment="libQt5Network-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152305" comment="libQt5Network-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120532" comment="libQt5Network-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152306" comment="libQt5Network-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120533" comment="libQt5Network-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152307" comment="libQt5Network-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120534" comment="libQt5Network5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152308" comment="libQt5Network5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120535" comment="libQt5Network5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152309" comment="libQt5Network5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120536" comment="libQt5Nfc5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152310" comment="libQt5Nfc5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120537" comment="libQt5Nfc5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152311" comment="libQt5Nfc5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120538" comment="libQt5Nfc5-imports-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152312" comment="libQt5Nfc5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120539" comment="libQt5OpenGL-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152313" comment="libQt5OpenGL-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120540" comment="libQt5OpenGL-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152314" comment="libQt5OpenGL-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120541" comment="libQt5OpenGL-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152315" comment="libQt5OpenGL-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120542" comment="libQt5OpenGL5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152316" comment="libQt5OpenGL5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120543" comment="libQt5OpenGL5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152317" comment="libQt5OpenGL5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120544" comment="libQt5OpenGLExtensions-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152318" comment="libQt5OpenGLExtensions-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120545" comment="libQt5OpenGLExtensions-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152319" comment="libQt5OpenGLExtensions-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120546" comment="libQt5PlatformHeaders-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152320" comment="libQt5PlatformHeaders-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120547" comment="libQt5PlatformSupport-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152321" comment="libQt5PlatformSupport-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120548" comment="libQt5PlatformSupport-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152322" comment="libQt5PlatformSupport-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120549" comment="libQt5PlatformSupport-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152323" comment="libQt5PlatformSupport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120550" comment="libQt5Positioning5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152324" comment="libQt5Positioning5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120551" comment="libQt5Positioning5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152325" comment="libQt5Positioning5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120552" comment="libQt5PrintSupport-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152326" comment="libQt5PrintSupport-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120553" comment="libQt5PrintSupport-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152327" comment="libQt5PrintSupport-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120554" comment="libQt5PrintSupport-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152328" comment="libQt5PrintSupport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120555" comment="libQt5PrintSupport5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152329" comment="libQt5PrintSupport5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120556" comment="libQt5PrintSupport5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152330" comment="libQt5PrintSupport5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120557" comment="libQt5Script5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152331" comment="libQt5Script5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120558" comment="libQt5Script5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152332" comment="libQt5Script5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120559" comment="libQt5Sensors5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152333" comment="libQt5Sensors5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120560" comment="libQt5Sensors5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152334" comment="libQt5Sensors5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120561" comment="libQt5Sensors5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152335" comment="libQt5Sensors5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120562" comment="libQt5SerialPort5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152336" comment="libQt5SerialPort5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120563" comment="libQt5SerialPort5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152337" comment="libQt5SerialPort5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120564" comment="libQt5Sql-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152338" comment="libQt5Sql-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120565" comment="libQt5Sql-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152339" comment="libQt5Sql-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120566" comment="libQt5Sql-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152340" comment="libQt5Sql-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120567" comment="libQt5Sql5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152341" comment="libQt5Sql5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120568" comment="libQt5Sql5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152342" comment="libQt5Sql5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120569" comment="libQt5Sql5-mysql-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152343" comment="libQt5Sql5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120570" comment="libQt5Sql5-mysql-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152344" comment="libQt5Sql5-mysql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120571" comment="libQt5Sql5-postgresql-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152345" comment="libQt5Sql5-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120572" comment="libQt5Sql5-postgresql-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152346" comment="libQt5Sql5-postgresql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120573" comment="libQt5Sql5-sqlite-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152347" comment="libQt5Sql5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120574" comment="libQt5Sql5-sqlite-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152348" comment="libQt5Sql5-sqlite-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120575" comment="libQt5Sql5-unixODBC-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152349" comment="libQt5Sql5-unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120576" comment="libQt5Sql5-unixODBC-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152350" comment="libQt5Sql5-unixODBC-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120577" comment="libQt5Svg5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152351" comment="libQt5Svg5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120578" comment="libQt5Svg5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152352" comment="libQt5Svg5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120579" comment="libQt5Test-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152353" comment="libQt5Test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120580" comment="libQt5Test-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152354" comment="libQt5Test-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120581" comment="libQt5Test-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152355" comment="libQt5Test-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120582" comment="libQt5Test5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152356" comment="libQt5Test5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120583" comment="libQt5Test5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152357" comment="libQt5Test5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120584" comment="libQt5WaylandClient5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152358" comment="libQt5WaylandClient5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120585" comment="libQt5WaylandClient5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152359" comment="libQt5WaylandClient5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120586" comment="libQt5WebChannel5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152360" comment="libQt5WebChannel5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120587" comment="libQt5WebChannel5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152361" comment="libQt5WebChannel5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120588" comment="libQt5WebChannel5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152362" comment="libQt5WebChannel5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120589" comment="libQt5WebKit-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152363" comment="libQt5WebKit-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120590" comment="libQt5WebKit5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152364" comment="libQt5WebKit5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120591" comment="libQt5WebKit5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152365" comment="libQt5WebKit5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120592" comment="libQt5WebKit5-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152366" comment="libQt5WebKit5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120593" comment="libQt5WebKit5-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152367" comment="libQt5WebKit5-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120594" comment="libQt5WebKit5-imports-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152368" comment="libQt5WebKit5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120595" comment="libQt5WebKitWidgets-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152369" comment="libQt5WebKitWidgets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120596" comment="libQt5WebKitWidgets-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152370" comment="libQt5WebKitWidgets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120597" comment="libQt5WebKitWidgets-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152371" comment="libQt5WebKitWidgets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120598" comment="libQt5WebKitWidgets5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152372" comment="libQt5WebKitWidgets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120599" comment="libQt5WebKitWidgets5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152373" comment="libQt5WebKitWidgets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120600" comment="libQt5WebSockets5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152374" comment="libQt5WebSockets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120601" comment="libQt5WebSockets5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152375" comment="libQt5WebSockets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120602" comment="libQt5WebSockets5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152376" comment="libQt5WebSockets5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120603" comment="libQt5Widgets-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152377" comment="libQt5Widgets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120604" comment="libQt5Widgets-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152378" comment="libQt5Widgets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120605" comment="libQt5Widgets-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152379" comment="libQt5Widgets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120606" comment="libQt5Widgets5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152380" comment="libQt5Widgets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120607" comment="libQt5Widgets5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152381" comment="libQt5Widgets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120608" comment="libQt5X11Extras5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152382" comment="libQt5X11Extras5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120609" comment="libQt5X11Extras5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152383" comment="libQt5X11Extras5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120610" comment="libQt5Xml-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152384" comment="libQt5Xml-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120611" comment="libQt5Xml-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152385" comment="libQt5Xml-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120612" comment="libQt5Xml5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152386" comment="libQt5Xml5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120613" comment="libQt5Xml5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152387" comment="libQt5Xml5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120614" comment="libQt5XmlPatterns5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152388" comment="libQt5XmlPatterns5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120615" comment="libQt5XmlPatterns5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152389" comment="libQt5XmlPatterns5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120616" comment="libQtQuick5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152390" comment="libQtQuick5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120617" comment="libQtQuick5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152391" comment="libQtQuick5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120618" comment="libqt5-creator-3.5.1-6.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152392" comment="libqt5-creator is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120619" comment="libqt5-linguist-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152393" comment="libqt5-linguist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120620" comment="libqt5-linguist-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152394" comment="libqt5-linguist-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120621" comment="libqt5-qt3d-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152395" comment="libqt5-qt3d is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120622" comment="libqt5-qt3d-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152396" comment="libqt5-qt3d-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120623" comment="libqt5-qt3d-examples-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152397" comment="libqt5-qt3d-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120624" comment="libqt5-qt3d-imports-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152398" comment="libqt5-qt3d-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120625" comment="libqt5-qt3d-private-headers-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152399" comment="libqt5-qt3d-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120626" comment="libqt5-qtbase-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152400" comment="libqt5-qtbase is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120627" comment="libqt5-qtbase-common-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152401" comment="libqt5-qtbase-common-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120628" comment="libqt5-qtbase-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152402" comment="libqt5-qtbase-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120629" comment="libqt5-qtbase-doc-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152403" comment="libqt5-qtbase-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120630" comment="libqt5-qtbase-examples-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152404" comment="libqt5-qtbase-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120631" comment="libqt5-qtbase-examples-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152405" comment="libqt5-qtbase-examples-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120632" comment="libqt5-qtbase-platformtheme-gtk2-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152406" comment="libqt5-qtbase-platformtheme-gtk2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120633" comment="libqt5-qtbase-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152407" comment="libqt5-qtbase-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120634" comment="libqt5-qtconnectivity-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152408" comment="libqt5-qtconnectivity is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120635" comment="libqt5-qtconnectivity-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152409" comment="libqt5-qtconnectivity-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120636" comment="libqt5-qtconnectivity-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152410" comment="libqt5-qtconnectivity-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120637" comment="libqt5-qtconnectivity-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152411" comment="libqt5-qtconnectivity-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120638" comment="libqt5-qtconnectivity-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152412" comment="libqt5-qtconnectivity-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120639" comment="libqt5-qtconnectivity-tools-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152413" comment="libqt5-qtconnectivity-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120640" comment="libqt5-qtct-0.20-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152414" comment="libqt5-qtct is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120641" comment="libqt5-qtdeclarative-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152415" comment="libqt5-qtdeclarative is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120642" comment="libqt5-qtdeclarative-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152416" comment="libqt5-qtdeclarative-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120643" comment="libqt5-qtdeclarative-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152417" comment="libqt5-qtdeclarative-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120644" comment="libqt5-qtdeclarative-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152418" comment="libqt5-qtdeclarative-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120645" comment="libqt5-qtdeclarative-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152419" comment="libqt5-qtdeclarative-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120646" comment="libqt5-qtdeclarative-tools-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152420" comment="libqt5-qtdeclarative-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120647" comment="libqt5-qtdoc-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152421" comment="libqt5-qtdoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120648" comment="libqt5-qtgraphicaleffects-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152422" comment="libqt5-qtgraphicaleffects is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120649" comment="libqt5-qtimageformats-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152423" comment="libqt5-qtimageformats is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120650" comment="libqt5-qtimageformats-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152424" comment="libqt5-qtimageformats-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120651" comment="libqt5-qtimageformats-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152425" comment="libqt5-qtimageformats-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120652" comment="libqt5-qtlocation-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152426" comment="libqt5-qtlocation is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120653" comment="libqt5-qtlocation-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152427" comment="libqt5-qtlocation-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120654" comment="libqt5-qtlocation-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152428" comment="libqt5-qtlocation-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120655" comment="libqt5-qtlocation-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152429" comment="libqt5-qtlocation-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120656" comment="libqt5-qtlocation-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152430" comment="libqt5-qtlocation-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120657" comment="libqt5-qtmultimedia-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152431" comment="libqt5-qtmultimedia is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120658" comment="libqt5-qtmultimedia-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152432" comment="libqt5-qtmultimedia-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120659" comment="libqt5-qtmultimedia-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152433" comment="libqt5-qtmultimedia-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120660" comment="libqt5-qtmultimedia-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152434" comment="libqt5-qtmultimedia-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120661" comment="libqt5-qtmultimedia-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152435" comment="libqt5-qtmultimedia-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120662" comment="libqt5-qtquick1-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152436" comment="libqt5-qtquick1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120663" comment="libqt5-qtquick1-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152437" comment="libqt5-qtquick1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120664" comment="libqt5-qtquick1-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152438" comment="libqt5-qtquick1-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120665" comment="libqt5-qtquick1-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152439" comment="libqt5-qtquick1-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120666" comment="libqt5-qtquick1-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152440" comment="libqt5-qtquick1-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120667" comment="libqt5-qtquickcontrols-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152441" comment="libqt5-qtquickcontrols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120668" comment="libqt5-qtquickcontrols-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152442" comment="libqt5-qtquickcontrols-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120669" comment="libqt5-qtscript-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152443" comment="libqt5-qtscript is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120670" comment="libqt5-qtscript-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152444" comment="libqt5-qtscript-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120671" comment="libqt5-qtscript-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152445" comment="libqt5-qtscript-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120672" comment="libqt5-qtscript-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152446" comment="libqt5-qtscript-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120673" comment="libqt5-qtscript-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152447" comment="libqt5-qtscript-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120674" comment="libqt5-qtsensors-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152448" comment="libqt5-qtsensors is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120675" comment="libqt5-qtsensors-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152449" comment="libqt5-qtsensors-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120676" comment="libqt5-qtsensors-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152450" comment="libqt5-qtsensors-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120677" comment="libqt5-qtsensors-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152451" comment="libqt5-qtsensors-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120678" comment="libqt5-qtsensors-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152452" comment="libqt5-qtsensors-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120679" comment="libqt5-qtserialport-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152453" comment="libqt5-qtserialport is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120680" comment="libqt5-qtserialport-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152454" comment="libqt5-qtserialport-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120681" comment="libqt5-qtserialport-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152455" comment="libqt5-qtserialport-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120682" comment="libqt5-qtserialport-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152456" comment="libqt5-qtserialport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120683" comment="libqt5-qtsvg-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152457" comment="libqt5-qtsvg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120684" comment="libqt5-qtsvg-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152458" comment="libqt5-qtsvg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120685" comment="libqt5-qtsvg-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152459" comment="libqt5-qtsvg-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120686" comment="libqt5-qtsvg-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152460" comment="libqt5-qtsvg-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120687" comment="libqt5-qtsvg-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152461" comment="libqt5-qtsvg-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120688" comment="libqt5-qttools-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152462" comment="libqt5-qttools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120689" comment="libqt5-qttools-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152463" comment="libqt5-qttools-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120690" comment="libqt5-qttools-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152464" comment="libqt5-qttools-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120691" comment="libqt5-qttools-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152465" comment="libqt5-qttools-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120692" comment="libqt5-qttools-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152466" comment="libqt5-qttools-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120693" comment="libqt5-qttools-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152467" comment="libqt5-qttools-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120694" comment="libqt5-qttranslations-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152468" comment="libqt5-qttranslations is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120695" comment="libqt5-qtwayland-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152469" comment="libqt5-qtwayland is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120696" comment="libqt5-qtwayland-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152470" comment="libqt5-qtwayland-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120697" comment="libqt5-qtwayland-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152471" comment="libqt5-qtwayland-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120698" comment="libqt5-qtwayland-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152472" comment="libqt5-qtwayland-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120699" comment="libqt5-qtwayland-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152473" comment="libqt5-qtwayland-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120700" comment="libqt5-qtwayland-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152474" comment="libqt5-qtwayland-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120701" comment="libqt5-qtwebchannel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152475" comment="libqt5-qtwebchannel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120702" comment="libqt5-qtwebchannel-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152476" comment="libqt5-qtwebchannel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120703" comment="libqt5-qtwebchannel-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152477" comment="libqt5-qtwebchannel-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120704" comment="libqt5-qtwebchannel-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152478" comment="libqt5-qtwebchannel-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120705" comment="libqt5-qtwebchannel-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152479" comment="libqt5-qtwebchannel-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120706" comment="libqt5-qtwebengine-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120707" comment="libqt5-qtwebengine-32bit-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152481" comment="libqt5-qtwebengine-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120708" comment="libqt5-qtwebengine-devel-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120709" comment="libqt5-qtwebengine-devel-32bit-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152483" comment="libqt5-qtwebengine-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120710" comment="libqt5-qtwebengine-examples-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120711" comment="libqt5-qtwebengine-private-headers-devel-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120712" comment="libqt5-qtwebkit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152486" comment="libqt5-qtwebkit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120713" comment="libqt5-qtwebkit-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152487" comment="libqt5-qtwebkit-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120714" comment="libqt5-qtwebsockets-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152488" comment="libqt5-qtwebsockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120715" comment="libqt5-qtwebsockets-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152489" comment="libqt5-qtwebsockets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120716" comment="libqt5-qtwebsockets-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152490" comment="libqt5-qtwebsockets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120717" comment="libqt5-qtwebsockets-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152491" comment="libqt5-qtwebsockets-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120718" comment="libqt5-qtwebsockets-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152492" comment="libqt5-qtwebsockets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120719" comment="libqt5-qtx11extras-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152493" comment="libqt5-qtx11extras is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120720" comment="libqt5-qtx11extras-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152494" comment="libqt5-qtx11extras-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120721" comment="libqt5-qtx11extras-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152495" comment="libqt5-qtx11extras-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120722" comment="libqt5-qtxmlpatterns-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152496" comment="libqt5-qtxmlpatterns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120723" comment="libqt5-qtxmlpatterns-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152497" comment="libqt5-qtxmlpatterns-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120724" comment="libqt5-qtxmlpatterns-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152498" comment="libqt5-qtxmlpatterns-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120725" comment="libqt5-qtxmlpatterns-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152499" comment="libqt5-qtxmlpatterns-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120726" comment="libqt5-qtxmlpatterns-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152500" comment="libqt5-qtxmlpatterns-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120727" comment="lxqt-powermanagement-0.9.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152501" comment="lxqt-powermanagement is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120728" comment="lxqt-powermanagement-lang-0.9.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152502" comment="lxqt-powermanagement-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120729" comment="lxqt-qtplugin-0.9.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152503" comment="lxqt-qtplugin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8148</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8148" source="CVE"/>
    <description>
    The default D-Bus access control rule in Midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8148.html">CVE-2014-8148</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8148">SUSE bug 912023</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138227" comment="dbus-1-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138228" comment="dbus-1-devel-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151536" comment="dbus-1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138229" comment="dbus-1-x11-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138230" comment="libdbus-1-3-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138231" comment="libdbus-1-3-32bit-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151539" comment="libdbus-1-3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8150</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150" source="CVE"/>
    <description>
    CRLF injection vulnerability in libcurl 6.0 through 7.x before 7.40.0, when using an HTTP proxy, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in a URL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8150.html">CVE-2014-8150</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8150">SUSE bug 911363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8150">SUSE bug 911363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8150">SUSE bug 911363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8150">SUSE bug 911363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8150">SUSE bug 911363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8150">SUSE bug 911363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8150">SUSE bug 911363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8150">SUSE bug 911363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8150">SUSE bug 911363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8150">SUSE bug 911363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8150">SUSE bug 911363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8150">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8150">SUSE bug 911363</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138211" comment="curl-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138212" comment="libcurl-devel-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138213" comment="libcurl4-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8157</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157" source="CVE"/>
    <description>
    Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8157.html">CVE-2014-8157</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8157">SUSE bug 911837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8157">SUSE bug 911837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8157">SUSE bug 911837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8157">SUSE bug 911837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8157">SUSE bug 911837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8157">SUSE bug 911837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8157">SUSE bug 911837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8157">SUSE bug 911837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8157">SUSE bug 911837</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138658" comment="libjasper-devel-1.900.1-164.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138659" comment="libjasper1-1.900.1-164.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138660" comment="libjasper1-32bit-1.900.1-164.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8158</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8158.html">CVE-2014-8158</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8158">SUSE bug 911837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8158">SUSE bug 911837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8158">SUSE bug 911837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8158">SUSE bug 911837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8158">SUSE bug 911837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8158">SUSE bug 911837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8158">SUSE bug 911837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8158">SUSE bug 911837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8158">SUSE bug 911837</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135598" comment="jasper-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138658" comment="libjasper-devel-1.900.1-164.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138659" comment="libjasper1-1.900.1-164.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138660" comment="libjasper1-32bit-1.900.1-164.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8169</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8169" source="CVE"/>
    <description>
    automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8169.html">CVE-2014-8169</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8169">SUSE bug 917977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8169">SUSE bug 917977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8169">SUSE bug 917977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8169">SUSE bug 917977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8169">SUSE bug 917977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8169">SUSE bug 917977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8169">SUSE bug 917977</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138126" comment="autofs-5.0.9-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152504" comment="autofs is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8178</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8178" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8178.html">CVE-2014-8178</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8178">SUSE bug 949660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8178">SUSE bug 949660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8178">SUSE bug 949660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8178">SUSE bug 949660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8178">SUSE bug 949660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8178">SUSE bug 949660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8178">SUSE bug 949660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8178">SUSE bug 949660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8178">SUSE bug 949660</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118073" comment="docker-1.9.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118074" comment="docker-bash-completion-1.9.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118075" comment="docker-test-1.9.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152507" comment="docker-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118076" comment="docker-zsh-completion-1.9.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8179</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8179" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8179.html">CVE-2014-8179</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8179">SUSE bug 949660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8179">SUSE bug 949660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8179">SUSE bug 949660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8179">SUSE bug 949660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8179">SUSE bug 949660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8179">SUSE bug 949660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8179">SUSE bug 949660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8179">SUSE bug 949660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8179">SUSE bug 949660</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118073" comment="docker-1.9.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118074" comment="docker-bash-completion-1.9.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118075" comment="docker-test-1.9.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152507" comment="docker-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118076" comment="docker-zsh-completion-1.9.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8240</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8240" source="CVE"/>
    <description>
    Integer overflow in TigerVNC allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to screen size handling, which triggers a heap-based buffer overflow, a similar issue to CVE-2014-6051.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8240.html">CVE-2014-8240</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8240">SUSE bug 900896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8240">SUSE bug 900896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8240">SUSE bug 900896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8240">SUSE bug 900896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8240">SUSE bug 900896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8240">SUSE bug 900896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8240">SUSE bug 900896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8240">SUSE bug 900896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8240">SUSE bug 900896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8240">SUSE bug 900896</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139109" comment="tigervnc-1.5.0-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152053" comment="tigervnc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139110" comment="xorg-x11-Xvnc-1.5.0-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152054" comment="xorg-x11-Xvnc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8242</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8242" source="CVE"/>
    <description>
    librsync before 1.0.0 uses a truncated MD4 checksum to match blocks, which makes it easier for remote attackers to modify transmitted data via a birthday attack.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8242.html">CVE-2014-8242</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 922710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 922710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8242">SUSE bug 900914</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138846" comment="librsync2-1.0.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152509" comment="librsync2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139081" comment="rsync-3.1.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151567" comment="rsync is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8275</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275" source="CVE"/>
    <description>
    OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8275.html">CVE-2014-8275</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 911906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 911906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 911906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 920339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 937891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8275">SUSE bug 912018</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8354</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8354" source="CVE"/>
    <description>
    The HorizontalFilter function in resize.c in ImageMagick before 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8354.html">CVE-2014-8354</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8354">SUSE bug 903204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8354">SUSE bug 903204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8354">SUSE bug 903204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8354">SUSE bug 903204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8354">SUSE bug 903638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8354">SUSE bug 903204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8354">SUSE bug 903204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8354">SUSE bug 903204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138035" comment="ImageMagick-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138036" comment="ImageMagick-devel-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138037" comment="ImageMagick-doc-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138038" comment="ImageMagick-extra-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138039" comment="libMagick++-6_Q16-3-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138040" comment="libMagickCore-6_Q16-1-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138041" comment="libMagickWand-6_Q16-1-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138042" comment="perl-PerlMagick-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8355</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8355" source="CVE"/>
    <description>
    PCX parser code in ImageMagick before 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds read).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8355.html">CVE-2014-8355</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8355">SUSE bug 903216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8355">SUSE bug 903216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8355">SUSE bug 903216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8355">SUSE bug 903216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8355">SUSE bug 903638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8355">SUSE bug 903216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8355">SUSE bug 903216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8355">SUSE bug 903216</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138035" comment="ImageMagick-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138036" comment="ImageMagick-devel-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138037" comment="ImageMagick-doc-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138038" comment="ImageMagick-extra-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138039" comment="libMagick++-6_Q16-3-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138040" comment="libMagickCore-6_Q16-1-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138041" comment="libMagickWand-6_Q16-1-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138042" comment="perl-PerlMagick-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8483</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8483" source="CVE"/>
    <description>
    The blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a malformed string.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8483.html">CVE-2014-8483</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8483">SUSE bug 902670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8483">SUSE bug 902670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8483">SUSE bug 902670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8483">SUSE bug 902670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8483">SUSE bug 902670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8483">SUSE bug 902670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8483">SUSE bug 902670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8483">SUSE bug 902670</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138447" comment="konversation-1.6-2.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152510" comment="konversation is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138448" comment="konversation-lang-1.6-2.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152511" comment="konversation-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8484</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8484" source="CVE"/>
    <description>
    The srec_scan function in bfd/srec.c in libdbfd in GNU binutils before 2.25 allows remote attackers to cause a denial of service (out-of-bounds read) via a small S-record.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8484.html">CVE-2014-8484</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8484">SUSE bug 902677</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8484">SUSE bug 902677</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8484">SUSE bug 902677</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8484">SUSE bug 902677</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8484">SUSE bug 902677</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8484">SUSE bug 902676</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138151" comment="binutils-2.25.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138152" comment="binutils-devel-2.25.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8485</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8485" source="CVE"/>
    <description>
    The setup_group function in bfd/elf.c in libbfd in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted section group headers in an ELF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8485.html">CVE-2014-8485</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8485">SUSE bug 902676</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138151" comment="binutils-2.25.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138152" comment="binutils-devel-2.25.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8500</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500" source="CVE"/>
    <description>
    ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through 9.10.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory consumption and named crash) via a large or infinite number of referrals.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8500.html">CVE-2014-8500</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8500">SUSE bug 908994</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8501</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8501" source="CVE"/>
    <description>
    The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) and possibly have other unspecified impact via a crafted NumberOfRvaAndSizes field in the AOUT header in a PE executable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8501.html">CVE-2014-8501</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8501">SUSE bug 903655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8501">SUSE bug 903655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8501">SUSE bug 903655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8501">SUSE bug 903655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8501">SUSE bug 903655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8501">SUSE bug 903655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8501">SUSE bug 903655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8501">SUSE bug 903655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8501">SUSE bug 903655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8501">SUSE bug 903655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8501">SUSE bug 903655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8501">SUSE bug 903655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8501">SUSE bug 903655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8501">SUSE bug 903655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8501">SUSE bug 903655</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138151" comment="binutils-2.25.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138152" comment="binutils-devel-2.25.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8502</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8502" source="CVE"/>
    <description>
    Heap-based buffer overflow in the pe_print_edata function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a truncated export table in a PE file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8502.html">CVE-2014-8502</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8502">SUSE bug 903655</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138151" comment="binutils-2.25.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138152" comment="binutils-devel-2.25.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8503</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8503" source="CVE"/>
    <description>
    Stack-based buffer overflow in the ihex_scan function in bfd/ihex.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted ihex file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8503.html">CVE-2014-8503</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8503">SUSE bug 903655</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138151" comment="binutils-2.25.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138152" comment="binutils-devel-2.25.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8504</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8504" source="CVE"/>
    <description>
    Stack-based buffer overflow in the srec_scan function in bfd/srec.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8504.html">CVE-2014-8504</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8504">SUSE bug 903655</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138151" comment="binutils-2.25.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138152" comment="binutils-devel-2.25.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8517</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8517" source="CVE"/>
    <description>
    The fetch_url function in usr.bin/ftp/fetch.c in tnftp, as used in NetBSD 5.1 through 5.1.4, 5.2 through 5.2.2, 6.0 through 6.0.6, and 6.1 through 6.1.5 allows remote attackers to execute arbitrary commands via a | (pipe) character at the end of an HTTP redirect.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8517.html">CVE-2014-8517</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8517">SUSE bug 903011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8517">SUSE bug 903011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8517">SUSE bug 903011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8517">SUSE bug 903011</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139111" comment="tnftp-20141104-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152514" comment="tnftp is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8562</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8562" source="CVE"/>
    <description>
    DCM decode in ImageMagick before 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds read).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8562.html">CVE-2014-8562</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8562">SUSE bug 903638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8562">SUSE bug 903638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8562">SUSE bug 903638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8562">SUSE bug 903638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8562">SUSE bug 903638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8562">SUSE bug 903638</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138035" comment="ImageMagick-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138036" comment="ImageMagick-devel-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138037" comment="ImageMagick-doc-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138038" comment="ImageMagick-extra-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138039" comment="libMagick++-6_Q16-3-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138040" comment="libMagickCore-6_Q16-1-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138041" comment="libMagickWand-6_Q16-1-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138042" comment="perl-PerlMagick-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8564</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8564" source="CVE"/>
    <description>
    The _gnutls_ecc_ansi_x963_export function in gnutls_ecc.c in GnuTLS 3.x before 3.1.28, 3.2.x before 3.2.20, and 3.3.x before 3.3.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) Elliptic Curve Cryptography (ECC) certificate or (2) certificate signing requests (CSR), related to generating key IDs.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8564.html">CVE-2014-8564</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8564">SUSE bug 904603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8564">SUSE bug 904603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8564">SUSE bug 904603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8564">SUSE bug 904603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8564">SUSE bug 904603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8564">SUSE bug 904603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8564">SUSE bug 904603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8564">SUSE bug 904603</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8564">SUSE bug 904603</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138369" comment="gnutls-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138370" comment="libgnutls-devel-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138371" comment="libgnutls-openssl27-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151158" comment="libgnutls-openssl27 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138372" comment="libgnutls28-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151159" comment="libgnutls28 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138373" comment="libgnutls28-32bit-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151160" comment="libgnutls28-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8600</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8600" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in KDE-Runtime 4.14.3 and earlier, kwebkitpart 1.3.4 and earlier, and kio-extras 5.1.1 and earlier allow remote attackers to inject arbitrary web script or HTML via a crafted URI using the (1) zip, (2) trash, (3) tar, (4) thumbnail, (5) smtps, (6) smtp, (7) smb, (8) remote, (9) recentdocuments, (10) nntps, (11) nntp, (12) network, (13) mbox, (14) ldaps, (15) ldap, (16) fonts, (17) file, (18) desktop, (19) cgi, (20) bookmarks, or (21) ar scheme, which is not properly handled in an error message.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8600.html">CVE-2014-8600</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8600">SUSE bug 905742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8600">SUSE bug 905742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8600">SUSE bug 905742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8600">SUSE bug 905742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8600">SUSE bug 905742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8600">SUSE bug 905742</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138442" comment="kio-extras5-15.08.0-7.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152515" comment="kio-extras5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138443" comment="kwebkitpart-1.3.3-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152516" comment="kwebkitpart is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138444" comment="kwebkitpart-lang-1.3.3-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152517" comment="kwebkitpart-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8634</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8634.html">CVE-2014-8634</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8634">SUSE bug 913064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8634">SUSE bug 913064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8634">SUSE bug 913064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8634">SUSE bug 913096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8634">SUSE bug 913064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8634">SUSE bug 913064</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8635</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8635" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8635.html">CVE-2014-8635</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8636</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636" source="CVE"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly interact with a DOM object that has a named getter, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8636.html">CVE-2014-8636</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8636">SUSE bug 913102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8636">SUSE bug 913096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8636">SUSE bug 913102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8636">SUSE bug 913102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8636">SUSE bug 913102</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8637</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8637" source="CVE"/>
    <description>
    Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not properly initialize memory for BMP images, which allows remote attackers to obtain sensitive information from process memory via a crafted web page that triggers the rendering of malformed BMP data within a CANVAS element.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8637.html">CVE-2014-8637</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8637">SUSE bug 913103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8637">SUSE bug 913096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8637">SUSE bug 913103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8637">SUSE bug 913103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8637">SUSE bug 913103</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8638</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638" source="CVE"/>
    <description>
    The navigator.sendBeacon implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 omits the CORS Origin header, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8638.html">CVE-2014-8638</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8638">SUSE bug 913068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8638">SUSE bug 913068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8638">SUSE bug 913068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8638">SUSE bug 913096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8638">SUSE bug 913068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8638">SUSE bug 913068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8638">SUSE bug 913068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8638">SUSE bug 913068</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8639</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639" source="CVE"/>
    <description>
    Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8639.html">CVE-2014-8639</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8639">SUSE bug 913066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8639">SUSE bug 913066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8639">SUSE bug 913096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8639">SUSE bug 913066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8639">SUSE bug 913066</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8640</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640" source="CVE"/>
    <description>
    The mozilla::dom::AudioParamTimeline::AudioNodeInputValue function in the Web Audio API implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly restrict timeline operations, which allows remote attackers to cause a denial of service (uninitialized-memory read and application crash) via crafted API calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8640.html">CVE-2014-8640</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8640">SUSE bug 913104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8640">SUSE bug 913104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8640">SUSE bug 913096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8640">SUSE bug 913104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8640">SUSE bug 913104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8640">SUSE bug 913104</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8641</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641" source="CVE"/>
    <description>
    Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8641.html">CVE-2014-8641</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8641">SUSE bug 913067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8641">SUSE bug 913067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8641">SUSE bug 913067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8641">SUSE bug 913096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8641">SUSE bug 913067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8641">SUSE bug 913067</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8642</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8642" source="CVE"/>
    <description>
    Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not consider the id-pkix-ocsp-nocheck extension in deciding whether to trust an OCSP responder, which makes it easier for remote attackers to obtain sensitive information by sniffing the network during a session in which there was an incorrect decision to accept a compromised and revoked certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8642.html">CVE-2014-8642</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8642">SUSE bug 913222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8642">SUSE bug 913222</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8643</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8643" source="CVE"/>
    <description>
    Mozilla Firefox before 35.0 on Windows allows remote attackers to bypass the Gecko Media Plugin (GMP) sandbox protection mechanism by leveraging access to the GMP process, as demonstrated by the OpenH264 plugin's process.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8643.html">CVE-2014-8643</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8651</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8651" source="CVE"/>
    <description>
    The KDE Clock KCM policykit helper in kde-workspace before 4.11.14 and plasma-desktop before 5.1.1 allows local users to gain privileges via a crafted ntpUtility (ntp utility name) argument.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8651.html">CVE-2014-8651</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8651">SUSE bug 904625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8651">SUSE bug 904625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8651">SUSE bug 904625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8651">SUSE bug 904625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8651">SUSE bug 904625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8651">SUSE bug 904625</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139034" comment="plasma5-desktop-5.4.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152518" comment="plasma5-desktop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139035" comment="plasma5-desktop-lang-5.4.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152519" comment="plasma5-desktop-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8710</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710" source="CVE"/>
    <description>
    The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8710.html">CVE-2014-8710</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8710">SUSE bug 905246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8710">SUSE bug 905246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8710">SUSE bug 905246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8710">SUSE bug 905246</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8711</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711" source="CVE"/>
    <description>
    Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8711.html">CVE-2014-8711</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8711">SUSE bug 905245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8711">SUSE bug 905245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8711">SUSE bug 905245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8711">SUSE bug 905245</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8712</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712" source="CVE"/>
    <description>
    The build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8712.html">CVE-2014-8712</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8712">SUSE bug 905248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8712">SUSE bug 905248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8712">SUSE bug 905248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8712">SUSE bug 905248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8713</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713" source="CVE"/>
    <description>
    Stack-based buffer overflow in the build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8713.html">CVE-2014-8713</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8713">SUSE bug 905248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8713">SUSE bug 905248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8713">SUSE bug 905248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8713">SUSE bug 905248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8714</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714" source="CVE"/>
    <description>
    The dissect_write_structured_field function in epan/dissectors/packet-tn5250.c in the TN5250 dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8714.html">CVE-2014-8714</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8714">SUSE bug 905247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8714">SUSE bug 905247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8714">SUSE bug 905247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8714">SUSE bug 905247</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8716</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8716" source="CVE"/>
    <description>
    The JPEG decoder in ImageMagick before 6.8.9-9 allows local users to cause a denial of service (out-of-bounds memory access and crash).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8716.html">CVE-2014-8716</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8716">SUSE bug 905260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8716">SUSE bug 905260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8716">SUSE bug 905260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8716">SUSE bug 905260</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138035" comment="ImageMagick-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138036" comment="ImageMagick-devel-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138037" comment="ImageMagick-doc-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138038" comment="ImageMagick-extra-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138039" comment="libMagick++-6_Q16-3-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138040" comment="libMagickCore-6_Q16-1-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138041" comment="libMagickWand-6_Q16-1-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138042" comment="perl-PerlMagick-6.8.8.1-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8737</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8737" source="CVE"/>
    <description>
    Multiple directory traversal vulnerabilities in GNU binutils 2.24 and earlier allow local users to delete arbitrary files via a .. (dot dot) or full path name in an archive to (1) strip or (2) objcopy or create arbitrary files via (3) a .. (dot dot) or full path name in an archive to ar.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8737.html">CVE-2014-8737</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8737">SUSE bug 905736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8737">SUSE bug 905736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8737">SUSE bug 905736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8737">SUSE bug 912408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8737">SUSE bug 905736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8737">SUSE bug 905736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8737">SUSE bug 905736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8737">SUSE bug 905736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8737">SUSE bug 905736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8737">SUSE bug 905736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8737">SUSE bug 905736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8737">SUSE bug 905736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8737">SUSE bug 905736</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138151" comment="binutils-2.25.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138152" comment="binutils-devel-2.25.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8738</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8738" source="CVE"/>
    <description>
    The _bfd_slurp_extended_name_table function in bfd/archive.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (invalid write, segmentation fault, and crash) via a crafted extended name table in an archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8738.html">CVE-2014-8738</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8738">SUSE bug 905735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8738">SUSE bug 905735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8738">SUSE bug 905735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8738">SUSE bug 905735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8738">SUSE bug 905735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8738">SUSE bug 905735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8738">SUSE bug 905735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8738">SUSE bug 905735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8738">SUSE bug 905735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8738">SUSE bug 905735</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138151" comment="binutils-2.25.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138152" comment="binutils-devel-2.25.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8767</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8767" source="CVE"/>
    <description>
    Integer underflow in the olsr_print function in tcpdump 3.9.6 through 4.6.2, when in verbose mode, allows remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8767.html">CVE-2014-8767</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8767">SUSE bug 905870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8767">SUSE bug 905870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8767">SUSE bug 905870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8767">SUSE bug 905871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8767">SUSE bug 905870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8767">SUSE bug 905870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8767">SUSE bug 905870</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139105" comment="tcpdump-4.5.1-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8768</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8768" source="CVE"/>
    <description>
    Multiple Integer underflows in the geonet_print function in tcpdump 4.5.0 through 4.6.2, when in verbose mode, allow remote attackers to cause a denial of service (segmentation fault and crash) via a crafted length value in a Geonet frame.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8768.html">CVE-2014-8768</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8768">SUSE bug 905871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8768">SUSE bug 905871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8768">SUSE bug 905871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8768">SUSE bug 905871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8768">SUSE bug 905871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8768">SUSE bug 905871</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139105" comment="tcpdump-4.5.1-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8769</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8769" source="CVE"/>
    <description>
    tcpdump 3.8 through 4.6.2 might allow remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8769.html">CVE-2014-8769</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8769">SUSE bug 905872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8769">SUSE bug 905871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8769">SUSE bug 905872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8769">SUSE bug 905872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8769">SUSE bug 905872</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139105" comment="tcpdump-4.5.1-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8962</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8962" source="CVE"/>
    <description>
    Stack-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1 allows remote attackers to execute arbitrary code via a crafted .flac file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8962.html">CVE-2014-8962</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8962">SUSE bug 906831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8962">SUSE bug 906831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8962">SUSE bug 906831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8962">SUSE bug 906831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8962">SUSE bug 906831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8962">SUSE bug 907764</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138282" comment="flac-1.3.0-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152521" comment="flac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138283" comment="flac-devel-1.3.0-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152522" comment="flac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138284" comment="libFLAC++6-1.3.0-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152523" comment="libFLAC++6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138285" comment="libFLAC8-1.3.0-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152524" comment="libFLAC8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138286" comment="libFLAC8-32bit-1.3.0-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152525" comment="libFLAC8-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8964</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8964" source="CVE"/>
    <description>
    Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8964.html">CVE-2014-8964</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8964">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8964">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8964">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8964">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8964">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8964">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8964">SUSE bug 933288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8964">SUSE bug 936408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8964">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8964">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8964">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8964">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8964">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8964">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8964">SUSE bug 906574</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8991</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-8991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8991" source="CVE"/>
    <description>
    pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a /tmp/pip-build-* file for another user.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-8991.html">CVE-2014-8991</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8991">SUSE bug 907038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8991">SUSE bug 907038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-8991">SUSE bug 907038</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139058" comment="python3-pip-7.1.2-4.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151932" comment="python3-pip is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9028</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9028" source="CVE"/>
    <description>
    Heap-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1 allows remote attackers to execute arbitrary code via a crafted .flac file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9028.html">CVE-2014-9028</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9028">SUSE bug 907016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9028">SUSE bug 907016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9028">SUSE bug 907016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9028">SUSE bug 907016</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138282" comment="flac-1.3.0-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152521" comment="flac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138283" comment="flac-devel-1.3.0-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152522" comment="flac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138284" comment="libFLAC++6-1.3.0-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152523" comment="libFLAC++6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138285" comment="libFLAC8-1.3.0-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152524" comment="libFLAC8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138286" comment="libFLAC8-32bit-1.3.0-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152525" comment="libFLAC8-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9029</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029" source="CVE"/>
    <description>
    Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9029.html">CVE-2014-9029</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9029">SUSE bug 906364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9029">SUSE bug 906364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9029">SUSE bug 906364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9029">SUSE bug 906364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9029">SUSE bug 906364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9029">SUSE bug 909474</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9029">SUSE bug 906364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9029">SUSE bug 906364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9029">SUSE bug 906364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9029">SUSE bug 992991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138658" comment="libjasper-devel-1.900.1-164.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138659" comment="libjasper1-1.900.1-164.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138660" comment="libjasper1-32bit-1.900.1-164.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9050</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9050" source="CVE"/>
    <description>
    Heap-based buffer overflow in the cli_scanpe function in libclamav/pe.c in ClamAV before 0.98.5 allows remote attackers to cause a denial of service (crash) via a crafted y0da Crypter PE file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9050.html">CVE-2014-9050</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9050">SUSE bug 906770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9050">SUSE bug 906770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9050">SUSE bug 906770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9050">SUSE bug 1040662</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138164" comment="clamav-0.98.7-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9087</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9087" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087" source="CVE"/>
    <description>
    Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9087.html">CVE-2014-9087</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9087">SUSE bug 907074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9087">SUSE bug 907074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9087">SUSE bug 907074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9087">SUSE bug 907074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9087">SUSE bug 907074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9087">SUSE bug 907074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9087">SUSE bug 907074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9087">SUSE bug 926826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9087">SUSE bug 996084</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138680" comment="libksba8-1.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152539" comment="libksba8 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9092</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9092" source="CVE"/>
    <description>
    libjpeg-turbo before 1.3.1 allows remote attackers to cause a denial of service (crash) via a crafted JPEG file, related to the Exif marker.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9092.html">CVE-2014-9092</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9092">SUSE bug 906761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9092">SUSE bug 906761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9092">SUSE bug 906761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9092">SUSE bug 906761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9092">SUSE bug 906761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9092">SUSE bug 906761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9092">SUSE bug 906761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9092">SUSE bug 906761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9092">SUSE bug 906761</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138672" comment="libjpeg-turbo-1.3.1-31.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152540" comment="libjpeg-turbo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138673" comment="libjpeg62-62.1.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152541" comment="libjpeg62 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138674" comment="libjpeg62-devel-62.1.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152542" comment="libjpeg62-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138675" comment="libjpeg8-8.0.2-31.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152543" comment="libjpeg8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138676" comment="libjpeg8-32bit-8.0.2-31.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152544" comment="libjpeg8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138677" comment="libturbojpeg0-8.0.2-31.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152545" comment="libturbojpeg0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9093</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9093" source="CVE"/>
    <description>
    LibreOffice before 4.3.5 allows remote attackers to cause a denial of service (invalid write operation and crash) and possibly execute arbitrary code via a crafted RTF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9093.html">CVE-2014-9093</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9093">SUSE bug 907636</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138812" comment="libreoffice-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138813" comment="libreoffice-base-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138814" comment="libreoffice-base-drivers-mysql-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151464" comment="libreoffice-base-drivers-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138815" comment="libreoffice-branding-upstream-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138816" comment="libreoffice-calc-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138817" comment="libreoffice-calc-extensions-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138818" comment="libreoffice-draw-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138819" comment="libreoffice-filters-optional-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138820" comment="libreoffice-gnome-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138821" comment="libreoffice-icon-theme-breeze-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151471" comment="libreoffice-icon-theme-breeze is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138822" comment="libreoffice-icon-theme-galaxy-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151472" comment="libreoffice-icon-theme-galaxy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138823" comment="libreoffice-icon-theme-hicontrast-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151473" comment="libreoffice-icon-theme-hicontrast is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138824" comment="libreoffice-icon-theme-oxygen-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151474" comment="libreoffice-icon-theme-oxygen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138825" comment="libreoffice-icon-theme-sifr-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151475" comment="libreoffice-icon-theme-sifr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138826" comment="libreoffice-icon-theme-tango-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151476" comment="libreoffice-icon-theme-tango is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138827" comment="libreoffice-impress-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138828" comment="libreoffice-kde4-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151478" comment="libreoffice-kde4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138829" comment="libreoffice-l10n-cs-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138830" comment="libreoffice-l10n-da-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138831" comment="libreoffice-l10n-de-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138832" comment="libreoffice-l10n-el-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138833" comment="libreoffice-l10n-en-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138834" comment="libreoffice-l10n-es-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138835" comment="libreoffice-l10n-fr-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138836" comment="libreoffice-l10n-hu-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138837" comment="libreoffice-l10n-it-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138838" comment="libreoffice-l10n-ja-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138839" comment="libreoffice-l10n-pl-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138840" comment="libreoffice-l10n-ru-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138841" comment="libreoffice-mailmerge-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138842" comment="libreoffice-math-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138843" comment="libreoffice-pyuno-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138844" comment="libreoffice-writer-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138845" comment="libreoffice-writer-extensions-5.0.2.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9112</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9112" source="CVE"/>
    <description>
    Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9112.html">CVE-2014-9112</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 907456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 907456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 907456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 907456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 907456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 907456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 907456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 907456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 913479</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9112">SUSE bug 913479</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138175" comment="cpio-2.11-30.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151389" comment="cpio is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138176" comment="cpio-lang-2.11-30.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151390" comment="cpio-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9114</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114" source="CVE"/>
    <description>
    Blkid in util-linux before 2.26rc-1 allows local users to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9114.html">CVE-2014-9114</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 906725</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 908742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 888678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9114">SUSE bug 907434</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138545" comment="libblkid-devel-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151786" comment="libblkid-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138546" comment="libblkid1-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151787" comment="libblkid1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138547" comment="libblkid1-32bit-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151788" comment="libblkid1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138548" comment="libmount1-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151789" comment="libmount1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138549" comment="libmount1-32bit-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151790" comment="libmount1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138550" comment="libsmartcols1-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151791" comment="libsmartcols1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138551" comment="libuuid-devel-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151792" comment="libuuid-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138552" comment="libuuid1-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151793" comment="libuuid1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138553" comment="libuuid1-32bit-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151794" comment="libuuid1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138554" comment="util-linux-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151795" comment="util-linux is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138555" comment="util-linux-lang-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151796" comment="util-linux-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138556" comment="util-linux-systemd-2.25-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151797" comment="util-linux-systemd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9116</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9116" source="CVE"/>
    <description>
    The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9116.html">CVE-2014-9116</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9116">SUSE bug 907453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9116">SUSE bug 907453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9116">SUSE bug 907453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9116">SUSE bug 907453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9116">SUSE bug 907453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9116">SUSE bug 907453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9116">SUSE bug 907453</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138989" comment="mutt-1.5.24-1.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152082" comment="mutt is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9130</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9130" source="CVE"/>
    <description>
    scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9130.html">CVE-2014-9130</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9130">SUSE bug 907809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9130">SUSE bug 907809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9130">SUSE bug 907809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9130">SUSE bug 907809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9130">SUSE bug 911782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9130">SUSE bug 907809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9130">SUSE bug 907809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9130">SUSE bug 921588</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9130">SUSE bug 907809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9130">SUSE bug 907809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138976" comment="libyaml-0-2-0.1.6-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151942" comment="libyaml-0-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139032" comment="perl-YAML-LibYAML-0.38-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151687" comment="perl-YAML-LibYAML is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9140</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9140" source="CVE"/>
    <description>
    Buffer overflow in the ppp_hdlc function in print-ppp.c in tcpdump 4.6.2 and earlier allows remote attackers to cause a denial of service (crash) cia a crafted PPP packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9140.html">CVE-2014-9140</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9140">SUSE bug 923142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9140">SUSE bug 923142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9140">SUSE bug 923142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9140">SUSE bug 923142</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139105" comment="tcpdump-4.5.1-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9293</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9293" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293" source="CVE"/>
    <description>
    The config_auth function in ntpd in NTP before 4.2.7p11, when an auth key is not configured, improperly generates a key, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9293.html">CVE-2014-9293</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9293">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9293">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9293">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9293">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9293">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9293">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9293">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9293">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9293">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9293">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138997" comment="ntp-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138998" comment="ntp-doc-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9294</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9294" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294" source="CVE"/>
    <description>
    util/ntp-keygen.c in ntp-keygen in NTP before 4.2.7p230 uses a weak RNG seed, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9294.html">CVE-2014-9294</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9294">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9294">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9294">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9294">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9294">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9294">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9294">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9294">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9294">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138997" comment="ntp-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138998" comment="ntp-doc-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9295</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9295.html">CVE-2014-9295</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 912826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 883859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 912826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 916239</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 912826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9295">SUSE bug 959243</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138997" comment="ntp-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138998" comment="ntp-doc-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9296</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9296" source="CVE"/>
    <description>
    The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9296.html">CVE-2014-9296</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9296">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9296">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9296">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9296">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9296">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9296">SUSE bug 910764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9296">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9296">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9296">SUSE bug 992991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138997" comment="ntp-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138998" comment="ntp-doc-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9297</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9297" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2014-9750, CVE-2014-9751.  Reason: this ID was intended for one issue, but was associated with two issues.  Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9297.html">CVE-2014-9297</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 948963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9297">SUSE bug 911792</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138997" comment="ntp-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138998" comment="ntp-doc-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9298</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9298" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9298" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2014-9750, CVE-2014-9751.  Reason: this ID was intended for one issue, but was associated with two issues.  Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9298.html">CVE-2014-9298</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 948963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9298">SUSE bug 911792</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138997" comment="ntp-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138998" comment="ntp-doc-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9328</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9328" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9328" source="CVE"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted upack packer file, related to a "heap out of bounds condition."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9328.html">CVE-2014-9328</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9328">SUSE bug 915512</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9328">SUSE bug 915512</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9328">SUSE bug 915512</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9328">SUSE bug 915512</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9328">SUSE bug 915512</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9328">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9328">SUSE bug 915512</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138164" comment="clamav-0.98.7-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9390</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9390" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9390" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9390.html">CVE-2014-9390</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9390">SUSE bug 910756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9390">SUSE bug 910756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9390">SUSE bug 910756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9390">SUSE bug 910756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9390">SUSE bug 910756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9390">SUSE bug 925040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9390">SUSE bug 925040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9390">SUSE bug 925040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9390">SUSE bug 910756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9390">SUSE bug 910756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9390">SUSE bug 910756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9390">SUSE bug 925040</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138321" comment="git-2.6.2-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138322" comment="git-core-2.6.2-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138323" comment="git-cvs-2.6.2-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138324" comment="git-daemon-2.6.2-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138325" comment="git-email-2.6.2-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138326" comment="git-gui-2.6.2-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138327" comment="git-svn-2.6.2-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138328" comment="git-web-2.6.2-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138329" comment="gitk-2.6.2-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9402</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" source="CVE"/>
    <description>
    The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9402.html">CVE-2014-9402</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9402">SUSE bug 910599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9402">SUSE bug 910599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9402">SUSE bug 910599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9402">SUSE bug 910599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9402">SUSE bug 910599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9402">SUSE bug 910599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9402">SUSE bug 910599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9402">SUSE bug 910599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9402">SUSE bug 910599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9402">SUSE bug 910599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9402">SUSE bug 910599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9402">SUSE bug 910599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9402">SUSE bug 910599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9402">SUSE bug 910599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9402">SUSE bug 910599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9402">SUSE bug 910599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9402">SUSE bug 910599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9402">SUSE bug 910599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9402">SUSE bug 910599</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138343" comment="glibc-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138344" comment="glibc-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138345" comment="glibc-devel-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138346" comment="glibc-extra-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138347" comment="glibc-info-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138348" comment="glibc-locale-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138349" comment="glibc-locale-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138350" comment="nscd-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9403</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9403" source="CVE"/>
    <description>
    The CWebAdminMod::ChanPage function in modules/webadmin.cpp in ZNC before 1.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) by adding a channel with the same name as an existing channel but without the leading # character, related to a "use-after-delete" error.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9403.html">CVE-2014-9403</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9403">SUSE bug 956254</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9403">SUSE bug 956254</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118601" comment="znc-1.6.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152546" comment="znc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118602" comment="znc-devel-1.6.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152547" comment="znc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118603" comment="znc-perl-1.6.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152548" comment="znc-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118604" comment="znc-python3-1.6.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152549" comment="znc-python3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118605" comment="znc-tcl-1.6.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152550" comment="znc-tcl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9421</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421" source="CVE"/>
    <description>
    The auth_gssapi_unwrap_data function in lib/rpc/auth_gssapi_misc.c in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly handle partial XDR deserialization, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via malformed XDR data, as demonstrated by data sent to kadmind.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9421.html">CVE-2014-9421</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 1005509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 770172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9421">SUSE bug 912002</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9422</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422" source="CVE"/>
    <description>
    The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9422.html">CVE-2014-9422</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 1005509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 770172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9422">SUSE bug 912002</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9423</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423" source="CVE"/>
    <description>
    The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9423.html">CVE-2014-9423</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9423">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9423">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9423">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9423">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9423">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9423">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9423">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9423">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9423">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9423">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9423">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9423">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9423">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9423">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9423">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9423">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9423">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9423">SUSE bug 912002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9423">SUSE bug 1005509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9423">SUSE bug 912002</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9427</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9427" source="CVE"/>
    <description>
    sapi/cgi/cgi_main.c in the CGI component in PHP through 5.4.36, 5.5.x through 5.5.20, and 5.6.x through 5.6.4, when mmap is used to read a .php file, does not properly consider the mapping's length during processing of an invalid file that begins with a # character and lacks a newline character, which causes an out-of-bounds read and might (1) allow remote attackers to obtain sensitive information from php-cgi process memory by leveraging the ability to upload a .php file or (2) trigger unexpected code execution if a valid PHP script is present in memory locations adjacent to the mapping.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9427.html">CVE-2014-9427</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9427">SUSE bug 911664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9427">SUSE bug 911664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9427">SUSE bug 911664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9427">SUSE bug 911664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9427">SUSE bug 911664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9427">SUSE bug 911664</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9447</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9447" source="CVE"/>
    <description>
    Directory traversal vulnerability in the read_long_names function in libelf/elf_begin.c in elfutils 0.152 and 0.161 allows remote attackers to write to arbitrary files to the root directory via a / (slash) in a crafted archive, as demonstrated using the ar program.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9447.html">CVE-2014-9447</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 911662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 911662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 911662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 911662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 912316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 912408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 911662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 911662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 911662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 911662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 911662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 911662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 911662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 912408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 911662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 911662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 911662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 911662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 911662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 911662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9447">SUSE bug 912408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138251" comment="elfutils-0.158-9.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138252" comment="libasm1-0.158-9.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138253" comment="libdw1-0.158-9.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138254" comment="libelf1-0.158-9.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138255" comment="libelf1-32bit-0.158-9.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152061" comment="libelf1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9449</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9449" source="CVE"/>
    <description>
    Buffer overflow in the RiffVideo::infoTagsHandler function in riffvideo.cpp in Exiv2 0.24 allows remote attackers to cause a denial of service (crash) via a long IKEY INFO tag value in an AVI file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9449.html">CVE-2014-9449</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138620" comment="libexiv2-14-0.25-4.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152551" comment="libexiv2-14 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138621" comment="libexiv2-devel-0.25-4.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9474</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9474" source="CVE"/>
    <description>
    Buffer overflow in the mpfr_strtofr function in GNU MPFR before 3.1.2-p11 allows context-dependent attackers to have unspecified impact via vectors related to incorrect documentation for mpn_set_str.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9474.html">CVE-2014-9474</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9474">SUSE bug 911812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9474">SUSE bug 911812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9474">SUSE bug 911812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9474">SUSE bug 911812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9474">SUSE bug 911812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9474">SUSE bug 911812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9474">SUSE bug 911812</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138714" comment="libmpfr4-3.1.2-10.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152553" comment="libmpfr4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138715" comment="mpfr-devel-3.1.2-10.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152554" comment="mpfr-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9495</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9495" source="CVE"/>
    <description>
    Heap-based buffer overflow in the png_combine_row function in libpng before 1.5.21 and 1.6.x before 1.6.16, when running on 64-bit systems, might allow context-dependent attackers to execute arbitrary code via a "very wide interlaced" PNG image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9495.html">CVE-2014-9495</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9495">SUSE bug 912076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9495">SUSE bug 912076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9495">SUSE bug 912076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9495">SUSE bug 912076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9495">SUSE bug 912929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9495">SUSE bug 912076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9495">SUSE bug 912076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9495">SUSE bug 912076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9495">SUSE bug 912076</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138746" comment="libpng16-16-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138747" comment="libpng16-16-32bit-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151415" comment="libpng16-16-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138748" comment="libpng16-compat-devel-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138749" comment="libpng16-devel-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9496</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9496" source="CVE"/>
    <description>
    The sd2_parse_rsrc_fork function in sd2.c in libsndfile allows attackers to have unspecified impact via vectors related to a (1) map offset or (2) rsrc marker, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9496.html">CVE-2014-9496</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9496">SUSE bug 911796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9496">SUSE bug 911796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9496">SUSE bug 911796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9496">SUSE bug 911796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9496">SUSE bug 911796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9496">SUSE bug 911796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9496">SUSE bug 911796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9496">SUSE bug 911796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9496">SUSE bug 911796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9496">SUSE bug 911796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9496">SUSE bug 911796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9496">SUSE bug 911796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9496">SUSE bug 911796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9496">SUSE bug 911796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9496">SUSE bug 911796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9496">SUSE bug 911796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9496">SUSE bug 911796</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138854" comment="libsndfile-devel-1.0.25-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151189" comment="libsndfile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138855" comment="libsndfile1-1.0.25-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151190" comment="libsndfile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138856" comment="libsndfile1-32bit-1.0.25-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151191" comment="libsndfile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9508</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9508" source="CVE"/>
    <description>
    The frontend rendering component in TYPO3 4.5.x before 4.5.39, 4.6.x through 6.2.x before 6.2.9, and 7.x before 7.0.2, when config.prefixLocalAnchors is set and using a homepage with links that only contain anchors, allows remote attackers to change URLs to arbitrary domains for those links via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9508.html">CVE-2014-9508</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133371" comment="typo3-cms-4_5-4.5.40-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151953" comment="typo3-cms-4_5 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9512</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9512" source="CVE"/>
    <description>
    rsync 3.1.1 allows remote attackers to write to arbitrary files via a symlink attack on a file in the synchronization path.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9512.html">CVE-2014-9512</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 960191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 960191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 960191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9512">SUSE bug 915410</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121168" comment="rsync-3.1.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151567" comment="rsync is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9556</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9556" source="CVE"/>
    <description>
    Integer overflow in the qtmd_decompress function in libmspack 0.4 allows remote attackers to cause a denial of service (hang) via a crafted CAB file, which triggers an infinite loop.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9556.html">CVE-2014-9556</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 912214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 912316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 912214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 912214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 912214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 912214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 912214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 919283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 912214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 919283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 912214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 912214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 912214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 919283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 919283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 934533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 919283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 919283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 919283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 919283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 912214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 919283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9556">SUSE bug 919283</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138716" comment="libmspack0-0.5-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151459" comment="libmspack0 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9636</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9636" source="CVE"/>
    <description>
    unzip 6.0 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via an extra field with an uncompressed size smaller than the compressed field size in a zip archive that advertises STORED method compression.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9636.html">CVE-2014-9636</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9636">SUSE bug 914442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9636">SUSE bug 914442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9636">SUSE bug 914442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9636">SUSE bug 914442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9636">SUSE bug 914442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9636">SUSE bug 914442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9636">SUSE bug 914442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9636">SUSE bug 914442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9636">SUSE bug 914442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9636">SUSE bug 914442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9636">SUSE bug 914442</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139117" comment="unzip-6.00-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152223" comment="unzip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139118" comment="unzip-doc-6.00-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152224" comment="unzip-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9638</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9638" source="CVE"/>
    <description>
    oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a WAV file with the number of channels set to zero.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9638.html">CVE-2014-9638</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9638">SUSE bug 914439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9638">SUSE bug 914439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9638">SUSE bug 914441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9638">SUSE bug 914439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9638">SUSE bug 914439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9638">SUSE bug 914439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9638">SUSE bug 914439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9638">SUSE bug 914439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9638">SUSE bug 914439</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009106467" comment="vorbis-tools-1.4.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151128" comment="vorbis-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009106468" comment="vorbis-tools-lang-1.4.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151129" comment="vorbis-tools-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9639</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9639" source="CVE"/>
    <description>
    Integer overflow in oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (crash) via a crafted number of channels in a WAV file, which triggers an out-of-bounds memory access.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9639.html">CVE-2014-9639</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9639">SUSE bug 914441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9639">SUSE bug 914439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9639">SUSE bug 914441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9639">SUSE bug 914439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9639">SUSE bug 914441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9639">SUSE bug 914441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9639">SUSE bug 914441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9639">SUSE bug 914441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9639">SUSE bug 914441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9639">SUSE bug 914441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9639">SUSE bug 1081744</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009106467" comment="vorbis-tools-1.4.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151128" comment="vorbis-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009106468" comment="vorbis-tools-lang-1.4.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151129" comment="vorbis-tools-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9640</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9640" source="CVE"/>
    <description>
    oggenc/oggenc.c in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted raw file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9640.html">CVE-2014-9640</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9640">SUSE bug 914938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9640">SUSE bug 914938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9640">SUSE bug 914938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9640">SUSE bug 914938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9640">SUSE bug 914938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9640">SUSE bug 912214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9640">SUSE bug 919283</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009106467" comment="vorbis-tools-1.4.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151128" comment="vorbis-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009106468" comment="vorbis-tools-lang-1.4.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151129" comment="vorbis-tools-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9645</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9645" source="CVE"/>
    <description>
    The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9645.html">CVE-2014-9645</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9645">SUSE bug 914423</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9645">SUSE bug 914660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9645">SUSE bug 914660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9645">SUSE bug 914660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9645">SUSE bug 914660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9645">SUSE bug 914660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9645">SUSE bug 914660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9645">SUSE bug 914660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9645">SUSE bug 914660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9645">SUSE bug 914423</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9645">SUSE bug 914660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9645">SUSE bug 914423</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9645">SUSE bug 914660</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138158" comment="busybox-1.21.1-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152555" comment="busybox is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9652</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9652" source="CVE"/>
    <description>
    The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9652.html">CVE-2014-9652</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9652">SUSE bug 917150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9652">SUSE bug 918768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9652">SUSE bug 917150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9652">SUSE bug 917150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9652">SUSE bug 917150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9652">SUSE bug 917302</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9652">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9654</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654" source="CVE"/>
    <description>
    The Regular Expressions package in International Components for Unicode (ICU) for C/C++ before 2014-12-03, as used in Google Chrome before 40.0.2214.91, calculates certain values without ensuring that they can be represented in a 24-bit field, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted string, a related issue to CVE-2014-7923.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9654.html">CVE-2014-9654</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 929629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 917129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 952260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9654">SUSE bug 969781</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138652" comment="libicu-devel-52.1-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152556" comment="libicu-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138653" comment="libicu52_1-52.1-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152557" comment="libicu52_1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138654" comment="libicu52_1-data-52.1-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152558" comment="libicu52_1-data is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9655</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9655" source="CVE"/>
    <description>
    The (1) putcontig8bitYCbCr21tile function in tif_getimage.c or (2) NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff-cvs-1.tif and libtiff-cvs-2.tif.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9655.html">CVE-2014-9655</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9655">SUSE bug 916927</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9655">SUSE bug 916927</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9655">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9655">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9655">SUSE bug 916927</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9655">SUSE bug 916927</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9655">SUSE bug 916927</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9655">SUSE bug 916927</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9655">SUSE bug 916927</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9655">SUSE bug 916927</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9655">SUSE bug 916927</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9656</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" source="CVE"/>
    <description>
    The tt_sbit_decoder_load_image function in sfnt/ttsbit.c in FreeType before 2.5.4 does not properly check for an integer overflow, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted OpenType font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9656.html">CVE-2014-9656</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9656">SUSE bug 916847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9656">SUSE bug 916847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9656">SUSE bug 916847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9656">SUSE bug 916847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9656">SUSE bug 916847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9656">SUSE bug 916847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9656">SUSE bug 916847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9656">SUSE bug 916847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9656">SUSE bug 916847</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9657</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" source="CVE"/>
    <description>
    The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish a minimum record size, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9657.html">CVE-2014-9657</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9657">SUSE bug 916856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9657">SUSE bug 916856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9657">SUSE bug 916856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9657">SUSE bug 916856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9657">SUSE bug 916856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9657">SUSE bug 916856</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9658</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" source="CVE"/>
    <description>
    The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9658.html">CVE-2014-9658</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9658">SUSE bug 916857</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9658">SUSE bug 916857</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9658">SUSE bug 916857</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9658">SUSE bug 916857</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9658">SUSE bug 916857</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9658">SUSE bug 916857</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9658">SUSE bug 916857</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9659</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659" source="CVE"/>
    <description>
    cff/cf2intrp.c in the CFF CharString interpreter in FreeType before 2.5.4 proceeds with additional hints after the hint mask has been computed, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted OpenType font.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2240.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9659.html">CVE-2014-9659</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9659">SUSE bug 916867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9659">SUSE bug 916867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9659">SUSE bug 916867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9659">SUSE bug 916867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9659">SUSE bug 916867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9659">SUSE bug 916867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9659">SUSE bug 916867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9659">SUSE bug 916867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9659">SUSE bug 916867</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9660</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" source="CVE"/>
    <description>
    The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType before 2.5.4 does not properly handle a missing ENDCHAR record, which allows remote attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9660.html">CVE-2014-9660</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9660">SUSE bug 916858</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9660">SUSE bug 916858</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9660">SUSE bug 916858</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9660">SUSE bug 916858</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9660">SUSE bug 916858</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9660">SUSE bug 916858</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9660">SUSE bug 916858</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9660">SUSE bug 916858</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9661</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" source="CVE"/>
    <description>
    type42/t42parse.c in FreeType before 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9661.html">CVE-2014-9661</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9661">SUSE bug 916859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9661">SUSE bug 916859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9661">SUSE bug 916859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9661">SUSE bug 916859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9661">SUSE bug 916859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9661">SUSE bug 916859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9661">SUSE bug 916859</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9662</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662" source="CVE"/>
    <description>
    cff/cf2ft.c in FreeType before 2.5.4 does not validate the return values of point-allocation functions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted OTF font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9662.html">CVE-2014-9662</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9662">SUSE bug 916860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9662">SUSE bug 916860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9662">SUSE bug 916860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9662">SUSE bug 916860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9662">SUSE bug 916860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9662">SUSE bug 916860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9662">SUSE bug 916860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9662">SUSE bug 916860</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9663</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" source="CVE"/>
    <description>
    The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field's value is completely calculated, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted cmap SFNT table.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9663.html">CVE-2014-9663</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9663">SUSE bug 916865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9663">SUSE bug 916865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9663">SUSE bug 916865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9663">SUSE bug 916865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9663">SUSE bug 916865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9663">SUSE bug 916865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9663">SUSE bug 916865</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9664</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" source="CVE"/>
    <description>
    FreeType before 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9664.html">CVE-2014-9664</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9664">SUSE bug 916864</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9664">SUSE bug 916864</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9664">SUSE bug 916864</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9664">SUSE bug 916864</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9664">SUSE bug 916864</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9664">SUSE bug 916864</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9664">SUSE bug 916864</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9665</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665" source="CVE"/>
    <description>
    The Load_SBit_Png function in sfnt/pngshim.c in FreeType before 2.5.4 does not restrict the rows and pitch values of PNG data, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact by embedding a PNG file in a .ttf font file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9665.html">CVE-2014-9665</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9665">SUSE bug 916863</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9665">SUSE bug 916863</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9665">SUSE bug 916863</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9665">SUSE bug 916863</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9665">SUSE bug 916863</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9665">SUSE bug 916863</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9665">SUSE bug 916863</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9665">SUSE bug 916863</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9666</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" source="CVE"/>
    <description>
    The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9666.html">CVE-2014-9666</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9666">SUSE bug 916862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9666">SUSE bug 916862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9666">SUSE bug 916862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9666">SUSE bug 916862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9666">SUSE bug 916862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9666">SUSE bug 916862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9666">SUSE bug 916862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9666">SUSE bug 916862</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9667</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" source="CVE"/>
    <description>
    sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9667.html">CVE-2014-9667</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9667">SUSE bug 916861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9667">SUSE bug 916861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9667">SUSE bug 916861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9667">SUSE bug 916861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9667">SUSE bug 916861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9667">SUSE bug 916861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9667">SUSE bug 916861</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9668</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668" source="CVE"/>
    <description>
    The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting length values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Web Open Font Format (WOFF) file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9668.html">CVE-2014-9668</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9668">SUSE bug 916868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9668">SUSE bug 916868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9668">SUSE bug 916868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9668">SUSE bug 916868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9668">SUSE bug 916868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9668">SUSE bug 916868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9668">SUSE bug 916868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9668">SUSE bug 916868</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9669</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" source="CVE"/>
    <description>
    Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9669.html">CVE-2014-9669</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9669">SUSE bug 916870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9669">SUSE bug 916870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9669">SUSE bug 916870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9669">SUSE bug 916870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9669">SUSE bug 916870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9669">SUSE bug 916870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9669">SUSE bug 916870</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9670</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" source="CVE"/>
    <description>
    Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (integer overflow, NULL pointer dereference, and application crash) via a crafted PCF file that specifies negative values for the first column and first row.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9670.html">CVE-2014-9670</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9670">SUSE bug 916871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9670">SUSE bug 916871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9670">SUSE bug 916871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9670">SUSE bug 916871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9670">SUSE bug 916871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9670">SUSE bug 916871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9670">SUSE bug 916871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9670">SUSE bug 933247</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9671</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" source="CVE"/>
    <description>
    Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incremented.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9671.html">CVE-2014-9671</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9671">SUSE bug 916872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9671">SUSE bug 916872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9671">SUSE bug 916872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9671">SUSE bug 916872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9671">SUSE bug 916872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9671">SUSE bug 916872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9671">SUSE bug 916872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9671">SUSE bug 933247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9671">SUSE bug 933247</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9672</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" source="CVE"/>
    <description>
    Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9672.html">CVE-2014-9672</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9672">SUSE bug 916873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9672">SUSE bug 916873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9672">SUSE bug 916873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9672">SUSE bug 916873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9672">SUSE bug 916873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9672">SUSE bug 916873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9672">SUSE bug 916873</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9673</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" source="CVE"/>
    <description>
    Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9673.html">CVE-2014-9673</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9673">SUSE bug 916874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9673">SUSE bug 916874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9673">SUSE bug 916874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9673">SUSE bug 916874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9673">SUSE bug 916874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9673">SUSE bug 916874</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9673">SUSE bug 916874</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9674</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674" source="CVE"/>
    <description>
    The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with adding to length values without validating the original values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9674.html">CVE-2014-9674</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9674">SUSE bug 916879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9674">SUSE bug 916879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9674">SUSE bug 916879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9674">SUSE bug 916879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9674">SUSE bug 916879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9674">SUSE bug 916879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9674">SUSE bug 916879</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9675</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" source="CVE"/>
    <description>
    bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9675.html">CVE-2014-9675</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9675">SUSE bug 916881</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9675">SUSE bug 916881</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9675">SUSE bug 916881</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9675">SUSE bug 916881</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9675">SUSE bug 916881</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9675">SUSE bug 916881</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138287" comment="freetype2-devel-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138290" comment="ft2demos-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138288" comment="libfreetype6-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138289" comment="libfreetype6-32bit-2.5.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9679</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679" source="CVE"/>
    <description>
    Integer underflow in the cupsRasterReadPixels function in filter/raster.c in CUPS before 2.0.2 allows remote attackers to have unspecified impact via a malformed compressed raster file, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9679.html">CVE-2014-9679</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9679">SUSE bug 917799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9679">SUSE bug 917799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9679">SUSE bug 917799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9679">SUSE bug 917799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9679">SUSE bug 917799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9679">SUSE bug 917799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9679">SUSE bug 917799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9679">SUSE bug 917799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9679">SUSE bug 917799</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138200" comment="cups-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138201" comment="cups-client-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138202" comment="cups-devel-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138203" comment="cups-libs-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151187" comment="cups-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138204" comment="cups-libs-32bit-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151188" comment="cups-libs-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9680</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680" source="CVE"/>
    <description>
    sudo before 1.8.12 does not ensure that the TZ environment variable is associated with a zoneinfo file, which allows local users to open arbitrary files for read access (but not view file contents) by running a program within an sudo session, as demonstrated by interfering with terminal output, discarding kernel-log messages, or repositioning tape drives.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9680.html">CVE-2014-9680</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 919737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 953359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9680">SUSE bug 917806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135931" comment="sudo-1.8.10p3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135934" comment="sudo-devel-1.8.10p3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152559" comment="sudo-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136447" comment="sudo-test-1.8.10p3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152560" comment="sudo-test is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9687</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9687" source="CVE"/>
    <description>
    eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier for attackers to obtain user passwords via a brute force attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9687.html">CVE-2014-9687</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9687">SUSE bug 920160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9687">SUSE bug 920160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9687">SUSE bug 920160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9687">SUSE bug 920160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9687">SUSE bug 920160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9687">SUSE bug 920160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9687">SUSE bug 920160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9687">SUSE bug 920160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9687">SUSE bug 920160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9687">SUSE bug 920160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9687">SUSE bug 920160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9687">SUSE bug 920160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9687">SUSE bug 920160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9687">SUSE bug 920160</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122483" comment="ecryptfs-utils-103-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152561" comment="ecryptfs-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122484" comment="ecryptfs-utils-32bit-103-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152562" comment="ecryptfs-utils-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9705</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9705" source="CVE"/>
    <description>
    Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9705.html">CVE-2014-9705</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9705">SUSE bug 922451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9705">SUSE bug 922451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9705">SUSE bug 922451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9705">SUSE bug 922451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9705">SUSE bug 922451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9705">SUSE bug 922451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9705">SUSE bug 922451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9705">SUSE bug 922451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9705">SUSE bug 922451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9705">SUSE bug 922451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9705">SUSE bug 922451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9705">SUSE bug 922451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9705">SUSE bug 922451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9705">SUSE bug 922451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9705">SUSE bug 922451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9705">SUSE bug 922451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9705">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9705">SUSE bug 922451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9705">SUSE bug 922451</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9709</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709" source="CVE"/>
    <description>
    The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9709.html">CVE-2014-9709</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9709">SUSE bug 923945</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138296" comment="gd-2.1.0-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138297" comment="gd-32bit-2.1.0-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152101" comment="gd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9718</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718" source="CVE"/>
    <description>
    The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality in QEMU 1.0 through 2.1.3 have multiple interpretations of a function's return value, which allows guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9718.html">CVE-2014-9718</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9718">SUSE bug 928393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9718">SUSE bug 928393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9718">SUSE bug 928393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9718">SUSE bug 928393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9718">SUSE bug 964431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9718">SUSE bug 964431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9718">SUSE bug 964431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9718">SUSE bug 964431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9718">SUSE bug 964431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9718">SUSE bug 928393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9718">SUSE bug 928393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9749</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9749" source="CVE"/>
    <description>
    Squid 3.4.4 through 3.4.11 and 3.5.0.1 through 3.5.1, when Digest authentication is used, allow remote authenticated users to retain access by leveraging a stale nonce, aka "Nonce replay vulnerability."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9749.html">CVE-2014-9749</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 993299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9749">SUSE bug 949942</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147395" comment="squid-3.3.14-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9756</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9756" source="CVE"/>
    <description>
    The psf_fwrite function in file_io.c in libsndfile allows attackers to cause a denial of service (divide-by-zero error and application crash) via unspecified vectors related to the headindex variable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9756.html">CVE-2014-9756</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9756">SUSE bug 953521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9756">SUSE bug 953521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9756">SUSE bug 953521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9756">SUSE bug 953521</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009116161" comment="libsndfile-1.0.25-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152564" comment="libsndfile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117461" comment="libsndfile-devel-1.0.25-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151189" comment="libsndfile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118343" comment="libsndfile-progs-1.0.25-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152565" comment="libsndfile-progs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009116162" comment="libsndfile1-1.0.25-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151190" comment="libsndfile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009116163" comment="libsndfile1-32bit-1.0.25-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151191" comment="libsndfile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9761</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9761" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9761.html">CVE-2014-9761</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9761">SUSE bug 962738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9761">SUSE bug 962738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9761">SUSE bug 962738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9761">SUSE bug 962738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9761">SUSE bug 962738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9761">SUSE bug 962738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9761">SUSE bug 962738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9761">SUSE bug 986086</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123354" comment="glibc-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123355" comment="glibc-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123356" comment="glibc-devel-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123357" comment="glibc-devel-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152566" comment="glibc-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123358" comment="glibc-devel-static-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123359" comment="glibc-devel-static-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152568" comment="glibc-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123360" comment="glibc-extra-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123361" comment="glibc-html-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123362" comment="glibc-i18ndata-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123363" comment="glibc-info-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123364" comment="glibc-locale-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123365" comment="glibc-locale-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123366" comment="glibc-obsolete-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152571" comment="glibc-obsolete is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123367" comment="glibc-profile-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123368" comment="glibc-profile-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152573" comment="glibc-profile-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123369" comment="glibc-testsuite-2.19-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152574" comment="glibc-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123370" comment="glibc-utils-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123371" comment="glibc-utils-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152576" comment="glibc-utils-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123372" comment="nscd-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9767</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9767" source="CVE"/>
    <description>
    Directory traversal vulnerability in the ZipArchive::extractTo function in ext/zip/php_zip.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 and ext/zip/ext_zip.cpp in HHVM before 3.12.1 allows remote attackers to create arbitrary empty directories via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9767.html">CVE-2014-9767</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9767">SUSE bug 971612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9767">SUSE bug 971612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9767">SUSE bug 971612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9767">SUSE bug 971612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9767">SUSE bug 971612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9767">SUSE bug 971612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9767">SUSE bug 971612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9767">SUSE bug 971612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9767">SUSE bug 971612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9767">SUSE bug 971612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9767">SUSE bug 971612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9767">SUSE bug 971612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9767">SUSE bug 971612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9767">SUSE bug 971612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9767">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9767">SUSE bug 971612</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127020" comment="apache2-mod_php5-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127021" comment="php5-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127022" comment="php5-bcmath-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127023" comment="php5-bz2-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127024" comment="php5-calendar-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127025" comment="php5-ctype-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127026" comment="php5-curl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127027" comment="php5-dba-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127028" comment="php5-devel-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127029" comment="php5-dom-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127030" comment="php5-enchant-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127031" comment="php5-exif-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127032" comment="php5-fastcgi-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127033" comment="php5-fileinfo-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127034" comment="php5-firebird-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127035" comment="php5-fpm-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127036" comment="php5-ftp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127037" comment="php5-gd-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127038" comment="php5-gettext-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127039" comment="php5-gmp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127040" comment="php5-iconv-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127041" comment="php5-imap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127042" comment="php5-intl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127043" comment="php5-json-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127044" comment="php5-ldap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127045" comment="php5-mbstring-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127046" comment="php5-mcrypt-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127047" comment="php5-mssql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127048" comment="php5-mysql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127049" comment="php5-odbc-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127050" comment="php5-opcache-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127051" comment="php5-openssl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127052" comment="php5-pcntl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127053" comment="php5-pdo-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127054" comment="php5-pear-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127055" comment="php5-pgsql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127056" comment="php5-phar-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127057" comment="php5-posix-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127058" comment="php5-pspell-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127059" comment="php5-readline-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127060" comment="php5-shmop-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127061" comment="php5-snmp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127062" comment="php5-soap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127063" comment="php5-sockets-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127064" comment="php5-sqlite-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127065" comment="php5-suhosin-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127066" comment="php5-sysvmsg-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127067" comment="php5-sysvsem-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127068" comment="php5-sysvshm-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127069" comment="php5-tidy-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127070" comment="php5-tokenizer-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127071" comment="php5-wddx-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127072" comment="php5-xmlreader-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127073" comment="php5-xmlrpc-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127074" comment="php5-xmlwriter-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127075" comment="php5-xsl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127076" comment="php5-zip-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127077" comment="php5-zlib-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9770</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9770" source="CVE"/>
    <description>
    tmpfiles.d/systemd.conf in systemd before 214 uses weak permissions for journal files under (1) /run/log/journal/%m and (2) /var/log/journal/%m, which allows local users to obtain sensitive information by reading these files.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9770.html">CVE-2014-9770</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9770">SUSE bug 972612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9770">SUSE bug 972612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9770">SUSE bug 972612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9770">SUSE bug 972612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9770">SUSE bug 972612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9770">SUSE bug 972612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9770">SUSE bug 972612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9770">SUSE bug 972612</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128161" comment="libgudev-1_0-0-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151688" comment="libgudev-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128162" comment="libgudev-1_0-0-32bit-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152577" comment="libgudev-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128163" comment="libgudev-1_0-devel-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151689" comment="libgudev-1_0-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128164" comment="libudev-devel-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151690" comment="libudev-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128165" comment="libudev-mini-devel-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152578" comment="libudev-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128166" comment="libudev-mini1-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152579" comment="libudev-mini1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128167" comment="libudev1-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151691" comment="libudev1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128168" comment="libudev1-32bit-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151692" comment="libudev1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128169" comment="nss-myhostname-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152580" comment="nss-myhostname is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128170" comment="nss-myhostname-32bit-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152581" comment="nss-myhostname-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128171" comment="systemd-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151693" comment="systemd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128172" comment="systemd-32bit-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151694" comment="systemd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128173" comment="systemd-bash-completion-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151695" comment="systemd-bash-completion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128174" comment="systemd-devel-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152582" comment="systemd-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128175" comment="systemd-journal-gateway-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152583" comment="systemd-journal-gateway is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128176" comment="systemd-logger-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151696" comment="systemd-logger is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128177" comment="systemd-mini-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152584" comment="systemd-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128178" comment="systemd-mini-devel-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152585" comment="systemd-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128179" comment="systemd-mini-sysvinit-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152586" comment="systemd-mini-sysvinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128180" comment="systemd-sysvinit-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151697" comment="systemd-sysvinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128181" comment="typelib-1_0-GUdev-1_0-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151698" comment="typelib-1_0-GUdev-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128182" comment="udev-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151699" comment="udev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128183" comment="udev-mini-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152587" comment="udev-mini is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9773</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9773" source="CVE"/>
    <description>
    modules/chanserv/flags.c in Atheme before 7.2.7 allows remote attackers to modify the Anope FLAGS behavior by registering and dropping the (1) LIST, (2) CLEAR, or (3) MODIFY keyword nicks.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9773.html">CVE-2014-9773</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9773">SUSE bug 978170</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9773">SUSE bug 978170</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9773">SUSE bug 978170</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9773">SUSE bug 978170</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127671" comment="atheme-7.2.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152588" comment="atheme is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127672" comment="atheme-devel-7.2.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152589" comment="atheme-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127673" comment="libathemecore1-7.2.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152590" comment="libathemecore1 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9805</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9805" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted pnm file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9805.html">CVE-2014-9805</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 983752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 983752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 983752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 983752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 983752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 983752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 983752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 983752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 983752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 983752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 983752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 983752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 983752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 983752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 983752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 983752</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9805">SUSE bug 983752</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9806</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9806" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (file descriptor consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9806.html">CVE-2014-9806</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9806">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9806">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9806">SUSE bug 983774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9806">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9806">SUSE bug 983774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9806">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9806">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9806">SUSE bug 983774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9806">SUSE bug 983774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9806">SUSE bug 983774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9806">SUSE bug 983774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9806">SUSE bug 983774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9806">SUSE bug 983774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9806">SUSE bug 983774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9806">SUSE bug 983774</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9807</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9807" source="CVE"/>
    <description>
    The pdb coder in ImageMagick allows remote attackers to cause a denial of service (double free) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9807.html">CVE-2014-9807</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9807">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9807">SUSE bug 983794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9807">SUSE bug 983794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9807">SUSE bug 983794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9807">SUSE bug 983794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9807">SUSE bug 983794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9807">SUSE bug 983794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9807">SUSE bug 983794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9807">SUSE bug 983794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9807">SUSE bug 983794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9807">SUSE bug 983794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9807">SUSE bug 983794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9807">SUSE bug 983794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9807">SUSE bug 983794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9807">SUSE bug 983794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9807">SUSE bug 983794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9807">SUSE bug 983794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9807">SUSE bug 983794</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9808</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9808" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted dpc image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9808.html">CVE-2014-9808</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9808">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9808">SUSE bug 983796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9808">SUSE bug 983796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9808">SUSE bug 983796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9808">SUSE bug 983796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9808">SUSE bug 983796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9808">SUSE bug 983796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9808">SUSE bug 983796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9808">SUSE bug 983796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9808">SUSE bug 983796</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9808">SUSE bug 983796</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9809</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9809" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted xwd image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9809.html">CVE-2014-9809</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9809">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9809">SUSE bug 983799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9809">SUSE bug 983799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9809">SUSE bug 983799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9809">SUSE bug 983799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9809">SUSE bug 983799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9809">SUSE bug 983799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9809">SUSE bug 983799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9809">SUSE bug 983799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9809">SUSE bug 983799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9809">SUSE bug 983799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9809">SUSE bug 983799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9809">SUSE bug 983799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9809">SUSE bug 983799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9809">SUSE bug 983799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9809">SUSE bug 983799</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9809">SUSE bug 983799</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9810</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9810" source="CVE"/>
    <description>
    The dpx file handler in ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a malformed dpx file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9810.html">CVE-2014-9810</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9810">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9810">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9810">SUSE bug 983803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9810">SUSE bug 983803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9810">SUSE bug 983803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9810">SUSE bug 983803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9810">SUSE bug 983803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9810">SUSE bug 983803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9810">SUSE bug 983803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9810">SUSE bug 983803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9810">SUSE bug 983803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9810">SUSE bug 983803</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9811</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9811" source="CVE"/>
    <description>
    The xwd file handler in ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a malformed xwd file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9811.html">CVE-2014-9811</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9811">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9811">SUSE bug 984032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9811">SUSE bug 984032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9811">SUSE bug 984032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9811">SUSE bug 984032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9811">SUSE bug 984032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9811">SUSE bug 984032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9811">SUSE bug 984032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9811">SUSE bug 984032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9811">SUSE bug 984032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9811">SUSE bug 984032</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9812</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9812" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted ps file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9812.html">CVE-2014-9812</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9812">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9812">SUSE bug 984137</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9812">SUSE bug 984137</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9812">SUSE bug 984137</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9812">SUSE bug 984137</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9812">SUSE bug 984137</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9812">SUSE bug 984137</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9812">SUSE bug 984137</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9812">SUSE bug 984137</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9812">SUSE bug 984137</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9812">SUSE bug 984137</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9813</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9813" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (application crash) via a crafted viff file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9813.html">CVE-2014-9813</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9813">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9813">SUSE bug 984035</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9813">SUSE bug 984035</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9813">SUSE bug 984035</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9813">SUSE bug 984035</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9813">SUSE bug 984398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9813">SUSE bug 984035</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9813">SUSE bug 984035</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9813">SUSE bug 984035</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9813">SUSE bug 984035</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9813">SUSE bug 984035</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9813">SUSE bug 984035</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9813">SUSE bug 984035</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9814</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9814" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted wpg file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9814.html">CVE-2014-9814</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9814">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9814">SUSE bug 984193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9814">SUSE bug 984193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9814">SUSE bug 984193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9814">SUSE bug 984372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9814">SUSE bug 984193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9814">SUSE bug 984193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9814">SUSE bug 984193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9814">SUSE bug 984193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9814">SUSE bug 984193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9814">SUSE bug 984193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9814">SUSE bug 984193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9814">SUSE bug 984193</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9815</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9815" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (application crash) via a crafted wpg file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9815.html">CVE-2014-9815</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9815">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9815">SUSE bug 984372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9815">SUSE bug 984372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9815">SUSE bug 984372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9815">SUSE bug 984372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9815">SUSE bug 984372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9815">SUSE bug 984372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9815">SUSE bug 984372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9815">SUSE bug 984372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9815">SUSE bug 984372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9815">SUSE bug 984372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9815">SUSE bug 984372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9815">SUSE bug 984372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9815">SUSE bug 984372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9815">SUSE bug 984372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9815">SUSE bug 984372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9815">SUSE bug 984372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9815">SUSE bug 984372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9815">SUSE bug 984372</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9816</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9816" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9816" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted viff file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9816.html">CVE-2014-9816</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9816">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9816">SUSE bug 984398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9816">SUSE bug 984398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9816">SUSE bug 984035</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9816">SUSE bug 984398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9816">SUSE bug 984398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9816">SUSE bug 984398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9816">SUSE bug 984398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9816">SUSE bug 984398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9816">SUSE bug 984398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9816">SUSE bug 984398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9816">SUSE bug 984398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9816">SUSE bug 984398</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9817</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9817" source="CVE"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted pdb file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9817.html">CVE-2014-9817</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9817">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9817">SUSE bug 984400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9817">SUSE bug 984400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9817">SUSE bug 984400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9817">SUSE bug 984400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9817">SUSE bug 984400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9817">SUSE bug 984400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9817">SUSE bug 984400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9817">SUSE bug 984400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9817">SUSE bug 984400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9817">SUSE bug 984400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9817">SUSE bug 984400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9817">SUSE bug 984400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9817">SUSE bug 984400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9817">SUSE bug 984400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9817">SUSE bug 984400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9817">SUSE bug 984400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9817">SUSE bug 984400</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9818</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9818" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a malformed sun file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9818.html">CVE-2014-9818</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9818">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9818">SUSE bug 984181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9818">SUSE bug 984181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9818">SUSE bug 984181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9818">SUSE bug 984186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9818">SUSE bug 984409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9818">SUSE bug 984181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9818">SUSE bug 984181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9818">SUSE bug 984181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9818">SUSE bug 984181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9818">SUSE bug 984181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9818">SUSE bug 984181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9818">SUSE bug 984181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9818">SUSE bug 1000690</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9819</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9819" source="CVE"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted palm file, a different vulnerability than CVE-2014-9823.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9819.html">CVE-2014-9819</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9819">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9819">SUSE bug 984142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9819">SUSE bug 984142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9819">SUSE bug 984142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9819">SUSE bug 984142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9819">SUSE bug 984142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9819">SUSE bug 984142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9819">SUSE bug 984142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9819">SUSE bug 984142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9819">SUSE bug 984142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9819">SUSE bug 984142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9819">SUSE bug 984142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9819">SUSE bug 984142</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9819">SUSE bug 984142</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9820</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9820" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9820" source="CVE"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted pnm file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9820.html">CVE-2014-9820</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9820">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9820">SUSE bug 984150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9820">SUSE bug 984150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9820">SUSE bug 984150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9820">SUSE bug 984150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9820">SUSE bug 984150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9820">SUSE bug 984150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9820">SUSE bug 984150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9820">SUSE bug 984150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9820">SUSE bug 984150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9820">SUSE bug 984150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9820">SUSE bug 984150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9820">SUSE bug 984150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9820">SUSE bug 984150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9820">SUSE bug 984150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9820">SUSE bug 984150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9820">SUSE bug 984150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9820">SUSE bug 984150</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9821</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9821" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9821" source="CVE"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted xpm file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9821.html">CVE-2014-9821</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9821">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9821">SUSE bug 984014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9821">SUSE bug 984014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9821">SUSE bug 984014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9821">SUSE bug 984014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9821">SUSE bug 984014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9821">SUSE bug 984014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9821">SUSE bug 984014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9821">SUSE bug 984014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9821">SUSE bug 984014</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9822</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9822" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9822" source="CVE"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted quantum file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9822.html">CVE-2014-9822</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9822">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9822">SUSE bug 984187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9822">SUSE bug 984187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9822">SUSE bug 984187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9822">SUSE bug 984187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9822">SUSE bug 984187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9822">SUSE bug 984187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9822">SUSE bug 984187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9822">SUSE bug 984187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9822">SUSE bug 984187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9822">SUSE bug 984187</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9823</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9823" source="CVE"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted palm file, a different vulnerability than CVE-2014-9819.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9823.html">CVE-2014-9823</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9823">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9823">SUSE bug 984401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9823">SUSE bug 984401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9823">SUSE bug 984401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9823">SUSE bug 984401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9823">SUSE bug 984401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9823">SUSE bug 984401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9823">SUSE bug 984401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9823">SUSE bug 984401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9823">SUSE bug 984401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9823">SUSE bug 984401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9823">SUSE bug 984401</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9824</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9824" source="CVE"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted psd file, a different vulnerability than CVE-2014-9825.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9824.html">CVE-2014-9824</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9824">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9824">SUSE bug 984185</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9824">SUSE bug 984185</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9824">SUSE bug 984185</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9824">SUSE bug 984185</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9824">SUSE bug 984185</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9824">SUSE bug 984185</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9824">SUSE bug 984185</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9824">SUSE bug 984185</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9824">SUSE bug 984185</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9824">SUSE bug 984185</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9824">SUSE bug 984185</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9825</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9825" source="CVE"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted psd file, a different vulnerability than CVE-2014-9824.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9825.html">CVE-2014-9825</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9825">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9825">SUSE bug 984427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9825">SUSE bug 984427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9825">SUSE bug 984427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9825">SUSE bug 984427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9825">SUSE bug 984427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9825">SUSE bug 984427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9825">SUSE bug 984427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9825">SUSE bug 984427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9825">SUSE bug 984427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9825">SUSE bug 984427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9825">SUSE bug 984427</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9826</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9826" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9826" source="CVE"/>
    <description>
    ImageMagick allows remote attackers to have unspecified impact via vectors related to error handling in sun files.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9826.html">CVE-2014-9826</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9826">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9826">SUSE bug 984186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9826">SUSE bug 984186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9826">SUSE bug 984186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9826">SUSE bug 984186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9826">SUSE bug 984186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9826">SUSE bug 984186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9826">SUSE bug 984186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9826">SUSE bug 984186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9826">SUSE bug 984186</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9828</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9828" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9828" source="CVE"/>
    <description>
    coders/psd.c in ImageMagick allows remote attackers to have unspecified impact via a crafted psd file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9828.html">CVE-2014-9828</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9828">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9828">SUSE bug 984028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9828">SUSE bug 984028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9828">SUSE bug 984028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9828">SUSE bug 984028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9828">SUSE bug 984028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9828">SUSE bug 984028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9828">SUSE bug 984028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9828">SUSE bug 984028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9828">SUSE bug 984028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9828">SUSE bug 984028</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9829</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9829" source="CVE"/>
    <description>
    coders/sun.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted sun file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9829.html">CVE-2014-9829</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9829">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9829">SUSE bug 984409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9829">SUSE bug 984409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9829">SUSE bug 984409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9829">SUSE bug 984409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9829">SUSE bug 984409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9829">SUSE bug 984409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9829">SUSE bug 984409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9829">SUSE bug 984409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9829">SUSE bug 984409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9829">SUSE bug 984409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9829">SUSE bug 984409</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9830</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9830" source="CVE"/>
    <description>
    coders/sun.c in ImageMagick allows remote attackers to have unspecified impact via a corrupted sun file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9830.html">CVE-2014-9830</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9830">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9830">SUSE bug 984135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9830">SUSE bug 984135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9830">SUSE bug 984135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9830">SUSE bug 984135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9830">SUSE bug 984135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9830">SUSE bug 984135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9830">SUSE bug 984135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9830">SUSE bug 984135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9830">SUSE bug 984135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9830">SUSE bug 984135</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9830">SUSE bug 1000690</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9831</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9831" source="CVE"/>
    <description>
    coders/wpg.c in ImageMagick allows remote attackers to have unspecified impact via a corrupted wpg file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9831.html">CVE-2014-9831</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9831">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9831">SUSE bug 984375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9831">SUSE bug 984375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9831">SUSE bug 984375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9831">SUSE bug 984375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9831">SUSE bug 984375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9831">SUSE bug 984375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9831">SUSE bug 984375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9831">SUSE bug 984375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9831">SUSE bug 984375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9831">SUSE bug 984375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9831">SUSE bug 984375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9831">SUSE bug 984375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9831">SUSE bug 984375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9831">SUSE bug 984375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9831">SUSE bug 984375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9831">SUSE bug 984375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9831">SUSE bug 984375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9831">SUSE bug 984375</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9832</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9832" source="CVE"/>
    <description>
    Heap overflow in ImageMagick 6.8.9-9 via a crafted pcx file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9832.html">CVE-2014-9832</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9832">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9832">SUSE bug 984183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9832">SUSE bug 984183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9832">SUSE bug 984183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9832">SUSE bug 984183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9832">SUSE bug 984183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9832">SUSE bug 984183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9832">SUSE bug 984183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9832">SUSE bug 984183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9832">SUSE bug 984183</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9833</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9833" source="CVE"/>
    <description>
    Heap overflow in ImageMagick 6.8.9-9 via a crafted psd file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9833.html">CVE-2014-9833</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9833">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9833">SUSE bug 984406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9833">SUSE bug 984406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9833">SUSE bug 984406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9833">SUSE bug 984427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9833">SUSE bug 984406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9833">SUSE bug 984406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9833">SUSE bug 984406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9833">SUSE bug 984406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9833">SUSE bug 984406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9833">SUSE bug 984406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9833">SUSE bug 984406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9833">SUSE bug 984406</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9834</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9834" source="CVE"/>
    <description>
    Heap overflow in ImageMagick 6.8.9-9 via a crafted pict file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9834.html">CVE-2014-9834</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9834">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9834">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9834">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9834">SUSE bug 984436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9834">SUSE bug 984436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9834">SUSE bug 984436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9834">SUSE bug 984436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9834">SUSE bug 984436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9834">SUSE bug 984436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9834">SUSE bug 984436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9834">SUSE bug 984436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9834">SUSE bug 984436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9834">SUSE bug 984436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9834">SUSE bug 984436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9834">SUSE bug 984436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9834">SUSE bug 984436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9834">SUSE bug 984436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9834">SUSE bug 984436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9834">SUSE bug 984436</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9835</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9835" source="CVE"/>
    <description>
    Heap overflow in ImageMagick 6.8.9-9 via a crafted wpf file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9835.html">CVE-2014-9835</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9835">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9835">SUSE bug 984145</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9835">SUSE bug 984145</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9835">SUSE bug 984145</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9835">SUSE bug 984375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9835">SUSE bug 984145</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9835">SUSE bug 984145</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9835">SUSE bug 984145</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9835">SUSE bug 984145</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9835">SUSE bug 984145</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9835">SUSE bug 984145</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9835">SUSE bug 984145</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9835">SUSE bug 984145</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9835">SUSE bug 984145</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9835">SUSE bug 984145</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9835">SUSE bug 984145</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9835">SUSE bug 984145</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9835">SUSE bug 984145</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9835">SUSE bug 984145</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9836</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9836" source="CVE"/>
    <description>
    ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service via a crafted xpm file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9836.html">CVE-2014-9836</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9836">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9836">SUSE bug 984023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9836">SUSE bug 984023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9836">SUSE bug 984023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9836">SUSE bug 984023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9836">SUSE bug 984023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9836">SUSE bug 984023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9836">SUSE bug 984023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9836">SUSE bug 984023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9836">SUSE bug 984023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9836">SUSE bug 984023</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9837</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9837" source="CVE"/>
    <description>
    coders/pnm.c in ImageMagick 6.9.0-1 Beta and earlier allows remote attackers to cause a denial of service (crash) via a crafted png file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9837.html">CVE-2014-9837</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9837">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9837">SUSE bug 984166</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9837">SUSE bug 984166</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9837">SUSE bug 984166</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9837">SUSE bug 984166</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9837">SUSE bug 984166</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9837">SUSE bug 984166</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9837">SUSE bug 984166</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9837">SUSE bug 984166</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9837">SUSE bug 984166</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9837">SUSE bug 984166</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9837">SUSE bug 984166</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9837">SUSE bug 984166</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9837">SUSE bug 984166</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9837">SUSE bug 984166</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9837">SUSE bug 984166</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9837">SUSE bug 984166</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9838</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9838" source="CVE"/>
    <description>
    magick/cache.c in ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service (crash).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9838.html">CVE-2014-9838</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9838">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9838">SUSE bug 984370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9838">SUSE bug 984370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9838">SUSE bug 984370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9838">SUSE bug 984370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9838">SUSE bug 984370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9838">SUSE bug 984370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9838">SUSE bug 984370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9838">SUSE bug 984370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9838">SUSE bug 984370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9838">SUSE bug 984370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9838">SUSE bug 984370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9839</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9839" source="CVE"/>
    <description>
    magick/colormap-private.h in ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds access).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9839.html">CVE-2014-9839</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9839">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9839">SUSE bug 984379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9839">SUSE bug 984379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9839">SUSE bug 984379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9839">SUSE bug 984379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9839">SUSE bug 984379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9839">SUSE bug 984379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9839">SUSE bug 984379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9839">SUSE bug 984379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9839">SUSE bug 984379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9839">SUSE bug 984379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9839">SUSE bug 984379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9839">SUSE bug 984379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9839">SUSE bug 984379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9839">SUSE bug 984379</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9840</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9840" source="CVE"/>
    <description>
    ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted palm file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9840.html">CVE-2014-9840</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9840">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9840">SUSE bug 984433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9840">SUSE bug 984433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9840">SUSE bug 984433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9840">SUSE bug 984433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9840">SUSE bug 984433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9840">SUSE bug 984433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9840">SUSE bug 984433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9840">SUSE bug 984433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9840">SUSE bug 984433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9840">SUSE bug 984433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9840">SUSE bug 984433</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9841</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9841" source="CVE"/>
    <description>
    The ReadPSDLayers function in coders/psd.c in ImageMagick 6.8.9.9 allows remote attackers to have unspecified impact via unknown vectors, related to "throwing of exceptions."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9841.html">CVE-2014-9841</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9841">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9841">SUSE bug 984172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9841">SUSE bug 984172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9841">SUSE bug 984172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9841">SUSE bug 984172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9841">SUSE bug 984186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9841">SUSE bug 984172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9841">SUSE bug 984374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9841">SUSE bug 984172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9841">SUSE bug 984172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9841">SUSE bug 984172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9841">SUSE bug 984172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9841">SUSE bug 984172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9841">SUSE bug 984172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9841">SUSE bug 984172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9841">SUSE bug 984172</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9842</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9842" source="CVE"/>
    <description>
    Memory leak in the ReadPSDLayers function in coders/psd.c in ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9842.html">CVE-2014-9842</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9842">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9842">SUSE bug 984374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9842">SUSE bug 984374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9842">SUSE bug 984172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9842">SUSE bug 984374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9842">SUSE bug 984374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9842">SUSE bug 984374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9842">SUSE bug 984374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9842">SUSE bug 984374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9842">SUSE bug 984374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9842">SUSE bug 984374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9842">SUSE bug 984374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9842">SUSE bug 984374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9842">SUSE bug 984374</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9843</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9843" source="CVE"/>
    <description>
    The DecodePSDPixels function in coders/psd.c in ImageMagick 6.8.9.9 allows remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9843.html">CVE-2014-9843</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9843">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9843">SUSE bug 984179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9843">SUSE bug 984179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9843">SUSE bug 984179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9843">SUSE bug 984179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9843">SUSE bug 984179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9843">SUSE bug 984179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9843">SUSE bug 984179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9843">SUSE bug 984179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9843">SUSE bug 1000697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9843">SUSE bug 984179</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9844</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9844" source="CVE"/>
    <description>
    The ReadRLEImage function in coders/rle.c in ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9844.html">CVE-2014-9844</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9844">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9844">SUSE bug 984373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9844">SUSE bug 984373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9844">SUSE bug 984373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9844">SUSE bug 984408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9844">SUSE bug 984373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9844">SUSE bug 984373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9844">SUSE bug 984373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9844">SUSE bug 984373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9844">SUSE bug 984373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9844">SUSE bug 984373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9844">SUSE bug 984373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9844">SUSE bug 984373</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9845</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9845" source="CVE"/>
    <description>
    The ReadDIBImage function in coders/dib.c in ImageMagick allows remote attackers to cause a denial of service (crash) via a corrupted dib file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9845.html">CVE-2014-9845</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9845">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9845">SUSE bug 984394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9845">SUSE bug 984394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9845">SUSE bug 984394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9845">SUSE bug 984394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9845">SUSE bug 984394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9845">SUSE bug 984394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9845">SUSE bug 984394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9845">SUSE bug 984394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9845">SUSE bug 984394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9845">SUSE bug 984394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9845">SUSE bug 984394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9845">SUSE bug 984394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9845">SUSE bug 984394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9845">SUSE bug 984394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9845">SUSE bug 984394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9845">SUSE bug 984394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9845">SUSE bug 984394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9845">SUSE bug 984394</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9846</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9846" source="CVE"/>
    <description>
    Buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.8.9.9 allows remote attackers to have unspecified impact.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9846.html">CVE-2014-9846</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 983521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 983521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 984408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 983521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 983521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 983521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 983521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 983521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 983521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 983521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 983521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 983521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 983521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 983521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 983521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 983521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 983521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9846">SUSE bug 983521</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9847</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9847" source="CVE"/>
    <description>
    The jng decoder in ImageMagick 6.8.9.9 allows remote attackers to have an unspecified impact.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9847.html">CVE-2014-9847</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9847">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9847">SUSE bug 984144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9847">SUSE bug 984144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9847">SUSE bug 984144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9847">SUSE bug 984144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9847">SUSE bug 984144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9847">SUSE bug 984144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9847">SUSE bug 984144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9847">SUSE bug 984144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9847">SUSE bug 984144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9847">SUSE bug 984144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9847">SUSE bug 1040304</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9847">SUSE bug 984144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9847">SUSE bug 984144</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9848</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9848" source="CVE"/>
    <description>
    Memory leak in ImageMagick allows remote attackers to cause a denial of service (memory consumption).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9848.html">CVE-2014-9848</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9848">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9848">SUSE bug 984404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9848">SUSE bug 984404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9848">SUSE bug 984404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9848">SUSE bug 984404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9848">SUSE bug 984404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9848">SUSE bug 984404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9848">SUSE bug 984404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9848">SUSE bug 984404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9848">SUSE bug 984404</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146415" comment="ImageMagick-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146416" comment="ImageMagick-devel-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146417" comment="ImageMagick-devel-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146418" comment="ImageMagick-doc-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146419" comment="ImageMagick-extra-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146420" comment="libMagick++-6_Q16-3-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146421" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146422" comment="libMagick++-devel-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146423" comment="libMagick++-devel-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146424" comment="libMagickCore-6_Q16-1-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146425" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146426" comment="libMagickWand-6_Q16-1-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146427" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146428" comment="perl-PerlMagick-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9849</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9849" source="CVE"/>
    <description>
    The png coder in ImageMagick allows remote attackers to cause a denial of service (crash).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9849.html">CVE-2014-9849</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9849">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9849">SUSE bug 984018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9849">SUSE bug 984018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9849">SUSE bug 984018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9849">SUSE bug 984018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9849">SUSE bug 984018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9849">SUSE bug 984018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9849">SUSE bug 984018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9849">SUSE bug 984018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9849">SUSE bug 984018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9849">SUSE bug 984018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9849">SUSE bug 984018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9849">SUSE bug 984018</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9850</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9850" source="CVE"/>
    <description>
    Logic error in ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (resource consumption).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9850.html">CVE-2014-9850</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9850">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9850">SUSE bug 984149</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9850">SUSE bug 984149</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9850">SUSE bug 984149</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9850">SUSE bug 984149</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9850">SUSE bug 984149</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9850">SUSE bug 984149</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9850">SUSE bug 984149</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9850">SUSE bug 984149</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9850">SUSE bug 984149</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9851</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9851" source="CVE"/>
    <description>
    ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (application crash).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9851.html">CVE-2014-9851</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9851">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9851">SUSE bug 984160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9851">SUSE bug 984160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9851">SUSE bug 984160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9851">SUSE bug 984160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9851">SUSE bug 984160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9851">SUSE bug 984160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9851">SUSE bug 984160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9851">SUSE bug 984160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9851">SUSE bug 984160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9851">SUSE bug 984160</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9852</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9852" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9852" source="CVE"/>
    <description>
    distribute-cache.c in ImageMagick re-uses objects after they have been destroyed, which allows remote attackers to have unspecified impact via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9852.html">CVE-2014-9852</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9852">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9852">SUSE bug 984191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9852">SUSE bug 984191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9852">SUSE bug 984191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9852">SUSE bug 984191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9852">SUSE bug 984191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9852">SUSE bug 984191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9852">SUSE bug 984191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9852">SUSE bug 984191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9852">SUSE bug 984191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9852">SUSE bug 984191</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9853</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9853" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9853" source="CVE"/>
    <description>
    Memory leak in coders/rle.c in ImageMagick allows remote attackers to cause a denial of service (memory consumption) via a crafted rle file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9853.html">CVE-2014-9853</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9853">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9853">SUSE bug 984408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9853">SUSE bug 984408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9853">SUSE bug 984408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9853">SUSE bug 984408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9853">SUSE bug 984408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9853">SUSE bug 984408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9853">SUSE bug 984408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9853">SUSE bug 984408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9853">SUSE bug 984408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9853">SUSE bug 984408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9853">SUSE bug 984408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9853">SUSE bug 984408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9853">SUSE bug 984408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9854</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9854" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9854" source="CVE"/>
    <description>
    coders/tiff.c in ImageMagick allows remote attackers to cause a denial of service (application crash) via vectors related to the "identification of image."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9854.html">CVE-2014-9854</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9854">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9854">SUSE bug 984184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9854">SUSE bug 984184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9854">SUSE bug 984184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9854">SUSE bug 984184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9854">SUSE bug 984184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9854">SUSE bug 984184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9854">SUSE bug 984184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9854">SUSE bug 984184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9854">SUSE bug 984184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9854">SUSE bug 984184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9854">SUSE bug 984184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9854">SUSE bug 984184</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9862</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9862" source="CVE"/>
    <description>
    Integer signedness error in bspatch.c in bspatch in bsdiff, as used in Apple OS X before 10.11.6 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a crafted patch file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9862.html">CVE-2014-9862</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9862">SUSE bug 990660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9862">SUSE bug 990660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9862">SUSE bug 990660</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130872" comment="bsdiff-4.3-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152601" comment="bsdiff is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9907</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2014-9907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9907" source="CVE"/>
    <description>
    coders/dds.c in ImageMagick allows remote attackers to cause a denial of service via a crafted DDS file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2014-9907.html">CVE-2014-9907</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9907">SUSE bug 1000714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9907">SUSE bug 1000714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9907">SUSE bug 1000714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9907">SUSE bug 1000714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9907">SUSE bug 1000714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2014-9907">SUSE bug 1074610</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0202</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0202" source="CVE"/>
    <description>
    The mod_dav_svn server in Subversion 1.8.0 through 1.8.11 allows remote attackers to cause a denial of service (memory consumption) via a large number of REPORT requests, which trigger the traversal of FSFS repository nodes.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0202.html">CVE-2015-0202</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0202">SUSE bug 923793</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0202">SUSE bug 923793</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0202">SUSE bug 923793</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0202">SUSE bug 923793</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0202">SUSE bug 923793</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0202">SUSE bug 923793</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0204</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204" source="CVE"/>
    <description>
    The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue.  NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0204.html">CVE-2015-0204</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 920339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 920484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 920482</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 920484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 927591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 936787</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 936787</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 936787</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 952088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 952088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 952088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 952088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 952088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0204">SUSE bug 912014</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0205</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205" source="CVE"/>
    <description>
    The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0205.html">CVE-2015-0205</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 920339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 937891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0205">SUSE bug 912293</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0206</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206" source="CVE"/>
    <description>
    Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0206.html">CVE-2015-0206</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0206">SUSE bug 912292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0206">SUSE bug 912292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0206">SUSE bug 912316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0206">SUSE bug 912292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0206">SUSE bug 912292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0206">SUSE bug 912292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0206">SUSE bug 912292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0206">SUSE bug 912292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0206">SUSE bug 912292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0206">SUSE bug 912292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0206">SUSE bug 912292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0206">SUSE bug 912292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0206">SUSE bug 920339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0206">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0206">SUSE bug 912292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0206">SUSE bug 937891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0206">SUSE bug 912292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0206">SUSE bug 912292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0206">SUSE bug 912292</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0209</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209" source="CVE"/>
    <description>
    Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0209.html">CVE-2015-0209</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0209">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0209">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0209">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0209">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0209">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0209">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0209">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0209">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0209">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0209">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0209">SUSE bug 936586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0209">SUSE bug 937891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0209">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0209">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0209">SUSE bug 919648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0210</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0210" source="CVE"/>
    <description>
    wpa_supplicant 2.0-16 does not properly check certificate subject name, which allows remote attackers to cause a man-in-the-middle attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0210.html">CVE-2015-0210</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0210">SUSE bug 915323</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139133" comment="wpa_supplicant-2.2-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139134" comment="wpa_supplicant-gui-2.2-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0228</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0228" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0228" source="CVE"/>
    <description>
    The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0228.html">CVE-2015-0228</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0228">SUSE bug 918352</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0228">SUSE bug 918352</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0228">SUSE bug 918352</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0228">SUSE bug 918352</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0228">SUSE bug 918352</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0228">SUSE bug 918352</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0228">SUSE bug 918352</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0228">SUSE bug 918352</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0231</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0231" source="CVE"/>
    <description>
    Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0231.html">CVE-2015-0231</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0231">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0231">SUSE bug 910659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0231">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0231">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0231">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0231">SUSE bug 992991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0232</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0232" source="CVE"/>
    <description>
    The exif_process_unicode function in ext/exif/exif.c in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free and application crash) via crafted EXIF data in a JPEG image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0232.html">CVE-2015-0232</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0232">SUSE bug 914690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0232">SUSE bug 914690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0232">SUSE bug 914690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0232">SUSE bug 914690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0232">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0232">SUSE bug 992991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0236</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0236" source="CVE"/>
    <description>
    libvirt before 1.2.12 allow remote authenticated users to obtain the VNC password by using the VIR_DOMAIN_XML_SECURE flag with a crafted (1) snapshot to the virDomainSnapshotGetXMLDesc interface or (2) image to the virDomainSaveImageGetXMLDesc interface.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0236.html">CVE-2015-0236</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0236">SUSE bug 914693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0236">SUSE bug 914693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0236">SUSE bug 914693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0236">SUSE bug 914693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0236">SUSE bug 914693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0236">SUSE bug 914693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0236">SUSE bug 914693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0236">SUSE bug 914693</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0240</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240" source="CVE"/>
    <description>
    The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0240.html">CVE-2015-0240</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0240">SUSE bug 917376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0240">SUSE bug 917376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0240">SUSE bug 917376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0240">SUSE bug 917376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0240">SUSE bug 917376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0240">SUSE bug 917376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0240">SUSE bug 917376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0240">SUSE bug 917376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0240">SUSE bug 917376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0240">SUSE bug 917376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0240">SUSE bug 917376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0240">SUSE bug 917376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0240">SUSE bug 917376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0240">SUSE bug 917376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0240">SUSE bug 917376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0240">SUSE bug 917376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138558" comment="libdcerpc-binding0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138559" comment="libdcerpc-binding0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138560" comment="libdcerpc0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138561" comment="libdcerpc0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138562" comment="libgensec0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138563" comment="libgensec0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138564" comment="libndr-krb5pac0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138565" comment="libndr-krb5pac0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138566" comment="libndr-nbt0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138567" comment="libndr-nbt0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138568" comment="libndr-standard0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138569" comment="libndr-standard0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138570" comment="libndr0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138571" comment="libndr0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138572" comment="libnetapi0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138573" comment="libnetapi0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138574" comment="libregistry0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138575" comment="libsamba-credentials0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138576" comment="libsamba-credentials0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138577" comment="libsamba-hostconfig0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138578" comment="libsamba-hostconfig0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138579" comment="libsamba-passdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138580" comment="libsamba-passdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138581" comment="libsamba-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138582" comment="libsamba-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138583" comment="libsamdb0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138584" comment="libsamdb0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138585" comment="libsmbclient-devel-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138586" comment="libsmbclient-raw0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138587" comment="libsmbclient-raw0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138588" comment="libsmbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138589" comment="libsmbconf0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138590" comment="libsmbconf0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138591" comment="libsmbldap0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138592" comment="libsmbldap0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138593" comment="libtevent-util0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138594" comment="libtevent-util0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138595" comment="libwbclient0-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138596" comment="libwbclient0-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138597" comment="samba-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138598" comment="samba-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138599" comment="samba-client-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138600" comment="samba-client-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138601" comment="samba-doc-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138602" comment="samba-libs-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138603" comment="samba-libs-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138604" comment="samba-winbind-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138605" comment="samba-winbind-32bit-4.2.4-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0245</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245" source="CVE"/>
    <description>
    D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0245.html">CVE-2015-0245</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0245">SUSE bug 916343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0245">SUSE bug 916343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0245">SUSE bug 916343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0245">SUSE bug 916343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0245">SUSE bug 916343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0245">SUSE bug 1003898</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138227" comment="dbus-1-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138228" comment="dbus-1-devel-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151536" comment="dbus-1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138229" comment="dbus-1-x11-1.8.16-5.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138230" comment="libdbus-1-3-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138231" comment="libdbus-1-3-32bit-1.8.16-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151539" comment="libdbus-1-3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0247</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247" source="CVE"/>
    <description>
    Heap-based buffer overflow in openfs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code via crafted block group descriptor data in a filesystem image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0247.html">CVE-2015-0247</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0247">SUSE bug 918346</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138244" comment="e2fsprogs-1.42.11-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152602" comment="e2fsprogs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138245" comment="e2fsprogs-devel-1.42.11-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152603" comment="e2fsprogs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138246" comment="libcom_err-devel-1.42.11-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152604" comment="libcom_err-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138247" comment="libcom_err2-1.42.11-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152605" comment="libcom_err2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138248" comment="libcom_err2-32bit-1.42.11-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152606" comment="libcom_err2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138249" comment="libext2fs-devel-1.42.11-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152607" comment="libext2fs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138250" comment="libext2fs2-1.42.11-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152608" comment="libext2fs2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0248</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0248" source="CVE"/>
    <description>
    The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0248.html">CVE-2015-0248</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0248">SUSE bug 923794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0248">SUSE bug 923794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0248">SUSE bug 923794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0248">SUSE bug 923794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0248">SUSE bug 923794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0248">SUSE bug 923794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0248">SUSE bug 923794</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0251</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0251" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0251" source="CVE"/>
    <description>
    The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote authenticated users to spoof the svn:author property via a crafted v1 HTTP protocol request sequences.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0251.html">CVE-2015-0251</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0251">SUSE bug 923795</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0251">SUSE bug 923795</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0251">SUSE bug 923795</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0251">SUSE bug 923795</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0251">SUSE bug 923795</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0251">SUSE bug 923795</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139092" comment="subversion-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139093" comment="subversion-devel-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139094" comment="subversion-perl-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139095" comment="subversion-python-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139096" comment="subversion-server-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139097" comment="subversion-tools-1.8.10-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0252</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0252" source="CVE"/>
    <description>
    internal/XMLReader.cpp in Apache Xerces-C before 3.1.2 allows remote attackers to cause a denial of service (segmentation fault and crash) via crafted XML data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0252.html">CVE-2015-0252</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0252">SUSE bug 920810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0252">SUSE bug 920810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0252">SUSE bug 920810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0252">SUSE bug 920810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0252">SUSE bug 920810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0252">SUSE bug 920810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0252">SUSE bug 920810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0252">SUSE bug 920810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0252">SUSE bug 920810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0252">SUSE bug 920810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0252">SUSE bug 920810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0252">SUSE bug 920810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0252">SUSE bug 920810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0252">SUSE bug 920810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0252">SUSE bug 920810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0252">SUSE bug 920810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138971" comment="libxerces-c-3_1-3.1.1-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151260" comment="libxerces-c-3_1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0253</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0253" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0253" source="CVE"/>
    <description>
    The read_request_line function in server/protocol.c in the Apache HTTP Server 2.4.12 does not initialize the protocol structure member, which allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) by sending a request that lacks a method to an installation that enables the INCLUDES filter and has an ErrorDocument 400 directive specifying a local URI.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0253.html">CVE-2015-0253</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0255</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0255" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0255" source="CVE"/>
    <description>
    X.Org Server (aka xserver and xorg-server) before 1.16.3 and 1.17.x before 1.17.1 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (crash) via a crafted string length value in a XkbSetGeometry request.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0255.html">CVE-2015-0255</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0255">SUSE bug 915810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0255">SUSE bug 915810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0255">SUSE bug 915810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0255">SUSE bug 915810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0255">SUSE bug 915810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0255">SUSE bug 915810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0255">SUSE bug 915810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0255">SUSE bug 915810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0255">SUSE bug 915810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0255">SUSE bug 915810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0255">SUSE bug 915810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0255">SUSE bug 915810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0255">SUSE bug 915810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0255">SUSE bug 915810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0255">SUSE bug 915810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0255">SUSE bug 915810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0255">SUSE bug 915810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139109" comment="tigervnc-1.5.0-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152053" comment="tigervnc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139110" comment="xorg-x11-Xvnc-1.5.0-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152054" comment="xorg-x11-Xvnc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0261</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0261" source="CVE"/>
    <description>
    Integer signedness error in the mobility_opt_print function in the IPv6 mobility printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) or possibly execute arbitrary code via a negative length value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0261.html">CVE-2015-0261</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0261">SUSE bug 922220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0261">SUSE bug 922220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0261">SUSE bug 922220</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139105" comment="tcpdump-4.5.1-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0273</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0273" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in ext/date/php_date.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allow remote attackers to execute arbitrary code via crafted serialized input containing a (1) R or (2) r type specifier in (a) DateTimeZone data handled by the php_date_timezone_initialize_from_hash function or (b) DateTime data handled by the php_date_initialize_from_hash function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0273.html">CVE-2015-0273</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0273">SUSE bug 918768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0273">SUSE bug 918768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0273">SUSE bug 918768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0273">SUSE bug 918768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0273">SUSE bug 918768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0273">SUSE bug 918768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0273">SUSE bug 918768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0273">SUSE bug 918768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0273">SUSE bug 918768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0273">SUSE bug 918768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0273">SUSE bug 918768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0273">SUSE bug 917302</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0273">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0273">SUSE bug 918768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0273">SUSE bug 918768</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0286</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286" source="CVE"/>
    <description>
    The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0286.html">CVE-2015-0286</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0286">SUSE bug 922496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0286">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0286">SUSE bug 922496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0286">SUSE bug 922496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0286">SUSE bug 922496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0286">SUSE bug 922496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0286">SUSE bug 922496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0286">SUSE bug 922496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0286">SUSE bug 922496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0286">SUSE bug 922496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0286">SUSE bug 936586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0286">SUSE bug 937891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0286">SUSE bug 922496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0286">SUSE bug 922496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0286">SUSE bug 922496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0286">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0287</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287" source="CVE"/>
    <description>
    The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0287.html">CVE-2015-0287</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 922499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 922499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 922499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 922499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 922499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 922499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 922499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 922499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 922499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 936586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 922499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 922499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 922499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 922499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 940369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 922499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 940369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 940369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 937492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 991722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0287">SUSE bug 968888</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0288</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288" source="CVE"/>
    <description>
    The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0288.html">CVE-2015-0288</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0288">SUSE bug 920236</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0288">SUSE bug 920236</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0288">SUSE bug 920236</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0288">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0288">SUSE bug 920236</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0288">SUSE bug 920236</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0288">SUSE bug 920236</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0288">SUSE bug 920236</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0288">SUSE bug 920236</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0288">SUSE bug 920236</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0288">SUSE bug 920236</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0288">SUSE bug 920236</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0288">SUSE bug 936586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0288">SUSE bug 937891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0288">SUSE bug 920236</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0288">SUSE bug 920236</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0288">SUSE bug 920236</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0288">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0289</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289" source="CVE"/>
    <description>
    The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0289.html">CVE-2015-0289</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0289">SUSE bug 922500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0289">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0289">SUSE bug 922500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0289">SUSE bug 922500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0289">SUSE bug 922500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0289">SUSE bug 922500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0289">SUSE bug 922500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0289">SUSE bug 922500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0289">SUSE bug 922500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0289">SUSE bug 922500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0289">SUSE bug 936586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0289">SUSE bug 937891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0289">SUSE bug 922500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0289">SUSE bug 922500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0289">SUSE bug 922500</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0293</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0293" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293" source="CVE"/>
    <description>
    The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0293.html">CVE-2015-0293</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0293">SUSE bug 922488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0293">SUSE bug 919648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0293">SUSE bug 922488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0293">SUSE bug 922488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0293">SUSE bug 922488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0293">SUSE bug 922488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0293">SUSE bug 922488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0293">SUSE bug 922488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0293">SUSE bug 922488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0293">SUSE bug 922488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0293">SUSE bug 936586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0293">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0293">SUSE bug 968051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0293">SUSE bug 968053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0293">SUSE bug 968053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0293">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0293">SUSE bug 968051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0293">SUSE bug 968053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0293">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0293">SUSE bug 986238</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0294</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0294" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0294" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0294.html">CVE-2015-0294</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0294">SUSE bug 919938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0294">SUSE bug 919938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0294">SUSE bug 919938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0294">SUSE bug 919938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0294">SUSE bug 919938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0294">SUSE bug 919938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0294">SUSE bug 919938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0294">SUSE bug 919938</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138369" comment="gnutls-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138370" comment="libgnutls-devel-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138371" comment="libgnutls-openssl27-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151158" comment="libgnutls-openssl27 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138372" comment="libgnutls28-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151159" comment="libgnutls28 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138373" comment="libgnutls28-32bit-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151160" comment="libgnutls28-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0295</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0295" source="CVE"/>
    <description>
    The BMP decoder in QtGui in QT before 5.5 does not properly calculate the masks used to extract the color components, which allows remote attackers to cause a denial of service (divide-by-zero and crash) via a crafted BMP file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0295.html">CVE-2015-0295</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 927806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 927807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 927808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 936523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 936523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 936523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 936523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 936523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0295">SUSE bug 936523</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138460" comment="libQt5Concurrent-devel-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152274" comment="libQt5Concurrent-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138461" comment="libQt5Concurrent5-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152276" comment="libQt5Concurrent5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138462" comment="libQt5Core-devel-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152278" comment="libQt5Core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138463" comment="libQt5Core-private-headers-devel-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152280" comment="libQt5Core-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138464" comment="libQt5Core5-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152281" comment="libQt5Core5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138465" comment="libQt5DBus-devel-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152283" comment="libQt5DBus-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138466" comment="libQt5DBus5-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152286" comment="libQt5DBus5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138467" comment="libQt5Gui-devel-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152294" comment="libQt5Gui-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138468" comment="libQt5Gui-private-headers-devel-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152296" comment="libQt5Gui-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138469" comment="libQt5Gui5-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152297" comment="libQt5Gui5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138470" comment="libQt5Network-devel-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152305" comment="libQt5Network-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138471" comment="libQt5Network5-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152308" comment="libQt5Network5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138472" comment="libQt5OpenGL-devel-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152313" comment="libQt5OpenGL-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138473" comment="libQt5OpenGL5-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152316" comment="libQt5OpenGL5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138474" comment="libQt5PlatformHeaders-devel-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152320" comment="libQt5PlatformHeaders-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138475" comment="libQt5PrintSupport-devel-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152326" comment="libQt5PrintSupport-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138476" comment="libQt5PrintSupport5-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152329" comment="libQt5PrintSupport5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138477" comment="libQt5Sql-devel-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152338" comment="libQt5Sql-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138478" comment="libQt5Sql5-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152341" comment="libQt5Sql5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138479" comment="libQt5Sql5-mysql-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152343" comment="libQt5Sql5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138480" comment="libQt5Sql5-postgresql-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152345" comment="libQt5Sql5-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138481" comment="libQt5Sql5-sqlite-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152347" comment="libQt5Sql5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138482" comment="libQt5Sql5-unixODBC-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152349" comment="libQt5Sql5-unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138483" comment="libQt5Test-devel-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152353" comment="libQt5Test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138484" comment="libQt5Test5-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152356" comment="libQt5Test5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138485" comment="libQt5Widgets-devel-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152377" comment="libQt5Widgets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138486" comment="libQt5Widgets5-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152380" comment="libQt5Widgets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138487" comment="libQt5Xml-devel-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152384" comment="libQt5Xml-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138488" comment="libQt5Xml5-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152386" comment="libQt5Xml5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138791" comment="libqt4-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151228" comment="libqt4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138792" comment="libqt4-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151229" comment="libqt4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138793" comment="libqt4-devel-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151230" comment="libqt4-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138794" comment="libqt4-linguist-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151231" comment="libqt4-linguist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138795" comment="libqt4-qt3support-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151232" comment="libqt4-qt3support is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138796" comment="libqt4-qt3support-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151233" comment="libqt4-qt3support-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138797" comment="libqt4-sql-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151234" comment="libqt4-sql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138798" comment="libqt4-sql-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151235" comment="libqt4-sql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138799" comment="libqt4-sql-mysql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151236" comment="libqt4-sql-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138800" comment="libqt4-sql-mysql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151237" comment="libqt4-sql-mysql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138801" comment="libqt4-sql-postgresql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151238" comment="libqt4-sql-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138802" comment="libqt4-sql-postgresql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151239" comment="libqt4-sql-postgresql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138803" comment="libqt4-sql-sqlite-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151240" comment="libqt4-sql-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138804" comment="libqt4-sql-sqlite-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151241" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138805" comment="libqt4-sql-unixODBC-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151242" comment="libqt4-sql-unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138806" comment="libqt4-sql-unixODBC-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151243" comment="libqt4-sql-unixODBC-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138807" comment="libqt4-x11-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151244" comment="libqt4-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138808" comment="libqt4-x11-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151245" comment="libqt4-x11-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138489" comment="libqt5-qtbase-common-devel-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152401" comment="libqt5-qtbase-common-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138490" comment="libqt5-qtbase-devel-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152402" comment="libqt5-qtbase-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138491" comment="libqt5-qtbase-doc-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152403" comment="libqt5-qtbase-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138492" comment="libqt5-qtbase-platformtheme-gtk2-5.5.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152406" comment="libqt5-qtbase-platformtheme-gtk2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0374</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0374" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0374.html">CVE-2015-0374</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0374">SUSE bug 914058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0374">SUSE bug 915911</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0377</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0377" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 3.2.26, 4.0.28, 4.1.36, and 4.2.28 allows local users to affect availability via unknown vectors related to Core, a different vulnerability than CVE-2015-0418.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0377.html">CVE-2015-0377</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0377">SUSE bug 914447</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139122" comment="virtualbox-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139123" comment="virtualbox-guest-kmp-default-5.0.6_k4.1.12_1-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139124" comment="virtualbox-guest-tools-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139125" comment="virtualbox-guest-x11-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139126" comment="virtualbox-host-kmp-default-5.0.6_k4.1.12_1-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139127" comment="virtualbox-qt-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0381</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0381" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0381.html">CVE-2015-0381</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0381">SUSE bug 914058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0381">SUSE bug 915911</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0382</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0382" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0382.html">CVE-2015-0382</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0382">SUSE bug 914058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0382">SUSE bug 915911</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0391</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0391" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0391.html">CVE-2015-0391</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0391">SUSE bug 914058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0391">SUSE bug 915913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0411</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0411" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0411.html">CVE-2015-0411</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0411">SUSE bug 914058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0411">SUSE bug 915911</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0418</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0418" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 3.2.26, 4.0.28, 4.1.36, and 4.2.28 allows local users to affect availability via unknown vectors related to Core, a different vulnerability than CVE-2015-0377.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0418.html">CVE-2015-0418</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0418">SUSE bug 914447</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0418">SUSE bug 914447</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139122" comment="virtualbox-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139123" comment="virtualbox-guest-kmp-default-5.0.6_k4.1.12_1-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139124" comment="virtualbox-guest-tools-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139125" comment="virtualbox-guest-x11-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139126" comment="virtualbox-host-kmp-default-5.0.6_k4.1.12_1-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139127" comment="virtualbox-qt-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0427</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0427" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 4.3.20 allows local users to affect integrity and availability via vectors related to VMSVGA virtual graphics device, a different vulnerability than CVE-2014-6588, CVE-2014-6589, CVE-2014-6590, and CVE-2014-6595.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0427.html">CVE-2015-0427</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0427">SUSE bug 914447</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139122" comment="virtualbox-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139123" comment="virtualbox-guest-kmp-default-5.0.6_k4.1.12_1-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139124" comment="virtualbox-guest-tools-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139125" comment="virtualbox-guest-x11-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139126" comment="virtualbox-host-kmp-default-5.0.6_k4.1.12_1-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139127" comment="virtualbox-qt-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0432</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0432" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0432.html">CVE-2015-0432</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0432">SUSE bug 914058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0432">SUSE bug 915911</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0433</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to InnoDB : DML.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0433.html">CVE-2015-0433</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0433">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0433">SUSE bug 936409</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0441</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Encryption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0441.html">CVE-2015-0441</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0441">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0441">SUSE bug 936409</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0499</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0499.html">CVE-2015-0499</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0499">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0499">SUSE bug 936408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0501</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0501.html">CVE-2015-0501</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0501">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0501">SUSE bug 936408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0505</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0505.html">CVE-2015-0505</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0505">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0505">SUSE bug 936408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0552</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0552" source="CVE"/>
    <description>
    Directory traversal vulnerability in the gcab_folder_extract function in libgcab/gcab-folder.c in gcab 0.4 allows remote attackers to write to arbitrary files via crafted path in a CAB file, as demonstrated by "\tmp\moo."
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0552.html">CVE-2015-0552</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0552">SUSE bug 911814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0552">SUSE bug 911814</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138293" comment="gcab-0.6-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152619" comment="gcab is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138294" comment="gcab-lang-0.6-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152620" comment="gcab-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138295" comment="libgcab-1_0-0-0.6-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152621" comment="libgcab-1_0-0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0559</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0559" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0559.html">CVE-2015-0559</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0559">SUSE bug 912365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0559">SUSE bug 912316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0559">SUSE bug 912365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0559">SUSE bug 912365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0559">SUSE bug 912365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0559">SUSE bug 912365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0559">SUSE bug 912365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0559">SUSE bug 912365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0559">SUSE bug 912365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0559">SUSE bug 912365</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0560</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0560" source="CVE"/>
    <description>
    The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not initialize certain data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0560.html">CVE-2015-0560</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0560">SUSE bug 912365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0560">SUSE bug 912316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0560">SUSE bug 912365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0560">SUSE bug 912365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0560">SUSE bug 912365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0560">SUSE bug 912365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0560">SUSE bug 912365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0560">SUSE bug 912365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0560">SUSE bug 912365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0560">SUSE bug 912365</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0561</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0561" source="CVE"/>
    <description>
    asn1/lpp/lpp.cnf in the LPP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not validate a certain index value, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0561.html">CVE-2015-0561</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0561">SUSE bug 912368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0561">SUSE bug 912316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0561">SUSE bug 912368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0561">SUSE bug 912368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0561">SUSE bug 912368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0561">SUSE bug 912368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0561">SUSE bug 912368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0561">SUSE bug 912368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0561">SUSE bug 912368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0561">SUSE bug 912368</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0562</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0562" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in epan/dissectors/packet-dec-dnart.c in the DEC DNA Routing Protocol dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0562.html">CVE-2015-0562</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0562">SUSE bug 912369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0562">SUSE bug 912316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0562">SUSE bug 912369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0562">SUSE bug 912369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0562">SUSE bug 912369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0562">SUSE bug 912369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0562">SUSE bug 912369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0562">SUSE bug 912369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0562">SUSE bug 912369</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0563</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0563" source="CVE"/>
    <description>
    epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect length value for certain string-append operations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0563.html">CVE-2015-0563</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0563">SUSE bug 912370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0563">SUSE bug 912316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0563">SUSE bug 912370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0563">SUSE bug 912370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0563">SUSE bug 912370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0563">SUSE bug 912370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0563">SUSE bug 912370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0563">SUSE bug 912370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0563">SUSE bug 912370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0564</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0564" source="CVE"/>
    <description>
    Buffer underflow in the ssl_decrypt_record function in epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet that is improperly handled during decryption of an SSL session.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0564.html">CVE-2015-0564</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0564">SUSE bug 912372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0564">SUSE bug 912316</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0564">SUSE bug 912372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0564">SUSE bug 912372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0564">SUSE bug 912372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0564">SUSE bug 912372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0564">SUSE bug 912372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0564">SUSE bug 912372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0564">SUSE bug 912372</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0778</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0778" source="CVE"/>
    <description>
    osc before 0.151.0 allows remote attackers to execute arbitrary commands via shell metacharacters in a _service file.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2015-0778.html">CVE-2015-0778</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0778">SUSE bug 901643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0778">SUSE bug 901643</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139011" comment="osc-0.152.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151686" comment="osc is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0797</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797" source="CVE"/>
    <description>
    GStreamer before 1.4.5, as used in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 on Linux, allows remote attackers to cause a denial of service (buffer over-read and application crash) or possibly execute arbitrary code via crafted H.264 video data in an m4v file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0797.html">CVE-2015-0797</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0797">SUSE bug 927559</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0797">SUSE bug 927559</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0797">SUSE bug 927559</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0797">SUSE bug 927559</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0797">SUSE bug 930622</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0797">SUSE bug 927559</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138380" comment="gstreamer-0_10-plugins-bad-0.10.23-20.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152622" comment="gstreamer-0_10-plugins-bad is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138381" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-20.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152623" comment="gstreamer-0_10-plugins-bad-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138382" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-20.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152624" comment="libgstbasecamerabinsrc-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138383" comment="libgstbasevideo-0_10-23-0.10.23-20.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152625" comment="libgstbasevideo-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138384" comment="libgstcodecparsers-0_10-23-0.10.23-20.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152626" comment="libgstcodecparsers-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138385" comment="libgstphotography-0_10-23-0.10.23-20.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152627" comment="libgstphotography-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138386" comment="libgstsignalprocessor-0_10-23-0.10.23-20.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152628" comment="libgstsignalprocessor-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138387" comment="libgstvdp-0_10-23-0.10.23-20.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152629" comment="libgstvdp-0_10-23 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0798</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0798" source="CVE"/>
    <description>
    The Reader mode feature in Mozilla Firefox before 37.0.1 on Android, and Desktop Firefox pre-release, does not properly handle privileged URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0798.html">CVE-2015-0798</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0799</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0799" source="CVE"/>
    <description>
    The HTTP Alternative Services feature in Mozilla Firefox before 37.0.1 allows man-in-the-middle attackers to bypass an intended X.509 certificate-verification step for an SSL server by specifying that server in the uri-host field of an Alt-Svc HTTP/2 response header.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0799.html">CVE-2015-0799</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0799">SUSE bug 926166</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0799">SUSE bug 925368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0799">SUSE bug 926166</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0800</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0800" source="CVE"/>
    <description>
    The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 37.0 on Android does not properly generate random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2012-2808.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0800.html">CVE-2015-0800</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0801</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801" source="CVE"/>
    <description>
    Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0801.html">CVE-2015-0801</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0801">SUSE bug 925401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0801">SUSE bug 925368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0801">SUSE bug 925401</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0802</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0802" source="CVE"/>
    <description>
    Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content navigation that leverages the reachability of a privileged window with an unintended persistence of access to restricted internal methods.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0802.html">CVE-2015-0802</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0802">SUSE bug 925402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0802">SUSE bug 925368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0802">SUSE bug 925402</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0803</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0803" source="CVE"/>
    <description>
    The HTMLSourceElement::AfterSetAttr function in Mozilla Firefox before 37.0 does not properly constrain the original data type of a casted value during the setting of a SOURCE element's attributes, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0803.html">CVE-2015-0803</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0803">SUSE bug 925400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0803">SUSE bug 925368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0803">SUSE bug 925400</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0804</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0804" source="CVE"/>
    <description>
    The HTMLSourceElement::BindToTree function in Mozilla Firefox before 37.0 does not properly constrain a data type after omitting namespace validation during certain tree-binding operations, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document containing a SOURCE element.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0804.html">CVE-2015-0804</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0804">SUSE bug 925400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0804">SUSE bug 925368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0804">SUSE bug 925400</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0805</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0805" source="CVE"/>
    <description>
    The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 makes an incorrect memset call during interaction with the mozilla::layers::BufferTextureClient::AllocateForSurface function, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors that trigger rendering of 2D graphics content.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0805.html">CVE-2015-0805</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0805">SUSE bug 925399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0805">SUSE bug 925368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0805">SUSE bug 925399</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0806</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0806" source="CVE"/>
    <description>
    The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 attempts to use memset for a memory region of negative length during interaction with the mozilla::layers::BufferTextureClient::AllocateForSurface function, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors that trigger rendering of 2D graphics content.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0806.html">CVE-2015-0806</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0806">SUSE bug 925399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0806">SUSE bug 925368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0806">SUSE bug 925399</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0807</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807" source="CVE"/>
    <description>
    The navigator.sendBeacon implementation in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 processes HTTP 30x status codes for redirects after a preflight request has occurred, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site, a similar issue to CVE-2014-8638.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0807.html">CVE-2015-0807</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0807">SUSE bug 925398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0807">SUSE bug 913068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0807">SUSE bug 925368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0807">SUSE bug 925398</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0808</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0808" source="CVE"/>
    <description>
    The webrtc::VPMContentAnalysis::Release function in the WebRTC implementation in Mozilla Firefox before 37.0 uses incompatible approaches to the deallocation of memory for simple-type arrays, which might allow remote attackers to cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0808.html">CVE-2015-0808</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0808">SUSE bug 925397</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0808">SUSE bug 925368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0808">SUSE bug 925397</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0810</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0810" source="CVE"/>
    <description>
    Mozilla Firefox before 37.0 on OS X does not ensure that the cursor is visible, which allows remote attackers to conduct clickjacking attacks via a Flash object in conjunction with DIV elements associated with layered presentation, and crafted JavaScript code that interacts with an IMG element.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0810.html">CVE-2015-0810</cve>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0811</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0811" source="CVE"/>
    <description>
    The QCMS implementation in Mozilla Firefox before 37.0 allows remote attackers to obtain sensitive information from process heap memory or cause a denial of service (out-of-bounds read) via an image that is improperly handled during transformation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0811.html">CVE-2015-0811</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0811">SUSE bug 925396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0811">SUSE bug 925368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0811">SUSE bug 925396</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0812</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0812" source="CVE"/>
    <description>
    Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0812.html">CVE-2015-0812</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0812">SUSE bug 925394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0812">SUSE bug 925368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0812">SUSE bug 925394</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0813</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813" source="CVE"/>
    <description>
    Use-after-free vulnerability in the AppendElements function in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 on Linux, when the Fluendo MP3 plugin for GStreamer is used, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted MP3 file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0813.html">CVE-2015-0813</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0813">SUSE bug 925393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0813">SUSE bug 925368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0813">SUSE bug 925393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0814</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0814" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 37.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0814.html">CVE-2015-0814</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0814">SUSE bug 925392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0814">SUSE bug 925368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0814">SUSE bug 925392</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0815</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0815.html">CVE-2015-0815</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0815">SUSE bug 925392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0815">SUSE bug 925368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0815">SUSE bug 925392</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0816</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0816" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816" source="CVE"/>
    <description>
    Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 do not properly restrict resource: URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy, as demonstrated by the resource: URL associated with PDF.js.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0816.html">CVE-2015-0816</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0816">SUSE bug 925395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0816">SUSE bug 925368</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0816">SUSE bug 925395</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0817</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817" source="CVE"/>
    <description>
    The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0817.html">CVE-2015-0817</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0817">SUSE bug 923495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0817">SUSE bug 923534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0817">SUSE bug 923534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0817">SUSE bug 923534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0817">SUSE bug 923534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0817">SUSE bug 923534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0817">SUSE bug 923534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0817">SUSE bug 923534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0817">SUSE bug 923534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0817">SUSE bug 923534</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0818</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818" source="CVE"/>
    <description>
    Mozilla Firefox before 36.0.4, Firefox ESR 31.x before 31.5.3, and SeaMonkey before 2.33.1 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving SVG hash navigation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0818.html">CVE-2015-0818</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0818">SUSE bug 923495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0818">SUSE bug 923534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0818">SUSE bug 923534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0818">SUSE bug 923534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0818">SUSE bug 923534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0818">SUSE bug 923534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0818">SUSE bug 923534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0818">SUSE bug 923534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0818">SUSE bug 923534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0818">SUSE bug 923534</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0819</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0819" source="CVE"/>
    <description>
    The UITour::onPageEvent function in Mozilla Firefox before 36.0 does not ensure that an API call originates from a foreground tab, which allows remote attackers to conduct spoofing and clickjacking attacks by leveraging access to a UI Tour web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0819.html">CVE-2015-0819</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0819">SUSE bug 917597</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0820</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0820" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0820" source="CVE"/>
    <description>
    Mozilla Firefox before 36.0 does not properly restrict transitions of JavaScript objects from a non-extensible state to an extensible state, which allows remote attackers to bypass a Caja Compiler sandbox protection mechanism or a Secure EcmaScript sandbox protection mechanism via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0820.html">CVE-2015-0820</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0820">SUSE bug 917597</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0821</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0821" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0821" source="CVE"/>
    <description>
    Mozilla Firefox before 36.0 allows user-assisted remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges via a crafted web site that is accessed with unspecified mouse and keyboard actions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0821.html">CVE-2015-0821</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0821">SUSE bug 917597</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0822</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0822" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" source="CVE"/>
    <description>
    The Form Autocompletion feature in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to read arbitrary files via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0822.html">CVE-2015-0822</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0822">SUSE bug 910669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0822">SUSE bug 924515</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0822">SUSE bug 917597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0822">SUSE bug 923534</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0823</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0823" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in OpenType Sanitiser, as used in Mozilla Firefox before 36.0, might allow remote attackers to trigger problematic Developer Console information or possibly have unspecified other impact by leveraging incorrect macro expansion, related to the ots::ots_gasp_parse function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0823.html">CVE-2015-0823</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0823">SUSE bug 917597</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0824</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0824" source="CVE"/>
    <description>
    The mozilla::layers::BufferTextureClient::AllocateForSurface function in Mozilla Firefox before 36.0 allows remote attackers to cause a denial of service (out-of-bounds write of zero values, and application crash) via vectors that trigger use of DrawTarget and the Cairo library for image drawing.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0824.html">CVE-2015-0824</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0824">SUSE bug 917597</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0825</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0825" source="CVE"/>
    <description>
    Stack-based buffer underflow in the mozilla::MP3FrameParser::ParseBuffer function in Mozilla Firefox before 36.0 allows remote attackers to obtain sensitive information from process memory via a malformed MP3 file that improperly interacts with memory allocation during playback.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0825.html">CVE-2015-0825</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0825">SUSE bug 917597</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0826</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0826" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0826" source="CVE"/>
    <description>
    The nsTransformedTextRun::SetCapitalization function in Mozilla Firefox before 36.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read of heap memory) via a crafted Cascading Style Sheets (CSS) token sequence that triggers a restyle or reflow operation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0826.html">CVE-2015-0826</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0826">SUSE bug 917597</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0827</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0827" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" source="CVE"/>
    <description>
    Heap-based buffer overflow in the mozilla::gfx::CopyRect function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to obtain sensitive information from uninitialized process memory via a malformed SVG graphic.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0827.html">CVE-2015-0827</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0827">SUSE bug 910669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0827">SUSE bug 924515</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0827">SUSE bug 917597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0827">SUSE bug 923534</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0828</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0828" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0828" source="CVE"/>
    <description>
    Double free vulnerability in the nsXMLHttpRequest::GetResponse function in Mozilla Firefox before 36.0, when a nonstandard memory allocator is used, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted JavaScript code that makes an XMLHttpRequest call with zero bytes of data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0828.html">CVE-2015-0828</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0828">SUSE bug 917597</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0829</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0829" source="CVE"/>
    <description>
    Buffer overflow in libstagefright in Mozilla Firefox before 36.0 allows remote attackers to execute arbitrary code via a crafted MP4 video that is improperly handled during playback.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0829.html">CVE-2015-0829</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0829">SUSE bug 917597</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0830</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0830" source="CVE"/>
    <description>
    The WebGL implementation in Mozilla Firefox before 36.0 does not properly allocate memory for copying an unspecified string to a shader's compilation log, which allows remote attackers to cause a denial of service (application crash) via crafted WebGL content.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0830.html">CVE-2015-0830</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0830">SUSE bug 917597</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0831</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::IndexedDB::IDBObjectStore::CreateIndex function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted content that is improperly handled during IndexedDB index creation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0831.html">CVE-2015-0831</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0831">SUSE bug 910669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0831">SUSE bug 924515</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0831">SUSE bug 917597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0831">SUSE bug 923534</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0832</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0832" source="CVE"/>
    <description>
    Mozilla Firefox before 36.0 does not properly recognize the equivalence of domain names with and without a trailing . (dot) character, which allows man-in-the-middle attackers to bypass the HPKP and HSTS protection mechanisms by constructing a URL with this character and leveraging access to an X.509 certificate for a domain with this character.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0832.html">CVE-2015-0832</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0832">SUSE bug 917597</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0833</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833" source="CVE"/>
    <description>
    Multiple untrusted search path vulnerabilities in updater.exe in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 on Windows, when the Maintenance Service is not used, allow local users to gain privileges via a Trojan horse DLL in (1) the current working directory or (2) a temporary directory, as demonstrated by bcrypt.dll.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0833.html">CVE-2015-0833</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0833">SUSE bug 923534</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0834</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0834" source="CVE"/>
    <description>
    The WebRTC subsystem in Mozilla Firefox before 36.0 recognizes turns: and stuns: URIs but accesses the TURN or STUN server without using TLS, which makes it easier for man-in-the-middle attackers to discover credentials by spoofing a server and completing a brute-force attack within a short time window.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0834.html">CVE-2015-0834</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0834">SUSE bug 917597</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0835</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0835" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0835.html">CVE-2015-0835</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0835">SUSE bug 910669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0835">SUSE bug 924515</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0835">SUSE bug 917597</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0836</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0836.html">CVE-2015-0836</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0836">SUSE bug 910669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0836">SUSE bug 924515</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0836">SUSE bug 917597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0836">SUSE bug 923534</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0837</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0837.html">CVE-2015-0837</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0837">SUSE bug 920057</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138631" comment="libgcrypt-devel-1.6.1-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151920" comment="libgcrypt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138632" comment="libgcrypt20-1.6.1-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151921" comment="libgcrypt20 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138633" comment="libgcrypt20-32bit-1.6.1-18.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151922" comment="libgcrypt20-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0847</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0847" source="CVE"/>
    <description>
    nbd-server.c in Network Block Device (nbd-server) before 3.11 does not properly handle signals, which allows remote attackers to cause a denial of service (deadlock) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0847.html">CVE-2015-0847</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0847">SUSE bug 930173</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138994" comment="nbd-3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152630" comment="nbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138995" comment="nbd-doc-3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152631" comment="nbd-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0848</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848" source="CVE"/>
    <description>
    Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0848.html">CVE-2015-0848</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0848">SUSE bug 933109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0848">SUSE bug 933109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0848">SUSE bug 933109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0848">SUSE bug 933109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0848">SUSE bug 933109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0848">SUSE bug 933109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0848">SUSE bug 933109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0848">SUSE bug 933109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0848">SUSE bug 933109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0848">SUSE bug 933109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0848">SUSE bug 933109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138934" comment="libwmf-0_2-7-0.2.8.4-240.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152632" comment="libwmf-0_2-7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138935" comment="libwmf-tools-0.2.8.4-240.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152633" comment="libwmf-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0855</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0855" source="CVE"/>
    <description>
    The _mediaLibraryPlayCb function in mainwindow.py in pitivi before 0.95 allows attackers to execute arbitrary code via shell metacharacters in a file path.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0855.html">CVE-2015-0855</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0855">SUSE bug 960339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0855">SUSE bug 960339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0855">SUSE bug 960339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0855">SUSE bug 960339</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121319" comment="pitivi-0.94-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152634" comment="pitivi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121320" comment="pitivi-lang-0.94-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152635" comment="pitivi-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0856</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0856" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0856" source="CVE"/>
    <description>
    daemon/Greeter.cpp in sddm before 0.13.0 does not properly disable the KDE crash handler, which allows local users to gain privileges by crashing a greeter when using certain themes, as demonstrated by the plasma-workspace breeze theme.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0856.html">CVE-2015-0856</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0856">SUSE bug 950491</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139088" comment="sddm-0.12.0-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152215" comment="sddm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139089" comment="sddm-branding-openSUSE-0.12.0-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152216" comment="sddm-branding-openSUSE is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0860</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0860" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0860" source="CVE"/>
    <description>
    Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in Debian dpkg 1.16.x before 1.16.17 and 1.17.x before 1.17.26 allows remote attackers to execute arbitrary code via the archive magic version number in an "old-style" Debian binary package, which triggers a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0860.html">CVE-2015-0860</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0860">SUSE bug 957160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0860">SUSE bug 957160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0860">SUSE bug 957160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0860">SUSE bug 957160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0860">SUSE bug 957160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0860">SUSE bug 957160</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155132" comment="dpkg-1.16.10-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155215" comment="dpkg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155133" comment="dpkg-devel-1.16.10-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155216" comment="dpkg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155134" comment="dpkg-lang-1.16.10-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155217" comment="dpkg-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155135" comment="update-alternatives-1.16.10-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154128" comment="update-alternatives is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0973</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-0973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0973" source="CVE"/>
    <description>
    Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-0973.html">CVE-2015-0973</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0973">SUSE bug 912929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-0973">SUSE bug 912929</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138746" comment="libpng16-16-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138747" comment="libpng16-16-32bit-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151415" comment="libpng16-16-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138748" comment="libpng16-compat-devel-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138749" comment="libpng16-devel-1.6.8-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1030</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1030" source="CVE"/>
    <description>
    Memory leak in the rfc2553_connect_to function in jbsocket.c in Privoxy before 3.0.22 allows remote attackers to cause a denial of service (memory consumption) via a large number of requests that are rejected because the socket limit is reached.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1030.html">CVE-2015-1030</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1030">SUSE bug 913094</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1030">SUSE bug 907675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1030">SUSE bug 913094</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139037" comment="privoxy-3.0.23-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152636" comment="privoxy is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1031</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1031" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in Privoxy before 3.0.22 allow remote attackers to have unspecified impact via vectors related to (1) the unmap function in list.c or (2) "two additional unconfirmed use-after-free complaints made by Coverity scan." NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1031.html">CVE-2015-1031</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1031">SUSE bug 913094</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1031">SUSE bug 907675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1031">SUSE bug 913094</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139037" comment="privoxy-3.0.23-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152636" comment="privoxy is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1038</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1038" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1038" source="CVE"/>
    <description>
    p7zip 9.20.1 allows remote attackers to write to arbitrary files via a symlink attack in an archive.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1038.html">CVE-2015-1038</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1038">SUSE bug 912878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1038">SUSE bug 912878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1038">SUSE bug 912878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1038">SUSE bug 912878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1038">SUSE bug 912878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1038">SUSE bug 912878</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139012" comment="p7zip-9.20.1-13.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152637" comment="p7zip is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1071</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1071" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1071.html">CVE-2015-1071</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1071">SUSE bug 923223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1071">SUSE bug 923223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1071">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1076</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1076" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1076.html">CVE-2015-1076</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1076">SUSE bug 923223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1076">SUSE bug 923223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1076">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1081</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1081" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1081.html">CVE-2015-1081</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1081">SUSE bug 923223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1081">SUSE bug 923223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1081">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1083</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1083" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1083.html">CVE-2015-1083</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1083">SUSE bug 923223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1083">SUSE bug 923223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1083">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1120</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1120" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1120" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1120.html">CVE-2015-1120</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1120">SUSE bug 928380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1120">SUSE bug 928380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1120">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1122</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1122" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1122" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1122.html">CVE-2015-1122</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1122">SUSE bug 928380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1122">SUSE bug 928380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1122">SUSE bug 971460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1122">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1127</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1127" source="CVE"/>
    <description>
    The private-browsing implementation in WebKit in Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 places browsing history into an index, which might allow local users to obtain sensitive information by reading index entries.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1127.html">CVE-2015-1127</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1127">SUSE bug 928380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1127">SUSE bug 928380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1127">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1152</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1152" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-1153 and CVE-2015-1154.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1152.html">CVE-2015-1152</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1152">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1153</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1153" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-1152 and CVE-2015-1154.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1153.html">CVE-2015-1153</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1153">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1155</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1155" source="CVE"/>
    <description>
    The history implementation in WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to bypass the Same Origin Policy and read arbitrary files via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1155.html">CVE-2015-1155</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1155">SUSE bug 971460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1155">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1158</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158" source="CVE"/>
    <description>
    The add_job function in scheduler/ipp.c in cupsd in CUPS before 2.0.3 performs incorrect free operations for multiple-value job-originating-host-name attributes, which allows remote attackers to trigger data corruption for reference-counted strings via a crafted (1) IPP_CREATE_JOB or (2) IPP_PRINT_JOB request, as demonstrated by replacing the configuration file and consequently executing arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1158.html">CVE-2015-1158</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1158">SUSE bug 924208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1158">SUSE bug 924208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1158">SUSE bug 924208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1158">SUSE bug 924208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1158">SUSE bug 924208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1158">SUSE bug 924208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1158">SUSE bug 924208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1158">SUSE bug 976653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1158">SUSE bug 976653</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138200" comment="cups-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138201" comment="cups-client-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138202" comment="cups-devel-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138203" comment="cups-libs-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151187" comment="cups-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138204" comment="cups-libs-32bit-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151188" comment="cups-libs-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1159</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the cgi_puts function in cgi-bin/template.c in the template engine in CUPS before 2.0.3 allows remote attackers to inject arbitrary web script or HTML via the QUERY parameter to help/.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1159.html">CVE-2015-1159</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1159">SUSE bug 924208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1159">SUSE bug 924208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1159">SUSE bug 924208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1159">SUSE bug 924208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1159">SUSE bug 924208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1159">SUSE bug 924208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1159">SUSE bug 924208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1159">SUSE bug 976653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1159">SUSE bug 976653</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138200" comment="cups-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138201" comment="cups-client-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138202" comment="cups-devel-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138203" comment="cups-libs-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151187" comment="cups-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138204" comment="cups-libs-32bit-1.7.5-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151188" comment="cups-libs-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1191</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1191" source="CVE"/>
    <description>
    Multiple directory traversal vulnerabilities in pigz 2.3.1 allow remote attackers to write to arbitrary files via a (1) full pathname or (2) .. (dot dot) in an archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1191.html">CVE-2015-1191</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1191">SUSE bug 913627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1191">SUSE bug 913627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1191">SUSE bug 913627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1191">SUSE bug 913627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1191">SUSE bug 913627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1191">SUSE bug 913627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1191">SUSE bug 913627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1191">SUSE bug 913627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1191">SUSE bug 913627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1191">SUSE bug 913627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1191">SUSE bug 913627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1191">SUSE bug 913627</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139033" comment="pigz-2.3-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152650" comment="pigz is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1196</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1196" source="CVE"/>
    <description>
    GNU patch 2.7.1 allows remote attackers to write to arbitrary files via a symlink attack in a patch file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1196.html">CVE-2015-1196</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1196">SUSE bug 913678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1196">SUSE bug 913678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1196">SUSE bug 915329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1196">SUSE bug 913678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1196">SUSE bug 913678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1196">SUSE bug 915329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1196">SUSE bug 913678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1196">SUSE bug 913678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1196">SUSE bug 913678</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139022" comment="patch-2.7.5-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151547" comment="patch is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1201</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1201" source="CVE"/>
    <description>
    Privoxy before 3.0.22 allows remote attackers to cause a denial of service (file descriptor consumption) via unspecified vectors.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1201.html">CVE-2015-1201</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1201">SUSE bug 914450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1201">SUSE bug 907675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1201">SUSE bug 914450</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139037" comment="privoxy-3.0.23-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152636" comment="privoxy is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1283</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1283" source="CVE"/>
    <description>
    Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1283.html">CVE-2015-1283</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1283">SUSE bug 939077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1283">SUSE bug 979441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1283">SUSE bug 980391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1283">SUSE bug 980391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1283">SUSE bug 980391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1283">SUSE bug 980391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1283">SUSE bug 980391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1283">SUSE bug 980391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1283">SUSE bug 980391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1283">SUSE bug 980391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1283">SUSE bug 980391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1283">SUSE bug 980391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1283">SUSE bug 983985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1283">SUSE bug 983985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1283">SUSE bug 980391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1283">SUSE bug 980391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1283">SUSE bug 983985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1283">SUSE bug 1034050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1283">SUSE bug 1034050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1283">SUSE bug 983985</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128464" comment="expat-2.1.0-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151330" comment="expat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128469" comment="libexpat-devel-2.1.0-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151331" comment="libexpat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128553" comment="libexpat-devel-32bit-2.1.0-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151785" comment="libexpat-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128465" comment="libexpat1-2.1.0-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128466" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151333" comment="libexpat1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1284</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1284" source="CVE"/>
    <description>
    The LocalFrame::isURLAllowed function in core/frame/LocalFrame.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not properly check for a page's maximum number of frames, which allows remote attackers to cause a denial of service (invalid count value and use-after-free) or possibly have unspecified other impact via crafted JavaScript code that makes many createElement calls for IFRAME elements.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1284.html">CVE-2015-1284</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1284">SUSE bug 939077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1284">SUSE bug 959178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1284">SUSE bug 959178</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120451" comment="calibre-2.46.0-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152225" comment="calibre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120452" comment="fcitx-qt5-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152226" comment="fcitx-qt5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120453" comment="fcitx-qt5-32bit-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152227" comment="fcitx-qt5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120454" comment="fcitx-qt5-devel-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152228" comment="fcitx-qt5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120455" comment="frameworkintegration-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152229" comment="frameworkintegration is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120456" comment="frameworkintegration-devel-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152230" comment="frameworkintegration-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120457" comment="frameworkintegration-devel-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152231" comment="frameworkintegration-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120458" comment="frameworkintegration-plugin-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152232" comment="frameworkintegration-plugin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120459" comment="frameworkintegration-plugin-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152233" comment="frameworkintegration-plugin-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120460" comment="kwayland-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152234" comment="kwayland is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120461" comment="kwayland-32bit-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152235" comment="kwayland-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120462" comment="kwayland-devel-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152236" comment="kwayland-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120463" comment="kwayland-devel-32bit-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152237" comment="kwayland-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120464" comment="kwin5-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152238" comment="kwin5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120465" comment="kwin5-devel-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152239" comment="kwin5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120466" comment="kwin5-lang-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152240" comment="kwin5-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120467" comment="libKF5Style5-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152241" comment="libKF5Style5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120468" comment="libKF5Style5-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152242" comment="libKF5Style5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120469" comment="libKF5Style5-lang-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152243" comment="libKF5Style5-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120470" comment="libQt53DCollision-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152244" comment="libQt53DCollision-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120471" comment="libQt53DCollision5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152245" comment="libQt53DCollision5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120472" comment="libQt53DCollision5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152246" comment="libQt53DCollision5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120473" comment="libQt53DCore-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152247" comment="libQt53DCore-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120474" comment="libQt53DCore5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152248" comment="libQt53DCore5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120475" comment="libQt53DCore5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152249" comment="libQt53DCore5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120476" comment="libQt53DInput-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152250" comment="libQt53DInput-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120477" comment="libQt53DInput5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152251" comment="libQt53DInput5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120478" comment="libQt53DInput5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152252" comment="libQt53DInput5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120479" comment="libQt53DLogic-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152253" comment="libQt53DLogic-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120480" comment="libQt53DLogic5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152254" comment="libQt53DLogic5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120481" comment="libQt53DLogic5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152255" comment="libQt53DLogic5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120482" comment="libQt53DQuick-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152256" comment="libQt53DQuick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120483" comment="libQt53DQuick5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152257" comment="libQt53DQuick5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120484" comment="libQt53DQuick5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152258" comment="libQt53DQuick5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120485" comment="libQt53DQuickRenderer-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152259" comment="libQt53DQuickRenderer-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120486" comment="libQt53DQuickRenderer5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152260" comment="libQt53DQuickRenderer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120487" comment="libQt53DQuickRenderer5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152261" comment="libQt53DQuickRenderer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120488" comment="libQt53DRenderer-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152262" comment="libQt53DRenderer-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120489" comment="libQt53DRenderer5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152263" comment="libQt53DRenderer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120490" comment="libQt53DRenderer5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152264" comment="libQt53DRenderer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120491" comment="libQt5Bluetooth5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152265" comment="libQt5Bluetooth5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120492" comment="libQt5Bluetooth5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152266" comment="libQt5Bluetooth5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120493" comment="libQt5Bluetooth5-imports-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152267" comment="libQt5Bluetooth5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120494" comment="libQt5Bootstrap-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152268" comment="libQt5Bootstrap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120495" comment="libQt5Bootstrap-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152269" comment="libQt5Bootstrap-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120496" comment="libQt5CLucene5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152270" comment="libQt5CLucene5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120497" comment="libQt5CLucene5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152271" comment="libQt5CLucene5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120498" comment="libQt5Compositor5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152272" comment="libQt5Compositor5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120499" comment="libQt5Compositor5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152273" comment="libQt5Compositor5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120500" comment="libQt5Concurrent-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152274" comment="libQt5Concurrent-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120501" comment="libQt5Concurrent-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152275" comment="libQt5Concurrent-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120502" comment="libQt5Concurrent5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152276" comment="libQt5Concurrent5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120503" comment="libQt5Concurrent5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152277" comment="libQt5Concurrent5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120504" comment="libQt5Core-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152278" comment="libQt5Core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120505" comment="libQt5Core-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152279" comment="libQt5Core-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120506" comment="libQt5Core-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152280" comment="libQt5Core-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120507" comment="libQt5Core5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152281" comment="libQt5Core5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120508" comment="libQt5Core5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152282" comment="libQt5Core5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120509" comment="libQt5DBus-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152283" comment="libQt5DBus-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120510" comment="libQt5DBus-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152284" comment="libQt5DBus-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120511" comment="libQt5DBus-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152285" comment="libQt5DBus-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120512" comment="libQt5DBus5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152286" comment="libQt5DBus5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120513" comment="libQt5DBus5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152287" comment="libQt5DBus5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120514" comment="libQt5Declarative5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152288" comment="libQt5Declarative5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120515" comment="libQt5Declarative5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152289" comment="libQt5Declarative5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120516" comment="libQt5Designer5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152290" comment="libQt5Designer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120517" comment="libQt5Designer5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152291" comment="libQt5Designer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120518" comment="libQt5DesignerComponents5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152292" comment="libQt5DesignerComponents5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120519" comment="libQt5DesignerComponents5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152293" comment="libQt5DesignerComponents5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120520" comment="libQt5Gui-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152294" comment="libQt5Gui-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120521" comment="libQt5Gui-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152295" comment="libQt5Gui-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120522" comment="libQt5Gui-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152296" comment="libQt5Gui-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120523" comment="libQt5Gui5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152297" comment="libQt5Gui5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120524" comment="libQt5Gui5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152298" comment="libQt5Gui5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120525" comment="libQt5Help5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152299" comment="libQt5Help5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120526" comment="libQt5Help5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152300" comment="libQt5Help5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120527" comment="libQt5Location5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152301" comment="libQt5Location5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120528" comment="libQt5Location5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152302" comment="libQt5Location5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120529" comment="libQt5Multimedia5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152303" comment="libQt5Multimedia5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120530" comment="libQt5Multimedia5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152304" comment="libQt5Multimedia5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120531" comment="libQt5Network-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152305" comment="libQt5Network-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120532" comment="libQt5Network-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152306" comment="libQt5Network-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120533" comment="libQt5Network-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152307" comment="libQt5Network-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120534" comment="libQt5Network5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152308" comment="libQt5Network5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120535" comment="libQt5Network5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152309" comment="libQt5Network5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120536" comment="libQt5Nfc5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152310" comment="libQt5Nfc5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120537" comment="libQt5Nfc5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152311" comment="libQt5Nfc5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120538" comment="libQt5Nfc5-imports-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152312" comment="libQt5Nfc5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120539" comment="libQt5OpenGL-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152313" comment="libQt5OpenGL-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120540" comment="libQt5OpenGL-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152314" comment="libQt5OpenGL-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120541" comment="libQt5OpenGL-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152315" comment="libQt5OpenGL-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120542" comment="libQt5OpenGL5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152316" comment="libQt5OpenGL5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120543" comment="libQt5OpenGL5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152317" comment="libQt5OpenGL5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120544" comment="libQt5OpenGLExtensions-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152318" comment="libQt5OpenGLExtensions-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120545" comment="libQt5OpenGLExtensions-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152319" comment="libQt5OpenGLExtensions-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120546" comment="libQt5PlatformHeaders-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152320" comment="libQt5PlatformHeaders-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120547" comment="libQt5PlatformSupport-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152321" comment="libQt5PlatformSupport-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120548" comment="libQt5PlatformSupport-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152322" comment="libQt5PlatformSupport-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120549" comment="libQt5PlatformSupport-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152323" comment="libQt5PlatformSupport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120550" comment="libQt5Positioning5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152324" comment="libQt5Positioning5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120551" comment="libQt5Positioning5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152325" comment="libQt5Positioning5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120552" comment="libQt5PrintSupport-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152326" comment="libQt5PrintSupport-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120553" comment="libQt5PrintSupport-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152327" comment="libQt5PrintSupport-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120554" comment="libQt5PrintSupport-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152328" comment="libQt5PrintSupport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120555" comment="libQt5PrintSupport5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152329" comment="libQt5PrintSupport5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120556" comment="libQt5PrintSupport5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152330" comment="libQt5PrintSupport5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120557" comment="libQt5Script5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152331" comment="libQt5Script5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120558" comment="libQt5Script5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152332" comment="libQt5Script5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120559" comment="libQt5Sensors5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152333" comment="libQt5Sensors5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120560" comment="libQt5Sensors5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152334" comment="libQt5Sensors5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120561" comment="libQt5Sensors5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152335" comment="libQt5Sensors5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120562" comment="libQt5SerialPort5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152336" comment="libQt5SerialPort5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120563" comment="libQt5SerialPort5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152337" comment="libQt5SerialPort5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120564" comment="libQt5Sql-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152338" comment="libQt5Sql-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120565" comment="libQt5Sql-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152339" comment="libQt5Sql-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120566" comment="libQt5Sql-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152340" comment="libQt5Sql-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120567" comment="libQt5Sql5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152341" comment="libQt5Sql5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120568" comment="libQt5Sql5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152342" comment="libQt5Sql5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120569" comment="libQt5Sql5-mysql-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152343" comment="libQt5Sql5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120570" comment="libQt5Sql5-mysql-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152344" comment="libQt5Sql5-mysql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120571" comment="libQt5Sql5-postgresql-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152345" comment="libQt5Sql5-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120572" comment="libQt5Sql5-postgresql-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152346" comment="libQt5Sql5-postgresql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120573" comment="libQt5Sql5-sqlite-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152347" comment="libQt5Sql5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120574" comment="libQt5Sql5-sqlite-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152348" comment="libQt5Sql5-sqlite-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120575" comment="libQt5Sql5-unixODBC-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152349" comment="libQt5Sql5-unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120576" comment="libQt5Sql5-unixODBC-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152350" comment="libQt5Sql5-unixODBC-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120577" comment="libQt5Svg5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152351" comment="libQt5Svg5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120578" comment="libQt5Svg5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152352" comment="libQt5Svg5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120579" comment="libQt5Test-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152353" comment="libQt5Test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120580" comment="libQt5Test-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152354" comment="libQt5Test-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120581" comment="libQt5Test-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152355" comment="libQt5Test-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120582" comment="libQt5Test5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152356" comment="libQt5Test5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120583" comment="libQt5Test5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152357" comment="libQt5Test5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120584" comment="libQt5WaylandClient5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152358" comment="libQt5WaylandClient5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120585" comment="libQt5WaylandClient5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152359" comment="libQt5WaylandClient5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120586" comment="libQt5WebChannel5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152360" comment="libQt5WebChannel5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120587" comment="libQt5WebChannel5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152361" comment="libQt5WebChannel5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120588" comment="libQt5WebChannel5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152362" comment="libQt5WebChannel5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120589" comment="libQt5WebKit-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152363" comment="libQt5WebKit-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120590" comment="libQt5WebKit5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152364" comment="libQt5WebKit5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120591" comment="libQt5WebKit5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152365" comment="libQt5WebKit5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120592" comment="libQt5WebKit5-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152366" comment="libQt5WebKit5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120593" comment="libQt5WebKit5-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152367" comment="libQt5WebKit5-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120594" comment="libQt5WebKit5-imports-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152368" comment="libQt5WebKit5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120595" comment="libQt5WebKitWidgets-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152369" comment="libQt5WebKitWidgets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120596" comment="libQt5WebKitWidgets-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152370" comment="libQt5WebKitWidgets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120597" comment="libQt5WebKitWidgets-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152371" comment="libQt5WebKitWidgets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120598" comment="libQt5WebKitWidgets5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152372" comment="libQt5WebKitWidgets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120599" comment="libQt5WebKitWidgets5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152373" comment="libQt5WebKitWidgets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120600" comment="libQt5WebSockets5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152374" comment="libQt5WebSockets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120601" comment="libQt5WebSockets5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152375" comment="libQt5WebSockets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120602" comment="libQt5WebSockets5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152376" comment="libQt5WebSockets5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120603" comment="libQt5Widgets-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152377" comment="libQt5Widgets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120604" comment="libQt5Widgets-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152378" comment="libQt5Widgets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120605" comment="libQt5Widgets-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152379" comment="libQt5Widgets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120606" comment="libQt5Widgets5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152380" comment="libQt5Widgets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120607" comment="libQt5Widgets5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152381" comment="libQt5Widgets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120608" comment="libQt5X11Extras5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152382" comment="libQt5X11Extras5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120609" comment="libQt5X11Extras5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152383" comment="libQt5X11Extras5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120610" comment="libQt5Xml-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152384" comment="libQt5Xml-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120611" comment="libQt5Xml-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152385" comment="libQt5Xml-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120612" comment="libQt5Xml5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152386" comment="libQt5Xml5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120613" comment="libQt5Xml5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152387" comment="libQt5Xml5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120614" comment="libQt5XmlPatterns5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152388" comment="libQt5XmlPatterns5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120615" comment="libQt5XmlPatterns5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152389" comment="libQt5XmlPatterns5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120616" comment="libQtQuick5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152390" comment="libQtQuick5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120617" comment="libQtQuick5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152391" comment="libQtQuick5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120618" comment="libqt5-creator-3.5.1-6.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152392" comment="libqt5-creator is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120619" comment="libqt5-linguist-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152393" comment="libqt5-linguist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120620" comment="libqt5-linguist-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152394" comment="libqt5-linguist-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120621" comment="libqt5-qt3d-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152395" comment="libqt5-qt3d is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120622" comment="libqt5-qt3d-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152396" comment="libqt5-qt3d-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120623" comment="libqt5-qt3d-examples-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152397" comment="libqt5-qt3d-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120624" comment="libqt5-qt3d-imports-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152398" comment="libqt5-qt3d-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120625" comment="libqt5-qt3d-private-headers-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152399" comment="libqt5-qt3d-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120626" comment="libqt5-qtbase-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152400" comment="libqt5-qtbase is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120627" comment="libqt5-qtbase-common-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152401" comment="libqt5-qtbase-common-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120628" comment="libqt5-qtbase-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152402" comment="libqt5-qtbase-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120629" comment="libqt5-qtbase-doc-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152403" comment="libqt5-qtbase-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120630" comment="libqt5-qtbase-examples-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152404" comment="libqt5-qtbase-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120631" comment="libqt5-qtbase-examples-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152405" comment="libqt5-qtbase-examples-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120632" comment="libqt5-qtbase-platformtheme-gtk2-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152406" comment="libqt5-qtbase-platformtheme-gtk2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120633" comment="libqt5-qtbase-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152407" comment="libqt5-qtbase-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120634" comment="libqt5-qtconnectivity-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152408" comment="libqt5-qtconnectivity is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120635" comment="libqt5-qtconnectivity-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152409" comment="libqt5-qtconnectivity-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120636" comment="libqt5-qtconnectivity-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152410" comment="libqt5-qtconnectivity-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120637" comment="libqt5-qtconnectivity-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152411" comment="libqt5-qtconnectivity-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120638" comment="libqt5-qtconnectivity-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152412" comment="libqt5-qtconnectivity-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120639" comment="libqt5-qtconnectivity-tools-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152413" comment="libqt5-qtconnectivity-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120640" comment="libqt5-qtct-0.20-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152414" comment="libqt5-qtct is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120641" comment="libqt5-qtdeclarative-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152415" comment="libqt5-qtdeclarative is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120642" comment="libqt5-qtdeclarative-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152416" comment="libqt5-qtdeclarative-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120643" comment="libqt5-qtdeclarative-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152417" comment="libqt5-qtdeclarative-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120644" comment="libqt5-qtdeclarative-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152418" comment="libqt5-qtdeclarative-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120645" comment="libqt5-qtdeclarative-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152419" comment="libqt5-qtdeclarative-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120646" comment="libqt5-qtdeclarative-tools-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152420" comment="libqt5-qtdeclarative-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120647" comment="libqt5-qtdoc-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152421" comment="libqt5-qtdoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120648" comment="libqt5-qtgraphicaleffects-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152422" comment="libqt5-qtgraphicaleffects is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120649" comment="libqt5-qtimageformats-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152423" comment="libqt5-qtimageformats is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120650" comment="libqt5-qtimageformats-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152424" comment="libqt5-qtimageformats-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120651" comment="libqt5-qtimageformats-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152425" comment="libqt5-qtimageformats-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120652" comment="libqt5-qtlocation-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152426" comment="libqt5-qtlocation is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120653" comment="libqt5-qtlocation-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152427" comment="libqt5-qtlocation-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120654" comment="libqt5-qtlocation-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152428" comment="libqt5-qtlocation-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120655" comment="libqt5-qtlocation-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152429" comment="libqt5-qtlocation-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120656" comment="libqt5-qtlocation-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152430" comment="libqt5-qtlocation-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120657" comment="libqt5-qtmultimedia-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152431" comment="libqt5-qtmultimedia is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120658" comment="libqt5-qtmultimedia-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152432" comment="libqt5-qtmultimedia-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120659" comment="libqt5-qtmultimedia-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152433" comment="libqt5-qtmultimedia-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120660" comment="libqt5-qtmultimedia-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152434" comment="libqt5-qtmultimedia-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120661" comment="libqt5-qtmultimedia-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152435" comment="libqt5-qtmultimedia-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120662" comment="libqt5-qtquick1-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152436" comment="libqt5-qtquick1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120663" comment="libqt5-qtquick1-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152437" comment="libqt5-qtquick1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120664" comment="libqt5-qtquick1-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152438" comment="libqt5-qtquick1-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120665" comment="libqt5-qtquick1-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152439" comment="libqt5-qtquick1-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120666" comment="libqt5-qtquick1-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152440" comment="libqt5-qtquick1-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120667" comment="libqt5-qtquickcontrols-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152441" comment="libqt5-qtquickcontrols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120668" comment="libqt5-qtquickcontrols-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152442" comment="libqt5-qtquickcontrols-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120669" comment="libqt5-qtscript-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152443" comment="libqt5-qtscript is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120670" comment="libqt5-qtscript-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152444" comment="libqt5-qtscript-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120671" comment="libqt5-qtscript-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152445" comment="libqt5-qtscript-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120672" comment="libqt5-qtscript-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152446" comment="libqt5-qtscript-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120673" comment="libqt5-qtscript-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152447" comment="libqt5-qtscript-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120674" comment="libqt5-qtsensors-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152448" comment="libqt5-qtsensors is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120675" comment="libqt5-qtsensors-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152449" comment="libqt5-qtsensors-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120676" comment="libqt5-qtsensors-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152450" comment="libqt5-qtsensors-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120677" comment="libqt5-qtsensors-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152451" comment="libqt5-qtsensors-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120678" comment="libqt5-qtsensors-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152452" comment="libqt5-qtsensors-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120679" comment="libqt5-qtserialport-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152453" comment="libqt5-qtserialport is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120680" comment="libqt5-qtserialport-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152454" comment="libqt5-qtserialport-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120681" comment="libqt5-qtserialport-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152455" comment="libqt5-qtserialport-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120682" comment="libqt5-qtserialport-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152456" comment="libqt5-qtserialport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120683" comment="libqt5-qtsvg-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152457" comment="libqt5-qtsvg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120684" comment="libqt5-qtsvg-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152458" comment="libqt5-qtsvg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120685" comment="libqt5-qtsvg-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152459" comment="libqt5-qtsvg-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120686" comment="libqt5-qtsvg-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152460" comment="libqt5-qtsvg-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120687" comment="libqt5-qtsvg-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152461" comment="libqt5-qtsvg-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120688" comment="libqt5-qttools-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152462" comment="libqt5-qttools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120689" comment="libqt5-qttools-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152463" comment="libqt5-qttools-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120690" comment="libqt5-qttools-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152464" comment="libqt5-qttools-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120691" comment="libqt5-qttools-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152465" comment="libqt5-qttools-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120692" comment="libqt5-qttools-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152466" comment="libqt5-qttools-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120693" comment="libqt5-qttools-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152467" comment="libqt5-qttools-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120694" comment="libqt5-qttranslations-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152468" comment="libqt5-qttranslations is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120695" comment="libqt5-qtwayland-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152469" comment="libqt5-qtwayland is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120696" comment="libqt5-qtwayland-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152470" comment="libqt5-qtwayland-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120697" comment="libqt5-qtwayland-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152471" comment="libqt5-qtwayland-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120698" comment="libqt5-qtwayland-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152472" comment="libqt5-qtwayland-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120699" comment="libqt5-qtwayland-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152473" comment="libqt5-qtwayland-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120700" comment="libqt5-qtwayland-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152474" comment="libqt5-qtwayland-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120701" comment="libqt5-qtwebchannel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152475" comment="libqt5-qtwebchannel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120702" comment="libqt5-qtwebchannel-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152476" comment="libqt5-qtwebchannel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120703" comment="libqt5-qtwebchannel-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152477" comment="libqt5-qtwebchannel-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120704" comment="libqt5-qtwebchannel-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152478" comment="libqt5-qtwebchannel-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120705" comment="libqt5-qtwebchannel-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152479" comment="libqt5-qtwebchannel-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120706" comment="libqt5-qtwebengine-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120707" comment="libqt5-qtwebengine-32bit-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152481" comment="libqt5-qtwebengine-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120708" comment="libqt5-qtwebengine-devel-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120709" comment="libqt5-qtwebengine-devel-32bit-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152483" comment="libqt5-qtwebengine-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120710" comment="libqt5-qtwebengine-examples-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120711" comment="libqt5-qtwebengine-private-headers-devel-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120712" comment="libqt5-qtwebkit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152486" comment="libqt5-qtwebkit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120713" comment="libqt5-qtwebkit-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152487" comment="libqt5-qtwebkit-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120714" comment="libqt5-qtwebsockets-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152488" comment="libqt5-qtwebsockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120715" comment="libqt5-qtwebsockets-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152489" comment="libqt5-qtwebsockets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120716" comment="libqt5-qtwebsockets-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152490" comment="libqt5-qtwebsockets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120717" comment="libqt5-qtwebsockets-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152491" comment="libqt5-qtwebsockets-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120718" comment="libqt5-qtwebsockets-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152492" comment="libqt5-qtwebsockets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120719" comment="libqt5-qtx11extras-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152493" comment="libqt5-qtx11extras is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120720" comment="libqt5-qtx11extras-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152494" comment="libqt5-qtx11extras-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120721" comment="libqt5-qtx11extras-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152495" comment="libqt5-qtx11extras-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120722" comment="libqt5-qtxmlpatterns-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152496" comment="libqt5-qtxmlpatterns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120723" comment="libqt5-qtxmlpatterns-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152497" comment="libqt5-qtxmlpatterns-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120724" comment="libqt5-qtxmlpatterns-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152498" comment="libqt5-qtxmlpatterns-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120725" comment="libqt5-qtxmlpatterns-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152499" comment="libqt5-qtxmlpatterns-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120726" comment="libqt5-qtxmlpatterns-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152500" comment="libqt5-qtxmlpatterns-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120727" comment="lxqt-powermanagement-0.9.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152501" comment="lxqt-powermanagement is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120728" comment="lxqt-powermanagement-lang-0.9.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152502" comment="lxqt-powermanagement-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120729" comment="lxqt-qtplugin-0.9.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152503" comment="lxqt-qtplugin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1290</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1290" source="CVE"/>
    <description>
    The Google V8 engine, as used in Google Chrome before 44.0.2403.89 and QtWebEngineCore in Qt before 5.5.1, allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1290.html">CVE-2015-1290</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1290">SUSE bug 959178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1290">SUSE bug 959178</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120451" comment="calibre-2.46.0-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152225" comment="calibre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120452" comment="fcitx-qt5-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152226" comment="fcitx-qt5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120453" comment="fcitx-qt5-32bit-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152227" comment="fcitx-qt5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120454" comment="fcitx-qt5-devel-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152228" comment="fcitx-qt5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120455" comment="frameworkintegration-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152229" comment="frameworkintegration is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120456" comment="frameworkintegration-devel-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152230" comment="frameworkintegration-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120457" comment="frameworkintegration-devel-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152231" comment="frameworkintegration-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120458" comment="frameworkintegration-plugin-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152232" comment="frameworkintegration-plugin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120459" comment="frameworkintegration-plugin-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152233" comment="frameworkintegration-plugin-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120460" comment="kwayland-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152234" comment="kwayland is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120461" comment="kwayland-32bit-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152235" comment="kwayland-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120462" comment="kwayland-devel-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152236" comment="kwayland-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120463" comment="kwayland-devel-32bit-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152237" comment="kwayland-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120464" comment="kwin5-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152238" comment="kwin5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120465" comment="kwin5-devel-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152239" comment="kwin5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120466" comment="kwin5-lang-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152240" comment="kwin5-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120467" comment="libKF5Style5-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152241" comment="libKF5Style5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120468" comment="libKF5Style5-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152242" comment="libKF5Style5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120469" comment="libKF5Style5-lang-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152243" comment="libKF5Style5-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120470" comment="libQt53DCollision-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152244" comment="libQt53DCollision-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120471" comment="libQt53DCollision5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152245" comment="libQt53DCollision5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120472" comment="libQt53DCollision5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152246" comment="libQt53DCollision5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120473" comment="libQt53DCore-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152247" comment="libQt53DCore-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120474" comment="libQt53DCore5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152248" comment="libQt53DCore5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120475" comment="libQt53DCore5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152249" comment="libQt53DCore5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120476" comment="libQt53DInput-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152250" comment="libQt53DInput-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120477" comment="libQt53DInput5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152251" comment="libQt53DInput5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120478" comment="libQt53DInput5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152252" comment="libQt53DInput5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120479" comment="libQt53DLogic-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152253" comment="libQt53DLogic-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120480" comment="libQt53DLogic5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152254" comment="libQt53DLogic5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120481" comment="libQt53DLogic5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152255" comment="libQt53DLogic5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120482" comment="libQt53DQuick-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152256" comment="libQt53DQuick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120483" comment="libQt53DQuick5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152257" comment="libQt53DQuick5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120484" comment="libQt53DQuick5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152258" comment="libQt53DQuick5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120485" comment="libQt53DQuickRenderer-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152259" comment="libQt53DQuickRenderer-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120486" comment="libQt53DQuickRenderer5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152260" comment="libQt53DQuickRenderer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120487" comment="libQt53DQuickRenderer5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152261" comment="libQt53DQuickRenderer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120488" comment="libQt53DRenderer-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152262" comment="libQt53DRenderer-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120489" comment="libQt53DRenderer5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152263" comment="libQt53DRenderer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120490" comment="libQt53DRenderer5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152264" comment="libQt53DRenderer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120491" comment="libQt5Bluetooth5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152265" comment="libQt5Bluetooth5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120492" comment="libQt5Bluetooth5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152266" comment="libQt5Bluetooth5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120493" comment="libQt5Bluetooth5-imports-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152267" comment="libQt5Bluetooth5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120494" comment="libQt5Bootstrap-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152268" comment="libQt5Bootstrap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120495" comment="libQt5Bootstrap-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152269" comment="libQt5Bootstrap-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120496" comment="libQt5CLucene5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152270" comment="libQt5CLucene5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120497" comment="libQt5CLucene5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152271" comment="libQt5CLucene5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120498" comment="libQt5Compositor5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152272" comment="libQt5Compositor5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120499" comment="libQt5Compositor5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152273" comment="libQt5Compositor5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120500" comment="libQt5Concurrent-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152274" comment="libQt5Concurrent-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120501" comment="libQt5Concurrent-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152275" comment="libQt5Concurrent-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120502" comment="libQt5Concurrent5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152276" comment="libQt5Concurrent5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120503" comment="libQt5Concurrent5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152277" comment="libQt5Concurrent5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120504" comment="libQt5Core-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152278" comment="libQt5Core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120505" comment="libQt5Core-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152279" comment="libQt5Core-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120506" comment="libQt5Core-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152280" comment="libQt5Core-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120507" comment="libQt5Core5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152281" comment="libQt5Core5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120508" comment="libQt5Core5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152282" comment="libQt5Core5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120509" comment="libQt5DBus-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152283" comment="libQt5DBus-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120510" comment="libQt5DBus-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152284" comment="libQt5DBus-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120511" comment="libQt5DBus-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152285" comment="libQt5DBus-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120512" comment="libQt5DBus5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152286" comment="libQt5DBus5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120513" comment="libQt5DBus5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152287" comment="libQt5DBus5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120514" comment="libQt5Declarative5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152288" comment="libQt5Declarative5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120515" comment="libQt5Declarative5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152289" comment="libQt5Declarative5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120516" comment="libQt5Designer5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152290" comment="libQt5Designer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120517" comment="libQt5Designer5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152291" comment="libQt5Designer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120518" comment="libQt5DesignerComponents5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152292" comment="libQt5DesignerComponents5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120519" comment="libQt5DesignerComponents5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152293" comment="libQt5DesignerComponents5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120520" comment="libQt5Gui-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152294" comment="libQt5Gui-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120521" comment="libQt5Gui-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152295" comment="libQt5Gui-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120522" comment="libQt5Gui-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152296" comment="libQt5Gui-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120523" comment="libQt5Gui5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152297" comment="libQt5Gui5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120524" comment="libQt5Gui5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152298" comment="libQt5Gui5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120525" comment="libQt5Help5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152299" comment="libQt5Help5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120526" comment="libQt5Help5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152300" comment="libQt5Help5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120527" comment="libQt5Location5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152301" comment="libQt5Location5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120528" comment="libQt5Location5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152302" comment="libQt5Location5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120529" comment="libQt5Multimedia5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152303" comment="libQt5Multimedia5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120530" comment="libQt5Multimedia5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152304" comment="libQt5Multimedia5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120531" comment="libQt5Network-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152305" comment="libQt5Network-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120532" comment="libQt5Network-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152306" comment="libQt5Network-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120533" comment="libQt5Network-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152307" comment="libQt5Network-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120534" comment="libQt5Network5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152308" comment="libQt5Network5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120535" comment="libQt5Network5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152309" comment="libQt5Network5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120536" comment="libQt5Nfc5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152310" comment="libQt5Nfc5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120537" comment="libQt5Nfc5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152311" comment="libQt5Nfc5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120538" comment="libQt5Nfc5-imports-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152312" comment="libQt5Nfc5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120539" comment="libQt5OpenGL-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152313" comment="libQt5OpenGL-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120540" comment="libQt5OpenGL-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152314" comment="libQt5OpenGL-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120541" comment="libQt5OpenGL-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152315" comment="libQt5OpenGL-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120542" comment="libQt5OpenGL5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152316" comment="libQt5OpenGL5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120543" comment="libQt5OpenGL5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152317" comment="libQt5OpenGL5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120544" comment="libQt5OpenGLExtensions-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152318" comment="libQt5OpenGLExtensions-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120545" comment="libQt5OpenGLExtensions-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152319" comment="libQt5OpenGLExtensions-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120546" comment="libQt5PlatformHeaders-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152320" comment="libQt5PlatformHeaders-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120547" comment="libQt5PlatformSupport-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152321" comment="libQt5PlatformSupport-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120548" comment="libQt5PlatformSupport-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152322" comment="libQt5PlatformSupport-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120549" comment="libQt5PlatformSupport-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152323" comment="libQt5PlatformSupport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120550" comment="libQt5Positioning5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152324" comment="libQt5Positioning5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120551" comment="libQt5Positioning5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152325" comment="libQt5Positioning5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120552" comment="libQt5PrintSupport-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152326" comment="libQt5PrintSupport-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120553" comment="libQt5PrintSupport-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152327" comment="libQt5PrintSupport-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120554" comment="libQt5PrintSupport-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152328" comment="libQt5PrintSupport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120555" comment="libQt5PrintSupport5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152329" comment="libQt5PrintSupport5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120556" comment="libQt5PrintSupport5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152330" comment="libQt5PrintSupport5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120557" comment="libQt5Script5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152331" comment="libQt5Script5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120558" comment="libQt5Script5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152332" comment="libQt5Script5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120559" comment="libQt5Sensors5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152333" comment="libQt5Sensors5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120560" comment="libQt5Sensors5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152334" comment="libQt5Sensors5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120561" comment="libQt5Sensors5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152335" comment="libQt5Sensors5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120562" comment="libQt5SerialPort5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152336" comment="libQt5SerialPort5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120563" comment="libQt5SerialPort5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152337" comment="libQt5SerialPort5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120564" comment="libQt5Sql-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152338" comment="libQt5Sql-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120565" comment="libQt5Sql-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152339" comment="libQt5Sql-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120566" comment="libQt5Sql-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152340" comment="libQt5Sql-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120567" comment="libQt5Sql5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152341" comment="libQt5Sql5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120568" comment="libQt5Sql5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152342" comment="libQt5Sql5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120569" comment="libQt5Sql5-mysql-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152343" comment="libQt5Sql5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120570" comment="libQt5Sql5-mysql-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152344" comment="libQt5Sql5-mysql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120571" comment="libQt5Sql5-postgresql-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152345" comment="libQt5Sql5-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120572" comment="libQt5Sql5-postgresql-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152346" comment="libQt5Sql5-postgresql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120573" comment="libQt5Sql5-sqlite-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152347" comment="libQt5Sql5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120574" comment="libQt5Sql5-sqlite-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152348" comment="libQt5Sql5-sqlite-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120575" comment="libQt5Sql5-unixODBC-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152349" comment="libQt5Sql5-unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120576" comment="libQt5Sql5-unixODBC-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152350" comment="libQt5Sql5-unixODBC-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120577" comment="libQt5Svg5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152351" comment="libQt5Svg5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120578" comment="libQt5Svg5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152352" comment="libQt5Svg5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120579" comment="libQt5Test-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152353" comment="libQt5Test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120580" comment="libQt5Test-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152354" comment="libQt5Test-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120581" comment="libQt5Test-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152355" comment="libQt5Test-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120582" comment="libQt5Test5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152356" comment="libQt5Test5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120583" comment="libQt5Test5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152357" comment="libQt5Test5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120584" comment="libQt5WaylandClient5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152358" comment="libQt5WaylandClient5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120585" comment="libQt5WaylandClient5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152359" comment="libQt5WaylandClient5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120586" comment="libQt5WebChannel5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152360" comment="libQt5WebChannel5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120587" comment="libQt5WebChannel5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152361" comment="libQt5WebChannel5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120588" comment="libQt5WebChannel5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152362" comment="libQt5WebChannel5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120589" comment="libQt5WebKit-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152363" comment="libQt5WebKit-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120590" comment="libQt5WebKit5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152364" comment="libQt5WebKit5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120591" comment="libQt5WebKit5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152365" comment="libQt5WebKit5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120592" comment="libQt5WebKit5-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152366" comment="libQt5WebKit5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120593" comment="libQt5WebKit5-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152367" comment="libQt5WebKit5-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120594" comment="libQt5WebKit5-imports-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152368" comment="libQt5WebKit5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120595" comment="libQt5WebKitWidgets-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152369" comment="libQt5WebKitWidgets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120596" comment="libQt5WebKitWidgets-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152370" comment="libQt5WebKitWidgets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120597" comment="libQt5WebKitWidgets-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152371" comment="libQt5WebKitWidgets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120598" comment="libQt5WebKitWidgets5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152372" comment="libQt5WebKitWidgets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120599" comment="libQt5WebKitWidgets5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152373" comment="libQt5WebKitWidgets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120600" comment="libQt5WebSockets5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152374" comment="libQt5WebSockets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120601" comment="libQt5WebSockets5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152375" comment="libQt5WebSockets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120602" comment="libQt5WebSockets5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152376" comment="libQt5WebSockets5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120603" comment="libQt5Widgets-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152377" comment="libQt5Widgets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120604" comment="libQt5Widgets-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152378" comment="libQt5Widgets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120605" comment="libQt5Widgets-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152379" comment="libQt5Widgets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120606" comment="libQt5Widgets5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152380" comment="libQt5Widgets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120607" comment="libQt5Widgets5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152381" comment="libQt5Widgets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120608" comment="libQt5X11Extras5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152382" comment="libQt5X11Extras5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120609" comment="libQt5X11Extras5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152383" comment="libQt5X11Extras5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120610" comment="libQt5Xml-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152384" comment="libQt5Xml-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120611" comment="libQt5Xml-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152385" comment="libQt5Xml-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120612" comment="libQt5Xml5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152386" comment="libQt5Xml5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120613" comment="libQt5Xml5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152387" comment="libQt5Xml5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120614" comment="libQt5XmlPatterns5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152388" comment="libQt5XmlPatterns5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120615" comment="libQt5XmlPatterns5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152389" comment="libQt5XmlPatterns5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120616" comment="libQtQuick5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152390" comment="libQtQuick5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120617" comment="libQtQuick5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152391" comment="libQtQuick5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120618" comment="libqt5-creator-3.5.1-6.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152392" comment="libqt5-creator is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120619" comment="libqt5-linguist-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152393" comment="libqt5-linguist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120620" comment="libqt5-linguist-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152394" comment="libqt5-linguist-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120621" comment="libqt5-qt3d-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152395" comment="libqt5-qt3d is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120622" comment="libqt5-qt3d-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152396" comment="libqt5-qt3d-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120623" comment="libqt5-qt3d-examples-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152397" comment="libqt5-qt3d-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120624" comment="libqt5-qt3d-imports-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152398" comment="libqt5-qt3d-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120625" comment="libqt5-qt3d-private-headers-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152399" comment="libqt5-qt3d-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120626" comment="libqt5-qtbase-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152400" comment="libqt5-qtbase is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120627" comment="libqt5-qtbase-common-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152401" comment="libqt5-qtbase-common-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120628" comment="libqt5-qtbase-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152402" comment="libqt5-qtbase-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120629" comment="libqt5-qtbase-doc-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152403" comment="libqt5-qtbase-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120630" comment="libqt5-qtbase-examples-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152404" comment="libqt5-qtbase-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120631" comment="libqt5-qtbase-examples-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152405" comment="libqt5-qtbase-examples-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120632" comment="libqt5-qtbase-platformtheme-gtk2-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152406" comment="libqt5-qtbase-platformtheme-gtk2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120633" comment="libqt5-qtbase-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152407" comment="libqt5-qtbase-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120634" comment="libqt5-qtconnectivity-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152408" comment="libqt5-qtconnectivity is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120635" comment="libqt5-qtconnectivity-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152409" comment="libqt5-qtconnectivity-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120636" comment="libqt5-qtconnectivity-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152410" comment="libqt5-qtconnectivity-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120637" comment="libqt5-qtconnectivity-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152411" comment="libqt5-qtconnectivity-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120638" comment="libqt5-qtconnectivity-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152412" comment="libqt5-qtconnectivity-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120639" comment="libqt5-qtconnectivity-tools-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152413" comment="libqt5-qtconnectivity-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120640" comment="libqt5-qtct-0.20-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152414" comment="libqt5-qtct is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120641" comment="libqt5-qtdeclarative-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152415" comment="libqt5-qtdeclarative is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120642" comment="libqt5-qtdeclarative-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152416" comment="libqt5-qtdeclarative-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120643" comment="libqt5-qtdeclarative-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152417" comment="libqt5-qtdeclarative-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120644" comment="libqt5-qtdeclarative-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152418" comment="libqt5-qtdeclarative-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120645" comment="libqt5-qtdeclarative-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152419" comment="libqt5-qtdeclarative-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120646" comment="libqt5-qtdeclarative-tools-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152420" comment="libqt5-qtdeclarative-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120647" comment="libqt5-qtdoc-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152421" comment="libqt5-qtdoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120648" comment="libqt5-qtgraphicaleffects-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152422" comment="libqt5-qtgraphicaleffects is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120649" comment="libqt5-qtimageformats-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152423" comment="libqt5-qtimageformats is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120650" comment="libqt5-qtimageformats-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152424" comment="libqt5-qtimageformats-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120651" comment="libqt5-qtimageformats-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152425" comment="libqt5-qtimageformats-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120652" comment="libqt5-qtlocation-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152426" comment="libqt5-qtlocation is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120653" comment="libqt5-qtlocation-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152427" comment="libqt5-qtlocation-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120654" comment="libqt5-qtlocation-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152428" comment="libqt5-qtlocation-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120655" comment="libqt5-qtlocation-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152429" comment="libqt5-qtlocation-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120656" comment="libqt5-qtlocation-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152430" comment="libqt5-qtlocation-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120657" comment="libqt5-qtmultimedia-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152431" comment="libqt5-qtmultimedia is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120658" comment="libqt5-qtmultimedia-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152432" comment="libqt5-qtmultimedia-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120659" comment="libqt5-qtmultimedia-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152433" comment="libqt5-qtmultimedia-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120660" comment="libqt5-qtmultimedia-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152434" comment="libqt5-qtmultimedia-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120661" comment="libqt5-qtmultimedia-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152435" comment="libqt5-qtmultimedia-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120662" comment="libqt5-qtquick1-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152436" comment="libqt5-qtquick1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120663" comment="libqt5-qtquick1-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152437" comment="libqt5-qtquick1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120664" comment="libqt5-qtquick1-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152438" comment="libqt5-qtquick1-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120665" comment="libqt5-qtquick1-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152439" comment="libqt5-qtquick1-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120666" comment="libqt5-qtquick1-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152440" comment="libqt5-qtquick1-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120667" comment="libqt5-qtquickcontrols-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152441" comment="libqt5-qtquickcontrols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120668" comment="libqt5-qtquickcontrols-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152442" comment="libqt5-qtquickcontrols-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120669" comment="libqt5-qtscript-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152443" comment="libqt5-qtscript is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120670" comment="libqt5-qtscript-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152444" comment="libqt5-qtscript-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120671" comment="libqt5-qtscript-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152445" comment="libqt5-qtscript-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120672" comment="libqt5-qtscript-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152446" comment="libqt5-qtscript-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120673" comment="libqt5-qtscript-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152447" comment="libqt5-qtscript-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120674" comment="libqt5-qtsensors-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152448" comment="libqt5-qtsensors is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120675" comment="libqt5-qtsensors-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152449" comment="libqt5-qtsensors-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120676" comment="libqt5-qtsensors-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152450" comment="libqt5-qtsensors-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120677" comment="libqt5-qtsensors-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152451" comment="libqt5-qtsensors-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120678" comment="libqt5-qtsensors-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152452" comment="libqt5-qtsensors-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120679" comment="libqt5-qtserialport-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152453" comment="libqt5-qtserialport is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120680" comment="libqt5-qtserialport-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152454" comment="libqt5-qtserialport-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120681" comment="libqt5-qtserialport-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152455" comment="libqt5-qtserialport-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120682" comment="libqt5-qtserialport-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152456" comment="libqt5-qtserialport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120683" comment="libqt5-qtsvg-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152457" comment="libqt5-qtsvg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120684" comment="libqt5-qtsvg-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152458" comment="libqt5-qtsvg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120685" comment="libqt5-qtsvg-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152459" comment="libqt5-qtsvg-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120686" comment="libqt5-qtsvg-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152460" comment="libqt5-qtsvg-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120687" comment="libqt5-qtsvg-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152461" comment="libqt5-qtsvg-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120688" comment="libqt5-qttools-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152462" comment="libqt5-qttools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120689" comment="libqt5-qttools-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152463" comment="libqt5-qttools-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120690" comment="libqt5-qttools-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152464" comment="libqt5-qttools-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120691" comment="libqt5-qttools-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152465" comment="libqt5-qttools-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120692" comment="libqt5-qttools-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152466" comment="libqt5-qttools-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120693" comment="libqt5-qttools-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152467" comment="libqt5-qttools-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120694" comment="libqt5-qttranslations-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152468" comment="libqt5-qttranslations is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120695" comment="libqt5-qtwayland-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152469" comment="libqt5-qtwayland is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120696" comment="libqt5-qtwayland-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152470" comment="libqt5-qtwayland-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120697" comment="libqt5-qtwayland-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152471" comment="libqt5-qtwayland-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120698" comment="libqt5-qtwayland-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152472" comment="libqt5-qtwayland-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120699" comment="libqt5-qtwayland-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152473" comment="libqt5-qtwayland-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120700" comment="libqt5-qtwayland-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152474" comment="libqt5-qtwayland-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120701" comment="libqt5-qtwebchannel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152475" comment="libqt5-qtwebchannel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120702" comment="libqt5-qtwebchannel-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152476" comment="libqt5-qtwebchannel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120703" comment="libqt5-qtwebchannel-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152477" comment="libqt5-qtwebchannel-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120704" comment="libqt5-qtwebchannel-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152478" comment="libqt5-qtwebchannel-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120705" comment="libqt5-qtwebchannel-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152479" comment="libqt5-qtwebchannel-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120706" comment="libqt5-qtwebengine-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120707" comment="libqt5-qtwebengine-32bit-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152481" comment="libqt5-qtwebengine-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120708" comment="libqt5-qtwebengine-devel-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120709" comment="libqt5-qtwebengine-devel-32bit-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152483" comment="libqt5-qtwebengine-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120710" comment="libqt5-qtwebengine-examples-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120711" comment="libqt5-qtwebengine-private-headers-devel-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120712" comment="libqt5-qtwebkit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152486" comment="libqt5-qtwebkit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120713" comment="libqt5-qtwebkit-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152487" comment="libqt5-qtwebkit-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120714" comment="libqt5-qtwebsockets-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152488" comment="libqt5-qtwebsockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120715" comment="libqt5-qtwebsockets-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152489" comment="libqt5-qtwebsockets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120716" comment="libqt5-qtwebsockets-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152490" comment="libqt5-qtwebsockets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120717" comment="libqt5-qtwebsockets-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152491" comment="libqt5-qtwebsockets-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120718" comment="libqt5-qtwebsockets-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152492" comment="libqt5-qtwebsockets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120719" comment="libqt5-qtx11extras-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152493" comment="libqt5-qtx11extras is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120720" comment="libqt5-qtx11extras-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152494" comment="libqt5-qtx11extras-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120721" comment="libqt5-qtx11extras-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152495" comment="libqt5-qtx11extras-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120722" comment="libqt5-qtxmlpatterns-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152496" comment="libqt5-qtxmlpatterns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120723" comment="libqt5-qtxmlpatterns-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152497" comment="libqt5-qtxmlpatterns-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120724" comment="libqt5-qtxmlpatterns-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152498" comment="libqt5-qtxmlpatterns-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120725" comment="libqt5-qtxmlpatterns-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152499" comment="libqt5-qtxmlpatterns-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120726" comment="libqt5-qtxmlpatterns-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152500" comment="libqt5-qtxmlpatterns-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120727" comment="lxqt-powermanagement-0.9.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152501" comment="lxqt-powermanagement is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120728" comment="lxqt-powermanagement-lang-0.9.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152502" comment="lxqt-powermanagement-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120729" comment="lxqt-qtplugin-0.9.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152503" comment="lxqt-qtplugin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1291</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1291" source="CVE"/>
    <description>
    The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 45.0.2454.85, does not check whether a node is expected, which allows remote attackers to bypass the Same Origin Policy or cause a denial of service (DOM tree corruption) via a web site with crafted JavaScript code and IFRAME elements.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1291.html">CVE-2015-1291</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1291">SUSE bug 944144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1291">SUSE bug 959178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1291">SUSE bug 959178</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120451" comment="calibre-2.46.0-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152225" comment="calibre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120452" comment="fcitx-qt5-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152226" comment="fcitx-qt5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120453" comment="fcitx-qt5-32bit-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152227" comment="fcitx-qt5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120454" comment="fcitx-qt5-devel-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152228" comment="fcitx-qt5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120455" comment="frameworkintegration-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152229" comment="frameworkintegration is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120456" comment="frameworkintegration-devel-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152230" comment="frameworkintegration-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120457" comment="frameworkintegration-devel-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152231" comment="frameworkintegration-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120458" comment="frameworkintegration-plugin-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152232" comment="frameworkintegration-plugin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120459" comment="frameworkintegration-plugin-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152233" comment="frameworkintegration-plugin-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120460" comment="kwayland-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152234" comment="kwayland is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120461" comment="kwayland-32bit-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152235" comment="kwayland-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120462" comment="kwayland-devel-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152236" comment="kwayland-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120463" comment="kwayland-devel-32bit-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152237" comment="kwayland-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120464" comment="kwin5-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152238" comment="kwin5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120465" comment="kwin5-devel-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152239" comment="kwin5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120466" comment="kwin5-lang-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152240" comment="kwin5-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120467" comment="libKF5Style5-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152241" comment="libKF5Style5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120468" comment="libKF5Style5-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152242" comment="libKF5Style5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120469" comment="libKF5Style5-lang-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152243" comment="libKF5Style5-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120470" comment="libQt53DCollision-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152244" comment="libQt53DCollision-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120471" comment="libQt53DCollision5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152245" comment="libQt53DCollision5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120472" comment="libQt53DCollision5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152246" comment="libQt53DCollision5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120473" comment="libQt53DCore-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152247" comment="libQt53DCore-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120474" comment="libQt53DCore5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152248" comment="libQt53DCore5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120475" comment="libQt53DCore5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152249" comment="libQt53DCore5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120476" comment="libQt53DInput-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152250" comment="libQt53DInput-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120477" comment="libQt53DInput5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152251" comment="libQt53DInput5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120478" comment="libQt53DInput5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152252" comment="libQt53DInput5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120479" comment="libQt53DLogic-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152253" comment="libQt53DLogic-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120480" comment="libQt53DLogic5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152254" comment="libQt53DLogic5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120481" comment="libQt53DLogic5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152255" comment="libQt53DLogic5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120482" comment="libQt53DQuick-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152256" comment="libQt53DQuick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120483" comment="libQt53DQuick5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152257" comment="libQt53DQuick5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120484" comment="libQt53DQuick5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152258" comment="libQt53DQuick5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120485" comment="libQt53DQuickRenderer-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152259" comment="libQt53DQuickRenderer-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120486" comment="libQt53DQuickRenderer5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152260" comment="libQt53DQuickRenderer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120487" comment="libQt53DQuickRenderer5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152261" comment="libQt53DQuickRenderer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120488" comment="libQt53DRenderer-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152262" comment="libQt53DRenderer-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120489" comment="libQt53DRenderer5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152263" comment="libQt53DRenderer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120490" comment="libQt53DRenderer5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152264" comment="libQt53DRenderer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120491" comment="libQt5Bluetooth5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152265" comment="libQt5Bluetooth5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120492" comment="libQt5Bluetooth5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152266" comment="libQt5Bluetooth5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120493" comment="libQt5Bluetooth5-imports-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152267" comment="libQt5Bluetooth5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120494" comment="libQt5Bootstrap-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152268" comment="libQt5Bootstrap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120495" comment="libQt5Bootstrap-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152269" comment="libQt5Bootstrap-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120496" comment="libQt5CLucene5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152270" comment="libQt5CLucene5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120497" comment="libQt5CLucene5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152271" comment="libQt5CLucene5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120498" comment="libQt5Compositor5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152272" comment="libQt5Compositor5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120499" comment="libQt5Compositor5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152273" comment="libQt5Compositor5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120500" comment="libQt5Concurrent-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152274" comment="libQt5Concurrent-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120501" comment="libQt5Concurrent-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152275" comment="libQt5Concurrent-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120502" comment="libQt5Concurrent5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152276" comment="libQt5Concurrent5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120503" comment="libQt5Concurrent5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152277" comment="libQt5Concurrent5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120504" comment="libQt5Core-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152278" comment="libQt5Core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120505" comment="libQt5Core-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152279" comment="libQt5Core-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120506" comment="libQt5Core-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152280" comment="libQt5Core-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120507" comment="libQt5Core5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152281" comment="libQt5Core5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120508" comment="libQt5Core5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152282" comment="libQt5Core5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120509" comment="libQt5DBus-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152283" comment="libQt5DBus-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120510" comment="libQt5DBus-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152284" comment="libQt5DBus-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120511" comment="libQt5DBus-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152285" comment="libQt5DBus-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120512" comment="libQt5DBus5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152286" comment="libQt5DBus5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120513" comment="libQt5DBus5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152287" comment="libQt5DBus5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120514" comment="libQt5Declarative5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152288" comment="libQt5Declarative5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120515" comment="libQt5Declarative5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152289" comment="libQt5Declarative5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120516" comment="libQt5Designer5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152290" comment="libQt5Designer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120517" comment="libQt5Designer5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152291" comment="libQt5Designer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120518" comment="libQt5DesignerComponents5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152292" comment="libQt5DesignerComponents5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120519" comment="libQt5DesignerComponents5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152293" comment="libQt5DesignerComponents5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120520" comment="libQt5Gui-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152294" comment="libQt5Gui-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120521" comment="libQt5Gui-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152295" comment="libQt5Gui-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120522" comment="libQt5Gui-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152296" comment="libQt5Gui-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120523" comment="libQt5Gui5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152297" comment="libQt5Gui5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120524" comment="libQt5Gui5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152298" comment="libQt5Gui5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120525" comment="libQt5Help5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152299" comment="libQt5Help5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120526" comment="libQt5Help5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152300" comment="libQt5Help5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120527" comment="libQt5Location5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152301" comment="libQt5Location5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120528" comment="libQt5Location5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152302" comment="libQt5Location5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120529" comment="libQt5Multimedia5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152303" comment="libQt5Multimedia5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120530" comment="libQt5Multimedia5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152304" comment="libQt5Multimedia5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120531" comment="libQt5Network-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152305" comment="libQt5Network-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120532" comment="libQt5Network-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152306" comment="libQt5Network-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120533" comment="libQt5Network-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152307" comment="libQt5Network-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120534" comment="libQt5Network5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152308" comment="libQt5Network5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120535" comment="libQt5Network5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152309" comment="libQt5Network5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120536" comment="libQt5Nfc5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152310" comment="libQt5Nfc5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120537" comment="libQt5Nfc5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152311" comment="libQt5Nfc5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120538" comment="libQt5Nfc5-imports-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152312" comment="libQt5Nfc5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120539" comment="libQt5OpenGL-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152313" comment="libQt5OpenGL-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120540" comment="libQt5OpenGL-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152314" comment="libQt5OpenGL-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120541" comment="libQt5OpenGL-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152315" comment="libQt5OpenGL-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120542" comment="libQt5OpenGL5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152316" comment="libQt5OpenGL5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120543" comment="libQt5OpenGL5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152317" comment="libQt5OpenGL5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120544" comment="libQt5OpenGLExtensions-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152318" comment="libQt5OpenGLExtensions-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120545" comment="libQt5OpenGLExtensions-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152319" comment="libQt5OpenGLExtensions-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120546" comment="libQt5PlatformHeaders-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152320" comment="libQt5PlatformHeaders-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120547" comment="libQt5PlatformSupport-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152321" comment="libQt5PlatformSupport-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120548" comment="libQt5PlatformSupport-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152322" comment="libQt5PlatformSupport-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120549" comment="libQt5PlatformSupport-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152323" comment="libQt5PlatformSupport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120550" comment="libQt5Positioning5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152324" comment="libQt5Positioning5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120551" comment="libQt5Positioning5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152325" comment="libQt5Positioning5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120552" comment="libQt5PrintSupport-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152326" comment="libQt5PrintSupport-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120553" comment="libQt5PrintSupport-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152327" comment="libQt5PrintSupport-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120554" comment="libQt5PrintSupport-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152328" comment="libQt5PrintSupport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120555" comment="libQt5PrintSupport5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152329" comment="libQt5PrintSupport5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120556" comment="libQt5PrintSupport5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152330" comment="libQt5PrintSupport5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120557" comment="libQt5Script5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152331" comment="libQt5Script5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120558" comment="libQt5Script5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152332" comment="libQt5Script5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120559" comment="libQt5Sensors5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152333" comment="libQt5Sensors5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120560" comment="libQt5Sensors5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152334" comment="libQt5Sensors5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120561" comment="libQt5Sensors5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152335" comment="libQt5Sensors5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120562" comment="libQt5SerialPort5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152336" comment="libQt5SerialPort5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120563" comment="libQt5SerialPort5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152337" comment="libQt5SerialPort5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120564" comment="libQt5Sql-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152338" comment="libQt5Sql-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120565" comment="libQt5Sql-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152339" comment="libQt5Sql-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120566" comment="libQt5Sql-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152340" comment="libQt5Sql-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120567" comment="libQt5Sql5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152341" comment="libQt5Sql5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120568" comment="libQt5Sql5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152342" comment="libQt5Sql5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120569" comment="libQt5Sql5-mysql-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152343" comment="libQt5Sql5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120570" comment="libQt5Sql5-mysql-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152344" comment="libQt5Sql5-mysql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120571" comment="libQt5Sql5-postgresql-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152345" comment="libQt5Sql5-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120572" comment="libQt5Sql5-postgresql-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152346" comment="libQt5Sql5-postgresql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120573" comment="libQt5Sql5-sqlite-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152347" comment="libQt5Sql5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120574" comment="libQt5Sql5-sqlite-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152348" comment="libQt5Sql5-sqlite-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120575" comment="libQt5Sql5-unixODBC-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152349" comment="libQt5Sql5-unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120576" comment="libQt5Sql5-unixODBC-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152350" comment="libQt5Sql5-unixODBC-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120577" comment="libQt5Svg5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152351" comment="libQt5Svg5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120578" comment="libQt5Svg5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152352" comment="libQt5Svg5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120579" comment="libQt5Test-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152353" comment="libQt5Test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120580" comment="libQt5Test-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152354" comment="libQt5Test-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120581" comment="libQt5Test-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152355" comment="libQt5Test-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120582" comment="libQt5Test5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152356" comment="libQt5Test5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120583" comment="libQt5Test5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152357" comment="libQt5Test5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120584" comment="libQt5WaylandClient5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152358" comment="libQt5WaylandClient5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120585" comment="libQt5WaylandClient5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152359" comment="libQt5WaylandClient5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120586" comment="libQt5WebChannel5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152360" comment="libQt5WebChannel5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120587" comment="libQt5WebChannel5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152361" comment="libQt5WebChannel5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120588" comment="libQt5WebChannel5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152362" comment="libQt5WebChannel5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120589" comment="libQt5WebKit-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152363" comment="libQt5WebKit-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120590" comment="libQt5WebKit5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152364" comment="libQt5WebKit5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120591" comment="libQt5WebKit5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152365" comment="libQt5WebKit5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120592" comment="libQt5WebKit5-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152366" comment="libQt5WebKit5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120593" comment="libQt5WebKit5-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152367" comment="libQt5WebKit5-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120594" comment="libQt5WebKit5-imports-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152368" comment="libQt5WebKit5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120595" comment="libQt5WebKitWidgets-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152369" comment="libQt5WebKitWidgets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120596" comment="libQt5WebKitWidgets-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152370" comment="libQt5WebKitWidgets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120597" comment="libQt5WebKitWidgets-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152371" comment="libQt5WebKitWidgets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120598" comment="libQt5WebKitWidgets5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152372" comment="libQt5WebKitWidgets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120599" comment="libQt5WebKitWidgets5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152373" comment="libQt5WebKitWidgets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120600" comment="libQt5WebSockets5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152374" comment="libQt5WebSockets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120601" comment="libQt5WebSockets5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152375" comment="libQt5WebSockets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120602" comment="libQt5WebSockets5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152376" comment="libQt5WebSockets5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120603" comment="libQt5Widgets-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152377" comment="libQt5Widgets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120604" comment="libQt5Widgets-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152378" comment="libQt5Widgets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120605" comment="libQt5Widgets-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152379" comment="libQt5Widgets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120606" comment="libQt5Widgets5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152380" comment="libQt5Widgets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120607" comment="libQt5Widgets5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152381" comment="libQt5Widgets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120608" comment="libQt5X11Extras5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152382" comment="libQt5X11Extras5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120609" comment="libQt5X11Extras5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152383" comment="libQt5X11Extras5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120610" comment="libQt5Xml-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152384" comment="libQt5Xml-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120611" comment="libQt5Xml-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152385" comment="libQt5Xml-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120612" comment="libQt5Xml5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152386" comment="libQt5Xml5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120613" comment="libQt5Xml5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152387" comment="libQt5Xml5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120614" comment="libQt5XmlPatterns5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152388" comment="libQt5XmlPatterns5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120615" comment="libQt5XmlPatterns5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152389" comment="libQt5XmlPatterns5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120616" comment="libQtQuick5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152390" comment="libQtQuick5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120617" comment="libQtQuick5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152391" comment="libQtQuick5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120618" comment="libqt5-creator-3.5.1-6.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152392" comment="libqt5-creator is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120619" comment="libqt5-linguist-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152393" comment="libqt5-linguist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120620" comment="libqt5-linguist-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152394" comment="libqt5-linguist-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120621" comment="libqt5-qt3d-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152395" comment="libqt5-qt3d is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120622" comment="libqt5-qt3d-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152396" comment="libqt5-qt3d-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120623" comment="libqt5-qt3d-examples-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152397" comment="libqt5-qt3d-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120624" comment="libqt5-qt3d-imports-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152398" comment="libqt5-qt3d-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120625" comment="libqt5-qt3d-private-headers-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152399" comment="libqt5-qt3d-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120626" comment="libqt5-qtbase-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152400" comment="libqt5-qtbase is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120627" comment="libqt5-qtbase-common-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152401" comment="libqt5-qtbase-common-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120628" comment="libqt5-qtbase-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152402" comment="libqt5-qtbase-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120629" comment="libqt5-qtbase-doc-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152403" comment="libqt5-qtbase-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120630" comment="libqt5-qtbase-examples-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152404" comment="libqt5-qtbase-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120631" comment="libqt5-qtbase-examples-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152405" comment="libqt5-qtbase-examples-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120632" comment="libqt5-qtbase-platformtheme-gtk2-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152406" comment="libqt5-qtbase-platformtheme-gtk2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120633" comment="libqt5-qtbase-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152407" comment="libqt5-qtbase-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120634" comment="libqt5-qtconnectivity-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152408" comment="libqt5-qtconnectivity is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120635" comment="libqt5-qtconnectivity-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152409" comment="libqt5-qtconnectivity-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120636" comment="libqt5-qtconnectivity-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152410" comment="libqt5-qtconnectivity-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120637" comment="libqt5-qtconnectivity-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152411" comment="libqt5-qtconnectivity-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120638" comment="libqt5-qtconnectivity-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152412" comment="libqt5-qtconnectivity-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120639" comment="libqt5-qtconnectivity-tools-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152413" comment="libqt5-qtconnectivity-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120640" comment="libqt5-qtct-0.20-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152414" comment="libqt5-qtct is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120641" comment="libqt5-qtdeclarative-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152415" comment="libqt5-qtdeclarative is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120642" comment="libqt5-qtdeclarative-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152416" comment="libqt5-qtdeclarative-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120643" comment="libqt5-qtdeclarative-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152417" comment="libqt5-qtdeclarative-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120644" comment="libqt5-qtdeclarative-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152418" comment="libqt5-qtdeclarative-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120645" comment="libqt5-qtdeclarative-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152419" comment="libqt5-qtdeclarative-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120646" comment="libqt5-qtdeclarative-tools-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152420" comment="libqt5-qtdeclarative-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120647" comment="libqt5-qtdoc-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152421" comment="libqt5-qtdoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120648" comment="libqt5-qtgraphicaleffects-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152422" comment="libqt5-qtgraphicaleffects is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120649" comment="libqt5-qtimageformats-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152423" comment="libqt5-qtimageformats is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120650" comment="libqt5-qtimageformats-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152424" comment="libqt5-qtimageformats-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120651" comment="libqt5-qtimageformats-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152425" comment="libqt5-qtimageformats-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120652" comment="libqt5-qtlocation-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152426" comment="libqt5-qtlocation is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120653" comment="libqt5-qtlocation-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152427" comment="libqt5-qtlocation-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120654" comment="libqt5-qtlocation-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152428" comment="libqt5-qtlocation-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120655" comment="libqt5-qtlocation-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152429" comment="libqt5-qtlocation-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120656" comment="libqt5-qtlocation-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152430" comment="libqt5-qtlocation-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120657" comment="libqt5-qtmultimedia-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152431" comment="libqt5-qtmultimedia is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120658" comment="libqt5-qtmultimedia-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152432" comment="libqt5-qtmultimedia-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120659" comment="libqt5-qtmultimedia-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152433" comment="libqt5-qtmultimedia-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120660" comment="libqt5-qtmultimedia-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152434" comment="libqt5-qtmultimedia-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120661" comment="libqt5-qtmultimedia-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152435" comment="libqt5-qtmultimedia-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120662" comment="libqt5-qtquick1-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152436" comment="libqt5-qtquick1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120663" comment="libqt5-qtquick1-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152437" comment="libqt5-qtquick1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120664" comment="libqt5-qtquick1-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152438" comment="libqt5-qtquick1-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120665" comment="libqt5-qtquick1-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152439" comment="libqt5-qtquick1-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120666" comment="libqt5-qtquick1-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152440" comment="libqt5-qtquick1-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120667" comment="libqt5-qtquickcontrols-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152441" comment="libqt5-qtquickcontrols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120668" comment="libqt5-qtquickcontrols-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152442" comment="libqt5-qtquickcontrols-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120669" comment="libqt5-qtscript-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152443" comment="libqt5-qtscript is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120670" comment="libqt5-qtscript-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152444" comment="libqt5-qtscript-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120671" comment="libqt5-qtscript-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152445" comment="libqt5-qtscript-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120672" comment="libqt5-qtscript-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152446" comment="libqt5-qtscript-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120673" comment="libqt5-qtscript-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152447" comment="libqt5-qtscript-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120674" comment="libqt5-qtsensors-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152448" comment="libqt5-qtsensors is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120675" comment="libqt5-qtsensors-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152449" comment="libqt5-qtsensors-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120676" comment="libqt5-qtsensors-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152450" comment="libqt5-qtsensors-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120677" comment="libqt5-qtsensors-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152451" comment="libqt5-qtsensors-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120678" comment="libqt5-qtsensors-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152452" comment="libqt5-qtsensors-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120679" comment="libqt5-qtserialport-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152453" comment="libqt5-qtserialport is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120680" comment="libqt5-qtserialport-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152454" comment="libqt5-qtserialport-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120681" comment="libqt5-qtserialport-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152455" comment="libqt5-qtserialport-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120682" comment="libqt5-qtserialport-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152456" comment="libqt5-qtserialport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120683" comment="libqt5-qtsvg-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152457" comment="libqt5-qtsvg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120684" comment="libqt5-qtsvg-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152458" comment="libqt5-qtsvg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120685" comment="libqt5-qtsvg-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152459" comment="libqt5-qtsvg-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120686" comment="libqt5-qtsvg-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152460" comment="libqt5-qtsvg-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120687" comment="libqt5-qtsvg-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152461" comment="libqt5-qtsvg-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120688" comment="libqt5-qttools-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152462" comment="libqt5-qttools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120689" comment="libqt5-qttools-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152463" comment="libqt5-qttools-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120690" comment="libqt5-qttools-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152464" comment="libqt5-qttools-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120691" comment="libqt5-qttools-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152465" comment="libqt5-qttools-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120692" comment="libqt5-qttools-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152466" comment="libqt5-qttools-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120693" comment="libqt5-qttools-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152467" comment="libqt5-qttools-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120694" comment="libqt5-qttranslations-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152468" comment="libqt5-qttranslations is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120695" comment="libqt5-qtwayland-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152469" comment="libqt5-qtwayland is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120696" comment="libqt5-qtwayland-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152470" comment="libqt5-qtwayland-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120697" comment="libqt5-qtwayland-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152471" comment="libqt5-qtwayland-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120698" comment="libqt5-qtwayland-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152472" comment="libqt5-qtwayland-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120699" comment="libqt5-qtwayland-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152473" comment="libqt5-qtwayland-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120700" comment="libqt5-qtwayland-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152474" comment="libqt5-qtwayland-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120701" comment="libqt5-qtwebchannel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152475" comment="libqt5-qtwebchannel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120702" comment="libqt5-qtwebchannel-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152476" comment="libqt5-qtwebchannel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120703" comment="libqt5-qtwebchannel-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152477" comment="libqt5-qtwebchannel-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120704" comment="libqt5-qtwebchannel-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152478" comment="libqt5-qtwebchannel-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120705" comment="libqt5-qtwebchannel-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152479" comment="libqt5-qtwebchannel-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120706" comment="libqt5-qtwebengine-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120707" comment="libqt5-qtwebengine-32bit-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152481" comment="libqt5-qtwebengine-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120708" comment="libqt5-qtwebengine-devel-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120709" comment="libqt5-qtwebengine-devel-32bit-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152483" comment="libqt5-qtwebengine-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120710" comment="libqt5-qtwebengine-examples-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120711" comment="libqt5-qtwebengine-private-headers-devel-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120712" comment="libqt5-qtwebkit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152486" comment="libqt5-qtwebkit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120713" comment="libqt5-qtwebkit-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152487" comment="libqt5-qtwebkit-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120714" comment="libqt5-qtwebsockets-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152488" comment="libqt5-qtwebsockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120715" comment="libqt5-qtwebsockets-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152489" comment="libqt5-qtwebsockets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120716" comment="libqt5-qtwebsockets-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152490" comment="libqt5-qtwebsockets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120717" comment="libqt5-qtwebsockets-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152491" comment="libqt5-qtwebsockets-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120718" comment="libqt5-qtwebsockets-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152492" comment="libqt5-qtwebsockets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120719" comment="libqt5-qtx11extras-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152493" comment="libqt5-qtx11extras is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120720" comment="libqt5-qtx11extras-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152494" comment="libqt5-qtx11extras-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120721" comment="libqt5-qtx11extras-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152495" comment="libqt5-qtx11extras-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120722" comment="libqt5-qtxmlpatterns-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152496" comment="libqt5-qtxmlpatterns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120723" comment="libqt5-qtxmlpatterns-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152497" comment="libqt5-qtxmlpatterns-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120724" comment="libqt5-qtxmlpatterns-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152498" comment="libqt5-qtxmlpatterns-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120725" comment="libqt5-qtxmlpatterns-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152499" comment="libqt5-qtxmlpatterns-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120726" comment="libqt5-qtxmlpatterns-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152500" comment="libqt5-qtxmlpatterns-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120727" comment="lxqt-powermanagement-0.9.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152501" comment="lxqt-powermanagement is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120728" comment="lxqt-powermanagement-lang-0.9.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152502" comment="lxqt-powermanagement-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120729" comment="lxqt-qtplugin-0.9.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152503" comment="lxqt-qtplugin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1292</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1292" source="CVE"/>
    <description>
    The NavigatorServiceWorker::serviceWorker function in modules/serviceworkers/NavigatorServiceWorker.cpp in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy by accessing a Service Worker.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1292.html">CVE-2015-1292</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1292">SUSE bug 944144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1292">SUSE bug 959178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1292">SUSE bug 959178</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120451" comment="calibre-2.46.0-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152225" comment="calibre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120452" comment="fcitx-qt5-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152226" comment="fcitx-qt5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120453" comment="fcitx-qt5-32bit-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152227" comment="fcitx-qt5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120454" comment="fcitx-qt5-devel-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152228" comment="fcitx-qt5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120455" comment="frameworkintegration-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152229" comment="frameworkintegration is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120456" comment="frameworkintegration-devel-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152230" comment="frameworkintegration-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120457" comment="frameworkintegration-devel-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152231" comment="frameworkintegration-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120458" comment="frameworkintegration-plugin-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152232" comment="frameworkintegration-plugin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120459" comment="frameworkintegration-plugin-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152233" comment="frameworkintegration-plugin-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120460" comment="kwayland-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152234" comment="kwayland is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120461" comment="kwayland-32bit-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152235" comment="kwayland-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120462" comment="kwayland-devel-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152236" comment="kwayland-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120463" comment="kwayland-devel-32bit-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152237" comment="kwayland-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120464" comment="kwin5-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152238" comment="kwin5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120465" comment="kwin5-devel-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152239" comment="kwin5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120466" comment="kwin5-lang-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152240" comment="kwin5-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120467" comment="libKF5Style5-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152241" comment="libKF5Style5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120468" comment="libKF5Style5-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152242" comment="libKF5Style5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120469" comment="libKF5Style5-lang-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152243" comment="libKF5Style5-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120470" comment="libQt53DCollision-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152244" comment="libQt53DCollision-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120471" comment="libQt53DCollision5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152245" comment="libQt53DCollision5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120472" comment="libQt53DCollision5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152246" comment="libQt53DCollision5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120473" comment="libQt53DCore-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152247" comment="libQt53DCore-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120474" comment="libQt53DCore5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152248" comment="libQt53DCore5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120475" comment="libQt53DCore5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152249" comment="libQt53DCore5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120476" comment="libQt53DInput-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152250" comment="libQt53DInput-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120477" comment="libQt53DInput5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152251" comment="libQt53DInput5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120478" comment="libQt53DInput5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152252" comment="libQt53DInput5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120479" comment="libQt53DLogic-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152253" comment="libQt53DLogic-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120480" comment="libQt53DLogic5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152254" comment="libQt53DLogic5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120481" comment="libQt53DLogic5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152255" comment="libQt53DLogic5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120482" comment="libQt53DQuick-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152256" comment="libQt53DQuick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120483" comment="libQt53DQuick5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152257" comment="libQt53DQuick5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120484" comment="libQt53DQuick5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152258" comment="libQt53DQuick5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120485" comment="libQt53DQuickRenderer-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152259" comment="libQt53DQuickRenderer-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120486" comment="libQt53DQuickRenderer5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152260" comment="libQt53DQuickRenderer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120487" comment="libQt53DQuickRenderer5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152261" comment="libQt53DQuickRenderer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120488" comment="libQt53DRenderer-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152262" comment="libQt53DRenderer-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120489" comment="libQt53DRenderer5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152263" comment="libQt53DRenderer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120490" comment="libQt53DRenderer5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152264" comment="libQt53DRenderer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120491" comment="libQt5Bluetooth5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152265" comment="libQt5Bluetooth5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120492" comment="libQt5Bluetooth5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152266" comment="libQt5Bluetooth5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120493" comment="libQt5Bluetooth5-imports-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152267" comment="libQt5Bluetooth5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120494" comment="libQt5Bootstrap-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152268" comment="libQt5Bootstrap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120495" comment="libQt5Bootstrap-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152269" comment="libQt5Bootstrap-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120496" comment="libQt5CLucene5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152270" comment="libQt5CLucene5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120497" comment="libQt5CLucene5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152271" comment="libQt5CLucene5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120498" comment="libQt5Compositor5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152272" comment="libQt5Compositor5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120499" comment="libQt5Compositor5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152273" comment="libQt5Compositor5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120500" comment="libQt5Concurrent-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152274" comment="libQt5Concurrent-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120501" comment="libQt5Concurrent-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152275" comment="libQt5Concurrent-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120502" comment="libQt5Concurrent5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152276" comment="libQt5Concurrent5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120503" comment="libQt5Concurrent5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152277" comment="libQt5Concurrent5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120504" comment="libQt5Core-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152278" comment="libQt5Core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120505" comment="libQt5Core-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152279" comment="libQt5Core-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120506" comment="libQt5Core-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152280" comment="libQt5Core-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120507" comment="libQt5Core5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152281" comment="libQt5Core5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120508" comment="libQt5Core5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152282" comment="libQt5Core5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120509" comment="libQt5DBus-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152283" comment="libQt5DBus-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120510" comment="libQt5DBus-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152284" comment="libQt5DBus-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120511" comment="libQt5DBus-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152285" comment="libQt5DBus-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120512" comment="libQt5DBus5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152286" comment="libQt5DBus5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120513" comment="libQt5DBus5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152287" comment="libQt5DBus5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120514" comment="libQt5Declarative5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152288" comment="libQt5Declarative5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120515" comment="libQt5Declarative5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152289" comment="libQt5Declarative5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120516" comment="libQt5Designer5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152290" comment="libQt5Designer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120517" comment="libQt5Designer5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152291" comment="libQt5Designer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120518" comment="libQt5DesignerComponents5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152292" comment="libQt5DesignerComponents5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120519" comment="libQt5DesignerComponents5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152293" comment="libQt5DesignerComponents5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120520" comment="libQt5Gui-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152294" comment="libQt5Gui-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120521" comment="libQt5Gui-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152295" comment="libQt5Gui-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120522" comment="libQt5Gui-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152296" comment="libQt5Gui-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120523" comment="libQt5Gui5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152297" comment="libQt5Gui5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120524" comment="libQt5Gui5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152298" comment="libQt5Gui5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120525" comment="libQt5Help5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152299" comment="libQt5Help5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120526" comment="libQt5Help5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152300" comment="libQt5Help5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120527" comment="libQt5Location5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152301" comment="libQt5Location5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120528" comment="libQt5Location5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152302" comment="libQt5Location5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120529" comment="libQt5Multimedia5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152303" comment="libQt5Multimedia5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120530" comment="libQt5Multimedia5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152304" comment="libQt5Multimedia5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120531" comment="libQt5Network-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152305" comment="libQt5Network-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120532" comment="libQt5Network-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152306" comment="libQt5Network-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120533" comment="libQt5Network-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152307" comment="libQt5Network-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120534" comment="libQt5Network5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152308" comment="libQt5Network5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120535" comment="libQt5Network5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152309" comment="libQt5Network5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120536" comment="libQt5Nfc5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152310" comment="libQt5Nfc5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120537" comment="libQt5Nfc5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152311" comment="libQt5Nfc5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120538" comment="libQt5Nfc5-imports-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152312" comment="libQt5Nfc5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120539" comment="libQt5OpenGL-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152313" comment="libQt5OpenGL-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120540" comment="libQt5OpenGL-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152314" comment="libQt5OpenGL-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120541" comment="libQt5OpenGL-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152315" comment="libQt5OpenGL-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120542" comment="libQt5OpenGL5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152316" comment="libQt5OpenGL5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120543" comment="libQt5OpenGL5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152317" comment="libQt5OpenGL5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120544" comment="libQt5OpenGLExtensions-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152318" comment="libQt5OpenGLExtensions-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120545" comment="libQt5OpenGLExtensions-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152319" comment="libQt5OpenGLExtensions-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120546" comment="libQt5PlatformHeaders-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152320" comment="libQt5PlatformHeaders-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120547" comment="libQt5PlatformSupport-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152321" comment="libQt5PlatformSupport-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120548" comment="libQt5PlatformSupport-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152322" comment="libQt5PlatformSupport-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120549" comment="libQt5PlatformSupport-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152323" comment="libQt5PlatformSupport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120550" comment="libQt5Positioning5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152324" comment="libQt5Positioning5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120551" comment="libQt5Positioning5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152325" comment="libQt5Positioning5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120552" comment="libQt5PrintSupport-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152326" comment="libQt5PrintSupport-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120553" comment="libQt5PrintSupport-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152327" comment="libQt5PrintSupport-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120554" comment="libQt5PrintSupport-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152328" comment="libQt5PrintSupport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120555" comment="libQt5PrintSupport5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152329" comment="libQt5PrintSupport5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120556" comment="libQt5PrintSupport5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152330" comment="libQt5PrintSupport5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120557" comment="libQt5Script5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152331" comment="libQt5Script5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120558" comment="libQt5Script5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152332" comment="libQt5Script5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120559" comment="libQt5Sensors5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152333" comment="libQt5Sensors5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120560" comment="libQt5Sensors5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152334" comment="libQt5Sensors5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120561" comment="libQt5Sensors5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152335" comment="libQt5Sensors5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120562" comment="libQt5SerialPort5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152336" comment="libQt5SerialPort5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120563" comment="libQt5SerialPort5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152337" comment="libQt5SerialPort5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120564" comment="libQt5Sql-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152338" comment="libQt5Sql-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120565" comment="libQt5Sql-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152339" comment="libQt5Sql-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120566" comment="libQt5Sql-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152340" comment="libQt5Sql-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120567" comment="libQt5Sql5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152341" comment="libQt5Sql5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120568" comment="libQt5Sql5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152342" comment="libQt5Sql5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120569" comment="libQt5Sql5-mysql-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152343" comment="libQt5Sql5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120570" comment="libQt5Sql5-mysql-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152344" comment="libQt5Sql5-mysql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120571" comment="libQt5Sql5-postgresql-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152345" comment="libQt5Sql5-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120572" comment="libQt5Sql5-postgresql-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152346" comment="libQt5Sql5-postgresql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120573" comment="libQt5Sql5-sqlite-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152347" comment="libQt5Sql5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120574" comment="libQt5Sql5-sqlite-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152348" comment="libQt5Sql5-sqlite-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120575" comment="libQt5Sql5-unixODBC-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152349" comment="libQt5Sql5-unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120576" comment="libQt5Sql5-unixODBC-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152350" comment="libQt5Sql5-unixODBC-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120577" comment="libQt5Svg5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152351" comment="libQt5Svg5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120578" comment="libQt5Svg5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152352" comment="libQt5Svg5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120579" comment="libQt5Test-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152353" comment="libQt5Test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120580" comment="libQt5Test-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152354" comment="libQt5Test-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120581" comment="libQt5Test-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152355" comment="libQt5Test-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120582" comment="libQt5Test5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152356" comment="libQt5Test5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120583" comment="libQt5Test5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152357" comment="libQt5Test5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120584" comment="libQt5WaylandClient5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152358" comment="libQt5WaylandClient5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120585" comment="libQt5WaylandClient5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152359" comment="libQt5WaylandClient5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120586" comment="libQt5WebChannel5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152360" comment="libQt5WebChannel5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120587" comment="libQt5WebChannel5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152361" comment="libQt5WebChannel5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120588" comment="libQt5WebChannel5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152362" comment="libQt5WebChannel5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120589" comment="libQt5WebKit-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152363" comment="libQt5WebKit-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120590" comment="libQt5WebKit5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152364" comment="libQt5WebKit5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120591" comment="libQt5WebKit5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152365" comment="libQt5WebKit5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120592" comment="libQt5WebKit5-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152366" comment="libQt5WebKit5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120593" comment="libQt5WebKit5-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152367" comment="libQt5WebKit5-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120594" comment="libQt5WebKit5-imports-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152368" comment="libQt5WebKit5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120595" comment="libQt5WebKitWidgets-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152369" comment="libQt5WebKitWidgets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120596" comment="libQt5WebKitWidgets-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152370" comment="libQt5WebKitWidgets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120597" comment="libQt5WebKitWidgets-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152371" comment="libQt5WebKitWidgets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120598" comment="libQt5WebKitWidgets5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152372" comment="libQt5WebKitWidgets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120599" comment="libQt5WebKitWidgets5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152373" comment="libQt5WebKitWidgets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120600" comment="libQt5WebSockets5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152374" comment="libQt5WebSockets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120601" comment="libQt5WebSockets5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152375" comment="libQt5WebSockets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120602" comment="libQt5WebSockets5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152376" comment="libQt5WebSockets5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120603" comment="libQt5Widgets-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152377" comment="libQt5Widgets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120604" comment="libQt5Widgets-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152378" comment="libQt5Widgets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120605" comment="libQt5Widgets-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152379" comment="libQt5Widgets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120606" comment="libQt5Widgets5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152380" comment="libQt5Widgets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120607" comment="libQt5Widgets5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152381" comment="libQt5Widgets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120608" comment="libQt5X11Extras5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152382" comment="libQt5X11Extras5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120609" comment="libQt5X11Extras5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152383" comment="libQt5X11Extras5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120610" comment="libQt5Xml-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152384" comment="libQt5Xml-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120611" comment="libQt5Xml-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152385" comment="libQt5Xml-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120612" comment="libQt5Xml5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152386" comment="libQt5Xml5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120613" comment="libQt5Xml5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152387" comment="libQt5Xml5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120614" comment="libQt5XmlPatterns5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152388" comment="libQt5XmlPatterns5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120615" comment="libQt5XmlPatterns5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152389" comment="libQt5XmlPatterns5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120616" comment="libQtQuick5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152390" comment="libQtQuick5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120617" comment="libQtQuick5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152391" comment="libQtQuick5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120618" comment="libqt5-creator-3.5.1-6.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152392" comment="libqt5-creator is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120619" comment="libqt5-linguist-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152393" comment="libqt5-linguist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120620" comment="libqt5-linguist-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152394" comment="libqt5-linguist-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120621" comment="libqt5-qt3d-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152395" comment="libqt5-qt3d is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120622" comment="libqt5-qt3d-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152396" comment="libqt5-qt3d-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120623" comment="libqt5-qt3d-examples-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152397" comment="libqt5-qt3d-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120624" comment="libqt5-qt3d-imports-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152398" comment="libqt5-qt3d-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120625" comment="libqt5-qt3d-private-headers-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152399" comment="libqt5-qt3d-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120626" comment="libqt5-qtbase-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152400" comment="libqt5-qtbase is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120627" comment="libqt5-qtbase-common-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152401" comment="libqt5-qtbase-common-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120628" comment="libqt5-qtbase-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152402" comment="libqt5-qtbase-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120629" comment="libqt5-qtbase-doc-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152403" comment="libqt5-qtbase-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120630" comment="libqt5-qtbase-examples-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152404" comment="libqt5-qtbase-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120631" comment="libqt5-qtbase-examples-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152405" comment="libqt5-qtbase-examples-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120632" comment="libqt5-qtbase-platformtheme-gtk2-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152406" comment="libqt5-qtbase-platformtheme-gtk2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120633" comment="libqt5-qtbase-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152407" comment="libqt5-qtbase-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120634" comment="libqt5-qtconnectivity-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152408" comment="libqt5-qtconnectivity is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120635" comment="libqt5-qtconnectivity-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152409" comment="libqt5-qtconnectivity-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120636" comment="libqt5-qtconnectivity-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152410" comment="libqt5-qtconnectivity-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120637" comment="libqt5-qtconnectivity-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152411" comment="libqt5-qtconnectivity-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120638" comment="libqt5-qtconnectivity-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152412" comment="libqt5-qtconnectivity-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120639" comment="libqt5-qtconnectivity-tools-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152413" comment="libqt5-qtconnectivity-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120640" comment="libqt5-qtct-0.20-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152414" comment="libqt5-qtct is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120641" comment="libqt5-qtdeclarative-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152415" comment="libqt5-qtdeclarative is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120642" comment="libqt5-qtdeclarative-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152416" comment="libqt5-qtdeclarative-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120643" comment="libqt5-qtdeclarative-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152417" comment="libqt5-qtdeclarative-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120644" comment="libqt5-qtdeclarative-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152418" comment="libqt5-qtdeclarative-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120645" comment="libqt5-qtdeclarative-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152419" comment="libqt5-qtdeclarative-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120646" comment="libqt5-qtdeclarative-tools-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152420" comment="libqt5-qtdeclarative-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120647" comment="libqt5-qtdoc-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152421" comment="libqt5-qtdoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120648" comment="libqt5-qtgraphicaleffects-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152422" comment="libqt5-qtgraphicaleffects is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120649" comment="libqt5-qtimageformats-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152423" comment="libqt5-qtimageformats is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120650" comment="libqt5-qtimageformats-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152424" comment="libqt5-qtimageformats-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120651" comment="libqt5-qtimageformats-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152425" comment="libqt5-qtimageformats-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120652" comment="libqt5-qtlocation-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152426" comment="libqt5-qtlocation is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120653" comment="libqt5-qtlocation-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152427" comment="libqt5-qtlocation-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120654" comment="libqt5-qtlocation-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152428" comment="libqt5-qtlocation-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120655" comment="libqt5-qtlocation-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152429" comment="libqt5-qtlocation-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120656" comment="libqt5-qtlocation-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152430" comment="libqt5-qtlocation-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120657" comment="libqt5-qtmultimedia-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152431" comment="libqt5-qtmultimedia is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120658" comment="libqt5-qtmultimedia-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152432" comment="libqt5-qtmultimedia-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120659" comment="libqt5-qtmultimedia-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152433" comment="libqt5-qtmultimedia-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120660" comment="libqt5-qtmultimedia-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152434" comment="libqt5-qtmultimedia-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120661" comment="libqt5-qtmultimedia-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152435" comment="libqt5-qtmultimedia-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120662" comment="libqt5-qtquick1-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152436" comment="libqt5-qtquick1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120663" comment="libqt5-qtquick1-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152437" comment="libqt5-qtquick1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120664" comment="libqt5-qtquick1-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152438" comment="libqt5-qtquick1-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120665" comment="libqt5-qtquick1-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152439" comment="libqt5-qtquick1-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120666" comment="libqt5-qtquick1-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152440" comment="libqt5-qtquick1-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120667" comment="libqt5-qtquickcontrols-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152441" comment="libqt5-qtquickcontrols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120668" comment="libqt5-qtquickcontrols-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152442" comment="libqt5-qtquickcontrols-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120669" comment="libqt5-qtscript-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152443" comment="libqt5-qtscript is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120670" comment="libqt5-qtscript-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152444" comment="libqt5-qtscript-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120671" comment="libqt5-qtscript-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152445" comment="libqt5-qtscript-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120672" comment="libqt5-qtscript-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152446" comment="libqt5-qtscript-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120673" comment="libqt5-qtscript-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152447" comment="libqt5-qtscript-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120674" comment="libqt5-qtsensors-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152448" comment="libqt5-qtsensors is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120675" comment="libqt5-qtsensors-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152449" comment="libqt5-qtsensors-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120676" comment="libqt5-qtsensors-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152450" comment="libqt5-qtsensors-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120677" comment="libqt5-qtsensors-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152451" comment="libqt5-qtsensors-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120678" comment="libqt5-qtsensors-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152452" comment="libqt5-qtsensors-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120679" comment="libqt5-qtserialport-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152453" comment="libqt5-qtserialport is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120680" comment="libqt5-qtserialport-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152454" comment="libqt5-qtserialport-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120681" comment="libqt5-qtserialport-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152455" comment="libqt5-qtserialport-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120682" comment="libqt5-qtserialport-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152456" comment="libqt5-qtserialport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120683" comment="libqt5-qtsvg-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152457" comment="libqt5-qtsvg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120684" comment="libqt5-qtsvg-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152458" comment="libqt5-qtsvg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120685" comment="libqt5-qtsvg-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152459" comment="libqt5-qtsvg-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120686" comment="libqt5-qtsvg-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152460" comment="libqt5-qtsvg-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120687" comment="libqt5-qtsvg-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152461" comment="libqt5-qtsvg-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120688" comment="libqt5-qttools-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152462" comment="libqt5-qttools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120689" comment="libqt5-qttools-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152463" comment="libqt5-qttools-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120690" comment="libqt5-qttools-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152464" comment="libqt5-qttools-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120691" comment="libqt5-qttools-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152465" comment="libqt5-qttools-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120692" comment="libqt5-qttools-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152466" comment="libqt5-qttools-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120693" comment="libqt5-qttools-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152467" comment="libqt5-qttools-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120694" comment="libqt5-qttranslations-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152468" comment="libqt5-qttranslations is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120695" comment="libqt5-qtwayland-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152469" comment="libqt5-qtwayland is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120696" comment="libqt5-qtwayland-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152470" comment="libqt5-qtwayland-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120697" comment="libqt5-qtwayland-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152471" comment="libqt5-qtwayland-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120698" comment="libqt5-qtwayland-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152472" comment="libqt5-qtwayland-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120699" comment="libqt5-qtwayland-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152473" comment="libqt5-qtwayland-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120700" comment="libqt5-qtwayland-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152474" comment="libqt5-qtwayland-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120701" comment="libqt5-qtwebchannel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152475" comment="libqt5-qtwebchannel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120702" comment="libqt5-qtwebchannel-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152476" comment="libqt5-qtwebchannel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120703" comment="libqt5-qtwebchannel-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152477" comment="libqt5-qtwebchannel-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120704" comment="libqt5-qtwebchannel-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152478" comment="libqt5-qtwebchannel-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120705" comment="libqt5-qtwebchannel-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152479" comment="libqt5-qtwebchannel-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120706" comment="libqt5-qtwebengine-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120707" comment="libqt5-qtwebengine-32bit-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152481" comment="libqt5-qtwebengine-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120708" comment="libqt5-qtwebengine-devel-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120709" comment="libqt5-qtwebengine-devel-32bit-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152483" comment="libqt5-qtwebengine-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120710" comment="libqt5-qtwebengine-examples-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120711" comment="libqt5-qtwebengine-private-headers-devel-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120712" comment="libqt5-qtwebkit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152486" comment="libqt5-qtwebkit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120713" comment="libqt5-qtwebkit-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152487" comment="libqt5-qtwebkit-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120714" comment="libqt5-qtwebsockets-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152488" comment="libqt5-qtwebsockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120715" comment="libqt5-qtwebsockets-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152489" comment="libqt5-qtwebsockets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120716" comment="libqt5-qtwebsockets-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152490" comment="libqt5-qtwebsockets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120717" comment="libqt5-qtwebsockets-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152491" comment="libqt5-qtwebsockets-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120718" comment="libqt5-qtwebsockets-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152492" comment="libqt5-qtwebsockets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120719" comment="libqt5-qtx11extras-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152493" comment="libqt5-qtx11extras is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120720" comment="libqt5-qtx11extras-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152494" comment="libqt5-qtx11extras-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120721" comment="libqt5-qtx11extras-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152495" comment="libqt5-qtx11extras-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120722" comment="libqt5-qtxmlpatterns-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152496" comment="libqt5-qtxmlpatterns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120723" comment="libqt5-qtxmlpatterns-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152497" comment="libqt5-qtxmlpatterns-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120724" comment="libqt5-qtxmlpatterns-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152498" comment="libqt5-qtxmlpatterns-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120725" comment="libqt5-qtxmlpatterns-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152499" comment="libqt5-qtxmlpatterns-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120726" comment="libqt5-qtxmlpatterns-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152500" comment="libqt5-qtxmlpatterns-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120727" comment="lxqt-powermanagement-0.9.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152501" comment="lxqt-powermanagement is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120728" comment="lxqt-powermanagement-lang-0.9.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152502" comment="lxqt-powermanagement-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120729" comment="lxqt-qtplugin-0.9.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152503" comment="lxqt-qtplugin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1294</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1294" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1294" source="CVE"/>
    <description>
    Use-after-free vulnerability in the SkMatrix::invertNonIdentity function in core/SkMatrix.cpp in Skia, as used in Google Chrome before 45.0.2454.85, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering the use of matrix elements that lead to an infinite result during an inversion calculation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1294.html">CVE-2015-1294</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1294">SUSE bug 944144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1294">SUSE bug 959178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1294">SUSE bug 959178</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120451" comment="calibre-2.46.0-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152225" comment="calibre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120452" comment="fcitx-qt5-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152226" comment="fcitx-qt5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120453" comment="fcitx-qt5-32bit-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152227" comment="fcitx-qt5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120454" comment="fcitx-qt5-devel-1.0.4-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152228" comment="fcitx-qt5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120455" comment="frameworkintegration-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152229" comment="frameworkintegration is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120456" comment="frameworkintegration-devel-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152230" comment="frameworkintegration-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120457" comment="frameworkintegration-devel-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152231" comment="frameworkintegration-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120458" comment="frameworkintegration-plugin-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152232" comment="frameworkintegration-plugin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120459" comment="frameworkintegration-plugin-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152233" comment="frameworkintegration-plugin-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120460" comment="kwayland-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152234" comment="kwayland is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120461" comment="kwayland-32bit-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152235" comment="kwayland-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120462" comment="kwayland-devel-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152236" comment="kwayland-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120463" comment="kwayland-devel-32bit-5.4.3-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152237" comment="kwayland-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120464" comment="kwin5-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152238" comment="kwin5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120465" comment="kwin5-devel-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152239" comment="kwin5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120466" comment="kwin5-lang-5.4.3-6.10 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152240" comment="kwin5-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120467" comment="libKF5Style5-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152241" comment="libKF5Style5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120468" comment="libKF5Style5-32bit-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152242" comment="libKF5Style5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120469" comment="libKF5Style5-lang-5.16.0-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152243" comment="libKF5Style5-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120470" comment="libQt53DCollision-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152244" comment="libQt53DCollision-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120471" comment="libQt53DCollision5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152245" comment="libQt53DCollision5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120472" comment="libQt53DCollision5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152246" comment="libQt53DCollision5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120473" comment="libQt53DCore-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152247" comment="libQt53DCore-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120474" comment="libQt53DCore5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152248" comment="libQt53DCore5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120475" comment="libQt53DCore5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152249" comment="libQt53DCore5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120476" comment="libQt53DInput-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152250" comment="libQt53DInput-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120477" comment="libQt53DInput5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152251" comment="libQt53DInput5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120478" comment="libQt53DInput5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152252" comment="libQt53DInput5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120479" comment="libQt53DLogic-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152253" comment="libQt53DLogic-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120480" comment="libQt53DLogic5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152254" comment="libQt53DLogic5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120481" comment="libQt53DLogic5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152255" comment="libQt53DLogic5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120482" comment="libQt53DQuick-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152256" comment="libQt53DQuick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120483" comment="libQt53DQuick5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152257" comment="libQt53DQuick5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120484" comment="libQt53DQuick5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152258" comment="libQt53DQuick5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120485" comment="libQt53DQuickRenderer-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152259" comment="libQt53DQuickRenderer-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120486" comment="libQt53DQuickRenderer5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152260" comment="libQt53DQuickRenderer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120487" comment="libQt53DQuickRenderer5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152261" comment="libQt53DQuickRenderer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120488" comment="libQt53DRenderer-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152262" comment="libQt53DRenderer-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120489" comment="libQt53DRenderer5-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152263" comment="libQt53DRenderer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120490" comment="libQt53DRenderer5-32bit-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152264" comment="libQt53DRenderer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120491" comment="libQt5Bluetooth5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152265" comment="libQt5Bluetooth5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120492" comment="libQt5Bluetooth5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152266" comment="libQt5Bluetooth5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120493" comment="libQt5Bluetooth5-imports-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152267" comment="libQt5Bluetooth5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120494" comment="libQt5Bootstrap-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152268" comment="libQt5Bootstrap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120495" comment="libQt5Bootstrap-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152269" comment="libQt5Bootstrap-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120496" comment="libQt5CLucene5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152270" comment="libQt5CLucene5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120497" comment="libQt5CLucene5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152271" comment="libQt5CLucene5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120498" comment="libQt5Compositor5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152272" comment="libQt5Compositor5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120499" comment="libQt5Compositor5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152273" comment="libQt5Compositor5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120500" comment="libQt5Concurrent-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152274" comment="libQt5Concurrent-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120501" comment="libQt5Concurrent-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152275" comment="libQt5Concurrent-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120502" comment="libQt5Concurrent5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152276" comment="libQt5Concurrent5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120503" comment="libQt5Concurrent5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152277" comment="libQt5Concurrent5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120504" comment="libQt5Core-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152278" comment="libQt5Core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120505" comment="libQt5Core-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152279" comment="libQt5Core-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120506" comment="libQt5Core-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152280" comment="libQt5Core-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120507" comment="libQt5Core5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152281" comment="libQt5Core5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120508" comment="libQt5Core5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152282" comment="libQt5Core5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120509" comment="libQt5DBus-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152283" comment="libQt5DBus-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120510" comment="libQt5DBus-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152284" comment="libQt5DBus-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120511" comment="libQt5DBus-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152285" comment="libQt5DBus-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120512" comment="libQt5DBus5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152286" comment="libQt5DBus5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120513" comment="libQt5DBus5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152287" comment="libQt5DBus5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120514" comment="libQt5Declarative5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152288" comment="libQt5Declarative5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120515" comment="libQt5Declarative5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152289" comment="libQt5Declarative5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120516" comment="libQt5Designer5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152290" comment="libQt5Designer5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120517" comment="libQt5Designer5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152291" comment="libQt5Designer5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120518" comment="libQt5DesignerComponents5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152292" comment="libQt5DesignerComponents5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120519" comment="libQt5DesignerComponents5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152293" comment="libQt5DesignerComponents5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120520" comment="libQt5Gui-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152294" comment="libQt5Gui-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120521" comment="libQt5Gui-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152295" comment="libQt5Gui-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120522" comment="libQt5Gui-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152296" comment="libQt5Gui-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120523" comment="libQt5Gui5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152297" comment="libQt5Gui5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120524" comment="libQt5Gui5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152298" comment="libQt5Gui5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120525" comment="libQt5Help5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152299" comment="libQt5Help5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120526" comment="libQt5Help5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152300" comment="libQt5Help5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120527" comment="libQt5Location5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152301" comment="libQt5Location5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120528" comment="libQt5Location5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152302" comment="libQt5Location5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120529" comment="libQt5Multimedia5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152303" comment="libQt5Multimedia5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120530" comment="libQt5Multimedia5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152304" comment="libQt5Multimedia5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120531" comment="libQt5Network-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152305" comment="libQt5Network-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120532" comment="libQt5Network-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152306" comment="libQt5Network-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120533" comment="libQt5Network-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152307" comment="libQt5Network-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120534" comment="libQt5Network5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152308" comment="libQt5Network5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120535" comment="libQt5Network5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152309" comment="libQt5Network5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120536" comment="libQt5Nfc5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152310" comment="libQt5Nfc5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120537" comment="libQt5Nfc5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152311" comment="libQt5Nfc5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120538" comment="libQt5Nfc5-imports-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152312" comment="libQt5Nfc5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120539" comment="libQt5OpenGL-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152313" comment="libQt5OpenGL-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120540" comment="libQt5OpenGL-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152314" comment="libQt5OpenGL-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120541" comment="libQt5OpenGL-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152315" comment="libQt5OpenGL-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120542" comment="libQt5OpenGL5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152316" comment="libQt5OpenGL5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120543" comment="libQt5OpenGL5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152317" comment="libQt5OpenGL5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120544" comment="libQt5OpenGLExtensions-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152318" comment="libQt5OpenGLExtensions-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120545" comment="libQt5OpenGLExtensions-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152319" comment="libQt5OpenGLExtensions-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120546" comment="libQt5PlatformHeaders-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152320" comment="libQt5PlatformHeaders-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120547" comment="libQt5PlatformSupport-devel-static-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152321" comment="libQt5PlatformSupport-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120548" comment="libQt5PlatformSupport-devel-static-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152322" comment="libQt5PlatformSupport-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120549" comment="libQt5PlatformSupport-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152323" comment="libQt5PlatformSupport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120550" comment="libQt5Positioning5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152324" comment="libQt5Positioning5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120551" comment="libQt5Positioning5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152325" comment="libQt5Positioning5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120552" comment="libQt5PrintSupport-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152326" comment="libQt5PrintSupport-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120553" comment="libQt5PrintSupport-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152327" comment="libQt5PrintSupport-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120554" comment="libQt5PrintSupport-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152328" comment="libQt5PrintSupport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120555" comment="libQt5PrintSupport5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152329" comment="libQt5PrintSupport5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120556" comment="libQt5PrintSupport5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152330" comment="libQt5PrintSupport5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120557" comment="libQt5Script5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152331" comment="libQt5Script5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120558" comment="libQt5Script5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152332" comment="libQt5Script5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120559" comment="libQt5Sensors5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152333" comment="libQt5Sensors5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120560" comment="libQt5Sensors5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152334" comment="libQt5Sensors5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120561" comment="libQt5Sensors5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152335" comment="libQt5Sensors5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120562" comment="libQt5SerialPort5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152336" comment="libQt5SerialPort5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120563" comment="libQt5SerialPort5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152337" comment="libQt5SerialPort5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120564" comment="libQt5Sql-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152338" comment="libQt5Sql-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120565" comment="libQt5Sql-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152339" comment="libQt5Sql-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120566" comment="libQt5Sql-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152340" comment="libQt5Sql-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120567" comment="libQt5Sql5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152341" comment="libQt5Sql5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120568" comment="libQt5Sql5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152342" comment="libQt5Sql5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120569" comment="libQt5Sql5-mysql-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152343" comment="libQt5Sql5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120570" comment="libQt5Sql5-mysql-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152344" comment="libQt5Sql5-mysql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120571" comment="libQt5Sql5-postgresql-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152345" comment="libQt5Sql5-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120572" comment="libQt5Sql5-postgresql-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152346" comment="libQt5Sql5-postgresql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120573" comment="libQt5Sql5-sqlite-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152347" comment="libQt5Sql5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120574" comment="libQt5Sql5-sqlite-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152348" comment="libQt5Sql5-sqlite-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120575" comment="libQt5Sql5-unixODBC-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152349" comment="libQt5Sql5-unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120576" comment="libQt5Sql5-unixODBC-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152350" comment="libQt5Sql5-unixODBC-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120577" comment="libQt5Svg5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152351" comment="libQt5Svg5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120578" comment="libQt5Svg5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152352" comment="libQt5Svg5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120579" comment="libQt5Test-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152353" comment="libQt5Test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120580" comment="libQt5Test-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152354" comment="libQt5Test-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120581" comment="libQt5Test-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152355" comment="libQt5Test-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120582" comment="libQt5Test5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152356" comment="libQt5Test5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120583" comment="libQt5Test5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152357" comment="libQt5Test5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120584" comment="libQt5WaylandClient5-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152358" comment="libQt5WaylandClient5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120585" comment="libQt5WaylandClient5-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152359" comment="libQt5WaylandClient5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120586" comment="libQt5WebChannel5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152360" comment="libQt5WebChannel5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120587" comment="libQt5WebChannel5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152361" comment="libQt5WebChannel5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120588" comment="libQt5WebChannel5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152362" comment="libQt5WebChannel5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120589" comment="libQt5WebKit-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152363" comment="libQt5WebKit-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120590" comment="libQt5WebKit5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152364" comment="libQt5WebKit5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120591" comment="libQt5WebKit5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152365" comment="libQt5WebKit5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120592" comment="libQt5WebKit5-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152366" comment="libQt5WebKit5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120593" comment="libQt5WebKit5-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152367" comment="libQt5WebKit5-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120594" comment="libQt5WebKit5-imports-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152368" comment="libQt5WebKit5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120595" comment="libQt5WebKitWidgets-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152369" comment="libQt5WebKitWidgets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120596" comment="libQt5WebKitWidgets-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152370" comment="libQt5WebKitWidgets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120597" comment="libQt5WebKitWidgets-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152371" comment="libQt5WebKitWidgets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120598" comment="libQt5WebKitWidgets5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152372" comment="libQt5WebKitWidgets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120599" comment="libQt5WebKitWidgets5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152373" comment="libQt5WebKitWidgets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120600" comment="libQt5WebSockets5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152374" comment="libQt5WebSockets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120601" comment="libQt5WebSockets5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152375" comment="libQt5WebSockets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120602" comment="libQt5WebSockets5-imports-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152376" comment="libQt5WebSockets5-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120603" comment="libQt5Widgets-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152377" comment="libQt5Widgets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120604" comment="libQt5Widgets-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152378" comment="libQt5Widgets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120605" comment="libQt5Widgets-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152379" comment="libQt5Widgets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120606" comment="libQt5Widgets5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152380" comment="libQt5Widgets5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120607" comment="libQt5Widgets5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152381" comment="libQt5Widgets5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120608" comment="libQt5X11Extras5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152382" comment="libQt5X11Extras5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120609" comment="libQt5X11Extras5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152383" comment="libQt5X11Extras5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120610" comment="libQt5Xml-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152384" comment="libQt5Xml-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120611" comment="libQt5Xml-devel-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152385" comment="libQt5Xml-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120612" comment="libQt5Xml5-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152386" comment="libQt5Xml5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120613" comment="libQt5Xml5-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152387" comment="libQt5Xml5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120614" comment="libQt5XmlPatterns5-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152388" comment="libQt5XmlPatterns5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120615" comment="libQt5XmlPatterns5-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152389" comment="libQt5XmlPatterns5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120616" comment="libQtQuick5-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152390" comment="libQtQuick5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120617" comment="libQtQuick5-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152391" comment="libQtQuick5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120618" comment="libqt5-creator-3.5.1-6.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152392" comment="libqt5-creator is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120619" comment="libqt5-linguist-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152393" comment="libqt5-linguist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120620" comment="libqt5-linguist-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152394" comment="libqt5-linguist-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120621" comment="libqt5-qt3d-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152395" comment="libqt5-qt3d is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120622" comment="libqt5-qt3d-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152396" comment="libqt5-qt3d-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120623" comment="libqt5-qt3d-examples-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152397" comment="libqt5-qt3d-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120624" comment="libqt5-qt3d-imports-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152398" comment="libqt5-qt3d-imports is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120625" comment="libqt5-qt3d-private-headers-devel-5.5.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152399" comment="libqt5-qt3d-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120626" comment="libqt5-qtbase-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152400" comment="libqt5-qtbase is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120627" comment="libqt5-qtbase-common-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152401" comment="libqt5-qtbase-common-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120628" comment="libqt5-qtbase-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152402" comment="libqt5-qtbase-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120629" comment="libqt5-qtbase-doc-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152403" comment="libqt5-qtbase-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120630" comment="libqt5-qtbase-examples-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152404" comment="libqt5-qtbase-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120631" comment="libqt5-qtbase-examples-32bit-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152405" comment="libqt5-qtbase-examples-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120632" comment="libqt5-qtbase-platformtheme-gtk2-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152406" comment="libqt5-qtbase-platformtheme-gtk2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120633" comment="libqt5-qtbase-private-headers-devel-5.5.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152407" comment="libqt5-qtbase-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120634" comment="libqt5-qtconnectivity-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152408" comment="libqt5-qtconnectivity is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120635" comment="libqt5-qtconnectivity-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152409" comment="libqt5-qtconnectivity-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120636" comment="libqt5-qtconnectivity-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152410" comment="libqt5-qtconnectivity-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120637" comment="libqt5-qtconnectivity-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152411" comment="libqt5-qtconnectivity-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120638" comment="libqt5-qtconnectivity-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152412" comment="libqt5-qtconnectivity-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120639" comment="libqt5-qtconnectivity-tools-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152413" comment="libqt5-qtconnectivity-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120640" comment="libqt5-qtct-0.20-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152414" comment="libqt5-qtct is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120641" comment="libqt5-qtdeclarative-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152415" comment="libqt5-qtdeclarative is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120642" comment="libqt5-qtdeclarative-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152416" comment="libqt5-qtdeclarative-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120643" comment="libqt5-qtdeclarative-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152417" comment="libqt5-qtdeclarative-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120644" comment="libqt5-qtdeclarative-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152418" comment="libqt5-qtdeclarative-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120645" comment="libqt5-qtdeclarative-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152419" comment="libqt5-qtdeclarative-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120646" comment="libqt5-qtdeclarative-tools-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152420" comment="libqt5-qtdeclarative-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120647" comment="libqt5-qtdoc-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152421" comment="libqt5-qtdoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120648" comment="libqt5-qtgraphicaleffects-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152422" comment="libqt5-qtgraphicaleffects is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120649" comment="libqt5-qtimageformats-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152423" comment="libqt5-qtimageformats is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120650" comment="libqt5-qtimageformats-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152424" comment="libqt5-qtimageformats-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120651" comment="libqt5-qtimageformats-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152425" comment="libqt5-qtimageformats-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120652" comment="libqt5-qtlocation-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152426" comment="libqt5-qtlocation is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120653" comment="libqt5-qtlocation-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152427" comment="libqt5-qtlocation-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120654" comment="libqt5-qtlocation-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152428" comment="libqt5-qtlocation-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120655" comment="libqt5-qtlocation-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152429" comment="libqt5-qtlocation-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120656" comment="libqt5-qtlocation-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152430" comment="libqt5-qtlocation-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120657" comment="libqt5-qtmultimedia-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152431" comment="libqt5-qtmultimedia is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120658" comment="libqt5-qtmultimedia-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152432" comment="libqt5-qtmultimedia-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120659" comment="libqt5-qtmultimedia-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152433" comment="libqt5-qtmultimedia-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120660" comment="libqt5-qtmultimedia-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152434" comment="libqt5-qtmultimedia-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120661" comment="libqt5-qtmultimedia-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152435" comment="libqt5-qtmultimedia-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120662" comment="libqt5-qtquick1-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152436" comment="libqt5-qtquick1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120663" comment="libqt5-qtquick1-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152437" comment="libqt5-qtquick1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120664" comment="libqt5-qtquick1-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152438" comment="libqt5-qtquick1-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120665" comment="libqt5-qtquick1-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152439" comment="libqt5-qtquick1-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120666" comment="libqt5-qtquick1-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152440" comment="libqt5-qtquick1-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120667" comment="libqt5-qtquickcontrols-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152441" comment="libqt5-qtquickcontrols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120668" comment="libqt5-qtquickcontrols-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152442" comment="libqt5-qtquickcontrols-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120669" comment="libqt5-qtscript-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152443" comment="libqt5-qtscript is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120670" comment="libqt5-qtscript-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152444" comment="libqt5-qtscript-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120671" comment="libqt5-qtscript-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152445" comment="libqt5-qtscript-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120672" comment="libqt5-qtscript-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152446" comment="libqt5-qtscript-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120673" comment="libqt5-qtscript-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152447" comment="libqt5-qtscript-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120674" comment="libqt5-qtsensors-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152448" comment="libqt5-qtsensors is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120675" comment="libqt5-qtsensors-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152449" comment="libqt5-qtsensors-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120676" comment="libqt5-qtsensors-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152450" comment="libqt5-qtsensors-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120677" comment="libqt5-qtsensors-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152451" comment="libqt5-qtsensors-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120678" comment="libqt5-qtsensors-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152452" comment="libqt5-qtsensors-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120679" comment="libqt5-qtserialport-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152453" comment="libqt5-qtserialport is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120680" comment="libqt5-qtserialport-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152454" comment="libqt5-qtserialport-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120681" comment="libqt5-qtserialport-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152455" comment="libqt5-qtserialport-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120682" comment="libqt5-qtserialport-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152456" comment="libqt5-qtserialport-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120683" comment="libqt5-qtsvg-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152457" comment="libqt5-qtsvg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120684" comment="libqt5-qtsvg-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152458" comment="libqt5-qtsvg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120685" comment="libqt5-qtsvg-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152459" comment="libqt5-qtsvg-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120686" comment="libqt5-qtsvg-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152460" comment="libqt5-qtsvg-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120687" comment="libqt5-qtsvg-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152461" comment="libqt5-qtsvg-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120688" comment="libqt5-qttools-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152462" comment="libqt5-qttools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120689" comment="libqt5-qttools-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152463" comment="libqt5-qttools-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120690" comment="libqt5-qttools-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152464" comment="libqt5-qttools-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120691" comment="libqt5-qttools-devel-32bit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152465" comment="libqt5-qttools-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120692" comment="libqt5-qttools-examples-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152466" comment="libqt5-qttools-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120693" comment="libqt5-qttools-private-headers-devel-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152467" comment="libqt5-qttools-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120694" comment="libqt5-qttranslations-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152468" comment="libqt5-qttranslations is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120695" comment="libqt5-qtwayland-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152469" comment="libqt5-qtwayland is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120696" comment="libqt5-qtwayland-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152470" comment="libqt5-qtwayland-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120697" comment="libqt5-qtwayland-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152471" comment="libqt5-qtwayland-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120698" comment="libqt5-qtwayland-devel-32bit-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152472" comment="libqt5-qtwayland-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120699" comment="libqt5-qtwayland-examples-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152473" comment="libqt5-qtwayland-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120700" comment="libqt5-qtwayland-private-headers-devel-5.5.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152474" comment="libqt5-qtwayland-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120701" comment="libqt5-qtwebchannel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152475" comment="libqt5-qtwebchannel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120702" comment="libqt5-qtwebchannel-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152476" comment="libqt5-qtwebchannel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120703" comment="libqt5-qtwebchannel-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152477" comment="libqt5-qtwebchannel-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120704" comment="libqt5-qtwebchannel-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152478" comment="libqt5-qtwebchannel-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120705" comment="libqt5-qtwebchannel-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152479" comment="libqt5-qtwebchannel-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120706" comment="libqt5-qtwebengine-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152480" comment="libqt5-qtwebengine is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120707" comment="libqt5-qtwebengine-32bit-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152481" comment="libqt5-qtwebengine-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120708" comment="libqt5-qtwebengine-devel-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152482" comment="libqt5-qtwebengine-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120709" comment="libqt5-qtwebengine-devel-32bit-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152483" comment="libqt5-qtwebengine-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120710" comment="libqt5-qtwebengine-examples-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152484" comment="libqt5-qtwebengine-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120711" comment="libqt5-qtwebengine-private-headers-devel-5.5.1-4.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152485" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120712" comment="libqt5-qtwebkit-5.5.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152486" comment="libqt5-qtwebkit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120713" comment="libqt5-qtwebkit-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152487" comment="libqt5-qtwebkit-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120714" comment="libqt5-qtwebsockets-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152488" comment="libqt5-qtwebsockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120715" comment="libqt5-qtwebsockets-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152489" comment="libqt5-qtwebsockets-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120716" comment="libqt5-qtwebsockets-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152490" comment="libqt5-qtwebsockets-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120717" comment="libqt5-qtwebsockets-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152491" comment="libqt5-qtwebsockets-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120718" comment="libqt5-qtwebsockets-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152492" comment="libqt5-qtwebsockets-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120719" comment="libqt5-qtx11extras-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152493" comment="libqt5-qtx11extras is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120720" comment="libqt5-qtx11extras-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152494" comment="libqt5-qtx11extras-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120721" comment="libqt5-qtx11extras-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152495" comment="libqt5-qtx11extras-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120722" comment="libqt5-qtxmlpatterns-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152496" comment="libqt5-qtxmlpatterns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120723" comment="libqt5-qtxmlpatterns-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152497" comment="libqt5-qtxmlpatterns-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120724" comment="libqt5-qtxmlpatterns-devel-32bit-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152498" comment="libqt5-qtxmlpatterns-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120725" comment="libqt5-qtxmlpatterns-examples-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152499" comment="libqt5-qtxmlpatterns-examples is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120726" comment="libqt5-qtxmlpatterns-private-headers-devel-5.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152500" comment="libqt5-qtxmlpatterns-private-headers-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120727" comment="lxqt-powermanagement-0.9.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152501" comment="lxqt-powermanagement is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120728" comment="lxqt-powermanagement-lang-0.9.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152502" comment="lxqt-powermanagement-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120729" comment="lxqt-qtplugin-0.9.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152503" comment="lxqt-qtplugin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1302</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1302" source="CVE"/>
    <description>
    The PDF viewer in Google Chrome before 46.0.2490.86 does not properly restrict scripting messages and API exposure, which allows remote attackers to bypass the Same Origin Policy via an unintended embedder or unintended plugin loading, related to pdf.js and out_of_process_instance.cc.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1302.html">CVE-2015-1302</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1302">SUSE bug 954579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1302">SUSE bug 954579</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118042" comment="chromedriver-46.0.2490.86-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118043" comment="chromium-46.0.2490.86-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118044" comment="chromium-desktop-gnome-46.0.2490.86-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118045" comment="chromium-desktop-kde-46.0.2490.86-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118046" comment="chromium-ffmpegsumo-46.0.2490.86-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1333</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1333" source="CVE"/>
    <description>
    Memory leak in the __key_link_end function in security/keys/keyring.c in the Linux kernel before 4.1.4 allows local users to cause a denial of service (memory consumption) via many add_key system calls that refer to existing keys.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1333.html">CVE-2015-1333</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1333">SUSE bug 938645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1333">SUSE bug 938645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1333">SUSE bug 938645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1333">SUSE bug 938645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1333">SUSE bug 938645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1333">SUSE bug 938645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1333">SUSE bug 938645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1333">SUSE bug 938645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1333">SUSE bug 938645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1333">SUSE bug 938645</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1339</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1339" source="CVE"/>
    <description>
    Memory leak in the cuse_channel_release function in fs/fuse/cuse.c in the Linux kernel before 4.4 allows local users to cause a denial of service (memory consumption) or possibly have unspecified other impact by opening /dev/cuse many times.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1339.html">CVE-2015-1339</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1339">SUSE bug 969356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1339">SUSE bug 969356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1339">SUSE bug 969356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1339">SUSE bug 969356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1339">SUSE bug 969356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1339">SUSE bug 969356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1339">SUSE bug 969356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1339">SUSE bug 969356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1339">SUSE bug 969356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1339">SUSE bug 969356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1339">SUSE bug 969356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1339">SUSE bug 969356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1339">SUSE bug 969356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1339">SUSE bug 969356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1339">SUSE bug 969356</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126059" comment="kernel-debug-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126060" comment="kernel-debug-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126061" comment="kernel-debug-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126062" comment="kernel-default-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126063" comment="kernel-default-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126064" comment="kernel-default-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126065" comment="kernel-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126066" comment="kernel-docs-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126067" comment="kernel-docs-html-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126068" comment="kernel-docs-pdf-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126069" comment="kernel-ec2-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126070" comment="kernel-ec2-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126071" comment="kernel-ec2-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126072" comment="kernel-macros-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126073" comment="kernel-obs-build-4.1.20-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126074" comment="kernel-obs-qa-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126075" comment="kernel-obs-qa-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126076" comment="kernel-pae-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126077" comment="kernel-pae-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126078" comment="kernel-pae-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126079" comment="kernel-pv-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126080" comment="kernel-pv-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126081" comment="kernel-pv-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126082" comment="kernel-source-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126083" comment="kernel-source-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126084" comment="kernel-syms-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126085" comment="kernel-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126086" comment="kernel-vanilla-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126087" comment="kernel-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126088" comment="kernel-xen-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126089" comment="kernel-xen-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1349</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1349" source="CVE"/>
    <description>
    named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when DNSSEC validation and the managed-keys feature are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit, or daemon crash) by triggering an incorrect trust-anchor management scenario in which no key is ready for use.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1349.html">CVE-2015-1349</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1349">SUSE bug 918330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1349">SUSE bug 918330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1349">SUSE bug 918330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1349">SUSE bug 918330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1349">SUSE bug 918330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1349">SUSE bug 918330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1349">SUSE bug 918330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1349">SUSE bug 918330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1349">SUSE bug 918330</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1380</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1380" source="CVE"/>
    <description>
    jcc.c in Privoxy before 3.0.23 allows remote attackers to cause a denial of service (abort) via a crafted chunk-encoded body.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1380.html">CVE-2015-1380</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1380">SUSE bug 914934</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139037" comment="privoxy-3.0.23-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152636" comment="privoxy is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1381</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1381" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in pcrs.c in Privoxy before 3.0.23 allow remote attackers to cause a denial of service (segmentation fault or memory consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1381.html">CVE-2015-1381</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1381">SUSE bug 914934</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139037" comment="privoxy-3.0.23-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152636" comment="privoxy is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1382</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1382" source="CVE"/>
    <description>
    parsers.c in Privoxy before 3.0.23 allows remote attackers to cause a denial of service (invalid read and crash) via vectors related to an HTTP time header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1382.html">CVE-2015-1382</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1382">SUSE bug 914934</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139037" comment="privoxy-3.0.23-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152636" comment="privoxy is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1395</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1395" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1395" source="CVE"/>
    <description>
    Directory traversal vulnerability in GNU patch versions which support Git-style patching before 2.7.3 allows remote attackers to write to arbitrary files with the permissions of the target user via a .. (dot dot) in a diff file name.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1395.html">CVE-2015-1395</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1395">SUSE bug 915328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1395">SUSE bug 915328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1395">SUSE bug 915328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1395">SUSE bug 915328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1395">SUSE bug 915328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1395">SUSE bug 915328</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139022" comment="patch-2.7.5-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151547" comment="patch is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1396</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1396" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1396" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1396.html">CVE-2015-1396</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1396">SUSE bug 915329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1396">SUSE bug 915329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1396">SUSE bug 915329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1396">SUSE bug 915329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1396">SUSE bug 915329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1396">SUSE bug 915329</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139022" comment="patch-2.7.5-5.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151547" comment="patch is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1419</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1419" source="CVE"/>
    <description>
    Unspecified vulnerability in vsftpd 3.0.2 and earlier allows remote attackers to bypass access restrictions via unknown vectors, related to deny_file parsing.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1419.html">CVE-2015-1419</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 900326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1419">SUSE bug 915522</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139128" comment="vsftpd-3.0.2-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152656" comment="vsftpd is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1461</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1461" source="CVE"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted (1) Yoda's crypter or (2) mew packer file, related to a "heap out of bounds condition."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1461.html">CVE-2015-1461</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1461">SUSE bug 916217</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1461">SUSE bug 916217</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1461">SUSE bug 916217</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1461">SUSE bug 916217</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1461">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1461">SUSE bug 916217</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138164" comment="clamav-0.98.7-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1462</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1462" source="CVE"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted upx packer file, related to a "heap out of bounds condition."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1462.html">CVE-2015-1462</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1462">SUSE bug 916214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1462">SUSE bug 916214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1462">SUSE bug 916214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1462">SUSE bug 916214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1462">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1462">SUSE bug 916214</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138164" comment="clamav-0.98.7-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1463</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1463" source="CVE"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to cause a denial of service (crash) via a crafted petite packer file, related to an "incorrect compiler optimization."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1463.html">CVE-2015-1463</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1463">SUSE bug 916215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1463">SUSE bug 916215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1463">SUSE bug 916215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1463">SUSE bug 916215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1463">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1463">SUSE bug 916215</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138164" comment="clamav-0.98.7-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1472</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" source="CVE"/>
    <description>
    The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1472.html">CVE-2015-1472</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1472">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1472">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1472">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1472">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1472">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1472">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1472">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1472">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1472">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1472">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1472">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1472">SUSE bug 920341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1472">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1472">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1472">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1472">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1472">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1472">SUSE bug 922243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1472">SUSE bug 916222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1472">SUSE bug 916222</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138343" comment="glibc-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138344" comment="glibc-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138345" comment="glibc-devel-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138346" comment="glibc-extra-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138347" comment="glibc-info-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138348" comment="glibc-locale-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138349" comment="glibc-locale-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138350" comment="nscd-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1545</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1545" source="CVE"/>
    <description>
    The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1545.html">CVE-2015-1545</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1545">SUSE bug 916897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1545">SUSE bug 916897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1545">SUSE bug 916897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1545">SUSE bug 916897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1545">SUSE bug 916897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1545">SUSE bug 846389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1545">SUSE bug 905959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1545">SUSE bug 916897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1545">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1545">SUSE bug 916897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1545">SUSE bug 916897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1545">SUSE bug 916897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1545">SUSE bug 916897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1545">SUSE bug 916897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1545">SUSE bug 916897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1545">SUSE bug 916897</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1545">SUSE bug 916897</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139002" comment="openldap2-2.4.41-9.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1546</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1546" source="CVE"/>
    <description>
    Double free vulnerability in the get_vrFilter function in servers/slapd/filter.c in OpenLDAP 2.4.40 allows remote attackers to cause a denial of service (crash) via a crafted search query with a matched values control.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1546.html">CVE-2015-1546</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1546">SUSE bug 916914</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139002" comment="openldap2-2.4.41-9.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1547</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1547" source="CVE"/>
    <description>
    The NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff5.tif.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1547.html">CVE-2015-1547</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1547">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1547">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1547">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1547">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1547">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1547">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1547">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1547">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1547">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1547">SUSE bug 914890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1547">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1547">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1547">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1547">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1547">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1547">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1547">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1547">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1547">SUSE bug 916925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1547">SUSE bug 916925</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138895" comment="libtiff-devel-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138896" comment="libtiff5-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138897" comment="libtiff5-32bit-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138898" comment="tiff-4.0.4-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1572</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572" source="CVE"/>
    <description>
    Heap-based buffer overflow in closefs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code by causing a crafted block group descriptor to be marked as dirty. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0247.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1572.html">CVE-2015-1572</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1572">SUSE bug 918346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1572">SUSE bug 918346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1572">SUSE bug 918346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1572">SUSE bug 915402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1572">SUSE bug 918346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1572">SUSE bug 918346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1572">SUSE bug 918346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1572">SUSE bug 918346</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138244" comment="e2fsprogs-1.42.11-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152602" comment="e2fsprogs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138245" comment="e2fsprogs-devel-1.42.11-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152603" comment="e2fsprogs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138246" comment="libcom_err-devel-1.42.11-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152604" comment="libcom_err-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138247" comment="libcom_err2-1.42.11-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152605" comment="libcom_err2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138248" comment="libcom_err2-32bit-1.42.11-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152606" comment="libcom_err2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138249" comment="libext2fs-devel-1.42.11-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152607" comment="libext2fs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138250" comment="libext2fs2-1.42.11-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152608" comment="libext2fs2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1606</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1606" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1606" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1606.html">CVE-2015-1606</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1606">SUSE bug 918089</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1606">SUSE bug 918089</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1606">SUSE bug 918089</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1606">SUSE bug 918089</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1606">SUSE bug 918089</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1606">SUSE bug 918089</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118972" comment="gpg2-2.0.24-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151446" comment="gpg2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118973" comment="gpg2-lang-2.0.24-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151447" comment="gpg2-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1607</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1607" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1607.html">CVE-2015-1607</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1607">SUSE bug 918090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1607">SUSE bug 918090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1607">SUSE bug 918090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1607">SUSE bug 918090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1607">SUSE bug 918090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1607">SUSE bug 918090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1607">SUSE bug 918090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1607">SUSE bug 918090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1607">SUSE bug 918090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1607">SUSE bug 918090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1607">SUSE bug 918090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1607">SUSE bug 918090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1607">SUSE bug 918090</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118972" comment="gpg2-2.0.24-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151446" comment="gpg2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118973" comment="gpg2-lang-2.0.24-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151447" comment="gpg2-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1779</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779" source="CVE"/>
    <description>
    The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1779.html">CVE-2015-1779</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 924018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 924018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 924018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 924018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 924018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 924018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 924018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 924018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 924018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 924018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 924018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 924018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 962632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 962632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 962632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 924018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 924018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 962632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 924018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 924018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 962632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 924018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 962632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 924018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 962632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 962632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 924018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 962632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1779">SUSE bug 962632</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139073" comment="qemu-linux-user-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1781</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" source="CVE"/>
    <description>
    Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1781.html">CVE-2015-1781</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 939211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1781">SUSE bug 927080</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138343" comment="glibc-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138344" comment="glibc-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138345" comment="glibc-devel-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138346" comment="glibc-extra-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138347" comment="glibc-info-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138348" comment="glibc-locale-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138349" comment="glibc-locale-32bit-2.19-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138350" comment="nscd-2.19-17.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1782</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1782" source="CVE"/>
    <description>
    The kex_agree_methods function in libssh2 before 1.5.0 allows remote servers to cause a denial of service (crash) or have other unspecified impact via crafted length values in an SSH_MSG_KEXINIT packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1782.html">CVE-2015-1782</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1782">SUSE bug 921070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1782">SUSE bug 921070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1782">SUSE bug 921070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1782">SUSE bug 921070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1782">SUSE bug 921070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1782">SUSE bug 921070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1782">SUSE bug 921070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1782">SUSE bug 921070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1782">SUSE bug 921070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1782">SUSE bug 921070</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138875" comment="libssh2-1-1.4.3-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1788</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788" source="CVE"/>
    <description>
    The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1788.html">CVE-2015-1788</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1788">SUSE bug 934487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1788">SUSE bug 934487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1788">SUSE bug 934487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1788">SUSE bug 934487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1788">SUSE bug 934487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1788">SUSE bug 934487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1788">SUSE bug 934487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1788">SUSE bug 936586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1788">SUSE bug 934487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1788">SUSE bug 934487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1788">SUSE bug 934487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1788">SUSE bug 934487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1788">SUSE bug 937891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1788">SUSE bug 934487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1788">SUSE bug 938432</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1788">SUSE bug 934487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1788">SUSE bug 934487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1788">SUSE bug 934487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1788">SUSE bug 934487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1788">SUSE bug 934487</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1789</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789" source="CVE"/>
    <description>
    The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1789.html">CVE-2015-1789</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 934489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 934489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 934489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 934489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 934489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 934489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 934489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 934489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 936586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 934489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 934489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 934489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 937891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 934489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 938432</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 934489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 934489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 934489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 934489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1789">SUSE bug 934489</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1790</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790" source="CVE"/>
    <description>
    The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1790.html">CVE-2015-1790</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1790">SUSE bug 934491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1790">SUSE bug 934491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1790">SUSE bug 934491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1790">SUSE bug 934491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1790">SUSE bug 934491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1790">SUSE bug 934491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1790">SUSE bug 934491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1790">SUSE bug 934491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1790">SUSE bug 934491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1790">SUSE bug 936586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1790">SUSE bug 934491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1790">SUSE bug 934491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1790">SUSE bug 934491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1790">SUSE bug 934491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1790">SUSE bug 938432</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1790">SUSE bug 934491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1790">SUSE bug 934491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1790">SUSE bug 934491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1790">SUSE bug 934491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1790">SUSE bug 934491</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1791</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791" source="CVE"/>
    <description>
    Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1791.html">CVE-2015-1791</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 933911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 933911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 933911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 933911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 933911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 933911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 933911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 933911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 933911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 933911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 933911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 933911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 933911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 933911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 933911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 986238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 989464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 989464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 933911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 989464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1791">SUSE bug 989464</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1792</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792" source="CVE"/>
    <description>
    The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1792.html">CVE-2015-1792</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1792">SUSE bug 934493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1792">SUSE bug 934493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1792">SUSE bug 934493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1792">SUSE bug 934493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1792">SUSE bug 934493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1792">SUSE bug 934493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1792">SUSE bug 934493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1792">SUSE bug 934493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1792">SUSE bug 934493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1792">SUSE bug 934493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1792">SUSE bug 934493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1792">SUSE bug 937891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1792">SUSE bug 934493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1792">SUSE bug 934493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1792">SUSE bug 934493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1792">SUSE bug 934493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1792">SUSE bug 934493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1792">SUSE bug 986238</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1793</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1793" source="CVE"/>
    <description>
    The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1793.html">CVE-2015-1793</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1793">SUSE bug 936746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1793">SUSE bug 936746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1793">SUSE bug 936746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1793">SUSE bug 937637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1793">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1798</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798" source="CVE"/>
    <description>
    The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MAC.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1798.html">CVE-2015-1798</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 928321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 927497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 957163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 927497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 957163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 957163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 957163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1798">SUSE bug 924202</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138997" comment="ntp-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138998" comment="ntp-doc-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1799</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799" source="CVE"/>
    <description>
    The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1799.html">CVE-2015-1799</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 927497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 927497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 927497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 927497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 927497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 927497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 927497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 927497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 928321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 927497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 927497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 927497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 927497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 927497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 927497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 943565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 943565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 943565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 943565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 927497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 943565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 943565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 943565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 943565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 943565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 927497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 957163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 957163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 957163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 957163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 957163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 927497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 957163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 957163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 943565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 957163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1799">SUSE bug 924202</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138997" comment="ntp-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138998" comment="ntp-doc-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1802</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802" source="CVE"/>
    <description>
    The bdfReadProperties function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 allows remote authenticated users to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a (1) negative or (2) large property count in a BDF font file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1802.html">CVE-2015-1802</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1802">SUSE bug 921978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1802">SUSE bug 921978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1802">SUSE bug 921978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1802">SUSE bug 921978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1802">SUSE bug 921978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1802">SUSE bug 921978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1802">SUSE bug 921978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1802">SUSE bug 921978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1802">SUSE bug 921978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1802">SUSE bug 921978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1802">SUSE bug 921978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1802">SUSE bug 921978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1802">SUSE bug 921978</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138510" comment="libXfont-devel-1.5.1-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151631" comment="libXfont-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138511" comment="libXfont1-1.5.1-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151632" comment="libXfont1 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1803</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803" source="CVE"/>
    <description>
    The bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 does not properly handle character bitmaps it cannot read, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) and possibly execute arbitrary code via a crafted BDF font file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1803.html">CVE-2015-1803</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1803">SUSE bug 921978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1803">SUSE bug 921978</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138510" comment="libXfont-devel-1.5.1-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151631" comment="libXfont-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138511" comment="libXfont1-1.5.1-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151632" comment="libXfont1 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1804</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804" source="CVE"/>
    <description>
    The bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 does not properly perform type conversion for metrics values, which allows remote authenticated users to cause a denial of service (out-of-bounds memory access) and possibly execute arbitrary code via a crafted BDF font file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1804.html">CVE-2015-1804</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1804">SUSE bug 921978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1804">SUSE bug 921978</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119757" comment="libXfont-1.5.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152659" comment="libXfont is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138510" comment="libXfont-devel-1.5.1-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151631" comment="libXfont-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119759" comment="libXfont-devel-32bit-1.5.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152660" comment="libXfont-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138511" comment="libXfont1-1.5.1-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151632" comment="libXfont1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119761" comment="libXfont1-32bit-1.5.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152661" comment="libXfont1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1819</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819" source="CVE"/>
    <description>
    The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1819.html">CVE-2015-1819</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1819">SUSE bug 928193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1819">SUSE bug 928193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1819">SUSE bug 928193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1819">SUSE bug 928193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1819">SUSE bug 928193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1819">SUSE bug 928193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1819">SUSE bug 928193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1819">SUSE bug 928193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1819">SUSE bug 928193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1819">SUSE bug 928193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1819">SUSE bug 928193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1819">SUSE bug 928193</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1819">SUSE bug 928193</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103733" comment="libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103734" comment="libxml2-devel-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103735" comment="libxml2-devel-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103736" comment="libxml2-doc-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103738" comment="python-libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1855</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1855" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1855.html">CVE-2015-1855</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1855">SUSE bug 926974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1855">SUSE bug 926974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1855">SUSE bug 926974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1855">SUSE bug 926974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1855">SUSE bug 926974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1855">SUSE bug 926974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1855">SUSE bug 926974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1855">SUSE bug 926974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1855">SUSE bug 926974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1855">SUSE bug 926974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1855">SUSE bug 926974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1855">SUSE bug 926974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1855">SUSE bug 926974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1855">SUSE bug 926974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1855">SUSE bug 926974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1855">SUSE bug 926974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1855">SUSE bug 926974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1855">SUSE bug 926974</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154833" comment="libruby2_1-2_1-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152217" comment="libruby2_1-2_1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154834" comment="ruby2.1-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152218" comment="ruby2.1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154835" comment="ruby2.1-devel-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152219" comment="ruby2.1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154836" comment="ruby2.1-devel-extra-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154837" comment="ruby2.1-devel-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154838" comment="ruby2.1-doc-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154839" comment="ruby2.1-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154840" comment="ruby2.1-doc-ri-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154841" comment="ruby2.1-doc-ri is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154842" comment="ruby2.1-stdlib-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152220" comment="ruby2.1-stdlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1858</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1858" source="CVE"/>
    <description>
    Multiple buffer overflows in gui/image/qbmphandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted BMP image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1858.html">CVE-2015-1858</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1858">SUSE bug 927806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1858">SUSE bug 927807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1858">SUSE bug 927808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1858">SUSE bug 927806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1858">SUSE bug 927806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1858">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1858">SUSE bug 927806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1858">SUSE bug 927807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1858">SUSE bug 927808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1858">SUSE bug 927806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1858">SUSE bug 927806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1858">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1858">SUSE bug 927806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1858">SUSE bug 927806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1858">SUSE bug 927806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138791" comment="libqt4-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151228" comment="libqt4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138792" comment="libqt4-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151229" comment="libqt4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138793" comment="libqt4-devel-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151230" comment="libqt4-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138794" comment="libqt4-linguist-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151231" comment="libqt4-linguist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138795" comment="libqt4-qt3support-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151232" comment="libqt4-qt3support is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138796" comment="libqt4-qt3support-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151233" comment="libqt4-qt3support-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138797" comment="libqt4-sql-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151234" comment="libqt4-sql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138798" comment="libqt4-sql-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151235" comment="libqt4-sql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138799" comment="libqt4-sql-mysql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151236" comment="libqt4-sql-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138800" comment="libqt4-sql-mysql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151237" comment="libqt4-sql-mysql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138801" comment="libqt4-sql-postgresql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151238" comment="libqt4-sql-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138802" comment="libqt4-sql-postgresql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151239" comment="libqt4-sql-postgresql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138803" comment="libqt4-sql-sqlite-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151240" comment="libqt4-sql-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138804" comment="libqt4-sql-sqlite-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151241" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138805" comment="libqt4-sql-unixODBC-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151242" comment="libqt4-sql-unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138806" comment="libqt4-sql-unixODBC-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151243" comment="libqt4-sql-unixODBC-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138807" comment="libqt4-x11-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151244" comment="libqt4-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138808" comment="libqt4-x11-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151245" comment="libqt4-x11-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1859</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1859" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1859" source="CVE"/>
    <description>
    Multiple buffer overflows in plugins/imageformats/ico/qicohandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted ICO image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1859.html">CVE-2015-1859</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1859">SUSE bug 927806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1859">SUSE bug 927807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1859">SUSE bug 927808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1859">SUSE bug 927807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1859">SUSE bug 927807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1859">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1859">SUSE bug 927806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1859">SUSE bug 927807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1859">SUSE bug 927808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1859">SUSE bug 927807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1859">SUSE bug 927807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1859">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1859">SUSE bug 927807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1859">SUSE bug 927807</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138791" comment="libqt4-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151228" comment="libqt4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138792" comment="libqt4-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151229" comment="libqt4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138793" comment="libqt4-devel-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151230" comment="libqt4-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138794" comment="libqt4-linguist-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151231" comment="libqt4-linguist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138795" comment="libqt4-qt3support-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151232" comment="libqt4-qt3support is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138796" comment="libqt4-qt3support-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151233" comment="libqt4-qt3support-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138797" comment="libqt4-sql-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151234" comment="libqt4-sql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138798" comment="libqt4-sql-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151235" comment="libqt4-sql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138799" comment="libqt4-sql-mysql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151236" comment="libqt4-sql-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138800" comment="libqt4-sql-mysql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151237" comment="libqt4-sql-mysql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138801" comment="libqt4-sql-postgresql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151238" comment="libqt4-sql-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138802" comment="libqt4-sql-postgresql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151239" comment="libqt4-sql-postgresql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138803" comment="libqt4-sql-sqlite-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151240" comment="libqt4-sql-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138804" comment="libqt4-sql-sqlite-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151241" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138805" comment="libqt4-sql-unixODBC-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151242" comment="libqt4-sql-unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138806" comment="libqt4-sql-unixODBC-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151243" comment="libqt4-sql-unixODBC-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138807" comment="libqt4-x11-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151244" comment="libqt4-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138808" comment="libqt4-x11-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151245" comment="libqt4-x11-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1860</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1860" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1860" source="CVE"/>
    <description>
    Multiple buffer overflows in gui/image/qgifhandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a crafted GIF image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1860.html">CVE-2015-1860</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1860">SUSE bug 927806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1860">SUSE bug 927807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1860">SUSE bug 927808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1860">SUSE bug 927808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1860">SUSE bug 927808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1860">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1860">SUSE bug 927806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1860">SUSE bug 927807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1860">SUSE bug 927808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1860">SUSE bug 927808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1860">SUSE bug 927808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1860">SUSE bug 921999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1860">SUSE bug 927808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1860">SUSE bug 927808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1860">SUSE bug 927808</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138791" comment="libqt4-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151228" comment="libqt4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138792" comment="libqt4-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151229" comment="libqt4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138793" comment="libqt4-devel-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151230" comment="libqt4-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138794" comment="libqt4-linguist-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151231" comment="libqt4-linguist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138795" comment="libqt4-qt3support-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151232" comment="libqt4-qt3support is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138796" comment="libqt4-qt3support-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151233" comment="libqt4-qt3support-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138797" comment="libqt4-sql-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151234" comment="libqt4-sql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138798" comment="libqt4-sql-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151235" comment="libqt4-sql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138799" comment="libqt4-sql-mysql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151236" comment="libqt4-sql-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138800" comment="libqt4-sql-mysql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151237" comment="libqt4-sql-mysql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138801" comment="libqt4-sql-postgresql-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151238" comment="libqt4-sql-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138802" comment="libqt4-sql-postgresql-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151239" comment="libqt4-sql-postgresql-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138803" comment="libqt4-sql-sqlite-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151240" comment="libqt4-sql-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138804" comment="libqt4-sql-sqlite-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151241" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138805" comment="libqt4-sql-unixODBC-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151242" comment="libqt4-sql-unixODBC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138806" comment="libqt4-sql-unixODBC-32bit-4.8.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151243" comment="libqt4-sql-unixODBC-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138807" comment="libqt4-x11-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151244" comment="libqt4-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138808" comment="libqt4-x11-32bit-4.8.6-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151245" comment="libqt4-x11-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1863</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-1863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1863" source="CVE"/>
    <description>
    Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-1863.html">CVE-2015-1863</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1863">SUSE bug 927558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1863">SUSE bug 927558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1863">SUSE bug 927558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1863">SUSE bug 927558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1863">SUSE bug 927558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1863">SUSE bug 927558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1863">SUSE bug 927558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1863">SUSE bug 927558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1863">SUSE bug 927558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1863">SUSE bug 927558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1863">SUSE bug 927558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1863">SUSE bug 927558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1863">SUSE bug 927558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1863">SUSE bug 927558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-1863">SUSE bug 927558</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139133" comment="wpa_supplicant-2.2-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139134" comment="wpa_supplicant-gui-2.2-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2047</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2047" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2047" source="CVE"/>
    <description>
    The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentication via a password that is casted to an empty value.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2047.html">CVE-2015-2047</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2047">SUSE bug 919006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2047">SUSE bug 919006</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133371" comment="typo3-cms-4_5-4.5.40-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151953" comment="typo3-cms-4_5 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2059</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2059" source="CVE"/>
    <description>
    The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2059.html">CVE-2015-2059</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 923241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 923241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 923241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 937096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 937097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 937096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 937097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 923241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 923241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 923241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 923241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 937097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 923241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 937097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 919214</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 923241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 937096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 937097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 923241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 923241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 937096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 937096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 937096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 937096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 923241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 923241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 937096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 937096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 923241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 923241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 937096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 937097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 937096</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2059">SUSE bug 937096</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134259" comment="libidn-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152665" comment="libidn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134260" comment="libidn-devel-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152666" comment="libidn-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134261" comment="libidn-tools-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152667" comment="libidn-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134262" comment="libidn11-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152668" comment="libidn11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134263" comment="libidn11-32bit-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152669" comment="libidn11-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134351" comment="wget-1.14-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151442" comment="wget is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2153</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2153" source="CVE"/>
    <description>
    The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2153.html">CVE-2015-2153</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2153">SUSE bug 922221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2153">SUSE bug 922222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2153">SUSE bug 922223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2153">SUSE bug 922221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2153">SUSE bug 922221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139105" comment="tcpdump-4.5.1-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2154</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2154" source="CVE"/>
    <description>
    The osi_print_cksum function in print-isoclns.c in the ethernet printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) length, (2) offset, or (3) base pointer checksum value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2154.html">CVE-2015-2154</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2154">SUSE bug 922222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2154">SUSE bug 922222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2154">SUSE bug 922222</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139105" comment="tcpdump-4.5.1-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2155</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2155" source="CVE"/>
    <description>
    The force printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2155.html">CVE-2015-2155</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2155">SUSE bug 922220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2155">SUSE bug 922221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2155">SUSE bug 922222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2155">SUSE bug 922223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2155">SUSE bug 922223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2155">SUSE bug 922223</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139105" comment="tcpdump-4.5.1-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2170</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2170" source="CVE"/>
    <description>
    The upx decoder in ClamAV before 0.98.7 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2170.html">CVE-2015-2170</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2170">SUSE bug 922560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2170">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2170">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2170">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2170">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2170">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2170">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2170">SUSE bug 921950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2170">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2170">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2170">SUSE bug 929192</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138164" comment="clamav-0.98.7-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2181</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2181" source="CVE"/>
    <description>
    Multiple buffer overflows in the DBMail driver in the Password plugin in Roundcube before 1.1.0 allow remote attackers to have unspecified impact via the (1) password or (2) username.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2181.html">CVE-2015-2181</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2181">SUSE bug 976988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2181">SUSE bug 976988</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136830" comment="roundcubemail-1.1.7-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2187</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2187" source="CVE"/>
    <description>
    The dissect_atn_cpdlc_heur function in asn1/atn-cpdlc/packet-atn-cpdlc-template.c in the ATN-CPDLC dissector in Wireshark 1.12.x before 1.12.4 does not properly follow the TRY/ENDTRY code requirements, which allows remote attackers to cause a denial of service (stack memory corruption and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2187.html">CVE-2015-2187</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2187">SUSE bug 920695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2187">SUSE bug 920695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2187">SUSE bug 920695</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2188</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188" source="CVE"/>
    <description>
    epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2188.html">CVE-2015-2188</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2188">SUSE bug 920696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2188">SUSE bug 920696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2188">SUSE bug 920696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2188">SUSE bug 920696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2188">SUSE bug 920696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2188">SUSE bug 920696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2188">SUSE bug 920696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2188">SUSE bug 920696</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2189</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189" source="CVE"/>
    <description>
    Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2189.html">CVE-2015-2189</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2189">SUSE bug 920697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2189">SUSE bug 920697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2189">SUSE bug 920697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2189">SUSE bug 920697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2189">SUSE bug 920697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2189">SUSE bug 920697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2189">SUSE bug 920697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2189">SUSE bug 920697</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2190</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2190" source="CVE"/>
    <description>
    epan/proto.c in Wireshark 1.12.x before 1.12.4 does not properly handle integer data types greater than 32 bits in size, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet that is improperly handled by the LLDP dissector.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2190.html">CVE-2015-2190</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2190">SUSE bug 920698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2190">SUSE bug 920698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2190">SUSE bug 920698</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2191</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191" source="CVE"/>
    <description>
    Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2191.html">CVE-2015-2191</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2191">SUSE bug 920699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2191">SUSE bug 920699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2191">SUSE bug 920699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2191">SUSE bug 920699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2191">SUSE bug 920699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2191">SUSE bug 920699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2191">SUSE bug 920699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2191">SUSE bug 920699</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2192</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2192" source="CVE"/>
    <description>
    Integer overflow in the dissect_osd2_cdb_continuation function in epan/dissectors/packet-scsi-osd.c in the SCSI OSD dissector in Wireshark 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2192.html">CVE-2015-2192</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2192">SUSE bug 920700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2192">SUSE bug 920700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2192">SUSE bug 920700</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2221</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2221" source="CVE"/>
    <description>
    ClamAV before 0.98.7 allows remote attackers to cause a denial of service (infinite loop) via a crafted y0da cryptor file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2221.html">CVE-2015-2221</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2221">SUSE bug 922560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2221">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2221">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2221">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2221">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2221">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2221">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2221">SUSE bug 921950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2221">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2221">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2221">SUSE bug 929192</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138164" comment="clamav-0.98.7-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2222</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2222" source="CVE"/>
    <description>
    ClamAV before 0.98.7 allows remote attackers to cause a denial of service (crash) via a crafted petite packed file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2222.html">CVE-2015-2222</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2222">SUSE bug 922560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2222">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2222">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2222">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2222">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2222">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2222">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2222">SUSE bug 921950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2222">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2222">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2222">SUSE bug 929192</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138164" comment="clamav-0.98.7-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2265</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2265" source="CVE"/>
    <description>
    The remove_bad_chars function in utils/cups-browsed.c in cups-filters before 1.0.66 allows remote IPP printers to execute arbitrary commands via consecutive shell metacharacters in the (1) model or (2) PDL. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2265.html">CVE-2015-2265</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2265">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2265">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2265">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2265">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2265">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2265">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2265">SUSE bug 937018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2265">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2265">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2265">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2265">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2265">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2265">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2265">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2265">SUSE bug 921753</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138205" comment="cups-filters-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151947" comment="cups-filters is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138206" comment="cups-filters-cups-browsed-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151948" comment="cups-filters-cups-browsed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138207" comment="cups-filters-foomatic-rip-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151949" comment="cups-filters-foomatic-rip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138208" comment="cups-filters-ghostscript-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151950" comment="cups-filters-ghostscript is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2296</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2296" source="CVE"/>
    <description>
    The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2296.html">CVE-2015-2296</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2296">SUSE bug 922448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2296">SUSE bug 922448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2296">SUSE bug 926396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2296">SUSE bug 922448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2296">SUSE bug 922448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2296">SUSE bug 922448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2296">SUSE bug 922448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2296">SUSE bug 922448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2296">SUSE bug 922448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2296">SUSE bug 922448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2296">SUSE bug 922448</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139058" comment="python3-pip-7.1.2-4.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151932" comment="python3-pip is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2301</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2301" source="CVE"/>
    <description>
    Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP before 5.5.22 and 5.6.x before 5.6.6 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted renaming of a Phar archive to the name of an existing file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2301.html">CVE-2015-2301</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2301">SUSE bug 922452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2301">SUSE bug 922452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2301">SUSE bug 922452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2301">SUSE bug 922452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2301">SUSE bug 922452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2301">SUSE bug 922452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2301">SUSE bug 922452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2301">SUSE bug 922452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2301">SUSE bug 922452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2301">SUSE bug 922452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2301">SUSE bug 922452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2301">SUSE bug 922452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2301">SUSE bug 922452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2301">SUSE bug 922452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2301">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2301">SUSE bug 922452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2301">SUSE bug 922452</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2304</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2304" source="CVE"/>
    <description>
    Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2304.html">CVE-2015-2304</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2304">SUSE bug 920870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2304">SUSE bug 920870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2304">SUSE bug 920870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2304">SUSE bug 920870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2304">SUSE bug 920870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2304">SUSE bug 920870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2304">SUSE bug 920870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2304">SUSE bug 920870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2304">SUSE bug 920870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2304">SUSE bug 920870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2304">SUSE bug 920870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2304">SUSE bug 920870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2304">SUSE bug 920870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2304">SUSE bug 920870</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138155" comment="bsdtar-3.1.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136449" comment="libarchive-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138156" comment="libarchive-devel-3.1.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138157" comment="libarchive13-3.1.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136452" comment="libarchive13-32bit-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2305</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2305" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2305" source="CVE"/>
    <description>
    Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2305.html">CVE-2015-2305</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 921950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 922022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 922028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 922030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 922043</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 922560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 922567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 921950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 922567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 922028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 922043</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 921950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 922028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 922030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 922043</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 922043</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 922043</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 921950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 922560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 921950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 922043</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 921950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 922043</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 921950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 922030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 921950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 921950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 921950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 922030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2305">SUSE bug 929192</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138164" comment="clamav-0.98.7-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2318</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2318" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2318" source="CVE"/>
    <description>
    The TLS stack in Mono before 3.12.1 allows man-in-the-middle attackers to conduct message skipping attacks and consequently impersonate clients by leveraging missing handshake state validation, aka a "SMACK SKIP-TLS" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2318.html">CVE-2015-2318</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2318">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2318">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2318">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2318">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2318">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2318">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2318">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2318">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2318">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2318">SUSE bug 921312</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138700" comment="libmono-2_0-1-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151516" comment="libmono-2_0-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138701" comment="libmono-2_0-devel-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151517" comment="libmono-2_0-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138702" comment="libmonoboehm-2_0-1-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151518" comment="libmonoboehm-2_0-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138703" comment="libmonoboehm-2_0-devel-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151519" comment="libmonoboehm-2_0-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138704" comment="libmonosgen-2_0-1-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151520" comment="libmonosgen-2_0-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138705" comment="mono-core-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151521" comment="mono-core is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138706" comment="mono-data-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151522" comment="mono-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138707" comment="mono-data-sqlite-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151523" comment="mono-data-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138708" comment="mono-extras-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151524" comment="mono-extras is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138709" comment="mono-mvc-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151525" comment="mono-mvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138710" comment="mono-wcf-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151526" comment="mono-wcf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138711" comment="mono-web-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151527" comment="mono-web is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138712" comment="mono-winforms-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151528" comment="mono-winforms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138713" comment="mono-winfxcore-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151529" comment="mono-winfxcore is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2319</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2319" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2319" source="CVE"/>
    <description>
    The TLS stack in Mono before 3.12.1 makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the "FREAK" issue, a different vulnerability than CVE-2015-0204.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2319.html">CVE-2015-2319</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2319">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2319">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2319">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2319">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2319">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2319">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2319">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2319">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2319">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2319">SUSE bug 921312</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138700" comment="libmono-2_0-1-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151516" comment="libmono-2_0-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138701" comment="libmono-2_0-devel-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151517" comment="libmono-2_0-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138702" comment="libmonoboehm-2_0-1-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151518" comment="libmonoboehm-2_0-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138703" comment="libmonoboehm-2_0-devel-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151519" comment="libmonoboehm-2_0-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138704" comment="libmonosgen-2_0-1-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151520" comment="libmonosgen-2_0-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138705" comment="mono-core-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151521" comment="mono-core is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138706" comment="mono-data-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151522" comment="mono-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138707" comment="mono-data-sqlite-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151523" comment="mono-data-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138708" comment="mono-extras-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151524" comment="mono-extras is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138709" comment="mono-mvc-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151525" comment="mono-mvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138710" comment="mono-wcf-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151526" comment="mono-wcf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138711" comment="mono-web-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151527" comment="mono-web is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138712" comment="mono-winforms-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151528" comment="mono-winforms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138713" comment="mono-winfxcore-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151529" comment="mono-winfxcore is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2320</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2320" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2320" source="CVE"/>
    <description>
    The TLS stack in Mono before 3.12.1 allows remote attackers to have unspecified impact via vectors related to client-side SSLv2 fallback.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2320.html">CVE-2015-2320</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2320">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2320">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2320">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2320">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2320">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2320">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2320">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2320">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2320">SUSE bug 921312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2320">SUSE bug 921312</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138700" comment="libmono-2_0-1-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151516" comment="libmono-2_0-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138701" comment="libmono-2_0-devel-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151517" comment="libmono-2_0-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138702" comment="libmonoboehm-2_0-1-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151518" comment="libmonoboehm-2_0-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138703" comment="libmonoboehm-2_0-devel-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151519" comment="libmonoboehm-2_0-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138704" comment="libmonosgen-2_0-1-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151520" comment="libmonosgen-2_0-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138705" comment="mono-core-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151521" comment="mono-core is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138706" comment="mono-data-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151522" comment="mono-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138707" comment="mono-data-sqlite-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151523" comment="mono-data-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138708" comment="mono-extras-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151524" comment="mono-extras is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138709" comment="mono-mvc-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151525" comment="mono-mvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138710" comment="mono-wcf-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151526" comment="mono-wcf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138711" comment="mono-web-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151527" comment="mono-web is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138712" comment="mono-winforms-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151528" comment="mono-winforms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138713" comment="mono-winfxcore-4.0.4-1.8 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151529" comment="mono-winfxcore is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2325</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2325" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2325.html">CVE-2015-2325</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 933288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 936408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2325">SUSE bug 924960</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2326</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2326" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2326.html">CVE-2015-2326</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2326">SUSE bug 924961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2326">SUSE bug 924961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2326">SUSE bug 924961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2326">SUSE bug 924961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2326">SUSE bug 924961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2326">SUSE bug 924961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2326">SUSE bug 924961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2326">SUSE bug 924961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2326">SUSE bug 924961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2326">SUSE bug 924961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2326">SUSE bug 933288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2326">SUSE bug 936408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2326">SUSE bug 924960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2326">SUSE bug 924961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2326">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2326">SUSE bug 924961</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2327</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2327" source="CVE"/>
    <description>
    PCRE before 8.36 mishandles the /(((a\2)|(a*)\g&lt;-1&gt;))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2327.html">CVE-2015-2327</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2327">SUSE bug 957567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2327">SUSE bug 957567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2327">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2327">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2327">SUSE bug 957567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2327">SUSE bug 957567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2327">SUSE bug 957567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2327">SUSE bug 957567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2327">SUSE bug 957567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2327">SUSE bug 957567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2327">SUSE bug 957567</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2328</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2328" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2328" source="CVE"/>
    <description>
    PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2328.html">CVE-2015-2328</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2328">SUSE bug 957600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2328">SUSE bug 957600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2328">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2328">SUSE bug 957600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2328">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2328">SUSE bug 957600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2328">SUSE bug 957600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2328">SUSE bug 957600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2328">SUSE bug 957600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2328">SUSE bug 957600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2328">SUSE bug 957600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2328">SUSE bug 957600</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2331</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2331" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2331" source="CVE"/>
    <description>
    Integer overflow in the _zip_cdir_new function in zip_dirent.c in libzip 0.11.2 and earlier, as used in the ZIP extension in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a ZIP archive that contains many entries, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2331.html">CVE-2015-2331</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2331">SUSE bug 922894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2331">SUSE bug 922894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2331">SUSE bug 923240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2331">SUSE bug 922894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2331">SUSE bug 923240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2331">SUSE bug 922894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2331">SUSE bug 922894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2331">SUSE bug 922894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2331">SUSE bug 923240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2331">SUSE bug 922894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2331">SUSE bug 923240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2331">SUSE bug 922894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2331">SUSE bug 922894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2331">SUSE bug 922894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138977" comment="libzip-devel-0.11.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151554" comment="libzip-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138978" comment="libzip2-0.11.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151555" comment="libzip2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2348</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2348" source="CVE"/>
    <description>
    The move_uploaded_file implementation in ext/standard/basic_functions.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 truncates a pathname upon encountering a \x00 character, which allows remote attackers to bypass intended extension restrictions and create files with unexpected names via a crafted second argument.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2348.html">CVE-2015-2348</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2348">SUSE bug 924970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2348">SUSE bug 924970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2348">SUSE bug 924970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2348">SUSE bug 924970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2348">SUSE bug 924970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2348">SUSE bug 924970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2348">SUSE bug 924970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2348">SUSE bug 924970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2348">SUSE bug 924970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2348">SUSE bug 924970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2348">SUSE bug 924970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2348">SUSE bug 924970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2348">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2348">SUSE bug 924970</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2568</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote attackers to affect availability via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2568.html">CVE-2015-2568</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2568">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2568">SUSE bug 936409</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2571</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2571.html">CVE-2015-2571</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2571">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2571">SUSE bug 936408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2573</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2573.html">CVE-2015-2573</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2573">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2573">SUSE bug 936409</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2575</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2575" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2575.html">CVE-2015-2575</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2575">SUSE bug 927623</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2575">SUSE bug 927981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2575">SUSE bug 927981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2575">SUSE bug 927981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2575">SUSE bug 927981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2575">SUSE bug 927981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2575">SUSE bug 927981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2575">SUSE bug 927981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2575">SUSE bug 927981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2575">SUSE bug 927981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2575">SUSE bug 927981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2575">SUSE bug 927981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2575">SUSE bug 927981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2575">SUSE bug 927981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2575">SUSE bug 927981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2575">SUSE bug 927981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2575">SUSE bug 927981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2575">SUSE bug 927981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2575">SUSE bug 927981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2575">SUSE bug 927981</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134443" comment="mysql-connector-java-5.1.35-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152673" comment="mysql-connector-java is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2590</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2590.html">CVE-2015-2590</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2590">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2590">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2590">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2590">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2590">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2590">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2590">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2590">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2590">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2597</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2597" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Install.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2597.html">CVE-2015-2597</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2597">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2597">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2597">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2601</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2601.html">CVE-2015-2601</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2601">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2601">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2601">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2601">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2613</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2613.html">CVE-2015-2613</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2613">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2613">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2613">SUSE bug 951727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2613">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2613">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2619</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2619" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, JavaFX 2.2.80, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2619.html">CVE-2015-2619</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2619">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2619">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2619">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2619">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2621</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33, allows remote attackers to affect confidentiality via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2621.html">CVE-2015-2621</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2621">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2621">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2621">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2621">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2625</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JSSE.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2625.html">CVE-2015-2625</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2625">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2625">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2625">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2625">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2627</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2627" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality via unknown vectors related to installation.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2627.html">CVE-2015-2627</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2627">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2627">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2627">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2628</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2628.html">CVE-2015-2628</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2628">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2628">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2628">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2632</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2632.html">CVE-2015-2632</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2632">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2632">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2632">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2632">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2637</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2637" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2637.html">CVE-2015-2637</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2637">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2637">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2637">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2637">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2638</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2638" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2638.html">CVE-2015-2638</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2638">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2638">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2638">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2638">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2659</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2659" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u45 and Java SE Embedded 8u33 allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2659.html">CVE-2015-2659</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2659">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2659">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2659">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2664</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2664" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2664.html">CVE-2015-2664</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2664">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2664">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2664">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2664">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2668</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2668" source="CVE"/>
    <description>
    ClamAV before 0.98.7 allows remote attackers to cause a denial of service (infinite loop) via a crafted xz archive file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2668.html">CVE-2015-2668</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2668">SUSE bug 922560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2668">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2668">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2668">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2668">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2668">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2668">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2668">SUSE bug 921950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2668">SUSE bug 929192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2668">SUSE bug 1040662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2668">SUSE bug 929192</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138164" comment="clamav-0.98.7-2.7 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2694</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2694" source="CVE"/>
    <description>
    The kdcpreauth modules in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.2 do not properly track whether a client's request has been validated, which allows remote attackers to bypass an intended preauthentication requirement by providing (1) zero bytes of data or (2) an arbitrary realm name, related to plugins/preauth/otp/main.c and plugins/preauth/pkinit/pkinit_srv.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2694.html">CVE-2015-2694</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2694">SUSE bug 928978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2694">SUSE bug 928978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2694">SUSE bug 928978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2694">SUSE bug 928978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2694">SUSE bug 928978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2694">SUSE bug 928978</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138449" comment="krb5-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138450" comment="krb5-32bit-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138451" comment="krb5-client-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138452" comment="krb5-devel-1.12.1-19.9 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2695</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695" source="CVE"/>
    <description>
    lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted SPNEGO packet that is mishandled during a gss_inquire_context call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2695.html">CVE-2015-2695</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2695">SUSE bug 952188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2695">SUSE bug 952188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2695">SUSE bug 952188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2695">SUSE bug 952188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2695">SUSE bug 952188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2695">SUSE bug 952188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2695">SUSE bug 952188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2695">SUSE bug 952188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2695">SUSE bug 952188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2695">SUSE bug 952188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2695">SUSE bug 969771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2695">SUSE bug 770172</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117881" comment="krb5-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117882" comment="krb5-32bit-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117883" comment="krb5-client-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117884" comment="krb5-devel-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117885" comment="krb5-devel-32bit-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152677" comment="krb5-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117886" comment="krb5-doc-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152678" comment="krb5-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117887" comment="krb5-mini-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152679" comment="krb5-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117888" comment="krb5-mini-devel-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152680" comment="krb5-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117889" comment="krb5-plugin-kdb-ldap-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152681" comment="krb5-plugin-kdb-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117890" comment="krb5-plugin-preauth-otp-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152682" comment="krb5-plugin-preauth-otp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117891" comment="krb5-plugin-preauth-pkinit-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152683" comment="krb5-plugin-preauth-pkinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117892" comment="krb5-server-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152684" comment="krb5-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2696</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696" source="CVE"/>
    <description>
    lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted IAKERB packet that is mishandled during a gss_inquire_context call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2696.html">CVE-2015-2696</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2696">SUSE bug 952189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2696">SUSE bug 952189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2696">SUSE bug 952189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2696">SUSE bug 954204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2696">SUSE bug 952189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2696">SUSE bug 770172</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117881" comment="krb5-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117882" comment="krb5-32bit-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117883" comment="krb5-client-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117884" comment="krb5-devel-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117885" comment="krb5-devel-32bit-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152677" comment="krb5-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117886" comment="krb5-doc-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152678" comment="krb5-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117887" comment="krb5-mini-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152679" comment="krb5-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117888" comment="krb5-mini-devel-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152680" comment="krb5-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117889" comment="krb5-plugin-kdb-ldap-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152681" comment="krb5-plugin-kdb-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117890" comment="krb5-plugin-preauth-otp-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152682" comment="krb5-plugin-preauth-otp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117891" comment="krb5-plugin-preauth-pkinit-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152683" comment="krb5-plugin-preauth-pkinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117892" comment="krb5-server-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152684" comment="krb5-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2697</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697" source="CVE"/>
    <description>
    The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2697.html">CVE-2015-2697</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2697">SUSE bug 952190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2697">SUSE bug 952190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2697">SUSE bug 952190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2697">SUSE bug 952190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2697">SUSE bug 770172</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2697">SUSE bug 952190</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117881" comment="krb5-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117882" comment="krb5-32bit-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117883" comment="krb5-client-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117884" comment="krb5-devel-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117885" comment="krb5-devel-32bit-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152677" comment="krb5-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117886" comment="krb5-doc-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152678" comment="krb5-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117887" comment="krb5-mini-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152679" comment="krb5-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117888" comment="krb5-mini-devel-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152680" comment="krb5-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117889" comment="krb5-plugin-kdb-ldap-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152681" comment="krb5-plugin-kdb-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117890" comment="krb5-plugin-preauth-otp-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152682" comment="krb5-plugin-preauth-otp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117891" comment="krb5-plugin-preauth-pkinit-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152683" comment="krb5-plugin-preauth-pkinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117892" comment="krb5-server-1.12.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152684" comment="krb5-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2698</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2698" source="CVE"/>
    <description>
    The iakerb_gss_export_sec_context function in lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) 1.14 pre-release 2015-09-14 improperly accesses a certain pointer, which allows remote authenticated users to cause a denial of service (memory corruption) or possibly have unspecified other impact by interacting with an application that calls the gss_export_sec_context function.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-2696.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2698.html">CVE-2015-2698</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2698">SUSE bug 954204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2698">SUSE bug 954204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2698">SUSE bug 954204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2698">SUSE bug 954204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2698">SUSE bug 770172</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120730" comment="krb5-1.12.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120731" comment="krb5-32bit-1.12.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120732" comment="krb5-client-1.12.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120733" comment="krb5-devel-1.12.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120734" comment="krb5-devel-32bit-1.12.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152677" comment="krb5-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120735" comment="krb5-doc-1.12.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152678" comment="krb5-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120736" comment="krb5-mini-1.12.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152679" comment="krb5-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120737" comment="krb5-mini-devel-1.12.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152680" comment="krb5-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120738" comment="krb5-plugin-kdb-ldap-1.12.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152681" comment="krb5-plugin-kdb-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120739" comment="krb5-plugin-preauth-otp-1.12.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152682" comment="krb5-plugin-preauth-otp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120740" comment="krb5-plugin-preauth-pkinit-1.12.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152683" comment="krb5-plugin-preauth-pkinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120741" comment="krb5-server-1.12.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152684" comment="krb5-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2706</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2706" source="CVE"/>
    <description>
    Race condition in the AsyncPaintWaitEvent::AsyncPaintWaitEvent function in Mozilla Firefox before 37.0.2 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted plugin that does not properly complete initialization.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2706.html">CVE-2015-2706</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2706">SUSE bug 928116</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2706">SUSE bug 928116</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2706">SUSE bug 928116</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2708</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2708" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2708.html">CVE-2015-2708</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2708">SUSE bug 930622</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2709</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2709" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2709.html">CVE-2015-2709</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2709">SUSE bug 930622</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2710</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710" source="CVE"/>
    <description>
    Heap-based buffer overflow in the SVGTextFrame class in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code via crafted SVG graphics data in conjunction with a crafted Cascading Style Sheets (CSS) token sequence.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2710.html">CVE-2015-2710</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2710">SUSE bug 930622</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2711</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2711" source="CVE"/>
    <description>
    Mozilla Firefox before 38.0 does not recognize a referrer policy delivered by a referrer META element in cases of context-menu navigation and middle-click navigation, which allows remote attackers to obtain sensitive information by reading web-server Referer logs that contain private data in a URL, as demonstrated by a private path component.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2711.html">CVE-2015-2711</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2711">SUSE bug 930622</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2712</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2712" source="CVE"/>
    <description>
    The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2712.html">CVE-2015-2712</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2712">SUSE bug 930622</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2713</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713" source="CVE"/>
    <description>
    Use-after-free vulnerability in the SetBreaks function in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a document containing crafted text in conjunction with a Cascading Style Sheets (CSS) token sequence containing properties related to vertical text.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2713.html">CVE-2015-2713</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2713">SUSE bug 930622</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2715</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2715" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2715" source="CVE"/>
    <description>
    Race condition in the nsThreadManager::RegisterCurrentThread function in Mozilla Firefox before 38.0 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and heap memory corruption) by leveraging improper Media Decoder Thread creation at the time of a shutdown.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2715.html">CVE-2015-2715</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2715">SUSE bug 930622</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2716</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716" source="CVE"/>
    <description>
    Buffer overflow in the XML parser in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code by providing a large amount of compressed XML data, a related issue to CVE-2015-1283.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2716.html">CVE-2015-2716</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2716">SUSE bug 930622</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2716">SUSE bug 980391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2716">SUSE bug 983985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2716">SUSE bug 983985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2716">SUSE bug 983985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2716">SUSE bug 983985</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2717</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2717" source="CVE"/>
    <description>
    Integer overflow in libstagefright in Mozilla Firefox before 38.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and out-of-bounds read) via an MP4 video file containing invalid metadata.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2717.html">CVE-2015-2717</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2717">SUSE bug 930622</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2718</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2718" source="CVE"/>
    <description>
    The WebChannel.jsm module in Mozilla Firefox before 38.0 allows remote attackers to bypass the Same Origin Policy and obtain sensitive webchannel-response data via a crafted web site containing an IFRAME element referencing a different web site that is intended to read this data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2718.html">CVE-2015-2718</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2718">SUSE bug 930622</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2721</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.19, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, Thunderbird before 38.1, and other products, does not properly determine state transitions for the TLS state machine, which allows man-in-the-middle attackers to defeat cryptographic protection mechanisms by blocking messages, as demonstrated by removing a forward-secrecy property by blocking a ServerKeyExchange message, aka a "SMACK SKIP-TLS" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2721.html">CVE-2015-2721</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2721">SUSE bug 935979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2721">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138623" comment="libfreebl3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138624" comment="libsoftokn3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138625" comment="mozilla-nss-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138626" comment="mozilla-nss-certs-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138627" comment="mozilla-nss-devel-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138628" comment="mozilla-nss-tools-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2722</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a shared worker.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2722.html">CVE-2015-2722</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2722">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2724</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2724" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2724.html">CVE-2015-2724</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2724">SUSE bug 935979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2724">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2725</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2725" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2725.html">CVE-2015-2725</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2725">SUSE bug 935979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2725">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2726</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2726" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2726.html">CVE-2015-2726</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2726">SUSE bug 935979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2726">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2727</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2727" source="CVE"/>
    <description>
    Mozilla Firefox 38.0 and Firefox ESR 38.0 allow user-assisted remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges via a crafted web site that is accessed with unspecified mouse and keyboard actions.  NOTE: this vulnerability exists because of a CVE-2015-0821 regression.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2727.html">CVE-2015-2727</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2727">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2728</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" source="CVE"/>
    <description>
    The IndexedDatabaseManager class in the IndexedDB implementation in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 misinterprets an unspecified IDBDatabase field as a pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2728.html">CVE-2015-2728</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2728">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2729</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729" source="CVE"/>
    <description>
    The AudioParamTimeline::AudioNodeInputValue function in the Web Audio implementation in Mozilla Firefox before 39.0 and Firefox ESR 38.x before 38.1 does not properly calculate an oscillator rendering range, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2729.html">CVE-2015-2729</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2729">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2730</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.19.1, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and other products, does not properly perform Elliptical Curve Cryptography (ECC) multiplications, which makes it easier for remote attackers to spoof ECDSA signatures via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2730.html">CVE-2015-2730</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2730">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2731</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CSPService::ShouldLoad function in the microtask implementation in Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 allows remote attackers to execute arbitrary code by leveraging client-side JavaScript that triggers removal of a DOM object on the basis of a Content Policy.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2731.html">CVE-2015-2731</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2731">SUSE bug 935979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2731">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2733</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2733" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a dedicated worker.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2733.html">CVE-2015-2733</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2733">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2734</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2734" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" source="CVE"/>
    <description>
    The CairoTextureClientD3D9::BorrowDrawTarget function in the Direct3D 9 implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2734.html">CVE-2015-2734</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2734">SUSE bug 935979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2734">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2735</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" source="CVE"/>
    <description>
    nsZipArchive.cpp in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which allows remote attackers to have an unspecified impact via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2735.html">CVE-2015-2735</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2735">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2736</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" source="CVE"/>
    <description>
    The nsZipArchive::BuildFileList function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which allows remote attackers to have an unspecified impact via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2736.html">CVE-2015-2736</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2736">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2737</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" source="CVE"/>
    <description>
    The rx::d3d11::SetBufferData function in the Direct3D 11 implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2737.html">CVE-2015-2737</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2737">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2738</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" source="CVE"/>
    <description>
    The YCbCrImageDataDeserializer::ToDataSourceSurface function in the YCbCr implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2738.html">CVE-2015-2738</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2738">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2739</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" source="CVE"/>
    <description>
    The ArrayBufferBuilder::append function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2739.html">CVE-2015-2739</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2739">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2740</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" source="CVE"/>
    <description>
    Buffer overflow in the nsXMLHttpRequest::AppendToResponseText function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 might allow remote attackers to cause a denial of service or have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2740.html">CVE-2015-2740</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2740">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2741</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2741" source="CVE"/>
    <description>
    Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2741.html">CVE-2015-2741</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2741">SUSE bug 935979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2741">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2742</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2742" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2742" source="CVE"/>
    <description>
    Mozilla Firefox before 39.0 on OS X includes native key press information during the logging of crashes, which allows remote attackers to obtain sensitive information by leveraging access to a crash-reporting data stream.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2742.html">CVE-2015-2742</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2742">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2743</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" source="CVE"/>
    <description>
    PDF.js in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 enables excessive privileges for internal Workers, which might allow remote attackers to execute arbitrary code by leveraging a Same Origin Policy bypass.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2743.html">CVE-2015-2743</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2743">SUSE bug 935979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2775</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2775" source="CVE"/>
    <description>
    Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2775.html">CVE-2015-2775</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2775">SUSE bug 925502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2775">SUSE bug 925502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2775">SUSE bug 925502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2775">SUSE bug 925502</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138983" comment="mailman-2.1.20-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151563" comment="mailman is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2783</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2783" source="CVE"/>
    <description>
    ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2783.html">CVE-2015-2783</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2783">SUSE bug 928408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2783">SUSE bug 928506</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2783">SUSE bug 928511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2783">SUSE bug 928511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2783">SUSE bug 928511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2783">SUSE bug 931418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2783">SUSE bug 931418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2783">SUSE bug 928511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2783">SUSE bug 928511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2783">SUSE bug 931418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2783">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2787</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2787" source="CVE"/>
    <description>
    Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages use of the unset function within an __wakeup function, a related issue to CVE-2015-0231.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2787.html">CVE-2015-2787</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2787">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2787">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2787">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2787">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2787">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2787">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2787">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2787">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2787">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2787">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2787">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2787">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2787">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2787">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2787">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2787">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2787">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2787">SUSE bug 924972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2787">SUSE bug 924972</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2806</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2806" source="CVE"/>
    <description>
    Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2806.html">CVE-2015-2806</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2806">SUSE bug 924828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2806">SUSE bug 924828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2806">SUSE bug 924828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2806">SUSE bug 924828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2806">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2806">SUSE bug 924828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2806">SUSE bug 924828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2806">SUSE bug 924828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2806">SUSE bug 924828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2806">SUSE bug 924828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2806">SUSE bug 924828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2806">SUSE bug 924828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2806">SUSE bug 924828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2806">SUSE bug 924828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2806">SUSE bug 961491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2806">SUSE bug 924828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2806">SUSE bug 924828</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138885" comment="libtasn1-3.7-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152119" comment="libtasn1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138886" comment="libtasn1-6-3.7-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152120" comment="libtasn1-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138887" comment="libtasn1-6-32bit-3.7-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152121" comment="libtasn1-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138888" comment="libtasn1-devel-3.7-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152122" comment="libtasn1-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2808</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808" source="CVE"/>
    <description>
    The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2808.html">CVE-2015-2808</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2808">SUSE bug 925378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2808">SUSE bug 925378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2808">SUSE bug 925378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2808">SUSE bug 925378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2808">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2808">SUSE bug 925378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2808">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2808">SUSE bug 925378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2808">SUSE bug 925378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2808">SUSE bug 952088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2808">SUSE bug 925378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2808">SUSE bug 925378</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2924</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-2924" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2924" source="CVE"/>
    <description>
    The receive_ra function in rdisc/nm-lndp-rdisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in NetworkManager 1.x allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message, a similar issue to CVE-2015-2922.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-2924.html">CVE-2015-2924</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2924">SUSE bug 926223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2924">SUSE bug 926223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2924">SUSE bug 926223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2924">SUSE bug 926223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2924">SUSE bug 926223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2924">SUSE bug 926223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2924">SUSE bug 926223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-2924">SUSE bug 926223</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138047" comment="NetworkManager-1.0.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152685" comment="NetworkManager is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138048" comment="NetworkManager-devel-1.0.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152686" comment="NetworkManager-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138049" comment="NetworkManager-lang-1.0.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152687" comment="NetworkManager-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138050" comment="libnm-glib-vpn1-1.0.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152688" comment="libnm-glib-vpn1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138051" comment="libnm-glib4-1.0.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152689" comment="libnm-glib4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138052" comment="libnm-util2-1.0.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152690" comment="libnm-util2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138053" comment="libnm0-1.0.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152691" comment="libnm0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138054" comment="typelib-1_0-NM-1_0-1.0.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152692" comment="typelib-1_0-NM-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138055" comment="typelib-1_0-NMClient-1_0-1.0.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152693" comment="typelib-1_0-NMClient-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138056" comment="typelib-1_0-NetworkManager-1_0-1.0.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152694" comment="typelib-1_0-NetworkManager-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3138</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3138" source="CVE"/>
    <description>
    print-wb.c in tcpdump before 4.7.4 allows remote attackers to cause a denial of service (segmentation fault and process crash).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3138.html">CVE-2015-3138</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3138">SUSE bug 927637</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3143</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143" source="CVE"/>
    <description>
    cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which allows remote attackers to connect as other users via an unauthenticated request, a similar issue to CVE-2014-0015.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3143.html">CVE-2015-3143</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3143">SUSE bug 927556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3143">SUSE bug 927556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3143">SUSE bug 927556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3143">SUSE bug 927556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3143">SUSE bug 927556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3143">SUSE bug 927556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3143">SUSE bug 927556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3143">SUSE bug 927556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3143">SUSE bug 927556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3143">SUSE bug 927556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3143">SUSE bug 927556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3143">SUSE bug 927556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3143">SUSE bug 927556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3143">SUSE bug 927556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3143">SUSE bug 927556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3143">SUSE bug 927556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3143">SUSE bug 927556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3143">SUSE bug 927556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3143">SUSE bug 927556</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138211" comment="curl-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138212" comment="libcurl-devel-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138213" comment="libcurl4-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3144</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3144" source="CVE"/>
    <description>
    The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3144.html">CVE-2015-3144</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3144">SUSE bug 927608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3144">SUSE bug 927608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3144">SUSE bug 927608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3144">SUSE bug 927608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3144">SUSE bug 927608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3144">SUSE bug 927608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3144">SUSE bug 927608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3144">SUSE bug 927608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3144">SUSE bug 927608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3144">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138211" comment="curl-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138212" comment="libcurl-devel-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138213" comment="libcurl4-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3145</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3145" source="CVE"/>
    <description>
    The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3145.html">CVE-2015-3145</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3145">SUSE bug 927607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3145">SUSE bug 927607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3145">SUSE bug 927607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3145">SUSE bug 927607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3145">SUSE bug 927607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3145">SUSE bug 927607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3145">SUSE bug 927607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3145">SUSE bug 927607</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3145">SUSE bug 927607</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138211" comment="curl-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138212" comment="libcurl-devel-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138213" comment="libcurl4-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3146</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3146" source="CVE"/>
    <description>
    The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3146.html">CVE-2015-3146</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3146">SUSE bug 928323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3146">SUSE bug 928323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3146">SUSE bug 928323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3146">SUSE bug 928323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3146">SUSE bug 928323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3146">SUSE bug 928323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3146">SUSE bug 928323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3146">SUSE bug 928323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3146">SUSE bug 928323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3146">SUSE bug 928323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3146">SUSE bug 928323</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009114955" comment="libssh-devel-0.6.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151771" comment="libssh-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009114957" comment="libssh4-0.6.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151772" comment="libssh4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3148</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148" source="CVE"/>
    <description>
    cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3148.html">CVE-2015-3148</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3148">SUSE bug 927746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3148">SUSE bug 927746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3148">SUSE bug 927746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3148">SUSE bug 927746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3148">SUSE bug 927746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3148">SUSE bug 927746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3148">SUSE bug 927746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3148">SUSE bug 927746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3148">SUSE bug 927746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3148">SUSE bug 927746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3148">SUSE bug 927746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3148">SUSE bug 927746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3148">SUSE bug 927746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3148">SUSE bug 927746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3148">SUSE bug 927746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3148">SUSE bug 927746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3148">SUSE bug 927746</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138211" comment="curl-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138212" comment="libcurl-devel-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138213" comment="libcurl4-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3152</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152" source="CVE"/>
    <description>
    Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a "BACKRONYM" attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3152.html">CVE-2015-3152</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 928962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 928962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 928962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 928962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 928962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 936407</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 936407</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 936407</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 936407</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 936407</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 936407</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 936407</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 928962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 928962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 928962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 928962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 928962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 928962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 936407</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 1037590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 1047059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 1047059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 928962</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 1047059</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 1088681</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 1088681</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 1088681</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 1088681</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3152">SUSE bug 1088681</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138719" comment="libmysqlclient-devel-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138720" comment="libmysqlclient18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138721" comment="libmysqlclient18-32bit-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138722" comment="libmysqlclient_r18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138723" comment="libmysqld18-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138724" comment="mariadb-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138725" comment="mariadb-client-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138726" comment="mariadb-errormessages-10.0.21-1.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3153</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153" source="CVE"/>
    <description>
    The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3153.html">CVE-2015-3153</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3153">SUSE bug 928533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3153">SUSE bug 928533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3153">SUSE bug 928533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3153">SUSE bug 928533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3153">SUSE bug 928533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3153">SUSE bug 928533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3153">SUSE bug 928533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3153">SUSE bug 928533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3153">SUSE bug 928533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3153">SUSE bug 928533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3153">SUSE bug 928533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3153">SUSE bug 928533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3153">SUSE bug 928533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3153">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3153">SUSE bug 928533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138211" comment="curl-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138212" comment="libcurl-devel-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138213" comment="libcurl4-7.37.0-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3164</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3164" source="CVE"/>
    <description>
    The authentication setup in XWayland 1.16.x and 1.17.x before 1.17.2 starts the server in non-authenticating mode, which allows local users to read from or send information to arbitrary X11 clients via vectors involving a UNIX socket.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3164.html">CVE-2015-3164</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3164">SUSE bug 934102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3164">SUSE bug 934102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3164">SUSE bug 934102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3164">SUSE bug 934102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3164">SUSE bug 934102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3164">SUSE bug 934102</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139149" comment="xorg-x11-server-7.6_1.17.2-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139150" comment="xorg-x11-server-extra-7.6_1.17.2-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139151" comment="xorg-x11-server-sdk-7.6_1.17.2-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3165</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165" source="CVE"/>
    <description>
    Double free vulnerability in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 allows remote attackers to cause a denial of service (crash) by closing an SSL session at a time when the authentication timeout will expire during the session shutdown sequence.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3165.html">CVE-2015-3165</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3165">SUSE bug 931972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3165">SUSE bug 931973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3165">SUSE bug 931974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3165">SUSE bug 932040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3165">SUSE bug 931972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3165">SUSE bug 931972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3165">SUSE bug 932040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3165">SUSE bug 932040</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3166</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3166.html">CVE-2015-3166</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3166">SUSE bug 931972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3166">SUSE bug 931973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3166">SUSE bug 931974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3166">SUSE bug 932040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3166">SUSE bug 931973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3166">SUSE bug 931973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3166">SUSE bug 931973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3166">SUSE bug 931973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3166">SUSE bug 932040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3166">SUSE bug 932040</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3167</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3167.html">CVE-2015-3167</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3167">SUSE bug 931972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3167">SUSE bug 931973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3167">SUSE bug 931974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3167">SUSE bug 932040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3167">SUSE bug 931974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3167">SUSE bug 931974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3167">SUSE bug 932040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3167">SUSE bug 932040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3167">SUSE bug 931974</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3167">SUSE bug 931974</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3184</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3184" source="CVE"/>
    <description>
    mod_authz_svn in Apache Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using Apache httpd 2.4.x, does not properly restrict anonymous access, which allows remote anonymous users to read hidden files via the path name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3184.html">CVE-2015-3184</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3184">SUSE bug 939514</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3184">SUSE bug 939516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3184">SUSE bug 939514</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3184">SUSE bug 939514</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3184">SUSE bug 939514</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3184">SUSE bug 939514</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3184">SUSE bug 939514</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3184">SUSE bug 939514</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3184">SUSE bug 939516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3184">SUSE bug 938723</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3184">SUSE bug 938723</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120394" comment="libsvn_auth_gnome_keyring-1-0-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152695" comment="libsvn_auth_gnome_keyring-1-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120395" comment="libsvn_auth_kwallet-1-0-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152696" comment="libsvn_auth_kwallet-1-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120396" comment="subversion-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120397" comment="subversion-bash-completion-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152697" comment="subversion-bash-completion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120398" comment="subversion-devel-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120399" comment="subversion-perl-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120400" comment="subversion-python-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120401" comment="subversion-ruby-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152698" comment="subversion-ruby is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120402" comment="subversion-server-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120403" comment="subversion-tools-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3187</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3187" source="CVE"/>
    <description>
    The svn_repos_trace_node_locations function in Apache Subversion before 1.7.21 and 1.8.x before 1.8.14, when path-based authorization is used, allows remote authenticated users to obtain sensitive path information by reading the history of a node that has been moved from a hidden path.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3187.html">CVE-2015-3187</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3187">SUSE bug 939517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3187">SUSE bug 939517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3187">SUSE bug 939517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3187">SUSE bug 939517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3187">SUSE bug 939517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3187">SUSE bug 939517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3187">SUSE bug 939517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3187">SUSE bug 939517</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120394" comment="libsvn_auth_gnome_keyring-1-0-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152695" comment="libsvn_auth_gnome_keyring-1-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120395" comment="libsvn_auth_kwallet-1-0-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152696" comment="libsvn_auth_kwallet-1-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120396" comment="subversion-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120397" comment="subversion-bash-completion-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152697" comment="subversion-bash-completion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120398" comment="subversion-devel-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120399" comment="subversion-perl-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120400" comment="subversion-python-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120401" comment="subversion-ruby-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152698" comment="subversion-ruby is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120402" comment="subversion-server-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120403" comment="subversion-tools-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3194</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3194" source="CVE"/>
    <description>
    crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3194.html">CVE-2015-3194</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 957815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 957815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 957815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 957815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 957815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 957815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 957815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 958768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 958768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 958768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 958768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 957815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 958768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 958768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 957815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 957815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 957815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 957815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 957815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 957815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 957815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 957815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3194">SUSE bug 990370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119774" comment="libcrypto36-2.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152701" comment="libcrypto36 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119775" comment="libcrypto36-32bit-2.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152702" comment="libcrypto36-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127794" comment="libmysql56client18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127795" comment="libmysql56client18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127796" comment="libmysql56client_r18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127797" comment="libmysql56client_r18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009102671" comment="libopenssl-devel-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119601" comment="libopenssl-devel-32bit-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009102672" comment="libopenssl1_0_0-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119602" comment="libopenssl1_0_0-32bit-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009102673" comment="libopenssl1_0_0-hmac-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119603" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119776" comment="libressl-2.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152706" comment="libressl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119777" comment="libressl-devel-2.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152707" comment="libressl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119778" comment="libressl-devel-32bit-2.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152708" comment="libressl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119779" comment="libressl-devel-doc-2.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152709" comment="libressl-devel-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119782" comment="libssl37-2.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152712" comment="libssl37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119783" comment="libssl37-32bit-2.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152713" comment="libssl37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119786" comment="libtls9-2.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152716" comment="libtls9 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119787" comment="libtls9-32bit-2.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152717" comment="libtls9-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127798" comment="mysql-community-server-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127799" comment="mysql-community-server-bench-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127800" comment="mysql-community-server-client-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127801" comment="mysql-community-server-errormessages-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127802" comment="mysql-community-server-test-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127803" comment="mysql-community-server-tools-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009102674" comment="openssl-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009102675" comment="openssl-doc-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3195</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3195" source="CVE"/>
    <description>
    The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3195.html">CVE-2015-3195</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 958768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 958768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 958768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 958768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 958768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 958768</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 963977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 923755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 963977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 986238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 986238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 986238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 986238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 986238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3195">SUSE bug 957812</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119893" comment="compat-openssl098-0.9.8j-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119774" comment="libcrypto36-2.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152701" comment="libcrypto36 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119775" comment="libcrypto36-32bit-2.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152702" comment="libcrypto36-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009102671" comment="libopenssl-devel-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119601" comment="libopenssl-devel-32bit-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124409" comment="libopenssl0_9_8-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124410" comment="libopenssl0_9_8-32bit-0.9.8zh-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009102672" comment="libopenssl1_0_0-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119602" comment="libopenssl1_0_0-32bit-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009102673" comment="libopenssl1_0_0-hmac-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119603" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119776" comment="libressl-2.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152706" comment="libressl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119777" comment="libressl-devel-2.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152707" comment="libressl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119778" comment="libressl-devel-32bit-2.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152708" comment="libressl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119779" comment="libressl-devel-doc-2.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152709" comment="libressl-devel-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119782" comment="libssl37-2.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152712" comment="libssl37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119783" comment="libssl37-32bit-2.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152713" comment="libssl37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119786" comment="libtls9-2.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152716" comment="libtls9 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119787" comment="libtls9-32bit-2.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152717" comment="libtls9-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009102674" comment="openssl-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009102675" comment="openssl-doc-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3196</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3196" source="CVE"/>
    <description>
    ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3196.html">CVE-2015-3196</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3196">SUSE bug 957813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3196">SUSE bug 957813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3196">SUSE bug 957813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3196">SUSE bug 957813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3196">SUSE bug 957813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3196">SUSE bug 957813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3196">SUSE bug 957813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3196">SUSE bug 957813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3196">SUSE bug 957813</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009102671" comment="libopenssl-devel-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119601" comment="libopenssl-devel-32bit-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009102672" comment="libopenssl1_0_0-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119602" comment="libopenssl1_0_0-32bit-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009102673" comment="libopenssl1_0_0-hmac-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119603" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009102674" comment="openssl-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009102675" comment="openssl-doc-1.0.1i-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3197</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197" source="CVE"/>
    <description>
    ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3197.html">CVE-2015-3197</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3197">SUSE bug 963415</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124681" comment="compat-openssl098-0.9.8j-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124397" comment="libopenssl-devel-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124398" comment="libopenssl-devel-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124682" comment="libopenssl0_9_8-0.9.8j-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124683" comment="libopenssl0_9_8-32bit-0.9.8j-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124399" comment="libopenssl1_0_0-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124400" comment="libopenssl1_0_0-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124401" comment="libopenssl1_0_0-hmac-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124402" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124403" comment="openssl-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124404" comment="openssl-doc-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3202</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3202" source="CVE"/>
    <description>
    fusermount in FUSE before 2.9.3-15 does not properly clear the environment before invoking (1) mount or (2) umount as root, which allows local users to write to arbitrary files via a crafted LIBMOUNT_MTAB environment variable that is used by mount's debugging feature.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3202.html">CVE-2015-3202</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3202">SUSE bug 931452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3202">SUSE bug 931452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3202">SUSE bug 931452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3202">SUSE bug 931452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3202">SUSE bug 931452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3202">SUSE bug 931452</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138291" comment="fuse-2.9.3-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151346" comment="fuse is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138292" comment="libfuse2-2.9.3-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151347" comment="libfuse2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3209</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209" source="CVE"/>
    <description>
    Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3209.html">CVE-2015-3209</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932823</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932823</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3209">SUSE bug 932770</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3210</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3210" source="CVE"/>
    <description>
    Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P&lt;B&gt;c)(?P&lt;B&gt;a(?P=B)))&gt;WGXCREDITS)/, a different vulnerability than CVE-2015-8384.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3210.html">CVE-2015-3210</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3210">SUSE bug 933288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3210">SUSE bug 933288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3210">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3210">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3210">SUSE bug 933288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3210">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3210">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3210">SUSE bug 933288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3210">SUSE bug 933288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3210">SUSE bug 933288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3210">SUSE bug 933288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3210">SUSE bug 933288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3210">SUSE bug 933288</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3216</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3216" source="CVE"/>
    <description>
    Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3216.html">CVE-2015-3216</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3216">SUSE bug 933898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3216">SUSE bug 933898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3216">SUSE bug 933898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3216">SUSE bug 933898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3216">SUSE bug 933898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3216">SUSE bug 933898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3216">SUSE bug 933898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3216">SUSE bug 933898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3216">SUSE bug 933898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3216">SUSE bug 933898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3216">SUSE bug 933898</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3216">SUSE bug 933898</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3217</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3217" source="CVE"/>
    <description>
    PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3217.html">CVE-2015-3217</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3217">SUSE bug 933878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3217">SUSE bug 933878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3217">SUSE bug 933878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3217">SUSE bug 933878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3217">SUSE bug 933878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3217">SUSE bug 933878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3217">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3217">SUSE bug 933878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3217">SUSE bug 933878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3217">SUSE bug 933878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3217">SUSE bug 933878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3217">SUSE bug 933878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3217">SUSE bug 933878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3217">SUSE bug 933878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3217">SUSE bug 933878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3217">SUSE bug 933878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3217">SUSE bug 933878</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3218</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3218" source="CVE"/>
    <description>
    The authentication_agent_new function in polkitbackend/polkitbackendinteractiveauthority.c in PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (NULL pointer dereference and polkitd daemon crash) by calling RegisterAuthenticationAgent with an invalid object path.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3218.html">CVE-2015-3218</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3218">SUSE bug 933922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3218">SUSE bug 933922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3218">SUSE bug 933922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3218">SUSE bug 933922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3218">SUSE bug 943816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3218">SUSE bug 933922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3218">SUSE bug 933922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3218">SUSE bug 933922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3218">SUSE bug 933922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3218">SUSE bug 933922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3218">SUSE bug 933922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3218">SUSE bug 933922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3218">SUSE bug 933922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3218">SUSE bug 933922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3218">SUSE bug 933922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3218">SUSE bug 933922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3218">SUSE bug 933922</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117747" comment="libpolkit0-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151393" comment="libpolkit0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117748" comment="libpolkit0-32bit-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152720" comment="libpolkit0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117749" comment="polkit-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151394" comment="polkit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117750" comment="polkit-devel-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151395" comment="polkit-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117751" comment="polkit-doc-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152721" comment="polkit-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117752" comment="typelib-1_0-Polkit-1_0-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151396" comment="typelib-1_0-Polkit-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3223</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223" source="CVE"/>
    <description>
    The ldb_wildcard_compare function in ldb_match.c in ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles certain zero values, which allows remote attackers to cause a denial of service (infinite loop) via crafted packets.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3223.html">CVE-2015-3223</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3223">SUSE bug 958581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3223">SUSE bug 958581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3223">SUSE bug 958581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3223">SUSE bug 958581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3223">SUSE bug 958581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3223">SUSE bug 958581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3223">SUSE bug 958581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3223">SUSE bug 958581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3223">SUSE bug 958581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3223">SUSE bug 958581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3223">SUSE bug 958581</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119928" comment="ldb-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152722" comment="ldb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119929" comment="ldb-tools-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152723" comment="ldb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119930" comment="libdcerpc-atsvc-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152724" comment="libdcerpc-atsvc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119931" comment="libdcerpc-atsvc0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152725" comment="libdcerpc-atsvc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119932" comment="libdcerpc-atsvc0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152726" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119933" comment="libdcerpc-binding0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119934" comment="libdcerpc-binding0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119935" comment="libdcerpc-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119936" comment="libdcerpc-samr-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119937" comment="libdcerpc-samr0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119938" comment="libdcerpc-samr0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119939" comment="libdcerpc0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119940" comment="libdcerpc0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119941" comment="libgensec-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152731" comment="libgensec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119942" comment="libgensec0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119943" comment="libgensec0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119944" comment="libldb-devel-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152732" comment="libldb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119945" comment="libldb1-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152733" comment="libldb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119946" comment="libldb1-32bit-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152734" comment="libldb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119947" comment="libndr-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119948" comment="libndr-krb5pac-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119949" comment="libndr-krb5pac0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119950" comment="libndr-krb5pac0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119951" comment="libndr-nbt-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119952" comment="libndr-nbt0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119953" comment="libndr-nbt0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119954" comment="libndr-standard-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119955" comment="libndr-standard0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119956" comment="libndr-standard0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119957" comment="libndr0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119958" comment="libndr0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119959" comment="libnetapi-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119960" comment="libnetapi0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119961" comment="libnetapi0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119962" comment="libregistry-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152740" comment="libregistry-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119963" comment="libregistry0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119964" comment="libregistry0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152741" comment="libregistry0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119965" comment="libsamba-credentials-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119966" comment="libsamba-credentials0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119967" comment="libsamba-credentials0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119968" comment="libsamba-hostconfig-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119969" comment="libsamba-hostconfig0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119970" comment="libsamba-hostconfig0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119971" comment="libsamba-passdb-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119972" comment="libsamba-passdb0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119973" comment="libsamba-passdb0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119974" comment="libsamba-policy-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119975" comment="libsamba-policy0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119976" comment="libsamba-policy0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119977" comment="libsamba-util-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119978" comment="libsamba-util0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119979" comment="libsamba-util0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119980" comment="libsamdb-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119981" comment="libsamdb0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119982" comment="libsamdb0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119983" comment="libsmbclient-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119984" comment="libsmbclient-raw-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152750" comment="libsmbclient-raw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119985" comment="libsmbclient-raw0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119986" comment="libsmbclient-raw0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119987" comment="libsmbclient0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119988" comment="libsmbclient0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119989" comment="libsmbconf-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119990" comment="libsmbconf0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119991" comment="libsmbconf0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119992" comment="libsmbldap-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119993" comment="libsmbldap0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119994" comment="libsmbldap0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119995" comment="libtalloc-devel-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152754" comment="libtalloc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119996" comment="libtalloc2-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152755" comment="libtalloc2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119997" comment="libtalloc2-32bit-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152756" comment="libtalloc2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119998" comment="libtdb-devel-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152757" comment="libtdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119999" comment="libtdb1-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152758" comment="libtdb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120000" comment="libtdb1-32bit-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152759" comment="libtdb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120001" comment="libtevent-devel-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152760" comment="libtevent-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120002" comment="libtevent-util-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120003" comment="libtevent-util0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120004" comment="libtevent-util0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120005" comment="libtevent0-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152762" comment="libtevent0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120006" comment="libtevent0-32bit-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152763" comment="libtevent0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120007" comment="libwbclient-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120008" comment="libwbclient0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120009" comment="libwbclient0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120010" comment="pyldb-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152765" comment="pyldb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120011" comment="pyldb-32bit-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152766" comment="pyldb-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120012" comment="pyldb-devel-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152767" comment="pyldb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120013" comment="pytalloc-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152768" comment="pytalloc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120014" comment="pytalloc-32bit-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152769" comment="pytalloc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120015" comment="pytalloc-devel-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152770" comment="pytalloc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120016" comment="python-tdb-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152771" comment="python-tdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120017" comment="python-tdb-32bit-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152772" comment="python-tdb-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120018" comment="python-tevent-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152773" comment="python-tevent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120019" comment="python-tevent-32bit-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152774" comment="python-tevent-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120020" comment="samba-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120021" comment="samba-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120022" comment="samba-client-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120023" comment="samba-client-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120024" comment="samba-core-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120025" comment="samba-doc-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120026" comment="samba-libs-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120027" comment="samba-libs-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120028" comment="samba-pidl-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120029" comment="samba-python-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120030" comment="samba-test-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120031" comment="samba-test-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152779" comment="samba-test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120032" comment="samba-winbind-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120033" comment="samba-winbind-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120034" comment="talloc-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152780" comment="talloc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120035" comment="tdb-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152781" comment="tdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120036" comment="tdb-tools-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152782" comment="tdb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120037" comment="tevent-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152783" comment="tevent is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3228</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3228" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3228" source="CVE"/>
    <description>
    Integer overflow in the gs_heap_alloc_bytes function in base/gsmalloc.c in Ghostscript 9.15 and earlier allows remote attackers to cause a denial of service (crash) via a crafted Postscript (ps) file, as demonstrated by using the ps2pdf command, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3228.html">CVE-2015-3228</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3228">SUSE bug 939342</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3228">SUSE bug 939342</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3228">SUSE bug 939342</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3228">SUSE bug 939342</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3228">SUSE bug 939342</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3228">SUSE bug 939342</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3228">SUSE bug 939342</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3228">SUSE bug 939342</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125693" comment="ghostscript-9.15-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125694" comment="ghostscript-devel-9.15-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125695" comment="ghostscript-mini-9.15-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125696" comment="ghostscript-mini-devel-9.15-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125697" comment="ghostscript-x11-9.15-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3247</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3247" source="CVE"/>
    <description>
    Race condition in the worker_update_monitors_config function in SPICE 0.12.4 allows a remote authenticated guest user to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3247.html">CVE-2015-3247</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3247">SUSE bug 944460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3247">SUSE bug 944460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3247">SUSE bug 944460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3247">SUSE bug 944460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3247">SUSE bug 944460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3247">SUSE bug 944460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3247">SUSE bug 944460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3247">SUSE bug 944460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3247">SUSE bug 944460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3247">SUSE bug 944460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3247">SUSE bug 944460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3247">SUSE bug 944460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3247">SUSE bug 944460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3247">SUSE bug 944460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3247">SUSE bug 944460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3247">SUSE bug 944460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138874" comment="libspice-server1-0.12.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151923" comment="libspice-server1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3255</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3255" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3255" source="CVE"/>
    <description>
    The polkit_backend_action_pool_init function in polkitbackend/polkitbackendactionpool.c in PolicyKit (aka polkit) before 0.113 might allow local users to gain privileges via duplicate action IDs in action descriptions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3255.html">CVE-2015-3255</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3255">SUSE bug 939246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3255">SUSE bug 939246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3255">SUSE bug 939246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3255">SUSE bug 939246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3255">SUSE bug 939246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3255">SUSE bug 939246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3255">SUSE bug 939246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3255">SUSE bug 943816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3255">SUSE bug 939246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3255">SUSE bug 939246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3255">SUSE bug 939246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3255">SUSE bug 939246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3255">SUSE bug 939246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3255">SUSE bug 939246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3255">SUSE bug 939246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3255">SUSE bug 939246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3255">SUSE bug 939246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3255">SUSE bug 939246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3255">SUSE bug 939246</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117747" comment="libpolkit0-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151393" comment="libpolkit0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117748" comment="libpolkit0-32bit-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152720" comment="libpolkit0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117749" comment="polkit-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151394" comment="polkit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117750" comment="polkit-devel-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151395" comment="polkit-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117751" comment="polkit-doc-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152721" comment="polkit-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117752" comment="typelib-1_0-Polkit-1_0-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151396" comment="typelib-1_0-Polkit-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3256</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3256" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3256" source="CVE"/>
    <description>
    PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (memory corruption and polkitd daemon crash) and possibly gain privileges via unspecified vectors, related to "javascript rule evaluation."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3256.html">CVE-2015-3256</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3256">SUSE bug 943816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3256">SUSE bug 943816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3256">SUSE bug 943816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3256">SUSE bug 943816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3256">SUSE bug 943816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3256">SUSE bug 943816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3256">SUSE bug 943816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3256">SUSE bug 943816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3256">SUSE bug 943816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3256">SUSE bug 943816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3256">SUSE bug 943816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3256">SUSE bug 943816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3256">SUSE bug 943816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3256">SUSE bug 943816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3256">SUSE bug 943816</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117747" comment="libpolkit0-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151393" comment="libpolkit0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117748" comment="libpolkit0-32bit-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152720" comment="libpolkit0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117749" comment="polkit-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151394" comment="polkit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117750" comment="polkit-devel-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151395" comment="polkit-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117751" comment="polkit-doc-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152721" comment="polkit-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117752" comment="typelib-1_0-Polkit-1_0-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151396" comment="typelib-1_0-Polkit-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3258</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3258" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258" source="CVE"/>
    <description>
    Heap-based buffer overflow in the WriteProlog function in filter/texttopdf.c in texttopdf in cups-filters before 1.0.70 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a small line size in a print job.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3258.html">CVE-2015-3258</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3258">SUSE bug 936281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3258">SUSE bug 936281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3258">SUSE bug 936281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3258">SUSE bug 936281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3258">SUSE bug 936281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3258">SUSE bug 937018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3258">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3258">SUSE bug 936281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3258">SUSE bug 937018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3258">SUSE bug 936281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3258">SUSE bug 936281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3258">SUSE bug 936281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3258">SUSE bug 936281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3258">SUSE bug 936281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3258">SUSE bug 936281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3258">SUSE bug 936281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3258">SUSE bug 937018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3258">SUSE bug 936281</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138205" comment="cups-filters-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151947" comment="cups-filters is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138206" comment="cups-filters-cups-browsed-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151948" comment="cups-filters-cups-browsed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138207" comment="cups-filters-foomatic-rip-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151949" comment="cups-filters-foomatic-rip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138208" comment="cups-filters-ghostscript-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151950" comment="cups-filters-ghostscript is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3259</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3259" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259" source="CVE"/>
    <description>
    Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long configuration argument.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3259.html">CVE-2015-3259</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3259">SUSE bug 935634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3259">SUSE bug 936281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3259">SUSE bug 937018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3259">SUSE bug 935634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3259">SUSE bug 935634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3259">SUSE bug 935634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3259">SUSE bug 935634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3259">SUSE bug 935634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3259">SUSE bug 935634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3259">SUSE bug 935634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3259">SUSE bug 935634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3259">SUSE bug 935634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3259">SUSE bug 935634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3259">SUSE bug 935634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3259">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3259">SUSE bug 935634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3259">SUSE bug 935634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3259">SUSE bug 935634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3259">SUSE bug 935634</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118975" comment="xen-devel-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118979" comment="xen-libs-32bit-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3279</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3279" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279" source="CVE"/>
    <description>
    Integer overflow in filter/texttopdf.c in texttopdf in cups-filters before 1.0.71 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted line size in a print job, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3279.html">CVE-2015-3279</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3279">SUSE bug 937018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3279">SUSE bug 921753</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3279">SUSE bug 936281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3279">SUSE bug 937018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3279">SUSE bug 936281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3279">SUSE bug 937018</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138205" comment="cups-filters-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151947" comment="cups-filters is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138206" comment="cups-filters-cups-browsed-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151948" comment="cups-filters-cups-browsed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138207" comment="cups-filters-foomatic-rip-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151949" comment="cups-filters-foomatic-rip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138208" comment="cups-filters-ghostscript-1.0.58-10.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151950" comment="cups-filters-ghostscript is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3294</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3294" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3294" source="CVE"/>
    <description>
    The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3294.html">CVE-2015-3294</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3294">SUSE bug 923144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3294">SUSE bug 928867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3294">SUSE bug 928867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3294">SUSE bug 928867</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138242" comment="dnsmasq-2.71-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3310</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3310" source="CVE"/>
    <description>
    Buffer overflow in the rc_mksid function in plugins/radius/util.c in Paul's PPP Package (ppp) 2.4.6 and earlier, when the PID for pppd is greater than 65535, allows remote attackers to cause a denial of service (crash) via a start accounting message to the RADIUS server.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3310.html">CVE-2015-3310</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3310">SUSE bug 927841</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3310">SUSE bug 927841</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3310">SUSE bug 927841</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3310">SUSE bug 927841</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3310">SUSE bug 927841</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3310">SUSE bug 927841</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3310">SUSE bug 927841</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3310">SUSE bug 927841</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3310">SUSE bug 927841</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3310">SUSE bug 927841</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3310">SUSE bug 927841</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118321" comment="ppp-2.4.7-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152115" comment="ppp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118322" comment="ppp-devel-2.4.7-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152785" comment="ppp-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3329</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3329" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3329" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allow remote attackers to execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3329.html">CVE-2015-3329</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3329">SUSE bug 928408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3329">SUSE bug 928506</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3329">SUSE bug 928511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3329">SUSE bug 928506</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3329">SUSE bug 928506</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3329">SUSE bug 928506</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3329">SUSE bug 928506</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3329">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3330</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3330" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3330" source="CVE"/>
    <description>
    The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, when the Apache HTTP Server 2.4.x is used, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via pipelined HTTP requests that result in a "deconfigured interpreter."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3330.html">CVE-2015-3330</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3330">SUSE bug 928408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3330">SUSE bug 928408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3330">SUSE bug 928506</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3330">SUSE bug 928511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3330">SUSE bug 928408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3330">SUSE bug 908782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3330">SUSE bug 908782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3330">SUSE bug 928408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3340</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340" source="CVE"/>
    <description>
    Xen 4.2.x through 4.5.x does not initialize certain fields, which allows certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3340.html">CVE-2015-3340</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3340">SUSE bug 927967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3340">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3340">SUSE bug 927967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3340">SUSE bug 927967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3340">SUSE bug 927967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3340">SUSE bug 927967</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3405</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3405" source="CVE"/>
    <description>
    ntp-keygen in ntp 4.2.8px before 4.2.8p2-RC2 and 4.3.x before 4.3.12 does not generate MD5 keys with sufficient entropy on big endian machines when the lowest order byte of the temp variable is between 0x20 and 0x7f and not #, which might allow remote attackers to obtain the value of generated MD5 keys via a brute force attack with the 93 possible keys.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3405.html">CVE-2015-3405</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3405">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3405">SUSE bug 928321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3405">SUSE bug 928321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3405">SUSE bug 928321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3405">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3405">SUSE bug 928321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3405">SUSE bug 928321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3405">SUSE bug 928321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3405">SUSE bug 924202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3405">SUSE bug 928321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3405">SUSE bug 928321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3405">SUSE bug 928321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3405">SUSE bug 928321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3405">SUSE bug 928321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3405">SUSE bug 928321</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138997" comment="ntp-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138998" comment="ntp-doc-4.2.8p3-7.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3411</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3411" source="CVE"/>
    <description>
    PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument load method, (2) the xmlwriter_open_uri function, (3) the finfo_file function, or (4) the hash_hmac_file function, as demonstrated by a filename\0.xml attack that bypasses an intended configuration in which client users may read only .xml files.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3411.html">CVE-2015-3411</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3411">SUSE bug 935227</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3412</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3412" source="CVE"/>
    <description>
    PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3412.html">CVE-2015-3412</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3412">SUSE bug 935229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3412">SUSE bug 935232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3412">SUSE bug 935229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3412">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3412">SUSE bug 935229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3412">SUSE bug 935232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3412">SUSE bug 935229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3412">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3412">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3412">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3412">SUSE bug 935229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3412">SUSE bug 935229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3412">SUSE bug 935229</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3412">SUSE bug 935229</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3451</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3451" source="CVE"/>
    <description>
    The _clone function in XML::LibXML before 2.0119 does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3451.html">CVE-2015-3451</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3451">SUSE bug 929237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3451">SUSE bug 929237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3451">SUSE bug 929237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3451">SUSE bug 929237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3451">SUSE bug 929237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3451">SUSE bug 929237</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139031" comment="perl-XML-LibXML-2.0019-5.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152786" comment="perl-XML-LibXML is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3455</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3455" source="CVE"/>
    <description>
    Squid 3.2.x before 3.2.14, 3.3.x before 3.3.14, 3.4.x before 3.4.13, and 3.5.x before 3.5.4, when configured with client-first SSL-bump, do not properly validate the domain or hostname fields of X.509 certificates, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3455.html">CVE-2015-3455</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3455">SUSE bug 929493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3455">SUSE bug 929493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3455">SUSE bug 929493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3455">SUSE bug 929493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3455">SUSE bug 929493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3455">SUSE bug 929493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3455">SUSE bug 929493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3455">SUSE bug 929493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3455">SUSE bug 929493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3455">SUSE bug 929493</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135205" comment="squid-3.3.14-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3456</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456" source="CVE"/>
    <description>
    The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3456.html">CVE-2015-3456</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 932770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 929339</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 935900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 935900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 935900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 935900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 935900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 935900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 935900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 935900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 935900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 935900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 935900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 935900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 935900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3456">SUSE bug 935900</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139122" comment="virtualbox-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139123" comment="virtualbox-guest-kmp-default-5.0.6_k4.1.12_1-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139124" comment="virtualbox-guest-tools-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139125" comment="virtualbox-guest-x11-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139126" comment="virtualbox-host-kmp-default-5.0.6_k4.1.12_1-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139127" comment="virtualbox-qt-5.0.6-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3622</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3622" source="CVE"/>
    <description>
    The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3622.html">CVE-2015-3622</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3622">SUSE bug 929414</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138369" comment="gnutls-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138370" comment="libgnutls-devel-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138371" comment="libgnutls-openssl27-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151158" comment="libgnutls-openssl27 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138372" comment="libgnutls28-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151159" comment="libgnutls28 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138373" comment="libgnutls28-32bit-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151160" comment="libgnutls28-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129262" comment="libtasn1-3.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152119" comment="libtasn1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129263" comment="libtasn1-6-3.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152120" comment="libtasn1-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129264" comment="libtasn1-6-32bit-3.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152121" comment="libtasn1-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129265" comment="libtasn1-devel-3.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152122" comment="libtasn1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129266" comment="libtasn1-devel-32bit-3.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152787" comment="libtasn1-devel-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3658</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3658" source="CVE"/>
    <description>
    The Page Loading functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly consider redirects during decisions about sending an Origin header, which makes it easier for remote attackers to bypass CSRF protection mechanisms via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3658.html">CVE-2015-3658</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3658">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3659</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3659" source="CVE"/>
    <description>
    The SQLite authorizer in the Storage functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly restrict access to SQL functions, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3659.html">CVE-2015-3659</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3659">SUSE bug 936835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3659">SUSE bug 936835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3659">SUSE bug 936835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3659">SUSE bug 936835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3659">SUSE bug 936836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3659">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3660</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3660" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the PDF functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7 allows remote attackers to inject arbitrary web script or HTML via a crafted URL in embedded PDF content.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3660.html">CVE-2015-3660</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3660">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3727</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3727" source="CVE"/>
    <description>
    WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly restrict rename operations on WebSQL tables, which allows remote attackers to access an arbitrary web site's database via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3727.html">CVE-2015-3727</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3727">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3730</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3730" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3730.html">CVE-2015-3730</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3730">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3731</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3731" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3731.html">CVE-2015-3731</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3731">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3738</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3738" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3738.html">CVE-2015-3738</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3738">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3740</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3740" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3740.html">CVE-2015-3740</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3740">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3741</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3741" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3741.html">CVE-2015-3741</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3741">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3742</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3742" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3742" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3742.html">CVE-2015-3742</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3742">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3743</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3743" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3743.html">CVE-2015-3743</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3743">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3744</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3744" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3744.html">CVE-2015-3744</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3744">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3745</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3745" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3745.html">CVE-2015-3745</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3745">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3746</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3746" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3746.html">CVE-2015-3746</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3746">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3747</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3747" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3747.html">CVE-2015-3747</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3747">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3748</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3748" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3748.html">CVE-2015-3748</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3748">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3749</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3749" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3749.html">CVE-2015-3749</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3749">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3750</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3750" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3750" source="CVE"/>
    <description>
    WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not enforce the HTTP Strict Transport Security (HSTS) protection mechanism for Content Security Policy (CSP) report requests, which allows man-in-the-middle attackers to obtain sensitive information by sniffing the network or spoof a report by modifying the client-server data stream.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3750.html">CVE-2015-3750</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3750">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3751</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3751" source="CVE"/>
    <description>
    WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, allows remote attackers to bypass a Content Security Policy protection mechanism by using a video control in conjunction with an IMG element within an OBJECT element.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3751.html">CVE-2015-3751</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3751">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3752</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3752" source="CVE"/>
    <description>
    The Content Security Policy implementation in WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not properly restrict cookie transmission for report requests, which allows remote attackers to obtain sensitive information via vectors involving (1) a cross-origin request or (2) a private-browsing request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3752.html">CVE-2015-3752</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3752">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3754</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3754" source="CVE"/>
    <description>
    The private-browsing implementation in WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8 does not prevent caching of HTTP authentication credentials, which makes it easier for remote attackers to track users via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3754.html">CVE-2015-3754</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3754">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3755</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3755" source="CVE"/>
    <description>
    WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, allows remote attackers to spoof the user interface via a malformed URL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3755.html">CVE-2015-3755</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3755">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3808</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808" source="CVE"/>
    <description>
    The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not reject a zero length, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3808.html">CVE-2015-3808</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3808">SUSE bug 930689</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3809</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809" source="CVE"/>
    <description>
    The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not properly track the current offset, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3809.html">CVE-2015-3809</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3809">SUSE bug 930689</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3810</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810" source="CVE"/>
    <description>
    epan/dissectors/packet-websocket.c in the WebSocket dissector in Wireshark 1.12.x before 1.12.5 uses a recursive algorithm, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3810.html">CVE-2015-3810</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3810">SUSE bug 930689</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3811</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811" source="CVE"/>
    <description>
    epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3811.html">CVE-2015-3811</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3811">SUSE bug 930689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3811">SUSE bug 930691</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3812</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812" source="CVE"/>
    <description>
    Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3812.html">CVE-2015-3812</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3812">SUSE bug 930689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3812">SUSE bug 930691</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3813</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813" source="CVE"/>
    <description>
    The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3813.html">CVE-2015-3813</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3813">SUSE bug 930689</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3814</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814" source="CVE"/>
    <description>
    The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3814.html">CVE-2015-3814</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3814">SUSE bug 930689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3814">SUSE bug 930691</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3815</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815" source="CVE"/>
    <description>
    The detect_version function in wiretap/logcat.c in the Android Logcat file parser in Wireshark 1.12.x before 1.12.5 does not check the length of the payload, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a packet with a crafted payload, as demonstrated by a length of zero, a different vulnerability than CVE-2015-3906.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3815.html">CVE-2015-3815</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3815">SUSE bug 930689</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3900</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-3900" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3900" source="CVE"/>
    <description>
    RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-3900.html">CVE-2015-3900</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3900">SUSE bug 936032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3900">SUSE bug 936032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3900">SUSE bug 936032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3900">SUSE bug 936032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3900">SUSE bug 936032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3900">SUSE bug 936032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3900">SUSE bug 936032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3900">SUSE bug 936032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3900">SUSE bug 936032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3900">SUSE bug 936032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3900">SUSE bug 936032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3900">SUSE bug 936032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3900">SUSE bug 936032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-3900">SUSE bug 936032</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154833" comment="libruby2_1-2_1-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152217" comment="libruby2_1-2_1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154834" comment="ruby2.1-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152218" comment="ruby2.1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154835" comment="ruby2.1-devel-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152219" comment="ruby2.1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154836" comment="ruby2.1-devel-extra-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154837" comment="ruby2.1-devel-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154838" comment="ruby2.1-doc-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154839" comment="ruby2.1-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154840" comment="ruby2.1-doc-ri-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154841" comment="ruby2.1-doc-ri is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154842" comment="ruby2.1-stdlib-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152220" comment="ruby2.1-stdlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4000</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" source="CVE"/>
    <description>
    The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4000.html">CVE-2015-4000</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 932026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 932483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 934789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 935033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 935540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 936168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 935979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 937202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 935979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 937766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 937724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 938432</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931723</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 938905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 938906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 938913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 938945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 941696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 941696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 941696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 941696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 941696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 941696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 943664</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 944729</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 955589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 955589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 980406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 980406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 980406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 980406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 980406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 931600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 990592</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4000">SUSE bug 1074631</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130446" comment="apache2-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130447" comment="apache2-devel-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130448" comment="apache2-doc-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130449" comment="apache2-example-pages-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130450" comment="apache2-prefork-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130451" comment="apache2-utils-2.4.16-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122305" comment="compat-libldap-2_3-0-2.3.37-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152788" comment="compat-libldap-2_3-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138623" comment="libfreebl3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122306" comment="libldap-2_4-2-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122307" comment="libldap-2_4-2-32bit-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138730" comment="libopenssl-devel-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138731" comment="libopenssl1_0_0-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138732" comment="libopenssl1_0_0-32bit-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138624" comment="libsoftokn3-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134337" comment="libtcnative-1-0-1.1.32-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152791" comment="libtcnative-1-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134338" comment="libtcnative-1-0-devel-1.1.32-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152792" comment="libtcnative-1-0-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138625" comment="mozilla-nss-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138626" comment="mozilla-nss-certs-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138627" comment="mozilla-nss-devel-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138628" comment="mozilla-nss-tools-3.20-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122308" comment="openldap2-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122309" comment="openldap2-back-meta-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122310" comment="openldap2-back-perl-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122311" comment="openldap2-back-sql-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122312" comment="openldap2-client-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122313" comment="openldap2-devel-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122314" comment="openldap2-devel-32bit-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122315" comment="openldap2-devel-static-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122316" comment="openldap2-doc-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138733" comment="openssl-1.0.1i-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123302" comment="socat-1.7.3.1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152801" comment="socat is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4021</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4021" source="CVE"/>
    <description>
    The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 does not verify that the first character of a filename is different from the \0 character, which allows remote attackers to cause a denial of service (integer underflow and memory corruption) via a crafted entry in a tar archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4021.html">CVE-2015-4021</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4021">SUSE bug 931769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4021">SUSE bug 931769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4021">SUSE bug 931769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4021">SUSE bug 931769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4021">SUSE bug 931769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4021">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4021">SUSE bug 931769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4021">SUSE bug 931769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4021">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4022</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4022" source="CVE"/>
    <description>
    Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4022.html">CVE-2015-4022</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4022">SUSE bug 931772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4022">SUSE bug 931772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4022">SUSE bug 931772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4022">SUSE bug 931772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4022">SUSE bug 935275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4022">SUSE bug 935275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4022">SUSE bug 931772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4022">SUSE bug 931772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4022">SUSE bug 931769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4022">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4022">SUSE bug 931772</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4024</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4024" source="CVE"/>
    <description>
    Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote attackers to cause a denial of service (CPU consumption) via crafted form data that triggers an improper order-of-growth outcome.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4024.html">CVE-2015-4024</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4024">SUSE bug 931421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4024">SUSE bug 931421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4024">SUSE bug 931421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4024">SUSE bug 931421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4024">SUSE bug 931421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4024">SUSE bug 931421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4024">SUSE bug 931421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4024">SUSE bug 931421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4024">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4026</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4026" source="CVE"/>
    <description>
    The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4026.html">CVE-2015-4026</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4026">SUSE bug 931776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4026">SUSE bug 931776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4026">SUSE bug 931776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4026">SUSE bug 931776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4026">SUSE bug 931776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4026">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4026">SUSE bug 931776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4026">SUSE bug 931776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4026">SUSE bug 931776</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4026">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4037</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037" source="CVE"/>
    <description>
    The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4037.html">CVE-2015-4037</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4037">SUSE bug 932267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4037">SUSE bug 932267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4037">SUSE bug 932267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4037">SUSE bug 932267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4037">SUSE bug 932267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4037">SUSE bug 932267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4037">SUSE bug 932267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4037">SUSE bug 932267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4037">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4037">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4037">SUSE bug 932267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4037">SUSE bug 932267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4037">SUSE bug 932267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4037">SUSE bug 932267</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139073" comment="qemu-linux-user-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117822" comment="xen-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117823" comment="xen-devel-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117824" comment="xen-doc-html-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117825" comment="xen-kmp-default-4.5.1_12_k4.1.12_1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117826" comment="xen-libs-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117827" comment="xen-libs-32bit-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117828" comment="xen-tools-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117829" comment="xen-tools-domU-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4041</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4041" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4041" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4041.html">CVE-2015-4041</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4041">SUSE bug 928749</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138173" comment="coreutils-8.22-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151803" comment="coreutils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138174" comment="coreutils-lang-8.22-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151804" comment="coreutils-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4042</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4042" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4042.html">CVE-2015-4042</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4042">SUSE bug 928749</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138173" comment="coreutils-8.22-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151803" comment="coreutils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138174" comment="coreutils-lang-8.22-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151804" comment="coreutils-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4047</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4047" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4047" source="CVE"/>
    <description>
    racoon/gssapi.c in IPsec-Tools 0.8.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4047.html">CVE-2015-4047</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4047">SUSE bug 931989</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4047">SUSE bug 931989</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4047">SUSE bug 931989</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4047">SUSE bug 931989</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4047">SUSE bug 931989</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4047">SUSE bug 931989</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138406" comment="ipsec-tools-0.8.0-4.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152802" comment="ipsec-tools is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4103</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103" source="CVE"/>
    <description>
    Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4103.html">CVE-2015-4103</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4103">SUSE bug 931625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4103">SUSE bug 931625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4103">SUSE bug 931625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4103">SUSE bug 931625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4103">SUSE bug 931625</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4104</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104" source="CVE"/>
    <description>
    Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4104.html">CVE-2015-4104</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4104">SUSE bug 931626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4104">SUSE bug 931626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4104">SUSE bug 931626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4104">SUSE bug 931626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4104">SUSE bug 931626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4104">SUSE bug 931626</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4105</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105" source="CVE"/>
    <description>
    Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4105.html">CVE-2015-4105</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4105">SUSE bug 931627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4105">SUSE bug 931627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4105">SUSE bug 931627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4105">SUSE bug 931627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4105">SUSE bug 931627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4105">SUSE bug 931627</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4106</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106" source="CVE"/>
    <description>
    QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4106.html">CVE-2015-4106</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4106">SUSE bug 931628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4106">SUSE bug 931628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4106">SUSE bug 931628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4106">SUSE bug 931628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4106">SUSE bug 931628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4106">SUSE bug 931628</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118975" comment="xen-devel-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118979" comment="xen-libs-32bit-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4116</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4116" source="CVE"/>
    <description>
    Use-after-free vulnerability in the spl_ptr_heap_insert function in ext/spl/spl_heap.c in PHP before 5.5.27 and 5.6.x before 5.6.11 allows remote attackers to execute arbitrary code by triggering a failed SplMinHeap::compare operation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4116.html">CVE-2015-4116</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4116">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4116">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4116">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4116">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4116">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4116">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4116">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4116">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4116">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4116">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4116">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4116">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4116">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4116">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4116">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4116">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4116">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4116">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4116">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128554" comment="apache2-mod_php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128555" comment="php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128556" comment="php5-bcmath-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128557" comment="php5-bz2-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128558" comment="php5-calendar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128559" comment="php5-ctype-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128560" comment="php5-curl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128561" comment="php5-dba-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128562" comment="php5-devel-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128563" comment="php5-dom-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128564" comment="php5-enchant-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128565" comment="php5-exif-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128566" comment="php5-fastcgi-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128567" comment="php5-fileinfo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128568" comment="php5-firebird-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128569" comment="php5-fpm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128570" comment="php5-ftp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128571" comment="php5-gd-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128572" comment="php5-gettext-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128573" comment="php5-gmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128574" comment="php5-iconv-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128575" comment="php5-imap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128576" comment="php5-intl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128577" comment="php5-json-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128578" comment="php5-ldap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128579" comment="php5-mbstring-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128580" comment="php5-mcrypt-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128581" comment="php5-mssql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128582" comment="php5-mysql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128583" comment="php5-odbc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128584" comment="php5-opcache-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128585" comment="php5-openssl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128586" comment="php5-pcntl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128587" comment="php5-pdo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128588" comment="php5-pear-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128589" comment="php5-pgsql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128590" comment="php5-phar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128591" comment="php5-posix-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128592" comment="php5-pspell-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128593" comment="php5-readline-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128594" comment="php5-shmop-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128595" comment="php5-snmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128596" comment="php5-soap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128597" comment="php5-sockets-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128598" comment="php5-sqlite-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128599" comment="php5-suhosin-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128600" comment="php5-sysvmsg-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128601" comment="php5-sysvsem-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128602" comment="php5-sysvshm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128603" comment="php5-tidy-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128604" comment="php5-tokenizer-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128605" comment="php5-wddx-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128606" comment="php5-xmlreader-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128607" comment="php5-xmlrpc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128608" comment="php5-xmlwriter-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128609" comment="php5-xsl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128610" comment="php5-zip-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128611" comment="php5-zlib-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4141</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4141" source="CVE"/>
    <description>
    The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4141.html">CVE-2015-4141</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4141">SUSE bug 930077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4141">SUSE bug 930077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4141">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4141">SUSE bug 930077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4141">SUSE bug 930077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4141">SUSE bug 930077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4141">SUSE bug 930077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4141">SUSE bug 930077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4141">SUSE bug 930077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4141">SUSE bug 930077</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009110201" comment="wpa_supplicant-2.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009110202" comment="wpa_supplicant-gui-2.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4142</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4142" source="CVE"/>
    <description>
    Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4142.html">CVE-2015-4142</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4142">SUSE bug 930078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4142">SUSE bug 930078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4142">SUSE bug 915323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4142">SUSE bug 930078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4142">SUSE bug 930078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4142">SUSE bug 930078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4142">SUSE bug 930078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4142">SUSE bug 930078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4142">SUSE bug 930078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4142">SUSE bug 930078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4142">SUSE bug 930078</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009110201" comment="wpa_supplicant-2.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009110202" comment="wpa_supplicant-gui-2.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4143</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4143" source="CVE"/>
    <description>
    The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4143.html">CVE-2015-4143</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4143">SUSE bug 930079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4143">SUSE bug 930079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4143">SUSE bug 930079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4143">SUSE bug 930079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4143">SUSE bug 930079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4143">SUSE bug 930079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4143">SUSE bug 930079</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009110201" comment="wpa_supplicant-2.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009110202" comment="wpa_supplicant-gui-2.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4148</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4148" source="CVE"/>
    <description>
    The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that the uri property is a string, which allows remote attackers to obtain sensitive information by providing crafted serialized data with an int data type, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4148.html">CVE-2015-4148</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4148">SUSE bug 933227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4148">SUSE bug 933227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4148">SUSE bug 933227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4148">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4148">SUSE bug 933227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4148">SUSE bug 933227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4148">SUSE bug 933227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4148">SUSE bug 933227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4148">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4148">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4473</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4473.html">CVE-2015-4473</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4473">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4474</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4474" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4474.html">CVE-2015-4474</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4474">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4475</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475" source="CVE"/>
    <description>
    The mozilla::AudioSink function in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 mishandles inconsistent sample formats within MP3 audio data, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a malformed file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4475.html">CVE-2015-4475</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4475">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4476</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4476" source="CVE"/>
    <description>
    Mozilla Firefox before 41.0 on Android allows user-assisted remote attackers to spoof address-bar attributes by leveraging lack of navigation after a paste of a URL with a nonstandard scheme, as demonstrated by spoofing an SSL attribute.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4476.html">CVE-2015-4476</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4476">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4477</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4477" source="CVE"/>
    <description>
    Use-after-free vulnerability in the MediaStream playback feature in Mozilla Firefox before 40.0 allows remote attackers to execute arbitrary code via unspecified use of the Web Audio API.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2015-4477.html">CVE-2015-4477</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4477">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125358" comment="MozillaThunderbird-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125359" comment="MozillaThunderbird-buildsymbols-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125360" comment="MozillaThunderbird-devel-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125361" comment="MozillaThunderbird-translations-common-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125362" comment="MozillaThunderbird-translations-other-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4478</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478" source="CVE"/>
    <description>
    Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 do not impose certain ECMAScript 6 requirements on JavaScript object properties, which allows remote attackers to bypass the Same Origin Policy via the reviver parameter to the JSON.parse method.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4478.html">CVE-2015-4478</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4478">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4479</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479" source="CVE"/>
    <description>
    Multiple integer overflows in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to execute arbitrary code via a crafted saio chunk in MPEG-4 video data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4479.html">CVE-2015-4479</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4479">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4480</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480" source="CVE"/>
    <description>
    Integer overflow in the stagefright::SampleTable::isValid function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via crafted MPEG-4 video data with H.264 encoding.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4480.html">CVE-2015-4480</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4480">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4481</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4481" source="CVE"/>
    <description>
    Race condition in the Mozilla Maintenance Service in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Windows allows local users to write to arbitrary files and consequently gain privileges via vectors involving a hard link to a log file during an update.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2015-4481.html">CVE-2015-4481</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4481">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4482</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4482" source="CVE"/>
    <description>
    mar_read.c in the Updater in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows local users to gain privileges or cause a denial of service (out-of-bounds write) via a crafted name of a Mozilla Archive (aka MAR) file.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2015-4482.html">CVE-2015-4482</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4482">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4483</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4483" source="CVE"/>
    <description>
    Mozilla Firefox before 40.0 allows man-in-the-middle attackers to bypass a mixed-content protection mechanism via a feed: URL in a POST request.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2015-4483.html">CVE-2015-4483</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4483">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4484</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484" source="CVE"/>
    <description>
    The js::jit::AssemblerX86Shared::lock_addl function in the JavaScript implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to cause a denial of service (application crash) by leveraging the use of shared memory and accessing (1) an Atomics object or (2) a SharedArrayBuffer object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4484.html">CVE-2015-4484</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4484">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4485</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485" source="CVE"/>
    <description>
    Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4485.html">CVE-2015-4485</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4485">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4486</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4486" source="CVE"/>
    <description>
    The decrease_ref_count function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via malformed WebM video data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4486.html">CVE-2015-4486</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4486">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4487</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" source="CVE"/>
    <description>
    The nsTSubstring::ReplacePrep function in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4487.html">CVE-2015-4487</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4487">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4488</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" source="CVE"/>
    <description>
    Use-after-free vulnerability in the StyleAnimationValue class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 allows remote attackers to have an unspecified impact by leveraging a StyleAnimationValue::operator self assignment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4488.html">CVE-2015-4488</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4488">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4489</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" source="CVE"/>
    <description>
    The nsTArray_Impl class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging a self assignment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4489.html">CVE-2015-4489</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4489">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4490</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4490" source="CVE"/>
    <description>
    The nsCSPHostSrc::permits function in dom/security/nsCSPUtils.cpp in Mozilla Firefox before 40.0 does not implement the Content Security Policy Level 2 exceptions for the blob, data, and filesystem URL schemes during wildcard source-expression matching, which might make it easier for remote attackers to conduct cross-site scripting (XSS) attacks by leveraging unexpected policy-enforcement behavior.
    </description>
<advisory from="security@suse.de">
<cve href="https://www.suse.com/security/cve/CVE-2015-4490.html">CVE-2015-4490</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4490">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4491</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491" source="CVE"/>
    <description>
    Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, as used in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that are mishandled during scaling.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4491.html">CVE-2015-4491</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 940806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 948790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4491">SUSE bug 942801</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138298" comment="gdk-pixbuf-devel-2.31.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151614" comment="gdk-pixbuf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138299" comment="gdk-pixbuf-lang-2.31.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151615" comment="gdk-pixbuf-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138300" comment="gdk-pixbuf-query-loaders-2.31.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151616" comment="gdk-pixbuf-query-loaders is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138301" comment="gdk-pixbuf-query-loaders-32bit-2.31.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151617" comment="gdk-pixbuf-query-loaders-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138302" comment="libgdk_pixbuf-2_0-0-2.31.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151618" comment="libgdk_pixbuf-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138303" comment="libgdk_pixbuf-2_0-0-32bit-2.31.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151619" comment="libgdk_pixbuf-2_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138304" comment="typelib-1_0-GdkPixbuf-2_0-2.31.6-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151620" comment="typelib-1_0-GdkPixbuf-2_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4492</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492" source="CVE"/>
    <description>
    Use-after-free vulnerability in the XMLHttpRequest::Open implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 might allow remote attackers to execute arbitrary code via a SharedWorker object that makes recursive calls to the open method of an XMLHttpRequest object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4492.html">CVE-2015-4492</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4492">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4493</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493" source="CVE"/>
    <description>
    Heap-based buffer overflow in the stagefright::ESDS::parseESDescriptor function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via an invalid size field in an esds chunk in MPEG-4 video data, a related issue to CVE-2015-1539.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4493.html">CVE-2015-4493</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4493">SUSE bug 940806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4495</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4495" source="CVE"/>
    <description>
    The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4495.html">CVE-2015-4495</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4495">SUSE bug 940918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4495">SUSE bug 940918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4495">SUSE bug 940918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4495">SUSE bug 940918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4495">SUSE bug 940918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4495">SUSE bug 940806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4495">SUSE bug 940918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4495">SUSE bug 940918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4495">SUSE bug 940918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4495">SUSE bug 940918</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4497</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CanvasRenderingContext2D implementation in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token sequences for a CANVAS element.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4497.html">CVE-2015-4497</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4497">SUSE bug 943550</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4497">SUSE bug 943557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4497">SUSE bug 943557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4497">SUSE bug 943557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4497">SUSE bug 943557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4497">SUSE bug 943557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4497">SUSE bug 943557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4497">SUSE bug 943608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4497">SUSE bug 943557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4497">SUSE bug 943557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4497">SUSE bug 943557</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4498</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498" source="CVE"/>
    <description>
    The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point in the installation process.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4498.html">CVE-2015-4498</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4498">SUSE bug 943550</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4498">SUSE bug 943558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4498">SUSE bug 943558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4498">SUSE bug 943558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4498">SUSE bug 943558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4498">SUSE bug 943558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4498">SUSE bug 943558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4498">SUSE bug 943608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4498">SUSE bug 943558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4498">SUSE bug 943558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4498">SUSE bug 943558</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4500</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4500.html">CVE-2015-4500</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4500">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4501</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4501" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 41.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4501.html">CVE-2015-4501</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4501">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4502</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4502" source="CVE"/>
    <description>
    js/src/proxy/Proxy.cpp in Mozilla Firefox before 41.0 mishandles certain receiver arguments, which allows remote attackers to bypass intended window access restrictions via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4502.html">CVE-2015-4502</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4502">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4503</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4503" source="CVE"/>
    <description>
    The TCP Socket API implementation in Mozilla Firefox before 41.0 mishandles array boundaries that were established with a navigator.mozTCPSocket.open method call and send method calls, which allows remote TCP servers to obtain sensitive information from process memory by reading packet data, as demonstrated by availability of this API in a Firefox OS application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4503.html">CVE-2015-4503</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4503">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4504</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4504" source="CVE"/>
    <description>
    The lut_inverse_interp16 function in the QCMS library in Mozilla Firefox before 41.0 allows remote attackers to obtain sensitive information or cause a denial of service (buffer over-read and application crash) via crafted attributes in the ICC 4 profile of an image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4504.html">CVE-2015-4504</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4504">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4505</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4505" source="CVE"/>
    <description>
    updater.exe in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 on Windows allows local users to write to arbitrary files by conducting a junction attack and waiting for an update operation by the Mozilla Maintenance Service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4505.html">CVE-2015-4505</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4505">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4506</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" source="CVE"/>
    <description>
    Buffer overflow in the vp9_init_context_buffers function in libvpx, as used in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3, allows remote attackers to execute arbitrary code via a crafted VP9 file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4506.html">CVE-2015-4506</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4506">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4507</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4507" source="CVE"/>
    <description>
    The SavedStacks class in the JavaScript implementation in Mozilla Firefox before 41.0, when the Debugger API is enabled, allows remote attackers to cause a denial of service (getSlotRef assertion failure and application exit) or possibly execute arbitrary code via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4507.html">CVE-2015-4507</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4507">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4508</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4508" source="CVE"/>
    <description>
    Mozilla Firefox before 41.0, when reader mode is enabled, allows remote attackers to spoof the relationship between address-bar URLs and web content via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4508.html">CVE-2015-4508</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4508">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4509</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" source="CVE"/>
    <description>
    Use-after-free vulnerability in the HTMLVideoElement interface in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via crafted JavaScript code that modifies the URI table of a media element, aka ZDI-CAN-3176.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4509.html">CVE-2015-4509</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4509">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4510</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4510" source="CVE"/>
    <description>
    Race condition in the WorkerPrivate::NotifyFeatures function in Mozilla Firefox before 41.0 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) by leveraging improper interaction between shared workers and the IndexedDB implementation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4510.html">CVE-2015-4510</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4510">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4511</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nestegg_track_codec_data function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via a crafted header in a WebM video.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4511.html">CVE-2015-4511</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4511">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4512</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4512" source="CVE"/>
    <description>
    gfx/2d/DataSurfaceHelpers.cpp in Mozilla Firefox before 41.0 on Linux improperly attempts to use the Cairo library with 32-bit color-depth surface creation followed by 16-bit color-depth surface display, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) by using a CANVAS element to trigger 2D rendering.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4512.html">CVE-2015-4512</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4512">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4513</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4513.html">CVE-2015-4513</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4513">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118833" comment="MozillaThunderbird-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118834" comment="MozillaThunderbird-buildsymbols-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118835" comment="MozillaThunderbird-devel-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118836" comment="MozillaThunderbird-translations-common-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118837" comment="MozillaThunderbird-translations-other-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4514</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4514" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 42.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4514.html">CVE-2015-4514</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4514">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118833" comment="MozillaThunderbird-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118834" comment="MozillaThunderbird-buildsymbols-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118835" comment="MozillaThunderbird-devel-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118836" comment="MozillaThunderbird-translations-common-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118837" comment="MozillaThunderbird-translations-other-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4515</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4515" source="CVE"/>
    <description>
    Mozilla Firefox before 42.0, when NTLM v1 is enabled for HTTP authentication, allows remote attackers to obtain sensitive hostname information by constructing a crafted web site that sends an NTLM request and reads the Workstation field of an NTLM type 3 message.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4515.html">CVE-2015-4515</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4515">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4516</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4516" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4516" source="CVE"/>
    <description>
    Mozilla Firefox before 41.0 allows remote attackers to bypass certain ECMAScript 5 (aka ES5) API protection mechanisms and modify immutable properties, and consequently execute arbitrary JavaScript code with chrome privileges, via a crafted web page that does not use ES5 APIs.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4516.html">CVE-2015-4516</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4516">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4517</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" source="CVE"/>
    <description>
    NetworkUtils.cpp in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4517.html">CVE-2015-4517</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4517">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4518</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4518" source="CVE"/>
    <description>
    The Reader View implementation in Mozilla Firefox before 42.0 has an improper whitelist, which makes it easier for remote attackers to bypass the Content Security Policy (CSP) protection mechanism and conduct cross-site scripting (XSS) attacks via vectors involving SVG animations and the about:reader URL.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4518.html">CVE-2015-4518</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4518">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4519</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" source="CVE"/>
    <description>
    Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow user-assisted remote attackers to bypass intended access restrictions and discover a redirect's target URL via crafted JavaScript code that executes after a drag-and-drop action of an image into a TEXTBOX element.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4519.html">CVE-2015-4519</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4519">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4520</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" source="CVE"/>
    <description>
    Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to bypass CORS preflight protection mechanisms by leveraging (1) duplicate cache-key generation or (2) retrieval of a value from an incorrect HTTP Access-Control-* response header.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4520.html">CVE-2015-4520</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4520">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4521</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" source="CVE"/>
    <description>
    The ConvertDialogOptions function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4521.html">CVE-2015-4521</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4521">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4522</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" source="CVE"/>
    <description>
    The nsUnicodeToUTF8::GetMaxLength function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4522.html">CVE-2015-4522</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4522">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4588</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588" source="CVE"/>
    <description>
    Heap-based buffer overflow in the DecodeImage function in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted "run-length count" in an image in a WMF file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4588.html">CVE-2015-4588</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4588">SUSE bug 933109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4588">SUSE bug 933109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4588">SUSE bug 933109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4588">SUSE bug 933109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4588">SUSE bug 933109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4588">SUSE bug 933109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4588">SUSE bug 933109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138934" comment="libwmf-0_2-7-0.2.8.4-240.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152632" comment="libwmf-0_2-7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138935" comment="libwmf-tools-0.2.8.4-240.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152633" comment="libwmf-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4598</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4598" source="CVE"/>
    <description>
    PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument save method or (2) the GD imagepsloadfont function, as demonstrated by a filename\0.html attack that bypasses an intended configuration in which client users may write to only .html files.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4598.html">CVE-2015-4598</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4598">SUSE bug 935232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4598">SUSE bug 935232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4598">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4598">SUSE bug 935232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4598">SUSE bug 935232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4598">SUSE bug 935232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4598">SUSE bug 935232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4598">SUSE bug 935232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4598">SUSE bug 935232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4598">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4598">SUSE bug 935232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4598">SUSE bug 935227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4598">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4598">SUSE bug 935232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4598">SUSE bug 935232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4598">SUSE bug 935232</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4599</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4599" source="CVE"/>
    <description>
    The SoapFault::__toString method in ext/soap/soap.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information, cause a denial of service (application crash), or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4599.html">CVE-2015-4599</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4599">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4599">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4599">SUSE bug 935234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4599">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4599">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4599">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4599">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4599">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4599">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4599">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4599">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4599">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4599">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4599">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4599">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4599">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4599">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4599">SUSE bug 935226</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4600</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4600" source="CVE"/>
    <description>
    The SoapClient implementation in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in the (1) SoapClient::__getLastRequest, (2) SoapClient::__getLastResponse, (3) SoapClient::__getLastRequestHeaders, (4) SoapClient::__getLastResponseHeaders, (5) SoapClient::__getCookies, and (6) SoapClient::__setCookie methods.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4600.html">CVE-2015-4600</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4600">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4600">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4600">SUSE bug 935234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4600">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4600">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4600">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4600">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4600">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4600">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4600">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4600">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4600">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4600">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4600">SUSE bug 935226</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4601</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4601" source="CVE"/>
    <description>
    PHP before 5.6.7 might allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in (1) ext/soap/php_encoding.c, (2) ext/soap/php_http.c, and (3) ext/soap/soap.c, a different issue than CVE-2015-4600.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4601.html">CVE-2015-4601</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4601">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4601">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4601">SUSE bug 935234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4601">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4601">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4601">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4601">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4601">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4601">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4601">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4601">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4601">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4601">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4601">SUSE bug 935226</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4602</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4602" source="CVE"/>
    <description>
    The __PHP_Incomplete_Class function in ext/standard/incomplete_class.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4602.html">CVE-2015-4602</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4602">SUSE bug 935224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4602">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4602">SUSE bug 935224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4602">SUSE bug 935224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4602">SUSE bug 935224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4602">SUSE bug 935224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4602">SUSE bug 935224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4602">SUSE bug 935224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4602">SUSE bug 935224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4602">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4602">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4602">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4602">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4602">SUSE bug 935224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4602">SUSE bug 935224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4602">SUSE bug 935224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4602">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4602">SUSE bug 935224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4602">SUSE bug 935224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4602">SUSE bug 935224</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4603</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4603" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4603" source="CVE"/>
    <description>
    The exception::getTraceAsString function in Zend/zend_exceptions.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4603.html">CVE-2015-4603</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4603">SUSE bug 935234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4603">SUSE bug 935226</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4603">SUSE bug 935234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4603">SUSE bug 935234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4603">SUSE bug 935234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4603">SUSE bug 935234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4603">SUSE bug 935234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4603">SUSE bug 935234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4603">SUSE bug 935234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4603">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4603">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4603">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4603">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4603">SUSE bug 935234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4603">SUSE bug 935234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4603">SUSE bug 935234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4603">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4603">SUSE bug 935234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4603">SUSE bug 935234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4603">SUSE bug 935234</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4620</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4620" source="CVE"/>
    <description>
    name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4620.html">CVE-2015-4620</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4620">SUSE bug 936476</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4620">SUSE bug 936476</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4620">SUSE bug 936476</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4620">SUSE bug 936476</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4620">SUSE bug 936476</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4620">SUSE bug 936476</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4620">SUSE bug 936476</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4620">SUSE bug 936476</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4620">SUSE bug 936476</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4620">SUSE bug 936476</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4620">SUSE bug 936476</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4620">SUSE bug 936476</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4620">SUSE bug 936476</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4625</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4625" source="CVE"/>
    <description>
    Integer overflow in the authentication_agent_new_cookie function in PolicyKit (aka polkit) before 0.113 allows local users to gain privileges by creating a large number of connections, which triggers the issuance of a duplicate cookie value.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4625.html">CVE-2015-4625</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4625">SUSE bug 935119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4625">SUSE bug 935119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4625">SUSE bug 935119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4625">SUSE bug 935119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4625">SUSE bug 935119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4625">SUSE bug 943816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4625">SUSE bug 935119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4625">SUSE bug 935119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4625">SUSE bug 935119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4625">SUSE bug 935119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4625">SUSE bug 935119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4625">SUSE bug 935119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4625">SUSE bug 935119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4625">SUSE bug 935119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4625">SUSE bug 935119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4625">SUSE bug 935119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4625">SUSE bug 935119</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117747" comment="libpolkit0-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151393" comment="libpolkit0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117748" comment="libpolkit0-32bit-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152720" comment="libpolkit0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117749" comment="polkit-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151394" comment="polkit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117750" comment="polkit-devel-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151395" comment="polkit-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117751" comment="polkit-doc-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152721" comment="polkit-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117752" comment="typelib-1_0-Polkit-1_0-0.113-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151396" comment="typelib-1_0-Polkit-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4643</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4643" source="CVE"/>
    <description>
    Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4022.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4643.html">CVE-2015-4643</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4643">SUSE bug 935275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4643">SUSE bug 935275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4643">SUSE bug 935275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4643">SUSE bug 935275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4643">SUSE bug 935275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4643">SUSE bug 935275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4643">SUSE bug 935275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4643">SUSE bug 935275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4643">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4643">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4643">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4643">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4643">SUSE bug 931769</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4643">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4643">SUSE bug 935275</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4643">SUSE bug 935275</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4644</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4644" source="CVE"/>
    <description>
    The php_pgsql_meta_data function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not validate token extraction for table names, which might allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1352.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4644.html">CVE-2015-4644</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4644">SUSE bug 935274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4644">SUSE bug 935274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4644">SUSE bug 935274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4644">SUSE bug 935274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4644">SUSE bug 935274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4644">SUSE bug 935274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4644">SUSE bug 935274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4644">SUSE bug 935274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4644">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4644">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4644">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4644">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4644">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4644">SUSE bug 935274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4644">SUSE bug 935274</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4651</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4651" source="CVE"/>
    <description>
    The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.6 does not properly determine whether enough memory is available for storing IP address strings, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4651.html">CVE-2015-4651</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4651">SUSE bug 935157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4651">SUSE bug 935157</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4652</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4652" source="CVE"/>
    <description>
    epan/dissectors/packet-gsm_a_dtap.c in the GSM DTAP dissector in Wireshark 1.12.x before 1.12.6 does not properly validate digit characters, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to the de_emerg_num_list and de_bcd_num functions.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4652.html">CVE-2015-4652</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4652">SUSE bug 935158</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4652">SUSE bug 935158</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4652">SUSE bug 935158</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4652">SUSE bug 935158</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4695</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695" source="CVE"/>
    <description>
    meta.h in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WMF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4695.html">CVE-2015-4695</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4695">SUSE bug 936058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4695">SUSE bug 936058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4695">SUSE bug 936058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4695">SUSE bug 936058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4695">SUSE bug 936058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4695">SUSE bug 936058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4695">SUSE bug 936058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4695">SUSE bug 936058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4695">SUSE bug 936058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4695">SUSE bug 936058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4695">SUSE bug 936058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4695">SUSE bug 936058</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138934" comment="libwmf-0_2-7-0.2.8.4-240.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152632" comment="libwmf-0_2-7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138935" comment="libwmf-tools-0.2.8.4-240.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152633" comment="libwmf-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4696</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696" source="CVE"/>
    <description>
    Use-after-free vulnerability in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) via a crafted WMF file to the (1) wmf2gd or (2) wmf2eps command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4696.html">CVE-2015-4696</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4696">SUSE bug 936062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4696">SUSE bug 936062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4696">SUSE bug 936062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4696">SUSE bug 936062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4696">SUSE bug 936062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4696">SUSE bug 936062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4696">SUSE bug 936062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4696">SUSE bug 936062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4696">SUSE bug 936062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4696">SUSE bug 936062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4696">SUSE bug 936062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4696">SUSE bug 936062</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138934" comment="libwmf-0_2-7-0.2.8.4-240.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152632" comment="libwmf-0_2-7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138935" comment="libwmf-tools-0.2.8.4-240.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152633" comment="libwmf-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4729</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4729" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4729.html">CVE-2015-4729</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4729">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4729">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4729">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4729">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4730</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4730" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.20 and earlier allows remote authenticated users to affect availability via unknown vectors related to Types.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4730.html">CVE-2015-4730</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4730">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4731</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; Java SE Embedded 7u75; and Java SE Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4731.html">CVE-2015-4731</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4731">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4731">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4731">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4731">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4732</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-2590.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4732.html">CVE-2015-4732</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4732">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4732">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4732">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4732">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4733</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4733.html">CVE-2015-4733</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4733">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4733">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4733">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4733">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4734</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4734" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4734.html">CVE-2015-4734</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4734">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4734">SUSE bug 955131</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4734">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117830" comment="java-1_7_0-openjdk-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117831" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117832" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117833" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117834" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117835" comment="java-1_7_0-openjdk-demo-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117836" comment="java-1_7_0-openjdk-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117837" comment="java-1_7_0-openjdk-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117838" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117839" comment="java-1_7_0-openjdk-src-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4736</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4736" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4736.html">CVE-2015-4736</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4736">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4736">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4736">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4748</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4748.html">CVE-2015-4748</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4748">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4748">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4748">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4748">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4749</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect availability via vectors related to JNDI.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4749.html">CVE-2015-4749</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4749">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4749">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4749">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4749">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4760</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4760.html">CVE-2015-4760</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4760">SUSE bug 938248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4760">SUSE bug 938895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4760">SUSE bug 937828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4760">SUSE bug 938248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138410" comment="java-1_8_0-openjdk-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138411" comment="java-1_8_0-openjdk-devel-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138412" comment="java-1_8_0-openjdk-headless-1.8.0.60-4.11 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4766</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4766" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows local users to affect availability via unknown vectors related to Server : Security : Firewall.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4766.html">CVE-2015-4766</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4766">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4766">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4792</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4802.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4792.html">CVE-2015-4792</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4792">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4792">SUSE bug 958789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4792">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119645" comment="libmysqlclient-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119621" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119622" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119623" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119624" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119646" comment="libmysqld-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119647" comment="libmysqld18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119625" comment="mariadb-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123009" comment="mariadb-bench-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119626" comment="mariadb-client-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119627" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123010" comment="mariadb-test-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119653" comment="mariadb-tools-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4800</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4800" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4800.html">CVE-2015-4800</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4800">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4800">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4802</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4792.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4802.html">CVE-2015-4802</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4802">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4802">SUSE bug 958789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4802">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119645" comment="libmysqlclient-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119621" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119622" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119623" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119624" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119646" comment="libmysqld-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119647" comment="libmysqld18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119625" comment="mariadb-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123009" comment="mariadb-bench-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119626" comment="mariadb-client-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119627" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123010" comment="mariadb-test-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119653" comment="mariadb-tools-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4803</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4893 and CVE-2015-4911.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4803.html">CVE-2015-4803</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4803">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4803">SUSE bug 955131</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4803">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117830" comment="java-1_7_0-openjdk-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117831" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117832" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117833" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117834" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117835" comment="java-1_7_0-openjdk-demo-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117836" comment="java-1_7_0-openjdk-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117837" comment="java-1_7_0-openjdk-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117838" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117839" comment="java-1_7_0-openjdk-src-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4805</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4805.html">CVE-2015-4805</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4805">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4805">SUSE bug 955131</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4805">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117830" comment="java-1_7_0-openjdk-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117831" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117832" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117833" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117834" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117835" comment="java-1_7_0-openjdk-demo-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117836" comment="java-1_7_0-openjdk-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117837" comment="java-1_7_0-openjdk-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117838" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117839" comment="java-1_7_0-openjdk-src-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4806</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4806.html">CVE-2015-4806</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4806">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4806">SUSE bug 955131</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4806">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117830" comment="java-1_7_0-openjdk-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117831" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117832" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117833" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117834" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117835" comment="java-1_7_0-openjdk-demo-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117836" comment="java-1_7_0-openjdk-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117837" comment="java-1_7_0-openjdk-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117838" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117839" comment="java-1_7_0-openjdk-src-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4807</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4807" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier, when running on Windows, allows remote authenticated users to affect availability via unknown vectors related to Server : Query Cache.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4807.html">CVE-2015-4807</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4807">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4807">SUSE bug 958789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4807">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119645" comment="libmysqlclient-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119621" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119622" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119623" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119624" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119646" comment="libmysqld-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119647" comment="libmysqld18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119625" comment="mariadb-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123009" comment="mariadb-bench-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119626" comment="mariadb-client-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119627" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123010" comment="mariadb-test-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119653" comment="mariadb-tools-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4810</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4810" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u85 and 8u60 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4810.html">CVE-2015-4810</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4810">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4810">SUSE bug 955131</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4810">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4815</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DDL.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4815.html">CVE-2015-4815</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4815">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4815">SUSE bug 958789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4815">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119645" comment="libmysqlclient-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119621" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119622" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119623" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119624" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119646" comment="libmysqld-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119647" comment="libmysqld18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119625" comment="mariadb-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123009" comment="mariadb-bench-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119626" comment="mariadb-client-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119627" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123010" comment="mariadb-test-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119653" comment="mariadb-tools-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4816</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4816" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4816.html">CVE-2015-4816</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4816">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4816">SUSE bug 958790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4816">SUSE bug 958790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4816">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4819</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client programs.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4819.html">CVE-2015-4819</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4819">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4819">SUSE bug 958790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4819">SUSE bug 958790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4819">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4819">SUSE bug 969667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4819">SUSE bug 969667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4819">SUSE bug 969667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4819">SUSE bug 969667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4819">SUSE bug 969667</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4826</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4826" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Types.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4826.html">CVE-2015-4826</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4826">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4826">SUSE bug 958789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4826">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119645" comment="libmysqlclient-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119621" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119622" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119623" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119624" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119646" comment="libmysqld-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119647" comment="libmysqld18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119625" comment="mariadb-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123009" comment="mariadb-bench-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119626" comment="mariadb-client-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119627" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123010" comment="mariadb-test-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119653" comment="mariadb-tools-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4830</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4830.html">CVE-2015-4830</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4830">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4830">SUSE bug 958789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4830">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119645" comment="libmysqlclient-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119621" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119622" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119623" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119624" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119646" comment="libmysqld-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119647" comment="libmysqld18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119625" comment="mariadb-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123009" comment="mariadb-bench-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119626" comment="mariadb-client-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119627" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123010" comment="mariadb-test-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119653" comment="mariadb-tools-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4833</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4833" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4833.html">CVE-2015-4833</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4833">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4833">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4835</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4881.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4835.html">CVE-2015-4835</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4835">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4835">SUSE bug 955131</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4835">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117830" comment="java-1_7_0-openjdk-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117831" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117832" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117833" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117834" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117835" comment="java-1_7_0-openjdk-demo-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117836" comment="java-1_7_0-openjdk-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117837" comment="java-1_7_0-openjdk-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117838" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117839" comment="java-1_7_0-openjdk-src-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4836</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : SP.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4836.html">CVE-2015-4836</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4836">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4836">SUSE bug 958789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4836">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119645" comment="libmysqlclient-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119621" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119622" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119623" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119624" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119646" comment="libmysqld-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119647" comment="libmysqld18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119625" comment="mariadb-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123009" comment="mariadb-bench-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119626" comment="mariadb-client-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119627" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123010" comment="mariadb-test-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119653" comment="mariadb-tools-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4840</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4840.html">CVE-2015-4840</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4840">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4840">SUSE bug 955131</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4840">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117830" comment="java-1_7_0-openjdk-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117831" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117832" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117833" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117834" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117835" comment="java-1_7_0-openjdk-demo-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117836" comment="java-1_7_0-openjdk-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117837" comment="java-1_7_0-openjdk-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117838" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117839" comment="java-1_7_0-openjdk-src-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4842</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4842.html">CVE-2015-4842</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4842">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4842">SUSE bug 955131</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4842">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117830" comment="java-1_7_0-openjdk-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117831" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117832" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117833" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117834" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117835" comment="java-1_7_0-openjdk-demo-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117836" comment="java-1_7_0-openjdk-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117837" comment="java-1_7_0-openjdk-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117838" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117839" comment="java-1_7_0-openjdk-src-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4843</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4843.html">CVE-2015-4843</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4843">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4843">SUSE bug 955131</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4843">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117830" comment="java-1_7_0-openjdk-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117831" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117832" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117833" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117834" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117835" comment="java-1_7_0-openjdk-demo-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117836" comment="java-1_7_0-openjdk-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117837" comment="java-1_7_0-openjdk-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117838" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117839" comment="java-1_7_0-openjdk-src-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4844</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4844.html">CVE-2015-4844</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4844">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4844">SUSE bug 955131</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4844">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117830" comment="java-1_7_0-openjdk-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117831" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117832" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117833" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117834" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117835" comment="java-1_7_0-openjdk-demo-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117836" comment="java-1_7_0-openjdk-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117837" comment="java-1_7_0-openjdk-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117838" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117839" comment="java-1_7_0-openjdk-src-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4858</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2015-4913.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4858.html">CVE-2015-4858</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4858">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4858">SUSE bug 958789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4858">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119645" comment="libmysqlclient-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119621" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119622" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119623" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119624" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119646" comment="libmysqld-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119647" comment="libmysqld18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119625" comment="mariadb-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123009" comment="mariadb-bench-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119626" comment="mariadb-client-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119627" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123010" comment="mariadb-test-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119653" comment="mariadb-tools-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4860</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4860" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4883.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4860.html">CVE-2015-4860</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4860">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4860">SUSE bug 955131</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4860">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117830" comment="java-1_7_0-openjdk-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117831" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117832" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117833" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117834" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117835" comment="java-1_7_0-openjdk-demo-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117836" comment="java-1_7_0-openjdk-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117837" comment="java-1_7_0-openjdk-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117838" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117839" comment="java-1_7_0-openjdk-src-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4861</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4861" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4861.html">CVE-2015-4861</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4861">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4861">SUSE bug 958789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4861">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119645" comment="libmysqlclient-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119621" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119622" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119623" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119624" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119646" comment="libmysqld-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119647" comment="libmysqld18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119625" comment="mariadb-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123009" comment="mariadb-bench-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119626" comment="mariadb-client-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119627" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123010" comment="mariadb-test-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119653" comment="mariadb-tools-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4862</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4862" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4862.html">CVE-2015-4862</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4862">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4862">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4864</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4864" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4864.html">CVE-2015-4864</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4864">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4864">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4866</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4866" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4866.html">CVE-2015-4866</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4866">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4866">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4868</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4868" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 and Java SE Embedded 8u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4868.html">CVE-2015-4868</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4868">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4868">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4870</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Parser.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4870.html">CVE-2015-4870</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4870">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4870">SUSE bug 958789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4870">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119645" comment="libmysqlclient-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119621" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119622" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119623" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119624" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119646" comment="libmysqld-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119647" comment="libmysqld18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119625" comment="mariadb-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123009" comment="mariadb-bench-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119626" comment="mariadb-client-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119627" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123010" comment="mariadb-test-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119653" comment="mariadb-tools-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4871</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4871" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u85 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4871.html">CVE-2015-4871</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4871">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4871">SUSE bug 955131</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4871">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122393" comment="java-1_7_0-openjdk-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122394" comment="java-1_7_0-openjdk-accessibility-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122395" comment="java-1_7_0-openjdk-bootstrap-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122396" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122397" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122398" comment="java-1_7_0-openjdk-demo-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122399" comment="java-1_7_0-openjdk-devel-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122400" comment="java-1_7_0-openjdk-headless-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122401" comment="java-1_7_0-openjdk-javadoc-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122402" comment="java-1_7_0-openjdk-src-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4872</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect integrity via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4872.html">CVE-2015-4872</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4872">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4872">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4872">SUSE bug 955131</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4872">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117830" comment="java-1_7_0-openjdk-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117831" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117832" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117833" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117834" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117835" comment="java-1_7_0-openjdk-demo-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117836" comment="java-1_7_0-openjdk-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117837" comment="java-1_7_0-openjdk-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117838" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117839" comment="java-1_7_0-openjdk-src-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4879</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4879" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4879.html">CVE-2015-4879</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4879">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4879">SUSE bug 958790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4879">SUSE bug 958790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4879">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4881</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4881" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4835.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4881.html">CVE-2015-4881</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4881">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4881">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117830" comment="java-1_7_0-openjdk-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117831" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117832" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117833" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117834" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117835" comment="java-1_7_0-openjdk-demo-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117836" comment="java-1_7_0-openjdk-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117837" comment="java-1_7_0-openjdk-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117838" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117839" comment="java-1_7_0-openjdk-src-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4882</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect availability via vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4882.html">CVE-2015-4882</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4882">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4882">SUSE bug 955131</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4882">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117830" comment="java-1_7_0-openjdk-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117831" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117832" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117833" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117834" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117835" comment="java-1_7_0-openjdk-demo-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117836" comment="java-1_7_0-openjdk-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117837" comment="java-1_7_0-openjdk-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117838" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117839" comment="java-1_7_0-openjdk-src-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4883</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4860.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4883.html">CVE-2015-4883</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4883">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4883">SUSE bug 955131</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4883">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117830" comment="java-1_7_0-openjdk-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117831" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117832" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117833" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117834" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117835" comment="java-1_7_0-openjdk-demo-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117836" comment="java-1_7_0-openjdk-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117837" comment="java-1_7_0-openjdk-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117838" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117839" comment="java-1_7_0-openjdk-src-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4890</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4890" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4890" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Replication.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4890.html">CVE-2015-4890</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4890">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4890">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4893</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4893" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4911.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4893.html">CVE-2015-4893</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4893">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4893">SUSE bug 955131</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4893">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117830" comment="java-1_7_0-openjdk-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117831" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117832" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117833" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117834" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117835" comment="java-1_7_0-openjdk-demo-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117836" comment="java-1_7_0-openjdk-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117837" comment="java-1_7_0-openjdk-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117838" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117839" comment="java-1_7_0-openjdk-src-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4895</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4895" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4895.html">CVE-2015-4895</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4895">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4895">SUSE bug 958790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4895">SUSE bug 958790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4895">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4901</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4901" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to JavaFX.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4901.html">CVE-2015-4901</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4901">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4901">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4902</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4902" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60 allows remote attackers to affect integrity via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4902.html">CVE-2015-4902</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4902">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4902">SUSE bug 955131</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4902">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4903</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4903" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to RMI.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4903.html">CVE-2015-4903</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4903">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4903">SUSE bug 955131</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4903">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117830" comment="java-1_7_0-openjdk-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117831" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117832" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117833" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117834" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117835" comment="java-1_7_0-openjdk-demo-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117836" comment="java-1_7_0-openjdk-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117837" comment="java-1_7_0-openjdk-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117838" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117839" comment="java-1_7_0-openjdk-src-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4904</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4904" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to libmysqld.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4904.html">CVE-2015-4904</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4904">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4904">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4905</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4905" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4905.html">CVE-2015-4905</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4905">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4905">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4906</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4906" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 and JavaFX 2.2.85 allows remote attackers to affect confidentiality via unknown vectors related to JavaFX, a different vulnerability than CVE-2015-4908 and CVE-2015-4916.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4906.html">CVE-2015-4906</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4906">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4906">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4908</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4908" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 and JavaFX 2.2.85 allows remote attackers to affect confidentiality via unknown vectors, a different vulnerability than CVE-2015-4906 and CVE-2015-4916.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4908.html">CVE-2015-4908</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4908">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4908">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4910</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4910" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Memcached.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4910.html">CVE-2015-4910</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4910">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4910">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4911</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4911" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4893.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4911.html">CVE-2015-4911</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4911">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4911">SUSE bug 955131</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4911">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117830" comment="java-1_7_0-openjdk-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117831" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117832" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117833" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117834" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117835" comment="java-1_7_0-openjdk-demo-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117836" comment="java-1_7_0-openjdk-devel-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117837" comment="java-1_7_0-openjdk-headless-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117838" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117839" comment="java-1_7_0-openjdk-src-1.7.0.91-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4913</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML, a different vulnerability than CVE-2015-4858.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4913.html">CVE-2015-4913</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4913">SUSE bug 951391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4913">SUSE bug 958789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4913">SUSE bug 951391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118899" comment="libmysql56client18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118900" comment="libmysql56client18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118901" comment="libmysql56client_r18-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118902" comment="libmysql56client_r18-32bit-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119645" comment="libmysqlclient-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119621" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119622" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119623" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119624" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119646" comment="libmysqld-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119647" comment="libmysqld18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119625" comment="mariadb-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123009" comment="mariadb-bench-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119626" comment="mariadb-client-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119627" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123010" comment="mariadb-test-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119653" comment="mariadb-tools-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118903" comment="mysql-community-server-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118904" comment="mysql-community-server-bench-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118905" comment="mysql-community-server-client-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118906" comment="mysql-community-server-errormessages-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118907" comment="mysql-community-server-test-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118908" comment="mysql-community-server-tools-5.6.27-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4916</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-4916" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4916" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 and JavaFX 2.2.85 allows remote attackers to affect confidentiality via unknown vectors, a different vulnerability than CVE-2015-4906 and CVE-2015-4908.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-4916.html">CVE-2015-4916</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4916">SUSE bug 951376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-4916">SUSE bug 951376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5073</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5073" source="CVE"/>
    <description>
    Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5073.html">CVE-2015-5073</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5073">SUSE bug 936227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5073">SUSE bug 936227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5073">SUSE bug 936227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5073">SUSE bug 936227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5073">SUSE bug 936227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5073">SUSE bug 936227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5073">SUSE bug 936227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5073">SUSE bug 936227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5073">SUSE bug 936227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5073">SUSE bug 936227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5073">SUSE bug 936227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5073">SUSE bug 936227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5073">SUSE bug 936227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5073">SUSE bug 936227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5073">SUSE bug 936227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5073">SUSE bug 936227</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5154</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154" source="CVE"/>
    <description>
    Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5154.html">CVE-2015-5154</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5154">SUSE bug 938344</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118975" comment="xen-devel-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118979" comment="xen-libs-32bit-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5174</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5174" source="CVE"/>
    <description>
    Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5174.html">CVE-2015-5174</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5174">SUSE bug 967967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5174">SUSE bug 967967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5174">SUSE bug 967967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5174">SUSE bug 967967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5174">SUSE bug 967967</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125308" comment="tomcat-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125309" comment="tomcat-admin-webapps-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125310" comment="tomcat-docs-webapp-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125311" comment="tomcat-el-3_0-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125312" comment="tomcat-embed-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125313" comment="tomcat-javadoc-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125314" comment="tomcat-jsp-2_3-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125315" comment="tomcat-jsvc-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125316" comment="tomcat-lib-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125317" comment="tomcat-servlet-3_1-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152853" comment="tomcat-servlet-3_1-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125318" comment="tomcat-webapps-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5185</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5185" source="CVE"/>
    <description>
    The lookupProviders function in providerMgr.c in sblim-sfcb 1.3.4 and 1.3.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty className in a packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5185.html">CVE-2015-5185</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5185">SUSE bug 942628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5185">SUSE bug 942628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5185">SUSE bug 942628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5185">SUSE bug 942628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5185">SUSE bug 942628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5185">SUSE bug 942628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5185">SUSE bug 942628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5185">SUSE bug 942628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5185">SUSE bug 942628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5185">SUSE bug 942628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5185">SUSE bug 942628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5185">SUSE bug 942628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5185">SUSE bug 942628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5185">SUSE bug 942628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5185">SUSE bug 942628</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139087" comment="sblim-sfcb-1.4.8-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152855" comment="sblim-sfcb is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5191</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5191" source="CVE"/>
    <description>
    VMware Tools prior to 10.0.9 contains multiple file system races in libDeployPkg, related to the use of hard-coded paths under /tmp. Successful exploitation of this issue may result in a local privilege escalation. CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5191.html">CVE-2015-5191</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5191">SUSE bug 1007600</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148610" comment="libvmtools-devel-10.1.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152856" comment="libvmtools-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148611" comment="libvmtools0-10.1.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152857" comment="libvmtools0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148612" comment="open-vm-tools-10.1.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152858" comment="open-vm-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148613" comment="open-vm-tools-desktop-10.1.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152859" comment="open-vm-tools-desktop is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5198</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5198" source="CVE"/>
    <description>
    libvdpau before 1.1.1, when used in a setuid or setgid application, allows local users to gain privileges via unspecified vectors, related to the VDPAU_DRIVER_PATH environment variable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5198.html">CVE-2015-5198</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5198">SUSE bug 943967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5198">SUSE bug 943967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5198">SUSE bug 943967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5198">SUSE bug 943967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5198">SUSE bug 943967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5198">SUSE bug 943967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5198">SUSE bug 943967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5198">SUSE bug 943967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5198">SUSE bug 943967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5198">SUSE bug 943967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5198">SUSE bug 943967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5198">SUSE bug 943967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5198">SUSE bug 943967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5198">SUSE bug 943967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5198">SUSE bug 943967</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5198">SUSE bug 943967</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138905" comment="libvdpau1-1.1.1-8.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152860" comment="libvdpau1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5199</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5199" source="CVE"/>
    <description>
    Directory traversal vulnerability in dlopen in libvdpau before 1.1.1 allows local users to gain privileges via the VDPAU_DRIVER environment variable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5199.html">CVE-2015-5199</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5199">SUSE bug 943968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5199">SUSE bug 943968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5199">SUSE bug 943968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5199">SUSE bug 943968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5199">SUSE bug 943968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5199">SUSE bug 943968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5199">SUSE bug 943968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5199">SUSE bug 943968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5199">SUSE bug 943968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5199">SUSE bug 943968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5199">SUSE bug 943968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5199">SUSE bug 943968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5199">SUSE bug 943968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5199">SUSE bug 943968</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138905" comment="libvdpau1-1.1.1-8.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152860" comment="libvdpau1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5200</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5200" source="CVE"/>
    <description>
    The trace functionality in libvdpau before 1.1.1, when used in a setuid or setgid application, allows local users to write to arbitrary files via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5200.html">CVE-2015-5200</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5200">SUSE bug 943969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5200">SUSE bug 943969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5200">SUSE bug 943969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5200">SUSE bug 943969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5200">SUSE bug 943969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5200">SUSE bug 943969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5200">SUSE bug 943969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5200">SUSE bug 943969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5200">SUSE bug 943969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5200">SUSE bug 943969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5200">SUSE bug 943969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5200">SUSE bug 943969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5200">SUSE bug 943969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5200">SUSE bug 943969</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138905" comment="libvdpau1-1.1.1-8.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152860" comment="libvdpau1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5203</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5203" source="CVE"/>
    <description>
    Double free vulnerability in the jasper_image_stop_load function in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5203.html">CVE-2015-5203</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5203">SUSE bug 941919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5203">SUSE bug 941919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5203">SUSE bug 941919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5203">SUSE bug 942553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5203">SUSE bug 941919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5203">SUSE bug 941919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5203">SUSE bug 941919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5203">SUSE bug 941919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5203">SUSE bug 941919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5203">SUSE bug 941919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5203">SUSE bug 941919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5203">SUSE bug 941919</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135598" comment="jasper-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135599" comment="libjasper-devel-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135600" comment="libjasper1-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135601" comment="libjasper1-32bit-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5218</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5218" source="CVE"/>
    <description>
    Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5218.html">CVE-2015-5218</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5218">SUSE bug 949754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5218">SUSE bug 949754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5218">SUSE bug 949754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5218">SUSE bug 949754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5218">SUSE bug 949754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5218">SUSE bug 949754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5218">SUSE bug 949754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5218">SUSE bug 949754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5218">SUSE bug 949754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5218">SUSE bug 949754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5218">SUSE bug 949754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5218">SUSE bug 949754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5218">SUSE bug 949754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5218">SUSE bug 949754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5218">SUSE bug 949754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5218">SUSE bug 949754</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138545" comment="libblkid-devel-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151786" comment="libblkid-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117626" comment="libblkid-devel-32bit-2.25-9.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152861" comment="libblkid-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138546" comment="libblkid1-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151787" comment="libblkid1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138547" comment="libblkid1-32bit-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151788" comment="libblkid1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117629" comment="libmount-devel-2.25-9.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152863" comment="libmount-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117630" comment="libmount-devel-32bit-2.25-9.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152864" comment="libmount-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138548" comment="libmount1-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151789" comment="libmount1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138549" comment="libmount1-32bit-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151790" comment="libmount1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117633" comment="libsmartcols-devel-2.25-9.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152866" comment="libsmartcols-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138550" comment="libsmartcols1-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151791" comment="libsmartcols1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138551" comment="libuuid-devel-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151792" comment="libuuid-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117636" comment="libuuid-devel-32bit-2.25-9.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152868" comment="libuuid-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138552" comment="libuuid1-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151793" comment="libuuid1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138553" comment="libuuid1-32bit-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151794" comment="libuuid1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117639" comment="python-libmount-2.25-9.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152870" comment="python-libmount is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138554" comment="util-linux-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151795" comment="util-linux is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138555" comment="util-linux-lang-2.25-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151796" comment="util-linux-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138556" comment="util-linux-systemd-2.25-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151797" comment="util-linux-systemd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117643" comment="uuidd-2.25-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152871" comment="uuidd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5219</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219" source="CVE"/>
    <description>
    The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5219.html">CVE-2015-5219</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5219">SUSE bug 943216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5219">SUSE bug 943216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5219">SUSE bug 943216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5219">SUSE bug 943216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5219">SUSE bug 943218</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5219">SUSE bug 943221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5219">SUSE bug 943218</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5219">SUSE bug 943221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5219">SUSE bug 943216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5219">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5219">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5219">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5219">SUSE bug 943216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5219">SUSE bug 943219</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5219">SUSE bug 943221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5219">SUSE bug 943216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5219">SUSE bug 943216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5219">SUSE bug 1010964</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145996" comment="ntp-4.2.8p9-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145997" comment="ntp-doc-4.2.8p9-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5221</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5221" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mif_process_cmpt function in libjasper/mif/mif_cod.c in the JasPer JPEG-2000 library before 1.900.2 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5221.html">CVE-2015-5221</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5221">SUSE bug 942553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5221">SUSE bug 942553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5221">SUSE bug 942553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5221">SUSE bug 942553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5221">SUSE bug 942553</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135598" comment="jasper-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135599" comment="libjasper-devel-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135600" comment="libjasper1-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135601" comment="libjasper1-32bit-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5225</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225" source="CVE"/>
    <description>
    Buffer overflow in the vnc_refresh_server_surface function in the VNC display driver in QEMU before 2.4.0.1 allows guest users to cause a denial of service (heap memory corruption and process crash) or possibly execute arbitrary code on the host via unspecified vectors, related to refreshing the server display surface.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5225.html">CVE-2015-5225</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5225">SUSE bug 942845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5225">SUSE bug 942845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5225">SUSE bug 942845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5225">SUSE bug 942845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5225">SUSE bug 942845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5225">SUSE bug 942845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5225">SUSE bug 942845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5225">SUSE bug 942845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5225">SUSE bug 942845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5225">SUSE bug 942845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5225">SUSE bug 942845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5225">SUSE bug 942845</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5234</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5234" source="CVE"/>
    <description>
    IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which allows remote attackers to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly related to line breaks.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5234.html">CVE-2015-5234</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5234">SUSE bug 944209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5234">SUSE bug 944209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5234">SUSE bug 944209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5234">SUSE bug 944209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5234">SUSE bug 944209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5234">SUSE bug 944209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138403" comment="icedtea-web-javadoc-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151624" comment="icedtea-web-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138404" comment="java-1_8_0-openjdk-plugin-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151625" comment="java-1_8_0-openjdk-plugin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5235</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5235" source="CVE"/>
    <description>
    IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly determine the origin of unsigned applets, which allows remote attackers to bypass the approval process or trick users into approving applet execution via a crafted web page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5235.html">CVE-2015-5235</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5235">SUSE bug 944208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5235">SUSE bug 944208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5235">SUSE bug 944208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5235">SUSE bug 944208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5235">SUSE bug 944208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5235">SUSE bug 944208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5235">SUSE bug 944208</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138403" comment="icedtea-web-javadoc-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151624" comment="icedtea-web-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138404" comment="java-1_8_0-openjdk-plugin-1.6.1-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151625" comment="java-1_8_0-openjdk-plugin is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5239</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5239" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5239.html">CVE-2015-5239</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5239">SUSE bug 944463</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118975" comment="xen-devel-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118979" comment="xen-libs-32bit-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5247</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5247" source="CVE"/>
    <description>
    The virStorageVolCreateXML API in libvirt 1.2.14 through 1.2.19 allows remote authenticated users with a read-write connection to cause a denial of service (libvirtd crash) by triggering a failed unlink after creating a volume on a root_squash NFS pool.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5247.html">CVE-2015-5247</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5247">SUSE bug 945645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5247">SUSE bug 945645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5247">SUSE bug 945645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5247">SUSE bug 945645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5247">SUSE bug 945645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5247">SUSE bug 945645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5247">SUSE bug 945645</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138906" comment="libvirt-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138907" comment="libvirt-client-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138908" comment="libvirt-daemon-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138909" comment="libvirt-daemon-config-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138910" comment="libvirt-daemon-config-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138911" comment="libvirt-daemon-driver-interface-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138912" comment="libvirt-daemon-driver-libxl-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138913" comment="libvirt-daemon-driver-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138914" comment="libvirt-daemon-driver-network-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138915" comment="libvirt-daemon-driver-nodedev-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138916" comment="libvirt-daemon-driver-nwfilter-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138917" comment="libvirt-daemon-driver-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138918" comment="libvirt-daemon-driver-secret-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138919" comment="libvirt-daemon-driver-storage-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138920" comment="libvirt-daemon-driver-uml-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138921" comment="libvirt-daemon-driver-vbox-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138922" comment="libvirt-daemon-lxc-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138923" comment="libvirt-daemon-qemu-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138924" comment="libvirt-daemon-xen-1.2.18.1-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5252</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252" source="CVE"/>
    <description>
    vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5252.html">CVE-2015-5252</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5252">SUSE bug 958582</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119928" comment="ldb-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152722" comment="ldb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119929" comment="ldb-tools-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152723" comment="ldb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119930" comment="libdcerpc-atsvc-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152724" comment="libdcerpc-atsvc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119931" comment="libdcerpc-atsvc0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152725" comment="libdcerpc-atsvc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119932" comment="libdcerpc-atsvc0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152726" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119933" comment="libdcerpc-binding0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119934" comment="libdcerpc-binding0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119935" comment="libdcerpc-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119936" comment="libdcerpc-samr-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119937" comment="libdcerpc-samr0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119938" comment="libdcerpc-samr0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119939" comment="libdcerpc0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119940" comment="libdcerpc0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119941" comment="libgensec-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152731" comment="libgensec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119942" comment="libgensec0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119943" comment="libgensec0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119944" comment="libldb-devel-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152732" comment="libldb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119945" comment="libldb1-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152733" comment="libldb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119946" comment="libldb1-32bit-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152734" comment="libldb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119947" comment="libndr-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119948" comment="libndr-krb5pac-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119949" comment="libndr-krb5pac0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119950" comment="libndr-krb5pac0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119951" comment="libndr-nbt-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119952" comment="libndr-nbt0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119953" comment="libndr-nbt0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119954" comment="libndr-standard-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119955" comment="libndr-standard0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119956" comment="libndr-standard0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119957" comment="libndr0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119958" comment="libndr0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119959" comment="libnetapi-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119960" comment="libnetapi0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119961" comment="libnetapi0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119962" comment="libregistry-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152740" comment="libregistry-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119963" comment="libregistry0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119964" comment="libregistry0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152741" comment="libregistry0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119965" comment="libsamba-credentials-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119966" comment="libsamba-credentials0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119967" comment="libsamba-credentials0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119968" comment="libsamba-hostconfig-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119969" comment="libsamba-hostconfig0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119970" comment="libsamba-hostconfig0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119971" comment="libsamba-passdb-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119972" comment="libsamba-passdb0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119973" comment="libsamba-passdb0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119974" comment="libsamba-policy-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119975" comment="libsamba-policy0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119976" comment="libsamba-policy0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119977" comment="libsamba-util-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119978" comment="libsamba-util0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119979" comment="libsamba-util0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119980" comment="libsamdb-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119981" comment="libsamdb0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119982" comment="libsamdb0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119983" comment="libsmbclient-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119984" comment="libsmbclient-raw-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152750" comment="libsmbclient-raw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119985" comment="libsmbclient-raw0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119986" comment="libsmbclient-raw0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119987" comment="libsmbclient0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119988" comment="libsmbclient0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119989" comment="libsmbconf-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119990" comment="libsmbconf0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119991" comment="libsmbconf0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119992" comment="libsmbldap-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119993" comment="libsmbldap0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119994" comment="libsmbldap0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119995" comment="libtalloc-devel-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152754" comment="libtalloc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119996" comment="libtalloc2-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152755" comment="libtalloc2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119997" comment="libtalloc2-32bit-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152756" comment="libtalloc2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119998" comment="libtdb-devel-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152757" comment="libtdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119999" comment="libtdb1-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152758" comment="libtdb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120000" comment="libtdb1-32bit-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152759" comment="libtdb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120001" comment="libtevent-devel-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152760" comment="libtevent-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120002" comment="libtevent-util-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120003" comment="libtevent-util0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120004" comment="libtevent-util0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120005" comment="libtevent0-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152762" comment="libtevent0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120006" comment="libtevent0-32bit-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152763" comment="libtevent0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120007" comment="libwbclient-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120008" comment="libwbclient0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120009" comment="libwbclient0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120010" comment="pyldb-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152765" comment="pyldb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120011" comment="pyldb-32bit-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152766" comment="pyldb-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120012" comment="pyldb-devel-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152767" comment="pyldb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120013" comment="pytalloc-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152768" comment="pytalloc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120014" comment="pytalloc-32bit-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152769" comment="pytalloc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120015" comment="pytalloc-devel-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152770" comment="pytalloc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120016" comment="python-tdb-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152771" comment="python-tdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120017" comment="python-tdb-32bit-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152772" comment="python-tdb-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120018" comment="python-tevent-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152773" comment="python-tevent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120019" comment="python-tevent-32bit-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152774" comment="python-tevent-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120020" comment="samba-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120021" comment="samba-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120022" comment="samba-client-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120023" comment="samba-client-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120024" comment="samba-core-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120025" comment="samba-doc-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120026" comment="samba-libs-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120027" comment="samba-libs-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120028" comment="samba-pidl-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120029" comment="samba-python-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120030" comment="samba-test-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120031" comment="samba-test-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152779" comment="samba-test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120032" comment="samba-winbind-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120033" comment="samba-winbind-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120034" comment="talloc-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152780" comment="talloc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120035" comment="tdb-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152781" comment="tdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120036" comment="tdb-tools-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152782" comment="tdb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120037" comment="tevent-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152783" comment="tevent is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5260</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5260" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5260" source="CVE"/>
    <description>
    Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5260.html">CVE-2015-5260</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5260">SUSE bug 944787</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5260">SUSE bug 944787</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5260">SUSE bug 944787</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5260">SUSE bug 944787</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5260">SUSE bug 944787</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5260">SUSE bug 944787</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5260">SUSE bug 944787</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5260">SUSE bug 944787</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5260">SUSE bug 944787</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5260">SUSE bug 944787</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5260">SUSE bug 944787</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138874" comment="libspice-server1-0.12.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151923" comment="libspice-server1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5261</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5261" source="CVE"/>
    <description>
    Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to read and write to arbitrary memory locations on the host via guest QXL commands related to surface creation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5261.html">CVE-2015-5261</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5261">SUSE bug 948976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5261">SUSE bug 948976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5261">SUSE bug 948976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5261">SUSE bug 948976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5261">SUSE bug 948976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5261">SUSE bug 948976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5261">SUSE bug 948976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5261">SUSE bug 948976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5261">SUSE bug 948976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5261">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5261">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5261">SUSE bug 948976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5261">SUSE bug 948976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5261">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5261">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5261">SUSE bug 948976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5261">SUSE bug 982386</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138874" comment="libspice-server1-0.12.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151923" comment="libspice-server1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5276</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5276" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276" source="CVE"/>
    <description>
    The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5276.html">CVE-2015-5276</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5276">SUSE bug 945842</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117755" comment="cpp48-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152183" comment="cpp48 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126363" comment="cpp5-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152872" comment="cpp5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117756" comment="cross-aarch64-gcc48-icecream-backend-4.8.5-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152873" comment="cross-aarch64-gcc48-icecream-backend is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117757" comment="cross-armv6hl-gcc48-icecream-backend-4.8.5-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152874" comment="cross-armv6hl-gcc48-icecream-backend is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117758" comment="cross-armv7hl-gcc48-icecream-backend-4.8.5-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152875" comment="cross-armv7hl-gcc48-icecream-backend is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117759" comment="cross-hppa-gcc48-icecream-backend-4.8.5-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152876" comment="cross-hppa-gcc48-icecream-backend is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117760" comment="cross-i386-gcc48-icecream-backend-4.8.5-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152877" comment="cross-i386-gcc48-icecream-backend is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117761" comment="cross-ia64-gcc48-icecream-backend-4.8.5-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152878" comment="cross-ia64-gcc48-icecream-backend is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117762" comment="cross-ppc-gcc48-icecream-backend-4.8.5-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152879" comment="cross-ppc-gcc48-icecream-backend is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117763" comment="cross-ppc64-gcc48-icecream-backend-4.8.5-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152880" comment="cross-ppc64-gcc48-icecream-backend is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117764" comment="cross-ppc64le-gcc48-icecream-backend-4.8.5-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152881" comment="cross-ppc64le-gcc48-icecream-backend is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117765" comment="cross-s390-gcc48-icecream-backend-4.8.5-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152882" comment="cross-s390-gcc48-icecream-backend is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117766" comment="cross-s390x-gcc48-icecream-backend-4.8.5-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152883" comment="cross-s390x-gcc48-icecream-backend is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117767" comment="gcc48-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152184" comment="gcc48 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117768" comment="gcc48-32bit-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152884" comment="gcc48-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117769" comment="gcc48-ada-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152885" comment="gcc48-ada is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117770" comment="gcc48-ada-32bit-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152886" comment="gcc48-ada-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117771" comment="gcc48-c++-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152185" comment="gcc48-c++ is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117772" comment="gcc48-fortran-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152186" comment="gcc48-fortran is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117773" comment="gcc48-fortran-32bit-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152887" comment="gcc48-fortran-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117774" comment="gcc48-gij-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152187" comment="gcc48-gij is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117775" comment="gcc48-gij-32bit-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152888" comment="gcc48-gij-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117776" comment="gcc48-info-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152188" comment="gcc48-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117777" comment="gcc48-java-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152189" comment="gcc48-java is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117778" comment="gcc48-locale-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152190" comment="gcc48-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117779" comment="gcc48-obj-c++-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152889" comment="gcc48-obj-c++ is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117780" comment="gcc48-objc-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152191" comment="gcc48-objc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117781" comment="gcc48-objc-32bit-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152890" comment="gcc48-objc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117782" comment="gcc48-testresults-4.8.5-18.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152891" comment="gcc48-testresults is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126364" comment="gcc5-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152892" comment="gcc5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126365" comment="gcc5-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152893" comment="gcc5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126366" comment="gcc5-ada-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152894" comment="gcc5-ada is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126367" comment="gcc5-ada-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152895" comment="gcc5-ada-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126368" comment="gcc5-c++-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152896" comment="gcc5-c++ is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126369" comment="gcc5-c++-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152897" comment="gcc5-c++-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126370" comment="gcc5-fortran-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152898" comment="gcc5-fortran is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126371" comment="gcc5-fortran-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152899" comment="gcc5-fortran-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126372" comment="gcc5-go-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152900" comment="gcc5-go is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126373" comment="gcc5-go-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152901" comment="gcc5-go-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126374" comment="gcc5-info-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152902" comment="gcc5-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126375" comment="gcc5-locale-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152903" comment="gcc5-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126376" comment="gcc5-testresults-5.3.1+r233831-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152904" comment="gcc5-testresults is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117783" comment="gdb-7.9.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152905" comment="gdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117784" comment="gdb-testresults-7.9.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152906" comment="gdb-testresults is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117785" comment="gdbserver-7.9.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152907" comment="gdbserver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117786" comment="libada48-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152908" comment="libada48 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117787" comment="libada48-32bit-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152909" comment="libada48-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126377" comment="libada5-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152910" comment="libada5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126378" comment="libada5-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152911" comment="libada5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117788" comment="libasan0-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152192" comment="libasan0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117789" comment="libasan0-32bit-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152912" comment="libasan0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126379" comment="libasan2-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152913" comment="libasan2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126380" comment="libasan2-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152914" comment="libasan2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126381" comment="libatomic1-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152915" comment="libatomic1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126382" comment="libatomic1-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152916" comment="libatomic1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117790" comment="libatomic1-gcc48-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152917" comment="libatomic1-gcc48 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117791" comment="libatomic1-gcc48-32bit-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152918" comment="libatomic1-gcc48-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126383" comment="libcilkrts5-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152919" comment="libcilkrts5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126384" comment="libcilkrts5-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152920" comment="libcilkrts5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126385" comment="libffi-devel-gcc5-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152921" comment="libffi-devel-gcc5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126386" comment="libffi-devel-gcc5-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152922" comment="libffi-devel-gcc5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126387" comment="libffi-gcc5-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152923" comment="libffi-gcc5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126388" comment="libffi4-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152924" comment="libffi4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126389" comment="libffi4-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152925" comment="libffi4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117792" comment="libffi4-gcc48-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152926" comment="libffi4-gcc48 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117793" comment="libffi4-gcc48-32bit-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152927" comment="libffi4-gcc48-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117794" comment="libffi48-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152928" comment="libffi48 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117795" comment="libffi48-devel-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152929" comment="libffi48-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117796" comment="libffi48-devel-32bit-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152930" comment="libffi48-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126390" comment="libgcc_s1-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152931" comment="libgcc_s1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126391" comment="libgcc_s1-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152932" comment="libgcc_s1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117797" comment="libgcc_s1-gcc48-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152933" comment="libgcc_s1-gcc48 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117798" comment="libgcc_s1-gcc48-32bit-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152193" comment="libgcc_s1-gcc48-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117799" comment="libgcj48-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152194" comment="libgcj48 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117800" comment="libgcj48-32bit-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152934" comment="libgcj48-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117801" comment="libgcj48-devel-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152195" comment="libgcj48-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117802" comment="libgcj48-devel-32bit-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152935" comment="libgcj48-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117803" comment="libgcj48-jar-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152196" comment="libgcj48-jar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117804" comment="libgcj_bc1-gcc48-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152197" comment="libgcj_bc1-gcc48 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126392" comment="libgfortran3-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152936" comment="libgfortran3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126393" comment="libgfortran3-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152937" comment="libgfortran3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117805" comment="libgfortran3-gcc48-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152938" comment="libgfortran3-gcc48 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117806" comment="libgfortran3-gcc48-32bit-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152939" comment="libgfortran3-gcc48-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126394" comment="libgo7-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152940" comment="libgo7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126395" comment="libgo7-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152941" comment="libgo7-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126396" comment="libgomp1-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152942" comment="libgomp1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126397" comment="libgomp1-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152943" comment="libgomp1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117807" comment="libgomp1-gcc48-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152944" comment="libgomp1-gcc48 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117808" comment="libgomp1-gcc48-32bit-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152945" comment="libgomp1-gcc48-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126398" comment="libitm1-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152946" comment="libitm1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126399" comment="libitm1-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152947" comment="libitm1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117809" comment="libitm1-gcc48-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152948" comment="libitm1-gcc48 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117810" comment="libitm1-gcc48-32bit-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152949" comment="libitm1-gcc48-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126400" comment="liblsan0-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152950" comment="liblsan0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126401" comment="libmpx0-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152951" comment="libmpx0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126402" comment="libmpx0-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152952" comment="libmpx0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126403" comment="libmpxwrappers0-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152953" comment="libmpxwrappers0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126404" comment="libmpxwrappers0-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152954" comment="libmpxwrappers0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117811" comment="libobjc4-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152198" comment="libobjc4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117812" comment="libobjc4-32bit-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152955" comment="libobjc4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126405" comment="libquadmath0-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152956" comment="libquadmath0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126406" comment="libquadmath0-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152957" comment="libquadmath0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117813" comment="libquadmath0-gcc48-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152958" comment="libquadmath0-gcc48 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117814" comment="libquadmath0-gcc48-32bit-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152959" comment="libquadmath0-gcc48-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117815" comment="libstdc++48-devel-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152199" comment="libstdc++48-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117816" comment="libstdc++48-devel-32bit-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152960" comment="libstdc++48-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117817" comment="libstdc++48-doc-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152961" comment="libstdc++48-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126407" comment="libstdc++6-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152962" comment="libstdc++6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126408" comment="libstdc++6-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152963" comment="libstdc++6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126409" comment="libstdc++6-devel-gcc5-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152964" comment="libstdc++6-devel-gcc5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126410" comment="libstdc++6-devel-gcc5-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152965" comment="libstdc++6-devel-gcc5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117818" comment="libstdc++6-gcc48-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152966" comment="libstdc++6-gcc48 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117819" comment="libstdc++6-gcc48-32bit-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152967" comment="libstdc++6-gcc48-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117820" comment="libstdc++6-gcc48-locale-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152200" comment="libstdc++6-gcc48-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126411" comment="libstdc++6-locale-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152968" comment="libstdc++6-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126412" comment="libtsan0-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152969" comment="libtsan0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117821" comment="libtsan0-gcc48-4.8.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152970" comment="libtsan0-gcc48 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126413" comment="libubsan0-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152971" comment="libubsan0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126414" comment="libubsan0-32bit-5.3.1+r233831-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152972" comment="libubsan0-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5278</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5278" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5278.html">CVE-2015-5278</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5278">SUSE bug 945989</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5278">SUSE bug 945989</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5278">SUSE bug 945989</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5278">SUSE bug 964947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5278">SUSE bug 964947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5278">SUSE bug 964947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5278">SUSE bug 964947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5278">SUSE bug 964947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5278">SUSE bug 945989</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5278">SUSE bug 945989</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139073" comment="qemu-linux-user-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5279</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5279" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5279.html">CVE-2015-5279</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5279">SUSE bug 945987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5279">SUSE bug 945987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5279">SUSE bug 945987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5279">SUSE bug 945987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5279">SUSE bug 945987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5279">SUSE bug 945987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5279">SUSE bug 945987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5279">SUSE bug 945987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5279">SUSE bug 945987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5279">SUSE bug 945987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5279">SUSE bug 945987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5279">SUSE bug 945987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5279">SUSE bug 945987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5279">SUSE bug 945987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5279">SUSE bug 945987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5279">SUSE bug 945987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5279">SUSE bug 945987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5279">SUSE bug 945987</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139073" comment="qemu-linux-user-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5288</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288" source="CVE"/>
    <description>
    The crypt function in contrib/pgcrypto in PostgreSQL before 9.0.23, 9.1.x before 9.1.19, 9.2.x before 9.2.14, 9.3.x before 9.3.10, and 9.4.x before 9.4.5 allows attackers to cause a denial of service (server crash) or read arbitrary server memory via a "too-short" salt.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5288.html">CVE-2015-5288</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5288">SUSE bug 949669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5288">SUSE bug 949670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5288">SUSE bug 949669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5288">SUSE bug 949669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5288">SUSE bug 949669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5288">SUSE bug 949669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5288">SUSE bug 949669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5288">SUSE bug 949669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5288">SUSE bug 949669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5288">SUSE bug 949669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5288">SUSE bug 949669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5288">SUSE bug 949669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5288">SUSE bug 949669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5288">SUSE bug 949669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5288">SUSE bug 949669</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5289</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5289" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in json parsing in PostgreSQL before 9.3.x before 9.3.10 and 9.4.x before 9.4.5 allow attackers to cause a denial of service (server crash) via unspecified vectors, which are not properly handled in (1) json or (2) jsonb values.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5289.html">CVE-2015-5289</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5289">SUSE bug 949669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5289">SUSE bug 949670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5289">SUSE bug 949670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5289">SUSE bug 949670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5289">SUSE bug 949670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5289">SUSE bug 949670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5289">SUSE bug 949670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5289">SUSE bug 949670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5289">SUSE bug 949670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5289">SUSE bug 949670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5289">SUSE bug 949670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5289">SUSE bug 949670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5289">SUSE bug 949670</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138608" comment="libecpg6-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138609" comment="libpq5-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138610" comment="libpq5-32bit-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138611" comment="postgresql94-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138612" comment="postgresql94-contrib-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138613" comment="postgresql94-devel-9.4.5-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138614" comment="postgresql94-docs-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138615" comment="postgresql94-server-9.4.5-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5291</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5291" source="CVE"/>
    <description>
    Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not properly handled when creating a ClientHello message.  NOTE: this identifier has been SPLIT per ADT3 due to different affected version ranges. See CVE-2015-8036 for the session ticket issue that was introduced in 1.3.0.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5291.html">CVE-2015-5291</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5291">SUSE bug 949380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5291">SUSE bug 949380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5291">SUSE bug 949380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5291">SUSE bug 949380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5291">SUSE bug 949380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5291">SUSE bug 949380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5291">SUSE bug 949380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5291">SUSE bug 949380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5291">SUSE bug 949380</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119216" comment="libmbedtls9-1.3.15-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152973" comment="libmbedtls9 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119217" comment="libmbedtls9-32bit-1.3.15-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152974" comment="libmbedtls9-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119218" comment="mbedtls-1.3.15-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152975" comment="mbedtls is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119219" comment="mbedtls-devel-1.3.15-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152976" comment="mbedtls-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5296</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296" source="CVE"/>
    <description>
    Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_base.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5296.html">CVE-2015-5296</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 958584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 1058622</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 1058622</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 1058622</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 1058622</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5296">SUSE bug 1058622</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119928" comment="ldb-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152722" comment="ldb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119929" comment="ldb-tools-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152723" comment="ldb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119930" comment="libdcerpc-atsvc-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152724" comment="libdcerpc-atsvc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119931" comment="libdcerpc-atsvc0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152725" comment="libdcerpc-atsvc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119932" comment="libdcerpc-atsvc0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152726" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119933" comment="libdcerpc-binding0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119934" comment="libdcerpc-binding0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119935" comment="libdcerpc-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119936" comment="libdcerpc-samr-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119937" comment="libdcerpc-samr0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119938" comment="libdcerpc-samr0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119939" comment="libdcerpc0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119940" comment="libdcerpc0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119941" comment="libgensec-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152731" comment="libgensec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119942" comment="libgensec0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119943" comment="libgensec0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119944" comment="libldb-devel-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152732" comment="libldb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119945" comment="libldb1-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152733" comment="libldb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119946" comment="libldb1-32bit-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152734" comment="libldb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119947" comment="libndr-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119948" comment="libndr-krb5pac-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119949" comment="libndr-krb5pac0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119950" comment="libndr-krb5pac0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119951" comment="libndr-nbt-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119952" comment="libndr-nbt0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119953" comment="libndr-nbt0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119954" comment="libndr-standard-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119955" comment="libndr-standard0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119956" comment="libndr-standard0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119957" comment="libndr0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119958" comment="libndr0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119959" comment="libnetapi-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119960" comment="libnetapi0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119961" comment="libnetapi0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119962" comment="libregistry-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152740" comment="libregistry-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119963" comment="libregistry0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119964" comment="libregistry0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152741" comment="libregistry0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119965" comment="libsamba-credentials-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119966" comment="libsamba-credentials0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119967" comment="libsamba-credentials0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119968" comment="libsamba-hostconfig-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119969" comment="libsamba-hostconfig0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119970" comment="libsamba-hostconfig0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119971" comment="libsamba-passdb-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119972" comment="libsamba-passdb0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119973" comment="libsamba-passdb0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119974" comment="libsamba-policy-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119975" comment="libsamba-policy0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119976" comment="libsamba-policy0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119977" comment="libsamba-util-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119978" comment="libsamba-util0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119979" comment="libsamba-util0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119980" comment="libsamdb-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119981" comment="libsamdb0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119982" comment="libsamdb0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119983" comment="libsmbclient-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119984" comment="libsmbclient-raw-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152750" comment="libsmbclient-raw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119985" comment="libsmbclient-raw0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119986" comment="libsmbclient-raw0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119987" comment="libsmbclient0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119988" comment="libsmbclient0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119989" comment="libsmbconf-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119990" comment="libsmbconf0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119991" comment="libsmbconf0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119992" comment="libsmbldap-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119993" comment="libsmbldap0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119994" comment="libsmbldap0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119995" comment="libtalloc-devel-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152754" comment="libtalloc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119996" comment="libtalloc2-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152755" comment="libtalloc2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119997" comment="libtalloc2-32bit-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152756" comment="libtalloc2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119998" comment="libtdb-devel-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152757" comment="libtdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119999" comment="libtdb1-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152758" comment="libtdb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120000" comment="libtdb1-32bit-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152759" comment="libtdb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120001" comment="libtevent-devel-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152760" comment="libtevent-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120002" comment="libtevent-util-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120003" comment="libtevent-util0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120004" comment="libtevent-util0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120005" comment="libtevent0-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152762" comment="libtevent0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120006" comment="libtevent0-32bit-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152763" comment="libtevent0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120007" comment="libwbclient-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120008" comment="libwbclient0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120009" comment="libwbclient0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120010" comment="pyldb-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152765" comment="pyldb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120011" comment="pyldb-32bit-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152766" comment="pyldb-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120012" comment="pyldb-devel-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152767" comment="pyldb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120013" comment="pytalloc-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152768" comment="pytalloc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120014" comment="pytalloc-32bit-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152769" comment="pytalloc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120015" comment="pytalloc-devel-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152770" comment="pytalloc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120016" comment="python-tdb-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152771" comment="python-tdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120017" comment="python-tdb-32bit-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152772" comment="python-tdb-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120018" comment="python-tevent-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152773" comment="python-tevent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120019" comment="python-tevent-32bit-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152774" comment="python-tevent-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120020" comment="samba-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120021" comment="samba-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120022" comment="samba-client-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120023" comment="samba-client-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120024" comment="samba-core-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120025" comment="samba-doc-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120026" comment="samba-libs-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120027" comment="samba-libs-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120028" comment="samba-pidl-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120029" comment="samba-python-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120030" comment="samba-test-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120031" comment="samba-test-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152779" comment="samba-test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120032" comment="samba-winbind-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120033" comment="samba-winbind-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120034" comment="talloc-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152780" comment="talloc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120035" comment="tdb-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152781" comment="tdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120036" comment="tdb-tools-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152782" comment="tdb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120037" comment="tevent-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152783" comment="tevent is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5299</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5299" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299" source="CVE"/>
    <description>
    The shadow_copy2_get_shadow_copy_data function in modules/vfs_shadow_copy2.c in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not verify that the DIRECTORY_LIST access right has been granted, which allows remote attackers to access snapshots by visiting a shadow copy directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5299.html">CVE-2015-5299</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5299">SUSE bug 958583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5299">SUSE bug 958583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5299">SUSE bug 958583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5299">SUSE bug 958583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5299">SUSE bug 958583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5299">SUSE bug 958583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5299">SUSE bug 958583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5299">SUSE bug 958583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5299">SUSE bug 958583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5299">SUSE bug 958583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5299">SUSE bug 958583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5299">SUSE bug 958583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5299">SUSE bug 958583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5299">SUSE bug 958583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5299">SUSE bug 958583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5299">SUSE bug 958583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5299">SUSE bug 958583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5299">SUSE bug 958583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5299">SUSE bug 958583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5299">SUSE bug 958583</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119928" comment="ldb-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152722" comment="ldb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119929" comment="ldb-tools-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152723" comment="ldb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119930" comment="libdcerpc-atsvc-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152724" comment="libdcerpc-atsvc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119931" comment="libdcerpc-atsvc0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152725" comment="libdcerpc-atsvc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119932" comment="libdcerpc-atsvc0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152726" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119933" comment="libdcerpc-binding0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119934" comment="libdcerpc-binding0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119935" comment="libdcerpc-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119936" comment="libdcerpc-samr-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119937" comment="libdcerpc-samr0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119938" comment="libdcerpc-samr0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119939" comment="libdcerpc0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119940" comment="libdcerpc0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119941" comment="libgensec-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152731" comment="libgensec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119942" comment="libgensec0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119943" comment="libgensec0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119944" comment="libldb-devel-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152732" comment="libldb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119945" comment="libldb1-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152733" comment="libldb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119946" comment="libldb1-32bit-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152734" comment="libldb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119947" comment="libndr-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119948" comment="libndr-krb5pac-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119949" comment="libndr-krb5pac0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119950" comment="libndr-krb5pac0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119951" comment="libndr-nbt-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119952" comment="libndr-nbt0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119953" comment="libndr-nbt0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119954" comment="libndr-standard-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119955" comment="libndr-standard0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119956" comment="libndr-standard0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119957" comment="libndr0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119958" comment="libndr0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119959" comment="libnetapi-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119960" comment="libnetapi0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119961" comment="libnetapi0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119962" comment="libregistry-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152740" comment="libregistry-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119963" comment="libregistry0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119964" comment="libregistry0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152741" comment="libregistry0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119965" comment="libsamba-credentials-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119966" comment="libsamba-credentials0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119967" comment="libsamba-credentials0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119968" comment="libsamba-hostconfig-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119969" comment="libsamba-hostconfig0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119970" comment="libsamba-hostconfig0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119971" comment="libsamba-passdb-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119972" comment="libsamba-passdb0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119973" comment="libsamba-passdb0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119974" comment="libsamba-policy-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119975" comment="libsamba-policy0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119976" comment="libsamba-policy0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119977" comment="libsamba-util-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119978" comment="libsamba-util0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119979" comment="libsamba-util0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119980" comment="libsamdb-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119981" comment="libsamdb0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119982" comment="libsamdb0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119983" comment="libsmbclient-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119984" comment="libsmbclient-raw-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152750" comment="libsmbclient-raw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119985" comment="libsmbclient-raw0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119986" comment="libsmbclient-raw0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119987" comment="libsmbclient0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119988" comment="libsmbclient0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119989" comment="libsmbconf-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119990" comment="libsmbconf0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119991" comment="libsmbconf0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119992" comment="libsmbldap-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119993" comment="libsmbldap0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119994" comment="libsmbldap0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119995" comment="libtalloc-devel-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152754" comment="libtalloc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119996" comment="libtalloc2-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152755" comment="libtalloc2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119997" comment="libtalloc2-32bit-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152756" comment="libtalloc2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119998" comment="libtdb-devel-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152757" comment="libtdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119999" comment="libtdb1-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152758" comment="libtdb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120000" comment="libtdb1-32bit-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152759" comment="libtdb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120001" comment="libtevent-devel-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152760" comment="libtevent-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120002" comment="libtevent-util-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120003" comment="libtevent-util0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120004" comment="libtevent-util0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120005" comment="libtevent0-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152762" comment="libtevent0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120006" comment="libtevent0-32bit-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152763" comment="libtevent0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120007" comment="libwbclient-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120008" comment="libwbclient0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120009" comment="libwbclient0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120010" comment="pyldb-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152765" comment="pyldb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120011" comment="pyldb-32bit-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152766" comment="pyldb-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120012" comment="pyldb-devel-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152767" comment="pyldb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120013" comment="pytalloc-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152768" comment="pytalloc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120014" comment="pytalloc-32bit-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152769" comment="pytalloc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120015" comment="pytalloc-devel-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152770" comment="pytalloc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120016" comment="python-tdb-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152771" comment="python-tdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120017" comment="python-tdb-32bit-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152772" comment="python-tdb-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120018" comment="python-tevent-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152773" comment="python-tevent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120019" comment="python-tevent-32bit-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152774" comment="python-tevent-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120020" comment="samba-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120021" comment="samba-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120022" comment="samba-client-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120023" comment="samba-client-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120024" comment="samba-core-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120025" comment="samba-doc-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120026" comment="samba-libs-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120027" comment="samba-libs-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120028" comment="samba-pidl-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120029" comment="samba-python-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120030" comment="samba-test-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120031" comment="samba-test-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152779" comment="samba-test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120032" comment="samba-winbind-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120033" comment="samba-winbind-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120034" comment="talloc-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152780" comment="talloc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120035" comment="tdb-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152781" comment="tdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120036" comment="tdb-tools-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152782" comment="tdb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120037" comment="tevent-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152783" comment="tevent is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5300</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5300" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300" source="CVE"/>
    <description>
    The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5300.html">CVE-2015-5300</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5300">SUSE bug 951629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5300">SUSE bug 951629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5300">SUSE bug 951629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5300">SUSE bug 951629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5300">SUSE bug 951629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5300">SUSE bug 951629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5300">SUSE bug 951629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5300">SUSE bug 951629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5300">SUSE bug 951629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5300">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5300">SUSE bug 951629</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127544" comment="ntp-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127545" comment="ntp-doc-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127546" comment="yast2-ntp-client-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152977" comment="yast2-ntp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127547" comment="yast2-ntp-client-devel-doc-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152978" comment="yast2-ntp-client-devel-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5307</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5307" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307" source="CVE"/>
    <description>
    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5307.html">CVE-2015-5307</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 962977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5307">SUSE bug 953527</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118838" comment="kernel-debug-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118839" comment="kernel-debug-base-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118840" comment="kernel-debug-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118841" comment="kernel-default-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118842" comment="kernel-default-base-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118843" comment="kernel-default-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118844" comment="kernel-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118845" comment="kernel-docs-4.1.13-5.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118846" comment="kernel-docs-html-4.1.13-5.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118847" comment="kernel-docs-pdf-4.1.13-5.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118848" comment="kernel-ec2-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118849" comment="kernel-ec2-base-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118850" comment="kernel-ec2-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118851" comment="kernel-macros-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118852" comment="kernel-obs-build-4.1.13-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118853" comment="kernel-obs-qa-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118854" comment="kernel-obs-qa-xen-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118855" comment="kernel-pae-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118856" comment="kernel-pae-base-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118857" comment="kernel-pae-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118858" comment="kernel-pv-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118859" comment="kernel-pv-base-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118860" comment="kernel-pv-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118861" comment="kernel-source-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118862" comment="kernel-source-vanilla-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118863" comment="kernel-syms-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118864" comment="kernel-vanilla-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118865" comment="kernel-vanilla-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118866" comment="kernel-xen-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118867" comment="kernel-xen-base-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118868" comment="kernel-xen-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121492" comment="xen-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121493" comment="xen-devel-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121494" comment="xen-doc-html-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121495" comment="xen-kmp-default-4.5.2_04_k4.1.13_5-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121496" comment="xen-libs-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121497" comment="xen-libs-32bit-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121498" comment="xen-tools-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121499" comment="xen-tools-domU-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5309</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5309" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5309" source="CVE"/>
    <description>
    Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5309.html">CVE-2015-5309</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5309">SUSE bug 954191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5309">SUSE bug 954191</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117995" comment="putty-0.66-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152979" comment="putty is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5310</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5310" source="CVE"/>
    <description>
    The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5310.html">CVE-2015-5310</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5310">SUSE bug 952254</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5310">SUSE bug 953115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5310">SUSE bug 952254</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5310">SUSE bug 952254</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5310">SUSE bug 952254</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009110201" comment="wpa_supplicant-2.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009110202" comment="wpa_supplicant-gui-2.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5311</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5311" source="CVE"/>
    <description>
    PowerDNS (aka pdns) Authoritative Server 3.4.4 before 3.4.7 allows remote attackers to cause a denial of service (assertion failure and server crash) via crafted query packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5311.html">CVE-2015-5311</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5311">SUSE bug 954402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5311">SUSE bug 954402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5311">SUSE bug 954402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5311">SUSE bug 954402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5311">SUSE bug 954402</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142173" comment="pdns-3.4.6-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152980" comment="pdns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142174" comment="pdns-backend-ldap-3.4.6-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152981" comment="pdns-backend-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142175" comment="pdns-backend-lua-3.4.6-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152982" comment="pdns-backend-lua is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142176" comment="pdns-backend-mydns-3.4.6-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152983" comment="pdns-backend-mydns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142177" comment="pdns-backend-mysql-3.4.6-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152984" comment="pdns-backend-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142178" comment="pdns-backend-postgresql-3.4.6-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152985" comment="pdns-backend-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142179" comment="pdns-backend-sqlite3-3.4.6-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152986" comment="pdns-backend-sqlite3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5312</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5312" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312" source="CVE"/>
    <description>
    The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5312.html">CVE-2015-5312</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5312">SUSE bug 957105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5312">SUSE bug 957105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5312">SUSE bug 957105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5312">SUSE bug 957105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5312">SUSE bug 957105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5312">SUSE bug 957105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5312">SUSE bug 959469</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5312">SUSE bug 957105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5312">SUSE bug 957105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5312">SUSE bug 957105</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5312">SUSE bug 957105</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103733" comment="libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103734" comment="libxml2-devel-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103735" comment="libxml2-devel-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103736" comment="libxml2-doc-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103738" comment="python-libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5313</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5313" source="CVE"/>
    <description>
    Directory traversal vulnerability in the virStorageBackendFileSystemVolCreate function in storage/storage_backend_fs.c in libvirt, when fine-grained Access Control Lists (ACL) are in effect, allows local users with storage_vol:create ACL but not domain:write permission to write to arbitrary files via a .. (dot dot) in a volume name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5313.html">CVE-2015-5313</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5313">SUSE bug 953110</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121989" comment="libvirt-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121990" comment="libvirt-client-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121991" comment="libvirt-client-32bit-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152987" comment="libvirt-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121992" comment="libvirt-daemon-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121993" comment="libvirt-daemon-config-network-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121994" comment="libvirt-daemon-config-nwfilter-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121995" comment="libvirt-daemon-driver-interface-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121996" comment="libvirt-daemon-driver-libxl-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121997" comment="libvirt-daemon-driver-lxc-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121998" comment="libvirt-daemon-driver-network-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121999" comment="libvirt-daemon-driver-nodedev-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122000" comment="libvirt-daemon-driver-nwfilter-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122001" comment="libvirt-daemon-driver-qemu-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122002" comment="libvirt-daemon-driver-secret-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122003" comment="libvirt-daemon-driver-storage-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122004" comment="libvirt-daemon-driver-uml-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122005" comment="libvirt-daemon-driver-vbox-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122007" comment="libvirt-daemon-lxc-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122008" comment="libvirt-daemon-qemu-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122009" comment="libvirt-daemon-uml-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152989" comment="libvirt-daemon-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122010" comment="libvirt-daemon-vbox-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152990" comment="libvirt-daemon-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122011" comment="libvirt-daemon-xen-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122012" comment="libvirt-devel-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152991" comment="libvirt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122013" comment="libvirt-devel-32bit-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152992" comment="libvirt-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122014" comment="libvirt-doc-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152993" comment="libvirt-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122015" comment="libvirt-lock-sanlock-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152994" comment="libvirt-lock-sanlock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122016" comment="libvirt-login-shell-1.2.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152995" comment="libvirt-login-shell is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5330</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5330" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330" source="CVE"/>
    <description>
    ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5330.html">CVE-2015-5330</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5330">SUSE bug 958581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5330">SUSE bug 958586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5330">SUSE bug 958586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5330">SUSE bug 958586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5330">SUSE bug 958586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5330">SUSE bug 958586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5330">SUSE bug 958586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5330">SUSE bug 958586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5330">SUSE bug 958586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5330">SUSE bug 958586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5330">SUSE bug 958586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5330">SUSE bug 958586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5330">SUSE bug 958586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5330">SUSE bug 958586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5330">SUSE bug 958586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5330">SUSE bug 958586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5330">SUSE bug 958586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5330">SUSE bug 958586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5330">SUSE bug 958586</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119928" comment="ldb-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152722" comment="ldb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119929" comment="ldb-tools-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152723" comment="ldb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119930" comment="libdcerpc-atsvc-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152724" comment="libdcerpc-atsvc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119931" comment="libdcerpc-atsvc0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152725" comment="libdcerpc-atsvc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119932" comment="libdcerpc-atsvc0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152726" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119933" comment="libdcerpc-binding0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119934" comment="libdcerpc-binding0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119935" comment="libdcerpc-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119936" comment="libdcerpc-samr-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119937" comment="libdcerpc-samr0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119938" comment="libdcerpc-samr0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119939" comment="libdcerpc0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119940" comment="libdcerpc0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119941" comment="libgensec-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152731" comment="libgensec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119942" comment="libgensec0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119943" comment="libgensec0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119944" comment="libldb-devel-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152732" comment="libldb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119945" comment="libldb1-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152733" comment="libldb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119946" comment="libldb1-32bit-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152734" comment="libldb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119947" comment="libndr-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119948" comment="libndr-krb5pac-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119949" comment="libndr-krb5pac0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119950" comment="libndr-krb5pac0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119951" comment="libndr-nbt-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119952" comment="libndr-nbt0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119953" comment="libndr-nbt0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119954" comment="libndr-standard-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119955" comment="libndr-standard0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119956" comment="libndr-standard0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119957" comment="libndr0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119958" comment="libndr0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119959" comment="libnetapi-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119960" comment="libnetapi0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119961" comment="libnetapi0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119962" comment="libregistry-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152740" comment="libregistry-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119963" comment="libregistry0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119964" comment="libregistry0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152741" comment="libregistry0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119965" comment="libsamba-credentials-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119966" comment="libsamba-credentials0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119967" comment="libsamba-credentials0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119968" comment="libsamba-hostconfig-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119969" comment="libsamba-hostconfig0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119970" comment="libsamba-hostconfig0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119971" comment="libsamba-passdb-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119972" comment="libsamba-passdb0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119973" comment="libsamba-passdb0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119974" comment="libsamba-policy-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119975" comment="libsamba-policy0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119976" comment="libsamba-policy0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119977" comment="libsamba-util-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119978" comment="libsamba-util0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119979" comment="libsamba-util0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119980" comment="libsamdb-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119981" comment="libsamdb0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119982" comment="libsamdb0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119983" comment="libsmbclient-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119984" comment="libsmbclient-raw-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152750" comment="libsmbclient-raw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119985" comment="libsmbclient-raw0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119986" comment="libsmbclient-raw0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119987" comment="libsmbclient0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119988" comment="libsmbclient0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119989" comment="libsmbconf-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119990" comment="libsmbconf0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119991" comment="libsmbconf0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119992" comment="libsmbldap-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119993" comment="libsmbldap0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119994" comment="libsmbldap0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119995" comment="libtalloc-devel-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152754" comment="libtalloc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119996" comment="libtalloc2-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152755" comment="libtalloc2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119997" comment="libtalloc2-32bit-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152756" comment="libtalloc2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119998" comment="libtdb-devel-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152757" comment="libtdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119999" comment="libtdb1-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152758" comment="libtdb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120000" comment="libtdb1-32bit-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152759" comment="libtdb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120001" comment="libtevent-devel-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152760" comment="libtevent-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120002" comment="libtevent-util-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120003" comment="libtevent-util0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120004" comment="libtevent-util0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120005" comment="libtevent0-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152762" comment="libtevent0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120006" comment="libtevent0-32bit-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152763" comment="libtevent0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120007" comment="libwbclient-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120008" comment="libwbclient0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120009" comment="libwbclient0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120010" comment="pyldb-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152765" comment="pyldb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120011" comment="pyldb-32bit-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152766" comment="pyldb-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120012" comment="pyldb-devel-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152767" comment="pyldb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120013" comment="pytalloc-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152768" comment="pytalloc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120014" comment="pytalloc-32bit-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152769" comment="pytalloc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120015" comment="pytalloc-devel-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152770" comment="pytalloc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120016" comment="python-tdb-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152771" comment="python-tdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120017" comment="python-tdb-32bit-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152772" comment="python-tdb-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120018" comment="python-tevent-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152773" comment="python-tevent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120019" comment="python-tevent-32bit-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152774" comment="python-tevent-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120020" comment="samba-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120021" comment="samba-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120022" comment="samba-client-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120023" comment="samba-client-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120024" comment="samba-core-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120025" comment="samba-doc-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120026" comment="samba-libs-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120027" comment="samba-libs-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120028" comment="samba-pidl-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120029" comment="samba-python-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120030" comment="samba-test-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120031" comment="samba-test-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152779" comment="samba-test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120032" comment="samba-winbind-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120033" comment="samba-winbind-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120034" comment="talloc-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152780" comment="talloc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120035" comment="tdb-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152781" comment="tdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120036" comment="tdb-tools-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152782" comment="tdb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120037" comment="tevent-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152783" comment="tevent is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5333</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5333" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5333.html">CVE-2015-5333</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5333">SUSE bug 950707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5333">SUSE bug 950708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5333">SUSE bug 950707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5333">SUSE bug 950707</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117733" comment="libcrypto36-2.3.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152701" comment="libcrypto36 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117734" comment="libcrypto36-32bit-2.3.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152702" comment="libcrypto36-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117735" comment="libressl-2.3.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152706" comment="libressl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117736" comment="libressl-devel-2.3.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152707" comment="libressl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117737" comment="libressl-devel-32bit-2.3.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152708" comment="libressl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117738" comment="libressl-devel-doc-2.3.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152709" comment="libressl-devel-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117739" comment="libssl37-2.3.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152712" comment="libssl37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117740" comment="libssl37-32bit-2.3.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152713" comment="libssl37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117741" comment="libtls9-2.3.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152716" comment="libtls9 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117742" comment="libtls9-32bit-2.3.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152717" comment="libtls9-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5334</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5334" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5334" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5334.html">CVE-2015-5334</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5334">SUSE bug 950707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5334">SUSE bug 950708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5334">SUSE bug 950708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5334">SUSE bug 950708</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117733" comment="libcrypto36-2.3.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152701" comment="libcrypto36 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117734" comment="libcrypto36-32bit-2.3.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152702" comment="libcrypto36-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117735" comment="libressl-2.3.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152706" comment="libressl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117736" comment="libressl-devel-2.3.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152707" comment="libressl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117737" comment="libressl-devel-32bit-2.3.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152708" comment="libressl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117738" comment="libressl-devel-doc-2.3.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152709" comment="libressl-devel-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117739" comment="libssl37-2.3.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152712" comment="libssl37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117740" comment="libssl37-32bit-2.3.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152713" comment="libssl37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117741" comment="libtls9-2.3.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152716" comment="libtls9 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117742" comment="libtls9-32bit-2.3.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152717" comment="libtls9-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5343</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5343" source="CVE"/>
    <description>
    Integer overflow in util.c in mod_dav_svn in Apache Subversion 1.7.x, 1.8.x before 1.8.15, and 1.9.x before 1.9.3 allows remote authenticated users to cause a denial of service (subversion server crash or memory consumption) and possibly execute arbitrary code via a skel-encoded request body, which triggers an out-of-bounds read and heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5343.html">CVE-2015-5343</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5343">SUSE bug 958300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5343">SUSE bug 958300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5343">SUSE bug 958300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5343">SUSE bug 958300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5343">SUSE bug 958300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5343">SUSE bug 958300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5343">SUSE bug 958300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5343">SUSE bug 958300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5343">SUSE bug 958300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5343">SUSE bug 958300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5343">SUSE bug 958300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5343">SUSE bug 958300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5343">SUSE bug 958300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5343">SUSE bug 958300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5343">SUSE bug 958300</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120394" comment="libsvn_auth_gnome_keyring-1-0-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152695" comment="libsvn_auth_gnome_keyring-1-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120395" comment="libsvn_auth_kwallet-1-0-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152696" comment="libsvn_auth_kwallet-1-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120396" comment="subversion-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120397" comment="subversion-bash-completion-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152697" comment="subversion-bash-completion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120398" comment="subversion-devel-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120399" comment="subversion-perl-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120400" comment="subversion-python-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120401" comment="subversion-ruby-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152698" comment="subversion-ruby is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120402" comment="subversion-server-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120403" comment="subversion-tools-1.8.10-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5345</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5345" source="CVE"/>
    <description>
    The Mapper component in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.30, and 9.x before 9.0.0.M2 processes redirects before considering security constraints and Filters, which allows remote attackers to determine the existence of a directory via a URL that lacks a trailing / (slash) character.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5345.html">CVE-2015-5345</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5345">SUSE bug 967965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5345">SUSE bug 967965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5345">SUSE bug 967965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5345">SUSE bug 967965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5345">SUSE bug 967965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5345">SUSE bug 967965</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125308" comment="tomcat-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125309" comment="tomcat-admin-webapps-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125310" comment="tomcat-docs-webapp-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125311" comment="tomcat-el-3_0-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125312" comment="tomcat-embed-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125313" comment="tomcat-javadoc-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125314" comment="tomcat-jsp-2_3-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125315" comment="tomcat-jsvc-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125316" comment="tomcat-lib-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125317" comment="tomcat-servlet-3_1-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152853" comment="tomcat-servlet-3_1-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125318" comment="tomcat-webapps-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5346</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5346" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5346" source="CVE"/>
    <description>
    Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x before 8.0.30, and 9.x before 9.0.0.M2, when different session settings are used for deployments of multiple versions of the same web application, might allow remote attackers to hijack web sessions by leveraging use of a requestedSessionSSL field for an unintended request, related to CoyoteAdapter.java and Request.java.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5346.html">CVE-2015-5346</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5346">SUSE bug 967814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5346">SUSE bug 967814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5346">SUSE bug 967814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5346">SUSE bug 967814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5346">SUSE bug 967814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5346">SUSE bug 967814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5346">SUSE bug 967814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5346">SUSE bug 967814</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125308" comment="tomcat-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125309" comment="tomcat-admin-webapps-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125310" comment="tomcat-docs-webapp-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125311" comment="tomcat-el-3_0-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125312" comment="tomcat-embed-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125313" comment="tomcat-javadoc-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125314" comment="tomcat-jsp-2_3-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125315" comment="tomcat-jsvc-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125316" comment="tomcat-lib-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125317" comment="tomcat-servlet-3_1-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152853" comment="tomcat-servlet-3_1-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125318" comment="tomcat-webapps-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5351</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5351" source="CVE"/>
    <description>
    The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5351.html">CVE-2015-5351</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5351">SUSE bug 967812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5351">SUSE bug 967812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5351">SUSE bug 967812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5351">SUSE bug 967812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5351">SUSE bug 967812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5351">SUSE bug 967812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5351">SUSE bug 967812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5351">SUSE bug 967812</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125308" comment="tomcat-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125309" comment="tomcat-admin-webapps-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125310" comment="tomcat-docs-webapp-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125311" comment="tomcat-el-3_0-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125312" comment="tomcat-embed-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125313" comment="tomcat-javadoc-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125314" comment="tomcat-jsp-2_3-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125315" comment="tomcat-jsvc-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125316" comment="tomcat-lib-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125317" comment="tomcat-servlet-3_1-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152853" comment="tomcat-servlet-3_1-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125318" comment="tomcat-webapps-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5352</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5352" source="CVE"/>
    <description>
    The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5352.html">CVE-2015-5352</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 938277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 938277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 938277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 938277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 938277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 938277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 938277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 938277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 948086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 938277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 992991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 996040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 936695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5352">SUSE bug 1074631</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139006" comment="openssh-6.6p1-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139007" comment="openssh-helpers-6.6p1-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152111" comment="openssh-helpers is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5370</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370" source="CVE"/>
    <description>
    Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not properly implement the DCE-RPC layer, which allows remote attackers to perform protocol-downgrade attacks, cause a denial of service (application crash or CPU consumption), or possibly execute arbitrary code on a client system via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5370.html">CVE-2015-5370</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5370">SUSE bug 936862</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126118" comment="ctdb-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126119" comment="ctdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152997" comment="ctdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126120" comment="ctdb-tests-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126121" comment="libdcerpc-atsvc-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152724" comment="libdcerpc-atsvc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126122" comment="libdcerpc-atsvc0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152725" comment="libdcerpc-atsvc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126123" comment="libdcerpc-atsvc0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152726" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126124" comment="libdcerpc-binding0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126125" comment="libdcerpc-binding0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126126" comment="libdcerpc-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126127" comment="libdcerpc-samr-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126128" comment="libdcerpc-samr0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126129" comment="libdcerpc-samr0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126130" comment="libdcerpc0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126131" comment="libdcerpc0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126132" comment="libgensec-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152731" comment="libgensec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126133" comment="libgensec0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126134" comment="libgensec0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126135" comment="libndr-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126136" comment="libndr-krb5pac-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126137" comment="libndr-krb5pac0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126138" comment="libndr-krb5pac0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126139" comment="libndr-nbt-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126140" comment="libndr-nbt0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126141" comment="libndr-nbt0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126142" comment="libndr-standard-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126143" comment="libndr-standard0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126144" comment="libndr-standard0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126145" comment="libndr0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126146" comment="libndr0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126147" comment="libnetapi-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126148" comment="libnetapi0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126149" comment="libnetapi0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126150" comment="libregistry-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152740" comment="libregistry-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126151" comment="libregistry0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126152" comment="libregistry0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152741" comment="libregistry0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126153" comment="libsamba-credentials-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126154" comment="libsamba-credentials0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126155" comment="libsamba-credentials0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126156" comment="libsamba-hostconfig-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126157" comment="libsamba-hostconfig0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126158" comment="libsamba-hostconfig0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126159" comment="libsamba-passdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126160" comment="libsamba-passdb0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126161" comment="libsamba-passdb0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126162" comment="libsamba-policy-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126163" comment="libsamba-policy0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126164" comment="libsamba-policy0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126165" comment="libsamba-util-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126166" comment="libsamba-util0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126167" comment="libsamba-util0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126168" comment="libsamdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126169" comment="libsamdb0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126170" comment="libsamdb0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126171" comment="libsmbclient-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126172" comment="libsmbclient-raw-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152750" comment="libsmbclient-raw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126173" comment="libsmbclient-raw0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126174" comment="libsmbclient-raw0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126175" comment="libsmbclient0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126176" comment="libsmbclient0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126177" comment="libsmbconf-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126178" comment="libsmbconf0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126179" comment="libsmbconf0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126180" comment="libsmbldap-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126181" comment="libsmbldap0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126182" comment="libsmbldap0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126183" comment="libtevent-util-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126184" comment="libtevent-util0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126185" comment="libtevent-util0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126186" comment="libwbclient-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126187" comment="libwbclient0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126188" comment="libwbclient0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126189" comment="samba-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126190" comment="samba-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126191" comment="samba-client-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126192" comment="samba-client-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126193" comment="samba-core-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126194" comment="samba-doc-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126195" comment="samba-libs-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126196" comment="samba-libs-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126197" comment="samba-pidl-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126198" comment="samba-python-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126199" comment="samba-test-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126200" comment="samba-test-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152779" comment="samba-test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126201" comment="samba-winbind-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126202" comment="samba-winbind-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5400</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5400" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5400" source="CVE"/>
    <description>
    Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5400.html">CVE-2015-5400</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5400">SUSE bug 938715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5400">SUSE bug 938715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5400">SUSE bug 938715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5400">SUSE bug 938715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5400">SUSE bug 938715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5400">SUSE bug 938715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5400">SUSE bug 938715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5400">SUSE bug 938715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5400">SUSE bug 938715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5400">SUSE bug 967073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5400">SUSE bug 938715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5400">SUSE bug 938715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5400">SUSE bug 938715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5400">SUSE bug 938715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5400">SUSE bug 938715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5400">SUSE bug 938715</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135205" comment="squid-3.3.14-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5477</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477" source="CVE"/>
    <description>
    named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5477.html">CVE-2015-5477</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5477">SUSE bug 939567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5477">SUSE bug 939567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5477">SUSE bug 939567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5477">SUSE bug 939567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5477">SUSE bug 939567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5477">SUSE bug 939567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5477">SUSE bug 939567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5477">SUSE bug 939567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5477">SUSE bug 939567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5477">SUSE bug 939567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5477">SUSE bug 939567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5477">SUSE bug 980168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5477">SUSE bug 1000362</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5479</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5479" source="CVE"/>
    <description>
    The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5479.html">CVE-2015-5479</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5479">SUSE bug 949760</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129325" comment="libav-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152999" comment="libav is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129326" comment="libav-tools-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153000" comment="libav-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129327" comment="libavcodec-libav-devel-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153001" comment="libavcodec-libav-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129328" comment="libavcodec-libav56-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153002" comment="libavcodec-libav56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129329" comment="libavdevice-libav-devel-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153003" comment="libavdevice-libav-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129330" comment="libavdevice-libav55-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153004" comment="libavdevice-libav55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129331" comment="libavfilter-libav-devel-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153005" comment="libavfilter-libav-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129332" comment="libavfilter-libav5-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153006" comment="libavfilter-libav5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129333" comment="libavformat-libav-devel-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153007" comment="libavformat-libav-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129334" comment="libavformat-libav56-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153008" comment="libavformat-libav56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129335" comment="libavresample-libav-devel-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153009" comment="libavresample-libav-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129336" comment="libavresample-libav2-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153010" comment="libavresample-libav2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129337" comment="libavutil-libav-devel-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153011" comment="libavutil-libav-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129338" comment="libavutil-libav54-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153012" comment="libavutil-libav54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129339" comment="libswscale-libav-devel-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153013" comment="libswscale-libav-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129340" comment="libswscale-libav3-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153014" comment="libswscale-libav3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5522</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5522" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ParseValue function in lexer.c in tidy before 4.9.31 allows remote attackers to cause a denial of service (crash) via vectors involving a command character in an href.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5522.html">CVE-2015-5522</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5522">SUSE bug 933588</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5522">SUSE bug 933588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138892" comment="libtidy-0_99-0-1.0.20100204cvs-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153015" comment="libtidy-0_99-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138893" comment="libtidy-0_99-0-devel-1.0.20100204cvs-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153016" comment="libtidy-0_99-0-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138894" comment="tidy-1.0.20100204cvs-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153017" comment="tidy is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5523</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5523" source="CVE"/>
    <description>
    The ParseValue function in lexer.c in tidy before 4.9.31 allows remote attackers to cause a denial of service (crash) via vectors involving multiple whitespace characters before an empty href, which triggers a large memory allocation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5523.html">CVE-2015-5523</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5523">SUSE bug 933588</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5523">SUSE bug 933588</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138892" comment="libtidy-0_99-0-1.0.20100204cvs-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153015" comment="libtidy-0_99-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138893" comment="libtidy-0_99-0-devel-1.0.20100204cvs-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153016" comment="libtidy-0_99-0-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138894" comment="tidy-1.0.20100204cvs-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153017" comment="tidy is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5589</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5589" source="CVE"/>
    <description>
    The phar_convert_to_other function in ext/phar/phar_object.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 does not validate a file pointer before a close operation, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted TAR archive that is mishandled in a Phar::convertToData call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5589.html">CVE-2015-5589</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5589">SUSE bug 938721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5589">SUSE bug 938721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5589">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5589">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5589">SUSE bug 938721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5589">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5589">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5589">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5589">SUSE bug 938721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5589">SUSE bug 938721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5589">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5590</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5590" source="CVE"/>
    <description>
    Stack-based buffer overflow in the phar_fix_filepath function in ext/phar/phar.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large length value, as demonstrated by mishandling of an e-mail attachment by the imap PHP extension.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5590.html">CVE-2015-5590</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5590">SUSE bug 938719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5590">SUSE bug 938719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5590">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5590">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5590">SUSE bug 938719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5590">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5590">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5590">SUSE bug 935074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5590">SUSE bug 938719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5590">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5600</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5600" source="CVE"/>
    <description>
    The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5600.html">CVE-2015-5600</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 943504</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 945985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 948086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 945985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 945985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 954457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 957883</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 996040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 1009988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 1009988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 1009988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 938746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5600">SUSE bug 1074631</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139006" comment="openssh-6.6p1-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139007" comment="openssh-helpers-6.6p1-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152111" comment="openssh-helpers is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5621</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5621" source="CVE"/>
    <description>
    The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5621.html">CVE-2015-5621</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5621">SUSE bug 940188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5621">SUSE bug 940188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5621">SUSE bug 940188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5621">SUSE bug 940188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5621">SUSE bug 940188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5621">SUSE bug 940188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5621">SUSE bug 940188</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138857" comment="libsnmp30-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151706" comment="libsnmp30 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138858" comment="libsnmp30-32bit-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151707" comment="libsnmp30-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138859" comment="net-snmp-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151708" comment="net-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138860" comment="net-snmp-devel-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151709" comment="net-snmp-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138861" comment="perl-SNMP-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151710" comment="perl-SNMP is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138862" comment="snmp-mibs-5.7.3-2.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151711" comment="snmp-mibs is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5722</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5722" source="CVE"/>
    <description>
    buffer.c in named in ISC BIND 9.x before 9.9.7-P3 and 9.10.x before 9.10.2-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) by creating a zone containing a malformed DNSSEC key and issuing a query for a name in that zone.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5722.html">CVE-2015-5722</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5722">SUSE bug 944066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5722">SUSE bug 944066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5722">SUSE bug 944107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5722">SUSE bug 944066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5722">SUSE bug 944066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5722">SUSE bug 944066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5722">SUSE bug 944066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5722">SUSE bug 944066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5722">SUSE bug 944066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5722">SUSE bug 944066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5722">SUSE bug 954983</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5722">SUSE bug 954983</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5722">SUSE bug 944066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5722">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5722">SUSE bug 944066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5722">SUSE bug 944066</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138146" comment="bind-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138147" comment="bind-chrootenv-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138148" comment="bind-doc-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138149" comment="bind-libs-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138150" comment="bind-utils-9.9.6P1-25.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5726</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5726" source="CVE"/>
    <description>
    The BER decoder in Botan 0.10.x before 1.10.10 and 1.11.x before 1.11.19 allows remote attackers to cause a denial of service (application crash) via an empty BIT STRING in ASN.1 data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5726.html">CVE-2015-5726</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5726">SUSE bug 968025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5726">SUSE bug 968025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5726">SUSE bug 968025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5726">SUSE bug 968025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5726">SUSE bug 968025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5726">SUSE bug 968025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5726">SUSE bug 968025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5726">SUSE bug 968025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5726">SUSE bug 968025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5726">SUSE bug 968025</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138557" comment="libbotan-1_10-1-1.10.10-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153018" comment="libbotan-1_10-1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5727</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5727" source="CVE"/>
    <description>
    The BER decoder in Botan 1.10.x before 1.10.10 and 1.11.x before 1.11.19 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors, related to a length field.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5727.html">CVE-2015-5727</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5727">SUSE bug 968026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5727">SUSE bug 968026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5727">SUSE bug 968026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5727">SUSE bug 968026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5727">SUSE bug 968026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5727">SUSE bug 968026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5727">SUSE bug 968026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5727">SUSE bug 968026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5727">SUSE bug 968026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5727">SUSE bug 968026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5727">SUSE bug 968026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5727">SUSE bug 968026</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138557" comment="libbotan-1_10-1-1.10.10-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153018" comment="libbotan-1_10-1 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5745</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5745.html">CVE-2015-5745</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5745">SUSE bug 940929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5745">SUSE bug 940929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5745">SUSE bug 940929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5745">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5745">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5745">SUSE bug 940929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5745">SUSE bug 940929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5745">SUSE bug 940929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5745">SUSE bug 940929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5745">SUSE bug 940929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5745">SUSE bug 940929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5745">SUSE bug 940929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5745">SUSE bug 940929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5745">SUSE bug 940929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5745">SUSE bug 940929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5745">SUSE bug 940929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5745">SUSE bug 940929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5745">SUSE bug 940929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5745">SUSE bug 940929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5745">SUSE bug 940929</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5788</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5788" source="CVE"/>
    <description>
    The WebKit Canvas implementation in Apple iOS before 9 allows remote attackers to bypass the Same Origin Policy and obtain sensitive image information via vectors involving a CANVAS element.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5788.html">CVE-2015-5788</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5788">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5794</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5794" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5794.html">CVE-2015-5794</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5794">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5801</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5801" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5801.html">CVE-2015-5801</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5801">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5804</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5804" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5804.html">CVE-2015-5804</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5804">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5805</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5805" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5805.html">CVE-2015-5805</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5805">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5807</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5807" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5807.html">CVE-2015-5807</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5807">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5809</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5809" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5809.html">CVE-2015-5809</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5809">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5810</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5810" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5810.html">CVE-2015-5810</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5810">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5813</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5813" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5813.html">CVE-2015-5813</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5813">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5814</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5814" source="CVE"/>
    <description>
    WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5814.html">CVE-2015-5814</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5814">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5815</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5815" source="CVE"/>
    <description>
    WebKit, as used in Apple iTunes before 12.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5815.html">CVE-2015-5815</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5815">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5817</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5817" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5817.html">CVE-2015-5817</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5817">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5818</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5818" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5818.html">CVE-2015-5818</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5818">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5822</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5822" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5822" source="CVE"/>
    <description>
    WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5822.html">CVE-2015-5822</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5822">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5825</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5825" source="CVE"/>
    <description>
    WebKit in Apple iOS before 9 does not properly restrict the availability of Performance API times, which allows remote attackers to obtain sensitive information about the browser history, mouse movement, or network traffic via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5825.html">CVE-2015-5825</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5825">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5827</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5827" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5827" source="CVE"/>
    <description>
    WebKit in Apple iOS before 9 allows remote attackers to bypass the Same Origin Policy and obtain an object reference via vectors involving a (1) custom event, (2) message event, or (3) pop state event.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5827.html">CVE-2015-5827</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5827">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5828</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5828" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5828" source="CVE"/>
    <description>
    The API in the WebKit Plug-ins component in Apple Safari before 9 does not provide notification of an HTTP Redirection (aka 3xx) status code to a plugin, which allows remote attackers to bypass intended request restrictions via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5828.html">CVE-2015-5828</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5828">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5928</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5928" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5928.html">CVE-2015-5928</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5928">SUSE bug 971460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125560" comment="libjavascriptcoregtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151774" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125561" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152086" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125562" comment="libjavascriptcoregtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151775" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125563" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152087" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125564" comment="libwebkitgtk-1_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151776" comment="libwebkitgtk-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125565" comment="libwebkitgtk-1_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152088" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125566" comment="libwebkitgtk-3_0-0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151777" comment="libwebkitgtk-3_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125567" comment="libwebkitgtk-3_0-0-32bit-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152089" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125568" comment="libwebkitgtk-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151778" comment="libwebkitgtk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125569" comment="libwebkitgtk2-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151779" comment="libwebkitgtk2-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125570" comment="libwebkitgtk3-devel-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152090" comment="libwebkitgtk3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125571" comment="libwebkitgtk3-lang-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151780" comment="libwebkitgtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125572" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151781" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125573" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152091" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125574" comment="typelib-1_0-WebKit-1_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151782" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125575" comment="typelib-1_0-WebKit-3_0-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152092" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125576" comment="webkit-jsc-1-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152093" comment="webkit-jsc-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125577" comment="webkit-jsc-3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152094" comment="webkit-jsc-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125578" comment="webkitgtk-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152095" comment="webkitgtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125579" comment="webkitgtk3-2.4.10-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152096" comment="webkitgtk3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5929</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5929" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5929.html">CVE-2015-5929</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5929">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5930</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5930" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5930.html">CVE-2015-5930</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5930">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5931</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5931" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 9.0.1 and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-3 and APPLE-SA-2015-10-21-5.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5931.html">CVE-2015-5931</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5931">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5949</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5949" source="CVE"/>
    <description>
    VideoLAN VLC media player 2.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted 3GP file, which triggers the freeing of arbitrary pointers.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5949.html">CVE-2015-5949</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5949">SUSE bug 965227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5949">SUSE bug 965227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5949">SUSE bug 965227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5949">SUSE bug 965227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5949">SUSE bug 965227</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123309" comment="libvlc5-2.2.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123310" comment="libvlccore8-2.2.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153022" comment="libvlccore8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123311" comment="vlc-2.2.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123312" comment="vlc-devel-2.2.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123313" comment="vlc-gnome-2.2.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153025" comment="vlc-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123314" comment="vlc-noX-2.2.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123315" comment="vlc-noX-lang-2.2.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153027" comment="vlc-noX-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123316" comment="vlc-qt-2.2.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5969</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-5969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5969" source="CVE"/>
    <description>
    The mysql-systemd-helper script in the mysql-community-server package before 5.6.28-2.17.1 in openSUSE 13.2 and before 5.6.28-13.1 in openSUSE Leap 42.1 and the mariadb package before 10.0.22-2.21.2 in openSUSE 13.2 and before 10.0.22-3.1 in SUSE Linux Enterprise (SLE) 12.1 and openSUSE Leap 42.1 allows local users to discover database credentials by listing a process and its arguments.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-5969.html">CVE-2015-5969</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5969">SUSE bug 957174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5969">SUSE bug 957174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5969">SUSE bug 957174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5969">SUSE bug 957174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5969">SUSE bug 957174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5969">SUSE bug 957174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5969">SUSE bug 957174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5969">SUSE bug 957174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5969">SUSE bug 957174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5969">SUSE bug 957174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-5969">SUSE bug 957174</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122905" comment="libmysql56client18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122906" comment="libmysql56client18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122907" comment="libmysql56client_r18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122908" comment="libmysql56client_r18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119645" comment="libmysqlclient-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119621" comment="libmysqlclient18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119622" comment="libmysqlclient18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119623" comment="libmysqlclient_r18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119624" comment="libmysqlclient_r18-32bit-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119646" comment="libmysqld-devel-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119647" comment="libmysqld18-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119625" comment="mariadb-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123009" comment="mariadb-bench-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119626" comment="mariadb-client-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119627" comment="mariadb-errormessages-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123010" comment="mariadb-test-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119653" comment="mariadb-tools-10.0.22-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122909" comment="mysql-community-server-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122910" comment="mysql-community-server-bench-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122911" comment="mysql-community-server-client-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122912" comment="mysql-community-server-errormessages-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122913" comment="mysql-community-server-test-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122914" comment="mysql-community-server-tools-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6031</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6031" source="CVE"/>
    <description>
    Buffer overflow in the IGDstartelt function in igd_desc_parse.c in the MiniUPnP client (aka MiniUPnPc) before 1.9.20150917 allows remote UPNP servers to cause a denial of service (application crash) and possibly execute arbitrary code via an "oversized" XML element name.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6031.html">CVE-2015-6031</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6031">SUSE bug 950759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6031">SUSE bug 950759</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118047" comment="libminiupnpc-devel-1.9-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153029" comment="libminiupnpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118048" comment="libminiupnpc10-1.9-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152166" comment="libminiupnpc10 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118049" comment="libminiupnpc10-32bit-1.9-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153030" comment="libminiupnpc10-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118050" comment="miniupnpc-1.9-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153031" comment="miniupnpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118051" comment="python-miniupnpc-1.9-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153032" comment="python-miniupnpc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6241</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6241" source="CVE"/>
    <description>
    The proto_tree_add_bytes_item function in epan/proto.c in the protocol-tree implementation in Wireshark 1.12.x before 1.12.7 does not properly terminate a data structure after a failure to locate a number within a string, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6241.html">CVE-2015-6241</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6241">SUSE bug 941500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6241">SUSE bug 941500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6241">SUSE bug 941500</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117615" comment="wireshark-devel-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117617" comment="wireshark-ui-qt-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6242</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6242" source="CVE"/>
    <description>
    The wmem_block_split_free_chunk function in epan/wmem/wmem_allocator_block.c in the wmem block allocator in the memory manager in Wireshark 1.12.x before 1.12.7 does not properly consider a certain case of multiple realloc operations that restore a memory chunk to its original size, which allows remote attackers to cause a denial of service (incorrect free operation and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6242.html">CVE-2015-6242</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6242">SUSE bug 941500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6242">SUSE bug 941500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6242">SUSE bug 941500</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117615" comment="wireshark-devel-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117617" comment="wireshark-ui-qt-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6243</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6243" source="CVE"/>
    <description>
    The dissector-table implementation in epan/packet.c in Wireshark 1.12.x before 1.12.7 mishandles table searches for empty strings, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to the (1) dissector_get_string_handle and (2) dissector_get_default_string_handle functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6243.html">CVE-2015-6243</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6243">SUSE bug 941500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6243">SUSE bug 941500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6243">SUSE bug 941500</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117615" comment="wireshark-devel-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117617" comment="wireshark-ui-qt-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6244</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6244" source="CVE"/>
    <description>
    The dissect_zbee_secure function in epan/dissectors/packet-zbee-security.c in the ZigBee dissector in Wireshark 1.12.x before 1.12.7 improperly relies on length fields contained in packet data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6244.html">CVE-2015-6244</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6244">SUSE bug 941500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6244">SUSE bug 941500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6244">SUSE bug 941500</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117615" comment="wireshark-devel-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117617" comment="wireshark-ui-qt-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6245</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6245" source="CVE"/>
    <description>
    epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC/MAC dissector in Wireshark 1.12.x before 1.12.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6245.html">CVE-2015-6245</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6245">SUSE bug 941500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6245">SUSE bug 941500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6245">SUSE bug 941500</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117615" comment="wireshark-devel-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117617" comment="wireshark-ui-qt-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6246</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6246" source="CVE"/>
    <description>
    The dissect_wa_payload function in epan/dissectors/packet-waveagent.c in the WaveAgent dissector in Wireshark 1.12.x before 1.12.7 mishandles large tag values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6246.html">CVE-2015-6246</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6246">SUSE bug 941500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6246">SUSE bug 941500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6246">SUSE bug 941500</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117615" comment="wireshark-devel-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117617" comment="wireshark-ui-qt-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6247</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6247" source="CVE"/>
    <description>
    The dissect_openflow_tablemod_v5 function in epan/dissectors/packet-openflow_v5.c in the OpenFlow dissector in Wireshark 1.12.x before 1.12.7 does not validate a certain offset value, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6247.html">CVE-2015-6247</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6247">SUSE bug 941500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6247">SUSE bug 941500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6247">SUSE bug 941500</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117615" comment="wireshark-devel-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117617" comment="wireshark-ui-qt-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6248</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6248" source="CVE"/>
    <description>
    The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wireshark 1.12.x before 1.12.7 does not check whether the expected amount of data is available, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6248.html">CVE-2015-6248</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6248">SUSE bug 941500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6248">SUSE bug 941500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6248">SUSE bug 941500</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117615" comment="wireshark-devel-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117617" comment="wireshark-ui-qt-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6249</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6249" source="CVE"/>
    <description>
    The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.7 does not prevent the conflicting use of a table for both IPv4 and IPv6 addresses, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6249.html">CVE-2015-6249</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6249">SUSE bug 941500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6249">SUSE bug 941500</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139131" comment="wireshark-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117615" comment="wireshark-devel-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139132" comment="wireshark-ui-gtk-1.12.7-7.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117617" comment="wireshark-ui-qt-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6251</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6251" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6251" source="CVE"/>
    <description>
    Double free vulnerability in GnuTLS before 3.3.17 and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service via a long DistinguishedName (DN) entry in a certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6251.html">CVE-2015-6251</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6251">SUSE bug 941794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6251">SUSE bug 941794</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6251">SUSE bug 941794</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138369" comment="gnutls-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138370" comment="libgnutls-devel-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138371" comment="libgnutls-openssl27-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151158" comment="libgnutls-openssl27 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138372" comment="libgnutls28-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151159" comment="libgnutls28 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138373" comment="libgnutls28-32bit-3.2.15-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151160" comment="libgnutls28-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6360</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6360" source="CVE"/>
    <description>
    The encryption-processing feature in Cisco libSRTP before 1.5.3 allows remote attackers to cause a denial of service via crafted fields in SRTP packets, aka Bug ID CSCux00686.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6360.html">CVE-2015-6360</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6360">SUSE bug 957376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6360">SUSE bug 957376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6360">SUSE bug 957376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6360">SUSE bug 957376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6360">SUSE bug 957376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6360">SUSE bug 957376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134333" comment="libsrtp-1.5.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153035" comment="libsrtp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134334" comment="libsrtp-devel-1.5.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153036" comment="libsrtp-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134335" comment="libsrtp1-1.5.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153037" comment="libsrtp1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134336" comment="libsrtp1-32bit-1.5.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153038" comment="libsrtp1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6563</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6563" source="CVE"/>
    <description>
    The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6563.html">CVE-2015-6563</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 943010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 943010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 943010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 943010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 943010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 943010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 943010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 948086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 943010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 943010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 943010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 943010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 943007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 943010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 943010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 996040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 943010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 943010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6563">SUSE bug 1074631</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139006" comment="openssh-6.6p1-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139007" comment="openssh-helpers-6.6p1-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152111" comment="openssh-helpers is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6564</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6564" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6564.html">CVE-2015-6564</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 942850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 948086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 996040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 943006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 1074631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6564">SUSE bug 1074631</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139006" comment="openssh-6.6p1-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139007" comment="openssh-helpers-6.6p1-6.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152111" comment="openssh-helpers is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6673</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6673" source="CVE"/>
    <description>
    Use-after-free vulnerability in Decoder.cpp in libpgf before 6.15.32.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6673.html">CVE-2015-6673</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6673">SUSE bug 943304</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6673">SUSE bug 943304</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6673">SUSE bug 943304</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6673">SUSE bug 943304</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138742" comment="libpgf6-6.14.12-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153039" comment="libpgf6 is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6749</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6749" source="CVE"/>
    <description>
    Buffer overflow in the aiff_open function in oggenc/audio.c in vorbis-tools 1.4.0 and earlier allows remote attackers to cause a denial of service (crash) via a crafted AIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6749.html">CVE-2015-6749</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6749">SUSE bug 943795</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6749">SUSE bug 943795</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6749">SUSE bug 943795</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6749">SUSE bug 943795</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6749">SUSE bug 943795</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6749">SUSE bug 943795</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6749">SUSE bug 943795</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6749">SUSE bug 943795</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009106467" comment="vorbis-tools-1.4.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151128" comment="vorbis-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009106468" comment="vorbis-tools-lang-1.4.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151129" comment="vorbis-tools-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6764</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6764" source="CVE"/>
    <description>
    The BasicJsonStringifier::SerializeJSArray function in json-stringifier.h in the JSON stringifier in Google V8, as used in Google Chrome before 47.0.2526.73, improperly loads array elements, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6764.html">CVE-2015-6764</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6764">SUSE bug 956902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6764">SUSE bug 957519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6764">SUSE bug 956902</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121518" comment="nodejs-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121519" comment="nodejs-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121520" comment="nodejs-doc-4.2.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153042" comment="nodejs-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121521" comment="nodejs-docs-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121522" comment="npm-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6765</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6765" source="CVE"/>
    <description>
    Use-after-free vulnerability in content/browser/appcache/appcache_update_job.cc in Google Chrome before 47.0.2526.73 allows remote attackers to execute arbitrary code or cause a denial of service by leveraging the mishandling of AppCache update jobs.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6765.html">CVE-2015-6765</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6765">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6766</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6766" source="CVE"/>
    <description>
    Use-after-free vulnerability in the AppCache implementation in Google Chrome before 47.0.2526.73 allows remote attackers with renderer access to cause a denial of service or possibly have unspecified other impact by leveraging incorrect AppCacheUpdateJob behavior associated with duplicate cache selection.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6766.html">CVE-2015-6766</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6766">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6767</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6767" source="CVE"/>
    <description>
    Use-after-free vulnerability in content/browser/appcache/appcache_dispatcher_host.cc in the AppCache implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect pointer maintenance associated with certain callbacks.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6767.html">CVE-2015-6767</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6767">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6768</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6768" source="CVE"/>
    <description>
    The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6770.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6768.html">CVE-2015-6768</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6768">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6769</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6769" source="CVE"/>
    <description>
    The provisional-load commit implementation in WebKit/Source/bindings/core/v8/WindowProxy.cpp in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy by leveraging a delay in window proxy clearing.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6769.html">CVE-2015-6769</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6769">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6770</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6770" source="CVE"/>
    <description>
    The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6768.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6770.html">CVE-2015-6770</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6770">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6771</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6771" source="CVE"/>
    <description>
    js/array.js in Google V8, as used in Google Chrome before 47.0.2526.73, improperly implements certain map and filter operations for arrays, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6771.html">CVE-2015-6771</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6771">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6772</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6772" source="CVE"/>
    <description>
    The DOM implementation in Blink, as used in Google Chrome before 47.0.2526.73, does not prevent javascript: URL navigation while a document is being detached, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that improperly interacts with a plugin.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6772.html">CVE-2015-6772</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6772">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6773</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6773" source="CVE"/>
    <description>
    The convolution implementation in Skia, as used in Google Chrome before 47.0.2526.73, does not properly constrain row lengths, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted graphics data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6773.html">CVE-2015-6773</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6773">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6774</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6774" source="CVE"/>
    <description>
    Use-after-free vulnerability in the GetLoadTimes function in renderer/loadtimes_extension_bindings.cc in the Extensions implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that modifies a pointer used for reporting loadTimes data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6774.html">CVE-2015-6774</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6774">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6775</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6775" source="CVE"/>
    <description>
    fpdfsdk/src/jsapi/fxjs_v8.cpp in PDFium, as used in Google Chrome before 47.0.2526.73, does not use signatures, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6775.html">CVE-2015-6775</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6775">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6776</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6776" source="CVE"/>
    <description>
    The opj_dwt_decode_1* functions in dwt.c in OpenJPEG, as used in PDFium in Google Chrome before 47.0.2526.73, allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG 2000 data that is mishandled during a discrete wavelet transform.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6776.html">CVE-2015-6776</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6776">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6777</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6777" source="CVE"/>
    <description>
    Use-after-free vulnerability in the ContainerNode::notifyNodeInsertedInternal function in WebKit/Source/core/dom/ContainerNode.cpp in the DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to DOMCharacterDataModified events for certain detached-subtree insertions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6777.html">CVE-2015-6777</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6777">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6778</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6778" source="CVE"/>
    <description>
    The CJBig2_SymbolDict class in fxcodec/jbig2/JBig2_SymbolDict.cpp in PDFium, as used in Google Chrome before 47.0.2526.73, allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a PDF document containing crafted data with JBIG2 compression.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6778.html">CVE-2015-6778</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6778">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6779</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6779" source="CVE"/>
    <description>
    PDFium, as used in Google Chrome before 47.0.2526.73, does not properly restrict use of chrome: URLs, which allows remote attackers to bypass intended scheme restrictions via a crafted PDF document, as demonstrated by a document with a link to a chrome://settings URL.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6779.html">CVE-2015-6779</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6779">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6780</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6780" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6780" source="CVE"/>
    <description>
    Use-after-free vulnerability in the Infobars implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site, related to browser/ui/views/website_settings/website_settings_popup_view.cc.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6780.html">CVE-2015-6780</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6780">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6781</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6781" source="CVE"/>
    <description>
    Integer overflow in the FontData::Bound function in data/font_data.cc in Google sfntly, as used in Google Chrome before 47.0.2526.73, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted offset or length value within font data in an SFNT container.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6781.html">CVE-2015-6781</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6781">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6782</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6782" source="CVE"/>
    <description>
    The Document::open function in WebKit/Source/core/dom/Document.cpp in Google Chrome before 47.0.2526.73 does not ensure that page-dismissal event handling is compatible with modal-dialog blocking, which makes it easier for remote attackers to spoof Omnibox content via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6782.html">CVE-2015-6782</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6782">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6783</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6783" source="CVE"/>
    <description>
    The FindStartOffsetOfFileInZipFile function in crazy_linker_zip.cpp in crazy_linker (aka Crazy Linker) in Android 5.x and 6.x, as used in Google Chrome before 47.0.2526.73, improperly searches for an EOCD record, which allows attackers to bypass a signature-validation requirement via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6783.html">CVE-2015-6783</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6783">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6784</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6784" source="CVE"/>
    <description>
    The page serializer in Google Chrome before 47.0.2526.73 mishandles Mark of the Web (MOTW) comments for URLs containing a "--" sequence, which might allow remote attackers to inject HTML via a crafted URL, as demonstrated by an initial http://example.com?-- substring.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6784.html">CVE-2015-6784</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6784">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6785</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6785" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6785" source="CVE"/>
    <description>
    The CSPSource::hostMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation in Google Chrome before 47.0.2526.73 accepts an x.y hostname as a match for a *.x.y pattern, which might allow remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a policy that was intended to be specific to subdomains.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6785.html">CVE-2015-6785</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6785">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6786</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6786" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6786" source="CVE"/>
    <description>
    The CSPSourceList::matches function in WebKit/Source/core/frame/csp/CSPSourceList.cpp in the Content Security Policy (CSP) implementation in Google Chrome before 47.0.2526.73 accepts a blob:, data:, or filesystem: URL as a match for a * pattern, which allows remote attackers to bypass intended scheme restrictions in opportunistic circumstances by leveraging a policy that relies on this pattern.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6786.html">CVE-2015-6786</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6786">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6787</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6787" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 47.0.2526.73 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6787.html">CVE-2015-6787</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6787">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6788</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6788" source="CVE"/>
    <description>
    The ObjectBackedNativeHandler class in extensions/renderer/object_backed_native_handler.cc in the extensions subsystem in Google Chrome before 47.0.2526.80 improperly implements handler functions, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6788.html">CVE-2015-6788</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6788">SUSE bug 958481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6788">SUSE bug 957519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6788">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6789</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6789" source="CVE"/>
    <description>
    Race condition in the MutationObserver implementation in Blink, as used in Google Chrome before 47.0.2526.80, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact by leveraging unanticipated object deletion.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6789.html">CVE-2015-6789</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6789">SUSE bug 958481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6789">SUSE bug 957519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6789">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6790</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6790" source="CVE"/>
    <description>
    The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a double-quote character inside a single-quoted string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6790.html">CVE-2015-6790</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6790">SUSE bug 958481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6790">SUSE bug 957519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6790">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6791</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6791" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 47.0.2526.80 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6791.html">CVE-2015-6791</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6791">SUSE bug 958481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6791">SUSE bug 957519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6791">SUSE bug 957519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119591" comment="chromedriver-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119592" comment="chromium-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119593" comment="chromium-desktop-gnome-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119594" comment="chromium-desktop-kde-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119595" comment="chromium-ffmpegsumo-47.0.2526.80-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6792</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792" source="CVE"/>
    <description>
    The MIDI subsystem in Google Chrome before 47.0.2526.106 does not properly handle the sending of data, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors, related to midi_manager.cc, midi_manager_alsa.cc, and midi_manager_mac.cc, a different vulnerability than CVE-2015-8664.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6792.html">CVE-2015-6792</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6792">SUSE bug 959458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6792">SUSE bug 959458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6792">SUSE bug 959458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6792">SUSE bug 959458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6792">SUSE bug 959458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6792">SUSE bug 959458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6792">SUSE bug 959458</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119868" comment="chromedriver-47.0.2526.106-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119869" comment="chromium-47.0.2526.106-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119870" comment="chromium-desktop-gnome-47.0.2526.106-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119871" comment="chromium-desktop-kde-47.0.2526.106-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119872" comment="chromium-ffmpegsumo-47.0.2526.106-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6815</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6815.html">CVE-2015-6815</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6815">SUSE bug 944697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6815">SUSE bug 944697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6815">SUSE bug 944697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6815">SUSE bug 944697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6815">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6815">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6815">SUSE bug 944697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6815">SUSE bug 944697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6815">SUSE bug 944697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6815">SUSE bug 944697</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139073" comment="qemu-linux-user-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118975" comment="xen-devel-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118979" comment="xen-libs-32bit-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6831</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6831" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6831.html">CVE-2015-6831</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6831">SUSE bug 942291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6831">SUSE bug 942294</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6831">SUSE bug 942295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6831">SUSE bug 945188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6831">SUSE bug 942291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6831">SUSE bug 942291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6831">SUSE bug 942291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6831">SUSE bug 942291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6831">SUSE bug 942291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6831">SUSE bug 942291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6831">SUSE bug 942291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6831">SUSE bug 942291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6831">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6831">SUSE bug 942291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6831">SUSE bug 942291</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6832</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6832" source="CVE"/>
    <description>
    Use-after-free vulnerability in the SPL unserialize implementation in ext/spl/spl_array.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to execute arbitrary code via crafted serialized data that triggers misuse of an array field.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6832.html">CVE-2015-6832</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6832">SUSE bug 942293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6832">SUSE bug 945189</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6833</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6833" source="CVE"/>
    <description>
    Directory traversal vulnerability in the PharData class in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to write to arbitrary files via a .. (dot dot) in a ZIP archive entry that is mishandled during an extractTo call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6833.html">CVE-2015-6833</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6833">SUSE bug 942296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6833">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6834</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6834" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 allow remote attackers to execute arbitrary code via vectors related to (1) the Serializable interface, (2) the SplObjectStorage class, and (3) the SplDoublyLinkedList class, which are mishandled during unserialization.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6834.html">CVE-2015-6834</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6834">SUSE bug 945403</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6834">SUSE bug 945403</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6834">SUSE bug 945403</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6834">SUSE bug 945403</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6834">SUSE bug 1015191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6834">SUSE bug 1015191</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6835</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6835" source="CVE"/>
    <description>
    The session deserializer in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 mishandles multiple php_var_unserialize calls, which allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted session content.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6835.html">CVE-2015-6835</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6835">SUSE bug 945402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6835">SUSE bug 945402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6835">SUSE bug 945402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6835">SUSE bug 945402</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6836</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6836" source="CVE"/>
    <description>
    The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6836.html">CVE-2015-6836</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6836">SUSE bug 945428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6836">SUSE bug 945428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6836">SUSE bug 945428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6836">SUSE bug 945428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6836">SUSE bug 945428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6836">SUSE bug 945428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6836">SUSE bug 945428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6836">SUSE bug 945428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6836">SUSE bug 945428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6836">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6837</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6837" source="CVE"/>
    <description>
    The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13, when libxml2 before 2.9.2 is used, does not consider the possibility of a NULL valuePop return value before proceeding with a free operation during initial error checking, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6838.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6837.html">CVE-2015-6837</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6837">SUSE bug 945412</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6838</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6838" source="CVE"/>
    <description>
    The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13, when libxml2 before 2.9.2 is used, does not consider the possibility of a NULL valuePop return value before proceeding with a free operation after the principal argument loop, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6837.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6838.html">CVE-2015-6838</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6838">SUSE bug 945412</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138078" comment="apache2-mod_php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138079" comment="php5-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138080" comment="php5-bcmath-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138081" comment="php5-bz2-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138082" comment="php5-calendar-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138083" comment="php5-ctype-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138084" comment="php5-curl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138085" comment="php5-dba-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138086" comment="php5-devel-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138087" comment="php5-dom-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138088" comment="php5-exif-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138089" comment="php5-fastcgi-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138090" comment="php5-ftp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138091" comment="php5-gd-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138092" comment="php5-gettext-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138093" comment="php5-gmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138094" comment="php5-iconv-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138095" comment="php5-imap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138096" comment="php5-json-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138097" comment="php5-ldap-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138098" comment="php5-mbstring-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138099" comment="php5-mcrypt-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138100" comment="php5-mysql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138101" comment="php5-odbc-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138102" comment="php5-openssl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138103" comment="php5-pdo-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138104" comment="php5-pear-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138105" comment="php5-pgsql-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138106" comment="php5-shmop-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138107" comment="php5-snmp-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138108" comment="php5-sockets-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138109" comment="php5-sqlite-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138110" comment="php5-suhosin-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138111" comment="php5-sysvsem-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138112" comment="php5-sysvshm-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138113" comment="php5-tidy-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138114" comment="php5-tokenizer-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138115" comment="php5-wddx-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138116" comment="php5-xmlreader-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138117" comment="php5-xmlwriter-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138118" comment="php5-xsl-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138119" comment="php5-zip-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138120" comment="php5-zlib-5.5.14-36.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6855</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855" source="CVE"/>
    <description>
    hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6855.html">CVE-2015-6855</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6855">SUSE bug 945404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6855">SUSE bug 945404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6855">SUSE bug 945404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6855">SUSE bug 945404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6855">SUSE bug 945404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6855">SUSE bug 965156</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6855">SUSE bug 965156</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6855">SUSE bug 965156</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6855">SUSE bug 965156</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6855">SUSE bug 965156</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6855">SUSE bug 945404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6855">SUSE bug 945404</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139073" comment="qemu-linux-user-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6908</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6908" source="CVE"/>
    <description>
    The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6908.html">CVE-2015-6908</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6908">SUSE bug 945582</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122305" comment="compat-libldap-2_3-0-2.3.37-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152788" comment="compat-libldap-2_3-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122306" comment="libldap-2_4-2-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122307" comment="libldap-2_4-2-32bit-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122308" comment="openldap2-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122309" comment="openldap2-back-meta-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122310" comment="openldap2-back-perl-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122311" comment="openldap2-back-sql-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122312" comment="openldap2-client-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122313" comment="openldap2-devel-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122314" comment="openldap2-devel-32bit-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122315" comment="openldap2-devel-static-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122316" comment="openldap2-doc-2.4.41-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6937</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-6937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6937" source="CVE"/>
    <description>
    The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-6937.html">CVE-2015-6937</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 923755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-6937">SUSE bug 952384</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118838" comment="kernel-debug-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118839" comment="kernel-debug-base-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118840" comment="kernel-debug-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118841" comment="kernel-default-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118842" comment="kernel-default-base-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118843" comment="kernel-default-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118844" comment="kernel-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118845" comment="kernel-docs-4.1.13-5.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118846" comment="kernel-docs-html-4.1.13-5.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118847" comment="kernel-docs-pdf-4.1.13-5.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118848" comment="kernel-ec2-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118849" comment="kernel-ec2-base-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118850" comment="kernel-ec2-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118851" comment="kernel-macros-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118852" comment="kernel-obs-build-4.1.13-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118853" comment="kernel-obs-qa-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118854" comment="kernel-obs-qa-xen-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118855" comment="kernel-pae-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118856" comment="kernel-pae-base-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118857" comment="kernel-pae-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118858" comment="kernel-pv-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118859" comment="kernel-pv-base-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118860" comment="kernel-pv-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118861" comment="kernel-source-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118862" comment="kernel-source-vanilla-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118863" comment="kernel-syms-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118864" comment="kernel-vanilla-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118865" comment="kernel-vanilla-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118866" comment="kernel-xen-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118867" comment="kernel-xen-base-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118868" comment="kernel-xen-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7002</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7002" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7002.html">CVE-2015-7002</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7002">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7013</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7013" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 9.0.1 and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-3 and APPLE-SA-2015-10-21-5.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7013.html">CVE-2015-7013</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7013">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7014</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7014" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7014.html">CVE-2015-7014</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7014">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7048</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7048" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7048" source="CVE"/>
    <description>
    WebKit in Apple iOS before 9.2, Safari before 9.0.2, and tvOS before 9.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-7095, CVE-2015-7096, CVE-2015-7097, CVE-2015-7098, CVE-2015-7099, CVE-2015-7100, CVE-2015-7101, CVE-2015-7102, and CVE-2015-7103.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7048.html">CVE-2015-7048</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7048">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7095</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7095" source="CVE"/>
    <description>
    WebKit in Apple iOS before 9.2, Safari before 9.0.2, and tvOS before 9.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-7048, CVE-2015-7096, CVE-2015-7097, CVE-2015-7098, CVE-2015-7099, CVE-2015-7100, CVE-2015-7101, CVE-2015-7102, and CVE-2015-7103.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7095.html">CVE-2015-7095</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7095">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7096</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7096" source="CVE"/>
    <description>
    WebKit in Apple iOS before 9.2, Safari before 9.0.2, and tvOS before 9.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-7048, CVE-2015-7095, CVE-2015-7097, CVE-2015-7098, CVE-2015-7099, CVE-2015-7100, CVE-2015-7101, CVE-2015-7102, and CVE-2015-7103.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7096.html">CVE-2015-7096</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7096">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7097</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7097" source="CVE"/>
    <description>
    WebKit in Apple iOS before 9.2, Safari before 9.0.2, and tvOS before 9.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-7048, CVE-2015-7095, CVE-2015-7096, CVE-2015-7098, CVE-2015-7099, CVE-2015-7100, CVE-2015-7101, CVE-2015-7102, and CVE-2015-7103.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7097.html">CVE-2015-7097</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7097">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7098</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7098" source="CVE"/>
    <description>
    WebKit in Apple iOS before 9.2, Safari before 9.0.2, and tvOS before 9.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-7048, CVE-2015-7095, CVE-2015-7096, CVE-2015-7097, CVE-2015-7099, CVE-2015-7100, CVE-2015-7101, CVE-2015-7102, and CVE-2015-7103.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7098.html">CVE-2015-7098</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7098">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7099</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7099" source="CVE"/>
    <description>
    WebKit in Apple iOS before 9.2, Safari before 9.0.2, and tvOS before 9.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-7048, CVE-2015-7095, CVE-2015-7096, CVE-2015-7097, CVE-2015-7098, CVE-2015-7100, CVE-2015-7101, CVE-2015-7102, and CVE-2015-7103.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7099.html">CVE-2015-7099</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7099">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7100</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7100" source="CVE"/>
    <description>
    WebKit in Apple iOS before 9.2, Safari before 9.0.2, and tvOS before 9.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-7048, CVE-2015-7095, CVE-2015-7096, CVE-2015-7097, CVE-2015-7098, CVE-2015-7099, CVE-2015-7101, CVE-2015-7102, and CVE-2015-7103.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7100.html">CVE-2015-7100</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7100">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7102</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7102" source="CVE"/>
    <description>
    WebKit in Apple iOS before 9.2, Safari before 9.0.2, and tvOS before 9.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-7048, CVE-2015-7095, CVE-2015-7096, CVE-2015-7097, CVE-2015-7098, CVE-2015-7099, CVE-2015-7100, CVE-2015-7101, and CVE-2015-7103.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7102.html">CVE-2015-7102</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7102">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7103</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7103" source="CVE"/>
    <description>
    WebKit in Apple iOS before 9.2, Safari before 9.0.2, and tvOS before 9.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-7048, CVE-2015-7095, CVE-2015-7096, CVE-2015-7097, CVE-2015-7098, CVE-2015-7099, CVE-2015-7100, CVE-2015-7101, and CVE-2015-7102.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7103.html">CVE-2015-7103</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7103">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7104</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7104" source="CVE"/>
    <description>
    WebKit in Apple Safari before 9.0.2 and tvOS before 9.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7104.html">CVE-2015-7104</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7104">SUSE bug 1082221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124777" comment="libjavascriptcoregtk-4_0-18-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124778" comment="libjavascriptcoregtk-4_0-18-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124779" comment="libwebkit2gtk-4_0-37-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124780" comment="libwebkit2gtk-4_0-37-32bit-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124781" comment="libwebkit2gtk3-lang-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124782" comment="typelib-1_0-JavaScriptCore-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124783" comment="typelib-1_0-WebKit2-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124784" comment="typelib-1_0-WebKit2WebExtension-4_0-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124785" comment="webkit-jsc-4-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124786" comment="webkit2gtk-4_0-injected-bundles-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124787" comment="webkit2gtk3-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152648" comment="webkit2gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124788" comment="webkit2gtk3-devel-2.10.7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7174</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" source="CVE"/>
    <description>
    The nsAttrAndChildArray::GrowBy function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7174.html">CVE-2015-7174</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7174">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7175</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" source="CVE"/>
    <description>
    The XULContentSinkImpl::AddText function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7175.html">CVE-2015-7175</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7175">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7176</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" source="CVE"/>
    <description>
    The AnimationThread function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 uses an incorrect argument to the sscanf function, which might allow remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7176.html">CVE-2015-7176</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7176">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7177</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" source="CVE"/>
    <description>
    The InitTextures function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7177.html">CVE-2015-7177</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7177">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7178</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7178" source="CVE"/>
    <description>
    The ProgramBinary::linkAttributes function in libGLES in ANGLE, as used in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 on Windows, mishandles shader access, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted (1) OpenGL or (2) WebGL content.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7178.html">CVE-2015-7178</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7178">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7179</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7179" source="CVE"/>
    <description>
    The VertexBufferInterface::reserveVertexSpace function in libGLES in ANGLE, as used in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 on Windows, incorrectly allocates memory for shader attribute arrays, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via crafted (1) OpenGL or (2) WebGL content.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7179.html">CVE-2015-7179</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7179">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7180</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" source="CVE"/>
    <description>
    The ReadbackResultWriterD3D11::Run function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 misinterprets the return value of a function call, which might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7180.html">CVE-2015-7180</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7180">SUSE bug 947003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138045" comment="MozillaThunderbird-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138046" comment="MozillaThunderbird-translations-common-38.3.0-2.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7181</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" source="CVE"/>
    <description>
    The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, improperly restricts access to an unspecified data structure, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data, related to a "use-after-poison" issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7181.html">CVE-2015-7181</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7181">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118833" comment="MozillaThunderbird-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118834" comment="MozillaThunderbird-buildsymbols-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118835" comment="MozillaThunderbird-devel-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118836" comment="MozillaThunderbird-translations-common-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118837" comment="MozillaThunderbird-translations-other-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7182</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7182.html">CVE-2015-7182</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7182">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118833" comment="MozillaThunderbird-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118834" comment="MozillaThunderbird-buildsymbols-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118835" comment="MozillaThunderbird-devel-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118836" comment="MozillaThunderbird-translations-common-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118837" comment="MozillaThunderbird-translations-other-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7183</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" source="CVE"/>
    <description>
    Integer overflow in the PL_ARENA_ALLOCATE implementation in Netscape Portable Runtime (NSPR) in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7183.html">CVE-2015-7183</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7183">SUSE bug 952810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7183">SUSE bug 962977</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118833" comment="MozillaThunderbird-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118834" comment="MozillaThunderbird-buildsymbols-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118835" comment="MozillaThunderbird-devel-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118836" comment="MozillaThunderbird-translations-common-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118837" comment="MozillaThunderbird-translations-other-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7184</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7184" source="CVE"/>
    <description>
    The fetch API implementation in Mozilla Firefox before 41.0.2 does not restrict access to the HTTP response body in certain situations where user credentials are supplied but the CORS cross-origin request algorithm is improperly followed, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7184.html">CVE-2015-7184</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7184">SUSE bug 950686</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7184">SUSE bug 950686</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138043" comment="MozillaFirefox-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138044" comment="MozillaFirefox-translations-common-41.0.2-1.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7185</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7185" source="CVE"/>
    <description>
    Mozilla Firefox before 42.0 on Android does not ensure that the address bar is restored upon fullscreen-mode exit, which allows remote attackers to spoof the address bar via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7185.html">CVE-2015-7185</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7185">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7186</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7186" source="CVE"/>
    <description>
    Mozilla Firefox before 42.0 on Android allows user-assisted remote attackers to bypass the Same Origin Policy and trigger (1) a download or (2) cached profile-data reading via a file: URL in a saved HTML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7186.html">CVE-2015-7186</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7186">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7187</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7187" source="CVE"/>
    <description>
    The Add-on SDK in Mozilla Firefox before 42.0 misinterprets a "script: false" panel setting, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via inline JavaScript code that is executed within a third-party extension.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7187.html">CVE-2015-7187</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7187">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7188</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" source="CVE"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to bypass the Same Origin Policy for an IP address origin, and conduct cross-site scripting (XSS) attacks, by appending whitespace characters to an IP address string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7188.html">CVE-2015-7188</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7188">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118833" comment="MozillaThunderbird-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118834" comment="MozillaThunderbird-buildsymbols-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118835" comment="MozillaThunderbird-devel-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118836" comment="MozillaThunderbird-translations-common-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118837" comment="MozillaThunderbird-translations-other-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7189</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" source="CVE"/>
    <description>
    Race condition in the JPEGEncoder function in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via vectors involving a CANVAS element and crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7189.html">CVE-2015-7189</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7189">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118833" comment="MozillaThunderbird-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118834" comment="MozillaThunderbird-buildsymbols-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118835" comment="MozillaThunderbird-devel-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118836" comment="MozillaThunderbird-translations-common-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118837" comment="MozillaThunderbird-translations-other-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7190</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7190" source="CVE"/>
    <description>
    The Search feature in Mozilla Firefox before 42.0 on Android through 4.4 supports search-engine URL registration through an intent and can access this URL in a privileged context in conjunction with the crash reporter, which allows attackers to read log files and visit file: URLs of HTML documents via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7190.html">CVE-2015-7190</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7190">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7191</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7191" source="CVE"/>
    <description>
    Mozilla Firefox before 42.0 on Android improperly restricts URL strings in intents, which allows attackers to conduct cross-site scripting (XSS) attacks via vectors involving an intent: URL and fallback navigation, aka "Universal XSS (UXSS)."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7191.html">CVE-2015-7191</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7191">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7192</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7192" source="CVE"/>
    <description>
    The accessibility-tools feature in Mozilla Firefox before 42.0 on OS X improperly interacts with the implementation of the TABLE element, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by using an NSAccessibilityIndexAttribute value to reference a row index.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7192.html">CVE-2015-7192</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7192">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7193</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" source="CVE"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly follow the CORS cross-origin request algorithm for the POST method in situations involving an unspecified Content-Type header manipulation, which allows remote attackers to bypass the Same Origin Policy by leveraging the lack of a preflight-request step.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7193.html">CVE-2015-7193</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7193">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118833" comment="MozillaThunderbird-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118834" comment="MozillaThunderbird-buildsymbols-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118835" comment="MozillaThunderbird-devel-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118836" comment="MozillaThunderbird-translations-common-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118837" comment="MozillaThunderbird-translations-other-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7194</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" source="CVE"/>
    <description>
    Buffer underflow in libjar in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7194.html">CVE-2015-7194</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7194">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118833" comment="MozillaThunderbird-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118834" comment="MozillaThunderbird-buildsymbols-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118835" comment="MozillaThunderbird-devel-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118836" comment="MozillaThunderbird-translations-common-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118837" comment="MozillaThunderbird-translations-other-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7195</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7195" source="CVE"/>
    <description>
    The URL parsing implementation in Mozilla Firefox before 42.0 improperly recognizes escaped characters in hostnames within Location headers, which allows remote attackers to obtain sensitive information via vectors involving a redirect.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7195.html">CVE-2015-7195</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7195">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7196</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" source="CVE"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, when a Java plugin is enabled, allow remote attackers to cause a denial of service (incorrect garbage collection and application crash) or possibly execute arbitrary code via a crafted Java applet that deallocates an in-use JavaScript wrapper.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7196.html">CVE-2015-7196</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7196">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118833" comment="MozillaThunderbird-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118834" comment="MozillaThunderbird-buildsymbols-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118835" comment="MozillaThunderbird-devel-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118836" comment="MozillaThunderbird-translations-common-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118837" comment="MozillaThunderbird-translations-other-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7197</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" source="CVE"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly control the ability of a web worker to create a WebSocket object, which allows remote attackers to bypass intended mixed-content restrictions via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7197.html">CVE-2015-7197</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7197">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118833" comment="MozillaThunderbird-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118834" comment="MozillaThunderbird-buildsymbols-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118835" comment="MozillaThunderbird-devel-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118836" comment="MozillaThunderbird-translations-common-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118837" comment="MozillaThunderbird-translations-other-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7198</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" source="CVE"/>
    <description>
    Buffer overflow in the rx::TextureStorage11 class in ANGLE, as used in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted texture data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7198.html">CVE-2015-7198</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7198">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118833" comment="MozillaThunderbird-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118834" comment="MozillaThunderbird-buildsymbols-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118835" comment="MozillaThunderbird-devel-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118836" comment="MozillaThunderbird-translations-common-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118837" comment="MozillaThunderbird-translations-other-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7199</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" source="CVE"/>
    <description>
    The (1) AddWeightedPathSegLists and (2) SVGPathSegListSMILType::Interpolate functions in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lack status checking, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted SVG document.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7199.html">CVE-2015-7199</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7199">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118833" comment="MozillaThunderbird-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118834" comment="MozillaThunderbird-buildsymbols-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118835" comment="MozillaThunderbird-devel-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118836" comment="MozillaThunderbird-translations-common-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118837" comment="MozillaThunderbird-translations-other-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7200</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" source="CVE"/>
    <description>
    The CryptoKey interface implementation in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lacks status checking, which allows attackers to have an unspecified impact via vectors related to a cryptographic key.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7200.html">CVE-2015-7200</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7200">SUSE bug 952810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117649" comment="MozillaFirefox-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117650" comment="MozillaFirefox-branding-upstream-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117651" comment="MozillaFirefox-buildsymbols-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117652" comment="MozillaFirefox-devel-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117653" comment="MozillaFirefox-translations-common-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117654" comment="MozillaFirefox-translations-other-42.0-3.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118833" comment="MozillaThunderbird-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118834" comment="MozillaThunderbird-buildsymbols-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118835" comment="MozillaThunderbird-devel-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118836" comment="MozillaThunderbird-translations-common-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118837" comment="MozillaThunderbird-translations-other-38.4.0-4.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117655" comment="libfreebl3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117656" comment="libfreebl3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117657" comment="libsoftokn3-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117658" comment="libsoftokn3-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117659" comment="mozilla-nspr-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117660" comment="mozilla-nspr-32bit-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117661" comment="mozilla-nspr-devel-4.10.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117662" comment="mozilla-nss-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117663" comment="mozilla-nss-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117664" comment="mozilla-nss-certs-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117665" comment="mozilla-nss-certs-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117666" comment="mozilla-nss-devel-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117667" comment="mozilla-nss-sysinit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117668" comment="mozilla-nss-sysinit-32bit-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117669" comment="mozilla-nss-tools-3.20.1-3.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117670" comment="seamonkey-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117671" comment="seamonkey-dom-inspector-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117672" comment="seamonkey-irc-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117673" comment="seamonkey-translations-common-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117674" comment="seamonkey-translations-other-2.39-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117675" comment="xulrunner-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117676" comment="xulrunner-32bit-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117677" comment="xulrunner-devel-38.4.0-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7201</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7201.html">CVE-2015-7201</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7201">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119896" comment="MozillaFirefox-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119897" comment="MozillaFirefox-branding-upstream-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119898" comment="MozillaFirefox-buildsymbols-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119899" comment="MozillaFirefox-devel-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119900" comment="MozillaFirefox-translations-common-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119901" comment="MozillaFirefox-translations-other-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120911" comment="MozillaThunderbird-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120912" comment="MozillaThunderbird-buildsymbols-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120913" comment="MozillaThunderbird-devel-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120914" comment="MozillaThunderbird-translations-common-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120915" comment="MozillaThunderbird-translations-other-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120798" comment="xulrunner-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120799" comment="xulrunner-32bit-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120800" comment="xulrunner-devel-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7202</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7202" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 43.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7202.html">CVE-2015-7202</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7202">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119896" comment="MozillaFirefox-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119897" comment="MozillaFirefox-branding-upstream-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119898" comment="MozillaFirefox-buildsymbols-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119899" comment="MozillaFirefox-devel-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119900" comment="MozillaFirefox-translations-common-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119901" comment="MozillaFirefox-translations-other-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7203</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7203" source="CVE"/>
    <description>
    Buffer overflow in the DirectWriteFontInfo::LoadFontFamilyData function in gfx/thebes/gfxDWriteFontList.cpp in Mozilla Firefox before 43.0 might allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted font-family name.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7203.html">CVE-2015-7203</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7203">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119896" comment="MozillaFirefox-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119897" comment="MozillaFirefox-branding-upstream-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119898" comment="MozillaFirefox-buildsymbols-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119899" comment="MozillaFirefox-devel-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119900" comment="MozillaFirefox-translations-common-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119901" comment="MozillaFirefox-translations-other-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7204</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7204" source="CVE"/>
    <description>
    Mozilla Firefox before 43.0 does not properly store the properties of unboxed objects, which allows remote attackers to execute arbitrary code via crafted JavaScript variable assignments.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7204.html">CVE-2015-7204</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7204">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119896" comment="MozillaFirefox-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119897" comment="MozillaFirefox-branding-upstream-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119898" comment="MozillaFirefox-buildsymbols-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119899" comment="MozillaFirefox-devel-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119900" comment="MozillaFirefox-translations-common-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119901" comment="MozillaFirefox-translations-other-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7205</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205" source="CVE"/>
    <description>
    Integer underflow in the RTPReceiverVideo::ParseRtpPacket function in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 might allow remote attackers to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a crafted WebRTC RTP packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7205.html">CVE-2015-7205</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7205">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119896" comment="MozillaFirefox-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119897" comment="MozillaFirefox-branding-upstream-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119898" comment="MozillaFirefox-buildsymbols-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119899" comment="MozillaFirefox-devel-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119900" comment="MozillaFirefox-translations-common-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119901" comment="MozillaFirefox-translations-other-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120911" comment="MozillaThunderbird-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120912" comment="MozillaThunderbird-buildsymbols-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120913" comment="MozillaThunderbird-devel-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120914" comment="MozillaThunderbird-translations-common-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120915" comment="MozillaThunderbird-translations-other-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120798" comment="xulrunner-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120799" comment="xulrunner-32bit-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120800" comment="xulrunner-devel-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7207</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7207" source="CVE"/>
    <description>
    Mozilla Firefox before 43.0 does not properly restrict the availability of IFRAME Resource Timing API times, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that leverages history.back and performance.getEntries calls, a related issue to CVE-2015-1300.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7207.html">CVE-2015-7207</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7207">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119896" comment="MozillaFirefox-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119897" comment="MozillaFirefox-branding-upstream-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119898" comment="MozillaFirefox-buildsymbols-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119899" comment="MozillaFirefox-devel-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119900" comment="MozillaFirefox-translations-common-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119901" comment="MozillaFirefox-translations-other-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125358" comment="MozillaThunderbird-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125359" comment="MozillaThunderbird-buildsymbols-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125360" comment="MozillaThunderbird-devel-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125361" comment="MozillaThunderbird-translations-common-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125362" comment="MozillaThunderbird-translations-other-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7208</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7208" source="CVE"/>
    <description>
    Mozilla Firefox before 43.0 stores cookies containing vertical tab characters, which allows remote attackers to obtain sensitive information by reading HTTP Cookie headers.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7208.html">CVE-2015-7208</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7208">SUSE bug 959277</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7208">SUSE bug 963637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7208">SUSE bug 963637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7208">SUSE bug 963637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7208">SUSE bug 963637</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122699" comment="MozillaFirefox-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122700" comment="MozillaFirefox-branding-upstream-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122701" comment="MozillaFirefox-buildsymbols-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122702" comment="MozillaFirefox-devel-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122703" comment="MozillaFirefox-translations-common-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122704" comment="MozillaFirefox-translations-other-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122705" comment="libfreebl3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122706" comment="libfreebl3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122707" comment="libsoftokn3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122708" comment="libsoftokn3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122709" comment="mozilla-nspr-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122710" comment="mozilla-nspr-32bit-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122711" comment="mozilla-nspr-devel-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122712" comment="mozilla-nss-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122713" comment="mozilla-nss-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122714" comment="mozilla-nss-certs-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122715" comment="mozilla-nss-certs-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122716" comment="mozilla-nss-devel-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122717" comment="mozilla-nss-sysinit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122718" comment="mozilla-nss-sysinit-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122719" comment="mozilla-nss-tools-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7210</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering attempted use of a data channel that has been closed by a WebRTC function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7210.html">CVE-2015-7210</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7210">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119896" comment="MozillaFirefox-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119897" comment="MozillaFirefox-branding-upstream-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119898" comment="MozillaFirefox-buildsymbols-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119899" comment="MozillaFirefox-devel-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119900" comment="MozillaFirefox-translations-common-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119901" comment="MozillaFirefox-translations-other-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120911" comment="MozillaThunderbird-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120912" comment="MozillaThunderbird-buildsymbols-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120913" comment="MozillaThunderbird-devel-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120914" comment="MozillaThunderbird-translations-common-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120915" comment="MozillaThunderbird-translations-other-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120798" comment="xulrunner-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120799" comment="xulrunner-32bit-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120800" comment="xulrunner-devel-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7211</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7211" source="CVE"/>
    <description>
    Mozilla Firefox before 43.0 mishandles the # (number sign) character in a data: URI, which allows remote attackers to spoof web sites via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7211.html">CVE-2015-7211</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7211">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119896" comment="MozillaFirefox-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119897" comment="MozillaFirefox-branding-upstream-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119898" comment="MozillaFirefox-buildsymbols-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119899" comment="MozillaFirefox-devel-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119900" comment="MozillaFirefox-translations-common-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119901" comment="MozillaFirefox-translations-other-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7212</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212" source="CVE"/>
    <description>
    Integer overflow in the mozilla::layers::BufferTextureClient::AllocateForSurface function in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering a graphics operation that requires a large texture allocation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7212.html">CVE-2015-7212</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7212">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119896" comment="MozillaFirefox-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119897" comment="MozillaFirefox-branding-upstream-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119898" comment="MozillaFirefox-buildsymbols-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119899" comment="MozillaFirefox-devel-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119900" comment="MozillaFirefox-translations-common-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119901" comment="MozillaFirefox-translations-other-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120911" comment="MozillaThunderbird-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120912" comment="MozillaThunderbird-buildsymbols-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120913" comment="MozillaThunderbird-devel-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120914" comment="MozillaThunderbird-translations-common-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120915" comment="MozillaThunderbird-translations-other-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120798" comment="xulrunner-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120799" comment="xulrunner-32bit-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120800" comment="xulrunner-devel-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7213</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213" source="CVE"/>
    <description>
    Integer overflow in the MPEG4Extractor::readMetaData function in MPEG4Extractor.cpp in libstagefright in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 on 64-bit platforms allows remote attackers to execute arbitrary code via a crafted MP4 video file that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7213.html">CVE-2015-7213</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7213">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119896" comment="MozillaFirefox-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119897" comment="MozillaFirefox-branding-upstream-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119898" comment="MozillaFirefox-buildsymbols-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119899" comment="MozillaFirefox-devel-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119900" comment="MozillaFirefox-translations-common-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119901" comment="MozillaFirefox-translations-other-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120911" comment="MozillaThunderbird-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120912" comment="MozillaThunderbird-buildsymbols-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120913" comment="MozillaThunderbird-devel-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120914" comment="MozillaThunderbird-translations-common-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120915" comment="MozillaThunderbird-translations-other-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120798" comment="xulrunner-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120799" comment="xulrunner-32bit-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120800" comment="xulrunner-devel-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7214</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214" source="CVE"/>
    <description>
    Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allow remote attackers to bypass the Same Origin Policy via data: and view-source: URIs.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7214.html">CVE-2015-7214</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7214">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119896" comment="MozillaFirefox-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119897" comment="MozillaFirefox-branding-upstream-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119898" comment="MozillaFirefox-buildsymbols-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119899" comment="MozillaFirefox-devel-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119900" comment="MozillaFirefox-translations-common-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119901" comment="MozillaFirefox-translations-other-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120911" comment="MozillaThunderbird-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120912" comment="MozillaThunderbird-buildsymbols-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120913" comment="MozillaThunderbird-devel-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120914" comment="MozillaThunderbird-translations-common-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120915" comment="MozillaThunderbird-translations-other-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120798" comment="xulrunner-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120799" comment="xulrunner-32bit-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120800" comment="xulrunner-devel-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7215</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7215" source="CVE"/>
    <description>
    The importScripts function in the Web Workers API implementation in Mozilla Firefox before 43.0 allows remote attackers to bypass the Same Origin Policy by triggering use of the no-cors mode in the fetch API to attempt resource access that throws an exception, leading to information disclosure after a rethrow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7215.html">CVE-2015-7215</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7215">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119896" comment="MozillaFirefox-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119897" comment="MozillaFirefox-branding-upstream-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119898" comment="MozillaFirefox-buildsymbols-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119899" comment="MozillaFirefox-devel-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119900" comment="MozillaFirefox-translations-common-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119901" comment="MozillaFirefox-translations-other-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7216</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7216" source="CVE"/>
    <description>
    The gdk-pixbuf configuration in Mozilla Firefox before 43.0 on Linux GNOME platforms incorrectly enables the JasPer decoder, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted JPEG 2000 image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7216.html">CVE-2015-7216</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7216">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119896" comment="MozillaFirefox-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119897" comment="MozillaFirefox-branding-upstream-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119898" comment="MozillaFirefox-buildsymbols-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119899" comment="MozillaFirefox-devel-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119900" comment="MozillaFirefox-translations-common-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119901" comment="MozillaFirefox-translations-other-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7217</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7217" source="CVE"/>
    <description>
    The gdk-pixbuf configuration in Mozilla Firefox before 43.0 on Linux GNOME platforms incorrectly enables the TGA decoder, which allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted Truevision TGA image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7217.html">CVE-2015-7217</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7217">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119896" comment="MozillaFirefox-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119897" comment="MozillaFirefox-branding-upstream-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119898" comment="MozillaFirefox-buildsymbols-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119899" comment="MozillaFirefox-devel-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119900" comment="MozillaFirefox-translations-common-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119901" comment="MozillaFirefox-translations-other-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7218</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7218" source="CVE"/>
    <description>
    The HTTP/2 implementation in Mozilla Firefox before 43.0 allows remote attackers to cause a denial of service (integer underflow, assertion failure, and application exit) via a single-byte header frame that triggers incorrect memory allocation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7218.html">CVE-2015-7218</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7218">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119896" comment="MozillaFirefox-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119897" comment="MozillaFirefox-branding-upstream-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119898" comment="MozillaFirefox-buildsymbols-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119899" comment="MozillaFirefox-devel-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119900" comment="MozillaFirefox-translations-common-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119901" comment="MozillaFirefox-translations-other-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7219</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7219" source="CVE"/>
    <description>
    The HTTP/2 implementation in Mozilla Firefox before 43.0 allows remote attackers to cause a denial of service (integer underflow, assertion failure, and application exit) via a malformed PushPromise frame that triggers decompressed-buffer length miscalculation and incorrect memory allocation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7219.html">CVE-2015-7219</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7219">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119896" comment="MozillaFirefox-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119897" comment="MozillaFirefox-branding-upstream-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119898" comment="MozillaFirefox-buildsymbols-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119899" comment="MozillaFirefox-devel-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119900" comment="MozillaFirefox-translations-common-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119901" comment="MozillaFirefox-translations-other-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7220</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7220" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7220" source="CVE"/>
    <description>
    Buffer overflow in the XDRBuffer::grow function in js/src/vm/Xdr.cpp in Mozilla Firefox before 43.0 might allow remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7220.html">CVE-2015-7220</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7220">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119896" comment="MozillaFirefox-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119897" comment="MozillaFirefox-branding-upstream-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119898" comment="MozillaFirefox-buildsymbols-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119899" comment="MozillaFirefox-devel-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119900" comment="MozillaFirefox-translations-common-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119901" comment="MozillaFirefox-translations-other-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7221</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7221" source="CVE"/>
    <description>
    Buffer overflow in the nsDeque::GrowCapacity function in xpcom/glue/nsDeque.cpp in Mozilla Firefox before 43.0 might allow remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a deque size change.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7221.html">CVE-2015-7221</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7221">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119896" comment="MozillaFirefox-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119897" comment="MozillaFirefox-branding-upstream-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119898" comment="MozillaFirefox-buildsymbols-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119899" comment="MozillaFirefox-devel-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119900" comment="MozillaFirefox-translations-common-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119901" comment="MozillaFirefox-translations-other-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7222</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222" source="CVE"/>
    <description>
    Integer underflow in the Metadata::setData function in MetaData.cpp in libstagefright in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code or cause a denial of service (incorrect memory allocation and application crash) via an MP4 video file with crafted covr metadata that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7222.html">CVE-2015-7222</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7222">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119896" comment="MozillaFirefox-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119897" comment="MozillaFirefox-branding-upstream-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119898" comment="MozillaFirefox-buildsymbols-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119899" comment="MozillaFirefox-devel-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119900" comment="MozillaFirefox-translations-common-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119901" comment="MozillaFirefox-translations-other-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120911" comment="MozillaThunderbird-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120912" comment="MozillaThunderbird-buildsymbols-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120913" comment="MozillaThunderbird-devel-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120914" comment="MozillaThunderbird-translations-common-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120915" comment="MozillaThunderbird-translations-other-38.5.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120798" comment="xulrunner-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120799" comment="xulrunner-32bit-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120800" comment="xulrunner-devel-38.5.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7223</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7223" source="CVE"/>
    <description>
    The WebExtension APIs in Mozilla Firefox before 43.0 allow remote attackers to gain privileges, and possibly obtain sensitive information or conduct cross-site scripting (XSS) attacks, via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7223.html">CVE-2015-7223</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7223">SUSE bug 959277</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119896" comment="MozillaFirefox-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119897" comment="MozillaFirefox-branding-upstream-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119898" comment="MozillaFirefox-buildsymbols-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119899" comment="MozillaFirefox-devel-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119900" comment="MozillaFirefox-translations-common-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119901" comment="MozillaFirefox-translations-other-43.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7236</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7236" source="CVE"/>
    <description>
    Use-after-free vulnerability in xprt_set_caller in rpcb_svc_com.c in rpcbind 0.2.1 and earlier allows remote attackers to cause a denial of service (daemon crash) via crafted packets, involving a PMAP_CALLIT code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7236.html">CVE-2015-7236</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7236">SUSE bug 946204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7236">SUSE bug 946204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7236">SUSE bug 946204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7236">SUSE bug 946204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7236">SUSE bug 946204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7236">SUSE bug 946204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7236">SUSE bug 946204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139076" comment="rpcbind-0.2.1_rc4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153045" comment="rpcbind is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7295</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295" source="CVE"/>
    <description>
    hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7295.html">CVE-2015-7295</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7295">SUSE bug 947159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7295">SUSE bug 947159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7295">SUSE bug 947159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7295">SUSE bug 947159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7295">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7295">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7295">SUSE bug 947159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7295">SUSE bug 947159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7295">SUSE bug 947159</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139060" comment="qemu-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139061" comment="qemu-arm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139062" comment="qemu-block-curl-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139063" comment="qemu-block-rbd-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139064" comment="qemu-extra-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139065" comment="qemu-kvm-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139066" comment="qemu-lang-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139073" comment="qemu-linux-user-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139067" comment="qemu-ppc-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139068" comment="qemu-s390-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139069" comment="qemu-seabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139070" comment="qemu-tools-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139071" comment="qemu-vgabios-1.8.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139072" comment="qemu-x86-2.3.1-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7311</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311" source="CVE"/>
    <description>
    libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7311.html">CVE-2015-7311</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7311">SUSE bug 947165</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7311">SUSE bug 947165</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7311">SUSE bug 947165</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7311">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7311">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7311">SUSE bug 947165</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7311">SUSE bug 947165</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7311">SUSE bug 947165</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7311">SUSE bug 947165</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7311">SUSE bug 947165</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7311">SUSE bug 947165</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7311">SUSE bug 947165</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7311">SUSE bug 947165</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7311">SUSE bug 947165</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7311">SUSE bug 947165</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7311">SUSE bug 947165</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7311">SUSE bug 947165</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7311">SUSE bug 947165</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7311">SUSE bug 947165</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139136" comment="xen-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118975" comment="xen-devel-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139137" comment="xen-doc-html-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139138" comment="xen-kmp-default-4.5.1_10_k4.1.12_1-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139139" comment="xen-libs-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118979" comment="xen-libs-32bit-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139140" comment="xen-tools-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009139141" comment="xen-tools-domU-4.5.1_10-1.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7384</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7384" source="CVE"/>
    <description>
    Node.js 4.0.0, 4.1.0, and 4.1.1 allows remote attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7384.html">CVE-2015-7384</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7384">SUSE bug 948602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7384">SUSE bug 948602</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117990" comment="nodejs-4.2.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117991" comment="nodejs-devel-4.2.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117992" comment="nodejs-doc-4.2.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153042" comment="nodejs-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117993" comment="nodejs-docs-4.2.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117994" comment="nodejs-npm-4.2.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153046" comment="nodejs-npm is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7497</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497" source="CVE"/>
    <description>
    Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7497.html">CVE-2015-7497</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7497">SUSE bug 957106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7497">SUSE bug 957106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7497">SUSE bug 957106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7497">SUSE bug 957106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7497">SUSE bug 957106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7497">SUSE bug 957106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7497">SUSE bug 959469</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7497">SUSE bug 957106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7497">SUSE bug 957106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7497">SUSE bug 957106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7497">SUSE bug 957106</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103733" comment="libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103734" comment="libxml2-devel-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103735" comment="libxml2-devel-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103736" comment="libxml2-doc-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103738" comment="python-libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7498</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498" source="CVE"/>
    <description>
    Heap-based buffer overflow in the xmlParseXmlDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors related to extracting errors after an encoding conversion failure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7498.html">CVE-2015-7498</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7498">SUSE bug 957107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7498">SUSE bug 957107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7498">SUSE bug 957107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7498">SUSE bug 957107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7498">SUSE bug 957107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7498">SUSE bug 957107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7498">SUSE bug 959469</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7498">SUSE bug 957107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7498">SUSE bug 957107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7498">SUSE bug 957107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7498">SUSE bug 957107</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103733" comment="libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103734" comment="libxml2-devel-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103735" comment="libxml2-devel-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103736" comment="libxml2-doc-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103738" comment="python-libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7499</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499" source="CVE"/>
    <description>
    Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7499.html">CVE-2015-7499</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7499">SUSE bug 957109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7499">SUSE bug 957109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7499">SUSE bug 957109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7499">SUSE bug 957109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7499">SUSE bug 957109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7499">SUSE bug 959469</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7499">SUSE bug 957109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7499">SUSE bug 957109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7499">SUSE bug 957109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7499">SUSE bug 957109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103733" comment="libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103734" comment="libxml2-devel-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103735" comment="libxml2-devel-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103736" comment="libxml2-doc-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103738" comment="python-libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7500</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500" source="CVE"/>
    <description>
    The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (out-of-bounds heap read) via unspecified vectors related to incorrect entities boundaries and start tags.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7500.html">CVE-2015-7500</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7500">SUSE bug 957110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7500">SUSE bug 957110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7500">SUSE bug 957110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7500">SUSE bug 957110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7500">SUSE bug 957110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7500">SUSE bug 959469</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7500">SUSE bug 957110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7500">SUSE bug 957110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7500">SUSE bug 957110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7500">SUSE bug 957110</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103733" comment="libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103734" comment="libxml2-devel-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103735" comment="libxml2-devel-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103736" comment="libxml2-doc-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103738" comment="python-libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7504</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504" source="CVE"/>
    <description>
    Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7504.html">CVE-2015-7504</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7504">SUSE bug 956411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7504">SUSE bug 956411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7504">SUSE bug 956411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7504">SUSE bug 956411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7504">SUSE bug 956411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7504">SUSE bug 956411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7504">SUSE bug 956411</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121492" comment="xen-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121493" comment="xen-devel-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121494" comment="xen-doc-html-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121495" comment="xen-kmp-default-4.5.2_04_k4.1.13_5-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121496" comment="xen-libs-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121497" comment="xen-libs-32bit-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121498" comment="xen-tools-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121499" comment="xen-tools-domU-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7511</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7511" source="CVE"/>
    <description>
    Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7511.html">CVE-2015-7511</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7511">SUSE bug 965902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7511">SUSE bug 965902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7511">SUSE bug 965902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7511">SUSE bug 965902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7511">SUSE bug 965902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7511">SUSE bug 965902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7511">SUSE bug 965902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7511">SUSE bug 965902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7511">SUSE bug 965902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7511">SUSE bug 965902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7511">SUSE bug 965902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7511">SUSE bug 965902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7511">SUSE bug 965902</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127232" comment="libgcrypt-1.6.1-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153047" comment="libgcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127233" comment="libgcrypt-cavs-1.6.1-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153048" comment="libgcrypt-cavs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127234" comment="libgcrypt-devel-1.6.1-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151920" comment="libgcrypt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127235" comment="libgcrypt-devel-32bit-1.6.1-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153049" comment="libgcrypt-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127236" comment="libgcrypt20-1.6.1-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151921" comment="libgcrypt20 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127237" comment="libgcrypt20-32bit-1.6.1-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151922" comment="libgcrypt20-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127238" comment="libgcrypt20-hmac-1.6.1-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153050" comment="libgcrypt20-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127239" comment="libgcrypt20-hmac-32bit-1.6.1-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153051" comment="libgcrypt20-hmac-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7512</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512" source="CVE"/>
    <description>
    Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7512.html">CVE-2015-7512</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7512">SUSE bug 957162</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7512">SUSE bug 957162</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7512">SUSE bug 957162</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7512">SUSE bug 957162</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7512">SUSE bug 957162</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7512">SUSE bug 957162</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7512">SUSE bug 957162</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7512">SUSE bug 962360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7512">SUSE bug 957162</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7512">SUSE bug 957162</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7512">SUSE bug 962360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7512">SUSE bug 962360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7512">SUSE bug 962360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7512">SUSE bug 962360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7512">SUSE bug 957162</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123644" comment="qemu-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123645" comment="qemu-arm-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123646" comment="qemu-block-curl-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123647" comment="qemu-block-rbd-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123648" comment="qemu-extra-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123649" comment="qemu-guest-agent-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123650" comment="qemu-ipxe-1.0.0-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123651" comment="qemu-kvm-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123652" comment="qemu-lang-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123653" comment="qemu-linux-user-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123654" comment="qemu-ppc-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123655" comment="qemu-s390-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123656" comment="qemu-seabios-1.8.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123657" comment="qemu-sgabios-8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123658" comment="qemu-testsuite-2.3.1-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123659" comment="qemu-tools-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123660" comment="qemu-vgabios-1.8.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123661" comment="qemu-x86-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7547</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7547.html">CVE-2015-7547</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967496</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 847227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 969216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 969216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 969216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 969241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 967061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 969241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 969241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 986086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 969241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 969241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 961721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 1077097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 969241</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 1077097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 1077097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 1077097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 1077097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 1077097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 1077097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 1077097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7547">SUSE bug 1077097</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123354" comment="glibc-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123355" comment="glibc-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123356" comment="glibc-devel-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123357" comment="glibc-devel-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152566" comment="glibc-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123358" comment="glibc-devel-static-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123359" comment="glibc-devel-static-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152568" comment="glibc-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123360" comment="glibc-extra-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123361" comment="glibc-html-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123362" comment="glibc-i18ndata-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123363" comment="glibc-info-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123364" comment="glibc-locale-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123365" comment="glibc-locale-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123366" comment="glibc-obsolete-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152571" comment="glibc-obsolete is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123367" comment="glibc-profile-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123368" comment="glibc-profile-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152573" comment="glibc-profile-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123369" comment="glibc-testsuite-2.19-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152574" comment="glibc-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123370" comment="glibc-utils-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123371" comment="glibc-utils-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152576" comment="glibc-utils-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123372" comment="nscd-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7549</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549" source="CVE"/>
    <description>
    The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7549.html">CVE-2015-7549</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958917</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7549">SUSE bug 958917</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121492" comment="xen-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121493" comment="xen-devel-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121494" comment="xen-doc-html-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121495" comment="xen-kmp-default-4.5.2_04_k4.1.13_5-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121496" comment="xen-libs-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121497" comment="xen-libs-32bit-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121498" comment="xen-tools-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121499" comment="xen-tools-domU-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7550</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7550" source="CVE"/>
    <description>
    The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7550.html">CVE-2015-7550</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 958951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7550">SUSE bug 1052256</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122451" comment="kernel-debug-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122452" comment="kernel-debug-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122453" comment="kernel-debug-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122454" comment="kernel-default-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122455" comment="kernel-default-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122456" comment="kernel-default-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122457" comment="kernel-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122458" comment="kernel-docs-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122459" comment="kernel-docs-html-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122460" comment="kernel-docs-pdf-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122461" comment="kernel-ec2-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122462" comment="kernel-ec2-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122463" comment="kernel-ec2-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122464" comment="kernel-macros-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122465" comment="kernel-obs-build-4.1.15-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122466" comment="kernel-obs-qa-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122467" comment="kernel-obs-qa-xen-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122468" comment="kernel-pae-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122469" comment="kernel-pae-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122470" comment="kernel-pae-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122471" comment="kernel-pv-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122472" comment="kernel-pv-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122473" comment="kernel-pv-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122474" comment="kernel-source-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122475" comment="kernel-source-vanilla-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122476" comment="kernel-syms-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122477" comment="kernel-vanilla-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122478" comment="kernel-vanilla-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122479" comment="kernel-xen-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122480" comment="kernel-xen-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122481" comment="kernel-xen-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7551</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7551" source="CVE"/>
    <description>
    The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string, related to the DL module and the libffi library.  NOTE: this vulnerability exists because of a CVE-2009-5147 regression.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7551.html">CVE-2015-7551</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7551">SUSE bug 959495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7551">SUSE bug 959495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7551">SUSE bug 959495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7551">SUSE bug 959495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7551">SUSE bug 939860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7551">SUSE bug 959495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7551">SUSE bug 959495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7551">SUSE bug 959495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7551">SUSE bug 959495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7551">SUSE bug 959495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7551">SUSE bug 959495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7551">SUSE bug 939860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7551">SUSE bug 959495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7551">SUSE bug 959495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7551">SUSE bug 959495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7551">SUSE bug 959495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7551">SUSE bug 939860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7551">SUSE bug 959495</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154833" comment="libruby2_1-2_1-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152217" comment="libruby2_1-2_1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150703" comment="libruby2_2-2_2-2.2.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153052" comment="libruby2_2-2_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154834" comment="ruby2.1-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152218" comment="ruby2.1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154835" comment="ruby2.1-devel-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152219" comment="ruby2.1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154836" comment="ruby2.1-devel-extra-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154837" comment="ruby2.1-devel-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154838" comment="ruby2.1-doc-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154839" comment="ruby2.1-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154840" comment="ruby2.1-doc-ri-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154841" comment="ruby2.1-doc-ri is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154842" comment="ruby2.1-stdlib-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152220" comment="ruby2.1-stdlib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150704" comment="ruby2.2-2.2.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153053" comment="ruby2.2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150705" comment="ruby2.2-devel-2.2.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153054" comment="ruby2.2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150706" comment="ruby2.2-devel-extra-2.2.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153055" comment="ruby2.2-devel-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150707" comment="ruby2.2-doc-2.2.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153056" comment="ruby2.2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150708" comment="ruby2.2-doc-ri-2.2.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153057" comment="ruby2.2-doc-ri is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150709" comment="ruby2.2-stdlib-2.2.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153058" comment="ruby2.2-stdlib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150710" comment="ruby2.2-tk-2.2.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153059" comment="ruby2.2-tk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7552</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7552" source="CVE"/>
    <description>
    Heap-based buffer overflow in the gdk_pixbuf_flip function in gdk-pixbuf-scale.c in gdk-pixbuf 2.30.x allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted BMP file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7552.html">CVE-2015-7552</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7552">SUSE bug 958963</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128379" comment="gdk-pixbuf-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153060" comment="gdk-pixbuf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128380" comment="gdk-pixbuf-devel-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151614" comment="gdk-pixbuf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128381" comment="gdk-pixbuf-devel-32bit-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153061" comment="gdk-pixbuf-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128382" comment="gdk-pixbuf-lang-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151615" comment="gdk-pixbuf-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128383" comment="gdk-pixbuf-query-loaders-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151616" comment="gdk-pixbuf-query-loaders is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128384" comment="gdk-pixbuf-query-loaders-32bit-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151617" comment="gdk-pixbuf-query-loaders-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128385" comment="libgdk_pixbuf-2_0-0-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151618" comment="libgdk_pixbuf-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128386" comment="libgdk_pixbuf-2_0-0-32bit-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151619" comment="libgdk_pixbuf-2_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128387" comment="typelib-1_0-GdkPixbuf-2_0-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151620" comment="typelib-1_0-GdkPixbuf-2_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7554</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7554" source="CVE"/>
    <description>
    The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7554.html">CVE-2015-7554</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 983436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 983436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 1017690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 1017690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 983436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7554">SUSE bug 960341</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122198" comment="libtiff-devel-4.0.6-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122199" comment="libtiff-devel-32bit-4.0.6-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122200" comment="libtiff5-4.0.6-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122201" comment="libtiff5-32bit-4.0.6-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122202" comment="tiff-4.0.6-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7555</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7555" source="CVE"/>
    <description>
    Heap-based buffer overflow in giffix.c in giffix in giflib 5.1.1 allows attackers to cause a denial of service (program crash) via crafted image and logical screen width fields in a GIF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7555.html">CVE-2015-7555</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7555">SUSE bug 960319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7555">SUSE bug 960319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7555">SUSE bug 960319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7555">SUSE bug 960319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7555">SUSE bug 960319</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121622" comment="giflib-5.0.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153062" comment="giflib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121651" comment="giflib-devel-5.0.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153063" comment="giflib-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122482" comment="giflib-devel-32bit-5.0.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153064" comment="giflib-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121656" comment="giflib-progs-5.0.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153065" comment="giflib-progs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121623" comment="libgif6-5.0.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153066" comment="libgif6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121624" comment="libgif6-32bit-5.0.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153067" comment="libgif6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7560</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560" source="CVE"/>
    <description>
    The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7560.html">CVE-2015-7560</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7560">SUSE bug 968222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7560">SUSE bug 968222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7560">SUSE bug 968222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7560">SUSE bug 968222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7560">SUSE bug 968222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7560">SUSE bug 968222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7560">SUSE bug 968222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7560">SUSE bug 968222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7560">SUSE bug 968222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7560">SUSE bug 968222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7560">SUSE bug 968222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7560">SUSE bug 968222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7560">SUSE bug 968222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7560">SUSE bug 968222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7560">SUSE bug 968222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7560">SUSE bug 968222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7560">SUSE bug 968222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7560">SUSE bug 968222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7560">SUSE bug 968222</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125377" comment="ctdb-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125378" comment="ctdb-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152997" comment="ctdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125379" comment="ctdb-tests-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125380" comment="libdcerpc-atsvc-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152724" comment="libdcerpc-atsvc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125381" comment="libdcerpc-atsvc0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152725" comment="libdcerpc-atsvc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125382" comment="libdcerpc-atsvc0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152726" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125383" comment="libdcerpc-binding0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125384" comment="libdcerpc-binding0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125385" comment="libdcerpc-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125386" comment="libdcerpc-samr-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125387" comment="libdcerpc-samr0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125388" comment="libdcerpc-samr0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125389" comment="libdcerpc0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125390" comment="libdcerpc0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125391" comment="libgensec-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152731" comment="libgensec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125392" comment="libgensec0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125393" comment="libgensec0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125394" comment="libndr-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125395" comment="libndr-krb5pac-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125396" comment="libndr-krb5pac0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125397" comment="libndr-krb5pac0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125398" comment="libndr-nbt-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125399" comment="libndr-nbt0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125400" comment="libndr-nbt0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125401" comment="libndr-standard-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125402" comment="libndr-standard0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125403" comment="libndr-standard0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125404" comment="libndr0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125405" comment="libndr0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125406" comment="libnetapi-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125407" comment="libnetapi0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125408" comment="libnetapi0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125409" comment="libregistry-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152740" comment="libregistry-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125410" comment="libregistry0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125411" comment="libregistry0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152741" comment="libregistry0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125412" comment="libsamba-credentials-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125413" comment="libsamba-credentials0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125414" comment="libsamba-credentials0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125415" comment="libsamba-hostconfig-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125416" comment="libsamba-hostconfig0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125417" comment="libsamba-hostconfig0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125418" comment="libsamba-passdb-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125419" comment="libsamba-passdb0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125420" comment="libsamba-passdb0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125421" comment="libsamba-policy-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125422" comment="libsamba-policy0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125423" comment="libsamba-policy0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125424" comment="libsamba-util-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125425" comment="libsamba-util0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125426" comment="libsamba-util0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125427" comment="libsamdb-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125428" comment="libsamdb0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125429" comment="libsamdb0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125430" comment="libsmbclient-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125431" comment="libsmbclient-raw-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152750" comment="libsmbclient-raw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125432" comment="libsmbclient-raw0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125433" comment="libsmbclient-raw0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125434" comment="libsmbclient0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125435" comment="libsmbclient0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125436" comment="libsmbconf-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125437" comment="libsmbconf0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125438" comment="libsmbconf0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125439" comment="libsmbldap-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125440" comment="libsmbldap0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125441" comment="libsmbldap0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125442" comment="libtevent-util-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125443" comment="libtevent-util0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125444" comment="libtevent-util0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125445" comment="libwbclient-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125446" comment="libwbclient0-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125447" comment="libwbclient0-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125448" comment="samba-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125449" comment="samba-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125450" comment="samba-client-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125451" comment="samba-client-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125452" comment="samba-core-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125453" comment="samba-doc-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125454" comment="samba-libs-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125455" comment="samba-libs-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125456" comment="samba-pidl-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125457" comment="samba-python-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125458" comment="samba-test-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125459" comment="samba-test-devel-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152779" comment="samba-test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125460" comment="samba-winbind-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125461" comment="samba-winbind-32bit-4.2.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7575</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7575.html">CVE-2015-7575</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 959888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 959888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 959888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 959888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 959888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 959888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 959888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 959888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 959888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 959888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 960996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 959888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 960996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 960996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 961280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 961281</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 961282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 961283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 961284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 961290</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 959888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 960996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 961284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 961357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 961284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 961357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 959888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 960996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 961284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 960996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 962743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 959888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 960996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 960996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 960996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 960996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 963937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 960996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 967521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 959888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 960996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 960996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 967521</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 960402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 981087</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 961357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 961357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 960996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7575">SUSE bug 961357</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120973" comment="MozillaFirefox-43.0.3-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120974" comment="MozillaFirefox-branding-upstream-43.0.3-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120975" comment="MozillaFirefox-buildsymbols-43.0.3-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120976" comment="MozillaFirefox-devel-43.0.3-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120977" comment="MozillaFirefox-translations-common-43.0.3-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120978" comment="MozillaFirefox-translations-other-43.0.3-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123852" comment="bouncycastle-1.54-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153068" comment="bouncycastle is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123853" comment="bouncycastle-javadoc-1.54-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153069" comment="bouncycastle-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122393" comment="java-1_7_0-openjdk-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122394" comment="java-1_7_0-openjdk-accessibility-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122395" comment="java-1_7_0-openjdk-bootstrap-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122396" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122397" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122398" comment="java-1_7_0-openjdk-demo-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122399" comment="java-1_7_0-openjdk-devel-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122400" comment="java-1_7_0-openjdk-headless-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122401" comment="java-1_7_0-openjdk-javadoc-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122402" comment="java-1_7_0-openjdk-src-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120916" comment="libfreebl3-3.20.2-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120917" comment="libfreebl3-32bit-3.20.2-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121684" comment="libmbedtls9-1.3.16-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152973" comment="libmbedtls9 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121685" comment="libmbedtls9-32bit-1.3.16-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152974" comment="libmbedtls9-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120918" comment="libsoftokn3-3.20.2-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120919" comment="libsoftokn3-32bit-3.20.2-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121686" comment="mbedtls-1.3.16-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152975" comment="mbedtls is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121687" comment="mbedtls-devel-1.3.16-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152976" comment="mbedtls-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120920" comment="mozilla-nss-3.20.2-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120921" comment="mozilla-nss-32bit-3.20.2-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120922" comment="mozilla-nss-certs-3.20.2-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120923" comment="mozilla-nss-certs-32bit-3.20.2-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120924" comment="mozilla-nss-devel-3.20.2-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120925" comment="mozilla-nss-sysinit-3.20.2-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120926" comment="mozilla-nss-sysinit-32bit-3.20.2-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120927" comment="mozilla-nss-tools-3.20.2-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122694" comment="seamonkey-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122695" comment="seamonkey-dom-inspector-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152818" comment="seamonkey-dom-inspector is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122696" comment="seamonkey-irc-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152819" comment="seamonkey-irc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122697" comment="seamonkey-translations-common-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122698" comment="seamonkey-translations-other-2.40-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7576</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7576" source="CVE"/>
    <description>
    The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7576.html">CVE-2015-7576</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7576">SUSE bug 963329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7576">SUSE bug 963329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7576">SUSE bug 963329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7576">SUSE bug 963329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7576">SUSE bug 963329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7576">SUSE bug 963329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7576">SUSE bug 963329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7576">SUSE bug 963329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7576">SUSE bug 963329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7576">SUSE bug 963329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7576">SUSE bug 970715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7576">SUSE bug 963329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7576">SUSE bug 963329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7576">SUSE bug 963329</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122993" comment="ruby2.1-rubygem-actionpack-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153070" comment="ruby2.1-rubygem-actionpack-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122994" comment="ruby2.1-rubygem-actionpack-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153071" comment="ruby2.1-rubygem-actionpack-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122995" comment="ruby2.1-rubygem-actionview-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153072" comment="ruby2.1-rubygem-actionview-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122996" comment="ruby2.1-rubygem-actionview-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153073" comment="ruby2.1-rubygem-actionview-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122997" comment="ruby2.1-rubygem-activemodel-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153074" comment="ruby2.1-rubygem-activemodel-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122998" comment="ruby2.1-rubygem-activemodel-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153075" comment="ruby2.1-rubygem-activemodel-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122999" comment="ruby2.1-rubygem-activerecord-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153076" comment="ruby2.1-rubygem-activerecord-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123000" comment="ruby2.1-rubygem-activerecord-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153077" comment="ruby2.1-rubygem-activerecord-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123001" comment="ruby2.1-rubygem-activesupport-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153078" comment="ruby2.1-rubygem-activesupport-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123002" comment="ruby2.1-rubygem-activesupport-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153079" comment="ruby2.1-rubygem-activesupport-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123003" comment="rubygem-actionpack-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153080" comment="rubygem-actionpack-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123004" comment="rubygem-actionview-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153081" comment="rubygem-actionview-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123005" comment="rubygem-activemodel-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153082" comment="rubygem-activemodel-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123006" comment="rubygem-activerecord-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153083" comment="rubygem-activerecord-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123007" comment="rubygem-activesupport-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153084" comment="rubygem-activesupport-4_2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7577</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7577" source="CVE"/>
    <description>
    activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7577.html">CVE-2015-7577</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7577">SUSE bug 963330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7577">SUSE bug 963330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7577">SUSE bug 963330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7577">SUSE bug 963330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7577">SUSE bug 963330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7577">SUSE bug 963330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7577">SUSE bug 963330</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7577">SUSE bug 963330</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122993" comment="ruby2.1-rubygem-actionpack-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153070" comment="ruby2.1-rubygem-actionpack-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122994" comment="ruby2.1-rubygem-actionpack-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153071" comment="ruby2.1-rubygem-actionpack-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122995" comment="ruby2.1-rubygem-actionview-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153072" comment="ruby2.1-rubygem-actionview-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122996" comment="ruby2.1-rubygem-actionview-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153073" comment="ruby2.1-rubygem-actionview-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122997" comment="ruby2.1-rubygem-activemodel-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153074" comment="ruby2.1-rubygem-activemodel-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122998" comment="ruby2.1-rubygem-activemodel-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153075" comment="ruby2.1-rubygem-activemodel-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122999" comment="ruby2.1-rubygem-activerecord-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153076" comment="ruby2.1-rubygem-activerecord-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123000" comment="ruby2.1-rubygem-activerecord-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153077" comment="ruby2.1-rubygem-activerecord-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123001" comment="ruby2.1-rubygem-activesupport-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153078" comment="ruby2.1-rubygem-activesupport-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123002" comment="ruby2.1-rubygem-activesupport-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153079" comment="ruby2.1-rubygem-activesupport-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123003" comment="rubygem-actionpack-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153080" comment="rubygem-actionpack-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123004" comment="rubygem-actionview-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153081" comment="rubygem-actionview-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123005" comment="rubygem-activemodel-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153082" comment="rubygem-activemodel-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123006" comment="rubygem-activerecord-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153083" comment="rubygem-activerecord-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123007" comment="rubygem-activesupport-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153084" comment="rubygem-activesupport-4_2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7578</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7578" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7578.html">CVE-2015-7578</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7578">SUSE bug 963326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7578">SUSE bug 963326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7578">SUSE bug 963326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7578">SUSE bug 963326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7578">SUSE bug 963326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7578">SUSE bug 963326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7578">SUSE bug 963326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7578">SUSE bug 963326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7578">SUSE bug 963326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7578">SUSE bug 963326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7578">SUSE bug 963326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7578">SUSE bug 963326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7578">SUSE bug 963326</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122926" comment="ruby2.1-rubygem-rails-html-sanitizer-1.0.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153085" comment="ruby2.1-rubygem-rails-html-sanitizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122927" comment="ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153086" comment="ruby2.1-rubygem-rails-html-sanitizer-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122928" comment="ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153087" comment="ruby2.1-rubygem-rails-html-sanitizer-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122929" comment="rubygem-rails-html-sanitizer-1.0.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153088" comment="rubygem-rails-html-sanitizer is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7579</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7579" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7579" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7579.html">CVE-2015-7579</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7579">SUSE bug 963327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7579">SUSE bug 963327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7579">SUSE bug 963327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7579">SUSE bug 963326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7579">SUSE bug 963327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7579">SUSE bug 963328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7579">SUSE bug 963327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7579">SUSE bug 963327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7579">SUSE bug 963327</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122926" comment="ruby2.1-rubygem-rails-html-sanitizer-1.0.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153085" comment="ruby2.1-rubygem-rails-html-sanitizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122927" comment="ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153086" comment="ruby2.1-rubygem-rails-html-sanitizer-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122928" comment="ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153087" comment="ruby2.1-rubygem-rails-html-sanitizer-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122929" comment="rubygem-rails-html-sanitizer-1.0.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153088" comment="rubygem-rails-html-sanitizer is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7580</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7580" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7580.html">CVE-2015-7580</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7580">SUSE bug 963328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7580">SUSE bug 963328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7580">SUSE bug 963328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7580">SUSE bug 963326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7580">SUSE bug 963327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7580">SUSE bug 963328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7580">SUSE bug 963328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7580">SUSE bug 963328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7580">SUSE bug 963328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7580">SUSE bug 963328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7580">SUSE bug 963328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7580">SUSE bug 963328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7580">SUSE bug 963328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7580">SUSE bug 963328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7580">SUSE bug 963328</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122926" comment="ruby2.1-rubygem-rails-html-sanitizer-1.0.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153085" comment="ruby2.1-rubygem-rails-html-sanitizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122927" comment="ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153086" comment="ruby2.1-rubygem-rails-html-sanitizer-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122928" comment="ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153087" comment="ruby2.1-rubygem-rails-html-sanitizer-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122929" comment="rubygem-rails-html-sanitizer-1.0.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153088" comment="rubygem-rails-html-sanitizer is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7581</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7581" source="CVE"/>
    <description>
    actionpack/lib/action_dispatch/routing/route_set.rb in Action Pack in Ruby on Rails 4.x before 4.2.5.1 and 5.x before 5.0.0.beta1.1 allows remote attackers to cause a denial of service (superfluous caching and memory consumption) by leveraging an application's use of a wildcard controller route.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7581.html">CVE-2015-7581</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7581">SUSE bug 963335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7581">SUSE bug 963335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7581">SUSE bug 963335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7581">SUSE bug 963335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7581">SUSE bug 963335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7581">SUSE bug 963335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7581">SUSE bug 963335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7581">SUSE bug 963335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7581">SUSE bug 963335</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122993" comment="ruby2.1-rubygem-actionpack-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153070" comment="ruby2.1-rubygem-actionpack-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122994" comment="ruby2.1-rubygem-actionpack-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153071" comment="ruby2.1-rubygem-actionpack-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122995" comment="ruby2.1-rubygem-actionview-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153072" comment="ruby2.1-rubygem-actionview-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122996" comment="ruby2.1-rubygem-actionview-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153073" comment="ruby2.1-rubygem-actionview-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122997" comment="ruby2.1-rubygem-activemodel-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153074" comment="ruby2.1-rubygem-activemodel-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122998" comment="ruby2.1-rubygem-activemodel-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153075" comment="ruby2.1-rubygem-activemodel-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122999" comment="ruby2.1-rubygem-activerecord-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153076" comment="ruby2.1-rubygem-activerecord-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123000" comment="ruby2.1-rubygem-activerecord-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153077" comment="ruby2.1-rubygem-activerecord-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123001" comment="ruby2.1-rubygem-activesupport-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153078" comment="ruby2.1-rubygem-activesupport-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123002" comment="ruby2.1-rubygem-activesupport-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153079" comment="ruby2.1-rubygem-activesupport-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123003" comment="rubygem-actionpack-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153080" comment="rubygem-actionpack-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123004" comment="rubygem-actionview-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153081" comment="rubygem-actionview-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123005" comment="rubygem-activemodel-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153082" comment="rubygem-activemodel-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123006" comment="rubygem-activerecord-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153083" comment="rubygem-activerecord-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123007" comment="rubygem-activesupport-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153084" comment="rubygem-activesupport-4_2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7673</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673" source="CVE"/>
    <description>
    io-tga.c in gdk-pixbuf before 2.32.0 uses heap memory after its allocation failed, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) and possibly execute arbitrary code via a crafted Truevision TGA (TARGA) file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7673.html">CVE-2015-7673</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7673">SUSE bug 948790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7673">SUSE bug 948790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7673">SUSE bug 948790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7673">SUSE bug 948790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7673">SUSE bug 948790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7673">SUSE bug 948790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7673">SUSE bug 948790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7673">SUSE bug 948790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7673">SUSE bug 948790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7673">SUSE bug 948790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7673">SUSE bug 948790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7673">SUSE bug 948790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7673">SUSE bug 948790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7673">SUSE bug 948790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7673">SUSE bug 948790</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128379" comment="gdk-pixbuf-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153060" comment="gdk-pixbuf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128380" comment="gdk-pixbuf-devel-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151614" comment="gdk-pixbuf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128381" comment="gdk-pixbuf-devel-32bit-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153061" comment="gdk-pixbuf-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128382" comment="gdk-pixbuf-lang-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151615" comment="gdk-pixbuf-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128383" comment="gdk-pixbuf-query-loaders-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151616" comment="gdk-pixbuf-query-loaders is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128384" comment="gdk-pixbuf-query-loaders-32bit-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151617" comment="gdk-pixbuf-query-loaders-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128385" comment="libgdk_pixbuf-2_0-0-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151618" comment="libgdk_pixbuf-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128386" comment="libgdk_pixbuf-2_0-0-32bit-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151619" comment="libgdk_pixbuf-2_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128387" comment="typelib-1_0-GdkPixbuf-2_0-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151620" comment="typelib-1_0-GdkPixbuf-2_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7674</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674" source="CVE"/>
    <description>
    Integer overflow in the pixops_scale_nearest function in pixops/pixops.c in gdk-pixbuf before 2.32.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted GIF image file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7674.html">CVE-2015-7674</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7674">SUSE bug 948791</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128379" comment="gdk-pixbuf-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153060" comment="gdk-pixbuf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128380" comment="gdk-pixbuf-devel-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151614" comment="gdk-pixbuf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128381" comment="gdk-pixbuf-devel-32bit-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153061" comment="gdk-pixbuf-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128382" comment="gdk-pixbuf-lang-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151615" comment="gdk-pixbuf-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128383" comment="gdk-pixbuf-query-loaders-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151616" comment="gdk-pixbuf-query-loaders is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128384" comment="gdk-pixbuf-query-loaders-32bit-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151617" comment="gdk-pixbuf-query-loaders-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128385" comment="libgdk_pixbuf-2_0-0-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151618" comment="libgdk_pixbuf-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128386" comment="libgdk_pixbuf-2_0-0-32bit-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151619" comment="libgdk_pixbuf-2_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128387" comment="typelib-1_0-GdkPixbuf-2_0-2.31.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151620" comment="typelib-1_0-GdkPixbuf-2_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7691</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691" source="CVE"/>
    <description>
    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations.  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7691.html">CVE-2015-7691</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7691">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7691">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7691">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7691">SUSE bug 992991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7691">SUSE bug 1010964</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118002" comment="ntp-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118003" comment="ntp-doc-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7692</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692" source="CVE"/>
    <description>
    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash).  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7692.html">CVE-2015-7692</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7692">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7692">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7692">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7692">SUSE bug 992991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7692">SUSE bug 1010964</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118002" comment="ntp-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118003" comment="ntp-doc-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7701</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701" source="CVE"/>
    <description>
    Memory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7701.html">CVE-2015-7701</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7701">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7701">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7701">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7701">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7701">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7701">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7701">SUSE bug 992991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7701">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7701">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7701">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7701">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7701">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7701">SUSE bug 951608</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118002" comment="ntp-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118003" comment="ntp-doc-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7702</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702" source="CVE"/>
    <description>
    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash).  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7702.html">CVE-2015-7702</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7702">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7702">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7702">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7702">SUSE bug 992991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7702">SUSE bug 1010964</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118002" comment="ntp-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118003" comment="ntp-doc-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7703</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703" source="CVE"/>
    <description>
    The "pidfile" or "driftfile" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7703.html">CVE-2015-7703</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 943221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 943221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 943221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 943218</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 943221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 943218</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 943221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 943219</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 943221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 943216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7703">SUSE bug 951608</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118002" comment="ntp-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118003" comment="ntp-doc-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7704</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704" source="CVE"/>
    <description>
    The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted "KOD" messages.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7704.html">CVE-2015-7704</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7704">SUSE bug 951608</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127851" comment="ntp-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127852" comment="ntp-doc-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7705</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705" source="CVE"/>
    <description>
    The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7705.html">CVE-2015-7705</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 952611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7705">SUSE bug 951608</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127851" comment="ntp-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127852" comment="ntp-doc-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7744</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7744" source="CVE"/>
    <description>
    wolfSSL (formerly CyaSSL) before 3.6.8 does not properly handle faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7744.html">CVE-2015-7744</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7744">SUSE bug 962950</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122905" comment="libmysql56client18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122906" comment="libmysql56client18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122907" comment="libmysql56client_r18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122908" comment="libmysql56client_r18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122909" comment="mysql-community-server-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122910" comment="mysql-community-server-bench-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122911" comment="mysql-community-server-client-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122912" comment="mysql-community-server-errormessages-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122913" comment="mysql-community-server-test-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122914" comment="mysql-community-server-tools-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7747</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7747" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7747.html">CVE-2015-7747</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7747">SUSE bug 949399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7747">SUSE bug 949399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7747">SUSE bug 949399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7747">SUSE bug 949399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7747">SUSE bug 949399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7747">SUSE bug 949399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7747">SUSE bug 949399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7747">SUSE bug 949399</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117619" comment="audiofile-0.3.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153089" comment="audiofile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117620" comment="audiofile-devel-0.3.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153090" comment="audiofile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117621" comment="audiofile-devel-32bit-0.3.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153091" comment="audiofile-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117622" comment="audiofile-doc-0.3.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153092" comment="audiofile-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117623" comment="libaudiofile1-0.3.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153093" comment="libaudiofile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117624" comment="libaudiofile1-32bit-0.3.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153094" comment="libaudiofile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7758</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7758" source="CVE"/>
    <description>
    Gummi 0.6.5 allows local users to write to arbitrary files via a symlink attack on a temporary dot file that uses the name of an existing file and a (1) .aux, (2) .log, (3) .out, (4) .pdf, or (5) .toc extension for the file name, as demonstrated by .thesis.tex.aux.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7758.html">CVE-2015-7758</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7758">SUSE bug 949682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7758">SUSE bug 949682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7758">SUSE bug 949682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7758">SUSE bug 949682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7758">SUSE bug 949682</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123695" comment="gummi-0.7.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153095" comment="gummi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123696" comment="gummi-lang-0.7.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153096" comment="gummi-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7799</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7799" source="CVE"/>
    <description>
    The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7799.html">CVE-2015-7799</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 951638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 949936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7799">SUSE bug 1052256</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126059" comment="kernel-debug-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126060" comment="kernel-debug-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126061" comment="kernel-debug-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126062" comment="kernel-default-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126063" comment="kernel-default-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126064" comment="kernel-default-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126065" comment="kernel-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126066" comment="kernel-docs-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126067" comment="kernel-docs-html-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126068" comment="kernel-docs-pdf-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126069" comment="kernel-ec2-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126070" comment="kernel-ec2-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126071" comment="kernel-ec2-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126072" comment="kernel-macros-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126073" comment="kernel-obs-build-4.1.20-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126074" comment="kernel-obs-qa-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126075" comment="kernel-obs-qa-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126076" comment="kernel-pae-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126077" comment="kernel-pae-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126078" comment="kernel-pae-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126079" comment="kernel-pv-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126080" comment="kernel-pv-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126081" comment="kernel-pv-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126082" comment="kernel-source-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126083" comment="kernel-source-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126084" comment="kernel-syms-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126085" comment="kernel-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126086" comment="kernel-vanilla-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126087" comment="kernel-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126088" comment="kernel-xen-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126089" comment="kernel-xen-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7803</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7803" source="CVE"/>
    <description>
    The phar_get_entry_data function in ext/phar/util.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a .phar file with a crafted TAR archive entry in which the Link indicator references a file that does not exist.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7803.html">CVE-2015-7803</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7803">SUSE bug 949961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7803">SUSE bug 949961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7803">SUSE bug 949961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7803">SUSE bug 949961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7803">SUSE bug 949961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7803">SUSE bug 949961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7803">SUSE bug 949961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7803">SUSE bug 949961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7803">SUSE bug 949961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7803">SUSE bug 949961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7803">SUSE bug 949961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7803">SUSE bug 949961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7803">SUSE bug 949961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7803">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7803">SUSE bug 949961</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122935" comment="apache2-mod_php5-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122936" comment="php5-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122937" comment="php5-bcmath-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122938" comment="php5-bz2-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122939" comment="php5-calendar-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122940" comment="php5-ctype-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122941" comment="php5-curl-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122942" comment="php5-dba-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122943" comment="php5-devel-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122944" comment="php5-dom-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122945" comment="php5-enchant-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122946" comment="php5-exif-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122947" comment="php5-fastcgi-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122948" comment="php5-fileinfo-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122949" comment="php5-firebird-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122950" comment="php5-fpm-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122951" comment="php5-ftp-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122952" comment="php5-gd-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122953" comment="php5-gettext-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122954" comment="php5-gmp-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122955" comment="php5-iconv-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122956" comment="php5-imap-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122957" comment="php5-intl-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122958" comment="php5-json-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122959" comment="php5-ldap-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122960" comment="php5-mbstring-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122961" comment="php5-mcrypt-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122962" comment="php5-mssql-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122963" comment="php5-mysql-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122964" comment="php5-odbc-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122965" comment="php5-opcache-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122966" comment="php5-openssl-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122967" comment="php5-pcntl-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122968" comment="php5-pdo-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122969" comment="php5-pear-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122970" comment="php5-pgsql-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122971" comment="php5-phar-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122972" comment="php5-posix-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122973" comment="php5-pspell-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122974" comment="php5-readline-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122975" comment="php5-shmop-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122976" comment="php5-snmp-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122977" comment="php5-soap-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122978" comment="php5-sockets-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122979" comment="php5-sqlite-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122980" comment="php5-suhosin-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122981" comment="php5-sysvmsg-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122982" comment="php5-sysvsem-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122983" comment="php5-sysvshm-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122984" comment="php5-tidy-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122985" comment="php5-tokenizer-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122986" comment="php5-wddx-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122987" comment="php5-xmlreader-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122988" comment="php5-xmlrpc-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122989" comment="php5-xmlwriter-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122990" comment="php5-xsl-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122991" comment="php5-zip-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122992" comment="php5-zlib-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7805</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7805" source="CVE"/>
    <description>
    Heap-based buffer overflow in libsndfile 1.0.25 allows remote attackers to have unspecified impact via the headindex value in the header in an AIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7805.html">CVE-2015-7805</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7805">SUSE bug 953516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7805">SUSE bug 953516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7805">SUSE bug 953516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7805">SUSE bug 953516</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009116161" comment="libsndfile-1.0.25-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152564" comment="libsndfile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117461" comment="libsndfile-devel-1.0.25-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151189" comment="libsndfile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118343" comment="libsndfile-progs-1.0.25-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152565" comment="libsndfile-progs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009116162" comment="libsndfile1-1.0.25-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151190" comment="libsndfile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009116163" comment="libsndfile1-32bit-1.0.25-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151191" comment="libsndfile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7830</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7830" source="CVE"/>
    <description>
    The pcapng_read_if_descr_block function in wiretap/pcapng.c in the pcapng parser in Wireshark 1.12.x before 1.12.8 uses too many levels of pointer indirection, which allows remote attackers to cause a denial of service (incorrect free and application crash) via a crafted packet that triggers interface-filter copying.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7830.html">CVE-2015-7830</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7830">SUSE bug 950437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7830">SUSE bug 950437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7830">SUSE bug 950437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7830">SUSE bug 950437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7830">SUSE bug 950437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7830">SUSE bug 950437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7830">SUSE bug 950437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7830">SUSE bug 960382</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7830">SUSE bug 950437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7830">SUSE bug 950437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7830">SUSE bug 950437</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117614" comment="wireshark-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117615" comment="wireshark-devel-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117616" comment="wireshark-ui-gtk-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117617" comment="wireshark-ui-qt-1.12.8-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7835</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7835" source="CVE"/>
    <description>
    The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7835.html">CVE-2015-7835</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7835">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7835">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7835">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7835">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7835">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7835">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7835">SUSE bug 940929</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7835">SUSE bug 947159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7835">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7835">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7835">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7835">SUSE bug 950367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7835">SUSE bug 950367</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118974" comment="xen-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118975" comment="xen-devel-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118976" comment="xen-doc-html-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118977" comment="xen-kmp-default-4.5.2_01_k4.1.12_1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118978" comment="xen-libs-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118979" comment="xen-libs-32bit-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118980" comment="xen-tools-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118981" comment="xen-tools-domU-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7848</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848" source="CVE"/>
    <description>
    An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7848.html">CVE-2015-7848</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7848">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7848">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7848">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7848">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7848">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7848">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7848">SUSE bug 992991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7848">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7848">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7848">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7848">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7848">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7848">SUSE bug 951608</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118002" comment="ntp-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118003" comment="ntp-doc-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7849</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849" source="CVE"/>
    <description>
    Use-after-free vulnerability in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to possibly execute arbitrary code or cause a denial of service (crash) via crafted packets.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7849.html">CVE-2015-7849</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7849">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7849">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7849">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7849">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7849">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7849">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7849">SUSE bug 992991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7849">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7849">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7849">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7849">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7849">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7849">SUSE bug 951608</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118002" comment="ntp-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118003" comment="ntp-doc-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7850</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850" source="CVE"/>
    <description>
    ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7850.html">CVE-2015-7850</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7850">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7850">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7850">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7850">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7850">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7850">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7850">SUSE bug 992991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7850">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7850">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7850">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7850">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7850">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7850">SUSE bug 951608</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118002" comment="ntp-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118003" comment="ntp-doc-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7851</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7851.html">CVE-2015-7851</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7851">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7851">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7851">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7851">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7851">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7851">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7851">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7851">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7851">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7851">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7851">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7851">SUSE bug 951608</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118002" comment="ntp-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118003" comment="ntp-doc-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7852</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7852" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852" source="CVE"/>
    <description>
    ntpq in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted mode 6 response packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7852.html">CVE-2015-7852</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7852">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7852">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7852">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7852">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7852">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7852">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7852">SUSE bug 992991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7852">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7852">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7852">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7852">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7852">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7852">SUSE bug 951608</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118002" comment="ntp-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118003" comment="ntp-doc-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7853</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7853" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853" source="CVE"/>
    <description>
    The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7853.html">CVE-2015-7853</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7853">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7853">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7853">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7853">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7853">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7853">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7853">SUSE bug 992991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7853">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7853">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7853">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7853">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7853">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7853">SUSE bug 951608</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118002" comment="ntp-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118003" comment="ntp-doc-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7854</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7854" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854" source="CVE"/>
    <description>
    Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7854.html">CVE-2015-7854</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7854">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7854">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7854">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7854">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7854">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7854">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7854">SUSE bug 992991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7854">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7854">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7854">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7854">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7854">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7854">SUSE bug 951608</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118002" comment="ntp-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118003" comment="ntp-doc-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7855</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855" source="CVE"/>
    <description>
    The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7855.html">CVE-2015-7855</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7855">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7855">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7855">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7855">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7855">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7855">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7855">SUSE bug 992991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7855">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7855">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7855">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7855">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7855">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7855">SUSE bug 951608</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118002" comment="ntp-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118003" comment="ntp-doc-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7871</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871" source="CVE"/>
    <description>
    Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7871.html">CVE-2015-7871</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7871">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7871">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7871">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7871">SUSE bug 952606</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7871">SUSE bug 952606</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7871">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7871">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7871">SUSE bug 952606</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7871">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7871">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7871">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7871">SUSE bug 952606</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7871">SUSE bug 1010964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7871">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7871">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7871">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7871">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7871">SUSE bug 951608</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118002" comment="ntp-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118003" comment="ntp-doc-4.2.8p4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7872</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7872" source="CVE"/>
    <description>
    The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7872.html">CVE-2015-7872</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7872">SUSE bug 951440</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126059" comment="kernel-debug-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126060" comment="kernel-debug-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126061" comment="kernel-debug-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126063" comment="kernel-default-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126067" comment="kernel-docs-html-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126068" comment="kernel-docs-pdf-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126069" comment="kernel-ec2-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126070" comment="kernel-ec2-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126071" comment="kernel-ec2-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126073" comment="kernel-obs-build-4.1.20-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126074" comment="kernel-obs-qa-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126075" comment="kernel-obs-qa-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126076" comment="kernel-pae-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126077" comment="kernel-pae-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126078" comment="kernel-pae-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126079" comment="kernel-pv-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126080" comment="kernel-pv-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126083" comment="kernel-source-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126085" comment="kernel-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126086" comment="kernel-vanilla-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126088" comment="kernel-xen-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7873</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7873" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7873" source="CVE"/>
    <description>
    The redirection feature in url.php in phpMyAdmin 4.4.x before 4.4.15.1 and 4.5.x before 4.5.1 allows remote attackers to spoof content via the url parameter.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7873.html">CVE-2015-7873</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7873">SUSE bug 951960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7873">SUSE bug 951960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7873">SUSE bug 951960</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117753" comment="phpMyAdmin-4.4.15.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7884</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7884" source="CVE"/>
    <description>
    The vivid_fb_ioctl function in drivers/media/platform/vivid/vivid-osd.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7884.html">CVE-2015-7884</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7884">SUSE bug 951626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7884">SUSE bug 951626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7884">SUSE bug 951626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7884">SUSE bug 951626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7884">SUSE bug 951626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7884">SUSE bug 951626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7884">SUSE bug 951626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7884">SUSE bug 951626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7884">SUSE bug 951626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7884">SUSE bug 951626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7884">SUSE bug 951626</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126059" comment="kernel-debug-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126060" comment="kernel-debug-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126061" comment="kernel-debug-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126063" comment="kernel-default-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126067" comment="kernel-docs-html-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126068" comment="kernel-docs-pdf-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126069" comment="kernel-ec2-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126070" comment="kernel-ec2-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126071" comment="kernel-ec2-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126073" comment="kernel-obs-build-4.1.20-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126074" comment="kernel-obs-qa-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126075" comment="kernel-obs-qa-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126076" comment="kernel-pae-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126077" comment="kernel-pae-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126078" comment="kernel-pae-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126079" comment="kernel-pv-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126080" comment="kernel-pv-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126083" comment="kernel-source-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126085" comment="kernel-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126086" comment="kernel-vanilla-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126088" comment="kernel-xen-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7885</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7885" source="CVE"/>
    <description>
    The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7885.html">CVE-2015-7885</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7885">SUSE bug 951627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7885">SUSE bug 951627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7885">SUSE bug 951627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7885">SUSE bug 951627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7885">SUSE bug 951627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7885">SUSE bug 951627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7885">SUSE bug 951627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7885">SUSE bug 951627</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7885">SUSE bug 951627</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138432" comment="kernel-default-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138433" comment="kernel-default-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138434" comment="kernel-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138435" comment="kernel-docs-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138436" comment="kernel-macros-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138437" comment="kernel-pv-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138438" comment="kernel-source-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138439" comment="kernel-syms-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138440" comment="kernel-xen-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009138441" comment="kernel-xen-devel-4.1.12-1.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7940</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7940" source="CVE"/>
    <description>
    The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7940.html">CVE-2015-7940</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7940">SUSE bug 951727</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117647" comment="bouncycastle-1.53-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153068" comment="bouncycastle is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117648" comment="bouncycastle-javadoc-1.53-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153069" comment="bouncycastle-javadoc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7941</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941" source="CVE"/>
    <description>
    libxml2 2.9.2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted XML data to the (1) xmlParseEntityDecl or (2) xmlParseConditionalSections function in parser.c, as demonstrated by non-terminated entities.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7941.html">CVE-2015-7941</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7941">SUSE bug 951734</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7941">SUSE bug 951735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7941">SUSE bug 951734</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7941">SUSE bug 951734</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7941">SUSE bug 951734</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7941">SUSE bug 951734</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7941">SUSE bug 951734</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7941">SUSE bug 951734</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7941">SUSE bug 951734</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7941">SUSE bug 951734</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7941">SUSE bug 951734</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7941">SUSE bug 951734</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7941">SUSE bug 951734</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7941">SUSE bug 951734</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103733" comment="libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103734" comment="libxml2-devel-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103735" comment="libxml2-devel-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103736" comment="libxml2-doc-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103738" comment="python-libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7942</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942" source="CVE"/>
    <description>
    The xmlParseConditionalSections function in parser.c in libxml2 does not properly skip intermediary entities when it stops parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted XML data, a different vulnerability than CVE-2015-7941.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7942.html">CVE-2015-7942</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7942">SUSE bug 951735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7942">SUSE bug 951735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7942">SUSE bug 951735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7942">SUSE bug 951735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7942">SUSE bug 951735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7942">SUSE bug 951735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7942">SUSE bug 951735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7942">SUSE bug 951735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7942">SUSE bug 951735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7942">SUSE bug 951735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7942">SUSE bug 951735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7942">SUSE bug 951735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7942">SUSE bug 951735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7942">SUSE bug 951735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7942">SUSE bug 951735</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103733" comment="libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103734" comment="libxml2-devel-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103735" comment="libxml2-devel-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103736" comment="libxml2-doc-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103738" comment="python-libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7969</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969" source="CVE"/>
    <description>
    Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7969.html">CVE-2015-7969</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950705</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7969">SUSE bug 950705</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117822" comment="xen-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117823" comment="xen-devel-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117824" comment="xen-doc-html-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117825" comment="xen-kmp-default-4.5.1_12_k4.1.12_1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117826" comment="xen-libs-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117827" comment="xen-libs-32bit-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117828" comment="xen-tools-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117829" comment="xen-tools-domU-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7970</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970" source="CVE"/>
    <description>
    The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a "time-consuming linear scan," related to Populate-on-Demand.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7970.html">CVE-2015-7970</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7970">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7970">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7970">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7970">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7970">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7970">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7970">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7970">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7970">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7970">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7970">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7970">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7970">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7970">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7970">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7970">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7970">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7970">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7970">SUSE bug 950704</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118974" comment="xen-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118975" comment="xen-devel-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118976" comment="xen-doc-html-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118977" comment="xen-kmp-default-4.5.2_01_k4.1.12_1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118978" comment="xen-libs-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118979" comment="xen-libs-32bit-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118980" comment="xen-tools-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118981" comment="xen-tools-domU-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7971</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971" source="CVE"/>
    <description>
    Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7971.html">CVE-2015-7971</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7971">SUSE bug 950706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7971">SUSE bug 950706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7971">SUSE bug 950706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7971">SUSE bug 950706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7971">SUSE bug 950706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7971">SUSE bug 950706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7971">SUSE bug 950706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7971">SUSE bug 950706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7971">SUSE bug 950706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7971">SUSE bug 950706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7971">SUSE bug 950706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7971">SUSE bug 950706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7971">SUSE bug 950706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7971">SUSE bug 950706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7971">SUSE bug 950706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7971">SUSE bug 950706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7971">SUSE bug 950706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7971">SUSE bug 950706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7971">SUSE bug 950706</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117822" comment="xen-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117823" comment="xen-devel-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117824" comment="xen-doc-html-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117825" comment="xen-kmp-default-4.5.1_12_k4.1.12_1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117826" comment="xen-libs-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117827" comment="xen-libs-32bit-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117828" comment="xen-tools-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117829" comment="xen-tools-domU-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7972</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972" source="CVE"/>
    <description>
    The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7972.html">CVE-2015-7972</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7972">SUSE bug 951845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7972">SUSE bug 951845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7972">SUSE bug 951845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7972">SUSE bug 951845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7972">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7972">SUSE bug 951845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7972">SUSE bug 950704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7972">SUSE bug 951845</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117822" comment="xen-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117823" comment="xen-devel-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117824" comment="xen-doc-html-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117825" comment="xen-kmp-default-4.5.1_12_k4.1.12_1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117826" comment="xen-libs-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117827" comment="xen-libs-32bit-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117828" comment="xen-tools-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117829" comment="xen-tools-domU-4.5.1_12-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7973</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973" source="CVE"/>
    <description>
    NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7973.html">CVE-2015-7973</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7973">SUSE bug 962995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7973">SUSE bug 962995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7973">SUSE bug 962995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7973">SUSE bug 975578</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7973">SUSE bug 962995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7973">SUSE bug 962995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7973">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7973">SUSE bug 962995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7973">SUSE bug 962995</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127544" comment="ntp-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127545" comment="ntp-doc-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127546" comment="yast2-ntp-client-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152977" comment="yast2-ntp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127547" comment="yast2-ntp-client-devel-doc-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152978" comment="yast2-ntp-client-devel-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7974</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974" source="CVE"/>
    <description>
    NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7974.html">CVE-2015-7974</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7974">SUSE bug 962960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7974">SUSE bug 962960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7974">SUSE bug 962960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7974">SUSE bug 962960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7974">SUSE bug 975578</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7974">SUSE bug 962960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7974">SUSE bug 962995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7974">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7974">SUSE bug 962960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7974">SUSE bug 962960</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127851" comment="ntp-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127852" comment="ntp-doc-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127546" comment="yast2-ntp-client-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152977" comment="yast2-ntp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127547" comment="yast2-ntp-client-devel-doc-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152978" comment="yast2-ntp-client-devel-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7975</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7975" source="CVE"/>
    <description>
    The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7975.html">CVE-2015-7975</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7975">SUSE bug 962988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7975">SUSE bug 962988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7975">SUSE bug 962988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7975">SUSE bug 975578</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7975">SUSE bug 962988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7975">SUSE bug 962995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7975">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7975">SUSE bug 962988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7975">SUSE bug 962988</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127544" comment="ntp-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127545" comment="ntp-doc-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127546" comment="yast2-ntp-client-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152977" comment="yast2-ntp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127547" comment="yast2-ntp-client-devel-doc-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152978" comment="yast2-ntp-client-devel-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7976</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976" source="CVE"/>
    <description>
    The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7976.html">CVE-2015-7976</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7976">SUSE bug 962802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7976">SUSE bug 962802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7976">SUSE bug 962802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7976">SUSE bug 962802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7976">SUSE bug 975578</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7976">SUSE bug 962802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7976">SUSE bug 962995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7976">SUSE bug 962802</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7976">SUSE bug 962802</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127544" comment="ntp-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127545" comment="ntp-doc-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127546" comment="yast2-ntp-client-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152977" comment="yast2-ntp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127547" comment="yast2-ntp-client-devel-doc-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152978" comment="yast2-ntp-client-devel-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7977</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977" source="CVE"/>
    <description>
    ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7977.html">CVE-2015-7977</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7977">SUSE bug 962970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7977">SUSE bug 962970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7977">SUSE bug 962970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7977">SUSE bug 962970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7977">SUSE bug 975578</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7977">SUSE bug 962970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7977">SUSE bug 962995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7977">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7977">SUSE bug 962970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7977">SUSE bug 962970</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127544" comment="ntp-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127545" comment="ntp-doc-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127546" comment="yast2-ntp-client-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152977" comment="yast2-ntp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127547" comment="yast2-ntp-client-devel-doc-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152978" comment="yast2-ntp-client-devel-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7978</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978" source="CVE"/>
    <description>
    NTP before 4.2.8p6 and 4.3.0 before 4.3.90 allows a remote attackers to cause a denial of service (stack exhaustion) via an ntpdc relist command, which triggers recursive traversal of the restriction list.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7978.html">CVE-2015-7978</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7978">SUSE bug 962970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7978">SUSE bug 963000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7978">SUSE bug 963000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7978">SUSE bug 962970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7978">SUSE bug 963000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7978">SUSE bug 963000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7978">SUSE bug 975578</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7978">SUSE bug 963000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7978">SUSE bug 962995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7978">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7978">SUSE bug 963000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7978">SUSE bug 963000</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127544" comment="ntp-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127545" comment="ntp-doc-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127546" comment="yast2-ntp-client-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152977" comment="yast2-ntp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127547" comment="yast2-ntp-client-devel-doc-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152978" comment="yast2-ntp-client-devel-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7979</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979" source="CVE"/>
    <description>
    NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7979.html">CVE-2015-7979</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7979">SUSE bug 962784</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7979">SUSE bug 962784</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7979">SUSE bug 962784</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7979">SUSE bug 962784</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7979">SUSE bug 975578</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7979">SUSE bug 962784</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7979">SUSE bug 962995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7979">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7979">SUSE bug 962784</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7979">SUSE bug 962784</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7979">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7979">SUSE bug 982065</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127544" comment="ntp-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127545" comment="ntp-doc-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127546" comment="yast2-ntp-client-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152977" comment="yast2-ntp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127547" comment="yast2-ntp-client-devel-doc-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152978" comment="yast2-ntp-client-devel-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7981</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7981" source="CVE"/>
    <description>
    The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7981.html">CVE-2015-7981</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7981">SUSE bug 952051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7981">SUSE bug 952051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7981">SUSE bug 952051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7981">SUSE bug 952051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7981">SUSE bug 952051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7981">SUSE bug 952051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7981">SUSE bug 963937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7981">SUSE bug 960402</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118381" comment="libpng12-1.2.50-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153098" comment="libpng12 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118382" comment="libpng12-0-1.2.50-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151411" comment="libpng12-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118383" comment="libpng12-0-32bit-1.2.50-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151412" comment="libpng12-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118384" comment="libpng12-compat-devel-1.2.50-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153099" comment="libpng12-compat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118385" comment="libpng12-compat-devel-32bit-1.2.50-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153100" comment="libpng12-compat-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118386" comment="libpng12-devel-1.2.50-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151413" comment="libpng12-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118387" comment="libpng12-devel-32bit-1.2.50-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153101" comment="libpng12-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129194" comment="libvlc5-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129195" comment="libvlccore8-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153022" comment="libvlccore8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129196" comment="vlc-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129197" comment="vlc-devel-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129198" comment="vlc-noX-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129199" comment="vlc-noX-lang-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153027" comment="vlc-noX-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129200" comment="vlc-qt-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7990</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-7990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7990" source="CVE"/>
    <description>
    Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-7990.html">CVE-2015-7990</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 953052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 945825</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-7990">SUSE bug 952384</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118838" comment="kernel-debug-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118839" comment="kernel-debug-base-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118840" comment="kernel-debug-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118841" comment="kernel-default-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118842" comment="kernel-default-base-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118843" comment="kernel-default-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118844" comment="kernel-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118845" comment="kernel-docs-4.1.13-5.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118846" comment="kernel-docs-html-4.1.13-5.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118847" comment="kernel-docs-pdf-4.1.13-5.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118848" comment="kernel-ec2-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118849" comment="kernel-ec2-base-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118850" comment="kernel-ec2-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118851" comment="kernel-macros-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118852" comment="kernel-obs-build-4.1.13-5.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118853" comment="kernel-obs-qa-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118854" comment="kernel-obs-qa-xen-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118855" comment="kernel-pae-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118856" comment="kernel-pae-base-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118857" comment="kernel-pae-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118858" comment="kernel-pv-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118859" comment="kernel-pv-base-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118860" comment="kernel-pv-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118861" comment="kernel-source-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118862" comment="kernel-source-vanilla-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118863" comment="kernel-syms-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118864" comment="kernel-vanilla-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118865" comment="kernel-vanilla-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118866" comment="kernel-xen-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118867" comment="kernel-xen-base-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118868" comment="kernel-xen-devel-4.1.13-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8000</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8000" source="CVE"/>
    <description>
    db.c in named in ISC BIND 9.x before 9.9.8-P2 and 9.10.x before 9.10.3-P2 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a malformed class attribute.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8000.html">CVE-2015-8000</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 944066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8000">SUSE bug 958861</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120404" comment="bind-9.9.6P1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120405" comment="bind-chrootenv-9.9.6P1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120406" comment="bind-devel-9.9.6P1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120407" comment="bind-doc-9.9.6P1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120408" comment="bind-libs-9.9.6P1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120409" comment="bind-libs-32bit-9.9.6P1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153103" comment="bind-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120410" comment="bind-lwresd-9.9.6P1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153104" comment="bind-lwresd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120411" comment="bind-utils-9.9.6P1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8010</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8010" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the Classic-UI with the CSV export link and pagination feature in Icinga before 1.14 allows remote attackers to inject arbitrary web script or HTML via the query string to cgi-bin/status.cgi.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8010.html">CVE-2015-8010</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8010">SUSE bug 952777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8010">SUSE bug 952777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8010">SUSE bug 952777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8010">SUSE bug 952777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8010">SUSE bug 952777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8010">SUSE bug 952777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8010">SUSE bug 952777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8010">SUSE bug 952777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8010">SUSE bug 952777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8010">SUSE bug 952777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8010">SUSE bug 952777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8010">SUSE bug 952777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8010">SUSE bug 952777</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147185" comment="icinga-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153105" comment="icinga is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147186" comment="icinga-devel-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153106" comment="icinga-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147187" comment="icinga-doc-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153107" comment="icinga-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147188" comment="icinga-idoutils-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153108" comment="icinga-idoutils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147189" comment="icinga-idoutils-mysql-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153109" comment="icinga-idoutils-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147190" comment="icinga-idoutils-oracle-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153110" comment="icinga-idoutils-oracle is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147191" comment="icinga-idoutils-pgsql-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153111" comment="icinga-idoutils-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147192" comment="icinga-plugins-downtimes-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153112" comment="icinga-plugins-downtimes is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147193" comment="icinga-plugins-eventhandlers-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153113" comment="icinga-plugins-eventhandlers is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147194" comment="icinga-www-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153114" comment="icinga-www is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147195" comment="icinga-www-config-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153115" comment="icinga-www-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147196" comment="monitoring-tools-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151784" comment="monitoring-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8023</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8023" source="CVE"/>
    <description>
    The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8023.html">CVE-2015-8023</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8023">SUSE bug 953817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8023">SUSE bug 953817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8023">SUSE bug 953817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8023">SUSE bug 953817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8023">SUSE bug 953817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8023">SUSE bug 953817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8023">SUSE bug 953817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8023">SUSE bug 953817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8023">SUSE bug 953817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8023">SUSE bug 953817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8023">SUSE bug 953817</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118117" comment="strongswan-5.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153116" comment="strongswan is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118118" comment="strongswan-doc-5.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153117" comment="strongswan-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118119" comment="strongswan-hmac-5.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153118" comment="strongswan-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118120" comment="strongswan-ipsec-5.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153119" comment="strongswan-ipsec is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118121" comment="strongswan-libs0-5.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153120" comment="strongswan-libs0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118122" comment="strongswan-mysql-5.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153121" comment="strongswan-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118123" comment="strongswan-nm-5.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153122" comment="strongswan-nm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118124" comment="strongswan-sqlite-5.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153123" comment="strongswan-sqlite is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8025</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8025" source="CVE"/>
    <description>
    driver/subprocs.c in XScreenSaver before 5.34 does not properly perform an internal consistency check, which allows physically proximate attackers to bypass the lock screen by hot swapping monitors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8025.html">CVE-2015-8025</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8025">SUSE bug 952062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8025">SUSE bug 952062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8025">SUSE bug 952062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8025">SUSE bug 952062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8025">SUSE bug 952062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8025">SUSE bug 952062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8025">SUSE bug 952062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8025">SUSE bug 952062</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118004" comment="xscreensaver-5.33-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153124" comment="xscreensaver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118005" comment="xscreensaver-data-5.33-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153125" comment="xscreensaver-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118006" comment="xscreensaver-data-extra-5.33-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153126" comment="xscreensaver-data-extra is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8027</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8027" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8027" source="CVE"/>
    <description>
    Node.js 0.12.x before 0.12.9, 4.x before 4.2.3, and 5.x before 5.1.1 does not ensure the availability of a parser for each HTTP socket, which allows remote attackers to cause a denial of service (uncaughtException and service outage) via a pipelined HTTP request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8027.html">CVE-2015-8027</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8027">SUSE bug 956901</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8027">SUSE bug 956901</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121518" comment="nodejs-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121519" comment="nodejs-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121520" comment="nodejs-doc-4.2.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153042" comment="nodejs-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121521" comment="nodejs-docs-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121522" comment="npm-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8035</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8035" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035" source="CVE"/>
    <description>
    The xz_decomp function in xzlib.c in libxml2 2.9.1 does not properly detect compression errors, which allows context-dependent attackers to cause a denial of service (process hang) via crafted XML data.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8035.html">CVE-2015-8035</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8035">SUSE bug 954429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8035">SUSE bug 954429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8035">SUSE bug 954429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8035">SUSE bug 954429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8035">SUSE bug 954429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8035">SUSE bug 954429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8035">SUSE bug 954429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8035">SUSE bug 954429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8035">SUSE bug 954429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8035">SUSE bug 954429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8035">SUSE bug 954429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8035">SUSE bug 954429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8035">SUSE bug 954429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8035">SUSE bug 954429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8035">SUSE bug 1088279</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8035">SUSE bug 1088279</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8035">SUSE bug 1088279</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103733" comment="libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103734" comment="libxml2-devel-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103735" comment="libxml2-devel-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103736" comment="libxml2-doc-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103738" comment="python-libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8041</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8041" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8041" source="CVE"/>
    <description>
    Multiple integer overflows in the NDEF record parser in hostapd before 2.5 and wpa_supplicant before 2.5 allow remote attackers to cause a denial of service (process crash or infinite loop) via a large payload length field value in an (1) WPS or (2) P2P NFC NDEF record, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8041.html">CVE-2015-8041</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8041">SUSE bug 937419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8041">SUSE bug 937419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8041">SUSE bug 937419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8041">SUSE bug 937419</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009110201" comment="wpa_supplicant-2.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009110202" comment="wpa_supplicant-gui-2.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8075</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8075" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8075.html">CVE-2015-8075</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8075">SUSE bug 953519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8075">SUSE bug 953519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8075">SUSE bug 953519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8075">SUSE bug 953519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8075">SUSE bug 953519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8075">SUSE bug 953519</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009116161" comment="libsndfile-1.0.25-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152564" comment="libsndfile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009117461" comment="libsndfile-devel-1.0.25-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151189" comment="libsndfile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118343" comment="libsndfile-progs-1.0.25-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152565" comment="libsndfile-progs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009116162" comment="libsndfile1-1.0.25-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151190" comment="libsndfile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009116163" comment="libsndfile1-32bit-1.0.25-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151191" comment="libsndfile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8077</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8077" source="CVE"/>
    <description>
    Integer overflow in the index_urlfetch function in imap/index.c in Cyrus IMAP 2.3.19, 2.4.18, and 2.5.6 allows remote attackers to have unspecified impact via vectors related to urlfetch range checks and the start_octet variable.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8076.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8077.html">CVE-2015-8077</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 981670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8077">SUSE bug 954200</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118325" comment="cyradm-2.4.18-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151342" comment="cyradm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118326" comment="cyrus-imapd-2.4.18-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151343" comment="cyrus-imapd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118327" comment="cyrus-imapd-devel-2.4.18-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153127" comment="cyrus-imapd-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118328" comment="cyrus-imapd-snmp-2.4.18-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153128" comment="cyrus-imapd-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118329" comment="cyrus-imapd-snmp-mibs-2.4.18-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153129" comment="cyrus-imapd-snmp-mibs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118330" comment="cyrus-imapd-utils-2.4.18-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153130" comment="cyrus-imapd-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118331" comment="perl-Cyrus-IMAP-2.4.18-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151344" comment="perl-Cyrus-IMAP is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118332" comment="perl-Cyrus-SIEVE-managesieve-2.4.18-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151345" comment="perl-Cyrus-SIEVE-managesieve is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8078</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8078" source="CVE"/>
    <description>
    Integer overflow in the index_urlfetch function in imap/index.c in Cyrus IMAP 2.3.19, 2.4.18, and 2.5.6 allows remote attackers to have unspecified impact via vectors related to urlfetch range checks and the section_offset variable.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8076.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8078.html">CVE-2015-8078</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8078">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8078">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8078">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8078">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8078">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8078">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8078">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8078">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8078">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8078">SUSE bug 981670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8078">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8078">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8078">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8078">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8078">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8078">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8078">SUSE bug 954201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8078">SUSE bug 954201</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118325" comment="cyradm-2.4.18-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151342" comment="cyradm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118326" comment="cyrus-imapd-2.4.18-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151343" comment="cyrus-imapd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118327" comment="cyrus-imapd-devel-2.4.18-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153127" comment="cyrus-imapd-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118328" comment="cyrus-imapd-snmp-2.4.18-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153128" comment="cyrus-imapd-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118329" comment="cyrus-imapd-snmp-mibs-2.4.18-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153129" comment="cyrus-imapd-snmp-mibs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118330" comment="cyrus-imapd-utils-2.4.18-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153130" comment="cyrus-imapd-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118331" comment="perl-Cyrus-IMAP-2.4.18-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151344" comment="perl-Cyrus-IMAP is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118332" comment="perl-Cyrus-SIEVE-managesieve-2.4.18-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151345" comment="perl-Cyrus-SIEVE-managesieve is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8080</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8080" source="CVE"/>
    <description>
    Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8080.html">CVE-2015-8080</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8080">SUSE bug 954199</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8080">SUSE bug 954199</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8080">SUSE bug 954199</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128299" comment="redis-3.0.4-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152049" comment="redis is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8104</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104" source="CVE"/>
    <description>
    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8104.html">CVE-2015-8104</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 953527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 962977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8104">SUSE bug 954404</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126059" comment="kernel-debug-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126060" comment="kernel-debug-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126061" comment="kernel-debug-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126062" comment="kernel-default-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126063" comment="kernel-default-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126064" comment="kernel-default-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126065" comment="kernel-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126066" comment="kernel-docs-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126067" comment="kernel-docs-html-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126068" comment="kernel-docs-pdf-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126069" comment="kernel-ec2-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126070" comment="kernel-ec2-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126071" comment="kernel-ec2-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126072" comment="kernel-macros-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126073" comment="kernel-obs-build-4.1.20-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126074" comment="kernel-obs-qa-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126075" comment="kernel-obs-qa-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126076" comment="kernel-pae-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126077" comment="kernel-pae-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126078" comment="kernel-pae-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126079" comment="kernel-pv-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126080" comment="kernel-pv-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126081" comment="kernel-pv-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126082" comment="kernel-source-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126083" comment="kernel-source-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126084" comment="kernel-syms-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126085" comment="kernel-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126086" comment="kernel-vanilla-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126087" comment="kernel-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126088" comment="kernel-xen-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126089" comment="kernel-xen-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118974" comment="xen-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118975" comment="xen-devel-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118976" comment="xen-doc-html-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118977" comment="xen-kmp-default-4.5.2_01_k4.1.12_1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118978" comment="xen-libs-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118979" comment="xen-libs-32bit-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118980" comment="xen-tools-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118981" comment="xen-tools-domU-4.5.2_01-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8126</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" source="CVE"/>
    <description>
    Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8126.html">CVE-2015-8126</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 958198</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 962743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 963937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 960402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 958198</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8126">SUSE bug 969333</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124458" comment="chromedriver-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124459" comment="chromium-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124460" comment="chromium-desktop-gnome-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124461" comment="chromium-desktop-kde-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124462" comment="chromium-ffmpegsumo-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122393" comment="java-1_7_0-openjdk-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122394" comment="java-1_7_0-openjdk-accessibility-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122395" comment="java-1_7_0-openjdk-bootstrap-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122396" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122397" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122398" comment="java-1_7_0-openjdk-demo-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122399" comment="java-1_7_0-openjdk-devel-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122400" comment="java-1_7_0-openjdk-headless-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122401" comment="java-1_7_0-openjdk-javadoc-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122402" comment="java-1_7_0-openjdk-src-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121442" comment="libpng12-1.2.50-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153098" comment="libpng12 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121443" comment="libpng12-0-1.2.50-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151411" comment="libpng12-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121444" comment="libpng12-0-32bit-1.2.50-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151412" comment="libpng12-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121445" comment="libpng12-compat-devel-1.2.50-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153099" comment="libpng12-compat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121446" comment="libpng12-compat-devel-32bit-1.2.50-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153100" comment="libpng12-compat-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121447" comment="libpng12-devel-1.2.50-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151413" comment="libpng12-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121448" comment="libpng12-devel-32bit-1.2.50-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153101" comment="libpng12-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119232" comment="libpng15-1.5.22-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153131" comment="libpng15 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153132" comment="libpng15-15 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121449" comment="libpng15-15-32bit-1.5.22-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153133" comment="libpng15-15-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121432" comment="libpng16-1.6.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153134" comment="libpng16 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121433" comment="libpng16-16-1.6.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121434" comment="libpng16-16-32bit-1.6.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151415" comment="libpng16-16-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121435" comment="libpng16-compat-devel-1.6.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121436" comment="libpng16-compat-devel-32bit-1.6.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153135" comment="libpng16-compat-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121437" comment="libpng16-devel-1.6.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121438" comment="libpng16-devel-32bit-1.6.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153136" comment="libpng16-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121439" comment="libpng16-tools-1.6.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153137" comment="libpng16-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129194" comment="libvlc5-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129195" comment="libvlccore8-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153022" comment="libvlccore8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129196" comment="vlc-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129197" comment="vlc-devel-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129198" comment="vlc-noX-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129199" comment="vlc-noX-lang-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153027" comment="vlc-noX-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129200" comment="vlc-qt-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8138</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138" source="CVE"/>
    <description>
    NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8138.html">CVE-2015-8138</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 963002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 963002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 963002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 963002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 975578</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 963002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 963002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 974668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 974668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 974668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 974668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 974668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 963002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 974668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 974668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 974668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 974668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 974668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 974668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 974668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 974668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 974668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 951608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8138">SUSE bug 951608</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127544" comment="ntp-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127545" comment="ntp-doc-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127546" comment="yast2-ntp-client-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152977" comment="yast2-ntp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127547" comment="yast2-ntp-client-devel-doc-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152978" comment="yast2-ntp-client-devel-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8139</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8139" source="CVE"/>
    <description>
    ntpq in NTP before 4.2.8p7 allows remote attackers to obtain origin timestamps and then impersonate peers via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8139.html">CVE-2015-8139</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8139">SUSE bug 962997</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8139">SUSE bug 975578</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8139">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8139">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8139">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8139">SUSE bug 1010964</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127544" comment="ntp-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127545" comment="ntp-doc-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127546" comment="yast2-ntp-client-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152977" comment="yast2-ntp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127547" comment="yast2-ntp-client-devel-doc-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152978" comment="yast2-ntp-client-devel-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8140</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8140" source="CVE"/>
    <description>
    The ntpq protocol in NTP before 4.2.8p7 allows remote attackers to conduct replay attacks by sniffing the network.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8140.html">CVE-2015-8140</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8140">SUSE bug 962994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8140">SUSE bug 975578</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8140">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8140">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8140">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8140">SUSE bug 1010964</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127544" comment="ntp-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127545" comment="ntp-doc-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127546" comment="yast2-ntp-client-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152977" comment="yast2-ntp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127547" comment="yast2-ntp-client-devel-doc-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152978" comment="yast2-ntp-client-devel-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8158</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158" source="CVE"/>
    <description>
    The getresponse function in ntpq in NTP versions before 4.2.8p9 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (infinite loop) via crafted packets with incorrect values.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8158.html">CVE-2015-8158</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8158">SUSE bug 962966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8158">SUSE bug 962966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8158">SUSE bug 962966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8158">SUSE bug 975578</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8158">SUSE bug 962966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8158">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8158">SUSE bug 962966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8158">SUSE bug 962966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8158">SUSE bug 962966</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127544" comment="ntp-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127545" comment="ntp-doc-4.2.8p6-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127546" comment="yast2-ntp-client-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152977" comment="yast2-ntp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127547" comment="yast2-ntp-client-devel-doc-3.1.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152978" comment="yast2-ntp-client-devel-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8216</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8216" source="CVE"/>
    <description>
    The ljpeg_decode_yuv_scan function in libavcodec/mjpegdec.c in FFmpeg before 2.8.2 omits certain width and height checks, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted MJPEG data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8216.html">CVE-2015-8216</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8216">SUSE bug 955346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8216">SUSE bug 955346</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8216">SUSE bug 955346</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118344" comment="ffmpeg-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153138" comment="ffmpeg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118345" comment="ffmpeg-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153139" comment="ffmpeg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118346" comment="libavcodec-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118347" comment="libavcodec56-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153141" comment="libavcodec56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118348" comment="libavcodec56-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153142" comment="libavcodec56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118349" comment="libavdevice-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118350" comment="libavdevice56-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153144" comment="libavdevice56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118351" comment="libavdevice56-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153145" comment="libavdevice56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118352" comment="libavfilter-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118353" comment="libavfilter5-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153147" comment="libavfilter5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118354" comment="libavfilter5-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153148" comment="libavfilter5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118355" comment="libavformat-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118356" comment="libavformat56-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153150" comment="libavformat56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118357" comment="libavformat56-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153151" comment="libavformat56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118358" comment="libavresample-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118359" comment="libavresample2-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153153" comment="libavresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118360" comment="libavresample2-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153154" comment="libavresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118361" comment="libavutil-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118362" comment="libavutil54-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153156" comment="libavutil54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118363" comment="libavutil54-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153157" comment="libavutil54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118364" comment="libpostproc-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118365" comment="libpostproc53-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153159" comment="libpostproc53 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118366" comment="libpostproc53-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153160" comment="libpostproc53-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118367" comment="libswresample-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118368" comment="libswresample1-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153162" comment="libswresample1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118369" comment="libswresample1-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153163" comment="libswresample1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118370" comment="libswscale-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118371" comment="libswscale3-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153165" comment="libswscale3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118372" comment="libswscale3-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153166" comment="libswscale3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8217</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8217" source="CVE"/>
    <description>
    The ff_hevc_parse_sps function in libavcodec/hevc_ps.c in FFmpeg before 2.8.2 does not validate the Chroma Format Indicator, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted High Efficiency Video Coding (HEVC) data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8217.html">CVE-2015-8217</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8217">SUSE bug 955347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8217">SUSE bug 955347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8217">SUSE bug 955347</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118344" comment="ffmpeg-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153138" comment="ffmpeg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118345" comment="ffmpeg-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153139" comment="ffmpeg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118346" comment="libavcodec-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118347" comment="libavcodec56-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153141" comment="libavcodec56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118348" comment="libavcodec56-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153142" comment="libavcodec56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118349" comment="libavdevice-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118350" comment="libavdevice56-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153144" comment="libavdevice56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118351" comment="libavdevice56-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153145" comment="libavdevice56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118352" comment="libavfilter-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118353" comment="libavfilter5-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153147" comment="libavfilter5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118354" comment="libavfilter5-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153148" comment="libavfilter5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118355" comment="libavformat-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118356" comment="libavformat56-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153150" comment="libavformat56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118357" comment="libavformat56-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153151" comment="libavformat56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118358" comment="libavresample-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118359" comment="libavresample2-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153153" comment="libavresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118360" comment="libavresample2-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153154" comment="libavresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118361" comment="libavutil-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118362" comment="libavutil54-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153156" comment="libavutil54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118363" comment="libavutil54-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153157" comment="libavutil54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118364" comment="libpostproc-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118365" comment="libpostproc53-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153159" comment="libpostproc53 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118366" comment="libpostproc53-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153160" comment="libpostproc53-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118367" comment="libswresample-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118368" comment="libswresample1-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153162" comment="libswresample1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118369" comment="libswresample1-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153163" comment="libswresample1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118370" comment="libswscale-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118371" comment="libswscale3-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153165" comment="libswscale3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118372" comment="libswscale3-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153166" comment="libswscale3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8218</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8218" source="CVE"/>
    <description>
    The decode_uncompressed function in libavcodec/faxcompr.c in FFmpeg before 2.8.2 does not validate uncompressed runs, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted CCITT FAX data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8218.html">CVE-2015-8218</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8218">SUSE bug 955348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8218">SUSE bug 955348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8218">SUSE bug 955348</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118344" comment="ffmpeg-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153138" comment="ffmpeg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118345" comment="ffmpeg-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153139" comment="ffmpeg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118346" comment="libavcodec-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118347" comment="libavcodec56-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153141" comment="libavcodec56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118348" comment="libavcodec56-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153142" comment="libavcodec56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118349" comment="libavdevice-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118350" comment="libavdevice56-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153144" comment="libavdevice56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118351" comment="libavdevice56-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153145" comment="libavdevice56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118352" comment="libavfilter-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118353" comment="libavfilter5-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153147" comment="libavfilter5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118354" comment="libavfilter5-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153148" comment="libavfilter5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118355" comment="libavformat-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118356" comment="libavformat56-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153150" comment="libavformat56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118357" comment="libavformat56-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153151" comment="libavformat56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118358" comment="libavresample-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118359" comment="libavresample2-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153153" comment="libavresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118360" comment="libavresample2-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153154" comment="libavresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118361" comment="libavutil-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118362" comment="libavutil54-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153156" comment="libavutil54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118363" comment="libavutil54-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153157" comment="libavutil54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118364" comment="libpostproc-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118365" comment="libpostproc53-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153159" comment="libpostproc53 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118366" comment="libpostproc53-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153160" comment="libpostproc53-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118367" comment="libswresample-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118368" comment="libswresample1-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153162" comment="libswresample1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118369" comment="libswresample1-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153163" comment="libswresample1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118370" comment="libswscale-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118371" comment="libswscale3-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153165" comment="libswscale3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118372" comment="libswscale3-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153166" comment="libswscale3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8219</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8219" source="CVE"/>
    <description>
    The init_tile function in libavcodec/jpeg2000dec.c in FFmpeg before 2.8.2 does not enforce minimum-value and maximum-value constraints on tile coordinates, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG 2000 data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8219.html">CVE-2015-8219</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8219">SUSE bug 955350</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8219">SUSE bug 955350</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8219">SUSE bug 955350</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118344" comment="ffmpeg-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153138" comment="ffmpeg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118345" comment="ffmpeg-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153139" comment="ffmpeg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118346" comment="libavcodec-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118347" comment="libavcodec56-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153141" comment="libavcodec56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118348" comment="libavcodec56-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153142" comment="libavcodec56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118349" comment="libavdevice-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118350" comment="libavdevice56-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153144" comment="libavdevice56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118351" comment="libavdevice56-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153145" comment="libavdevice56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118352" comment="libavfilter-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118353" comment="libavfilter5-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153147" comment="libavfilter5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118354" comment="libavfilter5-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153148" comment="libavfilter5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118355" comment="libavformat-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118356" comment="libavformat56-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153150" comment="libavformat56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118357" comment="libavformat56-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153151" comment="libavformat56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118358" comment="libavresample-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118359" comment="libavresample2-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153153" comment="libavresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118360" comment="libavresample2-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153154" comment="libavresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118361" comment="libavutil-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118362" comment="libavutil54-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153156" comment="libavutil54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118363" comment="libavutil54-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153157" comment="libavutil54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118364" comment="libpostproc-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118365" comment="libpostproc53-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153159" comment="libpostproc53 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118366" comment="libpostproc53-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153160" comment="libpostproc53-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118367" comment="libswresample-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118368" comment="libswresample1-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153162" comment="libswresample1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118369" comment="libswresample1-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153163" comment="libswresample1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118370" comment="libswscale-devel-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118371" comment="libswscale3-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153165" comment="libswscale3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009118372" comment="libswscale3-32bit-2.8.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153166" comment="libswscale3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8241</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241" source="CVE"/>
    <description>
    The xmlNextChar function in libxml2 2.9.2 does not properly check the state, which allows context-dependent attackers to cause a denial of service (heap-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8241.html">CVE-2015-8241</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8241">SUSE bug 956018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8241">SUSE bug 956018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8241">SUSE bug 956018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8241">SUSE bug 956018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8241">SUSE bug 956018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8241">SUSE bug 956018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8241">SUSE bug 959469</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8241">SUSE bug 956018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8241">SUSE bug 956018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8241">SUSE bug 956018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8241">SUSE bug 956018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8241">SUSE bug 956018</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103733" comment="libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103734" comment="libxml2-devel-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103735" comment="libxml2-devel-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103736" comment="libxml2-doc-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103738" comment="python-libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8242</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8242" source="CVE"/>
    <description>
    The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (stack-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8242.html">CVE-2015-8242</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8242">SUSE bug 956021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8242">SUSE bug 956021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8242">SUSE bug 956021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8242">SUSE bug 956021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8242">SUSE bug 956021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8242">SUSE bug 956021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8242">SUSE bug 959469</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8242">SUSE bug 956021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8242">SUSE bug 956021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8242">SUSE bug 956021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8242">SUSE bug 956021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8242">SUSE bug 956021</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103733" comment="libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103734" comment="libxml2-devel-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103735" comment="libxml2-devel-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103736" comment="libxml2-doc-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103738" comment="python-libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8317</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317" source="CVE"/>
    <description>
    The xmlParseXMLDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive information via an (1) unterminated encoding value or (2) incomplete XML declaration in XML data, which triggers an out-of-bounds heap read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8317.html">CVE-2015-8317</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8317">SUSE bug 956260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8317">SUSE bug 956260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8317">SUSE bug 956260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8317">SUSE bug 956260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8317">SUSE bug 956260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8317">SUSE bug 956260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8317">SUSE bug 959469</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8317">SUSE bug 956260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8317">SUSE bug 956260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8317">SUSE bug 956260</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8317">SUSE bug 956260</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103733" comment="libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103731" comment="libxml2-2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103732" comment="libxml2-2-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103734" comment="libxml2-devel-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103735" comment="libxml2-devel-32bit-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103736" comment="libxml2-doc-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103737" comment="libxml2-tools-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009103738" comment="python-libxml2-2.9.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8325</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8325" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325" source="CVE"/>
    <description>
    The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8325.html">CVE-2015-8325</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 996040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 1016709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8325">SUSE bug 975865</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128339" comment="openssh-6.6p1-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128340" comment="openssh-askpass-gnome-6.6p1-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153167" comment="openssh-askpass-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128341" comment="openssh-cavs-6.6p1-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153168" comment="openssh-cavs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128342" comment="openssh-fips-6.6p1-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153169" comment="openssh-fips is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128343" comment="openssh-helpers-6.6p1-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152111" comment="openssh-helpers is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8327</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327" source="CVE"/>
    <description>
    Incomplete blacklist vulnerability in util.c in foomatic-rip in cups-filters 1.0.42 before 1.2.0 and in foomatic-filters in Foomatic 4.0.x allows remote attackers to execute arbitrary commands via ` (backtick) characters in a print job.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8327.html">CVE-2015-8327</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 1027197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8327">SUSE bug 957531</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121798" comment="cups-filters-1.0.58-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151947" comment="cups-filters is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121799" comment="cups-filters-cups-browsed-1.0.58-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151948" comment="cups-filters-cups-browsed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121800" comment="cups-filters-devel-1.0.58-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153170" comment="cups-filters-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121801" comment="cups-filters-foomatic-rip-1.0.58-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151949" comment="cups-filters-foomatic-rip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121802" comment="cups-filters-ghostscript-1.0.58-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151950" comment="cups-filters-ghostscript is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8339</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339" source="CVE"/>
    <description>
    The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8339.html">CVE-2015-8339</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8339">SUSE bug 956408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121492" comment="xen-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121493" comment="xen-devel-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121494" comment="xen-doc-html-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121495" comment="xen-kmp-default-4.5.2_04_k4.1.13_5-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121496" comment="xen-libs-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121497" comment="xen-libs-32bit-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121498" comment="xen-tools-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121499" comment="xen-tools-domU-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8340</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340" source="CVE"/>
    <description>
    The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8340.html">CVE-2015-8340</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8340">SUSE bug 956408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121492" comment="xen-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121493" comment="xen-devel-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121494" comment="xen-doc-html-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121495" comment="xen-kmp-default-4.5.2_04_k4.1.13_5-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121496" comment="xen-libs-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121497" comment="xen-libs-32bit-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121498" comment="xen-tools-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121499" comment="xen-tools-domU-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8341</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341" source="CVE"/>
    <description>
    The libxl toolstack library in Xen 4.1.x through 4.6.x does not properly release mappings of files used as kernels and initial ramdisks when managing multiple domains in the same process, which allows attackers to cause a denial of service (memory and disk consumption) by starting domains.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8341.html">CVE-2015-8341</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8341">SUSE bug 956409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8341">SUSE bug 956409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8341">SUSE bug 956409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8341">SUSE bug 956409</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121492" comment="xen-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121493" comment="xen-devel-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121494" comment="xen-doc-html-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121495" comment="xen-kmp-default-4.5.2_04_k4.1.13_5-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121496" comment="xen-libs-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121497" comment="xen-libs-32bit-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121498" comment="xen-tools-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121499" comment="xen-tools-domU-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8345</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345" source="CVE"/>
    <description>
    The eepro100 emulator in QEMU qemu-kvm blank allows local guest users to cause a denial of service (application crash and infinite loop) via vectors involving the command block list.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8345.html">CVE-2015-8345</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8345">SUSE bug 956832</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123644" comment="qemu-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123645" comment="qemu-arm-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123646" comment="qemu-block-curl-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123647" comment="qemu-block-rbd-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123648" comment="qemu-extra-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123649" comment="qemu-guest-agent-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123650" comment="qemu-ipxe-1.0.0-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123651" comment="qemu-kvm-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123652" comment="qemu-lang-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123653" comment="qemu-linux-user-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123654" comment="qemu-ppc-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123655" comment="qemu-s390-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123656" comment="qemu-seabios-1.8.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123657" comment="qemu-sgabios-8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123658" comment="qemu-testsuite-2.3.1-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123659" comment="qemu-tools-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123660" comment="qemu-vgabios-1.8.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123661" comment="qemu-x86-2.3.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8363</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8363" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8363" source="CVE"/>
    <description>
    The jpeg2000_read_main_headers function in libavcodec/jpeg2000dec.c in FFmpeg before 2.6.5, 2.7.x before 2.7.3, and 2.8.x through 2.8.2 does not enforce uniqueness of the SIZ marker in a JPEG 2000 image, which allows remote attackers to cause a denial of service (out-of-bounds heap-memory access) or possibly have unspecified other impact via a crafted image with two or more of these markers.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8363.html">CVE-2015-8363</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8363">SUSE bug 957114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8363">SUSE bug 957114</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120742" comment="ffmpeg-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153138" comment="ffmpeg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120743" comment="ffmpeg-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153139" comment="ffmpeg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120744" comment="libavcodec-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120745" comment="libavcodec56-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153141" comment="libavcodec56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120746" comment="libavcodec56-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153142" comment="libavcodec56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120747" comment="libavdevice-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120748" comment="libavdevice56-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153144" comment="libavdevice56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120749" comment="libavdevice56-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153145" comment="libavdevice56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120750" comment="libavfilter-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120751" comment="libavfilter5-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153147" comment="libavfilter5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120752" comment="libavfilter5-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153148" comment="libavfilter5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120753" comment="libavformat-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120754" comment="libavformat56-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153150" comment="libavformat56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120755" comment="libavformat56-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153151" comment="libavformat56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120756" comment="libavresample-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120757" comment="libavresample2-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153153" comment="libavresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120758" comment="libavresample2-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153154" comment="libavresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120759" comment="libavutil-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120760" comment="libavutil54-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153156" comment="libavutil54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120761" comment="libavutil54-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153157" comment="libavutil54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120762" comment="libpostproc-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120763" comment="libpostproc53-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153159" comment="libpostproc53 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120764" comment="libpostproc53-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153160" comment="libpostproc53-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120765" comment="libswresample-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120766" comment="libswresample1-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153162" comment="libswresample1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120767" comment="libswresample1-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153163" comment="libswresample1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120768" comment="libswscale-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120769" comment="libswscale3-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153165" comment="libswscale3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120770" comment="libswscale3-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153166" comment="libswscale3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8364</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8364" source="CVE"/>
    <description>
    Integer overflow in the ff_ivi_init_planes function in libavcodec/ivi.c in FFmpeg before 2.6.5, 2.7.x before 2.7.3, and 2.8.x through 2.8.2 allows remote attackers to cause a denial of service (out-of-bounds heap-memory access) or possibly have unspecified other impact via crafted image dimensions in Indeo Video Interactive data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8364.html">CVE-2015-8364</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8364">SUSE bug 957115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8364">SUSE bug 957115</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120742" comment="ffmpeg-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153138" comment="ffmpeg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120743" comment="ffmpeg-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153139" comment="ffmpeg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120744" comment="libavcodec-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120745" comment="libavcodec56-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153141" comment="libavcodec56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120746" comment="libavcodec56-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153142" comment="libavcodec56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120747" comment="libavdevice-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120748" comment="libavdevice56-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153144" comment="libavdevice56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120749" comment="libavdevice56-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153145" comment="libavdevice56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120750" comment="libavfilter-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120751" comment="libavfilter5-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153147" comment="libavfilter5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120752" comment="libavfilter5-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153148" comment="libavfilter5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120753" comment="libavformat-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120754" comment="libavformat56-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153150" comment="libavformat56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120755" comment="libavformat56-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153151" comment="libavformat56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120756" comment="libavresample-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120757" comment="libavresample2-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153153" comment="libavresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120758" comment="libavresample2-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153154" comment="libavresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120759" comment="libavutil-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120760" comment="libavutil54-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153156" comment="libavutil54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120761" comment="libavutil54-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153157" comment="libavutil54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120762" comment="libpostproc-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120763" comment="libpostproc53-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153159" comment="libpostproc53 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120764" comment="libpostproc53-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153160" comment="libpostproc53-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120765" comment="libswresample-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120766" comment="libswresample1-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153162" comment="libswresample1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120767" comment="libswresample1-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153163" comment="libswresample1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120768" comment="libswscale-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120769" comment="libswscale3-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153165" comment="libswscale3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120770" comment="libswscale3-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153166" comment="libswscale3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8365</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8365" source="CVE"/>
    <description>
    The smka_decode_frame function in libavcodec/smacker.c in FFmpeg before 2.6.5, 2.7.x before 2.7.3, and 2.8.x through 2.8.2 does not verify that the data size is consistent with the number of channels, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Smacker data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8365.html">CVE-2015-8365</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8365">SUSE bug 957116</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8365">SUSE bug 957116</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120742" comment="ffmpeg-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153138" comment="ffmpeg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120743" comment="ffmpeg-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153139" comment="ffmpeg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120744" comment="libavcodec-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120745" comment="libavcodec56-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153141" comment="libavcodec56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120746" comment="libavcodec56-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153142" comment="libavcodec56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120747" comment="libavdevice-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120748" comment="libavdevice56-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153144" comment="libavdevice56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120749" comment="libavdevice56-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153145" comment="libavdevice56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120750" comment="libavfilter-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120751" comment="libavfilter5-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153147" comment="libavfilter5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120752" comment="libavfilter5-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153148" comment="libavfilter5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120753" comment="libavformat-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120754" comment="libavformat56-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153150" comment="libavformat56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120755" comment="libavformat56-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153151" comment="libavformat56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120756" comment="libavresample-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120757" comment="libavresample2-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153153" comment="libavresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120758" comment="libavresample2-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153154" comment="libavresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120759" comment="libavutil-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120760" comment="libavutil54-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153156" comment="libavutil54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120761" comment="libavutil54-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153157" comment="libavutil54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120762" comment="libpostproc-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120763" comment="libpostproc53-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153159" comment="libpostproc53 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120764" comment="libpostproc53-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153160" comment="libpostproc53-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120765" comment="libswresample-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120766" comment="libswresample1-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153162" comment="libswresample1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120767" comment="libswresample1-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153163" comment="libswresample1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120768" comment="libswscale-devel-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120769" comment="libswscale3-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153165" comment="libswscale3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120770" comment="libswscale3-32bit-2.8.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153166" comment="libswscale3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8367</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8367" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8367" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8367.html">CVE-2015-8367</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8367">SUSE bug 957517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8367">SUSE bug 957517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8367">SUSE bug 957517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8367">SUSE bug 957517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8367">SUSE bug 957517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8367">SUSE bug 957517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8367">SUSE bug 1006704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8367">SUSE bug 1006717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8367">SUSE bug 957517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8367">SUSE bug 957517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8367">SUSE bug 957517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8367">SUSE bug 957517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8367">SUSE bug 957517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8367">SUSE bug 957517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8367">SUSE bug 957517</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135305" comment="libraw-0.16.2-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153171" comment="libraw is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135306" comment="libraw-devel-0.16.2-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151901" comment="libraw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135307" comment="libraw-devel-static-0.16.2-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153172" comment="libraw-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135308" comment="libraw-tools-0.16.2-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153173" comment="libraw-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135309" comment="libraw10-0.16.2-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151902" comment="libraw10 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8369</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8369" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8369" source="CVE"/>
    <description>
    SQL injection vulnerability in include/top_graph_header.php in Cacti 0.8.8f and earlier allows remote attackers to execute arbitrary SQL commands via the rra_id parameter in a properties action to graph.php.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8369.html">CVE-2015-8369</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8369">SUSE bug 958863</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8369">SUSE bug 958863</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8369">SUSE bug 958863</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8369">SUSE bug 958977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8369">SUSE bug 960678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8369">SUSE bug 958863</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8369">SUSE bug 958863</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123268" comment="cacti-0.8.8f-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123269" comment="cacti-spine-0.8.8f-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8370</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8370" source="CVE"/>
    <description>
    Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8370.html">CVE-2015-8370</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8370">SUSE bug 956631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8370">SUSE bug 956631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8370">SUSE bug 956631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8370">SUSE bug 956631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8370">SUSE bug 956631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8370">SUSE bug 956631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8370">SUSE bug 956631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8370">SUSE bug 956631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8370">SUSE bug 956631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8370">SUSE bug 956631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8370">SUSE bug 956631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8370">SUSE bug 956631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8370">SUSE bug 956631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8370">SUSE bug 956631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8370">SUSE bug 956631</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8370">SUSE bug 956631</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121123" comment="grub2-2.02~beta2-76.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121124" comment="grub2-branding-upstream-2.02~beta2-76.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121125" comment="grub2-i386-efi-2.02~beta2-76.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121126" comment="grub2-i386-pc-2.02~beta2-76.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121127" comment="grub2-snapper-plugin-2.02~beta2-76.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121128" comment="grub2-x86_64-efi-2.02~beta2-76.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121129" comment="grub2-x86_64-xen-2.02~beta2-76.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8377</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8377" source="CVE"/>
    <description>
    SQL injection vulnerability in the host_new_graphs_save function in graphs_new.php in Cacti 0.8.8f and earlier allows remote authenticated users to execute arbitrary SQL commands via crafted serialized data in the selected_graphs_array parameter in a save action.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8377.html">CVE-2015-8377</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8377">SUSE bug 958977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8377">SUSE bug 958977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8377">SUSE bug 960678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8377">SUSE bug 958863</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8377">SUSE bug 958977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8377">SUSE bug 960678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8377">SUSE bug 958977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8377">SUSE bug 958977</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123268" comment="cacti-0.8.8f-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123269" comment="cacti-spine-0.8.8f-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8380</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8380" source="CVE"/>
    <description>
    The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8380.html">CVE-2015-8380</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8380">SUSE bug 957566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8380">SUSE bug 957566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8380">SUSE bug 957566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8380">SUSE bug 957566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8380">SUSE bug 957566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8380">SUSE bug 957566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8380">SUSE bug 957566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8380">SUSE bug 957566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8380">SUSE bug 957566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8380">SUSE bug 957566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8380">SUSE bug 957566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8380">SUSE bug 957566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8380">SUSE bug 957566</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8381</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8381" source="CVE"/>
    <description>
    The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?'R')(\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/ and /(?J:(?|(:(?|(?'R')(\z(?|(?'R')(\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8381.html">CVE-2015-8381</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8381">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8381">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8381">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8381">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8381">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8381">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8381">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8381">SUSE bug 958373</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8382</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8382" source="CVE"/>
    <description>
    The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8382.html">CVE-2015-8382</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8382">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8382">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8382">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8382">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8382">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8382">SUSE bug 958373</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8383</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8383" source="CVE"/>
    <description>
    PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8383.html">CVE-2015-8383</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8383">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8383">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8383">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8383">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8383">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8383">SUSE bug 958373</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8384</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8384" source="CVE"/>
    <description>
    PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8384.html">CVE-2015-8384</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8384">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8384">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8384">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8384">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8384">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8384">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8384">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8384">SUSE bug 958373</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8385</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8385" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385" source="CVE"/>
    <description>
    PCRE before 8.38 mishandles the /(?|(\k'Pm')|(?'Pm'))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8385.html">CVE-2015-8385</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8385">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8385">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8385">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8385">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8385">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8385">SUSE bug 958373</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8386</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386" source="CVE"/>
    <description>
    PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8386.html">CVE-2015-8386</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8386">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8386">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8386">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8386">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8386">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8386">SUSE bug 958373</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8387</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8387" source="CVE"/>
    <description>
    PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8387.html">CVE-2015-8387</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8387">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8387">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8387">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8387">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8387">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8387">SUSE bug 958373</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8388</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8388" source="CVE"/>
    <description>
    PCRE before 8.38 mishandles the /(?=di(?&lt;=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8388.html">CVE-2015-8388</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8388">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8388">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8388">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8388">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8388">SUSE bug 936227</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8388">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8388">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8388">SUSE bug 936227</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8389</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8389" source="CVE"/>
    <description>
    PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8389.html">CVE-2015-8389</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8389">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8389">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8389">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8389">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8389">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8389">SUSE bug 958373</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8390</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8390" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8390" source="CVE"/>
    <description>
    PCRE before 8.38 mishandles the [: and \\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8390.html">CVE-2015-8390</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8390">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8390">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8390">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8390">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8390">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8390">SUSE bug 958373</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8391</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391" source="CVE"/>
    <description>
    The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8391.html">CVE-2015-8391</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8391">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8391">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8391">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8391">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8391">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8391">SUSE bug 958373</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8392</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8392" source="CVE"/>
    <description>
    PCRE before 8.38 mishandles certain instances of the (?| substring, which allows remote attackers to cause a denial of service (unintended recursion and buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8395.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8392.html">CVE-2015-8392</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8392">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8392">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8392">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8392">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8392">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8392">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8392">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8392">SUSE bug 958373</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8393</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8393" source="CVE"/>
    <description>
    pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8393.html">CVE-2015-8393</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8393">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8393">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8393">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8393">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8393">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8393">SUSE bug 958373</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8394</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8394" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8394" source="CVE"/>
    <description>
    PCRE before 8.38 mishandles the (?(&lt;digits&gt;) and (?(R&lt;digits&gt;) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8394.html">CVE-2015-8394</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8394">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8394">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8394">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8394">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8394">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8394">SUSE bug 958373</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8395</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8395" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8395" source="CVE"/>
    <description>
    PCRE before 8.38 mishandles certain references, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8392.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8395.html">CVE-2015-8395</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8395">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8395">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8395">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8395">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8395">SUSE bug 958373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8395">SUSE bug 906574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8395">SUSE bug 957598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8395">SUSE bug 958373</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8400</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8400" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8400" source="CVE"/>
    <description>
    The HTTPS fallback implementation in Shell In A Box (aka shellinabox) before 2.19 makes it easier for remote attackers to conduct DNS rebinding attacks via the "/plain" URL.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8400.html">CVE-2015-8400</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8400">SUSE bug 957748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8400">SUSE bug 957748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8400">SUSE bug 957748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8400">SUSE bug 957748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8400">SUSE bug 957748</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8400">SUSE bug 957748</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009144698" comment="shellinabox-2.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153182" comment="shellinabox is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8467</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467" source="CVE"/>
    <description>
    The samldb_check_user_account_control_acl function in dsdb/samdb/ldb_modules/samldb.c in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not properly check for administrative privileges during creation of machine accounts, which allows remote authenticated users to bypass intended access restrictions by leveraging the existence of a domain with both a Samba DC and a Windows DC, a similar issue to CVE-2015-2535.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8467.html">CVE-2015-8467</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8467">SUSE bug 958585</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8467">SUSE bug 958585</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8467">SUSE bug 958585</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8467">SUSE bug 958585</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8467">SUSE bug 958585</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8467">SUSE bug 958585</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8467">SUSE bug 958585</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8467">SUSE bug 958585</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8467">SUSE bug 958585</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8467">SUSE bug 958585</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8467">SUSE bug 958585</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119928" comment="ldb-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152722" comment="ldb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119929" comment="ldb-tools-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152723" comment="ldb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119930" comment="libdcerpc-atsvc-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152724" comment="libdcerpc-atsvc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119931" comment="libdcerpc-atsvc0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152725" comment="libdcerpc-atsvc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119932" comment="libdcerpc-atsvc0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152726" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119933" comment="libdcerpc-binding0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119934" comment="libdcerpc-binding0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119935" comment="libdcerpc-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119936" comment="libdcerpc-samr-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119937" comment="libdcerpc-samr0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119938" comment="libdcerpc-samr0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119939" comment="libdcerpc0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119940" comment="libdcerpc0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119941" comment="libgensec-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152731" comment="libgensec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119942" comment="libgensec0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119943" comment="libgensec0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119944" comment="libldb-devel-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152732" comment="libldb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119945" comment="libldb1-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152733" comment="libldb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119946" comment="libldb1-32bit-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152734" comment="libldb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119947" comment="libndr-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119948" comment="libndr-krb5pac-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119949" comment="libndr-krb5pac0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119950" comment="libndr-krb5pac0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119951" comment="libndr-nbt-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119952" comment="libndr-nbt0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119953" comment="libndr-nbt0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119954" comment="libndr-standard-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119955" comment="libndr-standard0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119956" comment="libndr-standard0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119957" comment="libndr0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119958" comment="libndr0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119959" comment="libnetapi-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119960" comment="libnetapi0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119961" comment="libnetapi0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119962" comment="libregistry-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152740" comment="libregistry-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119963" comment="libregistry0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119964" comment="libregistry0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152741" comment="libregistry0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119965" comment="libsamba-credentials-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119966" comment="libsamba-credentials0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119967" comment="libsamba-credentials0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119968" comment="libsamba-hostconfig-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119969" comment="libsamba-hostconfig0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119970" comment="libsamba-hostconfig0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119971" comment="libsamba-passdb-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119972" comment="libsamba-passdb0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119973" comment="libsamba-passdb0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119974" comment="libsamba-policy-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119975" comment="libsamba-policy0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119976" comment="libsamba-policy0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119977" comment="libsamba-util-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119978" comment="libsamba-util0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119979" comment="libsamba-util0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119980" comment="libsamdb-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119981" comment="libsamdb0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119982" comment="libsamdb0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119983" comment="libsmbclient-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119984" comment="libsmbclient-raw-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152750" comment="libsmbclient-raw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119985" comment="libsmbclient-raw0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119986" comment="libsmbclient-raw0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119987" comment="libsmbclient0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119988" comment="libsmbclient0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119989" comment="libsmbconf-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119990" comment="libsmbconf0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119991" comment="libsmbconf0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119992" comment="libsmbldap-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119993" comment="libsmbldap0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119994" comment="libsmbldap0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119995" comment="libtalloc-devel-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152754" comment="libtalloc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119996" comment="libtalloc2-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152755" comment="libtalloc2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119997" comment="libtalloc2-32bit-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152756" comment="libtalloc2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119998" comment="libtdb-devel-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152757" comment="libtdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119999" comment="libtdb1-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152758" comment="libtdb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120000" comment="libtdb1-32bit-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152759" comment="libtdb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120001" comment="libtevent-devel-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152760" comment="libtevent-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120002" comment="libtevent-util-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120003" comment="libtevent-util0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120004" comment="libtevent-util0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120005" comment="libtevent0-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152762" comment="libtevent0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120006" comment="libtevent0-32bit-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152763" comment="libtevent0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120007" comment="libwbclient-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120008" comment="libwbclient0-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120009" comment="libwbclient0-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120010" comment="pyldb-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152765" comment="pyldb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120011" comment="pyldb-32bit-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152766" comment="pyldb-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120012" comment="pyldb-devel-1.1.24-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152767" comment="pyldb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120013" comment="pytalloc-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152768" comment="pytalloc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120014" comment="pytalloc-32bit-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152769" comment="pytalloc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120015" comment="pytalloc-devel-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152770" comment="pytalloc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120016" comment="python-tdb-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152771" comment="python-tdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120017" comment="python-tdb-32bit-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152772" comment="python-tdb-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120018" comment="python-tevent-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152773" comment="python-tevent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120019" comment="python-tevent-32bit-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152774" comment="python-tevent-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120020" comment="samba-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120021" comment="samba-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120022" comment="samba-client-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120023" comment="samba-client-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120024" comment="samba-core-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120025" comment="samba-doc-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120026" comment="samba-libs-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120027" comment="samba-libs-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120028" comment="samba-pidl-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120029" comment="samba-python-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120030" comment="samba-test-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120031" comment="samba-test-devel-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152779" comment="samba-test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120032" comment="samba-winbind-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120033" comment="samba-winbind-32bit-4.2.4-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120034" comment="talloc-2.1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152780" comment="talloc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120035" comment="tdb-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152781" comment="tdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120036" comment="tdb-tools-1.3.8-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152782" comment="tdb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009120037" comment="tevent-0.9.26-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152783" comment="tevent is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8472</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8472" source="CVE"/>
    <description>
    Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8472.html">CVE-2015-8472</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8472">SUSE bug 958198</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8472">SUSE bug 958198</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8472">SUSE bug 958198</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8472">SUSE bug 958198</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8472">SUSE bug 958198</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8472">SUSE bug 963937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8472">SUSE bug 960402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8472">SUSE bug 954980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8472">SUSE bug 958198</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122393" comment="java-1_7_0-openjdk-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122394" comment="java-1_7_0-openjdk-accessibility-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122395" comment="java-1_7_0-openjdk-bootstrap-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122396" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122397" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122398" comment="java-1_7_0-openjdk-demo-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122399" comment="java-1_7_0-openjdk-devel-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122400" comment="java-1_7_0-openjdk-headless-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122401" comment="java-1_7_0-openjdk-javadoc-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122402" comment="java-1_7_0-openjdk-src-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8504</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504" source="CVE"/>
    <description>
    Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8504.html">CVE-2015-8504</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8504">SUSE bug 958493</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8539</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8539" source="CVE"/>
    <description>
    The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8539.html">CVE-2015-8539</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958601</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 781018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 781018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 781018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 781018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8539">SUSE bug 958463</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122451" comment="kernel-debug-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122452" comment="kernel-debug-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122453" comment="kernel-debug-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122454" comment="kernel-default-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122455" comment="kernel-default-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122456" comment="kernel-default-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122457" comment="kernel-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122458" comment="kernel-docs-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122459" comment="kernel-docs-html-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122460" comment="kernel-docs-pdf-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122461" comment="kernel-ec2-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122462" comment="kernel-ec2-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122463" comment="kernel-ec2-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122464" comment="kernel-macros-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122465" comment="kernel-obs-build-4.1.15-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122466" comment="kernel-obs-qa-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122467" comment="kernel-obs-qa-xen-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122468" comment="kernel-pae-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122469" comment="kernel-pae-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122470" comment="kernel-pae-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122471" comment="kernel-pv-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122472" comment="kernel-pv-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122473" comment="kernel-pv-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122474" comment="kernel-source-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122475" comment="kernel-source-vanilla-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122476" comment="kernel-syms-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122477" comment="kernel-vanilla-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122478" comment="kernel-vanilla-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122479" comment="kernel-xen-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122480" comment="kernel-xen-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122481" comment="kernel-xen-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8540</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8540" source="CVE"/>
    <description>
    Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8540.html">CVE-2015-8540</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8540">SUSE bug 958791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8540">SUSE bug 958791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8540">SUSE bug 958791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8540">SUSE bug 963937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8540">SUSE bug 958791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8540">SUSE bug 958791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8540">SUSE bug 958791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8540">SUSE bug 958791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8540">SUSE bug 958791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8540">SUSE bug 958791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8540">SUSE bug 958791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8540">SUSE bug 958791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8540">SUSE bug 958791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8540">SUSE bug 958791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8540">SUSE bug 958791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8540">SUSE bug 958791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8540">SUSE bug 958791</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8540">SUSE bug 958791</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150711" comment="libpng12-1.2.50-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153098" comment="libpng12 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150712" comment="libpng12-0-1.2.50-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151411" comment="libpng12-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150713" comment="libpng12-0-32bit-1.2.50-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151412" comment="libpng12-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150714" comment="libpng12-compat-devel-1.2.50-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153099" comment="libpng12-compat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150715" comment="libpng12-compat-devel-32bit-1.2.50-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153100" comment="libpng12-compat-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150716" comment="libpng12-devel-1.2.50-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151413" comment="libpng12-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150717" comment="libpng12-devel-32bit-1.2.50-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153101" comment="libpng12-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154523" comment="libpng15-1.5.22-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153131" comment="libpng15 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154524" comment="libpng15-15-1.5.22-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153132" comment="libpng15-15 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154525" comment="libpng15-15-32bit-1.5.22-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153133" comment="libpng15-15-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8543</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8543" source="CVE"/>
    <description>
    The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8543.html">CVE-2015-8543</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 923755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 969522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 969522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 969522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 969522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 969522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 969522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 969522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 969522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 969522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 969522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 969522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 969522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 969522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 969522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 969522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 969522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 958886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8543">SUSE bug 1052256</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122451" comment="kernel-debug-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122452" comment="kernel-debug-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122453" comment="kernel-debug-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122454" comment="kernel-default-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122455" comment="kernel-default-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122456" comment="kernel-default-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122457" comment="kernel-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122458" comment="kernel-docs-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122459" comment="kernel-docs-html-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122460" comment="kernel-docs-pdf-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122461" comment="kernel-ec2-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122462" comment="kernel-ec2-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122463" comment="kernel-ec2-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122464" comment="kernel-macros-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122465" comment="kernel-obs-build-4.1.15-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122466" comment="kernel-obs-qa-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122467" comment="kernel-obs-qa-xen-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122468" comment="kernel-pae-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122469" comment="kernel-pae-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122470" comment="kernel-pae-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122471" comment="kernel-pv-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122472" comment="kernel-pv-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122473" comment="kernel-pv-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122474" comment="kernel-source-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122475" comment="kernel-source-vanilla-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122476" comment="kernel-syms-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122477" comment="kernel-vanilla-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122478" comment="kernel-vanilla-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122479" comment="kernel-xen-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122480" comment="kernel-xen-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122481" comment="kernel-xen-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8547</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8547" source="CVE"/>
    <description>
    The CoreUserInputHandler::doMode function in core/coreuserinputhandler.cpp in Quassel 0.10.0 allows remote attackers to cause a denial of service (application crash) via the "/op *" command in a query.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8547.html">CVE-2015-8547</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8547">SUSE bug 958928</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8547">SUSE bug 958928</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8547">SUSE bug 958928</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8547">SUSE bug 958928</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8547">SUSE bug 958928</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119863" comment="quassel-0.12.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153183" comment="quassel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119864" comment="quassel-base-0.12.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153184" comment="quassel-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119865" comment="quassel-client-0.12.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153185" comment="quassel-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119866" comment="quassel-core-0.12.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153186" comment="quassel-core is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119867" comment="quassel-mono-0.12.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153187" comment="quassel-mono is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8550</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550" source="CVE"/>
    <description>
    Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8550.html">CVE-2015-8550</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8550">SUSE bug 957988</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122451" comment="kernel-debug-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122452" comment="kernel-debug-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122453" comment="kernel-debug-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122454" comment="kernel-default-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122455" comment="kernel-default-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122456" comment="kernel-default-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122457" comment="kernel-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122458" comment="kernel-docs-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122459" comment="kernel-docs-html-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122460" comment="kernel-docs-pdf-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122461" comment="kernel-ec2-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122462" comment="kernel-ec2-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122463" comment="kernel-ec2-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122464" comment="kernel-macros-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122465" comment="kernel-obs-build-4.1.15-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122466" comment="kernel-obs-qa-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122467" comment="kernel-obs-qa-xen-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122468" comment="kernel-pae-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122469" comment="kernel-pae-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122470" comment="kernel-pae-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122471" comment="kernel-pv-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122472" comment="kernel-pv-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122473" comment="kernel-pv-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122474" comment="kernel-source-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122475" comment="kernel-source-vanilla-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122476" comment="kernel-syms-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122477" comment="kernel-vanilla-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122478" comment="kernel-vanilla-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122479" comment="kernel-xen-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122480" comment="kernel-xen-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122481" comment="kernel-xen-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121492" comment="xen-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121493" comment="xen-devel-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121494" comment="xen-doc-html-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121495" comment="xen-kmp-default-4.5.2_04_k4.1.13_5-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121496" comment="xen-libs-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121497" comment="xen-libs-32bit-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121498" comment="xen-tools-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121499" comment="xen-tools-domU-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8551</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8551" source="CVE"/>
    <description>
    The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8551.html">CVE-2015-8551</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 990058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8551">SUSE bug 957990</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122451" comment="kernel-debug-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122452" comment="kernel-debug-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122453" comment="kernel-debug-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122454" comment="kernel-default-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122455" comment="kernel-default-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122456" comment="kernel-default-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122457" comment="kernel-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122458" comment="kernel-docs-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122459" comment="kernel-docs-html-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122460" comment="kernel-docs-pdf-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122461" comment="kernel-ec2-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122462" comment="kernel-ec2-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122463" comment="kernel-ec2-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122464" comment="kernel-macros-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122465" comment="kernel-obs-build-4.1.15-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122466" comment="kernel-obs-qa-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122467" comment="kernel-obs-qa-xen-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122468" comment="kernel-pae-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122469" comment="kernel-pae-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122470" comment="kernel-pae-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122471" comment="kernel-pv-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122472" comment="kernel-pv-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122473" comment="kernel-pv-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122474" comment="kernel-source-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122475" comment="kernel-source-vanilla-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122476" comment="kernel-syms-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122477" comment="kernel-vanilla-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122478" comment="kernel-vanilla-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122479" comment="kernel-xen-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122480" comment="kernel-xen-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122481" comment="kernel-xen-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8552</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8552" source="CVE"/>
    <description>
    The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8552.html">CVE-2015-8552</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 990058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8552">SUSE bug 957990</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122451" comment="kernel-debug-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122452" comment="kernel-debug-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122453" comment="kernel-debug-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122454" comment="kernel-default-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122455" comment="kernel-default-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122456" comment="kernel-default-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122457" comment="kernel-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122458" comment="kernel-docs-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122459" comment="kernel-docs-html-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122460" comment="kernel-docs-pdf-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122461" comment="kernel-ec2-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122462" comment="kernel-ec2-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122463" comment="kernel-ec2-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122464" comment="kernel-macros-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122465" comment="kernel-obs-build-4.1.15-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122466" comment="kernel-obs-qa-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122467" comment="kernel-obs-qa-xen-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122468" comment="kernel-pae-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122469" comment="kernel-pae-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122470" comment="kernel-pae-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122471" comment="kernel-pv-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122472" comment="kernel-pv-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122473" comment="kernel-pv-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122474" comment="kernel-source-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122475" comment="kernel-source-vanilla-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122476" comment="kernel-syms-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122477" comment="kernel-vanilla-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122478" comment="kernel-vanilla-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122479" comment="kernel-xen-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122480" comment="kernel-xen-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122481" comment="kernel-xen-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8554</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8554" source="CVE"/>
    <description>
    Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8554.html">CVE-2015-8554</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8554">SUSE bug 958007</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121492" comment="xen-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121493" comment="xen-devel-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121494" comment="xen-doc-html-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121495" comment="xen-kmp-default-4.5.2_04_k4.1.13_5-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121496" comment="xen-libs-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121497" comment="xen-libs-32bit-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121498" comment="xen-tools-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121499" comment="xen-tools-domU-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8555</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555" source="CVE"/>
    <description>
    Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and earlier do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8555.html">CVE-2015-8555</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8555">SUSE bug 958009</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121492" comment="xen-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121493" comment="xen-devel-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121494" comment="xen-doc-html-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121495" comment="xen-kmp-default-4.5.2_04_k4.1.13_5-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121496" comment="xen-libs-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121497" comment="xen-libs-32bit-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121498" comment="xen-tools-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121499" comment="xen-tools-domU-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8558</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558" source="CVE"/>
    <description>
    The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8558.html">CVE-2015-8558</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 976109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 976111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8558">SUSE bug 959006</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8567</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567" source="CVE"/>
    <description>
    Memory leak in net/vmxnet3.c in QEMU allows remote attackers to cause a denial of service (memory consumption).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8567.html">CVE-2015-8567</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8567">SUSE bug 959386</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121492" comment="xen-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121493" comment="xen-devel-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121494" comment="xen-doc-html-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121495" comment="xen-kmp-default-4.5.2_04_k4.1.13_5-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121496" comment="xen-libs-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121497" comment="xen-libs-32bit-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121498" comment="xen-tools-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121499" comment="xen-tools-domU-4.5.2_04-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8568</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568" source="CVE"/>
    <description>
    Memory leak in QEMU, when built with a VMWARE VMXNET3 paravirtual NIC emulator support, allows local guest users to cause a denial of service (host memory consumption) by trying to activate the vmxnet3 device repeatedly.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8568.html">CVE-2015-8568</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959387</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8568">SUSE bug 959386</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8569</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8569" source="CVE"/>
    <description>
    The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8569.html">CVE-2015-8569</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 923755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8569">SUSE bug 959190</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122451" comment="kernel-debug-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122452" comment="kernel-debug-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122453" comment="kernel-debug-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122454" comment="kernel-default-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122455" comment="kernel-default-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122456" comment="kernel-default-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122457" comment="kernel-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122458" comment="kernel-docs-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122459" comment="kernel-docs-html-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122460" comment="kernel-docs-pdf-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122461" comment="kernel-ec2-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122462" comment="kernel-ec2-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122463" comment="kernel-ec2-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122464" comment="kernel-macros-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122465" comment="kernel-obs-build-4.1.15-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122466" comment="kernel-obs-qa-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122467" comment="kernel-obs-qa-xen-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122468" comment="kernel-pae-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122469" comment="kernel-pae-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122470" comment="kernel-pae-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122471" comment="kernel-pv-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122472" comment="kernel-pv-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122473" comment="kernel-pv-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122474" comment="kernel-source-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122475" comment="kernel-source-vanilla-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122476" comment="kernel-syms-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122477" comment="kernel-vanilla-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122478" comment="kernel-vanilla-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122479" comment="kernel-xen-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122480" comment="kernel-xen-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122481" comment="kernel-xen-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8575</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8575" source="CVE"/>
    <description>
    The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel before 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8575.html">CVE-2015-8575</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8575">SUSE bug 959399</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122451" comment="kernel-debug-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122452" comment="kernel-debug-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122453" comment="kernel-debug-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122454" comment="kernel-default-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122455" comment="kernel-default-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122456" comment="kernel-default-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122457" comment="kernel-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122458" comment="kernel-docs-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122459" comment="kernel-docs-html-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122460" comment="kernel-docs-pdf-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122461" comment="kernel-ec2-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122462" comment="kernel-ec2-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122463" comment="kernel-ec2-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122464" comment="kernel-macros-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122465" comment="kernel-obs-build-4.1.15-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122466" comment="kernel-obs-qa-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122467" comment="kernel-obs-qa-xen-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122468" comment="kernel-pae-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122469" comment="kernel-pae-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122470" comment="kernel-pae-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122471" comment="kernel-pv-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122472" comment="kernel-pv-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122473" comment="kernel-pv-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122474" comment="kernel-source-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122475" comment="kernel-source-vanilla-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122476" comment="kernel-syms-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122477" comment="kernel-vanilla-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122478" comment="kernel-vanilla-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122479" comment="kernel-xen-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122480" comment="kernel-xen-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122481" comment="kernel-xen-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8604</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8604" source="CVE"/>
    <description>
    SQL injection vulnerability in the host_new_graphs function in graphs_new.php in Cacti 0.8.8f and earlier allows remote authenticated users to execute arbitrary SQL commands via the cg_g parameter in a save action.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8604.html">CVE-2015-8604</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8604">SUSE bug 960678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8604">SUSE bug 960678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8604">SUSE bug 960678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8604">SUSE bug 960678</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123268" comment="cacti-0.8.8f-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123269" comment="cacti-spine-0.8.8f-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8605</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8605" source="CVE"/>
    <description>
    ISC DHCP 4.x before 4.1-ESV-R12-P1, 4.2.x, and 4.3.x before 4.3.3-P1 allows remote attackers to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8605.html">CVE-2015-8605</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8605">SUSE bug 961305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8605">SUSE bug 961305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8605">SUSE bug 961305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8605">SUSE bug 961305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8605">SUSE bug 961305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8605">SUSE bug 961305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8605">SUSE bug 961305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8605">SUSE bug 961305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8605">SUSE bug 961305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8605">SUSE bug 961305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8605">SUSE bug 961305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8605">SUSE bug 961305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8605">SUSE bug 961305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8605">SUSE bug 961305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8605">SUSE bug 961305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8605">SUSE bug 961305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8605">SUSE bug 961305</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122216" comment="dhcp-4.3.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151310" comment="dhcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122217" comment="dhcp-client-4.3.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151311" comment="dhcp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122221" comment="dhcp-devel-4.3.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153188" comment="dhcp-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123863" comment="dhcp-doc-4.3.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151312" comment="dhcp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122228" comment="dhcp-relay-4.3.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151313" comment="dhcp-relay is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122229" comment="dhcp-server-4.3.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151314" comment="dhcp-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8613</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613" source="CVE"/>
    <description>
    Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8613.html">CVE-2015-8613</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8613">SUSE bug 961358</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8613">SUSE bug 961556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8613">SUSE bug 961358</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8613">SUSE bug 961556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8613">SUSE bug 961556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8613">SUSE bug 961358</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8613">SUSE bug 961358</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8613">SUSE bug 961358</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8614</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8614" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the (1) conv_jistoeuc, (2) conv_euctojis, and (3) conv_sjistoeuc functions in codeconv.c in Claws Mail before 3.13.1 allow remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8614.html">CVE-2015-8614</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8614">SUSE bug 959993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8614">SUSE bug 959993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8614">SUSE bug 959993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8614">SUSE bug 959993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8614">SUSE bug 960566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8614">SUSE bug 959993</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123299" comment="claws-mail-3.12.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151767" comment="claws-mail is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123300" comment="claws-mail-devel-3.12.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153189" comment="claws-mail-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123301" comment="claws-mail-lang-3.12.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151768" comment="claws-mail-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8618</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8618" source="CVE"/>
    <description>
    The Int.Exp Montgomery code in the math/big library in Go 1.5.x before 1.5.3 mishandles carry propagation and produces incorrect output, which makes it easier for attackers to obtain private RSA keys via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8618.html">CVE-2015-8618</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8618">SUSE bug 960151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8618">SUSE bug 960151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8618">SUSE bug 960151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8618">SUSE bug 960151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8618">SUSE bug 960151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8618">SUSE bug 960151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8618">SUSE bug 960151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8618">SUSE bug 960151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8618">SUSE bug 960151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8618">SUSE bug 960151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8618">SUSE bug 960151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8618">SUSE bug 957814</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127853" comment="go-1.6.1-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153190" comment="go is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127854" comment="go-doc-1.6.1-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153191" comment="go-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8619</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619" source="CVE"/>
    <description>
    The Human Monitor Interface support in QEMU allows remote attackers to cause a denial of service (out-of-bounds write and application crash).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8619.html">CVE-2015-8619</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8619">SUSE bug 960334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8619">SUSE bug 960334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8619">SUSE bug 960334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8619">SUSE bug 960334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8619">SUSE bug 965269</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8619">SUSE bug 965269</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8619">SUSE bug 960334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8619">SUSE bug 965269</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8619">SUSE bug 965269</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8629</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629" source="CVE"/>
    <description>
    The xdr_nullstring function in lib/kadm5/kadm_rpc_xdr.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 does not verify whether '\0' characters exist as expected, which allows remote authenticated users to obtain sensitive information or cause a denial of service (out-of-bounds read) via a crafted string.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8629.html">CVE-2015-8629</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8629">SUSE bug 963968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8629">SUSE bug 963968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8629">SUSE bug 963968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8629">SUSE bug 963968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8629">SUSE bug 963968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8629">SUSE bug 963968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8629">SUSE bug 770172</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123392" comment="krb5-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123393" comment="krb5-32bit-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123394" comment="krb5-client-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123395" comment="krb5-devel-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123396" comment="krb5-devel-32bit-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152677" comment="krb5-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123397" comment="krb5-doc-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152678" comment="krb5-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123398" comment="krb5-mini-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152679" comment="krb5-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123399" comment="krb5-mini-devel-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152680" comment="krb5-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123400" comment="krb5-plugin-kdb-ldap-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152681" comment="krb5-plugin-kdb-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123401" comment="krb5-plugin-preauth-otp-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152682" comment="krb5-plugin-preauth-otp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123402" comment="krb5-plugin-preauth-pkinit-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152683" comment="krb5-plugin-preauth-pkinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123403" comment="krb5-server-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152684" comment="krb5-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8630</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630" source="CVE"/>
    <description>
    The (1) kadm5_create_principal_3 and (2) kadm5_modify_principal functions in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by specifying KADM5_POLICY with a NULL policy name.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8630.html">CVE-2015-8630</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8630">SUSE bug 963964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8630">SUSE bug 963964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8630">SUSE bug 963964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8630">SUSE bug 963964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8630">SUSE bug 963964</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123392" comment="krb5-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123393" comment="krb5-32bit-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123394" comment="krb5-client-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123395" comment="krb5-devel-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123396" comment="krb5-devel-32bit-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152677" comment="krb5-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123397" comment="krb5-doc-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152678" comment="krb5-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123398" comment="krb5-mini-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152679" comment="krb5-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123399" comment="krb5-mini-devel-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152680" comment="krb5-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123400" comment="krb5-plugin-kdb-ldap-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152681" comment="krb5-plugin-kdb-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123401" comment="krb5-plugin-preauth-otp-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152682" comment="krb5-plugin-preauth-otp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123402" comment="krb5-plugin-preauth-pkinit-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152683" comment="krb5-plugin-preauth-pkinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123403" comment="krb5-server-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152684" comment="krb5-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8631</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631" source="CVE"/>
    <description>
    Multiple memory leaks in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (memory consumption) via a request specifying a NULL principal name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8631.html">CVE-2015-8631</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8631">SUSE bug 963975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8631">SUSE bug 963975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8631">SUSE bug 963975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8631">SUSE bug 963975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8631">SUSE bug 963975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8631">SUSE bug 963975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8631">SUSE bug 963975</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123392" comment="krb5-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123393" comment="krb5-32bit-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123394" comment="krb5-client-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123395" comment="krb5-devel-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123396" comment="krb5-devel-32bit-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152677" comment="krb5-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123397" comment="krb5-doc-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152678" comment="krb5-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123398" comment="krb5-mini-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152679" comment="krb5-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123399" comment="krb5-mini-devel-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152680" comment="krb5-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123400" comment="krb5-plugin-kdb-ldap-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152681" comment="krb5-plugin-kdb-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123401" comment="krb5-plugin-preauth-otp-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152682" comment="krb5-plugin-preauth-otp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123402" comment="krb5-plugin-preauth-pkinit-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152683" comment="krb5-plugin-preauth-pkinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123403" comment="krb5-server-1.12.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152684" comment="krb5-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8661</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8661" source="CVE"/>
    <description>
    The h264_slice_header_init function in libavcodec/h264_slice.c in FFmpeg before 2.8.3 does not validate the relationship between the number of threads and the number of slices, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted H.264 data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8661.html">CVE-2015-8661</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8661">SUSE bug 960385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8661">SUSE bug 960385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8661">SUSE bug 960385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8661">SUSE bug 960385</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121403" comment="ffmpeg-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153138" comment="ffmpeg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121404" comment="ffmpeg-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153139" comment="ffmpeg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121405" comment="libavcodec-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121406" comment="libavcodec56-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153141" comment="libavcodec56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121407" comment="libavcodec56-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153142" comment="libavcodec56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121408" comment="libavdevice-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121409" comment="libavdevice56-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153144" comment="libavdevice56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121410" comment="libavdevice56-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153145" comment="libavdevice56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121411" comment="libavfilter-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121412" comment="libavfilter5-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153147" comment="libavfilter5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121413" comment="libavfilter5-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153148" comment="libavfilter5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121414" comment="libavformat-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121415" comment="libavformat56-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153150" comment="libavformat56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121416" comment="libavformat56-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153151" comment="libavformat56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121417" comment="libavresample-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121418" comment="libavresample2-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153153" comment="libavresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121419" comment="libavresample2-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153154" comment="libavresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121420" comment="libavutil-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121421" comment="libavutil54-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153156" comment="libavutil54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121422" comment="libavutil54-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153157" comment="libavutil54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121423" comment="libpostproc-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121424" comment="libpostproc53-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153159" comment="libpostproc53 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121425" comment="libpostproc53-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153160" comment="libpostproc53-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121426" comment="libswresample-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121427" comment="libswresample1-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153162" comment="libswresample1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121428" comment="libswresample1-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153163" comment="libswresample1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121429" comment="libswscale-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121430" comment="libswscale3-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153165" comment="libswscale3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121431" comment="libswscale3-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153166" comment="libswscale3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8662</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8662" source="CVE"/>
    <description>
    The ff_dwt_decode function in libavcodec/jpeg2000dwt.c in FFmpeg before 2.8.4 does not validate the number of decomposition levels before proceeding with Discrete Wavelet Transform decoding, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG 2000 data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8662.html">CVE-2015-8662</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8662">SUSE bug 960384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8662">SUSE bug 960384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8662">SUSE bug 960384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8662">SUSE bug 960384</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121403" comment="ffmpeg-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153138" comment="ffmpeg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121404" comment="ffmpeg-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153139" comment="ffmpeg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121405" comment="libavcodec-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121406" comment="libavcodec56-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153141" comment="libavcodec56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121407" comment="libavcodec56-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153142" comment="libavcodec56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121408" comment="libavdevice-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121409" comment="libavdevice56-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153144" comment="libavdevice56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121410" comment="libavdevice56-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153145" comment="libavdevice56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121411" comment="libavfilter-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121412" comment="libavfilter5-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153147" comment="libavfilter5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121413" comment="libavfilter5-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153148" comment="libavfilter5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121414" comment="libavformat-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121415" comment="libavformat56-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153150" comment="libavformat56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121416" comment="libavformat56-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153151" comment="libavformat56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121417" comment="libavresample-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121418" comment="libavresample2-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153153" comment="libavresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121419" comment="libavresample2-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153154" comment="libavresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121420" comment="libavutil-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121421" comment="libavutil54-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153156" comment="libavutil54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121422" comment="libavutil54-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153157" comment="libavutil54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121423" comment="libpostproc-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121424" comment="libpostproc53-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153159" comment="libpostproc53 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121425" comment="libpostproc53-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153160" comment="libpostproc53-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121426" comment="libswresample-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121427" comment="libswresample1-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153162" comment="libswresample1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121428" comment="libswresample1-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153163" comment="libswresample1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121429" comment="libswscale-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121430" comment="libswscale3-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153165" comment="libswscale3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121431" comment="libswscale3-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153166" comment="libswscale3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8663</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8663" source="CVE"/>
    <description>
    The ff_get_buffer function in libavcodec/utils.c in FFmpeg before 2.8.4 preserves width and height values after a failure, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via a crafted .mov file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8663.html">CVE-2015-8663</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8663">SUSE bug 960383</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8663">SUSE bug 960383</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8663">SUSE bug 960383</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8663">SUSE bug 960383</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121403" comment="ffmpeg-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153138" comment="ffmpeg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121404" comment="ffmpeg-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153139" comment="ffmpeg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121405" comment="libavcodec-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121406" comment="libavcodec56-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153141" comment="libavcodec56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121407" comment="libavcodec56-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153142" comment="libavcodec56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121408" comment="libavdevice-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121409" comment="libavdevice56-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153144" comment="libavdevice56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121410" comment="libavdevice56-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153145" comment="libavdevice56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121411" comment="libavfilter-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121412" comment="libavfilter5-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153147" comment="libavfilter5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121413" comment="libavfilter5-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153148" comment="libavfilter5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121414" comment="libavformat-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121415" comment="libavformat56-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153150" comment="libavformat56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121416" comment="libavformat56-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153151" comment="libavformat56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121417" comment="libavresample-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121418" comment="libavresample2-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153153" comment="libavresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121419" comment="libavresample2-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153154" comment="libavresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121420" comment="libavutil-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121421" comment="libavutil54-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153156" comment="libavutil54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121422" comment="libavutil54-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153157" comment="libavutil54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121423" comment="libpostproc-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121424" comment="libpostproc53-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153159" comment="libpostproc53 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121425" comment="libpostproc53-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153160" comment="libpostproc53-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121426" comment="libswresample-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121427" comment="libswresample1-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153162" comment="libswresample1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121428" comment="libswresample1-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153163" comment="libswresample1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121429" comment="libswscale-devel-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121430" comment="libswscale3-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153165" comment="libswscale3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121431" comment="libswscale3-32bit-2.8.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153166" comment="libswscale3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8669</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8669" source="CVE"/>
    <description>
    libraries/config/messages.inc.php in phpMyAdmin 4.0.x before 4.0.10.12, 4.4.x before 4.4.15.2, and 4.5.x before 4.5.3.1 allows remote attackers to obtain sensitive information via a crafted request, which reveals the full path in an error message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8669.html">CVE-2015-8669</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8669">SUSE bug 960282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8669">SUSE bug 960282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8669">SUSE bug 960282</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8669">SUSE bug 960282</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121317" comment="phpMyAdmin-4.4.15.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8688</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8688" source="CVE"/>
    <description>
    Gajim before 0.16.5 allows remote attackers to modify the roster and intercept messages via a crafted roster-push IQ stanza.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8688.html">CVE-2015-8688</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8688">SUSE bug 960668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8688">SUSE bug 960668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8688">SUSE bug 1014976</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121440" comment="gajim-0.16.5-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153192" comment="gajim is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121441" comment="gajim-lang-0.16.5-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153193" comment="gajim-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8704</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704" source="CVE"/>
    <description>
    apl_42.c in ISC BIND 9.x before 9.9.8-P3, 9.9.x, and 9.10.x before 9.10.3-P3 allows remote authenticated users to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed Address Prefix List (APL) record.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8704.html">CVE-2015-8704</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8704">SUSE bug 962189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8704">SUSE bug 962190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8704">SUSE bug 962189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8704">SUSE bug 962189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8704">SUSE bug 962189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8704">SUSE bug 962189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8704">SUSE bug 962189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8704">SUSE bug 962189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8704">SUSE bug 962189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8704">SUSE bug 962189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8704">SUSE bug 962189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8704">SUSE bug 962189</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121941" comment="bind-9.9.6P1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121942" comment="bind-chrootenv-9.9.6P1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121943" comment="bind-devel-9.9.6P1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121944" comment="bind-doc-9.9.6P1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121945" comment="bind-libs-9.9.6P1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121946" comment="bind-libs-32bit-9.9.6P1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153103" comment="bind-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121947" comment="bind-lwresd-9.9.6P1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153104" comment="bind-lwresd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121948" comment="bind-utils-9.9.6P1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8709</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8709" source="CVE"/>
    <description>
    ** DISPUTED ** kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call.  NOTE: the vendor states "there is no kernel bug here."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8709.html">CVE-2015-8709</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 960561</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 960561</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 960561</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 960561</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 960563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 959709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 960561</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 960563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 960561</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 960563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 960561</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 960563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 960563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 960563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 960563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 960563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 960561</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 960563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 960563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 960563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8709">SUSE bug 1010933</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126059" comment="kernel-debug-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126060" comment="kernel-debug-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126061" comment="kernel-debug-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126062" comment="kernel-default-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126063" comment="kernel-default-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126064" comment="kernel-default-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126065" comment="kernel-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126066" comment="kernel-docs-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126067" comment="kernel-docs-html-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126068" comment="kernel-docs-pdf-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126069" comment="kernel-ec2-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126070" comment="kernel-ec2-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126071" comment="kernel-ec2-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126072" comment="kernel-macros-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126073" comment="kernel-obs-build-4.1.20-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126074" comment="kernel-obs-qa-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126075" comment="kernel-obs-qa-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126076" comment="kernel-pae-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126077" comment="kernel-pae-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126078" comment="kernel-pae-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126079" comment="kernel-pv-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126080" comment="kernel-pv-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126081" comment="kernel-pv-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126082" comment="kernel-source-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126083" comment="kernel-source-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126084" comment="kernel-syms-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126085" comment="kernel-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126086" comment="kernel-vanilla-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126087" comment="kernel-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126088" comment="kernel-xen-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126089" comment="kernel-xen-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8710</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8710" source="CVE"/>
    <description>
    The htmlParseComment function in HTMLparser.c in libxml2 allows attackers to obtain sensitive information, cause a denial of service (out-of-bounds heap memory access and application crash), or possibly have unspecified other impact via an unclosed HTML comment.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8710.html">CVE-2015-8710</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8710">SUSE bug 960674</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8710">SUSE bug 960674</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8710">SUSE bug 960674</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8710">SUSE bug 960674</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8710">SUSE bug 960674</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8710">SUSE bug 960674</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8710">SUSE bug 960674</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8710">SUSE bug 960674</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8710">SUSE bug 960674</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8710">SUSE bug 960674</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119282" comment="libxml2-2.9.1-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119283" comment="libxml2-2-2.9.1-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119284" comment="libxml2-2-32bit-2.9.1-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119299" comment="libxml2-devel-2.9.1-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121821" comment="libxml2-devel-32bit-2.9.1-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119301" comment="libxml2-doc-2.9.1-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119285" comment="libxml2-tools-2.9.1-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009119286" comment="python-libxml2-2.9.1-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8711</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8711" source="CVE"/>
    <description>
    epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8711.html">CVE-2015-8711</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8711">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8712</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8712" source="CVE"/>
    <description>
    The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8712.html">CVE-2015-8712</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8712">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8713</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8713" source="CVE"/>
    <description>
    epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8713.html">CVE-2015-8713</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8713">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8714</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8714" source="CVE"/>
    <description>
    The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8714.html">CVE-2015-8714</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8714">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8715</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8715" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8715" source="CVE"/>
    <description>
    epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8715.html">CVE-2015-8715</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8715">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8716</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8716" source="CVE"/>
    <description>
    The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8716.html">CVE-2015-8716</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8716">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8717</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8717" source="CVE"/>
    <description>
    The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8717.html">CVE-2015-8717</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8717">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8718</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8718" source="CVE"/>
    <description>
    Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the "Match MSG/RES packets for async NLM" option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8718.html">CVE-2015-8718</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8718">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8719</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8719" source="CVE"/>
    <description>
    The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8719.html">CVE-2015-8719</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8719">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8720</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8720" source="CVE"/>
    <description>
    The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8720.html">CVE-2015-8720</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8720">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8721</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8721" source="CVE"/>
    <description>
    Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8721.html">CVE-2015-8721</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8721">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8722</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8722" source="CVE"/>
    <description>
    epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8722.html">CVE-2015-8722</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8722">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8723</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8723" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8723" source="CVE"/>
    <description>
    The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8723.html">CVE-2015-8723</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8723">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8724</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8724" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8724" source="CVE"/>
    <description>
    The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8724.html">CVE-2015-8724</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8724">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8725</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8725" source="CVE"/>
    <description>
    The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8725.html">CVE-2015-8725</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8725">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8726</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8726" source="CVE"/>
    <description>
    wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8726.html">CVE-2015-8726</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8726">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8727</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8727" source="CVE"/>
    <description>
    The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8727.html">CVE-2015-8727</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8727">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8728</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8728" source="CVE"/>
    <description>
    The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8728.html">CVE-2015-8728</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8728">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8729</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8729" source="CVE"/>
    <description>
    The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8729.html">CVE-2015-8729</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8729">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8730</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8730" source="CVE"/>
    <description>
    epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8730.html">CVE-2015-8730</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8730">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8731</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8731" source="CVE"/>
    <description>
    The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8731.html">CVE-2015-8731</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8731">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8732</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8732" source="CVE"/>
    <description>
    The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8732.html">CVE-2015-8732</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8732">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8733</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8733" source="CVE"/>
    <description>
    The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8733.html">CVE-2015-8733</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8733">SUSE bug 960382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121171" comment="wireshark-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121172" comment="wireshark-devel-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121173" comment="wireshark-ui-gtk-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121174" comment="wireshark-ui-qt-1.12.9-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8743</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8743.html">CVE-2015-8743</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8743">SUSE bug 960725</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8743">SUSE bug 960726</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8743">SUSE bug 960725</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8743">SUSE bug 960726</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8743">SUSE bug 960726</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8743">SUSE bug 960725</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8743">SUSE bug 960726</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8743">SUSE bug 960726</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8743">SUSE bug 960725</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8743">SUSE bug 960726</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8744</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8744.html">CVE-2015-8744</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8744">SUSE bug 960835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8744">SUSE bug 960836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8744">SUSE bug 960835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8744">SUSE bug 960836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8744">SUSE bug 960836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8744">SUSE bug 960835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8744">SUSE bug 960836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8744">SUSE bug 960835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8744">SUSE bug 960836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8744">SUSE bug 960835</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8745</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8745.html">CVE-2015-8745</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8745">SUSE bug 960707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8745">SUSE bug 960708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8745">SUSE bug 960708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8745">SUSE bug 960707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8745">SUSE bug 960708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8745">SUSE bug 960707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8745">SUSE bug 960708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8745">SUSE bug 960708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8745">SUSE bug 960707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8745">SUSE bug 960707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8745">SUSE bug 960708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8745">SUSE bug 960707</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8767</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8767" source="CVE"/>
    <description>
    net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8767.html">CVE-2015-8767</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8767">SUSE bug 961509</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126059" comment="kernel-debug-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126060" comment="kernel-debug-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126061" comment="kernel-debug-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126062" comment="kernel-default-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126063" comment="kernel-default-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126064" comment="kernel-default-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126065" comment="kernel-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126066" comment="kernel-docs-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126067" comment="kernel-docs-html-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126068" comment="kernel-docs-pdf-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126069" comment="kernel-ec2-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126070" comment="kernel-ec2-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126071" comment="kernel-ec2-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126072" comment="kernel-macros-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126073" comment="kernel-obs-build-4.1.20-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126074" comment="kernel-obs-qa-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126075" comment="kernel-obs-qa-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126076" comment="kernel-pae-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126077" comment="kernel-pae-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126078" comment="kernel-pae-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126079" comment="kernel-pv-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126080" comment="kernel-pv-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126081" comment="kernel-pv-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126082" comment="kernel-source-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126083" comment="kernel-source-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126084" comment="kernel-syms-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126085" comment="kernel-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126086" comment="kernel-vanilla-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126087" comment="kernel-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126088" comment="kernel-xen-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126089" comment="kernel-xen-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8770</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8770" source="CVE"/>
    <description>
    Directory traversal vulnerability in the set_skin function in program/include/rcmail_output_html.php in Roundcube before 1.0.8 and 1.1.x before 1.1.4 allows remote authenticated users with certain permissions to read arbitrary files or possibly execute arbitrary code via a .. (dot dot) in the _skin parameter to index.php.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8770.html">CVE-2015-8770</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8770">SUSE bug 962067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8770">SUSE bug 962067</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122054" comment="roundcubemail-1.1.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8776</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" source="CVE"/>
    <description>
    The strftime function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8776.html">CVE-2015-8776</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8776">SUSE bug 962736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8776">SUSE bug 962736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8776">SUSE bug 962736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8776">SUSE bug 962736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8776">SUSE bug 962736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8776">SUSE bug 962736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8776">SUSE bug 962736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8776">SUSE bug 986086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8776">SUSE bug 962736</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123354" comment="glibc-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123355" comment="glibc-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123356" comment="glibc-devel-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123357" comment="glibc-devel-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152566" comment="glibc-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123358" comment="glibc-devel-static-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123359" comment="glibc-devel-static-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152568" comment="glibc-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123360" comment="glibc-extra-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123361" comment="glibc-html-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123362" comment="glibc-i18ndata-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123363" comment="glibc-info-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123364" comment="glibc-locale-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123365" comment="glibc-locale-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123366" comment="glibc-obsolete-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152571" comment="glibc-obsolete is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123367" comment="glibc-profile-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123368" comment="glibc-profile-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152573" comment="glibc-profile-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123369" comment="glibc-testsuite-2.19-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152574" comment="glibc-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123370" comment="glibc-utils-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123371" comment="glibc-utils-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152576" comment="glibc-utils-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123372" comment="nscd-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8777</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" source="CVE"/>
    <description>
    The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8777.html">CVE-2015-8777</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8777">SUSE bug 950944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8777">SUSE bug 962735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8777">SUSE bug 950944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8777">SUSE bug 962735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8777">SUSE bug 950944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8777">SUSE bug 950944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8777">SUSE bug 950944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8777">SUSE bug 950944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8777">SUSE bug 962735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8777">SUSE bug 962735</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8777">SUSE bug 950944</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123354" comment="glibc-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123355" comment="glibc-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123356" comment="glibc-devel-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123357" comment="glibc-devel-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152566" comment="glibc-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123358" comment="glibc-devel-static-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123359" comment="glibc-devel-static-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152568" comment="glibc-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123360" comment="glibc-extra-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123361" comment="glibc-html-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123362" comment="glibc-i18ndata-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123363" comment="glibc-info-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123364" comment="glibc-locale-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123365" comment="glibc-locale-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123366" comment="glibc-obsolete-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152571" comment="glibc-obsolete is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123367" comment="glibc-profile-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123368" comment="glibc-profile-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152573" comment="glibc-profile-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123369" comment="glibc-testsuite-2.19-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152574" comment="glibc-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123370" comment="glibc-utils-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123371" comment="glibc-utils-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152576" comment="glibc-utils-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123372" comment="nscd-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8778</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" source="CVE"/>
    <description>
    Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8778.html">CVE-2015-8778</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8778">SUSE bug 962737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8778">SUSE bug 962737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8778">SUSE bug 962737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8778">SUSE bug 962737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8778">SUSE bug 962737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8778">SUSE bug 962737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8778">SUSE bug 962737</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8778">SUSE bug 986086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8778">SUSE bug 962737</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123354" comment="glibc-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123355" comment="glibc-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123356" comment="glibc-devel-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123357" comment="glibc-devel-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152566" comment="glibc-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123358" comment="glibc-devel-static-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123359" comment="glibc-devel-static-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152568" comment="glibc-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123360" comment="glibc-extra-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123361" comment="glibc-html-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123362" comment="glibc-i18ndata-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123363" comment="glibc-info-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123364" comment="glibc-locale-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123365" comment="glibc-locale-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123366" comment="glibc-obsolete-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152571" comment="glibc-obsolete is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123367" comment="glibc-profile-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123368" comment="glibc-profile-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152573" comment="glibc-profile-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123369" comment="glibc-testsuite-2.19-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152574" comment="glibc-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123370" comment="glibc-utils-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123371" comment="glibc-utils-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152576" comment="glibc-utils-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123372" comment="nscd-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8779</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" source="CVE"/>
    <description>
    Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8779.html">CVE-2015-8779</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8779">SUSE bug 962739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8779">SUSE bug 962739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8779">SUSE bug 962739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8779">SUSE bug 962739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8779">SUSE bug 962739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8779">SUSE bug 965453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8779">SUSE bug 965453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8779">SUSE bug 965453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8779">SUSE bug 962739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8779">SUSE bug 965453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8779">SUSE bug 965453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8779">SUSE bug 962739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8779">SUSE bug 986086</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123354" comment="glibc-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123355" comment="glibc-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123356" comment="glibc-devel-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123357" comment="glibc-devel-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152566" comment="glibc-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123358" comment="glibc-devel-static-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123359" comment="glibc-devel-static-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152568" comment="glibc-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123360" comment="glibc-extra-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123361" comment="glibc-html-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123362" comment="glibc-i18ndata-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123363" comment="glibc-info-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123364" comment="glibc-locale-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123365" comment="glibc-locale-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123366" comment="glibc-obsolete-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152571" comment="glibc-obsolete is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123367" comment="glibc-profile-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123368" comment="glibc-profile-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152573" comment="glibc-profile-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123369" comment="glibc-testsuite-2.19-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152574" comment="glibc-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123370" comment="glibc-utils-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123371" comment="glibc-utils-32bit-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152576" comment="glibc-utils-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123372" comment="nscd-2.19-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8781</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8781" source="CVE"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds write) via an invalid number of samples per pixel in a LogL compressed TIFF image, a different vulnerability than CVE-2015-8782.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8781.html">CVE-2015-8781</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8781">SUSE bug 964213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8781">SUSE bug 964225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8781">SUSE bug 964225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8781">SUSE bug 964213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8781">SUSE bug 964225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8781">SUSE bug 964225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8781">SUSE bug 964213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8781">SUSE bug 964225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8781">SUSE bug 964225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8781">SUSE bug 964225</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134455" comment="libtiff-devel-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134456" comment="libtiff-devel-32bit-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134457" comment="libtiff5-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134458" comment="libtiff5-32bit-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134459" comment="tiff-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8782</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8782" source="CVE"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds writes) via a crafted TIFF image, a different vulnerability than CVE-2015-8781.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8782.html">CVE-2015-8782</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8782">SUSE bug 964213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8782">SUSE bug 964225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8782">SUSE bug 964225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8782">SUSE bug 964213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8782">SUSE bug 964225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8782">SUSE bug 964225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8782">SUSE bug 964213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8782">SUSE bug 964225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8782">SUSE bug 964225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8782">SUSE bug 964225</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134455" comment="libtiff-devel-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134456" comment="libtiff-devel-32bit-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134457" comment="libtiff5-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134458" comment="libtiff5-32bit-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134459" comment="tiff-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8783</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8783" source="CVE"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds reads) via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8783.html">CVE-2015-8783</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8783">SUSE bug 964213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8783">SUSE bug 964225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8783">SUSE bug 964225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8783">SUSE bug 964213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8783">SUSE bug 964225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8783">SUSE bug 964225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8783">SUSE bug 964213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8783">SUSE bug 964225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8783">SUSE bug 964225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8783">SUSE bug 964225</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134455" comment="libtiff-devel-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134456" comment="libtiff-devel-32bit-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134457" comment="libtiff5-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134458" comment="libtiff5-32bit-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134459" comment="tiff-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8785</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8785" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8785" source="CVE"/>
    <description>
    The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel before 4.4 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8785.html">CVE-2015-8785</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8785">SUSE bug 963765</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126059" comment="kernel-debug-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126060" comment="kernel-debug-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126061" comment="kernel-debug-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126062" comment="kernel-default-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126063" comment="kernel-default-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126064" comment="kernel-default-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126065" comment="kernel-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126066" comment="kernel-docs-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126067" comment="kernel-docs-html-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126068" comment="kernel-docs-pdf-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126069" comment="kernel-ec2-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126070" comment="kernel-ec2-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126071" comment="kernel-ec2-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126072" comment="kernel-macros-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126073" comment="kernel-obs-build-4.1.20-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126074" comment="kernel-obs-qa-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126075" comment="kernel-obs-qa-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126076" comment="kernel-pae-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126077" comment="kernel-pae-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126078" comment="kernel-pae-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126079" comment="kernel-pv-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126080" comment="kernel-pv-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126081" comment="kernel-pv-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126082" comment="kernel-source-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126083" comment="kernel-source-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126084" comment="kernel-syms-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126085" comment="kernel-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126086" comment="kernel-vanilla-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126087" comment="kernel-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126088" comment="kernel-xen-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126089" comment="kernel-xen-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8787</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8787" source="CVE"/>
    <description>
    The nf_nat_redirect_ipv4 function in net/netfilter/nf_nat_redirect.c in the Linux kernel before 4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by sending certain IPv4 packets to an incompletely configured interface, a related issue to CVE-2003-1604.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8787.html">CVE-2015-8787</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8787">SUSE bug 963931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8787">SUSE bug 963931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8787">SUSE bug 963931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8787">SUSE bug 963931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8787">SUSE bug 963931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8787">SUSE bug 963931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8787">SUSE bug 963931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8787">SUSE bug 963931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8787">SUSE bug 963931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8787">SUSE bug 963931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8787">SUSE bug 963931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8787">SUSE bug 963931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8787">SUSE bug 963931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8787">SUSE bug 963931</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134384" comment="drbd-8.4.6-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134385" comment="drbd-kmp-default-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134386" comment="drbd-kmp-pv-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134387" comment="drbd-kmp-xen-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134388" comment="hdjmod-1.28-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134389" comment="hdjmod-kmp-default-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134390" comment="hdjmod-kmp-pae-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134391" comment="hdjmod-kmp-pv-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134392" comment="hdjmod-kmp-xen-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134393" comment="ipset-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134394" comment="ipset-devel-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134395" comment="ipset-kmp-default-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134396" comment="ipset-kmp-pae-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134397" comment="ipset-kmp-pv-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134398" comment="ipset-kmp-xen-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134399" comment="kernel-debug-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134400" comment="kernel-debug-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134401" comment="kernel-debug-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134402" comment="kernel-default-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134403" comment="kernel-default-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134404" comment="kernel-default-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134405" comment="kernel-devel-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134406" comment="kernel-docs-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134407" comment="kernel-docs-html-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134408" comment="kernel-docs-pdf-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134409" comment="kernel-ec2-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134410" comment="kernel-ec2-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134411" comment="kernel-ec2-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134412" comment="kernel-macros-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134413" comment="kernel-obs-build-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134414" comment="kernel-obs-qa-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134415" comment="kernel-obs-qa-xen-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134416" comment="kernel-pae-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134417" comment="kernel-pae-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134418" comment="kernel-pae-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134419" comment="kernel-pv-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134420" comment="kernel-pv-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134421" comment="kernel-pv-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134422" comment="kernel-source-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134423" comment="kernel-source-vanilla-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134424" comment="kernel-syms-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134425" comment="kernel-vanilla-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134426" comment="kernel-vanilla-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134427" comment="kernel-xen-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134428" comment="kernel-xen-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134429" comment="kernel-xen-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134430" comment="libipset3-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134431" comment="lttng-modules-2.7.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134432" comment="lttng-modules-kmp-default-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134433" comment="lttng-modules-kmp-pv-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134434" comment="pcfclock-0.44-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134435" comment="pcfclock-kmp-default-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134436" comment="pcfclock-kmp-pae-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134437" comment="pcfclock-kmp-pv-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134438" comment="vhba-kmp-20140928-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134439" comment="vhba-kmp-default-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134440" comment="vhba-kmp-pae-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134441" comment="vhba-kmp-pv-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134442" comment="vhba-kmp-xen-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8803</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8803" source="CVE"/>
    <description>
    The ecc_256_modp function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8805.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8803.html">CVE-2015-8803</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8803">SUSE bug 964845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8803">SUSE bug 964845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8803">SUSE bug 964845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8803">SUSE bug 964845</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123011" comment="libhogweed2-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153222" comment="libhogweed2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123012" comment="libhogweed2-32bit-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153223" comment="libhogweed2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123013" comment="libnettle-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153224" comment="libnettle is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123021" comment="libnettle-devel-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153225" comment="libnettle-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123307" comment="libnettle-devel-32bit-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153226" comment="libnettle-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123014" comment="libnettle4-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153227" comment="libnettle4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123015" comment="libnettle4-32bit-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153228" comment="libnettle4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123308" comment="nettle-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153229" comment="nettle is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8804</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8804" source="CVE"/>
    <description>
    x86_64/ecc-384-modp.asm in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-384 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8804.html">CVE-2015-8804</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8804">SUSE bug 964847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8804">SUSE bug 964847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8804">SUSE bug 964847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8804">SUSE bug 964847</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123011" comment="libhogweed2-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153222" comment="libhogweed2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123012" comment="libhogweed2-32bit-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153223" comment="libhogweed2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123013" comment="libnettle-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153224" comment="libnettle is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123021" comment="libnettle-devel-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153225" comment="libnettle-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123307" comment="libnettle-devel-32bit-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153226" comment="libnettle-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123014" comment="libnettle4-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153227" comment="libnettle4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123015" comment="libnettle4-32bit-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153228" comment="libnettle4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123308" comment="nettle-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153229" comment="nettle is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8805</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8805" source="CVE"/>
    <description>
    The ecc_256_modq function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8803.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8805.html">CVE-2015-8805</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8805">SUSE bug 964849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8805">SUSE bug 964849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8805">SUSE bug 964849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8805">SUSE bug 964849</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123011" comment="libhogweed2-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153222" comment="libhogweed2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123012" comment="libhogweed2-32bit-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153223" comment="libhogweed2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123013" comment="libnettle-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153224" comment="libnettle is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123021" comment="libnettle-devel-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153225" comment="libnettle-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123307" comment="libnettle-devel-32bit-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153226" comment="libnettle-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123014" comment="libnettle4-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153227" comment="libnettle4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123015" comment="libnettle4-32bit-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153228" comment="libnettle4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123308" comment="nettle-2.7.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153229" comment="nettle is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8806</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8806" source="CVE"/>
    <description>
    dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the "&lt;!DOCTYPE html" substring in a crafted HTML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8806.html">CVE-2015-8806</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8806">SUSE bug 965283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8806">SUSE bug 965283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8806">SUSE bug 965283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8806">SUSE bug 981114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8806">SUSE bug 963963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8806">SUSE bug 965283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8806">SUSE bug 965283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8806">SUSE bug 965283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8806">SUSE bug 965283</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128929" comment="libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128930" comment="libxml2-2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128931" comment="libxml2-2-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128932" comment="libxml2-devel-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128933" comment="libxml2-devel-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128934" comment="libxml2-doc-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128935" comment="libxml2-tools-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128936" comment="python-libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8812</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8812" source="CVE"/>
    <description>
    drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8812.html">CVE-2015-8812</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8812">SUSE bug 966437</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126059" comment="kernel-debug-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126060" comment="kernel-debug-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126061" comment="kernel-debug-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126062" comment="kernel-default-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126063" comment="kernel-default-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126064" comment="kernel-default-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126065" comment="kernel-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126066" comment="kernel-docs-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126067" comment="kernel-docs-html-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126068" comment="kernel-docs-pdf-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126069" comment="kernel-ec2-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126070" comment="kernel-ec2-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126071" comment="kernel-ec2-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126072" comment="kernel-macros-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126073" comment="kernel-obs-build-4.1.20-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126074" comment="kernel-obs-qa-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126075" comment="kernel-obs-qa-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126076" comment="kernel-pae-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126077" comment="kernel-pae-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126078" comment="kernel-pae-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126079" comment="kernel-pv-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126080" comment="kernel-pv-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126081" comment="kernel-pv-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126082" comment="kernel-source-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126083" comment="kernel-source-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126084" comment="kernel-syms-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126085" comment="kernel-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126086" comment="kernel-vanilla-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126087" comment="kernel-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126088" comment="kernel-xen-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126089" comment="kernel-xen-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8817</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8817" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions &gt;= 1.6.0 and &lt;= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8817.html">CVE-2015-8817</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8817">SUSE bug 969121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8817">SUSE bug 969122</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8817">SUSE bug 969125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8817">SUSE bug 969126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8817">SUSE bug 969121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8817">SUSE bug 969125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8817">SUSE bug 969125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8817">SUSE bug 969121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8817">SUSE bug 969125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8817">SUSE bug 969126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8817">SUSE bug 969121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8817">SUSE bug 969121</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8817">SUSE bug 969125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8817">SUSE bug 969121</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8818</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8818" source="CVE"/>
    <description>
    The cpu_physical_memory_write_rom_internal function in exec.c in QEMU (aka Quick Emulator) does not properly skip MMIO regions, which allows local privileged guest users to cause a denial of service (guest crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8818.html">CVE-2015-8818</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8818">SUSE bug 969122</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8818">SUSE bug 969126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8818">SUSE bug 969122</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8818">SUSE bug 969126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8818">SUSE bug 969126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8818">SUSE bug 969122</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8818">SUSE bug 969125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8818">SUSE bug 969126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8818">SUSE bug 969122</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8818">SUSE bug 969122</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8818">SUSE bug 969122</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8818">SUSE bug 969122</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8818">SUSE bug 969122</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8818">SUSE bug 969122</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8818">SUSE bug 969122</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8818">SUSE bug 969122</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8818">SUSE bug 969122</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8818">SUSE bug 969126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8818">SUSE bug 969122</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8833</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8833" source="CVE"/>
    <description>
    Use-after-free vulnerability in the create_smp_dialog function in gtk-dialog.c in the Off-the-Record Messaging (OTR) pidgin-otr plugin before 4.0.2 for Pidgin allows remote attackers to execute arbitrary code via vectors related to the "Authenticate buddy" menu item.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8833.html">CVE-2015-8833</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8833">SUSE bug 970498</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8833">SUSE bug 970498</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8833">SUSE bug 970498</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8833">SUSE bug 970498</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8833">SUSE bug 970498</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8833">SUSE bug 970498</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8833">SUSE bug 970498</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125363" comment="pidgin-otr-4.0.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153230" comment="pidgin-otr is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8835</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8835" source="CVE"/>
    <description>
    The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not properly retrieve keys, which allows remote attackers to cause a denial of service (NULL pointer dereference, type confusion, and application crash) or possibly execute arbitrary code via crafted serialized data representing a numerically indexed _cookies array, related to the SoapClient::__call method in ext/soap/soap.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8835.html">CVE-2015-8835</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8835">SUSE bug 973351</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127020" comment="apache2-mod_php5-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127021" comment="php5-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127022" comment="php5-bcmath-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127023" comment="php5-bz2-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127024" comment="php5-calendar-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127025" comment="php5-ctype-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127026" comment="php5-curl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127027" comment="php5-dba-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127028" comment="php5-devel-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127029" comment="php5-dom-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127030" comment="php5-enchant-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127031" comment="php5-exif-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127032" comment="php5-fastcgi-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127033" comment="php5-fileinfo-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127034" comment="php5-firebird-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127035" comment="php5-fpm-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127036" comment="php5-ftp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127037" comment="php5-gd-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127038" comment="php5-gettext-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127039" comment="php5-gmp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127040" comment="php5-iconv-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127041" comment="php5-imap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127042" comment="php5-intl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127043" comment="php5-json-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127044" comment="php5-ldap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127045" comment="php5-mbstring-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127046" comment="php5-mcrypt-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127047" comment="php5-mssql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127048" comment="php5-mysql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127049" comment="php5-odbc-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127050" comment="php5-opcache-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127051" comment="php5-openssl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127052" comment="php5-pcntl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127053" comment="php5-pdo-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127054" comment="php5-pear-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127055" comment="php5-pgsql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127056" comment="php5-phar-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127057" comment="php5-posix-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127058" comment="php5-pspell-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127059" comment="php5-readline-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127060" comment="php5-shmop-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127061" comment="php5-snmp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127062" comment="php5-soap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127063" comment="php5-sockets-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127064" comment="php5-sqlite-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127065" comment="php5-suhosin-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127066" comment="php5-sysvmsg-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127067" comment="php5-sysvsem-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127068" comment="php5-sysvshm-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127069" comment="php5-tidy-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127070" comment="php5-tokenizer-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127071" comment="php5-wddx-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127072" comment="php5-xmlreader-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127073" comment="php5-xmlrpc-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127074" comment="php5-xmlwriter-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127075" comment="php5-xsl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127076" comment="php5-zip-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127077" comment="php5-zlib-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8838</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8838" source="CVE"/>
    <description>
    ext/mysqlnd/mysqlnd.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 uses a client SSL option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8838.html">CVE-2015-8838</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8838">SUSE bug 973792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8838">SUSE bug 973792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8838">SUSE bug 973792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8838">SUSE bug 973792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8838">SUSE bug 973792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8838">SUSE bug 973792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8838">SUSE bug 973792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8838">SUSE bug 973792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8838">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8838">SUSE bug 973792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8838">SUSE bug 973792</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127020" comment="apache2-mod_php5-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127021" comment="php5-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127022" comment="php5-bcmath-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127023" comment="php5-bz2-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127024" comment="php5-calendar-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127025" comment="php5-ctype-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127026" comment="php5-curl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127027" comment="php5-dba-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127028" comment="php5-devel-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127029" comment="php5-dom-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127030" comment="php5-enchant-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127031" comment="php5-exif-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127032" comment="php5-fastcgi-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127033" comment="php5-fileinfo-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127034" comment="php5-firebird-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127035" comment="php5-fpm-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127036" comment="php5-ftp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127037" comment="php5-gd-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127038" comment="php5-gettext-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127039" comment="php5-gmp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127040" comment="php5-iconv-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127041" comment="php5-imap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127042" comment="php5-intl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127043" comment="php5-json-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127044" comment="php5-ldap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127045" comment="php5-mbstring-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127046" comment="php5-mcrypt-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127047" comment="php5-mssql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127048" comment="php5-mysql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127049" comment="php5-odbc-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127050" comment="php5-opcache-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127051" comment="php5-openssl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127052" comment="php5-pcntl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127053" comment="php5-pdo-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127054" comment="php5-pear-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127055" comment="php5-pgsql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127056" comment="php5-phar-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127057" comment="php5-posix-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127058" comment="php5-pspell-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127059" comment="php5-readline-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127060" comment="php5-shmop-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127061" comment="php5-snmp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127062" comment="php5-soap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127063" comment="php5-sockets-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127064" comment="php5-sqlite-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127065" comment="php5-suhosin-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127066" comment="php5-sysvmsg-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127067" comment="php5-sysvsem-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127068" comment="php5-sysvshm-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127069" comment="php5-tidy-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127070" comment="php5-tokenizer-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127071" comment="php5-wddx-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127072" comment="php5-xmlreader-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127073" comment="php5-xmlrpc-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127074" comment="php5-xmlwriter-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127075" comment="php5-xsl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127076" comment="php5-zip-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127077" comment="php5-zlib-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8842</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8842" source="CVE"/>
    <description>
    tmpfiles.d/systemd.conf in systemd before 229 uses weak permissions for /var/log/journal/%m/system.journal, which allows local users to obtain sensitive information by reading the file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8842.html">CVE-2015-8842</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8842">SUSE bug 972612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8842">SUSE bug 972612</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128161" comment="libgudev-1_0-0-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151688" comment="libgudev-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128162" comment="libgudev-1_0-0-32bit-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152577" comment="libgudev-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128163" comment="libgudev-1_0-devel-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151689" comment="libgudev-1_0-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128164" comment="libudev-devel-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151690" comment="libudev-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128165" comment="libudev-mini-devel-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152578" comment="libudev-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128166" comment="libudev-mini1-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152579" comment="libudev-mini1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128167" comment="libudev1-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151691" comment="libudev1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128168" comment="libudev1-32bit-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151692" comment="libudev1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128169" comment="nss-myhostname-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152580" comment="nss-myhostname is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128170" comment="nss-myhostname-32bit-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152581" comment="nss-myhostname-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128171" comment="systemd-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151693" comment="systemd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128172" comment="systemd-32bit-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151694" comment="systemd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128173" comment="systemd-bash-completion-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151695" comment="systemd-bash-completion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128174" comment="systemd-devel-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152582" comment="systemd-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128175" comment="systemd-journal-gateway-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152583" comment="systemd-journal-gateway is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128176" comment="systemd-logger-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151696" comment="systemd-logger is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128177" comment="systemd-mini-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152584" comment="systemd-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128178" comment="systemd-mini-devel-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152585" comment="systemd-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128179" comment="systemd-mini-sysvinit-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152586" comment="systemd-mini-sysvinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128180" comment="systemd-sysvinit-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151697" comment="systemd-sysvinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128181" comment="typelib-1_0-GUdev-1_0-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151698" comment="typelib-1_0-GUdev-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128182" comment="udev-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151699" comment="udev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128183" comment="udev-mini-210-92.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152587" comment="udev-mini is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8853</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8853" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853" source="CVE"/>
    <description>
    The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by "a\x80."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8853.html">CVE-2015-8853</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8853">SUSE bug 976584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8853">SUSE bug 976584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8853">SUSE bug 976584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8853">SUSE bug 976584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8853">SUSE bug 976584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8853">SUSE bug 976584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8853">SUSE bug 997948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8853">SUSE bug 997950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8853">SUSE bug 976584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8853">SUSE bug 997948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8853">SUSE bug 997950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8853">SUSE bug 976584</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134449" comment="perl-5.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151455" comment="perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134450" comment="perl-32bit-5.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151456" comment="perl-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134451" comment="perl-base-5.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151457" comment="perl-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134452" comment="perl-base-32bit-5.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153231" comment="perl-base-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134453" comment="perl-doc-5.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151458" comment="perl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8863</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8863" source="CVE"/>
    <description>
    Off-by-one error in the tokenadd function in jv_parse.c in jq allows remote attackers to cause a denial of service (crash) via a long JSON-encoded number, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8863.html">CVE-2015-8863</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8863">SUSE bug 976992</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8863">SUSE bug 976992</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8863">SUSE bug 976992</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8863">SUSE bug 1014176</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8863">SUSE bug 976992</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8863">SUSE bug 976992</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8863">SUSE bug 976992</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127221" comment="jq-1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153232" comment="jq is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127222" comment="libjq-devel-1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153233" comment="libjq-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127223" comment="libjq1-1.5-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153234" comment="libjq1 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8864</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8864" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Roundcube Webmail before 1.0.9 and 1.1.x before 1.1.5 allows remote attackers to inject arbitrary web script or HTML via a crafted SVG, a different vulnerability than CVE-2016-4068.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8864.html">CVE-2015-8864</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8864">SUSE bug 976988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8864">SUSE bug 976988</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135206" comment="roundcubemail-1.1.5-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8866</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8866" source="CVE"/>
    <description>
    ext/libxml/libxml.c in PHP before 5.5.22 and 5.6.x before 5.6.6, when PHP-FPM is used, does not isolate each thread from libxml_disable_entity_loader changes in other threads, which allows remote attackers to conduct XML External Entity (XXE) and XML Entity Expansion (XEE) attacks via a crafted XML document, a related issue to CVE-2015-5161.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8866.html">CVE-2015-8866</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8866">SUSE bug 976996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8866">SUSE bug 976996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8866">SUSE bug 976996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8866">SUSE bug 976996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8866">SUSE bug 976996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8866">SUSE bug 976996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8866">SUSE bug 976996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8866">SUSE bug 976996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8866">SUSE bug 976996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8866">SUSE bug 976996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8866">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8866">SUSE bug 976996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8866">SUSE bug 976996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8866">SUSE bug 976996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8866">SUSE bug 976996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8866">SUSE bug 976996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8866">SUSE bug 976996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8866">SUSE bug 976996</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8866">SUSE bug 976996</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127954" comment="apache2-mod_php5-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127955" comment="php5-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127956" comment="php5-bcmath-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127957" comment="php5-bz2-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127958" comment="php5-calendar-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127959" comment="php5-ctype-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127960" comment="php5-curl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127961" comment="php5-dba-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127962" comment="php5-devel-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127963" comment="php5-dom-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127964" comment="php5-enchant-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127965" comment="php5-exif-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127966" comment="php5-fastcgi-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127967" comment="php5-fileinfo-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127968" comment="php5-firebird-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127969" comment="php5-fpm-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127970" comment="php5-ftp-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127971" comment="php5-gd-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127972" comment="php5-gettext-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127973" comment="php5-gmp-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127974" comment="php5-iconv-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127975" comment="php5-imap-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127976" comment="php5-intl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127977" comment="php5-json-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127978" comment="php5-ldap-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127979" comment="php5-mbstring-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127980" comment="php5-mcrypt-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127981" comment="php5-mssql-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127982" comment="php5-mysql-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127983" comment="php5-odbc-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127984" comment="php5-opcache-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127985" comment="php5-openssl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127986" comment="php5-pcntl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127987" comment="php5-pdo-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127988" comment="php5-pear-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127989" comment="php5-pgsql-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127990" comment="php5-phar-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127991" comment="php5-posix-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127992" comment="php5-pspell-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127993" comment="php5-readline-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127994" comment="php5-shmop-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127995" comment="php5-snmp-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127996" comment="php5-soap-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127997" comment="php5-sockets-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127998" comment="php5-sqlite-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127999" comment="php5-suhosin-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128000" comment="php5-sysvmsg-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128001" comment="php5-sysvsem-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128002" comment="php5-sysvshm-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128003" comment="php5-tidy-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128004" comment="php5-tokenizer-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128005" comment="php5-wddx-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128006" comment="php5-xmlreader-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128007" comment="php5-xmlrpc-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128008" comment="php5-xmlwriter-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128009" comment="php5-xsl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128010" comment="php5-zip-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128011" comment="php5-zlib-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8867</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8867" source="CVE"/>
    <description>
    The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 incorrectly relies on the deprecated RAND_pseudo_bytes function, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8867.html">CVE-2015-8867</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8867">SUSE bug 977005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8867">SUSE bug 977005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8867">SUSE bug 977005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8867">SUSE bug 977005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8867">SUSE bug 977005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8867">SUSE bug 977005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8867">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127954" comment="apache2-mod_php5-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127955" comment="php5-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127956" comment="php5-bcmath-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127957" comment="php5-bz2-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127958" comment="php5-calendar-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127959" comment="php5-ctype-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127960" comment="php5-curl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127961" comment="php5-dba-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127962" comment="php5-devel-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127963" comment="php5-dom-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127964" comment="php5-enchant-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127965" comment="php5-exif-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127966" comment="php5-fastcgi-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127967" comment="php5-fileinfo-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127968" comment="php5-firebird-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127969" comment="php5-fpm-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127970" comment="php5-ftp-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127971" comment="php5-gd-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127972" comment="php5-gettext-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127973" comment="php5-gmp-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127974" comment="php5-iconv-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127975" comment="php5-imap-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127976" comment="php5-intl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127977" comment="php5-json-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127978" comment="php5-ldap-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127979" comment="php5-mbstring-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127980" comment="php5-mcrypt-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127981" comment="php5-mssql-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127982" comment="php5-mysql-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127983" comment="php5-odbc-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127984" comment="php5-opcache-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127985" comment="php5-openssl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127986" comment="php5-pcntl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127987" comment="php5-pdo-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127988" comment="php5-pear-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127989" comment="php5-pgsql-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127990" comment="php5-phar-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127991" comment="php5-posix-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127992" comment="php5-pspell-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127993" comment="php5-readline-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127994" comment="php5-shmop-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127995" comment="php5-snmp-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127996" comment="php5-soap-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127997" comment="php5-sockets-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127998" comment="php5-sqlite-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127999" comment="php5-suhosin-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128000" comment="php5-sysvmsg-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128001" comment="php5-sysvsem-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128002" comment="php5-sysvshm-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128003" comment="php5-tidy-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128004" comment="php5-tokenizer-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128005" comment="php5-wddx-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128006" comment="php5-xmlreader-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128007" comment="php5-xmlrpc-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128008" comment="php5-xmlwriter-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128009" comment="php5-xsl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128010" comment="php5-zip-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128011" comment="php5-zlib-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8868</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8868" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ExponentialFunction::ExponentialFunction function in Poppler before 0.40.0 allows remote attackers to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via an invalid blend mode in the ExtGState dictionary in a crafted PDF document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8868.html">CVE-2015-8868</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8868">SUSE bug 976844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8868">SUSE bug 976844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8868">SUSE bug 976844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8868">SUSE bug 976844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8868">SUSE bug 976844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8868">SUSE bug 976844</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128636" comment="libpoppler-cpp0-0.24.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153235" comment="libpoppler-cpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128643" comment="libpoppler-devel-0.24.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151223" comment="libpoppler-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128644" comment="libpoppler-glib-devel-0.24.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153236" comment="libpoppler-glib-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128638" comment="libpoppler-glib8-0.24.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151224" comment="libpoppler-glib8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128639" comment="libpoppler-qt4-4-0.24.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151225" comment="libpoppler-qt4-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128645" comment="libpoppler-qt4-devel-0.24.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153237" comment="libpoppler-qt4-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129014" comment="libpoppler-qt5-1-0.24.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153238" comment="libpoppler-qt5-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129015" comment="libpoppler-qt5-devel-0.24.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153239" comment="libpoppler-qt5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151226" comment="libpoppler44 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128637" comment="poppler-0.24.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153240" comment="poppler is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128641" comment="poppler-qt-0.24.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153241" comment="poppler-qt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129016" comment="poppler-qt5-0.24.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153242" comment="poppler-qt5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128642" comment="poppler-tools-0.24.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151227" comment="poppler-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128646" comment="typelib-1_0-Poppler-0_18-0.24.4-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153243" comment="typelib-1_0-Poppler-0_18 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8869</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8869" source="CVE"/>
    <description>
    OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8869.html">CVE-2015-8869</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8869">SUSE bug 977990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8869">SUSE bug 977990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8869">SUSE bug 977990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8869">SUSE bug 977990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8869">SUSE bug 977990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8869">SUSE bug 977990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8869">SUSE bug 977990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8869">SUSE bug 977990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8869">SUSE bug 977990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8869">SUSE bug 977990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8869">SUSE bug 977990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8869">SUSE bug 977990</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134369" comment="ocaml-4.02.3-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153244" comment="ocaml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134370" comment="ocaml-compiler-libs-4.02.3-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153245" comment="ocaml-compiler-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134371" comment="ocaml-compiler-libs-devel-4.02.3-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153246" comment="ocaml-compiler-libs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134372" comment="ocaml-docs-4.02.3-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153247" comment="ocaml-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134373" comment="ocaml-emacs-4.02.3-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153248" comment="ocaml-emacs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134374" comment="ocaml-ocamldoc-4.02.3-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153249" comment="ocaml-ocamldoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134375" comment="ocaml-rpm-macros-4.02.3-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153250" comment="ocaml-rpm-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134376" comment="ocaml-runtime-4.02.3-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153251" comment="ocaml-runtime is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134377" comment="ocaml-source-4.02.3-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153252" comment="ocaml-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134378" comment="ocaml-x11-4.02.3-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153253" comment="ocaml-x11 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8872</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8872" source="CVE"/>
    <description>
    The set_fat function in fat.c in dosfstools before 4.0 might allow attackers to corrupt a FAT12 filesystem or cause a denial of service (invalid memory read and crash) by writing an odd number of clusters to the third to last entry on a FAT12 filesystem, which triggers an "off-by-two error."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8872.html">CVE-2015-8872</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8872">SUSE bug 980364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8872">SUSE bug 980364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8872">SUSE bug 980364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8872">SUSE bug 980364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8872">SUSE bug 980364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8872">SUSE bug 980364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8872">SUSE bug 980364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8872">SUSE bug 980364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8872">SUSE bug 980364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8872">SUSE bug 980364</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134309" comment="dosfstools-3.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153254" comment="dosfstools is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8873</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8873" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8873" source="CVE"/>
    <description>
    Stack consumption vulnerability in Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to cause a denial of service (segmentation fault) via recursive method calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8873.html">CVE-2015-8873</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8873">SUSE bug 980373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8873">SUSE bug 980373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8873">SUSE bug 980373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8873">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8873">SUSE bug 980373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8873">SUSE bug 980373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8873">SUSE bug 980373</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128554" comment="apache2-mod_php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128555" comment="php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128556" comment="php5-bcmath-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128557" comment="php5-bz2-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128558" comment="php5-calendar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128559" comment="php5-ctype-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128560" comment="php5-curl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128561" comment="php5-dba-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128562" comment="php5-devel-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128563" comment="php5-dom-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128564" comment="php5-enchant-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128565" comment="php5-exif-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128566" comment="php5-fastcgi-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128567" comment="php5-fileinfo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128568" comment="php5-firebird-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128569" comment="php5-fpm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128570" comment="php5-ftp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128571" comment="php5-gd-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128572" comment="php5-gettext-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128573" comment="php5-gmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128574" comment="php5-iconv-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128575" comment="php5-imap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128576" comment="php5-intl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128577" comment="php5-json-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128578" comment="php5-ldap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128579" comment="php5-mbstring-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128580" comment="php5-mcrypt-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128581" comment="php5-mssql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128582" comment="php5-mysql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128583" comment="php5-odbc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128584" comment="php5-opcache-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128585" comment="php5-openssl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128586" comment="php5-pcntl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128587" comment="php5-pdo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128588" comment="php5-pear-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128589" comment="php5-pgsql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128590" comment="php5-phar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128591" comment="php5-posix-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128592" comment="php5-pspell-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128593" comment="php5-readline-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128594" comment="php5-shmop-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128595" comment="php5-snmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128596" comment="php5-soap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128597" comment="php5-sockets-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128598" comment="php5-sqlite-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128599" comment="php5-suhosin-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128600" comment="php5-sysvmsg-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128601" comment="php5-sysvsem-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128602" comment="php5-sysvshm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128603" comment="php5-tidy-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128604" comment="php5-tokenizer-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128605" comment="php5-wddx-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128606" comment="php5-xmlreader-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128607" comment="php5-xmlrpc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128608" comment="php5-xmlwriter-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128609" comment="php5-xsl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128610" comment="php5-zip-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128611" comment="php5-zlib-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8874</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8874" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874" source="CVE"/>
    <description>
    Stack consumption vulnerability in GD in PHP before 5.6.12 allows remote attackers to cause a denial of service via a crafted imagefilltoborder call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8874.html">CVE-2015-8874</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8874">SUSE bug 980375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8874">SUSE bug 980375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8874">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8874">SUSE bug 980375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8874">SUSE bug 980375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8874">SUSE bug 980375</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128554" comment="apache2-mod_php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128555" comment="php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128556" comment="php5-bcmath-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128557" comment="php5-bz2-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128558" comment="php5-calendar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128559" comment="php5-ctype-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128560" comment="php5-curl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128561" comment="php5-dba-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128562" comment="php5-devel-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128563" comment="php5-dom-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128564" comment="php5-enchant-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128565" comment="php5-exif-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128566" comment="php5-fastcgi-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128567" comment="php5-fileinfo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128568" comment="php5-firebird-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128569" comment="php5-fpm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128570" comment="php5-ftp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128571" comment="php5-gd-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128572" comment="php5-gettext-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128573" comment="php5-gmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128574" comment="php5-iconv-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128575" comment="php5-imap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128576" comment="php5-intl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128577" comment="php5-json-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128578" comment="php5-ldap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128579" comment="php5-mbstring-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128580" comment="php5-mcrypt-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128581" comment="php5-mssql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128582" comment="php5-mysql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128583" comment="php5-odbc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128584" comment="php5-opcache-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128585" comment="php5-openssl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128586" comment="php5-pcntl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128587" comment="php5-pdo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128588" comment="php5-pear-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128589" comment="php5-pgsql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128590" comment="php5-phar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128591" comment="php5-posix-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128592" comment="php5-pspell-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128593" comment="php5-readline-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128594" comment="php5-shmop-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128595" comment="php5-snmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128596" comment="php5-soap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128597" comment="php5-sockets-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128598" comment="php5-sqlite-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128599" comment="php5-suhosin-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128600" comment="php5-sysvmsg-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128601" comment="php5-sysvsem-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128602" comment="php5-sysvshm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128603" comment="php5-tidy-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128604" comment="php5-tokenizer-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128605" comment="php5-wddx-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128606" comment="php5-xmlreader-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128607" comment="php5-xmlrpc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128608" comment="php5-xmlwriter-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128609" comment="php5-xsl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128610" comment="php5-zip-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128611" comment="php5-zlib-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8876</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8876" source="CVE"/>
    <description>
    Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not validate certain Exception objects, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or trigger unintended method execution via crafted serialized data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8876.html">CVE-2015-8876</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8876">SUSE bug 981049</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8876">SUSE bug 981049</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8876">SUSE bug 981049</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8876">SUSE bug 981049</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8876">SUSE bug 981049</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8876">SUSE bug 1019550</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126792" comment="apache2-mod_php5-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129316" comment="imap-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152031" comment="imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129317" comment="imap-devel-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152032" comment="imap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129318" comment="libc-client2007e_suse-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152033" comment="libc-client2007e_suse is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126793" comment="php5-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126794" comment="php5-bcmath-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126795" comment="php5-bz2-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126796" comment="php5-calendar-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126797" comment="php5-ctype-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126798" comment="php5-curl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126799" comment="php5-dba-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126843" comment="php5-devel-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126800" comment="php5-dom-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126801" comment="php5-enchant-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126802" comment="php5-exif-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126803" comment="php5-fastcgi-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126804" comment="php5-fileinfo-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129319" comment="php5-firebird-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126805" comment="php5-fpm-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126806" comment="php5-ftp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126807" comment="php5-gd-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126808" comment="php5-gettext-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126809" comment="php5-gmp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126810" comment="php5-iconv-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129320" comment="php5-imap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126811" comment="php5-intl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126812" comment="php5-json-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126813" comment="php5-ldap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126814" comment="php5-mbstring-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126815" comment="php5-mcrypt-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129321" comment="php5-mssql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126816" comment="php5-mysql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126817" comment="php5-odbc-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126818" comment="php5-opcache-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126819" comment="php5-openssl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126820" comment="php5-pcntl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126821" comment="php5-pdo-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126822" comment="php5-pear-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126823" comment="php5-pgsql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129322" comment="php5-phar-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126824" comment="php5-posix-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126825" comment="php5-pspell-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129323" comment="php5-readline-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126826" comment="php5-shmop-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126827" comment="php5-snmp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126828" comment="php5-soap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126829" comment="php5-sockets-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126830" comment="php5-sqlite-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126831" comment="php5-suhosin-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126832" comment="php5-sysvmsg-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126833" comment="php5-sysvsem-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126834" comment="php5-sysvshm-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129324" comment="php5-tidy-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126835" comment="php5-tokenizer-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126836" comment="php5-wddx-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126837" comment="php5-xmlreader-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126838" comment="php5-xmlrpc-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126839" comment="php5-xmlwriter-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126840" comment="php5-xsl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126841" comment="php5-zip-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126842" comment="php5-zlib-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8877</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8877" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877" source="CVE"/>
    <description>
    The gdImageScaleTwoPass function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in PHP before 5.6.12, uses inconsistent allocate and free approaches, which allows remote attackers to cause a denial of service (memory consumption) via a crafted call, as demonstrated by a call to the PHP imagescale function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8877.html">CVE-2015-8877</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8877">SUSE bug 981061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8877">SUSE bug 981061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8877">SUSE bug 981061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8877">SUSE bug 981061</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126792" comment="apache2-mod_php5-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129316" comment="imap-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152031" comment="imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129317" comment="imap-devel-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152032" comment="imap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129318" comment="libc-client2007e_suse-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152033" comment="libc-client2007e_suse is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126793" comment="php5-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126794" comment="php5-bcmath-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126795" comment="php5-bz2-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126796" comment="php5-calendar-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126797" comment="php5-ctype-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126798" comment="php5-curl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126799" comment="php5-dba-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126843" comment="php5-devel-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126800" comment="php5-dom-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126801" comment="php5-enchant-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126802" comment="php5-exif-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126803" comment="php5-fastcgi-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126804" comment="php5-fileinfo-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129319" comment="php5-firebird-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126805" comment="php5-fpm-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126806" comment="php5-ftp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126807" comment="php5-gd-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126808" comment="php5-gettext-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126809" comment="php5-gmp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126810" comment="php5-iconv-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129320" comment="php5-imap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126811" comment="php5-intl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126812" comment="php5-json-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126813" comment="php5-ldap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126814" comment="php5-mbstring-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126815" comment="php5-mcrypt-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129321" comment="php5-mssql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126816" comment="php5-mysql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126817" comment="php5-odbc-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126818" comment="php5-opcache-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126819" comment="php5-openssl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126820" comment="php5-pcntl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126821" comment="php5-pdo-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126822" comment="php5-pear-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126823" comment="php5-pgsql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129322" comment="php5-phar-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126824" comment="php5-posix-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126825" comment="php5-pspell-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129323" comment="php5-readline-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126826" comment="php5-shmop-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126827" comment="php5-snmp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126828" comment="php5-soap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126829" comment="php5-sockets-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126830" comment="php5-sqlite-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126831" comment="php5-suhosin-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126832" comment="php5-sysvmsg-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126833" comment="php5-sysvsem-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126834" comment="php5-sysvshm-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129324" comment="php5-tidy-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126835" comment="php5-tokenizer-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126836" comment="php5-wddx-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126837" comment="php5-xmlreader-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126838" comment="php5-xmlrpc-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126839" comment="php5-xmlwriter-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126840" comment="php5-xsl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126841" comment="php5-zip-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126842" comment="php5-zlib-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8879</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8879" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8879" source="CVE"/>
    <description>
    The odbc_bindcols function in ext/odbc/php_odbc.c in PHP before 5.6.12 mishandles driver behavior for SQL_WVARCHAR columns, which allows remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8879.html">CVE-2015-8879</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8879">SUSE bug 981050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8879">SUSE bug 981050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8879">SUSE bug 981050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8879">SUSE bug 981050</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126792" comment="apache2-mod_php5-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129316" comment="imap-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152031" comment="imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129317" comment="imap-devel-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152032" comment="imap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129318" comment="libc-client2007e_suse-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152033" comment="libc-client2007e_suse is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126793" comment="php5-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126794" comment="php5-bcmath-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126795" comment="php5-bz2-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126796" comment="php5-calendar-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126797" comment="php5-ctype-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126798" comment="php5-curl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126799" comment="php5-dba-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126843" comment="php5-devel-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126800" comment="php5-dom-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126801" comment="php5-enchant-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126802" comment="php5-exif-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126803" comment="php5-fastcgi-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126804" comment="php5-fileinfo-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129319" comment="php5-firebird-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126805" comment="php5-fpm-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126806" comment="php5-ftp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126807" comment="php5-gd-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126808" comment="php5-gettext-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126809" comment="php5-gmp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126810" comment="php5-iconv-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129320" comment="php5-imap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126811" comment="php5-intl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126812" comment="php5-json-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126813" comment="php5-ldap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126814" comment="php5-mbstring-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126815" comment="php5-mcrypt-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129321" comment="php5-mssql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126816" comment="php5-mysql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126817" comment="php5-odbc-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126818" comment="php5-opcache-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126819" comment="php5-openssl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126820" comment="php5-pcntl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126821" comment="php5-pdo-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126822" comment="php5-pear-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126823" comment="php5-pgsql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129322" comment="php5-phar-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126824" comment="php5-posix-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126825" comment="php5-pspell-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129323" comment="php5-readline-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126826" comment="php5-shmop-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126827" comment="php5-snmp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126828" comment="php5-soap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126829" comment="php5-sockets-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126830" comment="php5-sqlite-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126831" comment="php5-suhosin-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126832" comment="php5-sysvmsg-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126833" comment="php5-sysvsem-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126834" comment="php5-sysvshm-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129324" comment="php5-tidy-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126835" comment="php5-tokenizer-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126836" comment="php5-wddx-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126837" comment="php5-xmlreader-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126838" comment="php5-xmlrpc-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126839" comment="php5-xmlwriter-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126840" comment="php5-xsl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126841" comment="php5-zip-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126842" comment="php5-zlib-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8894</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8894" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8894" source="CVE"/>
    <description>
    Double free vulnerability in coders/tga.c in ImageMagick 7.0.0 and later allows remote attackers to cause a denial of service (application crash) via a crafted tga file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8894.html">CVE-2015-8894</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8894">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8894">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8894">SUSE bug 983523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8894">SUSE bug 983523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8894">SUSE bug 983523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8894">SUSE bug 983533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8894">SUSE bug 983533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8894">SUSE bug 983523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8894">SUSE bug 983523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8894">SUSE bug 983523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8894">SUSE bug 983523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8894">SUSE bug 983523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8894">SUSE bug 983523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8894">SUSE bug 983523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8894">SUSE bug 983523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8894">SUSE bug 983523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8894">SUSE bug 983523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8894">SUSE bug 983523</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8895</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8895" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8895" source="CVE"/>
    <description>
    Integer overflow in coders/icon.c in ImageMagick 6.9.1-3 and later allows remote attackers to cause a denial of service (application crash) via a crafted length value, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8895.html">CVE-2015-8895</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8895">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8895">SUSE bug 983527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8895">SUSE bug 983527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8895">SUSE bug 983527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8895">SUSE bug 983527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8895">SUSE bug 983527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8895">SUSE bug 983527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8895">SUSE bug 983527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8895">SUSE bug 983527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8895">SUSE bug 983527</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8896</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8896" source="CVE"/>
    <description>
    Integer truncation issue in coders/pict.c in ImageMagick before 7.0.5-0 allows remote attackers to cause a denial of service (application crash) via a crafted .pict file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8896.html">CVE-2015-8896</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8896">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8896">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8896">SUSE bug 983533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8896">SUSE bug 983533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8896">SUSE bug 983533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8896">SUSE bug 983533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8896">SUSE bug 983533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8896">SUSE bug 983533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8896">SUSE bug 983533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8896">SUSE bug 983533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8896">SUSE bug 983533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8896">SUSE bug 983533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8896">SUSE bug 983533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8896">SUSE bug 983533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8896">SUSE bug 983533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8896">SUSE bug 983533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8896">SUSE bug 983533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8897</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8897" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8897" source="CVE"/>
    <description>
    The SpliceImage function in MagickCore/transform.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (application crash) via a crafted png file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8897.html">CVE-2015-8897</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8897">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8897">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8897">SUSE bug 983739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8897">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8897">SUSE bug 983739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8897">SUSE bug 983746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8897">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8897">SUSE bug 983739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8897">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8897">SUSE bug 983739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8897">SUSE bug 983739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8897">SUSE bug 983739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8897">SUSE bug 983746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8897">SUSE bug 983739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8897">SUSE bug 983739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8897">SUSE bug 983739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8897">SUSE bug 983739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8897">SUSE bug 983739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8897">SUSE bug 983739</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8898</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8898" source="CVE"/>
    <description>
    The WriteImages function in magick/constitute.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8898.html">CVE-2015-8898</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8898">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8898">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8898">SUSE bug 983739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8898">SUSE bug 983746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8898">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8898">SUSE bug 983746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8898">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8898">SUSE bug 983739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8898">SUSE bug 982969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8898">SUSE bug 983746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8898">SUSE bug 983746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8898">SUSE bug 983739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8898">SUSE bug 983746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8898">SUSE bug 983746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8898">SUSE bug 983746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8898">SUSE bug 983746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8898">SUSE bug 983746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8898">SUSE bug 983746</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8898">SUSE bug 983746</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8899</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8899" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8899" source="CVE"/>
    <description>
    Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8899.html">CVE-2015-8899</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8899">SUSE bug 983273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8899">SUSE bug 983273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8899">SUSE bug 983273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8899">SUSE bug 983273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8899">SUSE bug 983273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8899">SUSE bug 983273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8899">SUSE bug 983273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8899">SUSE bug 983273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8899">SUSE bug 983273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8899">SUSE bug 983273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8899">SUSE bug 983273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8899">SUSE bug 983273</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8899">SUSE bug 983273</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146257" comment="dnsmasq-2.71-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146258" comment="dnsmasq-utils-2.71-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153255" comment="dnsmasq-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8900</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8900" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8900" source="CVE"/>
    <description>
    The ReadHDRImage function in coders/hdr.c in ImageMagick 6.x and 7.x allows remote attackers to cause a denial of service (infinite loop) via a crafted HDR file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8900.html">CVE-2015-8900</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8900">SUSE bug 983232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8900">SUSE bug 983232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8900">SUSE bug 983232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8900">SUSE bug 983232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8900">SUSE bug 983232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8900">SUSE bug 983232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8900">SUSE bug 983232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8900">SUSE bug 983232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8900">SUSE bug 983232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8900">SUSE bug 983232</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8901</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8901" source="CVE"/>
    <description>
    ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted MIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8901.html">CVE-2015-8901</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8901">SUSE bug 983234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8901">SUSE bug 983234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8901">SUSE bug 983234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8901">SUSE bug 983234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8901">SUSE bug 983234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8901">SUSE bug 983234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8901">SUSE bug 983234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8901">SUSE bug 983234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8901">SUSE bug 983234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8901">SUSE bug 983234</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8901">SUSE bug 983234</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8902</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8902" source="CVE"/>
    <description>
    The ReadBlobByte function in coders/pdb.c in ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted PDB file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8902.html">CVE-2015-8902</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8902">SUSE bug 983253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8902">SUSE bug 983253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8902">SUSE bug 983253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8902">SUSE bug 983253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8902">SUSE bug 983253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8902">SUSE bug 983253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8902">SUSE bug 983253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8902">SUSE bug 983253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8902">SUSE bug 983253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8902">SUSE bug 983253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8902">SUSE bug 1052711</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8903</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8903" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8903" source="CVE"/>
    <description>
    The ReadVICARImage function in coders/vicar.c in ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted VICAR file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8903.html">CVE-2015-8903</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8903">SUSE bug 983259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8903">SUSE bug 983259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8903">SUSE bug 983259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8903">SUSE bug 983259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8903">SUSE bug 983259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8903">SUSE bug 983259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8903">SUSE bug 983259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8903">SUSE bug 983259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8903">SUSE bug 983259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8903">SUSE bug 983259</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8918</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8918" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8918" source="CVE"/>
    <description>
    The archive_string_append function in archive_string.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted cab files, related to "overlapping memcpy."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8918.html">CVE-2015-8918</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8918">SUSE bug 985698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8918">SUSE bug 985698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8918">SUSE bug 985698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8918">SUSE bug 985698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8918">SUSE bug 985698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8918">SUSE bug 985698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8918">SUSE bug 985698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8918">SUSE bug 985698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8918">SUSE bug 985698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8918">SUSE bug 985698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8918">SUSE bug 985698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8918">SUSE bug 985698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8918">SUSE bug 985698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8918">SUSE bug 985698</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135169" comment="bsdtar-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135170" comment="libarchive-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135171" comment="libarchive-devel-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135172" comment="libarchive13-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135173" comment="libarchive13-32bit-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8919</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8919" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8919" source="CVE"/>
    <description>
    The lha_read_file_extended_header function in archive_read_support_format_lha.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds heap) via a crafted (1) lzh or (2) lha file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8919.html">CVE-2015-8919</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8919">SUSE bug 985697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8919">SUSE bug 985697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8919">SUSE bug 985697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8919">SUSE bug 985697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8919">SUSE bug 985697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8919">SUSE bug 985697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8919">SUSE bug 985697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8919">SUSE bug 985697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8919">SUSE bug 985697</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135169" comment="bsdtar-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135170" comment="libarchive-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135171" comment="libarchive-devel-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135172" comment="libarchive13-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135173" comment="libarchive13-32bit-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8920</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8920" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8920" source="CVE"/>
    <description>
    The _ar_read_header function in archive_read_support_format_ar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds stack read) via a crafted ar file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8920.html">CVE-2015-8920</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8920">SUSE bug 985675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8920">SUSE bug 985675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8920">SUSE bug 985675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8920">SUSE bug 985675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8920">SUSE bug 985675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8920">SUSE bug 985675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8920">SUSE bug 985675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8920">SUSE bug 985675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8920">SUSE bug 985675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8920">SUSE bug 985675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8920">SUSE bug 985675</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135169" comment="bsdtar-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135170" comment="libarchive-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135171" comment="libarchive-devel-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135172" comment="libarchive13-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135173" comment="libarchive13-32bit-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8921</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8921" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8921" source="CVE"/>
    <description>
    The ae_strtofflags function in archive_entry.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mtree file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8921.html">CVE-2015-8921</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8921">SUSE bug 985682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8921">SUSE bug 985682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8921">SUSE bug 985682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8921">SUSE bug 985682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8921">SUSE bug 985682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8921">SUSE bug 985682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8921">SUSE bug 985682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8921">SUSE bug 985682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8921">SUSE bug 985682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8921">SUSE bug 985682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8921">SUSE bug 985682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8921">SUSE bug 985682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8921">SUSE bug 985682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8921">SUSE bug 985682</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135169" comment="bsdtar-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135170" comment="libarchive-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135171" comment="libarchive-devel-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135172" comment="libarchive13-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135173" comment="libarchive13-32bit-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8922</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8922" source="CVE"/>
    <description>
    The read_CodersInfo function in archive_read_support_format_7zip.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted 7z file, related to the _7z_folder struct.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8922.html">CVE-2015-8922</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8922">SUSE bug 985685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8922">SUSE bug 985685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8922">SUSE bug 985685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8922">SUSE bug 985685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8922">SUSE bug 985685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8922">SUSE bug 985685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8922">SUSE bug 985685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8922">SUSE bug 985685</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135169" comment="bsdtar-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135170" comment="libarchive-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135171" comment="libarchive-devel-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135172" comment="libarchive13-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135173" comment="libarchive13-32bit-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8923</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8923" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8923" source="CVE"/>
    <description>
    The process_extra function in libarchive before 3.2.0 uses the size field and a signed number in an offset, which allows remote attackers to cause a denial of service (crash) via a crafted zip file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8923.html">CVE-2015-8923</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8923">SUSE bug 985703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8923">SUSE bug 985703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8923">SUSE bug 985703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8923">SUSE bug 985703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8923">SUSE bug 985703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8923">SUSE bug 985703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8923">SUSE bug 985703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8923">SUSE bug 985703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8923">SUSE bug 985703</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135169" comment="bsdtar-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135170" comment="libarchive-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135171" comment="libarchive-devel-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135172" comment="libarchive13-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135173" comment="libarchive13-32bit-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8924</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8924" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8924" source="CVE"/>
    <description>
    The archive_read_format_tar_read_header function in archive_read_support_format_tar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted tar file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8924.html">CVE-2015-8924</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8924">SUSE bug 985609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8924">SUSE bug 985609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8924">SUSE bug 985609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8924">SUSE bug 985609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8924">SUSE bug 985609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8924">SUSE bug 985609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8924">SUSE bug 985609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8924">SUSE bug 985609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8924">SUSE bug 985609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8924">SUSE bug 985609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8924">SUSE bug 985609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8924">SUSE bug 985609</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135169" comment="bsdtar-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135170" comment="libarchive-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135171" comment="libarchive-devel-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135172" comment="libarchive13-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135173" comment="libarchive13-32bit-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8925</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8925" source="CVE"/>
    <description>
    The readline function in archive_read_support_format_mtree.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (invalid read) via a crafted mtree file, related to newline parsing.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8925.html">CVE-2015-8925</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8925">SUSE bug 985706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8925">SUSE bug 985706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8925">SUSE bug 985706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8925">SUSE bug 985706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8925">SUSE bug 985706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8925">SUSE bug 985706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8925">SUSE bug 985706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8925">SUSE bug 985706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8925">SUSE bug 985706</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135169" comment="bsdtar-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135170" comment="libarchive-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135171" comment="libarchive-devel-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135172" comment="libarchive13-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135173" comment="libarchive13-32bit-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8926</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8926" source="CVE"/>
    <description>
    The archive_read_format_rar_read_data function in archive_read_support_format_rar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted rar archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8926.html">CVE-2015-8926</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8926">SUSE bug 985704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8926">SUSE bug 985704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8926">SUSE bug 985704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8926">SUSE bug 985704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8926">SUSE bug 985704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8926">SUSE bug 985704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8926">SUSE bug 985704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8926">SUSE bug 985704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8926">SUSE bug 985704</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135169" comment="bsdtar-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135170" comment="libarchive-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135171" comment="libarchive-devel-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135172" comment="libarchive13-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135173" comment="libarchive13-32bit-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8928</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8928" source="CVE"/>
    <description>
    The process_add_entry function in archive_read_support_format_mtree.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mtree file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8928.html">CVE-2015-8928</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8928">SUSE bug 985679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8928">SUSE bug 985679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8928">SUSE bug 985679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8928">SUSE bug 985679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8928">SUSE bug 985679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8928">SUSE bug 985679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8928">SUSE bug 985679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8928">SUSE bug 985679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8928">SUSE bug 985679</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135169" comment="bsdtar-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135170" comment="libarchive-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135171" comment="libarchive-devel-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135172" comment="libarchive13-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135173" comment="libarchive13-32bit-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8929</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8929" source="CVE"/>
    <description>
    Memory leak in the __archive_read_get_extract function in archive_read_extract2.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service via a tar file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8929.html">CVE-2015-8929</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8929">SUSE bug 985669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8929">SUSE bug 985669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8929">SUSE bug 985669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8929">SUSE bug 985669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8929">SUSE bug 985669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8929">SUSE bug 985669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8929">SUSE bug 985669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8929">SUSE bug 985669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8929">SUSE bug 985669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8929">SUSE bug 985669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8929">SUSE bug 985669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8929">SUSE bug 985669</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135169" comment="bsdtar-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135170" comment="libarchive-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135171" comment="libarchive-devel-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135172" comment="libarchive13-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135173" comment="libarchive13-32bit-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8930</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8930" source="CVE"/>
    <description>
    bsdtar in libarchive before 3.2.0 allows remote attackers to cause a denial of service (infinite loop) via an ISO with a directory that is a member of itself.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8930.html">CVE-2015-8930</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8930">SUSE bug 985700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8930">SUSE bug 985700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8930">SUSE bug 985700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8930">SUSE bug 985700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8930">SUSE bug 985700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8930">SUSE bug 985700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8930">SUSE bug 985700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8930">SUSE bug 985700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8930">SUSE bug 985700</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135169" comment="bsdtar-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135170" comment="libarchive-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135171" comment="libarchive-devel-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135172" comment="libarchive13-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135173" comment="libarchive13-32bit-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8931</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8931" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) get_time_t_max and (2) get_time_t_min functions in archive_read_support_format_mtree.c in libarchive before 3.2.0 allow remote attackers to have unspecified impact via a crafted mtree file, which triggers undefined behavior.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8931.html">CVE-2015-8931</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8931">SUSE bug 985689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8931">SUSE bug 985689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8931">SUSE bug 985689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8931">SUSE bug 985689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8931">SUSE bug 985689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8931">SUSE bug 985689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8931">SUSE bug 985689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8931">SUSE bug 985689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8931">SUSE bug 985689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8931">SUSE bug 985689</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135169" comment="bsdtar-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135170" comment="libarchive-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135171" comment="libarchive-devel-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135172" comment="libarchive13-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135173" comment="libarchive13-32bit-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8932</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8932" source="CVE"/>
    <description>
    The compress_bidder_init function in archive_read_support_filter_compress.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted tar file, which triggers an invalid left shift.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8932.html">CVE-2015-8932</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8932">SUSE bug 985665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8932">SUSE bug 985665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8932">SUSE bug 985665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8932">SUSE bug 985665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8932">SUSE bug 985665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8932">SUSE bug 985665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8932">SUSE bug 985665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8932">SUSE bug 985665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8932">SUSE bug 985665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8932">SUSE bug 985665</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135169" comment="bsdtar-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135170" comment="libarchive-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135171" comment="libarchive-devel-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135172" comment="libarchive13-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135173" comment="libarchive13-32bit-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8933</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8933" source="CVE"/>
    <description>
    Integer overflow in the archive_read_format_tar_skip function in archive_read_support_format_tar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted tar file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8933.html">CVE-2015-8933</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8933">SUSE bug 985688</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8933">SUSE bug 985688</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8933">SUSE bug 985688</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8933">SUSE bug 985688</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8933">SUSE bug 985688</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8933">SUSE bug 985688</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8933">SUSE bug 985688</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8933">SUSE bug 985688</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8933">SUSE bug 985688</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135169" comment="bsdtar-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135170" comment="libarchive-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135171" comment="libarchive-devel-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135172" comment="libarchive13-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135173" comment="libarchive13-32bit-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8934</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8934" source="CVE"/>
    <description>
    The copy_from_lzss_window function in archive_read_support_format_rar.c in libarchive 3.2.0 and earlier allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted rar file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8934.html">CVE-2015-8934</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8934">SUSE bug 985673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8934">SUSE bug 985673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8934">SUSE bug 985673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8934">SUSE bug 985673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8934">SUSE bug 985673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8934">SUSE bug 985673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8934">SUSE bug 985673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8934">SUSE bug 985673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8934">SUSE bug 985673</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135169" comment="bsdtar-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135170" comment="libarchive-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135171" comment="libarchive-devel-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135172" comment="libarchive13-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135173" comment="libarchive13-32bit-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8935</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8935" source="CVE"/>
    <description>
    The sapi_header_op function in main/SAPI.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 supports deprecated line folding without considering browser compatibility, which allows remote attackers to conduct cross-site scripting (XSS) attacks against Internet Explorer by leveraging (1) %0A%20 or (2) %0D%0A%20 mishandling in the header function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8935.html">CVE-2015-8935</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8935">SUSE bug 986004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8935">SUSE bug 986004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8935">SUSE bug 986004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8935">SUSE bug 986004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8935">SUSE bug 986004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8935">SUSE bug 986004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8935">SUSE bug 986004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8935">SUSE bug 986004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8935">SUSE bug 986004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8935">SUSE bug 986004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8935">SUSE bug 986004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8935">SUSE bug 986004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8935">SUSE bug 986004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8935">SUSE bug 986004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8935">SUSE bug 986004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8935">SUSE bug 986004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8935">SUSE bug 986004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8935">SUSE bug 986004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8935">SUSE bug 986004</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127401" comment="apache2-mod_php5-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127402" comment="php5-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127403" comment="php5-bcmath-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127404" comment="php5-bz2-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127405" comment="php5-calendar-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127406" comment="php5-ctype-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127407" comment="php5-curl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127408" comment="php5-dba-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127453" comment="php5-devel-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127409" comment="php5-dom-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127410" comment="php5-enchant-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127411" comment="php5-exif-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127412" comment="php5-fastcgi-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127413" comment="php5-fileinfo-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130751" comment="php5-firebird-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127414" comment="php5-fpm-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127415" comment="php5-ftp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127416" comment="php5-gd-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127417" comment="php5-gettext-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127418" comment="php5-gmp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127419" comment="php5-iconv-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130752" comment="php5-imap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127420" comment="php5-intl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127421" comment="php5-json-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127422" comment="php5-ldap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127423" comment="php5-mbstring-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127424" comment="php5-mcrypt-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130753" comment="php5-mssql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127425" comment="php5-mysql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127426" comment="php5-odbc-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127427" comment="php5-opcache-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127428" comment="php5-openssl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127429" comment="php5-pcntl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127430" comment="php5-pdo-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127431" comment="php5-pear-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127432" comment="php5-pgsql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127433" comment="php5-phar-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127434" comment="php5-posix-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127435" comment="php5-pspell-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130754" comment="php5-readline-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127436" comment="php5-shmop-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127437" comment="php5-snmp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127438" comment="php5-soap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127439" comment="php5-sockets-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127440" comment="php5-sqlite-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127441" comment="php5-suhosin-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127442" comment="php5-sysvmsg-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127443" comment="php5-sysvsem-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127444" comment="php5-sysvshm-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130755" comment="php5-tidy-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127445" comment="php5-tokenizer-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127446" comment="php5-wddx-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127447" comment="php5-xmlreader-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127448" comment="php5-xmlrpc-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127449" comment="php5-xmlwriter-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127450" comment="php5-xsl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127451" comment="php5-zip-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127452" comment="php5-zlib-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8936</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8936" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in squidGuard.cgi in squidGuard before 1.5 allows remote attackers to inject arbitrary web script or HTML via a blocked site link.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8936.html">CVE-2015-8936</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8936">SUSE bug 985612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8936">SUSE bug 985612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8936">SUSE bug 985612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8936">SUSE bug 985612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8936">SUSE bug 985612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8936">SUSE bug 985612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8936">SUSE bug 985612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8936">SUSE bug 1040287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8936">SUSE bug 985612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8936">SUSE bug 985612</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134989" comment="squidGuard-1.4-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153256" comment="squidGuard is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134990" comment="squidGuard-doc-1.4-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153257" comment="squidGuard-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8947</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8947" source="CVE"/>
    <description>
    hb-ot-layout-gpos-table.hh in HarfBuzz before 1.0.5 allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted data, a different vulnerability than CVE-2016-2052.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8947.html">CVE-2015-8947</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8947">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8947">SUSE bug 989564</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8947">SUSE bug 989564</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8947">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8947">SUSE bug 989564</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8947">SUSE bug 989564</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8947">SUSE bug 989564</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134096" comment="harfbuzz-1.0.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153258" comment="harfbuzz is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134097" comment="harfbuzz-devel-1.0.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153259" comment="harfbuzz-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134098" comment="harfbuzz-tools-1.0.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153260" comment="harfbuzz-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134099" comment="libharfbuzz-icu0-1.0.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153261" comment="libharfbuzz-icu0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134100" comment="libharfbuzz-icu0-32bit-1.0.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153262" comment="libharfbuzz-icu0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134101" comment="libharfbuzz0-1.0.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153263" comment="libharfbuzz0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134102" comment="libharfbuzz0-32bit-1.0.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153264" comment="libharfbuzz0-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8948</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8948" source="CVE"/>
    <description>
    idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8948.html">CVE-2015-8948</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8948">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8948">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8948">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8948">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8948">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8948">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8948">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8948">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8948">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8948">SUSE bug 1014473</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8948">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8948">SUSE bug 1014473</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8948">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8948">SUSE bug 1014473</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8948">SUSE bug 990189</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134259" comment="libidn-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152665" comment="libidn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134260" comment="libidn-devel-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152666" comment="libidn-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134261" comment="libidn-tools-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152667" comment="libidn-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134262" comment="libidn11-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152668" comment="libidn11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134263" comment="libidn11-32bit-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152669" comment="libidn11-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8956</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8956" source="CVE"/>
    <description>
    The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8956.html">CVE-2015-8956</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8956">SUSE bug 1003925</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136831" comment="drbd-8.4.6-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136832" comment="drbd-kmp-default-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136833" comment="drbd-kmp-pv-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136834" comment="drbd-kmp-xen-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136835" comment="hdjmod-1.28-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136836" comment="hdjmod-kmp-default-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136837" comment="hdjmod-kmp-pae-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136838" comment="hdjmod-kmp-pv-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136839" comment="hdjmod-kmp-xen-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136840" comment="ipset-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136841" comment="ipset-devel-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136842" comment="ipset-kmp-default-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136843" comment="ipset-kmp-pae-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136844" comment="ipset-kmp-pv-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136845" comment="ipset-kmp-xen-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136846" comment="kernel-debug-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136847" comment="kernel-debug-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136848" comment="kernel-debug-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136849" comment="kernel-default-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136850" comment="kernel-default-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136851" comment="kernel-default-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136852" comment="kernel-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136853" comment="kernel-docs-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136854" comment="kernel-docs-html-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136855" comment="kernel-docs-pdf-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136856" comment="kernel-ec2-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136857" comment="kernel-ec2-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136858" comment="kernel-ec2-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136859" comment="kernel-macros-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136860" comment="kernel-obs-build-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136861" comment="kernel-obs-qa-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136862" comment="kernel-pae-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136863" comment="kernel-pae-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136864" comment="kernel-pae-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136865" comment="kernel-pv-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136866" comment="kernel-pv-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136867" comment="kernel-pv-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136868" comment="kernel-source-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136869" comment="kernel-source-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136870" comment="kernel-syms-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136871" comment="kernel-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136872" comment="kernel-vanilla-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136873" comment="kernel-xen-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136874" comment="kernel-xen-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136875" comment="kernel-xen-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136876" comment="libipset3-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136877" comment="lttng-modules-2.7.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136878" comment="lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136879" comment="lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136880" comment="pcfclock-0.44-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136881" comment="pcfclock-kmp-default-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136882" comment="pcfclock-kmp-pae-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136883" comment="pcfclock-kmp-pv-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136884" comment="vhba-kmp-20140928-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136885" comment="vhba-kmp-default-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136886" comment="vhba-kmp-pae-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136887" comment="vhba-kmp-pv-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136888" comment="vhba-kmp-xen-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8957</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8957" source="CVE"/>
    <description>
    Buffer overflow in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (application crash) via a crafted SUN file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8957.html">CVE-2015-8957</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8957">SUSE bug 1000690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8957">SUSE bug 1000690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8957">SUSE bug 1000691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8957">SUSE bug 1000690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8957">SUSE bug 1000690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8957">SUSE bug 1000690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8957">SUSE bug 1000690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8957">SUSE bug 1000690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8957">SUSE bug 1000690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8957">SUSE bug 1000690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8957">SUSE bug 1000690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8957">SUSE bug 1000690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8957">SUSE bug 1000690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8957">SUSE bug 1000690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8957">SUSE bug 1000690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8957">SUSE bug 1000690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8957">SUSE bug 1000690</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8958</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8958" source="CVE"/>
    <description>
    coders/sun.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted SUN file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8958.html">CVE-2015-8958</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8958">SUSE bug 1000691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8958">SUSE bug 1000691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8958">SUSE bug 1000691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8958">SUSE bug 1000694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8958">SUSE bug 1000691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8958">SUSE bug 1000691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8958">SUSE bug 1000691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8958">SUSE bug 1000691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8958">SUSE bug 1000691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8958">SUSE bug 1000691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8958">SUSE bug 1000690</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8958">SUSE bug 1000691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8958">SUSE bug 1000691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8958">SUSE bug 1000691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8958">SUSE bug 1000691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8958">SUSE bug 1000691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8958">SUSE bug 1000691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8958">SUSE bug 1028079</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8959</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8959" source="CVE"/>
    <description>
    coders/dds.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (CPU consumption) via a crafted DDS file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8959.html">CVE-2015-8959</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8959">SUSE bug 1000713</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8959">SUSE bug 1000713</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8959">SUSE bug 1000713</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8959">SUSE bug 1000713</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8959">SUSE bug 1000713</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8959">SUSE bug 1074610</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8962</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8962" source="CVE"/>
    <description>
    Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8962.html">CVE-2015-8962</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8962">SUSE bug 1010501</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136831" comment="drbd-8.4.6-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136832" comment="drbd-kmp-default-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136833" comment="drbd-kmp-pv-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136834" comment="drbd-kmp-xen-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136835" comment="hdjmod-1.28-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136836" comment="hdjmod-kmp-default-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136837" comment="hdjmod-kmp-pae-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136838" comment="hdjmod-kmp-pv-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136839" comment="hdjmod-kmp-xen-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136840" comment="ipset-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136841" comment="ipset-devel-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136842" comment="ipset-kmp-default-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136843" comment="ipset-kmp-pae-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136844" comment="ipset-kmp-pv-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136845" comment="ipset-kmp-xen-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136846" comment="kernel-debug-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136847" comment="kernel-debug-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136848" comment="kernel-debug-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136849" comment="kernel-default-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136850" comment="kernel-default-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136851" comment="kernel-default-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136852" comment="kernel-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136853" comment="kernel-docs-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136854" comment="kernel-docs-html-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136855" comment="kernel-docs-pdf-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136856" comment="kernel-ec2-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136857" comment="kernel-ec2-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136858" comment="kernel-ec2-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136859" comment="kernel-macros-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136860" comment="kernel-obs-build-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136861" comment="kernel-obs-qa-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136862" comment="kernel-pae-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136863" comment="kernel-pae-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136864" comment="kernel-pae-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136865" comment="kernel-pv-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136866" comment="kernel-pv-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136867" comment="kernel-pv-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136868" comment="kernel-source-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136869" comment="kernel-source-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136870" comment="kernel-syms-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136871" comment="kernel-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136872" comment="kernel-vanilla-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136873" comment="kernel-xen-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136874" comment="kernel-xen-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136875" comment="kernel-xen-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136876" comment="libipset3-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136877" comment="lttng-modules-2.7.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136878" comment="lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136879" comment="lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136880" comment="pcfclock-0.44-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136881" comment="pcfclock-kmp-default-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136882" comment="pcfclock-kmp-pae-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136883" comment="pcfclock-kmp-pv-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136884" comment="vhba-kmp-20140928-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136885" comment="vhba-kmp-default-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136886" comment="vhba-kmp-pae-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136887" comment="vhba-kmp-pv-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136888" comment="vhba-kmp-xen-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8963</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8963" source="CVE"/>
    <description>
    Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8963.html">CVE-2015-8963</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8963">SUSE bug 1010502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8963">SUSE bug 1010502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8963">SUSE bug 1010502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8963">SUSE bug 1010502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8963">SUSE bug 1010502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8963">SUSE bug 1010502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8963">SUSE bug 1010502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8963">SUSE bug 1010502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8963">SUSE bug 1010502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8963">SUSE bug 1010502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8963">SUSE bug 1010502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8963">SUSE bug 1010502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8963">SUSE bug 1010502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8963">SUSE bug 1010502</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136831" comment="drbd-8.4.6-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136832" comment="drbd-kmp-default-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136833" comment="drbd-kmp-pv-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136834" comment="drbd-kmp-xen-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136835" comment="hdjmod-1.28-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136836" comment="hdjmod-kmp-default-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136837" comment="hdjmod-kmp-pae-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136838" comment="hdjmod-kmp-pv-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136839" comment="hdjmod-kmp-xen-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136840" comment="ipset-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136841" comment="ipset-devel-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136842" comment="ipset-kmp-default-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136843" comment="ipset-kmp-pae-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136844" comment="ipset-kmp-pv-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136845" comment="ipset-kmp-xen-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136846" comment="kernel-debug-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136847" comment="kernel-debug-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136848" comment="kernel-debug-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136849" comment="kernel-default-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136850" comment="kernel-default-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136851" comment="kernel-default-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136852" comment="kernel-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136853" comment="kernel-docs-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136854" comment="kernel-docs-html-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136855" comment="kernel-docs-pdf-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136856" comment="kernel-ec2-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136857" comment="kernel-ec2-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136858" comment="kernel-ec2-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136859" comment="kernel-macros-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136860" comment="kernel-obs-build-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136861" comment="kernel-obs-qa-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136862" comment="kernel-pae-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136863" comment="kernel-pae-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136864" comment="kernel-pae-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136865" comment="kernel-pv-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136866" comment="kernel-pv-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136867" comment="kernel-pv-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136868" comment="kernel-source-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136869" comment="kernel-source-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136870" comment="kernel-syms-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136871" comment="kernel-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136872" comment="kernel-vanilla-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136873" comment="kernel-xen-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136874" comment="kernel-xen-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136875" comment="kernel-xen-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136876" comment="libipset3-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136877" comment="lttng-modules-2.7.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136878" comment="lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136879" comment="lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136880" comment="pcfclock-0.44-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136881" comment="pcfclock-kmp-default-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136882" comment="pcfclock-kmp-pae-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136883" comment="pcfclock-kmp-pv-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136884" comment="vhba-kmp-20140928-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136885" comment="vhba-kmp-default-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136886" comment="vhba-kmp-pae-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136887" comment="vhba-kmp-pv-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136888" comment="vhba-kmp-xen-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8964</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8964" source="CVE"/>
    <description>
    The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8964.html">CVE-2015-8964</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8964">SUSE bug 1010507</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136831" comment="drbd-8.4.6-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136832" comment="drbd-kmp-default-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136833" comment="drbd-kmp-pv-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136834" comment="drbd-kmp-xen-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136835" comment="hdjmod-1.28-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136836" comment="hdjmod-kmp-default-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136837" comment="hdjmod-kmp-pae-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136838" comment="hdjmod-kmp-pv-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136839" comment="hdjmod-kmp-xen-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136840" comment="ipset-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136841" comment="ipset-devel-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136842" comment="ipset-kmp-default-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136843" comment="ipset-kmp-pae-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136844" comment="ipset-kmp-pv-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136845" comment="ipset-kmp-xen-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136846" comment="kernel-debug-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136847" comment="kernel-debug-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136848" comment="kernel-debug-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136849" comment="kernel-default-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136850" comment="kernel-default-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136851" comment="kernel-default-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136852" comment="kernel-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136853" comment="kernel-docs-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136854" comment="kernel-docs-html-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136855" comment="kernel-docs-pdf-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136856" comment="kernel-ec2-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136857" comment="kernel-ec2-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136858" comment="kernel-ec2-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136859" comment="kernel-macros-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136860" comment="kernel-obs-build-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136861" comment="kernel-obs-qa-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136862" comment="kernel-pae-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136863" comment="kernel-pae-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136864" comment="kernel-pae-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136865" comment="kernel-pv-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136866" comment="kernel-pv-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136867" comment="kernel-pv-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136868" comment="kernel-source-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136869" comment="kernel-source-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136870" comment="kernel-syms-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136871" comment="kernel-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136872" comment="kernel-vanilla-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136873" comment="kernel-xen-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136874" comment="kernel-xen-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136875" comment="kernel-xen-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136876" comment="libipset3-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136877" comment="lttng-modules-2.7.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136878" comment="lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136879" comment="lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136880" comment="pcfclock-0.44-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136881" comment="pcfclock-kmp-default-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136882" comment="pcfclock-kmp-pae-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136883" comment="pcfclock-kmp-pv-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136884" comment="vhba-kmp-20140928-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136885" comment="vhba-kmp-default-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136886" comment="vhba-kmp-pae-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136887" comment="vhba-kmp-pv-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136888" comment="vhba-kmp-xen-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8972</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8972" source="CVE"/>
    <description>
    Stack-based buffer overflow in the ValidateMove function in frontend/move.cc in GNU Chess (aka gnuchess) before 6.2.4 might allow context-dependent attackers to execute arbitrary code via a large input, as demonstrated when in UCI mode.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8972.html">CVE-2015-8972</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8972">SUSE bug 1010143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8972">SUSE bug 1010143</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135938" comment="gnuchess-6.2.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153265" comment="gnuchess is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8980</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8980" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8980.html">CVE-2015-8980</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8980">SUSE bug 1020489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8980">SUSE bug 1021597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8980">SUSE bug 1020489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8980">SUSE bug 1021597</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148040" comment="phpMyAdmin-4.4.15.10-31.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8994</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2015-8994" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8994" source="CVE"/>
    <description>
    An issue was discovered in PHP 5.x and 7.x, when the configuration uses apache2handler/mod_php or php-fpm with OpCache enabled. With 5.x after 5.6.28 or 7.x after 7.0.13, the issue is resolved in a non-default configuration with the opcache.validate_permission=1 setting. The vulnerability details are as follows. In PHP SAPIs where PHP interpreters share a common parent process, Zend OpCache creates a shared memory object owned by the common parent during initialization. Child PHP processes inherit the SHM descriptor, using it to cache and retrieve compiled script bytecode ("opcode" in PHP jargon). Cache keys vary depending on configuration, but filename is a central key component, and compiled opcode can generally be run if a script's filename is known or can be guessed. Many common shared-hosting configurations change EUID in child processes to enforce privilege separation among hosted users (for example using mod_ruid2 for the Apache HTTP Server, or php-fpm user settings). In these scenarios, the default Zend OpCache behavior defeats script file permissions by sharing a single SHM cache among all child PHP processes. PHP scripts often contain sensitive information: Think of CMS configurations where reading or running another user's script usually means gaining privileges to the CMS database.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2015-8994.html">CVE-2015-8994</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8994">SUSE bug 1027210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8994">SUSE bug 1027210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8994">SUSE bug 1027210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8994">SUSE bug 1027210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8994">SUSE bug 1027210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8994">SUSE bug 1027210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8994">SUSE bug 1027210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8994">SUSE bug 1027210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8994">SUSE bug 1027210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8994">SUSE bug 1027210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8994">SUSE bug 1027210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2015-8994">SUSE bug 1027210</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131508" comment="apache2-mod_php5-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131509" comment="php5-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131510" comment="php5-bcmath-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131511" comment="php5-bz2-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131512" comment="php5-calendar-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131513" comment="php5-ctype-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131514" comment="php5-curl-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131515" comment="php5-dba-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131813" comment="php5-devel-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131516" comment="php5-dom-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131517" comment="php5-enchant-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131518" comment="php5-exif-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131519" comment="php5-fastcgi-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131520" comment="php5-fileinfo-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150253" comment="php5-firebird-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131521" comment="php5-fpm-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131522" comment="php5-ftp-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131523" comment="php5-gd-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131524" comment="php5-gettext-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131525" comment="php5-gmp-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131526" comment="php5-iconv-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131527" comment="php5-imap-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131528" comment="php5-intl-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131529" comment="php5-json-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131530" comment="php5-ldap-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131531" comment="php5-mbstring-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131532" comment="php5-mcrypt-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150254" comment="php5-mssql-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131533" comment="php5-mysql-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131534" comment="php5-odbc-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131535" comment="php5-opcache-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131536" comment="php5-openssl-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131537" comment="php5-pcntl-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131538" comment="php5-pdo-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131539" comment="php5-pear-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131540" comment="php5-pgsql-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131541" comment="php5-phar-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131542" comment="php5-posix-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131543" comment="php5-pspell-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150255" comment="php5-readline-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131544" comment="php5-shmop-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131545" comment="php5-snmp-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131546" comment="php5-soap-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131547" comment="php5-sockets-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131548" comment="php5-sqlite-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131549" comment="php5-suhosin-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131550" comment="php5-sysvmsg-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131551" comment="php5-sysvsem-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131552" comment="php5-sysvshm-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150256" comment="php5-tidy-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131553" comment="php5-tokenizer-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131554" comment="php5-wddx-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131555" comment="php5-xmlreader-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131556" comment="php5-xmlrpc-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131557" comment="php5-xmlwriter-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131558" comment="php5-xsl-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131559" comment="php5-zip-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131560" comment="php5-zlib-5.5.14-78.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0402</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect integrity via unknown vectors related to Networking.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0402.html">CVE-2016-0402</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0402">SUSE bug 962743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0402">SUSE bug 963937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0402">SUSE bug 960402</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122393" comment="java-1_7_0-openjdk-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122394" comment="java-1_7_0-openjdk-accessibility-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122395" comment="java-1_7_0-openjdk-bootstrap-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122396" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122397" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122398" comment="java-1_7_0-openjdk-demo-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122399" comment="java-1_7_0-openjdk-devel-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122400" comment="java-1_7_0-openjdk-headless-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122401" comment="java-1_7_0-openjdk-javadoc-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122402" comment="java-1_7_0-openjdk-src-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0448</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66, and Java SE Embedded 8u65 allows remote authenticated users to affect confidentiality via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0448.html">CVE-2016-0448</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0448">SUSE bug 962743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0448">SUSE bug 963937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0448">SUSE bug 960402</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122393" comment="java-1_7_0-openjdk-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122394" comment="java-1_7_0-openjdk-accessibility-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122395" comment="java-1_7_0-openjdk-bootstrap-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122396" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122397" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122398" comment="java-1_7_0-openjdk-demo-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122399" comment="java-1_7_0-openjdk-devel-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122400" comment="java-1_7_0-openjdk-headless-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122401" comment="java-1_7_0-openjdk-javadoc-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122402" comment="java-1_7_0-openjdk-src-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0466</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded, and JRockit components in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect availability via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0466.html">CVE-2016-0466</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0466">SUSE bug 962743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0466">SUSE bug 963937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0466">SUSE bug 960402</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122393" comment="java-1_7_0-openjdk-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122394" comment="java-1_7_0-openjdk-accessibility-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122395" comment="java-1_7_0-openjdk-bootstrap-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122396" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122397" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122398" comment="java-1_7_0-openjdk-demo-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122399" comment="java-1_7_0-openjdk-devel-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122400" comment="java-1_7_0-openjdk-headless-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122401" comment="java-1_7_0-openjdk-javadoc-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122402" comment="java-1_7_0-openjdk-src-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0483</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a heap-based buffer overflow in the readImage function, which allows remote attackers to execute arbitrary code via crafted image data.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0483.html">CVE-2016-0483</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0483">SUSE bug 962743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0483">SUSE bug 963937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0483">SUSE bug 960402</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122393" comment="java-1_7_0-openjdk-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122394" comment="java-1_7_0-openjdk-accessibility-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122395" comment="java-1_7_0-openjdk-bootstrap-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122396" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122397" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122398" comment="java-1_7_0-openjdk-demo-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122399" comment="java-1_7_0-openjdk-devel-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122400" comment="java-1_7_0-openjdk-headless-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122401" comment="java-1_7_0-openjdk-javadoc-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122402" comment="java-1_7_0-openjdk-src-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0494</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0494.html">CVE-2016-0494</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0494">SUSE bug 962743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0494">SUSE bug 963937</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122393" comment="java-1_7_0-openjdk-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122394" comment="java-1_7_0-openjdk-accessibility-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122395" comment="java-1_7_0-openjdk-bootstrap-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122396" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122397" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122398" comment="java-1_7_0-openjdk-demo-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122399" comment="java-1_7_0-openjdk-devel-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122400" comment="java-1_7_0-openjdk-headless-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122401" comment="java-1_7_0-openjdk-javadoc-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122402" comment="java-1_7_0-openjdk-src-1.7.0.95-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122317" comment="java-1_8_0-openjdk-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122318" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122319" comment="java-1_8_0-openjdk-demo-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122320" comment="java-1_8_0-openjdk-devel-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122321" comment="java-1_8_0-openjdk-headless-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122322" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122323" comment="java-1_8_0-openjdk-src-1.8.0.72-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0502</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0502" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0502.html">CVE-2016-0502</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0502">SUSE bug 962937</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122905" comment="libmysql56client18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122906" comment="libmysql56client18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122907" comment="libmysql56client_r18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122908" comment="libmysql56client_r18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122909" comment="mysql-community-server-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122910" comment="mysql-community-server-bench-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122911" comment="mysql-community-server-client-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122912" comment="mysql-community-server-errormessages-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122913" comment="mysql-community-server-test-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122914" comment="mysql-community-server-tools-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0503</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0503" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2016-0504.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0503.html">CVE-2016-0503</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0503">SUSE bug 962935</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122905" comment="libmysql56client18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122906" comment="libmysql56client18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122907" comment="libmysql56client_r18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122908" comment="libmysql56client_r18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122909" comment="mysql-community-server-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122910" comment="mysql-community-server-bench-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122911" comment="mysql-community-server-client-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122912" comment="mysql-community-server-errormessages-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122913" comment="mysql-community-server-test-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122914" comment="mysql-community-server-tools-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0504</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0504" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2016-0503.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0504.html">CVE-2016-0504</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0504">SUSE bug 962930</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122905" comment="libmysql56client18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122906" comment="libmysql56client18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122907" comment="libmysql56client_r18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122908" comment="libmysql56client_r18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122909" comment="mysql-community-server-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122910" comment="mysql-community-server-bench-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122911" comment="mysql-community-server-client-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122912" comment="mysql-community-server-errormessages-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122913" comment="mysql-community-server-test-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122914" comment="mysql-community-server-tools-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0505</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Options.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0505.html">CVE-2016-0505</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 980904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0505">SUSE bug 962931</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122905" comment="libmysql56client18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122906" comment="libmysql56client18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122907" comment="libmysql56client_r18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122908" comment="libmysql56client_r18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122909" comment="mysql-community-server-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122910" comment="mysql-community-server-bench-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122911" comment="mysql-community-server-client-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122912" comment="mysql-community-server-errormessages-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122913" comment="mysql-community-server-test-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122914" comment="mysql-community-server-tools-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0546</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client.  NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that these are multiple buffer overflows in the mysqlshow tool that allow remote database servers to have unspecified impact via a long table or database name.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0546.html">CVE-2016-0546</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 980904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0546">SUSE bug 962817</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122905" comment="libmysql56client18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122906" comment="libmysql56client18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122907" comment="libmysql56client_r18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122908" comment="libmysql56client_r18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122909" comment="mysql-community-server-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122910" comment="mysql-community-server-bench-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122911" comment="mysql-community-server-client-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122912" comment="mysql-community-server-errormessages-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122913" comment="mysql-community-server-test-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122914" comment="mysql-community-server-tools-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0594</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0594" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.21 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0594.html">CVE-2016-0594</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0594">SUSE bug 962932</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122905" comment="libmysql56client18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122906" comment="libmysql56client18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122907" comment="libmysql56client_r18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122908" comment="libmysql56client_r18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122909" comment="mysql-community-server-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122910" comment="mysql-community-server-bench-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122911" comment="mysql-community-server-client-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122912" comment="mysql-community-server-errormessages-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122913" comment="mysql-community-server-test-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122914" comment="mysql-community-server-tools-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0595</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0595" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0595.html">CVE-2016-0595</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0595">SUSE bug 962934</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122905" comment="libmysql56client18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122906" comment="libmysql56client18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122907" comment="libmysql56client_r18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122908" comment="libmysql56client_r18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122909" comment="mysql-community-server-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122910" comment="mysql-community-server-bench-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122911" comment="mysql-community-server-client-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122912" comment="mysql-community-server-errormessages-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122913" comment="mysql-community-server-test-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122914" comment="mysql-community-server-tools-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0596</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0596.html">CVE-2016-0596</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 980904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0596">SUSE bug 962936</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122905" comment="libmysql56client18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122906" comment="libmysql56client18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122907" comment="libmysql56client_r18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122908" comment="libmysql56client_r18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122909" comment="mysql-community-server-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122910" comment="mysql-community-server-bench-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122911" comment="mysql-community-server-client-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122912" comment="mysql-community-server-errormessages-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122913" comment="mysql-community-server-test-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122914" comment="mysql-community-server-tools-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0597</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0597.html">CVE-2016-0597</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 980904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0597">SUSE bug 962938</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122905" comment="libmysql56client18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122906" comment="libmysql56client18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122907" comment="libmysql56client_r18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122908" comment="libmysql56client_r18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122909" comment="mysql-community-server-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122910" comment="mysql-community-server-bench-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122911" comment="mysql-community-server-client-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122912" comment="mysql-community-server-errormessages-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122913" comment="mysql-community-server-test-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122914" comment="mysql-community-server-tools-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0598</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0598.html">CVE-2016-0598</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 980904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0598">SUSE bug 962942</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122905" comment="libmysql56client18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122906" comment="libmysql56client18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122907" comment="libmysql56client_r18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122908" comment="libmysql56client_r18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122909" comment="mysql-community-server-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122910" comment="mysql-community-server-bench-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122911" comment="mysql-community-server-client-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122912" comment="mysql-community-server-errormessages-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122913" comment="mysql-community-server-test-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122914" comment="mysql-community-server-tools-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0600</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0600.html">CVE-2016-0600</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 980904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0600">SUSE bug 962943</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122905" comment="libmysql56client18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122906" comment="libmysql56client18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122907" comment="libmysql56client_r18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122908" comment="libmysql56client_r18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122909" comment="mysql-community-server-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122910" comment="mysql-community-server-bench-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122911" comment="mysql-community-server-client-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122912" comment="mysql-community-server-errormessages-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122913" comment="mysql-community-server-test-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122914" comment="mysql-community-server-tools-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0605</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0605" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0605.html">CVE-2016-0605</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0605">SUSE bug 962951</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122905" comment="libmysql56client18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122906" comment="libmysql56client18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122907" comment="libmysql56client_r18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122908" comment="libmysql56client_r18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122909" comment="mysql-community-server-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122910" comment="mysql-community-server-bench-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122911" comment="mysql-community-server-client-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122912" comment="mysql-community-server-errormessages-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122913" comment="mysql-community-server-test-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122914" comment="mysql-community-server-tools-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0606</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0606" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect integrity via unknown vectors related to encryption.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0606.html">CVE-2016-0606</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 980904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0606">SUSE bug 962947</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122905" comment="libmysql56client18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122906" comment="libmysql56client18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122907" comment="libmysql56client_r18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122908" comment="libmysql56client_r18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122909" comment="mysql-community-server-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122910" comment="mysql-community-server-bench-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122911" comment="mysql-community-server-client-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122912" comment="mysql-community-server-errormessages-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122913" comment="mysql-community-server-test-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122914" comment="mysql-community-server-tools-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0607</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0607" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to replication.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0607.html">CVE-2016-0607</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0607">SUSE bug 962949</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122905" comment="libmysql56client18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122906" comment="libmysql56client18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122907" comment="libmysql56client_r18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122908" comment="libmysql56client_r18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122909" comment="mysql-community-server-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122910" comment="mysql-community-server-bench-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122911" comment="mysql-community-server-client-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122912" comment="mysql-community-server-errormessages-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122913" comment="mysql-community-server-test-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122914" comment="mysql-community-server-tools-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0608</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0608" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to UDF.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0608.html">CVE-2016-0608</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 980904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0608">SUSE bug 962948</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122905" comment="libmysql56client18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122906" comment="libmysql56client18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122907" comment="libmysql56client_r18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122908" comment="libmysql56client_r18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122909" comment="mysql-community-server-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122910" comment="mysql-community-server-bench-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122911" comment="mysql-community-server-client-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122912" comment="mysql-community-server-errormessages-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122913" comment="mysql-community-server-test-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122914" comment="mysql-community-server-tools-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0609</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to privileges.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0609.html">CVE-2016-0609</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 980904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0609">SUSE bug 962952</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122905" comment="libmysql56client18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122906" comment="libmysql56client18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122907" comment="libmysql56client_r18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122908" comment="libmysql56client_r18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122909" comment="mysql-community-server-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122910" comment="mysql-community-server-bench-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122911" comment="mysql-community-server-client-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122912" comment="mysql-community-server-errormessages-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122913" comment="mysql-community-server-test-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122914" comment="mysql-community-server-tools-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0610</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0610" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0610" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and MariaDB before 10.0.22 and 10.1.x before 10.1.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0610.html">CVE-2016-0610</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0610">SUSE bug 962944</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122905" comment="libmysql56client18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122906" comment="libmysql56client18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122907" comment="libmysql56client_r18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122908" comment="libmysql56client_r18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122909" comment="mysql-community-server-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122910" comment="mysql-community-server-bench-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122911" comment="mysql-community-server-client-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122912" comment="mysql-community-server-errormessages-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122913" comment="mysql-community-server-test-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122914" comment="mysql-community-server-tools-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0611</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0611" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0611.html">CVE-2016-0611</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0611">SUSE bug 962939</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122905" comment="libmysql56client18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122906" comment="libmysql56client18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122907" comment="libmysql56client_r18-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122908" comment="libmysql56client_r18-32bit-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122909" comment="mysql-community-server-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122910" comment="mysql-community-server-bench-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122911" comment="mysql-community-server-client-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122912" comment="mysql-community-server-errormessages-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122913" comment="mysql-community-server-test-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122914" comment="mysql-community-server-tools-5.6.28-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0616</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0616.html">CVE-2016-0616</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962931</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962934</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962935</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962936</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962939</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962943</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962946</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962949</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962950</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 980904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0616">SUSE bug 962941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0634</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634" source="CVE"/>
    <description>
    The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0634.html">CVE-2016-0634</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0634">SUSE bug 1000396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0634">SUSE bug 1000396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0634">SUSE bug 1000396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0634">SUSE bug 1000396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0634">SUSE bug 1000396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0634">SUSE bug 1000396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0634">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0634">SUSE bug 1000396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0634">SUSE bug 1000396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0634">SUSE bug 1000396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0634">SUSE bug 1000396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0634">SUSE bug 1000396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0634">SUSE bug 1000396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0634">SUSE bug 1000396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0634">SUSE bug 1000396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0634">SUSE bug 1000396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0634">SUSE bug 1000396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0634">SUSE bug 1000396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0634">SUSE bug 1000396</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136190" comment="bash-4.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152102" comment="bash is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136191" comment="bash-devel-4.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152210" comment="bash-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136192" comment="bash-doc-4.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152103" comment="bash-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136193" comment="bash-lang-4.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152104" comment="bash-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136194" comment="bash-loadables-4.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152211" comment="bash-loadables is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136195" comment="libreadline6-6.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152107" comment="libreadline6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136196" comment="libreadline6-32bit-6.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152212" comment="libreadline6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136197" comment="readline-devel-6.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152108" comment="readline-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136198" comment="readline-devel-32bit-6.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152213" comment="readline-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136199" comment="readline-doc-6.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152109" comment="readline-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0636</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u97, 8u73, and 8u74 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to the Hotspot sub-component.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0636.html">CVE-2016-0636</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0636">SUSE bug 972468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0636">SUSE bug 972468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0636">SUSE bug 972468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0636">SUSE bug 972468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0636">SUSE bug 972468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0636">SUSE bug 972468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0636">SUSE bug 972468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0636">SUSE bug 972468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0636">SUSE bug 972468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0636">SUSE bug 972468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0636">SUSE bug 972468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0636">SUSE bug 972468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0636">SUSE bug 972468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0636">SUSE bug 979252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0636">SUSE bug 972468</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126049" comment="java-1_7_0-openjdk-1.7.0.99-28.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126050" comment="java-1_7_0-openjdk-accessibility-1.7.0.99-28.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126051" comment="java-1_7_0-openjdk-bootstrap-1.7.0.99-28.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126052" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.99-28.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126053" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.99-28.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126054" comment="java-1_7_0-openjdk-demo-1.7.0.99-28.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126055" comment="java-1_7_0-openjdk-devel-1.7.0.99-28.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126056" comment="java-1_7_0-openjdk-headless-1.7.0.99-28.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126057" comment="java-1_7_0-openjdk-javadoc-1.7.0.99-28.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126058" comment="java-1_7_0-openjdk-src-1.7.0.99-28.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126042" comment="java-1_8_0-openjdk-1.8.0.77-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126043" comment="java-1_8_0-openjdk-accessibility-1.8.0.77-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126044" comment="java-1_8_0-openjdk-demo-1.8.0.77-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126045" comment="java-1_8_0-openjdk-devel-1.8.0.77-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126046" comment="java-1_8_0-openjdk-headless-1.8.0.77-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126047" comment="java-1_8_0-openjdk-javadoc-1.8.0.77-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126048" comment="java-1_8_0-openjdk-src-1.8.0.77-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0639</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0639" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Pluggable Authentication.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0639.html">CVE-2016-0639</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0639">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0639">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0639">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0639">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0639">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0639">SUSE bug 976341</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127794" comment="libmysql56client18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127795" comment="libmysql56client18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127796" comment="libmysql56client_r18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127797" comment="libmysql56client_r18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127798" comment="mysql-community-server-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127799" comment="mysql-community-server-bench-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127800" comment="mysql-community-server-client-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127801" comment="mysql-community-server-errormessages-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127802" comment="mysql-community-server-test-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127803" comment="mysql-community-server-tools-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0640</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect integrity and availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0640.html">CVE-2016-0640</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0640">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0640">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0640">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0640">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0640">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0640">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0640">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127794" comment="libmysql56client18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127795" comment="libmysql56client18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127796" comment="libmysql56client_r18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127797" comment="libmysql56client_r18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127798" comment="mysql-community-server-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127799" comment="mysql-community-server-bench-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127800" comment="mysql-community-server-client-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127801" comment="mysql-community-server-errormessages-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127802" comment="mysql-community-server-test-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127803" comment="mysql-community-server-tools-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0641</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect confidentiality and availability via vectors related to MyISAM.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0641.html">CVE-2016-0641</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0641">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0641">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0641">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0641">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0641">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0641">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0641">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127794" comment="libmysql56client18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127795" comment="libmysql56client18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127796" comment="libmysql56client_r18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127797" comment="libmysql56client_r18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127798" comment="mysql-community-server-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127799" comment="mysql-community-server-bench-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127800" comment="mysql-community-server-client-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127801" comment="mysql-community-server-errormessages-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127802" comment="mysql-community-server-test-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127803" comment="mysql-community-server-tools-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0642</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier allows local users to affect integrity and availability via vectors related to Federated.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0642.html">CVE-2016-0642</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0642">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0642">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0642">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0642">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0642">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0642">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0642">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127794" comment="libmysql56client18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127795" comment="libmysql56client18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127796" comment="libmysql56client_r18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127797" comment="libmysql56client_r18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127798" comment="mysql-community-server-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127799" comment="mysql-community-server-bench-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127800" comment="mysql-community-server-client-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127801" comment="mysql-community-server-errormessages-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127802" comment="mysql-community-server-test-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127803" comment="mysql-community-server-tools-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0643</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect confidentiality via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0643.html">CVE-2016-0643</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0643">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0643">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0643">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0643">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0643">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0643">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0643">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127794" comment="libmysql56client18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127795" comment="libmysql56client18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127796" comment="libmysql56client_r18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127797" comment="libmysql56client_r18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127798" comment="mysql-community-server-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127799" comment="mysql-community-server-bench-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127800" comment="mysql-community-server-client-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127801" comment="mysql-community-server-errormessages-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127802" comment="mysql-community-server-test-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127803" comment="mysql-community-server-tools-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0644</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0644.html">CVE-2016-0644</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0644">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0644">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0644">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0644">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0644">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0644">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0644">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127794" comment="libmysql56client18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127795" comment="libmysql56client18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127796" comment="libmysql56client_r18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127797" comment="libmysql56client_r18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127798" comment="mysql-community-server-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127799" comment="mysql-community-server-bench-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127800" comment="mysql-community-server-client-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127801" comment="mysql-community-server-errormessages-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127802" comment="mysql-community-server-test-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127803" comment="mysql-community-server-tools-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0646</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0646.html">CVE-2016-0646</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0646">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0646">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0646">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0646">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0646">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0646">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0646">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127794" comment="libmysql56client18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127795" comment="libmysql56client18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127796" comment="libmysql56client_r18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127797" comment="libmysql56client_r18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127798" comment="mysql-community-server-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127799" comment="mysql-community-server-bench-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127800" comment="mysql-community-server-client-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127801" comment="mysql-community-server-errormessages-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127802" comment="mysql-community-server-test-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127803" comment="mysql-community-server-tools-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0647</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0647" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to FTS.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0647.html">CVE-2016-0647</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0647">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0647">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0647">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0647">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0647">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0647">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0647">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127794" comment="libmysql56client18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127795" comment="libmysql56client18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127796" comment="libmysql56client_r18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127797" comment="libmysql56client_r18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127798" comment="mysql-community-server-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127799" comment="mysql-community-server-bench-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127800" comment="mysql-community-server-client-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127801" comment="mysql-community-server-errormessages-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127802" comment="mysql-community-server-test-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127803" comment="mysql-community-server-tools-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0648</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to PS.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0648.html">CVE-2016-0648</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0648">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0648">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0648">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0648">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0648">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0648">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0648">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127794" comment="libmysql56client18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127795" comment="libmysql56client18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127796" comment="libmysql56client_r18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127797" comment="libmysql56client_r18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127798" comment="mysql-community-server-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127799" comment="mysql-community-server-bench-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127800" comment="mysql-community-server-client-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127801" comment="mysql-community-server-errormessages-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127802" comment="mysql-community-server-test-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127803" comment="mysql-community-server-tools-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0649</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to PS.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0649.html">CVE-2016-0649</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0649">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0649">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0649">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0649">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0649">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0649">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0649">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127794" comment="libmysql56client18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127795" comment="libmysql56client18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127796" comment="libmysql56client_r18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127797" comment="libmysql56client_r18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127798" comment="mysql-community-server-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127799" comment="mysql-community-server-bench-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127800" comment="mysql-community-server-client-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127801" comment="mysql-community-server-errormessages-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127802" comment="mysql-community-server-test-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127803" comment="mysql-community-server-tools-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0650</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to Replication.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0650.html">CVE-2016-0650</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0650">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0650">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0650">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0650">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0650">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0650">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0650">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127794" comment="libmysql56client18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127795" comment="libmysql56client18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127796" comment="libmysql56client_r18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127797" comment="libmysql56client_r18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127798" comment="mysql-community-server-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127799" comment="mysql-community-server-bench-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127800" comment="mysql-community-server-client-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127801" comment="mysql-community-server-errormessages-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127802" comment="mysql-community-server-test-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127803" comment="mysql-community-server-tools-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0651</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0651" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows local users to affect availability via vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0651.html">CVE-2016-0651</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0651">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0651">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0651">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0651">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0651">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0651">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0651">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0655</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier and MariaDB 10.0.x before 10.0.25 and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0655.html">CVE-2016-0655</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0655">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0655">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0655">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0655">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0655">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0655">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0655">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127794" comment="libmysql56client18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127795" comment="libmysql56client18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127796" comment="libmysql56client_r18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127797" comment="libmysql56client_r18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127798" comment="mysql-community-server-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127799" comment="mysql-community-server-bench-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127800" comment="mysql-community-server-client-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127801" comment="mysql-community-server-errormessages-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127802" comment="mysql-community-server-test-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127803" comment="mysql-community-server-tools-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0661</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0661" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier allows local users to affect availability via vectors related to Options.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0661.html">CVE-2016-0661</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0661">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0661">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0661">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0661">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0661">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0661">SUSE bug 976341</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127794" comment="libmysql56client18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127795" comment="libmysql56client18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127796" comment="libmysql56client_r18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127797" comment="libmysql56client_r18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127798" comment="mysql-community-server-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127799" comment="mysql-community-server-bench-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127800" comment="mysql-community-server-client-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127801" comment="mysql-community-server-errormessages-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127802" comment="mysql-community-server-test-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127803" comment="mysql-community-server-tools-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0665</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0665" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier allows local users to affect availability via vectors related to Security: Encryption.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0665.html">CVE-2016-0665</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0665">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0665">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0665">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0665">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0665">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0665">SUSE bug 976341</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127794" comment="libmysql56client18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127795" comment="libmysql56client18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127796" comment="libmysql56client_r18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127797" comment="libmysql56client_r18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127798" comment="mysql-community-server-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127799" comment="mysql-community-server-bench-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127800" comment="mysql-community-server-client-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127801" comment="mysql-community-server-errormessages-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127802" comment="mysql-community-server-test-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127803" comment="mysql-community-server-tools-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0666</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to Security: Privileges.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0666.html">CVE-2016-0666</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0666">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0666">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0666">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0666">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0666">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0666">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0666">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127794" comment="libmysql56client18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127795" comment="libmysql56client18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127796" comment="libmysql56client_r18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127797" comment="libmysql56client_r18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127798" comment="mysql-community-server-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127799" comment="mysql-community-server-bench-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127800" comment="mysql-community-server-client-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127801" comment="mysql-community-server-errormessages-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127802" comment="mysql-community-server-test-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127803" comment="mysql-community-server-tools-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0668</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier and MariaDB 10.0.x before 10.0.24 and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0668.html">CVE-2016-0668</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0668">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0668">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0668">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0668">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0668">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0668">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0668">SUSE bug 980904</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127794" comment="libmysql56client18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127795" comment="libmysql56client18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127796" comment="libmysql56client_r18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127797" comment="libmysql56client_r18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127798" comment="mysql-community-server-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127799" comment="mysql-community-server-bench-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127800" comment="mysql-community-server-client-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127801" comment="mysql-community-server-errormessages-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127802" comment="mysql-community-server-test-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127803" comment="mysql-community-server-tools-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0678</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0678" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0678" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 5.0.18 allows local users to affect confidentiality, integrity, and availability via vectors related to Core.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0678.html">CVE-2016-0678</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0678">SUSE bug 976636</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0678">SUSE bug 976636</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128328" comment="python-virtualbox-5.0.18-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153266" comment="python-virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128329" comment="virtualbox-5.0.18-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128330" comment="virtualbox-devel-5.0.18-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128331" comment="virtualbox-guest-desktop-icons-5.0.18-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128332" comment="virtualbox-guest-kmp-default-5.0.18_k4.1.21_14-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128333" comment="virtualbox-guest-tools-5.0.18-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128334" comment="virtualbox-guest-x11-5.0.18-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128335" comment="virtualbox-host-kmp-default-5.0.18_k4.1.21_14-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128336" comment="virtualbox-host-source-5.0.18-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128337" comment="virtualbox-qt-5.0.18-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128338" comment="virtualbox-websrv-5.0.18-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0686</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Serialization.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0686.html">CVE-2016-0686</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0686">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0686">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0686">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0686">SUSE bug 979252</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127337" comment="java-1_7_0-openjdk-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127338" comment="java-1_7_0-openjdk-accessibility-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127339" comment="java-1_7_0-openjdk-bootstrap-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127340" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127341" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127342" comment="java-1_7_0-openjdk-demo-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127343" comment="java-1_7_0-openjdk-devel-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127344" comment="java-1_7_0-openjdk-headless-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127345" comment="java-1_7_0-openjdk-javadoc-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127346" comment="java-1_7_0-openjdk-src-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127330" comment="java-1_8_0-openjdk-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127331" comment="java-1_8_0-openjdk-accessibility-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127332" comment="java-1_8_0-openjdk-demo-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127333" comment="java-1_8_0-openjdk-devel-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127334" comment="java-1_8_0-openjdk-headless-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127335" comment="java-1_8_0-openjdk-javadoc-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127336" comment="java-1_8_0-openjdk-src-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0687</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to the Hotspot sub-component.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0687.html">CVE-2016-0687</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0687">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0687">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0687">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0687">SUSE bug 979252</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127337" comment="java-1_7_0-openjdk-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127338" comment="java-1_7_0-openjdk-accessibility-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127339" comment="java-1_7_0-openjdk-bootstrap-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127340" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127341" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127342" comment="java-1_7_0-openjdk-demo-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127343" comment="java-1_7_0-openjdk-devel-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127344" comment="java-1_7_0-openjdk-headless-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127345" comment="java-1_7_0-openjdk-javadoc-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127346" comment="java-1_7_0-openjdk-src-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127330" comment="java-1_8_0-openjdk-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127331" comment="java-1_8_0-openjdk-accessibility-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127332" comment="java-1_8_0-openjdk-demo-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127333" comment="java-1_8_0-openjdk-devel-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127334" comment="java-1_8_0-openjdk-headless-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127335" comment="java-1_8_0-openjdk-javadoc-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127336" comment="java-1_8_0-openjdk-src-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0695</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality via vectors related to Security.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0695.html">CVE-2016-0695</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0695">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0695">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0695">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0695">SUSE bug 979252</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127337" comment="java-1_7_0-openjdk-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127338" comment="java-1_7_0-openjdk-accessibility-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127339" comment="java-1_7_0-openjdk-bootstrap-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127340" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127341" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127342" comment="java-1_7_0-openjdk-demo-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127343" comment="java-1_7_0-openjdk-devel-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127344" comment="java-1_7_0-openjdk-headless-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127345" comment="java-1_7_0-openjdk-javadoc-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127346" comment="java-1_7_0-openjdk-src-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127330" comment="java-1_8_0-openjdk-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127331" comment="java-1_8_0-openjdk-accessibility-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127332" comment="java-1_8_0-openjdk-demo-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127333" comment="java-1_8_0-openjdk-devel-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127334" comment="java-1_8_0-openjdk-headless-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127335" comment="java-1_8_0-openjdk-javadoc-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127336" comment="java-1_8_0-openjdk-src-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0702</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702" source="CVE"/>
    <description>
    The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0702.html">CVE-2016-0702</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 971238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 971238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 971238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 971238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 990370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 1007806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 1007806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 1007806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0702">SUSE bug 968050</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127398" comment="compat-openssl098-0.9.8j-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155163" comment="libcrypto41-2.5.3-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155219" comment="libcrypto41 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155164" comment="libcrypto41-32bit-2.5.3-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155220" comment="libcrypto41-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124397" comment="libopenssl-devel-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124398" comment="libopenssl-devel-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127399" comment="libopenssl0_9_8-0.9.8j-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127400" comment="libopenssl0_9_8-32bit-0.9.8j-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124399" comment="libopenssl1_0_0-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124400" comment="libopenssl1_0_0-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124401" comment="libopenssl1_0_0-hmac-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124402" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155165" comment="libressl-2.5.3-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152706" comment="libressl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155166" comment="libressl-devel-2.5.3-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152707" comment="libressl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155167" comment="libressl-devel-32bit-2.5.3-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152708" comment="libressl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155168" comment="libressl-devel-doc-2.5.3-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152709" comment="libressl-devel-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155169" comment="libssl43-2.5.3-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155221" comment="libssl43 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155170" comment="libssl43-32bit-2.5.3-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155222" comment="libssl43-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155171" comment="libtls15-2.5.3-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155223" comment="libtls15 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155172" comment="libtls15-32bit-2.5.3-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155224" comment="libtls15-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128870" comment="nodejs-4.4.5-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128871" comment="nodejs-devel-4.4.5-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128873" comment="nodejs-docs-4.4.5-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128874" comment="npm-4.4.5-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124403" comment="openssl-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124404" comment="openssl-doc-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0703</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0703" source="CVE"/>
    <description>
    The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0703.html">CVE-2016-0703</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 968051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 968051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 968051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 968051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 968051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 968051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 968051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 968051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 968051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 968051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 968051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 968051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 968051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 986238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 986238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 986238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 986238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0703">SUSE bug 986238</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124681" comment="compat-openssl098-0.9.8j-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124397" comment="libopenssl-devel-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124398" comment="libopenssl-devel-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124682" comment="libopenssl0_9_8-0.9.8j-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124683" comment="libopenssl0_9_8-32bit-0.9.8j-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124399" comment="libopenssl1_0_0-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124400" comment="libopenssl1_0_0-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124401" comment="libopenssl1_0_0-hmac-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124402" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124403" comment="openssl-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124404" comment="openssl-doc-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0704</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0704" source="CVE"/>
    <description>
    An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0704.html">CVE-2016-0704</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 968053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 968053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 968053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 968053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 968053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 968053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 968053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 968053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 968053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 968053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 968053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 968053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 968053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 986238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 986238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 986238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 986238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0704">SUSE bug 986238</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124681" comment="compat-openssl098-0.9.8j-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124397" comment="libopenssl-devel-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124398" comment="libopenssl-devel-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124682" comment="libopenssl0_9_8-0.9.8j-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124683" comment="libopenssl0_9_8-32bit-0.9.8j-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124399" comment="libopenssl1_0_0-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124400" comment="libopenssl1_0_0-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124401" comment="libopenssl1_0_0-hmac-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124402" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124403" comment="openssl-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124404" comment="openssl-doc-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0705</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0705" source="CVE"/>
    <description>
    Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0705.html">CVE-2016-0705</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0705">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0705">SUSE bug 968047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0705">SUSE bug 968047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0705">SUSE bug 968047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0705">SUSE bug 968047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0705">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0705">SUSE bug 968047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0705">SUSE bug 968047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0705">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0705">SUSE bug 968047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0705">SUSE bug 968047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0705">SUSE bug 968047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0705">SUSE bug 968047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0705">SUSE bug 968047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0705">SUSE bug 971238</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0705">SUSE bug 968047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0705">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0705">SUSE bug 968047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0705">SUSE bug 968047</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127794" comment="libmysql56client18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127795" comment="libmysql56client18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127796" comment="libmysql56client_r18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127797" comment="libmysql56client_r18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124397" comment="libopenssl-devel-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124398" comment="libopenssl-devel-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124399" comment="libopenssl1_0_0-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124400" comment="libopenssl1_0_0-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124401" comment="libopenssl1_0_0-hmac-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124402" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127798" comment="mysql-community-server-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127799" comment="mysql-community-server-bench-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127800" comment="mysql-community-server-client-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127801" comment="mysql-community-server-errormessages-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127802" comment="mysql-community-server-test-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127803" comment="mysql-community-server-tools-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128870" comment="nodejs-4.4.5-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128871" comment="nodejs-devel-4.4.5-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128873" comment="nodejs-docs-4.4.5-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128874" comment="npm-4.4.5-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124403" comment="openssl-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124404" comment="openssl-doc-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0706</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0706" source="CVE"/>
    <description>
    Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0706.html">CVE-2016-0706</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0706">SUSE bug 967815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0706">SUSE bug 967815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0706">SUSE bug 967815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0706">SUSE bug 967815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0706">SUSE bug 967815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0706">SUSE bug 967815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0706">SUSE bug 988489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0706">SUSE bug 967815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0706">SUSE bug 967815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0706">SUSE bug 967815</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125308" comment="tomcat-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125309" comment="tomcat-admin-webapps-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125310" comment="tomcat-docs-webapp-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125311" comment="tomcat-el-3_0-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125312" comment="tomcat-embed-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125313" comment="tomcat-javadoc-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125314" comment="tomcat-jsp-2_3-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125315" comment="tomcat-jsvc-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125316" comment="tomcat-lib-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125317" comment="tomcat-servlet-3_1-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152853" comment="tomcat-servlet-3_1-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125318" comment="tomcat-webapps-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0714</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0714" source="CVE"/>
    <description>
    The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0714.html">CVE-2016-0714</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0714">SUSE bug 967964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0714">SUSE bug 967964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0714">SUSE bug 967964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0714">SUSE bug 967964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0714">SUSE bug 967964</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125308" comment="tomcat-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125309" comment="tomcat-admin-webapps-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125310" comment="tomcat-docs-webapp-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125311" comment="tomcat-el-3_0-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125312" comment="tomcat-embed-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125313" comment="tomcat-javadoc-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125314" comment="tomcat-jsp-2_3-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125315" comment="tomcat-jsvc-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125316" comment="tomcat-lib-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125317" comment="tomcat-servlet-3_1-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152853" comment="tomcat-servlet-3_1-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125318" comment="tomcat-webapps-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0718</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718" source="CVE"/>
    <description>
    Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0718.html">CVE-2016-0718</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0718">SUSE bug 979441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0718">SUSE bug 979441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0718">SUSE bug 979441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0718">SUSE bug 979441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0718">SUSE bug 979441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0718">SUSE bug 979441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0718">SUSE bug 979441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0718">SUSE bug 979441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0718">SUSE bug 979441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0718">SUSE bug 979441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0718">SUSE bug 979441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0718">SUSE bug 979441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0718">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0718">SUSE bug 979441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0718">SUSE bug 979441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0718">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128464" comment="expat-2.1.0-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151330" comment="expat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128469" comment="libexpat-devel-2.1.0-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151331" comment="libexpat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128553" comment="libexpat-devel-32bit-2.1.0-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151785" comment="libexpat-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128465" comment="libexpat1-2.1.0-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128466" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151333" comment="libexpat1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0723</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0723" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0723" source="CVE"/>
    <description>
    Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0723.html">CVE-2016-0723</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0723">SUSE bug 961500</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126059" comment="kernel-debug-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126060" comment="kernel-debug-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126061" comment="kernel-debug-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126062" comment="kernel-default-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126063" comment="kernel-default-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126064" comment="kernel-default-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126065" comment="kernel-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126066" comment="kernel-docs-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126067" comment="kernel-docs-html-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126068" comment="kernel-docs-pdf-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126069" comment="kernel-ec2-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126070" comment="kernel-ec2-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126071" comment="kernel-ec2-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126072" comment="kernel-macros-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126073" comment="kernel-obs-build-4.1.20-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126074" comment="kernel-obs-qa-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126075" comment="kernel-obs-qa-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126076" comment="kernel-pae-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126077" comment="kernel-pae-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126078" comment="kernel-pae-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126079" comment="kernel-pv-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126080" comment="kernel-pv-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126081" comment="kernel-pv-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126082" comment="kernel-source-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126083" comment="kernel-source-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126084" comment="kernel-syms-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126085" comment="kernel-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126086" comment="kernel-vanilla-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126087" comment="kernel-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126088" comment="kernel-xen-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126089" comment="kernel-xen-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0728</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0728" source="CVE"/>
    <description>
    The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0728.html">CVE-2016-0728</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 923755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 963994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0728">SUSE bug 962075</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122451" comment="kernel-debug-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122452" comment="kernel-debug-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122453" comment="kernel-debug-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122454" comment="kernel-default-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122455" comment="kernel-default-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122456" comment="kernel-default-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122457" comment="kernel-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122458" comment="kernel-docs-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122459" comment="kernel-docs-html-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122460" comment="kernel-docs-pdf-4.1.15-8.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122461" comment="kernel-ec2-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122462" comment="kernel-ec2-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122463" comment="kernel-ec2-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122464" comment="kernel-macros-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122465" comment="kernel-obs-build-4.1.15-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122466" comment="kernel-obs-qa-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122467" comment="kernel-obs-qa-xen-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122468" comment="kernel-pae-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122469" comment="kernel-pae-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122470" comment="kernel-pae-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122471" comment="kernel-pv-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122472" comment="kernel-pv-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122473" comment="kernel-pv-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122474" comment="kernel-source-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122475" comment="kernel-source-vanilla-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122476" comment="kernel-syms-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122477" comment="kernel-vanilla-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122478" comment="kernel-vanilla-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122479" comment="kernel-xen-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122480" comment="kernel-xen-base-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122481" comment="kernel-xen-devel-4.1.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0729</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0729" source="CVE"/>
    <description>
    Multiple buffer overflows in (1) internal/XMLReader.cpp, (2) util/XMLURL.cpp, and (3) util/XMLUri.cpp in the XML Parser library in Apache Xerces-C before 3.1.3 allow remote attackers to cause a denial of service (segmentation fault or memory corruption) or possibly execute arbitrary code via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0729.html">CVE-2016-0729</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0729">SUSE bug 966822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0729">SUSE bug 966822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0729">SUSE bug 966822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0729">SUSE bug 966822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0729">SUSE bug 966822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0729">SUSE bug 966822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0729">SUSE bug 966822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0729">SUSE bug 966822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0729">SUSE bug 966822</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126691" comment="libxerces-c-3_1-3.1.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151260" comment="libxerces-c-3_1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126692" comment="libxerces-c-3_1-32bit-3.1.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153271" comment="libxerces-c-3_1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126693" comment="libxerces-c-devel-3.1.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153272" comment="libxerces-c-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126694" comment="xerces-c-3.1.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153273" comment="xerces-c is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0736</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0736" source="CVE"/>
    <description>
    In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0736.html">CVE-2016-0736</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0736">SUSE bug 1016712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0736">SUSE bug 1016712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0736">SUSE bug 1016712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0736">SUSE bug 1016712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0736">SUSE bug 1016712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0736">SUSE bug 1016712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0736">SUSE bug 1016712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0736">SUSE bug 1016712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0736">SUSE bug 1016712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0736">SUSE bug 1016712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0736">SUSE bug 1033513</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0736">SUSE bug 1016712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0736">SUSE bug 1016712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0736">SUSE bug 1016712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0736">SUSE bug 1016712</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150390" comment="apache2-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150391" comment="apache2-devel-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150392" comment="apache2-doc-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150393" comment="apache2-event-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150394" comment="apache2-example-pages-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150395" comment="apache2-prefork-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150396" comment="apache2-utils-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150397" comment="apache2-worker-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0739</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0739" source="CVE"/>
    <description>
    libssh before 0.7.3 improperly truncates ephemeral secrets generated for the (1) diffie-hellman-group1 and (2) diffie-hellman-group14 key exchange methods to 128 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0739.html">CVE-2016-0739</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0739">SUSE bug 965875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0739">SUSE bug 965875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0739">SUSE bug 965875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0739">SUSE bug 965875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0739">SUSE bug 967026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0739">SUSE bug 965875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0739">SUSE bug 965875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0739">SUSE bug 965875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0739">SUSE bug 965875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0739">SUSE bug 965875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0739">SUSE bug 967026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0739">SUSE bug 965875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0739">SUSE bug 965875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0739">SUSE bug 967026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0739">SUSE bug 965875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0739">SUSE bug 965875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0739">SUSE bug 965875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0739">SUSE bug 967026</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124684" comment="libssh-0.6.3-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153276" comment="libssh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124685" comment="libssh-devel-0.6.3-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151771" comment="libssh-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124686" comment="libssh-devel-doc-0.6.3-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153277" comment="libssh-devel-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124687" comment="libssh4-0.6.3-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151772" comment="libssh4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124688" comment="libssh4-32bit-0.6.3-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153278" comment="libssh4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0740</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0740" source="CVE"/>
    <description>
    Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0740.html">CVE-2016-0740</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0740">SUSE bug 965579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0740">SUSE bug 965579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0740">SUSE bug 965579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0740">SUSE bug 965579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0740">SUSE bug 965582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0740">SUSE bug 965579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0740">SUSE bug 965579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0740">SUSE bug 965582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0740">SUSE bug 965579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0740">SUSE bug 965579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0740">SUSE bug 965579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0740">SUSE bug 965579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0740">SUSE bug 965582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0740">SUSE bug 965579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0740">SUSE bug 965579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0740">SUSE bug 965579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0740">SUSE bug 965579</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124773" comment="python-Pillow-2.9.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152140" comment="python-Pillow is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124774" comment="python-Pillow-tk-2.9.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153279" comment="python-Pillow-tk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0742</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0742" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0742" source="CVE"/>
    <description>
    The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0742.html">CVE-2016-0742</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0742">SUSE bug 963781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0742">SUSE bug 963781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0742">SUSE bug 963781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0742">SUSE bug 963781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0742">SUSE bug 963781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0742">SUSE bug 963781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0742">SUSE bug 963781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0742">SUSE bug 963781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0742">SUSE bug 963781</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0742">SUSE bug 963781</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123008" comment="nginx-1.8.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153280" comment="nginx is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0746</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0746" source="CVE"/>
    <description>
    Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0746.html">CVE-2016-0746</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0746">SUSE bug 963778</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0746">SUSE bug 963778</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0746">SUSE bug 963778</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0746">SUSE bug 963778</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0746">SUSE bug 963778</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0746">SUSE bug 963778</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0746">SUSE bug 963778</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0746">SUSE bug 963778</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123008" comment="nginx-1.8.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153280" comment="nginx is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0747</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0747" source="CVE"/>
    <description>
    The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 does not properly limit CNAME resolution, which allows remote attackers to cause a denial of service (worker process resource consumption) via vectors related to arbitrary name resolution.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0747.html">CVE-2016-0747</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0747">SUSE bug 963775</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0747">SUSE bug 963775</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0747">SUSE bug 963775</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0747">SUSE bug 963775</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0747">SUSE bug 963775</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0747">SUSE bug 963775</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0747">SUSE bug 963775</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123008" comment="nginx-1.8.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153280" comment="nginx is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0749</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0749" source="CVE"/>
    <description>
    The smartcard interaction in SPICE allows remote attackers to cause a denial of service (QEMU-KVM process crash) or possibly execute arbitrary code via vectors related to connecting to a guest VM, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0749.html">CVE-2016-0749</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0749">SUSE bug 982385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0749">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0749">SUSE bug 982385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0749">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0749">SUSE bug 982385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0749">SUSE bug 982385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0749">SUSE bug 982385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0749">SUSE bug 982385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0749">SUSE bug 982385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0749">SUSE bug 982385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0749">SUSE bug 982385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0749">SUSE bug 982385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0749">SUSE bug 982385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0749">SUSE bug 982385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0749">SUSE bug 982385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0749">SUSE bug 982385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0749">SUSE bug 982385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0749">SUSE bug 982385</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129718" comment="libspice-server-devel-0.12.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153281" comment="libspice-server-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129719" comment="libspice-server1-0.12.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151923" comment="libspice-server1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129720" comment="spice-0.12.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153282" comment="spice is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129721" comment="spice-client-0.12.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153283" comment="spice-client is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0751</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0751" source="CVE"/>
    <description>
    actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0751.html">CVE-2016-0751</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0751">SUSE bug 963331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0751">SUSE bug 963331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0751">SUSE bug 963331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0751">SUSE bug 963331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0751">SUSE bug 963331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0751">SUSE bug 963331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0751">SUSE bug 963331</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0751">SUSE bug 963331</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122993" comment="ruby2.1-rubygem-actionpack-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153070" comment="ruby2.1-rubygem-actionpack-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122994" comment="ruby2.1-rubygem-actionpack-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153071" comment="ruby2.1-rubygem-actionpack-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122995" comment="ruby2.1-rubygem-actionview-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153072" comment="ruby2.1-rubygem-actionview-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122996" comment="ruby2.1-rubygem-actionview-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153073" comment="ruby2.1-rubygem-actionview-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122997" comment="ruby2.1-rubygem-activemodel-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153074" comment="ruby2.1-rubygem-activemodel-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122998" comment="ruby2.1-rubygem-activemodel-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153075" comment="ruby2.1-rubygem-activemodel-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122999" comment="ruby2.1-rubygem-activerecord-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153076" comment="ruby2.1-rubygem-activerecord-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123000" comment="ruby2.1-rubygem-activerecord-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153077" comment="ruby2.1-rubygem-activerecord-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123001" comment="ruby2.1-rubygem-activesupport-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153078" comment="ruby2.1-rubygem-activesupport-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123002" comment="ruby2.1-rubygem-activesupport-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153079" comment="ruby2.1-rubygem-activesupport-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123003" comment="rubygem-actionpack-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153080" comment="rubygem-actionpack-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123004" comment="rubygem-actionview-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153081" comment="rubygem-actionview-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123005" comment="rubygem-activemodel-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153082" comment="rubygem-activemodel-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123006" comment="rubygem-activerecord-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153083" comment="rubygem-activerecord-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123007" comment="rubygem-activesupport-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153084" comment="rubygem-activesupport-4_2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0752</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0752" source="CVE"/>
    <description>
    Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0752.html">CVE-2016-0752</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0752">SUSE bug 963332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0752">SUSE bug 963332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0752">SUSE bug 963332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0752">SUSE bug 963332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0752">SUSE bug 963332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0752">SUSE bug 963332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0752">SUSE bug 963332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0752">SUSE bug 968850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0752">SUSE bug 963332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0752">SUSE bug 963332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0752">SUSE bug 968850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0752">SUSE bug 968850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0752">SUSE bug 963332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0752">SUSE bug 968850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0752">SUSE bug 963332</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122993" comment="ruby2.1-rubygem-actionpack-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153070" comment="ruby2.1-rubygem-actionpack-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122994" comment="ruby2.1-rubygem-actionpack-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153071" comment="ruby2.1-rubygem-actionpack-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122995" comment="ruby2.1-rubygem-actionview-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153072" comment="ruby2.1-rubygem-actionview-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122996" comment="ruby2.1-rubygem-actionview-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153073" comment="ruby2.1-rubygem-actionview-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122997" comment="ruby2.1-rubygem-activemodel-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153074" comment="ruby2.1-rubygem-activemodel-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122998" comment="ruby2.1-rubygem-activemodel-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153075" comment="ruby2.1-rubygem-activemodel-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122999" comment="ruby2.1-rubygem-activerecord-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153076" comment="ruby2.1-rubygem-activerecord-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123000" comment="ruby2.1-rubygem-activerecord-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153077" comment="ruby2.1-rubygem-activerecord-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123001" comment="ruby2.1-rubygem-activesupport-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153078" comment="ruby2.1-rubygem-activesupport-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123002" comment="ruby2.1-rubygem-activesupport-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153079" comment="ruby2.1-rubygem-activesupport-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123003" comment="rubygem-actionpack-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153080" comment="rubygem-actionpack-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123004" comment="rubygem-actionview-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153081" comment="rubygem-actionview-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123005" comment="rubygem-activemodel-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153082" comment="rubygem-activemodel-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123006" comment="rubygem-activerecord-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153083" comment="rubygem-activerecord-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123007" comment="rubygem-activesupport-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153084" comment="rubygem-activesupport-4_2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0753</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0753" source="CVE"/>
    <description>
    Active Model in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level writers for class accessors, which allows remote attackers to bypass intended validation steps via crafted parameters.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0753.html">CVE-2016-0753</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0753">SUSE bug 963334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0753">SUSE bug 963334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0753">SUSE bug 963334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0753">SUSE bug 963334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0753">SUSE bug 963334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0753">SUSE bug 963334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0753">SUSE bug 963334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0753">SUSE bug 963334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0753">SUSE bug 963334</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122993" comment="ruby2.1-rubygem-actionpack-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153070" comment="ruby2.1-rubygem-actionpack-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122994" comment="ruby2.1-rubygem-actionpack-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153071" comment="ruby2.1-rubygem-actionpack-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122995" comment="ruby2.1-rubygem-actionview-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153072" comment="ruby2.1-rubygem-actionview-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122996" comment="ruby2.1-rubygem-actionview-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153073" comment="ruby2.1-rubygem-actionview-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122997" comment="ruby2.1-rubygem-activemodel-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153074" comment="ruby2.1-rubygem-activemodel-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122998" comment="ruby2.1-rubygem-activemodel-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153075" comment="ruby2.1-rubygem-activemodel-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122999" comment="ruby2.1-rubygem-activerecord-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153076" comment="ruby2.1-rubygem-activerecord-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123000" comment="ruby2.1-rubygem-activerecord-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153077" comment="ruby2.1-rubygem-activerecord-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123001" comment="ruby2.1-rubygem-activesupport-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153078" comment="ruby2.1-rubygem-activesupport-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123002" comment="ruby2.1-rubygem-activesupport-doc-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153079" comment="ruby2.1-rubygem-activesupport-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123003" comment="rubygem-actionpack-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153080" comment="rubygem-actionpack-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123004" comment="rubygem-actionview-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153081" comment="rubygem-actionview-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123005" comment="rubygem-activemodel-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153082" comment="rubygem-activemodel-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123006" comment="rubygem-activerecord-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153083" comment="rubygem-activerecord-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123007" comment="rubygem-activesupport-4_2-4.2.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153084" comment="rubygem-activesupport-4_2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0755</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755" source="CVE"/>
    <description>
    The ConnectionExists function in lib/url.c in libcurl before 7.47.0 does not properly re-use NTLM-authenticated proxy connections, which might allow remote attackers to authenticate as other users via a request, a similar issue to CVE-2014-0015.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0755.html">CVE-2016-0755</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0755">SUSE bug 962983</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0755">SUSE bug 962983</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0755">SUSE bug 962983</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0755">SUSE bug 962983</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0755">SUSE bug 962983</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0755">SUSE bug 962983</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122930" comment="curl-7.37.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122931" comment="libcurl-devel-7.37.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122932" comment="libcurl-devel-32bit-7.37.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122933" comment="libcurl4-7.37.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122934" comment="libcurl4-32bit-7.37.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0758</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0758" source="CVE"/>
    <description>
    Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0758.html">CVE-2016-0758</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 980856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 980856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 980856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 980856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 980856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 980856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 980856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 980856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 980856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 980856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0758">SUSE bug 979867</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129149" comment="kernel-debug-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129150" comment="kernel-debug-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129151" comment="kernel-debug-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129152" comment="kernel-default-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129153" comment="kernel-default-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129154" comment="kernel-default-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129155" comment="kernel-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129156" comment="kernel-docs-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129157" comment="kernel-docs-html-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129158" comment="kernel-docs-pdf-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129159" comment="kernel-ec2-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129160" comment="kernel-ec2-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129161" comment="kernel-ec2-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129162" comment="kernel-macros-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129163" comment="kernel-obs-build-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129164" comment="kernel-obs-qa-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129165" comment="kernel-obs-qa-xen-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129166" comment="kernel-pae-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129167" comment="kernel-pae-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129168" comment="kernel-pae-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129169" comment="kernel-pv-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129170" comment="kernel-pv-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129171" comment="kernel-pv-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129172" comment="kernel-source-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129173" comment="kernel-source-vanilla-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129174" comment="kernel-syms-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129175" comment="kernel-vanilla-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129176" comment="kernel-vanilla-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129177" comment="kernel-xen-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129178" comment="kernel-xen-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129179" comment="kernel-xen-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0762</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0762" source="CVE"/>
    <description>
    The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0762.html">CVE-2016-0762</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0762">SUSE bug 1007854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0762">SUSE bug 1007854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0762">SUSE bug 1007854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0762">SUSE bug 1007854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0762">SUSE bug 1007854</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142899" comment="apache-commons-dbcp-2.1.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153286" comment="apache-commons-dbcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142900" comment="apache-commons-dbcp-javadoc-2.1.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153287" comment="apache-commons-dbcp-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142901" comment="apache-commons-pool2-2.4.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153288" comment="apache-commons-pool2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142902" comment="apache-commons-pool2-javadoc-2.4.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153289" comment="apache-commons-pool2-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142903" comment="tomcat-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142904" comment="tomcat-admin-webapps-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142905" comment="tomcat-docs-webapp-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142906" comment="tomcat-el-3_0-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142907" comment="tomcat-embed-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142908" comment="tomcat-javadoc-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142909" comment="tomcat-jsp-2_3-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142910" comment="tomcat-jsvc-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142911" comment="tomcat-lib-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142912" comment="tomcat-servlet-3_1-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152853" comment="tomcat-servlet-3_1-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142913" comment="tomcat-webapps-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0763</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0763" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0763" source="CVE"/>
    <description>
    The setGlobalContext method in org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M3 does not consider whether ResourceLinkFactory.setGlobalContext callers are authorized, which allows remote authenticated users to bypass intended SecurityManager restrictions and read or write to arbitrary application data, or cause a denial of service (application disruption), via a web application that sets a crafted global context.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0763.html">CVE-2016-0763</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0763">SUSE bug 967966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0763">SUSE bug 967966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0763">SUSE bug 967966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0763">SUSE bug 967966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0763">SUSE bug 967966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0763">SUSE bug 967966</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125308" comment="tomcat-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125309" comment="tomcat-admin-webapps-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125310" comment="tomcat-docs-webapp-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125311" comment="tomcat-el-3_0-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125312" comment="tomcat-embed-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125313" comment="tomcat-javadoc-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125314" comment="tomcat-jsp-2_3-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125315" comment="tomcat-jsvc-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125316" comment="tomcat-lib-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125317" comment="tomcat-servlet-3_1-api-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152853" comment="tomcat-servlet-3_1-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125318" comment="tomcat-webapps-8.0.32-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0766</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766" source="CVE"/>
    <description>
    PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 does not properly restrict access to unspecified custom configuration settings (GUCS) for PL/Java, which allows attackers to gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0766.html">CVE-2016-0766</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 966435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 966435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 966435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 966435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 966435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 966435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 966435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 966435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 966435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 978323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 978323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 978323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 978323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 978323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 978323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 978323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 978323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0766">SUSE bug 978323</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123832" comment="libecpg6-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123833" comment="libecpg6-32bit-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151070" comment="libecpg6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123834" comment="libpq5-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123835" comment="libpq5-32bit-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123633" comment="postgresql-init-9.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151073" comment="postgresql-init is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123634" comment="postgresql93-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151074" comment="postgresql93 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123635" comment="postgresql93-contrib-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151075" comment="postgresql93-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123636" comment="postgresql93-devel-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151076" comment="postgresql93-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123637" comment="postgresql93-docs-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151077" comment="postgresql93-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123638" comment="postgresql93-libs-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151078" comment="postgresql93-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123639" comment="postgresql93-plperl-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151079" comment="postgresql93-plperl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123640" comment="postgresql93-plpython-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151080" comment="postgresql93-plpython is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123641" comment="postgresql93-pltcl-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151081" comment="postgresql93-pltcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123642" comment="postgresql93-server-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151082" comment="postgresql93-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123643" comment="postgresql93-test-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151083" comment="postgresql93-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123836" comment="postgresql94-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123837" comment="postgresql94-contrib-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123838" comment="postgresql94-devel-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123839" comment="postgresql94-docs-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123840" comment="postgresql94-libs-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151088" comment="postgresql94-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123841" comment="postgresql94-plperl-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151089" comment="postgresql94-plperl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123842" comment="postgresql94-plpython-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151090" comment="postgresql94-plpython is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123843" comment="postgresql94-pltcl-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151091" comment="postgresql94-pltcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123844" comment="postgresql94-server-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123845" comment="postgresql94-test-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151093" comment="postgresql94-test is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0772</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772" source="CVE"/>
    <description>
    The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0772.html">CVE-2016-0772</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0772">SUSE bug 984751</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130675" comment="libpython2_7-1_0-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130676" comment="libpython2_7-1_0-32bit-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134104" comment="libpython3_4m1_0-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151646" comment="libpython3_4m1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134105" comment="libpython3_4m1_0-32bit-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152170" comment="libpython3_4m1_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130677" comment="python-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130678" comment="python-32bit-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153290" comment="python-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130679" comment="python-base-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130680" comment="python-base-32bit-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153291" comment="python-base-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130681" comment="python-curses-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130682" comment="python-demo-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153292" comment="python-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130683" comment="python-devel-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130684" comment="python-doc-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153293" comment="python-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130685" comment="python-doc-pdf-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153294" comment="python-doc-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130686" comment="python-gdbm-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130687" comment="python-idle-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153295" comment="python-idle is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130688" comment="python-tk-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153296" comment="python-tk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130689" comment="python-xml-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134106" comment="python3-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134107" comment="python3-32bit-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134108" comment="python3-base-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134109" comment="python3-base-32bit-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134110" comment="python3-curses-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134111" comment="python3-dbm-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134112" comment="python3-devel-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134113" comment="python3-doc-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134114" comment="python3-doc-pdf-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152175" comment="python3-doc-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134115" comment="python3-idle-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134116" comment="python3-testsuite-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134117" comment="python3-tk-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134118" comment="python3-tools-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0773</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773" source="CVE"/>
    <description>
    PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 allows remote attackers to cause a denial of service (infinite loop or buffer overflow and crash) via a large Unicode character range in a regular expression.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0773.html">CVE-2016-0773</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 966435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 966435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 978323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 978323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 978323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 978323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 978323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 978323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 978323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 978323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 966436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 978323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 983246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 983246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 983246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 983246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 983246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 983246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0773">SUSE bug 986409</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123832" comment="libecpg6-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123833" comment="libecpg6-32bit-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151070" comment="libecpg6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123834" comment="libpq5-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123835" comment="libpq5-32bit-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123633" comment="postgresql-init-9.4-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151073" comment="postgresql-init is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123634" comment="postgresql93-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151074" comment="postgresql93 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123635" comment="postgresql93-contrib-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151075" comment="postgresql93-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123636" comment="postgresql93-devel-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151076" comment="postgresql93-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123637" comment="postgresql93-docs-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151077" comment="postgresql93-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123638" comment="postgresql93-libs-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151078" comment="postgresql93-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123639" comment="postgresql93-plperl-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151079" comment="postgresql93-plperl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123640" comment="postgresql93-plpython-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151080" comment="postgresql93-plpython is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123641" comment="postgresql93-pltcl-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151081" comment="postgresql93-pltcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123642" comment="postgresql93-server-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151082" comment="postgresql93-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123643" comment="postgresql93-test-9.3.11-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151083" comment="postgresql93-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123836" comment="postgresql94-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123837" comment="postgresql94-contrib-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123838" comment="postgresql94-devel-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123839" comment="postgresql94-docs-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123840" comment="postgresql94-libs-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151088" comment="postgresql94-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123841" comment="postgresql94-plperl-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151089" comment="postgresql94-plperl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123842" comment="postgresql94-plpython-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151090" comment="postgresql94-plpython is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123843" comment="postgresql94-pltcl-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151091" comment="postgresql94-pltcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123844" comment="postgresql94-server-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123845" comment="postgresql94-test-9.4.6-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151093" comment="postgresql94-test is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0775</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0775" source="CVE"/>
    <description>
    Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0775.html">CVE-2016-0775</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0775">SUSE bug 965582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0775">SUSE bug 965582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0775">SUSE bug 965582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0775">SUSE bug 965579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0775">SUSE bug 965582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0775">SUSE bug 965582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0775">SUSE bug 965579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0775">SUSE bug 965582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0775">SUSE bug 965582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0775">SUSE bug 965582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0775">SUSE bug 965579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0775">SUSE bug 965582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0775">SUSE bug 965582</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124773" comment="python-Pillow-2.9.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152140" comment="python-Pillow is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124774" comment="python-Pillow-tk-2.9.0-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153279" comment="python-Pillow-tk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0777</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777" source="CVE"/>
    <description>
    The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0777.html">CVE-2016-0777</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0777">SUSE bug 961642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0777">SUSE bug 961642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0777">SUSE bug 961642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0777">SUSE bug 961642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0777">SUSE bug 961642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0777">SUSE bug 961642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0777">SUSE bug 961642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0777">SUSE bug 961642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0777">SUSE bug 996040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0777">SUSE bug 1087412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0777">SUSE bug 1087412</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121500" comment="openssh-6.6p1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121501" comment="openssh-askpass-gnome-6.6p1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153167" comment="openssh-askpass-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121502" comment="openssh-cavs-6.6p1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153168" comment="openssh-cavs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121503" comment="openssh-fips-6.6p1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153169" comment="openssh-fips is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121504" comment="openssh-helpers-6.6p1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152111" comment="openssh-helpers is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0778</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0778" source="CVE"/>
    <description>
    The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0778.html">CVE-2016-0778</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0778">SUSE bug 961645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0778">SUSE bug 961645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0778">SUSE bug 961645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0778">SUSE bug 961645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0778">SUSE bug 961645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0778">SUSE bug 961645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0778">SUSE bug 961645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0778">SUSE bug 996040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0778">SUSE bug 1087412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0778">SUSE bug 1087412</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121500" comment="openssh-6.6p1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121501" comment="openssh-askpass-gnome-6.6p1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153167" comment="openssh-askpass-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121502" comment="openssh-cavs-6.6p1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153168" comment="openssh-cavs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121503" comment="openssh-fips-6.6p1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153169" comment="openssh-fips is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121504" comment="openssh-helpers-6.6p1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152111" comment="openssh-helpers is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0787</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0787" source="CVE"/>
    <description>
    The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0787.html">CVE-2016-0787</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 967026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 967026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 967026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 967026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 967026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 968174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 968174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 968174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 967026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 968174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 967026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 967026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 967026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 967026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 967026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 967026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 974691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 967026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 967026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 967026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 967026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0787">SUSE bug 967026</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125371" comment="libssh2-1-1.4.3-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125372" comment="libssh2-1-32bit-1.4.3-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125373" comment="libssh2-devel-1.4.3-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125374" comment="libssh2_org-1.4.3-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153299" comment="libssh2_org is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0794</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0794" source="CVE"/>
    <description>
    The lwp filter in LibreOffice before 5.0.4 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted LotusWordPro (lwp) document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0794.html">CVE-2016-0794</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0794">SUSE bug 967014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0794">SUSE bug 967014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0794">SUSE bug 967014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0794">SUSE bug 967015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0794">SUSE bug 967014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0794">SUSE bug 967014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0794">SUSE bug 967014</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130102" comment="cmis-client-0.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153300" comment="cmis-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130103" comment="hunspell-1.3.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153301" comment="hunspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130104" comment="hunspell-32bit-1.3.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153302" comment="hunspell-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130105" comment="hunspell-devel-1.3.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153303" comment="hunspell-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130106" comment="hunspell-devel-32bit-1.3.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153304" comment="hunspell-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130107" comment="hunspell-static-1.3.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153305" comment="hunspell-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130108" comment="hunspell-tools-1.3.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153306" comment="hunspell-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130109" comment="hyphen-2.8.8-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153307" comment="hyphen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130110" comment="hyphen-devel-2.8.8-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153308" comment="hyphen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130111" comment="libcmis-0_5-5-0.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153309" comment="libcmis-0_5-5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130112" comment="libcmis-c-0_5-5-0.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153310" comment="libcmis-c-0_5-5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130113" comment="libcmis-c-devel-0.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153311" comment="libcmis-c-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130114" comment="libcmis-devel-0.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153312" comment="libcmis-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130115" comment="libetonyek-0.1.6-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153313" comment="libetonyek is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130116" comment="libetonyek-0_1-1-0.1.6-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153314" comment="libetonyek-0_1-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130117" comment="libetonyek-devel-0.1.6-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153315" comment="libetonyek-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130118" comment="libetonyek-devel-doc-0.1.6-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153316" comment="libetonyek-devel-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130119" comment="libetonyek-tools-0.1.6-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153317" comment="libetonyek-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130120" comment="libhyphen0-2.8.8-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153318" comment="libhyphen0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130121" comment="libhyphen0-32bit-2.8.8-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153319" comment="libhyphen0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130122" comment="libixion-0.11.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153320" comment="libixion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130123" comment="libixion-0_11-0-0.11.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153321" comment="libixion-0_11-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130124" comment="libixion-devel-0.11.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153322" comment="libixion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130125" comment="libixion-python3-0.11.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153323" comment="libixion-python3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130126" comment="libixion-tools-0.11.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153324" comment="libixion-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130127" comment="liborcus-0.11.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153325" comment="liborcus is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130128" comment="liborcus-0_11-0-0.11.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153326" comment="liborcus-0_11-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130129" comment="liborcus-devel-0.11.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153327" comment="liborcus-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130130" comment="liborcus-python3-0.11.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153328" comment="liborcus-python3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130131" comment="liborcus-tools-0.11.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153329" comment="liborcus-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130132" comment="libreoffice-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130133" comment="libreoffice-base-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130134" comment="libreoffice-base-drivers-mysql-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151464" comment="libreoffice-base-drivers-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130135" comment="libreoffice-base-drivers-postgresql-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153330" comment="libreoffice-base-drivers-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130136" comment="libreoffice-branding-upstream-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130137" comment="libreoffice-calc-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130138" comment="libreoffice-calc-extensions-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130139" comment="libreoffice-draw-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130140" comment="libreoffice-filters-optional-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130141" comment="libreoffice-gdb-pretty-printers-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153331" comment="libreoffice-gdb-pretty-printers is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130142" comment="libreoffice-glade-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153332" comment="libreoffice-glade is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130143" comment="libreoffice-gnome-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130144" comment="libreoffice-gtk3-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153333" comment="libreoffice-gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130145" comment="libreoffice-icon-theme-breeze-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151471" comment="libreoffice-icon-theme-breeze is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130146" comment="libreoffice-icon-theme-galaxy-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151472" comment="libreoffice-icon-theme-galaxy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130147" comment="libreoffice-icon-theme-hicontrast-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151473" comment="libreoffice-icon-theme-hicontrast is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130148" comment="libreoffice-icon-theme-oxygen-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151474" comment="libreoffice-icon-theme-oxygen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130149" comment="libreoffice-icon-theme-sifr-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151475" comment="libreoffice-icon-theme-sifr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130150" comment="libreoffice-icon-theme-tango-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151476" comment="libreoffice-icon-theme-tango is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130151" comment="libreoffice-impress-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130152" comment="libreoffice-kde4-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151478" comment="libreoffice-kde4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130153" comment="libreoffice-l10n-af-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153334" comment="libreoffice-l10n-af is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130154" comment="libreoffice-l10n-ar-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153335" comment="libreoffice-l10n-ar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130155" comment="libreoffice-l10n-as-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153336" comment="libreoffice-l10n-as is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130156" comment="libreoffice-l10n-bg-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153337" comment="libreoffice-l10n-bg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130157" comment="libreoffice-l10n-bn-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153338" comment="libreoffice-l10n-bn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130158" comment="libreoffice-l10n-br-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153339" comment="libreoffice-l10n-br is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130159" comment="libreoffice-l10n-ca-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153340" comment="libreoffice-l10n-ca is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130160" comment="libreoffice-l10n-cs-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130161" comment="libreoffice-l10n-cy-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153341" comment="libreoffice-l10n-cy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130162" comment="libreoffice-l10n-da-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130163" comment="libreoffice-l10n-de-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130164" comment="libreoffice-l10n-dz-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153342" comment="libreoffice-l10n-dz is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130165" comment="libreoffice-l10n-el-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130166" comment="libreoffice-l10n-en-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130167" comment="libreoffice-l10n-es-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130168" comment="libreoffice-l10n-et-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153343" comment="libreoffice-l10n-et is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130169" comment="libreoffice-l10n-eu-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153344" comment="libreoffice-l10n-eu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130170" comment="libreoffice-l10n-fa-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153345" comment="libreoffice-l10n-fa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130171" comment="libreoffice-l10n-fi-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153346" comment="libreoffice-l10n-fi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130172" comment="libreoffice-l10n-fr-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130173" comment="libreoffice-l10n-ga-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153347" comment="libreoffice-l10n-ga is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130174" comment="libreoffice-l10n-gl-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153348" comment="libreoffice-l10n-gl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130175" comment="libreoffice-l10n-gu-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153349" comment="libreoffice-l10n-gu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130176" comment="libreoffice-l10n-he-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153350" comment="libreoffice-l10n-he is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130177" comment="libreoffice-l10n-hi-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153351" comment="libreoffice-l10n-hi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130178" comment="libreoffice-l10n-hr-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153352" comment="libreoffice-l10n-hr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130179" comment="libreoffice-l10n-hu-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130180" comment="libreoffice-l10n-it-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130181" comment="libreoffice-l10n-ja-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130182" comment="libreoffice-l10n-kk-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153353" comment="libreoffice-l10n-kk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130183" comment="libreoffice-l10n-kn-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153354" comment="libreoffice-l10n-kn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130184" comment="libreoffice-l10n-ko-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153355" comment="libreoffice-l10n-ko is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130185" comment="libreoffice-l10n-lt-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153356" comment="libreoffice-l10n-lt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130186" comment="libreoffice-l10n-lv-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153357" comment="libreoffice-l10n-lv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130187" comment="libreoffice-l10n-mai-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153358" comment="libreoffice-l10n-mai is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130188" comment="libreoffice-l10n-ml-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153359" comment="libreoffice-l10n-ml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130189" comment="libreoffice-l10n-mr-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153360" comment="libreoffice-l10n-mr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130190" comment="libreoffice-l10n-nb-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153361" comment="libreoffice-l10n-nb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130191" comment="libreoffice-l10n-nl-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153362" comment="libreoffice-l10n-nl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130192" comment="libreoffice-l10n-nn-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153363" comment="libreoffice-l10n-nn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130193" comment="libreoffice-l10n-nr-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153364" comment="libreoffice-l10n-nr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130194" comment="libreoffice-l10n-nso-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153365" comment="libreoffice-l10n-nso is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130195" comment="libreoffice-l10n-or-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153366" comment="libreoffice-l10n-or is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130196" comment="libreoffice-l10n-pa-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153367" comment="libreoffice-l10n-pa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130197" comment="libreoffice-l10n-pl-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130198" comment="libreoffice-l10n-pt-BR-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153368" comment="libreoffice-l10n-pt-BR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130199" comment="libreoffice-l10n-pt-PT-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153369" comment="libreoffice-l10n-pt-PT is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130200" comment="libreoffice-l10n-ro-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153370" comment="libreoffice-l10n-ro is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130201" comment="libreoffice-l10n-ru-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130202" comment="libreoffice-l10n-si-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153371" comment="libreoffice-l10n-si is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130203" comment="libreoffice-l10n-sk-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153372" comment="libreoffice-l10n-sk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130204" comment="libreoffice-l10n-sl-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153373" comment="libreoffice-l10n-sl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130205" comment="libreoffice-l10n-sr-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153374" comment="libreoffice-l10n-sr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130206" comment="libreoffice-l10n-ss-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153375" comment="libreoffice-l10n-ss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130207" comment="libreoffice-l10n-st-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153376" comment="libreoffice-l10n-st is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130208" comment="libreoffice-l10n-sv-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153377" comment="libreoffice-l10n-sv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130209" comment="libreoffice-l10n-ta-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153378" comment="libreoffice-l10n-ta is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130210" comment="libreoffice-l10n-te-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153379" comment="libreoffice-l10n-te is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130211" comment="libreoffice-l10n-th-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153380" comment="libreoffice-l10n-th is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130212" comment="libreoffice-l10n-tn-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153381" comment="libreoffice-l10n-tn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130213" comment="libreoffice-l10n-tr-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153382" comment="libreoffice-l10n-tr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130214" comment="libreoffice-l10n-ts-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153383" comment="libreoffice-l10n-ts is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130215" comment="libreoffice-l10n-uk-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153384" comment="libreoffice-l10n-uk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130216" comment="libreoffice-l10n-ve-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153385" comment="libreoffice-l10n-ve is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130217" comment="libreoffice-l10n-xh-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153386" comment="libreoffice-l10n-xh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130218" comment="libreoffice-l10n-zh-Hans-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153387" comment="libreoffice-l10n-zh-Hans is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130219" comment="libreoffice-l10n-zh-Hant-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153388" comment="libreoffice-l10n-zh-Hant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130220" comment="libreoffice-l10n-zu-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153389" comment="libreoffice-l10n-zu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130221" comment="libreoffice-mailmerge-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130222" comment="libreoffice-math-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130223" comment="libreoffice-officebean-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153390" comment="libreoffice-officebean is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130224" comment="libreoffice-pyuno-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130225" comment="libreoffice-sdk-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153391" comment="libreoffice-sdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130226" comment="libreoffice-sdk-doc-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153392" comment="libreoffice-sdk-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130227" comment="libreoffice-writer-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130228" comment="libreoffice-writer-extensions-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130229" comment="libreofficekit-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153393" comment="libreofficekit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130230" comment="libreofficekit-devel-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153394" comment="libreofficekit-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130231" comment="libvisio-0.1.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153395" comment="libvisio is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130232" comment="libvisio-0_1-1-0.1.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153396" comment="libvisio-0_1-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130233" comment="libvisio-devel-0.1.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153397" comment="libvisio-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130234" comment="libvisio-devel-doc-0.1.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153398" comment="libvisio-devel-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130235" comment="libvisio-tools-0.1.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153399" comment="libvisio-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130236" comment="libwps-0.4.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153400" comment="libwps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130237" comment="libwps-0_4-4-0.4.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153401" comment="libwps-0_4-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130238" comment="libwps-devel-0.4.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153402" comment="libwps-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130239" comment="libwps-tools-0.4.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153403" comment="libwps-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130240" comment="mdds-1_0-1.1.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153404" comment="mdds-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130241" comment="mdds-1_0-devel-1.1.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153405" comment="mdds-1_0-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130242" comment="myspell-af_NA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153406" comment="myspell-af_NA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130243" comment="myspell-af_ZA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153407" comment="myspell-af_ZA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130244" comment="myspell-an-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153408" comment="myspell-an is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130245" comment="myspell-an_ES-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153409" comment="myspell-an_ES is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130246" comment="myspell-ar-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153410" comment="myspell-ar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130247" comment="myspell-ar_AE-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153411" comment="myspell-ar_AE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130248" comment="myspell-ar_BH-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153412" comment="myspell-ar_BH is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130249" comment="myspell-ar_DZ-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153413" comment="myspell-ar_DZ is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130250" comment="myspell-ar_EG-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153414" comment="myspell-ar_EG is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130251" comment="myspell-ar_IQ-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153415" comment="myspell-ar_IQ is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130252" comment="myspell-ar_JO-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153416" comment="myspell-ar_JO is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130253" comment="myspell-ar_KW-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153417" comment="myspell-ar_KW is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130254" comment="myspell-ar_LB-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153418" comment="myspell-ar_LB is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130255" comment="myspell-ar_LY-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153419" comment="myspell-ar_LY is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130256" comment="myspell-ar_MA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153420" comment="myspell-ar_MA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130257" comment="myspell-ar_OM-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153421" comment="myspell-ar_OM is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130258" comment="myspell-ar_QA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153422" comment="myspell-ar_QA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130259" comment="myspell-ar_SA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153423" comment="myspell-ar_SA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130260" comment="myspell-ar_SD-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153424" comment="myspell-ar_SD is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130261" comment="myspell-ar_SY-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153425" comment="myspell-ar_SY is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130262" comment="myspell-ar_TN-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153426" comment="myspell-ar_TN is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130263" comment="myspell-ar_YE-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153427" comment="myspell-ar_YE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130264" comment="myspell-be_BY-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153428" comment="myspell-be_BY is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130265" comment="myspell-bg_BG-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153429" comment="myspell-bg_BG is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130266" comment="myspell-bn_BD-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153430" comment="myspell-bn_BD is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130267" comment="myspell-bn_IN-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153431" comment="myspell-bn_IN is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130268" comment="myspell-br_FR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153432" comment="myspell-br_FR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130269" comment="myspell-bs-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153433" comment="myspell-bs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130270" comment="myspell-bs_BA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153434" comment="myspell-bs_BA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130271" comment="myspell-ca-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153435" comment="myspell-ca is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130272" comment="myspell-ca_AD-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153436" comment="myspell-ca_AD is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130273" comment="myspell-ca_ES-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153437" comment="myspell-ca_ES is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130274" comment="myspell-ca_ES_valencia-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153438" comment="myspell-ca_ES_valencia is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130275" comment="myspell-ca_FR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153439" comment="myspell-ca_FR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130276" comment="myspell-ca_IT-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153440" comment="myspell-ca_IT is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130277" comment="myspell-cs_CZ-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153441" comment="myspell-cs_CZ is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130278" comment="myspell-da_DK-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153442" comment="myspell-da_DK is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130279" comment="myspell-de-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153443" comment="myspell-de is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130280" comment="myspell-de_AT-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153444" comment="myspell-de_AT is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130281" comment="myspell-de_CH-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153445" comment="myspell-de_CH is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130282" comment="myspell-de_DE-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153446" comment="myspell-de_DE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130283" comment="myspell-dictionaries-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153447" comment="myspell-dictionaries is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130284" comment="myspell-el_GR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153448" comment="myspell-el_GR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130285" comment="myspell-en-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153449" comment="myspell-en is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130286" comment="myspell-en_AU-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153450" comment="myspell-en_AU is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130287" comment="myspell-en_BS-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153451" comment="myspell-en_BS is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130288" comment="myspell-en_BZ-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153452" comment="myspell-en_BZ is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130289" comment="myspell-en_CA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153453" comment="myspell-en_CA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130290" comment="myspell-en_GB-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153454" comment="myspell-en_GB is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130291" comment="myspell-en_GH-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153455" comment="myspell-en_GH is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130292" comment="myspell-en_IE-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153456" comment="myspell-en_IE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130293" comment="myspell-en_IN-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153457" comment="myspell-en_IN is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130294" comment="myspell-en_JM-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153458" comment="myspell-en_JM is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130295" comment="myspell-en_MW-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153459" comment="myspell-en_MW is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130296" comment="myspell-en_NA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153460" comment="myspell-en_NA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130297" comment="myspell-en_NZ-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153461" comment="myspell-en_NZ is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130298" comment="myspell-en_PH-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153462" comment="myspell-en_PH is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130299" comment="myspell-en_TT-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153463" comment="myspell-en_TT is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130300" comment="myspell-en_US-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153464" comment="myspell-en_US is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130301" comment="myspell-en_ZA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153465" comment="myspell-en_ZA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130302" comment="myspell-en_ZW-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153466" comment="myspell-en_ZW is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130303" comment="myspell-es-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153467" comment="myspell-es is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130304" comment="myspell-es_AR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153468" comment="myspell-es_AR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130305" comment="myspell-es_BO-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153469" comment="myspell-es_BO is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130306" comment="myspell-es_CL-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153470" comment="myspell-es_CL is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130307" comment="myspell-es_CO-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153471" comment="myspell-es_CO is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130308" comment="myspell-es_CR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153472" comment="myspell-es_CR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130309" comment="myspell-es_CU-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153473" comment="myspell-es_CU is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130310" comment="myspell-es_DO-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153474" comment="myspell-es_DO is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130311" comment="myspell-es_EC-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153475" comment="myspell-es_EC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130312" comment="myspell-es_ES-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153476" comment="myspell-es_ES is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130313" comment="myspell-es_GT-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153477" comment="myspell-es_GT is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130314" comment="myspell-es_HN-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153478" comment="myspell-es_HN is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130315" comment="myspell-es_MX-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153479" comment="myspell-es_MX is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130316" comment="myspell-es_NI-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153480" comment="myspell-es_NI is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130317" comment="myspell-es_PA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153481" comment="myspell-es_PA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130318" comment="myspell-es_PE-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153482" comment="myspell-es_PE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130319" comment="myspell-es_PR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153483" comment="myspell-es_PR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130320" comment="myspell-es_PY-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153484" comment="myspell-es_PY is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130321" comment="myspell-es_SV-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153485" comment="myspell-es_SV is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130322" comment="myspell-es_UY-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153486" comment="myspell-es_UY is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130323" comment="myspell-es_VE-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153487" comment="myspell-es_VE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130324" comment="myspell-et_EE-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153488" comment="myspell-et_EE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130325" comment="myspell-fr_BE-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153489" comment="myspell-fr_BE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130326" comment="myspell-fr_CA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153490" comment="myspell-fr_CA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130327" comment="myspell-fr_CH-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153491" comment="myspell-fr_CH is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130328" comment="myspell-fr_FR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153492" comment="myspell-fr_FR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130329" comment="myspell-fr_LU-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153493" comment="myspell-fr_LU is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130330" comment="myspell-fr_MC-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153494" comment="myspell-fr_MC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130331" comment="myspell-gd_GB-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153495" comment="myspell-gd_GB is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130332" comment="myspell-gl-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153496" comment="myspell-gl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130333" comment="myspell-gl_ES-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153497" comment="myspell-gl_ES is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130334" comment="myspell-gu_IN-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153498" comment="myspell-gu_IN is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130335" comment="myspell-gug-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153499" comment="myspell-gug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130336" comment="myspell-gug_PY-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153500" comment="myspell-gug_PY is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130337" comment="myspell-he_IL-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153501" comment="myspell-he_IL is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130338" comment="myspell-hi_IN-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153502" comment="myspell-hi_IN is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130339" comment="myspell-hr_HR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153503" comment="myspell-hr_HR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130340" comment="myspell-hu_HU-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153504" comment="myspell-hu_HU is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130341" comment="myspell-is-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153505" comment="myspell-is is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130342" comment="myspell-is_IS-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153506" comment="myspell-is_IS is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130343" comment="myspell-it_IT-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153507" comment="myspell-it_IT is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130344" comment="myspell-kmr_Latn-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153508" comment="myspell-kmr_Latn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130345" comment="myspell-kmr_Latn_SY-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153509" comment="myspell-kmr_Latn_SY is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130346" comment="myspell-kmr_Latn_TR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153510" comment="myspell-kmr_Latn_TR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130347" comment="myspell-lightproof-en-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153511" comment="myspell-lightproof-en is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130348" comment="myspell-lightproof-hu_HU-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153512" comment="myspell-lightproof-hu_HU is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130349" comment="myspell-lightproof-pt_BR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153513" comment="myspell-lightproof-pt_BR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130350" comment="myspell-lightproof-ru_RU-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153514" comment="myspell-lightproof-ru_RU is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130351" comment="myspell-lo_LA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153515" comment="myspell-lo_LA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130352" comment="myspell-lt_LT-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153516" comment="myspell-lt_LT is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130353" comment="myspell-lv_LV-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153517" comment="myspell-lv_LV is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130354" comment="myspell-nb_NO-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153518" comment="myspell-nb_NO is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130355" comment="myspell-ne_NP-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153519" comment="myspell-ne_NP is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130356" comment="myspell-nl_BE-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153520" comment="myspell-nl_BE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130357" comment="myspell-nl_NL-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153521" comment="myspell-nl_NL is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130358" comment="myspell-nn_NO-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153522" comment="myspell-nn_NO is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130359" comment="myspell-no-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153523" comment="myspell-no is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130360" comment="myspell-oc_FR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153524" comment="myspell-oc_FR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130361" comment="myspell-pl_PL-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153525" comment="myspell-pl_PL is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130362" comment="myspell-pt_AO-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153526" comment="myspell-pt_AO is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130363" comment="myspell-pt_BR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153527" comment="myspell-pt_BR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130364" comment="myspell-pt_PT-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153528" comment="myspell-pt_PT is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130365" comment="myspell-ro-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153529" comment="myspell-ro is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130366" comment="myspell-ro_RO-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153530" comment="myspell-ro_RO is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130367" comment="myspell-ru_RU-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153531" comment="myspell-ru_RU is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130368" comment="myspell-si_LK-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153532" comment="myspell-si_LK is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130369" comment="myspell-sk_SK-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153533" comment="myspell-sk_SK is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130370" comment="myspell-sl_SI-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153534" comment="myspell-sl_SI is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130371" comment="myspell-sr-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153535" comment="myspell-sr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130372" comment="myspell-sr_CS-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153536" comment="myspell-sr_CS is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130373" comment="myspell-sr_Latn_CS-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153537" comment="myspell-sr_Latn_CS is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130374" comment="myspell-sr_Latn_RS-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153538" comment="myspell-sr_Latn_RS is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130375" comment="myspell-sr_RS-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153539" comment="myspell-sr_RS is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130376" comment="myspell-sv_FI-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153540" comment="myspell-sv_FI is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130377" comment="myspell-sv_SE-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153541" comment="myspell-sv_SE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130378" comment="myspell-sw_TZ-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153542" comment="myspell-sw_TZ is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130379" comment="myspell-te-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153543" comment="myspell-te is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130380" comment="myspell-te_IN-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153544" comment="myspell-te_IN is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130381" comment="myspell-th_TH-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153545" comment="myspell-th_TH is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130382" comment="myspell-uk_UA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153546" comment="myspell-uk_UA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130383" comment="myspell-vi-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153547" comment="myspell-vi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130384" comment="myspell-vi_VN-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153548" comment="myspell-vi_VN is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130385" comment="myspell-zu_ZA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153549" comment="myspell-zu_ZA is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0795</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0795" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0795" source="CVE"/>
    <description>
    LibreOffice before 5.0.5 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted LwpTocSuperLayout record in a LotusWordPro (lwp) document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0795.html">CVE-2016-0795</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0795">SUSE bug 967015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0795">SUSE bug 967015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0795">SUSE bug 967014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0795">SUSE bug 967015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0795">SUSE bug 967015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0795">SUSE bug 967015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0795">SUSE bug 967015</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130102" comment="cmis-client-0.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153300" comment="cmis-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130103" comment="hunspell-1.3.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153301" comment="hunspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130104" comment="hunspell-32bit-1.3.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153302" comment="hunspell-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130105" comment="hunspell-devel-1.3.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153303" comment="hunspell-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130106" comment="hunspell-devel-32bit-1.3.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153304" comment="hunspell-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130107" comment="hunspell-static-1.3.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153305" comment="hunspell-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130108" comment="hunspell-tools-1.3.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153306" comment="hunspell-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130109" comment="hyphen-2.8.8-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153307" comment="hyphen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130110" comment="hyphen-devel-2.8.8-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153308" comment="hyphen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130111" comment="libcmis-0_5-5-0.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153309" comment="libcmis-0_5-5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130112" comment="libcmis-c-0_5-5-0.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153310" comment="libcmis-c-0_5-5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130113" comment="libcmis-c-devel-0.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153311" comment="libcmis-c-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130114" comment="libcmis-devel-0.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153312" comment="libcmis-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130115" comment="libetonyek-0.1.6-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153313" comment="libetonyek is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130116" comment="libetonyek-0_1-1-0.1.6-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153314" comment="libetonyek-0_1-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130117" comment="libetonyek-devel-0.1.6-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153315" comment="libetonyek-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130118" comment="libetonyek-devel-doc-0.1.6-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153316" comment="libetonyek-devel-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130119" comment="libetonyek-tools-0.1.6-3.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153317" comment="libetonyek-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130120" comment="libhyphen0-2.8.8-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153318" comment="libhyphen0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130121" comment="libhyphen0-32bit-2.8.8-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153319" comment="libhyphen0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130122" comment="libixion-0.11.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153320" comment="libixion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130123" comment="libixion-0_11-0-0.11.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153321" comment="libixion-0_11-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130124" comment="libixion-devel-0.11.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153322" comment="libixion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130125" comment="libixion-python3-0.11.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153323" comment="libixion-python3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130126" comment="libixion-tools-0.11.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153324" comment="libixion-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130127" comment="liborcus-0.11.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153325" comment="liborcus is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130128" comment="liborcus-0_11-0-0.11.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153326" comment="liborcus-0_11-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130129" comment="liborcus-devel-0.11.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153327" comment="liborcus-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130130" comment="liborcus-python3-0.11.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153328" comment="liborcus-python3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130131" comment="liborcus-tools-0.11.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153329" comment="liborcus-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130132" comment="libreoffice-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130133" comment="libreoffice-base-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130134" comment="libreoffice-base-drivers-mysql-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151464" comment="libreoffice-base-drivers-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130135" comment="libreoffice-base-drivers-postgresql-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153330" comment="libreoffice-base-drivers-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130136" comment="libreoffice-branding-upstream-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130137" comment="libreoffice-calc-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130138" comment="libreoffice-calc-extensions-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130139" comment="libreoffice-draw-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130140" comment="libreoffice-filters-optional-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130141" comment="libreoffice-gdb-pretty-printers-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153331" comment="libreoffice-gdb-pretty-printers is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130142" comment="libreoffice-glade-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153332" comment="libreoffice-glade is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130143" comment="libreoffice-gnome-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130144" comment="libreoffice-gtk3-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153333" comment="libreoffice-gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130145" comment="libreoffice-icon-theme-breeze-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151471" comment="libreoffice-icon-theme-breeze is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130146" comment="libreoffice-icon-theme-galaxy-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151472" comment="libreoffice-icon-theme-galaxy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130147" comment="libreoffice-icon-theme-hicontrast-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151473" comment="libreoffice-icon-theme-hicontrast is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130148" comment="libreoffice-icon-theme-oxygen-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151474" comment="libreoffice-icon-theme-oxygen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130149" comment="libreoffice-icon-theme-sifr-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151475" comment="libreoffice-icon-theme-sifr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130150" comment="libreoffice-icon-theme-tango-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151476" comment="libreoffice-icon-theme-tango is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130151" comment="libreoffice-impress-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130152" comment="libreoffice-kde4-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151478" comment="libreoffice-kde4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130153" comment="libreoffice-l10n-af-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153334" comment="libreoffice-l10n-af is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130154" comment="libreoffice-l10n-ar-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153335" comment="libreoffice-l10n-ar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130155" comment="libreoffice-l10n-as-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153336" comment="libreoffice-l10n-as is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130156" comment="libreoffice-l10n-bg-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153337" comment="libreoffice-l10n-bg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130157" comment="libreoffice-l10n-bn-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153338" comment="libreoffice-l10n-bn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130158" comment="libreoffice-l10n-br-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153339" comment="libreoffice-l10n-br is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130159" comment="libreoffice-l10n-ca-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153340" comment="libreoffice-l10n-ca is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130160" comment="libreoffice-l10n-cs-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130161" comment="libreoffice-l10n-cy-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153341" comment="libreoffice-l10n-cy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130162" comment="libreoffice-l10n-da-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130163" comment="libreoffice-l10n-de-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130164" comment="libreoffice-l10n-dz-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153342" comment="libreoffice-l10n-dz is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130165" comment="libreoffice-l10n-el-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130166" comment="libreoffice-l10n-en-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130167" comment="libreoffice-l10n-es-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130168" comment="libreoffice-l10n-et-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153343" comment="libreoffice-l10n-et is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130169" comment="libreoffice-l10n-eu-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153344" comment="libreoffice-l10n-eu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130170" comment="libreoffice-l10n-fa-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153345" comment="libreoffice-l10n-fa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130171" comment="libreoffice-l10n-fi-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153346" comment="libreoffice-l10n-fi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130172" comment="libreoffice-l10n-fr-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130173" comment="libreoffice-l10n-ga-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153347" comment="libreoffice-l10n-ga is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130174" comment="libreoffice-l10n-gl-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153348" comment="libreoffice-l10n-gl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130175" comment="libreoffice-l10n-gu-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153349" comment="libreoffice-l10n-gu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130176" comment="libreoffice-l10n-he-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153350" comment="libreoffice-l10n-he is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130177" comment="libreoffice-l10n-hi-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153351" comment="libreoffice-l10n-hi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130178" comment="libreoffice-l10n-hr-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153352" comment="libreoffice-l10n-hr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130179" comment="libreoffice-l10n-hu-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130180" comment="libreoffice-l10n-it-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130181" comment="libreoffice-l10n-ja-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130182" comment="libreoffice-l10n-kk-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153353" comment="libreoffice-l10n-kk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130183" comment="libreoffice-l10n-kn-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153354" comment="libreoffice-l10n-kn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130184" comment="libreoffice-l10n-ko-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153355" comment="libreoffice-l10n-ko is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130185" comment="libreoffice-l10n-lt-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153356" comment="libreoffice-l10n-lt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130186" comment="libreoffice-l10n-lv-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153357" comment="libreoffice-l10n-lv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130187" comment="libreoffice-l10n-mai-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153358" comment="libreoffice-l10n-mai is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130188" comment="libreoffice-l10n-ml-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153359" comment="libreoffice-l10n-ml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130189" comment="libreoffice-l10n-mr-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153360" comment="libreoffice-l10n-mr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130190" comment="libreoffice-l10n-nb-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153361" comment="libreoffice-l10n-nb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130191" comment="libreoffice-l10n-nl-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153362" comment="libreoffice-l10n-nl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130192" comment="libreoffice-l10n-nn-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153363" comment="libreoffice-l10n-nn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130193" comment="libreoffice-l10n-nr-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153364" comment="libreoffice-l10n-nr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130194" comment="libreoffice-l10n-nso-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153365" comment="libreoffice-l10n-nso is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130195" comment="libreoffice-l10n-or-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153366" comment="libreoffice-l10n-or is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130196" comment="libreoffice-l10n-pa-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153367" comment="libreoffice-l10n-pa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130197" comment="libreoffice-l10n-pl-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130198" comment="libreoffice-l10n-pt-BR-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153368" comment="libreoffice-l10n-pt-BR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130199" comment="libreoffice-l10n-pt-PT-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153369" comment="libreoffice-l10n-pt-PT is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130200" comment="libreoffice-l10n-ro-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153370" comment="libreoffice-l10n-ro is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130201" comment="libreoffice-l10n-ru-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130202" comment="libreoffice-l10n-si-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153371" comment="libreoffice-l10n-si is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130203" comment="libreoffice-l10n-sk-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153372" comment="libreoffice-l10n-sk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130204" comment="libreoffice-l10n-sl-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153373" comment="libreoffice-l10n-sl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130205" comment="libreoffice-l10n-sr-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153374" comment="libreoffice-l10n-sr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130206" comment="libreoffice-l10n-ss-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153375" comment="libreoffice-l10n-ss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130207" comment="libreoffice-l10n-st-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153376" comment="libreoffice-l10n-st is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130208" comment="libreoffice-l10n-sv-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153377" comment="libreoffice-l10n-sv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130209" comment="libreoffice-l10n-ta-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153378" comment="libreoffice-l10n-ta is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130210" comment="libreoffice-l10n-te-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153379" comment="libreoffice-l10n-te is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130211" comment="libreoffice-l10n-th-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153380" comment="libreoffice-l10n-th is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130212" comment="libreoffice-l10n-tn-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153381" comment="libreoffice-l10n-tn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130213" comment="libreoffice-l10n-tr-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153382" comment="libreoffice-l10n-tr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130214" comment="libreoffice-l10n-ts-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153383" comment="libreoffice-l10n-ts is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130215" comment="libreoffice-l10n-uk-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153384" comment="libreoffice-l10n-uk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130216" comment="libreoffice-l10n-ve-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153385" comment="libreoffice-l10n-ve is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130217" comment="libreoffice-l10n-xh-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153386" comment="libreoffice-l10n-xh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130218" comment="libreoffice-l10n-zh-Hans-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153387" comment="libreoffice-l10n-zh-Hans is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130219" comment="libreoffice-l10n-zh-Hant-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153388" comment="libreoffice-l10n-zh-Hant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130220" comment="libreoffice-l10n-zu-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153389" comment="libreoffice-l10n-zu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130221" comment="libreoffice-mailmerge-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130222" comment="libreoffice-math-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130223" comment="libreoffice-officebean-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153390" comment="libreoffice-officebean is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130224" comment="libreoffice-pyuno-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130225" comment="libreoffice-sdk-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153391" comment="libreoffice-sdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130226" comment="libreoffice-sdk-doc-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153392" comment="libreoffice-sdk-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130227" comment="libreoffice-writer-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130228" comment="libreoffice-writer-extensions-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130229" comment="libreofficekit-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153393" comment="libreofficekit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130230" comment="libreofficekit-devel-5.1.3.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153394" comment="libreofficekit-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130231" comment="libvisio-0.1.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153395" comment="libvisio is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130232" comment="libvisio-0_1-1-0.1.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153396" comment="libvisio-0_1-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130233" comment="libvisio-devel-0.1.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153397" comment="libvisio-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130234" comment="libvisio-devel-doc-0.1.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153398" comment="libvisio-devel-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130235" comment="libvisio-tools-0.1.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153399" comment="libvisio-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130236" comment="libwps-0.4.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153400" comment="libwps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130237" comment="libwps-0_4-4-0.4.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153401" comment="libwps-0_4-4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130238" comment="libwps-devel-0.4.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153402" comment="libwps-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130239" comment="libwps-tools-0.4.2-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153403" comment="libwps-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130240" comment="mdds-1_0-1.1.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153404" comment="mdds-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130241" comment="mdds-1_0-devel-1.1.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153405" comment="mdds-1_0-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130242" comment="myspell-af_NA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153406" comment="myspell-af_NA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130243" comment="myspell-af_ZA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153407" comment="myspell-af_ZA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130244" comment="myspell-an-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153408" comment="myspell-an is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130245" comment="myspell-an_ES-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153409" comment="myspell-an_ES is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130246" comment="myspell-ar-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153410" comment="myspell-ar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130247" comment="myspell-ar_AE-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153411" comment="myspell-ar_AE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130248" comment="myspell-ar_BH-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153412" comment="myspell-ar_BH is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130249" comment="myspell-ar_DZ-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153413" comment="myspell-ar_DZ is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130250" comment="myspell-ar_EG-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153414" comment="myspell-ar_EG is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130251" comment="myspell-ar_IQ-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153415" comment="myspell-ar_IQ is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130252" comment="myspell-ar_JO-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153416" comment="myspell-ar_JO is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130253" comment="myspell-ar_KW-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153417" comment="myspell-ar_KW is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130254" comment="myspell-ar_LB-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153418" comment="myspell-ar_LB is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130255" comment="myspell-ar_LY-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153419" comment="myspell-ar_LY is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130256" comment="myspell-ar_MA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153420" comment="myspell-ar_MA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130257" comment="myspell-ar_OM-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153421" comment="myspell-ar_OM is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130258" comment="myspell-ar_QA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153422" comment="myspell-ar_QA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130259" comment="myspell-ar_SA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153423" comment="myspell-ar_SA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130260" comment="myspell-ar_SD-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153424" comment="myspell-ar_SD is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130261" comment="myspell-ar_SY-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153425" comment="myspell-ar_SY is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130262" comment="myspell-ar_TN-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153426" comment="myspell-ar_TN is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130263" comment="myspell-ar_YE-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153427" comment="myspell-ar_YE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130264" comment="myspell-be_BY-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153428" comment="myspell-be_BY is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130265" comment="myspell-bg_BG-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153429" comment="myspell-bg_BG is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130266" comment="myspell-bn_BD-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153430" comment="myspell-bn_BD is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130267" comment="myspell-bn_IN-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153431" comment="myspell-bn_IN is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130268" comment="myspell-br_FR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153432" comment="myspell-br_FR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130269" comment="myspell-bs-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153433" comment="myspell-bs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130270" comment="myspell-bs_BA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153434" comment="myspell-bs_BA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130271" comment="myspell-ca-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153435" comment="myspell-ca is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130272" comment="myspell-ca_AD-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153436" comment="myspell-ca_AD is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130273" comment="myspell-ca_ES-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153437" comment="myspell-ca_ES is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130274" comment="myspell-ca_ES_valencia-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153438" comment="myspell-ca_ES_valencia is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130275" comment="myspell-ca_FR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153439" comment="myspell-ca_FR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130276" comment="myspell-ca_IT-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153440" comment="myspell-ca_IT is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130277" comment="myspell-cs_CZ-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153441" comment="myspell-cs_CZ is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130278" comment="myspell-da_DK-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153442" comment="myspell-da_DK is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130279" comment="myspell-de-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153443" comment="myspell-de is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130280" comment="myspell-de_AT-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153444" comment="myspell-de_AT is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130281" comment="myspell-de_CH-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153445" comment="myspell-de_CH is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130282" comment="myspell-de_DE-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153446" comment="myspell-de_DE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130283" comment="myspell-dictionaries-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153447" comment="myspell-dictionaries is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130284" comment="myspell-el_GR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153448" comment="myspell-el_GR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130285" comment="myspell-en-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153449" comment="myspell-en is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130286" comment="myspell-en_AU-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153450" comment="myspell-en_AU is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130287" comment="myspell-en_BS-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153451" comment="myspell-en_BS is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130288" comment="myspell-en_BZ-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153452" comment="myspell-en_BZ is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130289" comment="myspell-en_CA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153453" comment="myspell-en_CA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130290" comment="myspell-en_GB-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153454" comment="myspell-en_GB is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130291" comment="myspell-en_GH-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153455" comment="myspell-en_GH is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130292" comment="myspell-en_IE-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153456" comment="myspell-en_IE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130293" comment="myspell-en_IN-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153457" comment="myspell-en_IN is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130294" comment="myspell-en_JM-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153458" comment="myspell-en_JM is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130295" comment="myspell-en_MW-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153459" comment="myspell-en_MW is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130296" comment="myspell-en_NA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153460" comment="myspell-en_NA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130297" comment="myspell-en_NZ-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153461" comment="myspell-en_NZ is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130298" comment="myspell-en_PH-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153462" comment="myspell-en_PH is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130299" comment="myspell-en_TT-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153463" comment="myspell-en_TT is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130300" comment="myspell-en_US-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153464" comment="myspell-en_US is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130301" comment="myspell-en_ZA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153465" comment="myspell-en_ZA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130302" comment="myspell-en_ZW-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153466" comment="myspell-en_ZW is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130303" comment="myspell-es-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153467" comment="myspell-es is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130304" comment="myspell-es_AR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153468" comment="myspell-es_AR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130305" comment="myspell-es_BO-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153469" comment="myspell-es_BO is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130306" comment="myspell-es_CL-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153470" comment="myspell-es_CL is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130307" comment="myspell-es_CO-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153471" comment="myspell-es_CO is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130308" comment="myspell-es_CR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153472" comment="myspell-es_CR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130309" comment="myspell-es_CU-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153473" comment="myspell-es_CU is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130310" comment="myspell-es_DO-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153474" comment="myspell-es_DO is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130311" comment="myspell-es_EC-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153475" comment="myspell-es_EC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130312" comment="myspell-es_ES-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153476" comment="myspell-es_ES is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130313" comment="myspell-es_GT-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153477" comment="myspell-es_GT is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130314" comment="myspell-es_HN-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153478" comment="myspell-es_HN is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130315" comment="myspell-es_MX-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153479" comment="myspell-es_MX is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130316" comment="myspell-es_NI-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153480" comment="myspell-es_NI is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130317" comment="myspell-es_PA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153481" comment="myspell-es_PA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130318" comment="myspell-es_PE-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153482" comment="myspell-es_PE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130319" comment="myspell-es_PR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153483" comment="myspell-es_PR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130320" comment="myspell-es_PY-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153484" comment="myspell-es_PY is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130321" comment="myspell-es_SV-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153485" comment="myspell-es_SV is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130322" comment="myspell-es_UY-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153486" comment="myspell-es_UY is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130323" comment="myspell-es_VE-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153487" comment="myspell-es_VE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130324" comment="myspell-et_EE-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153488" comment="myspell-et_EE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130325" comment="myspell-fr_BE-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153489" comment="myspell-fr_BE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130326" comment="myspell-fr_CA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153490" comment="myspell-fr_CA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130327" comment="myspell-fr_CH-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153491" comment="myspell-fr_CH is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130328" comment="myspell-fr_FR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153492" comment="myspell-fr_FR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130329" comment="myspell-fr_LU-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153493" comment="myspell-fr_LU is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130330" comment="myspell-fr_MC-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153494" comment="myspell-fr_MC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130331" comment="myspell-gd_GB-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153495" comment="myspell-gd_GB is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130332" comment="myspell-gl-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153496" comment="myspell-gl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130333" comment="myspell-gl_ES-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153497" comment="myspell-gl_ES is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130334" comment="myspell-gu_IN-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153498" comment="myspell-gu_IN is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130335" comment="myspell-gug-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153499" comment="myspell-gug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130336" comment="myspell-gug_PY-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153500" comment="myspell-gug_PY is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130337" comment="myspell-he_IL-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153501" comment="myspell-he_IL is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130338" comment="myspell-hi_IN-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153502" comment="myspell-hi_IN is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130339" comment="myspell-hr_HR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153503" comment="myspell-hr_HR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130340" comment="myspell-hu_HU-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153504" comment="myspell-hu_HU is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130341" comment="myspell-is-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153505" comment="myspell-is is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130342" comment="myspell-is_IS-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153506" comment="myspell-is_IS is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130343" comment="myspell-it_IT-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153507" comment="myspell-it_IT is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130344" comment="myspell-kmr_Latn-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153508" comment="myspell-kmr_Latn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130345" comment="myspell-kmr_Latn_SY-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153509" comment="myspell-kmr_Latn_SY is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130346" comment="myspell-kmr_Latn_TR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153510" comment="myspell-kmr_Latn_TR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130347" comment="myspell-lightproof-en-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153511" comment="myspell-lightproof-en is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130348" comment="myspell-lightproof-hu_HU-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153512" comment="myspell-lightproof-hu_HU is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130349" comment="myspell-lightproof-pt_BR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153513" comment="myspell-lightproof-pt_BR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130350" comment="myspell-lightproof-ru_RU-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153514" comment="myspell-lightproof-ru_RU is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130351" comment="myspell-lo_LA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153515" comment="myspell-lo_LA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130352" comment="myspell-lt_LT-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153516" comment="myspell-lt_LT is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130353" comment="myspell-lv_LV-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153517" comment="myspell-lv_LV is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130354" comment="myspell-nb_NO-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153518" comment="myspell-nb_NO is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130355" comment="myspell-ne_NP-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153519" comment="myspell-ne_NP is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130356" comment="myspell-nl_BE-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153520" comment="myspell-nl_BE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130357" comment="myspell-nl_NL-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153521" comment="myspell-nl_NL is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130358" comment="myspell-nn_NO-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153522" comment="myspell-nn_NO is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130359" comment="myspell-no-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153523" comment="myspell-no is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130360" comment="myspell-oc_FR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153524" comment="myspell-oc_FR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130361" comment="myspell-pl_PL-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153525" comment="myspell-pl_PL is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130362" comment="myspell-pt_AO-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153526" comment="myspell-pt_AO is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130363" comment="myspell-pt_BR-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153527" comment="myspell-pt_BR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130364" comment="myspell-pt_PT-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153528" comment="myspell-pt_PT is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130365" comment="myspell-ro-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153529" comment="myspell-ro is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130366" comment="myspell-ro_RO-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153530" comment="myspell-ro_RO is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130367" comment="myspell-ru_RU-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153531" comment="myspell-ru_RU is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130368" comment="myspell-si_LK-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153532" comment="myspell-si_LK is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130369" comment="myspell-sk_SK-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153533" comment="myspell-sk_SK is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130370" comment="myspell-sl_SI-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153534" comment="myspell-sl_SI is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130371" comment="myspell-sr-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153535" comment="myspell-sr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130372" comment="myspell-sr_CS-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153536" comment="myspell-sr_CS is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130373" comment="myspell-sr_Latn_CS-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153537" comment="myspell-sr_Latn_CS is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130374" comment="myspell-sr_Latn_RS-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153538" comment="myspell-sr_Latn_RS is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130375" comment="myspell-sr_RS-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153539" comment="myspell-sr_RS is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130376" comment="myspell-sv_FI-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153540" comment="myspell-sv_FI is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130377" comment="myspell-sv_SE-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153541" comment="myspell-sv_SE is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130378" comment="myspell-sw_TZ-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153542" comment="myspell-sw_TZ is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130379" comment="myspell-te-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153543" comment="myspell-te is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130380" comment="myspell-te_IN-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153544" comment="myspell-te_IN is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130381" comment="myspell-th_TH-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153545" comment="myspell-th_TH is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130382" comment="myspell-uk_UA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153546" comment="myspell-uk_UA is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130383" comment="myspell-vi-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153547" comment="myspell-vi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130384" comment="myspell-vi_VN-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153548" comment="myspell-vi_VN is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130385" comment="myspell-zu_ZA-20160511-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153549" comment="myspell-zu_ZA is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0797</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797" source="CVE"/>
    <description>
    Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0797.html">CVE-2016-0797</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0797">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0797">SUSE bug 968048</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0797">SUSE bug 968048</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0797">SUSE bug 968048</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0797">SUSE bug 968048</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0797">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0797">SUSE bug 968048</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0797">SUSE bug 968048</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0797">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0797">SUSE bug 968048</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0797">SUSE bug 968048</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0797">SUSE bug 968048</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0797">SUSE bug 968048</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0797">SUSE bug 968048</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0797">SUSE bug 968048</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0797">SUSE bug 968048</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0797">SUSE bug 968048</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0797">SUSE bug 968048</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0797">SUSE bug 968048</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0797">SUSE bug 990370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124681" comment="compat-openssl098-0.9.8j-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124397" comment="libopenssl-devel-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124398" comment="libopenssl-devel-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124682" comment="libopenssl0_9_8-0.9.8j-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124683" comment="libopenssl0_9_8-32bit-0.9.8j-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124399" comment="libopenssl1_0_0-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124400" comment="libopenssl1_0_0-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124401" comment="libopenssl1_0_0-hmac-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124402" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128870" comment="nodejs-4.4.5-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128871" comment="nodejs-devel-4.4.5-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128873" comment="nodejs-docs-4.4.5-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128874" comment="npm-4.4.5-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124403" comment="openssl-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124404" comment="openssl-doc-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0798</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0798" source="CVE"/>
    <description>
    Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0798.html">CVE-2016-0798</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0798">SUSE bug 968265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0798">SUSE bug 968265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0798">SUSE bug 968265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0798">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0798">SUSE bug 968265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0798">SUSE bug 968265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0798">SUSE bug 968265</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124397" comment="libopenssl-devel-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124398" comment="libopenssl-devel-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124399" comment="libopenssl1_0_0-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124400" comment="libopenssl1_0_0-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124401" comment="libopenssl1_0_0-hmac-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124402" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124403" comment="openssl-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124404" comment="openssl-doc-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0799</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0799" source="CVE"/>
    <description>
    The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0799.html">CVE-2016-0799</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 968374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 968374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 968374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 968374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 968374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 968374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 968374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 969517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 968374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 968374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 968374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 968374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 968374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 968374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 968374</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 989345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 990370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 991722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 991722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 991722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 991722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 991722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 991722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 991722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 991722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 991722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 991722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 991722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0799">SUSE bug 991722</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124681" comment="compat-openssl098-0.9.8j-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124397" comment="libopenssl-devel-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124398" comment="libopenssl-devel-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124682" comment="libopenssl0_9_8-0.9.8j-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124683" comment="libopenssl0_9_8-32bit-0.9.8j-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124399" comment="libopenssl1_0_0-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124400" comment="libopenssl1_0_0-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124401" comment="libopenssl1_0_0-hmac-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124402" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124403" comment="openssl-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124404" comment="openssl-doc-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0800</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800" source="CVE"/>
    <description>
    The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-0800.html">CVE-2016-0800</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968044</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 961377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968046</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 979060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 979060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 979060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 979060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968888</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-0800">SUSE bug 968888</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124681" comment="compat-openssl098-0.9.8j-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124397" comment="libopenssl-devel-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124398" comment="libopenssl-devel-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124682" comment="libopenssl0_9_8-0.9.8j-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124683" comment="libopenssl0_9_8-32bit-0.9.8j-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124399" comment="libopenssl1_0_0-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124400" comment="libopenssl1_0_0-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124401" comment="libopenssl1_0_0-hmac-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124402" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124403" comment="openssl-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124404" comment="openssl-doc-1.0.1i-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161000104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1000104</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1000104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000104" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1000104.html">CVE-2016-1000104</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1000104">SUSE bug 988492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1000104">SUSE bug 988492</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133268" comment="apache2-mod_fcgid-2.3.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153550" comment="apache2-mod_fcgid is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161000110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1000110</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1000110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1000110.html">CVE-2016-1000110</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1000110">SUSE bug 989523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1000110">SUSE bug 988484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1000110">SUSE bug 989523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1000110">SUSE bug 989523</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134104" comment="libpython3_4m1_0-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151646" comment="libpython3_4m1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134105" comment="libpython3_4m1_0-32bit-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152170" comment="libpython3_4m1_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134106" comment="python3-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134107" comment="python3-32bit-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134108" comment="python3-base-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134109" comment="python3-base-32bit-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134110" comment="python3-curses-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134111" comment="python3-dbm-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134112" comment="python3-devel-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134113" comment="python3-doc-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134114" comment="python3-doc-pdf-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152175" comment="python3-doc-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134115" comment="python3-idle-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134116" comment="python3-testsuite-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134117" comment="python3-tk-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134118" comment="python3-tools-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161000111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1000111</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1000111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000111" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1000111.html">CVE-2016-1000111</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1000111">SUSE bug 989997</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1000111">SUSE bug 989997</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1000111">SUSE bug 989997</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143032" comment="python-Twisted-15.4.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153551" comment="python-Twisted is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143033" comment="python-Twisted-doc-15.4.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153552" comment="python-Twisted-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10002</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10002" source="CVE"/>
    <description>
    Incorrect processing of responses to If-None-Modified HTTP conditional requests in Squid HTTP Proxy 3.1.10 through 3.1.23, 3.2.0.3 through 3.5.22, and 4.0.1 through 4.0.16 leads to client-specific Cookie data being leaked to other clients. Attack requests can easily be crafted by a client to probe a cache for this information.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10002.html">CVE-2016-10002</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10002">SUSE bug 1016168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10002">SUSE bug 1016168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10002">SUSE bug 1016168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10002">SUSE bug 1016168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10002">SUSE bug 1016168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10002">SUSE bug 1016168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10002">SUSE bug 1016168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10002">SUSE bug 1016168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10002">SUSE bug 1016168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10002">SUSE bug 1016168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10002">SUSE bug 1016168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10002">SUSE bug 1016168</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10002">SUSE bug 1016168</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147395" comment="squid-3.3.14-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10009</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10009" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10009" source="CVE"/>
    <description>
    Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10009.html">CVE-2016-10009</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1017555</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1026634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1026634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1021751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1021751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1021751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1021751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1021751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1021751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1021751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1016370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1021751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1021751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1021751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1021751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1021751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1021751</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1087412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10009">SUSE bug 1087412</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149506" comment="openssh-6.6p1-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149507" comment="openssh-askpass-gnome-6.6p1-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153167" comment="openssh-askpass-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149508" comment="openssh-cavs-6.6p1-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153168" comment="openssh-cavs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149509" comment="openssh-fips-6.6p1-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153169" comment="openssh-fips is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149510" comment="openssh-helpers-6.6p1-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152111" comment="openssh-helpers is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10011</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10011" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10011" source="CVE"/>
    <description>
    authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10011.html">CVE-2016-10011</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1026634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1026634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1017870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1016370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1087412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10011">SUSE bug 1087412</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149506" comment="openssh-6.6p1-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149507" comment="openssh-askpass-gnome-6.6p1-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153167" comment="openssh-askpass-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149508" comment="openssh-cavs-6.6p1-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153168" comment="openssh-cavs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149509" comment="openssh-fips-6.6p1-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153169" comment="openssh-fips is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149510" comment="openssh-helpers-6.6p1-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152111" comment="openssh-helpers is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10013</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10013" source="CVE"/>
    <description>
    Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10013.html">CVE-2016-10013</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10013">SUSE bug 1016340</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10024</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10024" source="CVE"/>
    <description>
    Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10024.html">CVE-2016-10024</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10024">SUSE bug 1014298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10024">SUSE bug 1014298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10024">SUSE bug 1014298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10024">SUSE bug 1014298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10024">SUSE bug 1014298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10024">SUSE bug 1014298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10024">SUSE bug 1014298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10024">SUSE bug 1014298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10024">SUSE bug 1014298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10024">SUSE bug 1014298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10024">SUSE bug 1014298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10024">SUSE bug 1014298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10024">SUSE bug 1014298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10024">SUSE bug 1014298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10024">SUSE bug 1014298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10024">SUSE bug 1014298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10024">SUSE bug 1014298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10024">SUSE bug 1014298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10024">SUSE bug 1014298</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10024">SUSE bug 1014298</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10046</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10046" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10046" source="CVE"/>
    <description>
    Heap-based buffer overflow in the DrawImage function in magick/draw.c in ImageMagick before 6.9.5-5 allows remote attackers to cause a denial of service (application crash) via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10046.html">CVE-2016-10046</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10046">SUSE bug 1017308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10046">SUSE bug 1017308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10046">SUSE bug 1017308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10046">SUSE bug 1017308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10046">SUSE bug 1017308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10046">SUSE bug 1016742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10046">SUSE bug 1017308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10046">SUSE bug 1017308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10046">SUSE bug 1017308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10046">SUSE bug 1017308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10046">SUSE bug 1017308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10046">SUSE bug 1017308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10046">SUSE bug 1017308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10046">SUSE bug 1016742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10046">SUSE bug 1017308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10046">SUSE bug 1017308</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10048</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10048" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10048" source="CVE"/>
    <description>
    Directory traversal vulnerability in magick/module.c in ImageMagick 6.9.4-7 allows remote attackers to load arbitrary modules via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10048.html">CVE-2016-10048</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10048">SUSE bug 1017310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10048">SUSE bug 1017310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10048">SUSE bug 1017310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10048">SUSE bug 1017310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10048">SUSE bug 1017310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10048">SUSE bug 1017310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10048">SUSE bug 1017310</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148181" comment="GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148182" comment="GraphicsMagick-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148183" comment="libGraphicsMagick++-Q16-11-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148184" comment="libGraphicsMagick++-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148185" comment="libGraphicsMagick-Q16-3-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148186" comment="libGraphicsMagick3-config-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148187" comment="libGraphicsMagickWand-Q16-2-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148188" comment="perl-GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10049</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10049" source="CVE"/>
    <description>
    Buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick before 6.9.4-4 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10049.html">CVE-2016-10049</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10049">SUSE bug 1017311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10049">SUSE bug 1017311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10049">SUSE bug 1017311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10049">SUSE bug 1017311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10049">SUSE bug 1017311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10049">SUSE bug 1017311</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10050</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10050" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.9.4-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10050.html">CVE-2016-10050</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10050">SUSE bug 1017312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10050">SUSE bug 1017312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10050">SUSE bug 1017312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10050">SUSE bug 1017312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10050">SUSE bug 1017312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10050">SUSE bug 1017312</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10050">SUSE bug 1017312</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148181" comment="GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148182" comment="GraphicsMagick-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148183" comment="libGraphicsMagick++-Q16-11-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148184" comment="libGraphicsMagick++-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148185" comment="libGraphicsMagick-Q16-3-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148186" comment="libGraphicsMagick3-config-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148187" comment="libGraphicsMagickWand-Q16-2-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148188" comment="perl-GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10051</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10051" source="CVE"/>
    <description>
    Use-after-free vulnerability in the ReadPWPImage function in coders/pwp.c in ImageMagick 6.9.5-5 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10051.html">CVE-2016-10051</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10051">SUSE bug 1017313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10051">SUSE bug 1017313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10051">SUSE bug 1017313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10051">SUSE bug 1017313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10051">SUSE bug 1017313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10051">SUSE bug 1017313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148181" comment="GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148182" comment="GraphicsMagick-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148183" comment="libGraphicsMagick++-Q16-11-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148184" comment="libGraphicsMagick++-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148185" comment="libGraphicsMagick-Q16-3-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148186" comment="libGraphicsMagick3-config-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148187" comment="libGraphicsMagickWand-Q16-2-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148188" comment="perl-GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10052</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10052" source="CVE"/>
    <description>
    Buffer overflow in the WriteProfile function in coders/jpeg.c in ImageMagick before 6.9.5-6 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10052.html">CVE-2016-10052</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10052">SUSE bug 1017314</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10052">SUSE bug 1017314</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10052">SUSE bug 1017314</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10052">SUSE bug 1017314</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10052">SUSE bug 1017314</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10052">SUSE bug 1017314</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148181" comment="GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148182" comment="GraphicsMagick-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148183" comment="libGraphicsMagick++-Q16-11-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148184" comment="libGraphicsMagick++-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148185" comment="libGraphicsMagick-Q16-3-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148186" comment="libGraphicsMagick3-config-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148187" comment="libGraphicsMagickWand-Q16-2-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148188" comment="perl-GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10059</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10059" source="CVE"/>
    <description>
    Buffer overflow in coders/tiff.c in ImageMagick before 6.9.4-1 allows remote attackers to cause a denial of service (application crash) or have unspecified other impact via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10059.html">CVE-2016-10059</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10059">SUSE bug 1017318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10059">SUSE bug 1017318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10059">SUSE bug 1017318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10059">SUSE bug 1017318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10059">SUSE bug 1017318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10059">SUSE bug 1017318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10059">SUSE bug 1017318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10059">SUSE bug 1017318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10059">SUSE bug 1017318</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148181" comment="GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148182" comment="GraphicsMagick-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148183" comment="libGraphicsMagick++-Q16-11-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148184" comment="libGraphicsMagick++-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148185" comment="libGraphicsMagick-Q16-3-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148186" comment="libGraphicsMagick3-config-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148187" comment="libGraphicsMagickWand-Q16-2-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148188" comment="perl-GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10060</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10060" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10060" source="CVE"/>
    <description>
    The ConcatenateImages function in MagickWand/magick-cli.c in ImageMagick before 7.0.1-10 does not check the return value of the fputc function, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10060.html">CVE-2016-10060</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10060">SUSE bug 1017319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10060">SUSE bug 1017319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10060">SUSE bug 1017319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10060">SUSE bug 1017319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10060">SUSE bug 1017319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10060">SUSE bug 1017319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10060">SUSE bug 1017319</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10061</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10061" source="CVE"/>
    <description>
    The ReadGROUP4Image function in coders/tiff.c in ImageMagick before 7.0.1-10 does not check the return value of the fputc function, which allows remote attackers to cause a denial of service (crash) via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10061.html">CVE-2016-10061</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10061">SUSE bug 1017319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10061">SUSE bug 1017319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10061">SUSE bug 1017319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10061">SUSE bug 1017319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10061">SUSE bug 1017319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10061">SUSE bug 1017319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10061">SUSE bug 1017319</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10062</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10062" source="CVE"/>
    <description>
    The ReadGROUP4Image function in coders/tiff.c in ImageMagick does not check the return value of the fwrite function, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10062.html">CVE-2016-10062</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10062">SUSE bug 1017319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10062">SUSE bug 1017319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10062">SUSE bug 1017319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10062">SUSE bug 1017319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10062">SUSE bug 1017319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10062">SUSE bug 1017319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10062">SUSE bug 1017319</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10063</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10063" source="CVE"/>
    <description>
    Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file, related to extend validity.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10063.html">CVE-2016-10063</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10063">SUSE bug 1017320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10063">SUSE bug 1017320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10063">SUSE bug 1017320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10063">SUSE bug 1017320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10063">SUSE bug 1017320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10063">SUSE bug 1017320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10063">SUSE bug 1016589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10063">SUSE bug 1017320</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10064</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10064" source="CVE"/>
    <description>
    Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10064.html">CVE-2016-10064</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10064">SUSE bug 1017321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10064">SUSE bug 1017321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10064">SUSE bug 1017321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10064">SUSE bug 1017321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10064">SUSE bug 1017321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10064">SUSE bug 1016590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10064">SUSE bug 1017321</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148181" comment="GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148182" comment="GraphicsMagick-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148183" comment="libGraphicsMagick++-Q16-11-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148184" comment="libGraphicsMagick++-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148185" comment="libGraphicsMagick-Q16-3-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148186" comment="libGraphicsMagick3-config-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148187" comment="libGraphicsMagickWand-Q16-2-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148188" comment="perl-GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10065</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10065" source="CVE"/>
    <description>
    The ReadVIFFImage function in coders/viff.c in ImageMagick before 7.0.1-0 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10065.html">CVE-2016-10065</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10065">SUSE bug 1017322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10065">SUSE bug 1017322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10065">SUSE bug 1017322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10065">SUSE bug 1017322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10065">SUSE bug 1016591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10065">SUSE bug 1017322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10065">SUSE bug 1017322</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148181" comment="GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148182" comment="GraphicsMagick-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148183" comment="libGraphicsMagick++-Q16-11-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148184" comment="libGraphicsMagick++-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148185" comment="libGraphicsMagick-Q16-3-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148186" comment="libGraphicsMagick3-config-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148187" comment="libGraphicsMagickWand-Q16-2-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148188" comment="perl-GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10068</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10068" source="CVE"/>
    <description>
    The MSL interpreter in ImageMagick before 6.9.6-4 allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted XML file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10068.html">CVE-2016-10068</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10068">SUSE bug 1017324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10068">SUSE bug 1017324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10068">SUSE bug 1017324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10068">SUSE bug 1017324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10068">SUSE bug 1017324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10068">SUSE bug 1017324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10068">SUSE bug 1017324</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148181" comment="GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148182" comment="GraphicsMagick-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148183" comment="libGraphicsMagick++-Q16-11-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148184" comment="libGraphicsMagick++-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148185" comment="libGraphicsMagick-Q16-3-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148186" comment="libGraphicsMagick3-config-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148187" comment="libGraphicsMagickWand-Q16-2-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148188" comment="perl-GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10069</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10069" source="CVE"/>
    <description>
    coders/mat.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a mat file with an invalid number of frames.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10069.html">CVE-2016-10069</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10069">SUSE bug 1017325</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10069">SUSE bug 1017325</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10069">SUSE bug 1017325</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10069">SUSE bug 1017325</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10069">SUSE bug 1017325</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10069">SUSE bug 1017325</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10069">SUSE bug 1017325</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148181" comment="GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148182" comment="GraphicsMagick-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148183" comment="libGraphicsMagick++-Q16-11-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148184" comment="libGraphicsMagick++-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148185" comment="libGraphicsMagick-Q16-3-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148186" comment="libGraphicsMagick3-config-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148187" comment="libGraphicsMagickWand-Q16-2-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148188" comment="perl-GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10070</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10070" source="CVE"/>
    <description>
    Heap-based buffer overflow in the CalcMinMax function in coders/mat.c in ImageMagick before 6.9.4-0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted mat file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10070.html">CVE-2016-10070</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10070">SUSE bug 1017326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10070">SUSE bug 1017326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10070">SUSE bug 1017326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10070">SUSE bug 1017326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10070">SUSE bug 1017326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10070">SUSE bug 1017326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10070">SUSE bug 1017326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10070">SUSE bug 1017326</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148181" comment="GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148182" comment="GraphicsMagick-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148183" comment="libGraphicsMagick++-Q16-11-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148184" comment="libGraphicsMagick++-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148185" comment="libGraphicsMagick-Q16-3-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148186" comment="libGraphicsMagick3-config-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148187" comment="libGraphicsMagickWand-Q16-2-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148188" comment="perl-GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10071</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10071" source="CVE"/>
    <description>
    coders/mat.c in ImageMagick before 6.9.4-0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted mat file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10071.html">CVE-2016-10071</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10071">SUSE bug 1017326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10071">SUSE bug 1017326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10071">SUSE bug 1017326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10071">SUSE bug 1017326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10071">SUSE bug 1017326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10071">SUSE bug 1017326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10071">SUSE bug 1017326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10071">SUSE bug 1017326</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10087</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10087" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10087" source="CVE"/>
    <description>
    The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10087.html">CVE-2016-10087</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10087">SUSE bug 1017646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10087">SUSE bug 1017646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10087">SUSE bug 1017646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10087">SUSE bug 1017646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10087">SUSE bug 1017646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10087">SUSE bug 1017646</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150711" comment="libpng12-1.2.50-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153098" comment="libpng12 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150712" comment="libpng12-0-1.2.50-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151411" comment="libpng12-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150713" comment="libpng12-0-32bit-1.2.50-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151412" comment="libpng12-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150714" comment="libpng12-compat-devel-1.2.50-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153099" comment="libpng12-compat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150715" comment="libpng12-compat-devel-32bit-1.2.50-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153100" comment="libpng12-compat-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150716" comment="libpng12-devel-1.2.50-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151413" comment="libpng12-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150717" comment="libpng12-devel-32bit-1.2.50-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153101" comment="libpng12-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154523" comment="libpng15-1.5.22-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153131" comment="libpng15 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154524" comment="libpng15-15-1.5.22-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153132" comment="libpng15-15 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154525" comment="libpng15-15-32bit-1.5.22-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153133" comment="libpng15-15-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150718" comment="libpng16-1.6.8-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153134" comment="libpng16 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150719" comment="libpng16-16-1.6.8-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150720" comment="libpng16-16-32bit-1.6.8-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151415" comment="libpng16-16-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150721" comment="libpng16-compat-devel-1.6.8-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150722" comment="libpng16-compat-devel-32bit-1.6.8-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153135" comment="libpng16-compat-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150723" comment="libpng16-devel-1.6.8-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150724" comment="libpng16-devel-32bit-1.6.8-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153136" comment="libpng16-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150725" comment="libpng16-tools-1.6.8-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153137" comment="libpng16-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10088</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10088" source="CVE"/>
    <description>
    The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10088.html">CVE-2016-10088</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10088">SUSE bug 1019079</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148345" comment="kernel-debug-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148346" comment="kernel-debug-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148347" comment="kernel-debug-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148348" comment="kernel-default-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148349" comment="kernel-default-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148350" comment="kernel-default-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148351" comment="kernel-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148352" comment="kernel-docs-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148353" comment="kernel-docs-html-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148354" comment="kernel-docs-pdf-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148355" comment="kernel-ec2-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148356" comment="kernel-ec2-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148357" comment="kernel-ec2-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148358" comment="kernel-macros-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148359" comment="kernel-obs-build-4.1.38-47.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148360" comment="kernel-obs-qa-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148361" comment="kernel-pae-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148362" comment="kernel-pae-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148363" comment="kernel-pae-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148364" comment="kernel-pv-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148365" comment="kernel-pv-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148366" comment="kernel-pv-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148367" comment="kernel-source-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148368" comment="kernel-source-vanilla-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148369" comment="kernel-syms-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148370" comment="kernel-vanilla-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148371" comment="kernel-vanilla-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148372" comment="kernel-xen-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148373" comment="kernel-xen-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148374" comment="kernel-xen-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10109</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10109" source="CVE"/>
    <description>
    Use-after-free vulnerability in pcsc-lite before 1.8.20 allows a remote attackers to cause denial of service (crash) via a command that uses "cardsList" after the handle has been released through the SCardReleaseContext function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10109.html">CVE-2016-10109</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10109">SUSE bug 1017902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10109">SUSE bug 1017902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10109">SUSE bug 1017902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10109">SUSE bug 1017902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10109">SUSE bug 1017902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10109">SUSE bug 1017902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10109">SUSE bug 1017902</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147293" comment="libpcsclite1-1.8.14-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151385" comment="libpcsclite1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147294" comment="libpcsclite1-32bit-1.8.14-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153553" comment="libpcsclite1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147295" comment="libpcscspy0-1.8.14-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153554" comment="libpcscspy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147296" comment="libpcscspy0-32bit-1.8.14-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153555" comment="libpcscspy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147297" comment="pcsc-lite-1.8.14-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151386" comment="pcsc-lite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147298" comment="pcsc-lite-devel-1.8.14-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153556" comment="pcsc-lite-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10128</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10128" source="CVE"/>
    <description>
    Buffer overflow in the git_pkt_parse_line function in transports/smart_pkt.c in the Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to have unspecified impact via a crafted non-flush packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10128.html">CVE-2016-10128</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10128">SUSE bug 1019036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10128">SUSE bug 1019036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10128">SUSE bug 1019036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10128">SUSE bug 1019036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10128">SUSE bug 1019036</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148177" comment="libgit2-0.22.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153557" comment="libgit2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148178" comment="libgit2-22-0.22.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153558" comment="libgit2-22 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148179" comment="libgit2-22-32bit-0.22.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153559" comment="libgit2-22-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148180" comment="libgit2-devel-0.22.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153560" comment="libgit2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10129</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10129" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10129" source="CVE"/>
    <description>
    The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via an empty packet line.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10129.html">CVE-2016-10129</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10129">SUSE bug 1019036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10129">SUSE bug 1019036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10129">SUSE bug 1019036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10129">SUSE bug 1019036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10129">SUSE bug 1019036</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148177" comment="libgit2-0.22.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153557" comment="libgit2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148178" comment="libgit2-22-0.22.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153558" comment="libgit2-22 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148179" comment="libgit2-22-32bit-0.22.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153559" comment="libgit2-22-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148180" comment="libgit2-devel-0.22.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153560" comment="libgit2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10130</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10130" source="CVE"/>
    <description>
    The http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10130.html">CVE-2016-10130</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10130">SUSE bug 1019037</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10130">SUSE bug 1019037</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10130">SUSE bug 1019037</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10130">SUSE bug 1019037</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10130">SUSE bug 1019037</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148177" comment="libgit2-0.22.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153557" comment="libgit2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148178" comment="libgit2-22-0.22.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153558" comment="libgit2-22 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148179" comment="libgit2-22-32bit-0.22.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153559" comment="libgit2-22-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148180" comment="libgit2-devel-0.22.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153560" comment="libgit2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10132</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10132" source="CVE"/>
    <description>
    regexp.c in Artifex Software, Inc. MuJS allows attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to regular expression compilation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10132.html">CVE-2016-10132</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10132">SUSE bug 1019877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10132">SUSE bug 1019877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10132">SUSE bug 1019877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10132">SUSE bug 1019877</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148038" comment="mupdf-1.10a-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153561" comment="mupdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148039" comment="mupdf-devel-static-1.10a-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153562" comment="mupdf-devel-static is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10133</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10133" source="CVE"/>
    <description>
    Heap-based buffer overflow in the js_stackoverflow function in jsrun.c in Artifex Software, Inc. MuJS allows attackers to have unspecified impact by leveraging an error when dropping extra arguments to lightweight functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10133.html">CVE-2016-10133</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10133">SUSE bug 1019877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10133">SUSE bug 1019877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10133">SUSE bug 1019877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10133">SUSE bug 1019877</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148038" comment="mupdf-1.10a-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153561" comment="mupdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148039" comment="mupdf-devel-static-1.10a-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153562" comment="mupdf-devel-static is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10141</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10141" source="CVE"/>
    <description>
    An integer overflow vulnerability was observed in the regemit function in regexp.c in Artifex Software, Inc. MuJS before fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045. The attack requires a regular expression with nested repetition. A successful exploitation of this issue can lead to code execution or a denial of service (buffer overflow) condition.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10141.html">CVE-2016-10141</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10141">SUSE bug 1019877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10141">SUSE bug 1019877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10141">SUSE bug 1019877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10141">SUSE bug 1019877</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148038" comment="mupdf-1.10a-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153561" comment="mupdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148039" comment="mupdf-devel-static-1.10a-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153562" comment="mupdf-devel-static is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10144</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10144" source="CVE"/>
    <description>
    coders/ipl.c in ImageMagick allows remote attackers to have unspecific impact by leveraging a missing malloc check.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10144.html">CVE-2016-10144</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10144">SUSE bug 1020433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10144">SUSE bug 1020433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10144">SUSE bug 1020433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10144">SUSE bug 1020433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10144">SUSE bug 1020433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10144">SUSE bug 1020433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10144">SUSE bug 1020433</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10145</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10145" source="CVE"/>
    <description>
    Off-by-one error in coders/wpg.c in ImageMagick allows remote attackers to have unspecified impact via vectors related to a string copy.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10145.html">CVE-2016-10145</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10145">SUSE bug 1020435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10145">SUSE bug 1020435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10145">SUSE bug 1020435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10145">SUSE bug 1020435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10145">SUSE bug 1020435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10145">SUSE bug 1020435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10145">SUSE bug 1020435</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10146</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10146" source="CVE"/>
    <description>
    Multiple memory leaks in the caption and label handling code in ImageMagick allow remote attackers to cause a denial of service (memory consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10146.html">CVE-2016-10146</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10146">SUSE bug 1020443</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10146">SUSE bug 1020443</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10146">SUSE bug 1020443</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10146">SUSE bug 1020443</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10146">SUSE bug 1020443</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10146">SUSE bug 1020443</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10146">SUSE bug 1020443</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10146">SUSE bug 1020443</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148181" comment="GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148182" comment="GraphicsMagick-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148183" comment="libGraphicsMagick++-Q16-11-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148184" comment="libGraphicsMagick++-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148185" comment="libGraphicsMagick-Q16-3-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148186" comment="libGraphicsMagick3-config-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148187" comment="libGraphicsMagickWand-Q16-2-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148188" comment="perl-GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10147</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10147" source="CVE"/>
    <description>
    crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10147.html">CVE-2016-10147</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10147">SUSE bug 1020381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10147">SUSE bug 1020429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10147">SUSE bug 1020381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10147">SUSE bug 1020429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10147">SUSE bug 1020381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10147">SUSE bug 1020381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10147">SUSE bug 1020381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10147">SUSE bug 1020381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10147">SUSE bug 1020381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10147">SUSE bug 1020429</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148345" comment="kernel-debug-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148346" comment="kernel-debug-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148347" comment="kernel-debug-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148348" comment="kernel-default-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148349" comment="kernel-default-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148350" comment="kernel-default-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148351" comment="kernel-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148352" comment="kernel-docs-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148353" comment="kernel-docs-html-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148354" comment="kernel-docs-pdf-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148355" comment="kernel-ec2-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148356" comment="kernel-ec2-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148357" comment="kernel-ec2-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148358" comment="kernel-macros-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148359" comment="kernel-obs-build-4.1.38-47.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148360" comment="kernel-obs-qa-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148361" comment="kernel-pae-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148362" comment="kernel-pae-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148363" comment="kernel-pae-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148364" comment="kernel-pv-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148365" comment="kernel-pv-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148366" comment="kernel-pv-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148367" comment="kernel-source-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148368" comment="kernel-source-vanilla-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148369" comment="kernel-syms-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148370" comment="kernel-vanilla-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148371" comment="kernel-vanilla-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148372" comment="kernel-xen-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148373" comment="kernel-xen-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148374" comment="kernel-xen-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10155</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10155" source="CVE"/>
    <description>
    Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10155.html">CVE-2016-10155</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1021129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1021129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1021129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1024183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1024183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1024183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1024183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1021129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1021129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1021129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1021129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1024183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1021129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1021129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1021129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1021129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1021129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1021129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1021129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1021129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1024183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1024183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1021129</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10155">SUSE bug 1021129</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155579" comment="qemu-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155580" comment="qemu-arm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155581" comment="qemu-block-curl-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155582" comment="qemu-block-rbd-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155583" comment="qemu-extra-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155584" comment="qemu-guest-agent-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155585" comment="qemu-ipxe-1.0.0-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155586" comment="qemu-kvm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155587" comment="qemu-lang-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155588" comment="qemu-linux-user-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155589" comment="qemu-ppc-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155590" comment="qemu-s390-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155591" comment="qemu-seabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155592" comment="qemu-sgabios-8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155593" comment="qemu-testsuite-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155594" comment="qemu-tools-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155595" comment="qemu-vgabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155596" comment="qemu-x86-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10164</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10164" source="CVE"/>
    <description>
    Multiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10164.html">CVE-2016-10164</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10164">SUSE bug 1021315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10164">SUSE bug 1021315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10164">SUSE bug 1021315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10164">SUSE bug 1021315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10164">SUSE bug 1021315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10164">SUSE bug 1021315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10164">SUSE bug 1021315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10164">SUSE bug 1021315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10164">SUSE bug 1021315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10164">SUSE bug 1021315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10164">SUSE bug 1021315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10164">SUSE bug 1021315</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148933" comment="libXpm-3.5.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153563" comment="libXpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148934" comment="libXpm-devel-3.5.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153564" comment="libXpm-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148935" comment="libXpm-devel-32bit-3.5.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153565" comment="libXpm-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148936" comment="libXpm-tools-3.5.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153566" comment="libXpm-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148937" comment="libXpm4-3.5.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153567" comment="libXpm4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148938" comment="libXpm4-32bit-3.5.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153568" comment="libXpm4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10166</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166" source="CVE"/>
    <description>
    Integer underflow in the _gdContributionsAlloc function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors related to decrementing the u variable.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10166.html">CVE-2016-10166</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10166">SUSE bug 1022069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10166">SUSE bug 1022263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10166">SUSE bug 1022263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10166">SUSE bug 1022263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10166">SUSE bug 1022263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10166">SUSE bug 1022263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10166">SUSE bug 1022263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10166">SUSE bug 1022263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10166">SUSE bug 1022263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10166">SUSE bug 1022263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10166">SUSE bug 1022263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10166">SUSE bug 1022263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10166">SUSE bug 1022263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10166">SUSE bug 1022263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10166">SUSE bug 1022263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10166">SUSE bug 1022263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10166">SUSE bug 1022263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10166">SUSE bug 1022263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10166">SUSE bug 1022263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10166">SUSE bug 1022263</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148800" comment="gd-2.1.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148801" comment="gd-32bit-2.1.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152101" comment="gd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148802" comment="gd-devel-2.1.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153569" comment="gd-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10167</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167" source="CVE"/>
    <description>
    The gdImageCreateFromGd2Ctx function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (application crash) via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10167.html">CVE-2016-10167</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10167">SUSE bug 1022264</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148800" comment="gd-2.1.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148801" comment="gd-32bit-2.1.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152101" comment="gd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148802" comment="gd-devel-2.1.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153569" comment="gd-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10168</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168" source="CVE"/>
    <description>
    Integer overflow in gd_io.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors involving the number of horizontal and vertical chunks in an image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10168.html">CVE-2016-10168</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10168">SUSE bug 1022265</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148800" comment="gd-2.1.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148801" comment="gd-32bit-2.1.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152101" comment="gd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148802" comment="gd-devel-2.1.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153569" comment="gd-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10189</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10189" source="CVE"/>
    <description>
    BitlBee before 3.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) and possibly execute arbitrary code via a file transfer request for a contact that is not in the contact list.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10189.html">CVE-2016-10189</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10189">SUSE bug 1022498</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10189">SUSE bug 1022498</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10189">SUSE bug 1022498</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149469" comment="bitlbee-3.4.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153570" comment="bitlbee is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149470" comment="bitlbee-doc-3.4.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153571" comment="bitlbee-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10198</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198" source="CVE"/>
    <description>
    The gst_aac_parse_sink_setcaps function in gst/audioparsers/gstaacparse.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted audio file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10198.html">CVE-2016-10198</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10198">SUSE bug 1023259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10198">SUSE bug 1024014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10198">SUSE bug 1024014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10198">SUSE bug 1024014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10198">SUSE bug 1024014</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154627" comment="gstreamer-plugins-good-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153915" comment="gstreamer-plugins-good is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154628" comment="gstreamer-plugins-good-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153916" comment="gstreamer-plugins-good-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154629" comment="gstreamer-plugins-good-doc-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153917" comment="gstreamer-plugins-good-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154630" comment="gstreamer-plugins-good-extra-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153918" comment="gstreamer-plugins-good-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154631" comment="gstreamer-plugins-good-extra-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153919" comment="gstreamer-plugins-good-extra-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154632" comment="gstreamer-plugins-good-lang-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153920" comment="gstreamer-plugins-good-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10199</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199" source="CVE"/>
    <description>
    The qtdemux_tag_add_str_full function in gst/isomp4/qtdemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted tag value.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10199.html">CVE-2016-10199</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10199">SUSE bug 1023259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10199">SUSE bug 1024017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10199">SUSE bug 1024017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10199">SUSE bug 1024017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10199">SUSE bug 1024017</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154627" comment="gstreamer-plugins-good-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153915" comment="gstreamer-plugins-good is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154628" comment="gstreamer-plugins-good-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153916" comment="gstreamer-plugins-good-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154629" comment="gstreamer-plugins-good-doc-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153917" comment="gstreamer-plugins-good-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154630" comment="gstreamer-plugins-good-extra-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153918" comment="gstreamer-plugins-good-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154631" comment="gstreamer-plugins-good-extra-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153919" comment="gstreamer-plugins-good-extra-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154632" comment="gstreamer-plugins-good-lang-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153920" comment="gstreamer-plugins-good-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10200</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10200" source="CVE"/>
    <description>
    Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10200.html">CVE-2016-10200</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10200">SUSE bug 1028415</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150436" comment="kernel-debug-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150437" comment="kernel-debug-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150438" comment="kernel-debug-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150439" comment="kernel-default-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150440" comment="kernel-default-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150441" comment="kernel-default-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150442" comment="kernel-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150443" comment="kernel-docs-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150444" comment="kernel-docs-html-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150445" comment="kernel-docs-pdf-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150446" comment="kernel-ec2-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150447" comment="kernel-ec2-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150448" comment="kernel-ec2-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150449" comment="kernel-macros-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150450" comment="kernel-obs-build-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150451" comment="kernel-obs-qa-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150452" comment="kernel-pae-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150453" comment="kernel-pae-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150454" comment="kernel-pae-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150455" comment="kernel-pv-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150456" comment="kernel-pv-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150457" comment="kernel-pv-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150458" comment="kernel-source-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150459" comment="kernel-source-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150460" comment="kernel-syms-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150461" comment="kernel-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150462" comment="kernel-vanilla-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150463" comment="kernel-xen-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150464" comment="kernel-xen-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150465" comment="kernel-xen-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10207</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10207" source="CVE"/>
    <description>
    The Xvnc server in TigerVNC allows remote attackers to cause a denial of service (invalid memory access and crash) by terminating a TLS handshake early.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10207.html">CVE-2016-10207</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10207">SUSE bug 1023012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10207">SUSE bug 1023012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10207">SUSE bug 1023012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10207">SUSE bug 1023012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10207">SUSE bug 1023012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10207">SUSE bug 1023012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10207">SUSE bug 1023012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10207">SUSE bug 1023012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10207">SUSE bug 1023012</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148331" comment="tigervnc-1.5.0-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152053" comment="tigervnc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148332" comment="xorg-x11-Xvnc-1.5.0-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152054" comment="xorg-x11-Xvnc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10208</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10208" source="CVE"/>
    <description>
    The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10208.html">CVE-2016-10208</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10208">SUSE bug 1023377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10208">SUSE bug 1023377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10208">SUSE bug 1023377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10208">SUSE bug 1023377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10208">SUSE bug 1023377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10208">SUSE bug 1023377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10208">SUSE bug 1023377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10208">SUSE bug 1023377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10208">SUSE bug 1023377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10208">SUSE bug 1023377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10208">SUSE bug 1023377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10208">SUSE bug 1023377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10208">SUSE bug 1023377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10208">SUSE bug 1023377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10208">SUSE bug 1023377</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150436" comment="kernel-debug-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150437" comment="kernel-debug-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150438" comment="kernel-debug-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150439" comment="kernel-default-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150440" comment="kernel-default-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150441" comment="kernel-default-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150442" comment="kernel-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150443" comment="kernel-docs-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150444" comment="kernel-docs-html-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150445" comment="kernel-docs-pdf-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150446" comment="kernel-ec2-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150447" comment="kernel-ec2-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150448" comment="kernel-ec2-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150449" comment="kernel-macros-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150450" comment="kernel-obs-build-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150451" comment="kernel-obs-qa-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150452" comment="kernel-pae-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150453" comment="kernel-pae-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150454" comment="kernel-pae-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150455" comment="kernel-pv-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150456" comment="kernel-pv-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150457" comment="kernel-pv-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150458" comment="kernel-source-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150459" comment="kernel-source-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150460" comment="kernel-syms-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150461" comment="kernel-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150462" comment="kernel-vanilla-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150463" comment="kernel-xen-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150464" comment="kernel-xen-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150465" comment="kernel-xen-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10220</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10220" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10220" source="CVE"/>
    <description>
    The gs_makewordimagedevice function in base/gsdevmem.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file that is mishandled in the PDF Transparency module.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10220.html">CVE-2016-10220</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10220">SUSE bug 1032120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10220">SUSE bug 1032120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10220">SUSE bug 1032120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10220">SUSE bug 1032120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10220">SUSE bug 1032120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10220">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10220">SUSE bug 1032120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10220">SUSE bug 1032120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10220">SUSE bug 1032120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10220">SUSE bug 1032120</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10220">SUSE bug 1032120</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155225" comment="ghostscript-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155226" comment="ghostscript-devel-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135535" comment="ghostscript-mini-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135536" comment="ghostscript-mini-devel-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155227" comment="ghostscript-x11-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10251</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10251" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10251" source="CVE"/>
    <description>
    Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in JasPer before 1.900.20 allows remote attackers to have unspecified impact via a crafted file, which triggers use of an uninitialized value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10251.html">CVE-2016-10251</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10251">SUSE bug 1029497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10251">SUSE bug 1029497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10251">SUSE bug 1029497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10251">SUSE bug 1029497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10251">SUSE bug 1029497</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154526" comment="jasper-1.900.14-176.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154527" comment="libjasper-devel-1.900.14-176.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154528" comment="libjasper1-1.900.14-176.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154529" comment="libjasper1-32bit-1.900.14-176.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10266</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10266" source="CVE"/>
    <description>
    LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_read.c:351:22.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10266.html">CVE-2016-10266</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10266">SUSE bug 1031263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10266">SUSE bug 1031263</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154750" comment="libtiff-devel-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154751" comment="libtiff-devel-32bit-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154752" comment="libtiff5-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154753" comment="libtiff5-32bit-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154754" comment="tiff-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10267</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10267" source="CVE"/>
    <description>
    LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10267.html">CVE-2016-10267</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10267">SUSE bug 1031262</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10267">SUSE bug 1031262</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154750" comment="libtiff-devel-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154751" comment="libtiff-devel-32bit-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154752" comment="libtiff5-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154753" comment="libtiff5-32bit-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154754" comment="tiff-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10268</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10268" source="CVE"/>
    <description>
    tools/tiffcp.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (integer underflow and heap-based buffer under-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 78490" and libtiff/tif_unix.c:115:23.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10268.html">CVE-2016-10268</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10268">SUSE bug 1031255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10268">SUSE bug 1031255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10268">SUSE bug 1031255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10268">SUSE bug 1031255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10268">SUSE bug 1031255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10268">SUSE bug 1031255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10268">SUSE bug 1031255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10268">SUSE bug 1031255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10268">SUSE bug 1031255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10268">SUSE bug 1031255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10268">SUSE bug 1031255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10268">SUSE bug 1031255</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154750" comment="libtiff-devel-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154751" comment="libtiff-devel-32bit-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154752" comment="libtiff5-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154753" comment="libtiff5-32bit-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154754" comment="tiff-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10269</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10269" source="CVE"/>
    <description>
    LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 512" and libtiff/tif_unix.c:340:2.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10269.html">CVE-2016-10269</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10269">SUSE bug 1031254</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10269">SUSE bug 1031254</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154750" comment="libtiff-devel-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154751" comment="libtiff-devel-32bit-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154752" comment="libtiff5-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154753" comment="libtiff5-32bit-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154754" comment="tiff-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10270</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10270" source="CVE"/>
    <description>
    LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 8" and libtiff/tif_read.c:523:22.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10270.html">CVE-2016-10270</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10270">SUSE bug 1031250</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10270">SUSE bug 1031250</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154750" comment="libtiff-devel-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154751" comment="libtiff-devel-32bit-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154752" comment="libtiff5-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154753" comment="libtiff5-32bit-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154754" comment="tiff-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10271</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" source="CVE"/>
    <description>
    tools/tiffcrop.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read and buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 1" and libtiff/tif_fax3.c:413:13.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10271.html">CVE-2016-10271</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10271">SUSE bug 1031249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10271">SUSE bug 1031249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10271">SUSE bug 1031249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10271">SUSE bug 1031249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10271">SUSE bug 1031249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10271">SUSE bug 1031249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10271">SUSE bug 1031249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10271">SUSE bug 1031249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10271">SUSE bug 1031249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10271">SUSE bug 1031249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10271">SUSE bug 1031249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10271">SUSE bug 1031249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10271">SUSE bug 1031249</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154750" comment="libtiff-devel-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154751" comment="libtiff-devel-32bit-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154752" comment="libtiff5-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154753" comment="libtiff5-32bit-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154754" comment="tiff-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10272</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" source="CVE"/>
    <description>
    LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to "WRITE of size 2048" and libtiff/tif_next.c:64:9.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10272.html">CVE-2016-10272</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10272">SUSE bug 1031247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10272">SUSE bug 1031247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10272">SUSE bug 1031247</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154750" comment="libtiff-devel-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154751" comment="libtiff-devel-32bit-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154752" comment="libtiff5-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154753" comment="libtiff5-32bit-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154754" comment="tiff-4.0.7-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10318</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10318" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10318" source="CVE"/>
    <description>
    A missing authorization check in the fscrypt_process_policy function in fs/crypto/policy.c in the ext4 and f2fs filesystem encryption support in the Linux kernel before 4.7.4 allows a user to assign an encryption policy to a directory owned by a different user, potentially creating a denial of service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10318.html">CVE-2016-10318</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10318">SUSE bug 1032435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10318">SUSE bug 1032435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10318">SUSE bug 1032435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10318">SUSE bug 1032435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10318">SUSE bug 1032435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10318">SUSE bug 1032435</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10318">SUSE bug 1032435</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155173" comment="kernel-debug-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155174" comment="kernel-debug-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155175" comment="kernel-debug-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155176" comment="kernel-default-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155177" comment="kernel-default-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155178" comment="kernel-default-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155179" comment="kernel-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155180" comment="kernel-docs-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155181" comment="kernel-docs-html-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155182" comment="kernel-docs-pdf-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155183" comment="kernel-ec2-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155184" comment="kernel-ec2-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155185" comment="kernel-ec2-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155186" comment="kernel-macros-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155187" comment="kernel-obs-build-4.1.39-56.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155188" comment="kernel-obs-qa-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155189" comment="kernel-pae-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155190" comment="kernel-pae-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155191" comment="kernel-pae-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155192" comment="kernel-pv-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155193" comment="kernel-pv-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155194" comment="kernel-pv-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155195" comment="kernel-source-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155196" comment="kernel-source-vanilla-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155197" comment="kernel-syms-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155198" comment="kernel-vanilla-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155199" comment="kernel-vanilla-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155200" comment="kernel-xen-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155201" comment="kernel-xen-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155202" comment="kernel-xen-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10324</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10324" source="CVE"/>
    <description>
    In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a heap buffer overflow in the osip_clrncpy() function defined in osipparser2/osip_port.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10324.html">CVE-2016-10324</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10324">SUSE bug 1034574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10324">SUSE bug 1034574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10324">SUSE bug 1034574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10324">SUSE bug 1034574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10324">SUSE bug 1034574</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10324">SUSE bug 1034574</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154843" comment="libosip2-4.1.0-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154844" comment="libosip2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154845" comment="libosip2-devel-4.1.0-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154846" comment="libosip2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10325</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10325" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10325" source="CVE"/>
    <description>
    In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a heap buffer overflow in the _osip_message_to_str() function defined in osipparser2/osip_message_to_str.c, resulting in a remote DoS.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10325.html">CVE-2016-10325</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10325">SUSE bug 1034572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10325">SUSE bug 1034572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10325">SUSE bug 1034572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10325">SUSE bug 1034572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10325">SUSE bug 1034572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10325">SUSE bug 1034572</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154843" comment="libosip2-4.1.0-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154844" comment="libosip2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154845" comment="libosip2-devel-4.1.0-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154846" comment="libosip2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10326</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-10326" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10326" source="CVE"/>
    <description>
    In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a heap buffer overflow in the osip_body_to_str() function defined in osipparser2/osip_body.c, resulting in a remote DoS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-10326.html">CVE-2016-10326</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10326">SUSE bug 1034571</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10326">SUSE bug 1034571</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10326">SUSE bug 1034571</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10326">SUSE bug 1034571</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10326">SUSE bug 1034571</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-10326">SUSE bug 1034571</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154843" comment="libosip2-4.1.0-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154844" comment="libosip2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154845" comment="libosip2-devel-4.1.0-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154846" comment="libosip2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1234</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234" source="CVE"/>
    <description>
    Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1234.html">CVE-2016-1234</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 988770</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 988782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 988782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 989127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1234">SUSE bug 969727</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129885" comment="glibc-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129886" comment="glibc-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129887" comment="glibc-devel-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129888" comment="glibc-devel-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152566" comment="glibc-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129889" comment="glibc-devel-static-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129890" comment="glibc-devel-static-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152568" comment="glibc-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129891" comment="glibc-extra-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129892" comment="glibc-html-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129893" comment="glibc-i18ndata-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129894" comment="glibc-info-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129895" comment="glibc-locale-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129896" comment="glibc-locale-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129897" comment="glibc-obsolete-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152571" comment="glibc-obsolete is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129898" comment="glibc-profile-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129899" comment="glibc-profile-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152573" comment="glibc-profile-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129900" comment="glibc-testsuite-2.19-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152574" comment="glibc-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129901" comment="glibc-utils-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129902" comment="glibc-utils-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152576" comment="glibc-utils-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129903" comment="nscd-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1237</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1237" source="CVE"/>
    <description>
    nfsd in the Linux kernel through 4.6.3 allows local users to bypass intended file-permission restrictions by setting a POSIX ACL, related to nfs2acl.c, nfs3acl.c, and nfs4acl.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1237.html">CVE-2016-1237</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1237">SUSE bug 986570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1237">SUSE bug 986570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1237">SUSE bug 986570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1237">SUSE bug 986570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1237">SUSE bug 986570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1237">SUSE bug 986570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1237">SUSE bug 986570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1237">SUSE bug 986570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1237">SUSE bug 986570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1237">SUSE bug 986570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1237">SUSE bug 986570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1237">SUSE bug 986570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1237">SUSE bug 986570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1237">SUSE bug 986570</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134384" comment="drbd-8.4.6-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134385" comment="drbd-kmp-default-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134386" comment="drbd-kmp-pv-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134387" comment="drbd-kmp-xen-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134388" comment="hdjmod-1.28-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134389" comment="hdjmod-kmp-default-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134390" comment="hdjmod-kmp-pae-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134391" comment="hdjmod-kmp-pv-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134392" comment="hdjmod-kmp-xen-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134393" comment="ipset-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134394" comment="ipset-devel-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134395" comment="ipset-kmp-default-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134396" comment="ipset-kmp-pae-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134397" comment="ipset-kmp-pv-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134398" comment="ipset-kmp-xen-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134399" comment="kernel-debug-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134400" comment="kernel-debug-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134401" comment="kernel-debug-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134402" comment="kernel-default-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134403" comment="kernel-default-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134404" comment="kernel-default-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134405" comment="kernel-devel-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134406" comment="kernel-docs-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134407" comment="kernel-docs-html-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134408" comment="kernel-docs-pdf-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134409" comment="kernel-ec2-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134410" comment="kernel-ec2-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134411" comment="kernel-ec2-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134412" comment="kernel-macros-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134413" comment="kernel-obs-build-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134414" comment="kernel-obs-qa-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134415" comment="kernel-obs-qa-xen-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134416" comment="kernel-pae-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134417" comment="kernel-pae-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134418" comment="kernel-pae-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134419" comment="kernel-pv-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134420" comment="kernel-pv-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134421" comment="kernel-pv-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134422" comment="kernel-source-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134423" comment="kernel-source-vanilla-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134424" comment="kernel-syms-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134425" comment="kernel-vanilla-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134426" comment="kernel-vanilla-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134427" comment="kernel-xen-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134428" comment="kernel-xen-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134429" comment="kernel-xen-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134430" comment="libipset3-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134431" comment="lttng-modules-2.7.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134432" comment="lttng-modules-kmp-default-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134433" comment="lttng-modules-kmp-pv-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134434" comment="pcfclock-0.44-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134435" comment="pcfclock-kmp-default-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134436" comment="pcfclock-kmp-pae-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134437" comment="pcfclock-kmp-pv-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134438" comment="vhba-kmp-20140928-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134439" comment="vhba-kmp-default-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134440" comment="vhba-kmp-pae-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134441" comment="vhba-kmp-pv-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134442" comment="vhba-kmp-xen-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1238</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238" source="CVE"/>
    <description>
    (1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1238.html">CVE-2016-1238</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1238">SUSE bug 987887</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1238">SUSE bug 987887</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1238">SUSE bug 988311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1238">SUSE bug 987887</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1238">SUSE bug 987887</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1238">SUSE bug 987887</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1238">SUSE bug 987887</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1238">SUSE bug 987887</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1238">SUSE bug 987887</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1238">SUSE bug 987887</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1238">SUSE bug 987887</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1238">SUSE bug 987887</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1238">SUSE bug 987887</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1238">SUSE bug 987887</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1238">SUSE bug 987887</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1238">SUSE bug 987887</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134449" comment="perl-5.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151455" comment="perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134450" comment="perl-32bit-5.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151456" comment="perl-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134451" comment="perl-base-5.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151457" comment="perl-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134452" comment="perl-base-32bit-5.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153231" comment="perl-base-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134453" comment="perl-doc-5.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151458" comment="perl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1245</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1245" source="CVE"/>
    <description>
    It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1245.html">CVE-2016-1245</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1245">SUSE bug 1005258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1245">SUSE bug 1005258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1245">SUSE bug 1005258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1245">SUSE bug 1005258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1245">SUSE bug 1005258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1245">SUSE bug 1005258</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135117" comment="quagga-0.99.24.1-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151418" comment="quagga is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135118" comment="quagga-devel-0.99.24.1-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153572" comment="quagga-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1246</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1246" source="CVE"/>
    <description>
    Buffer overflow in the DBD::mysql module before 4.037 for Perl allows context-dependent attackers to cause a denial of service (crash) via vectors related to an error message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1246.html">CVE-2016-1246</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1246">SUSE bug 1002626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1246">SUSE bug 1002626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1246">SUSE bug 1002626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1246">SUSE bug 1002626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1246">SUSE bug 1002626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1246">SUSE bug 1002626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1246">SUSE bug 1002626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1246">SUSE bug 1002626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1246">SUSE bug 1002626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1246">SUSE bug 1002626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1246">SUSE bug 1002626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1246">SUSE bug 1002626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1246">SUSE bug 1002626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1246">SUSE bug 1002626</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1246">SUSE bug 1002626</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147470" comment="perl-DBD-mysql-4.021-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153573" comment="perl-DBD-mysql is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1248</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1248" source="CVE"/>
    <description>
    vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1248.html">CVE-2016-1248</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1248">SUSE bug 1010685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1248">SUSE bug 1010685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1248">SUSE bug 1010685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1248">SUSE bug 1010685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1248">SUSE bug 1010685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1248">SUSE bug 1010685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1248">SUSE bug 1010685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1248">SUSE bug 1010685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1248">SUSE bug 1010685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1248">SUSE bug 1010685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1248">SUSE bug 1010685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1248">SUSE bug 1010685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1248">SUSE bug 1010685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1248">SUSE bug 1010685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1248">SUSE bug 1010685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1248">SUSE bug 1010685</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136326" comment="gvim-7.4.326-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151192" comment="gvim is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136327" comment="vim-7.4.326-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151193" comment="vim is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136328" comment="vim-data-7.4.326-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151194" comment="vim-data is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1249</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1249" source="CVE"/>
    <description>
    The DBD::mysql module before 4.039 for Perl, when using server-side prepared statement support, allows attackers to cause a denial of service (out-of-bounds read) via vectors involving an unaligned number of placeholders in WHERE condition and output fields in SELECT expression.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1249.html">CVE-2016-1249</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1249">SUSE bug 1010457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1249">SUSE bug 1010457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1249">SUSE bug 1010457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1249">SUSE bug 1010457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1249">SUSE bug 1010457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1249">SUSE bug 1010457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1249">SUSE bug 1010457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1249">SUSE bug 1010457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1249">SUSE bug 1010457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1249">SUSE bug 1010457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1249">SUSE bug 1010457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1249">SUSE bug 1010457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1249">SUSE bug 1010457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1249">SUSE bug 1010457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1249">SUSE bug 1010457</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147470" comment="perl-DBD-mysql-4.021-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153573" comment="perl-DBD-mysql is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1251</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1251" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1251" source="CVE"/>
    <description>
    There is a vulnerability of type use-after-free affecting DBD::mysql (aka DBD-mysql or the Database Interface (DBI) MySQL driver for Perl) 3.x and 4.x before 4.041 when used with mysql_server_prepare=1.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1251.html">CVE-2016-1251</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1251">SUSE bug 1012546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1251">SUSE bug 1012546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1251">SUSE bug 1012546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1251">SUSE bug 1012546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1251">SUSE bug 1012546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1251">SUSE bug 1012546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1251">SUSE bug 1012546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1251">SUSE bug 1012546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1251">SUSE bug 1012546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1251">SUSE bug 1012546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1251">SUSE bug 1012546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1251">SUSE bug 1012546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1251">SUSE bug 1012546</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1251">SUSE bug 1012546</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147470" comment="perl-DBD-mysql-4.021-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153573" comment="perl-DBD-mysql is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1254</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1254" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1254" source="CVE"/>
    <description>
    Tor before 0.2.8.12 might allow remote attackers to cause a denial of service (client crash) via a crafted hidden service descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1254.html">CVE-2016-1254</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1254">SUSE bug 1016343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1254">SUSE bug 1016343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1254">SUSE bug 1016343</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1254">SUSE bug 1016343</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145994" comment="tor-0.2.7.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153574" comment="tor is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1283</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283" source="CVE"/>
    <description>
    The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'&lt;((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1283.html">CVE-2016-1283</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1283">SUSE bug 960837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1283">SUSE bug 960837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1283">SUSE bug 960837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1283">SUSE bug 960837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1283">SUSE bug 960837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1283">SUSE bug 960837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1283">SUSE bug 960837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1283">SUSE bug 960837</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1285</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1285" source="CVE"/>
    <description>
    named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1285.html">CVE-2016-1285</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 978322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 978322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 978322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 981200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 981200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 981200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 981200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 981200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 981200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 978322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 978322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1285">SUSE bug 970072</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125295" comment="bind-9.9.6P1-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125296" comment="bind-chrootenv-9.9.6P1-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125297" comment="bind-devel-9.9.6P1-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125298" comment="bind-doc-9.9.6P1-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125299" comment="bind-libs-9.9.6P1-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125300" comment="bind-libs-32bit-9.9.6P1-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153103" comment="bind-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125301" comment="bind-lwresd-9.9.6P1-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153104" comment="bind-lwresd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125302" comment="bind-utils-9.9.6P1-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1286</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1286" source="CVE"/>
    <description>
    named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1286.html">CVE-2016-1286</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 978322</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 981200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 981200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 981200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 981200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 981200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 981200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1286">SUSE bug 970073</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125295" comment="bind-9.9.6P1-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125296" comment="bind-chrootenv-9.9.6P1-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125297" comment="bind-devel-9.9.6P1-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125298" comment="bind-doc-9.9.6P1-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125299" comment="bind-libs-9.9.6P1-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125300" comment="bind-libs-32bit-9.9.6P1-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153103" comment="bind-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125301" comment="bind-lwresd-9.9.6P1-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153104" comment="bind-lwresd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125302" comment="bind-utils-9.9.6P1-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1494</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1494" source="CVE"/>
    <description>
    The verify function in the RSA package for Python (Python-RSA) before 3.3 allows attackers to spoof signatures with a small public exponent via crafted signature padding, aka a BERserk attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1494.html">CVE-2016-1494</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1494">SUSE bug 960680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1494">SUSE bug 960680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1494">SUSE bug 960680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1494">SUSE bug 960680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1494">SUSE bug 960680</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121400" comment="python-rsa-3.1.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153575" comment="python-rsa is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1514</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1514" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2015-8790.  Reason: This candidate is a reservation duplicate of CVE-2015-8790.  Notes: All CVE users should reference CVE-2015-8790 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1514.html">CVE-2016-1514</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1514">SUSE bug 964396</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129194" comment="libvlc5-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129195" comment="libvlccore8-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153022" comment="libvlccore8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129196" comment="vlc-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129197" comment="vlc-devel-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129198" comment="vlc-noX-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129199" comment="vlc-noX-lang-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153027" comment="vlc-noX-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129200" comment="vlc-qt-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1515</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1515" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2015-8789.  Reason: This candidate is a reservation duplicate of CVE-2015-8789.  Notes: All CVE users should reference CVE-2015-8789 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1515.html">CVE-2016-1515</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1515">SUSE bug 964395</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129194" comment="libvlc5-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129195" comment="libvlccore8-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153022" comment="libvlccore8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129196" comment="vlc-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129197" comment="vlc-devel-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129198" comment="vlc-noX-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129199" comment="vlc-noX-lang-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153027" comment="vlc-noX-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129200" comment="vlc-qt-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1521</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1521" source="CVE"/>
    <description>
    The directrun function in directmachine.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, does not validate a certain skip operation, which allows remote attackers to execute arbitrary code, obtain sensitive information, or cause a denial of service (out-of-bounds read and application crash) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1521.html">CVE-2016-1521</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1521">SUSE bug 965803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1521">SUSE bug 965803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1521">SUSE bug 965803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1521">SUSE bug 965803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1521">SUSE bug 965803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1521">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1521">SUSE bug 965803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1521">SUSE bug 965806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1521">SUSE bug 965807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1521">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1521">SUSE bug 965803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1521">SUSE bug 965803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1521">SUSE bug 965806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1521">SUSE bug 965807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1521">SUSE bug 965810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009115578" comment="graphite2-1.3.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153576" comment="graphite2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009115579" comment="graphite2-devel-1.3.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153577" comment="graphite2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009115580" comment="libgraphite2-3-1.3.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153578" comment="libgraphite2-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009115581" comment="libgraphite2-3-32bit-1.3.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153579" comment="libgraphite2-3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1523</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523" source="CVE"/>
    <description>
    The SillMap::readFace function in FeatureMap.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, mishandles a return value, which allows remote attackers to cause a denial of service (missing initialization, NULL pointer dereference, and application crash) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1523.html">CVE-2016-1523</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1523">SUSE bug 965807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1523">SUSE bug 965807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1523">SUSE bug 965807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1523">SUSE bug 967087</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1523">SUSE bug 965807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1523">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1523">SUSE bug 965803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1523">SUSE bug 965806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1523">SUSE bug 965807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1523">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1523">SUSE bug 965807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1523">SUSE bug 965803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1523">SUSE bug 965806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1523">SUSE bug 965807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1523">SUSE bug 965810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009115578" comment="graphite2-1.3.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153576" comment="graphite2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009115579" comment="graphite2-devel-1.3.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153577" comment="graphite2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009115580" comment="libgraphite2-3-1.3.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153578" comment="libgraphite2-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009115581" comment="libgraphite2-3-32bit-1.3.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153579" comment="libgraphite2-3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1526</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526" source="CVE"/>
    <description>
    The TtfUtil:LocaLookup function in TtfUtil.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, incorrectly validates a size value, which allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1526.html">CVE-2016-1526</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 966438</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965803</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1526">SUSE bug 965810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009115578" comment="graphite2-1.3.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153576" comment="graphite2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009115579" comment="graphite2-devel-1.3.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153577" comment="graphite2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009115580" comment="libgraphite2-3-1.3.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153578" comment="libgraphite2-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009115581" comment="libgraphite2-3-32bit-1.3.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153579" comment="libgraphite2-3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1531</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1531" source="CVE"/>
    <description>
    Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1531.html">CVE-2016-1531</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1531">SUSE bug 968844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1531">SUSE bug 968844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1531">SUSE bug 968844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1531">SUSE bug 968844</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124628" comment="exim-4.86.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124629" comment="eximon-4.86.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124630" comment="eximstats-html-4.86.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1541</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1541" source="CVE"/>
    <description>
    Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1541.html">CVE-2016-1541</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1541">SUSE bug 979005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1541">SUSE bug 979005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1541">SUSE bug 979005</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129229" comment="bsdtar-3.1.2-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129230" comment="libarchive-3.1.2-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129231" comment="libarchive-devel-3.1.2-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129232" comment="libarchive13-3.1.2-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129233" comment="libarchive13-32bit-3.1.2-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1544</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1544" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1544.html">CVE-2016-1544</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1544">SUSE bug 966514</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1544">SUSE bug 966514</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1544">SUSE bug 966514</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1544">SUSE bug 966514</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124508" comment="libnghttp2-14-1.3.4-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153583" comment="libnghttp2-14 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124509" comment="libnghttp2-devel-1.3.4-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153584" comment="libnghttp2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124510" comment="libnghttp2_asio-devel-1.3.4-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153585" comment="libnghttp2_asio-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124511" comment="libnghttp2_asio1-1.3.4-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153586" comment="libnghttp2_asio1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124512" comment="nghttp2-1.3.4-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153587" comment="nghttp2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124513" comment="nghttp2-doc-1.3.4-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153588" comment="nghttp2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124514" comment="python-nghttp2-1.3.4-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153589" comment="python-nghttp2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1547</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547" source="CVE"/>
    <description>
    An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1547.html">CVE-2016-1547</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 962784</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 982064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 982065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1547">SUSE bug 977459</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127851" comment="ntp-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127852" comment="ntp-doc-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1548</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548" source="CVE"/>
    <description>
    An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-&gt;dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1548.html">CVE-2016-1548</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 977461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 977461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 977461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 977461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 977461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 977461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 977461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 977461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 977461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 977461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 977461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 982068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 977461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 977461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 977461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 977461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 977461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1548">SUSE bug 977461</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127851" comment="ntp-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127852" comment="ntp-doc-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1549</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549" source="CVE"/>
    <description>
    A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim's clock.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1549.html">CVE-2016-1549</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1549">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1549">SUSE bug 977451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1549">SUSE bug 977451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1549">SUSE bug 977451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1549">SUSE bug 977451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1549">SUSE bug 977451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1549">SUSE bug 977451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1549">SUSE bug 977451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1549">SUSE bug 977451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1549">SUSE bug 977451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1549">SUSE bug 977451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1549">SUSE bug 977451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1549">SUSE bug 977451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1549">SUSE bug 977451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1549">SUSE bug 977451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1549">SUSE bug 977451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1549">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1549">SUSE bug 977451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1549">SUSE bug 977451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1549">SUSE bug 1083424</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127851" comment="ntp-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127852" comment="ntp-doc-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1550</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550" source="CVE"/>
    <description>
    An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1550.html">CVE-2016-1550</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1550">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1550">SUSE bug 977464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1550">SUSE bug 977464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1550">SUSE bug 977464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1550">SUSE bug 977464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1550">SUSE bug 977464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1550">SUSE bug 977464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1550">SUSE bug 977464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1550">SUSE bug 977464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1550">SUSE bug 977464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1550">SUSE bug 977464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1550">SUSE bug 977464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1550">SUSE bug 977464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1550">SUSE bug 977464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1550">SUSE bug 977464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1550">SUSE bug 977464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1550">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1550">SUSE bug 977464</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1550">SUSE bug 977464</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127851" comment="ntp-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127852" comment="ntp-doc-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1551</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1551" source="CVE"/>
    <description>
    ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same structure, any packet with a source ip address of a reference clock (127.127.1.1 for example) that reaches the receive() function will match that reference clock's peer record and will be treated as a trusted peer. Any system that lacks the typical martian packet filtering which would block these packets is in danger of having its time controlled by an attacker.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1551.html">CVE-2016-1551</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1551">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1551">SUSE bug 977450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1551">SUSE bug 977450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1551">SUSE bug 977450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1551">SUSE bug 977450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1551">SUSE bug 977450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1551">SUSE bug 977450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1551">SUSE bug 977450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1551">SUSE bug 977450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1551">SUSE bug 977450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1551">SUSE bug 977450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1551">SUSE bug 977450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1551">SUSE bug 977450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1551">SUSE bug 977450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1551">SUSE bug 977450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1551">SUSE bug 977450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1551">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1551">SUSE bug 977450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1551">SUSE bug 977450</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127851" comment="ntp-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127852" comment="ntp-doc-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1568</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568" source="CVE"/>
    <description>
    Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1568.html">CVE-2016-1568</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1568">SUSE bug 961332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1568">SUSE bug 961333</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1568">SUSE bug 961332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1568">SUSE bug 961332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1568">SUSE bug 961333</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1568">SUSE bug 961332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1568">SUSE bug 961332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1568">SUSE bug 961332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1568">SUSE bug 961333</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1570</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570" source="CVE"/>
    <description>
    The PV superpage functionality in arch/x86/mm.c in Xen 3.4.0, 3.4.1, and 4.1.x through 4.6.x allows local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1570.html">CVE-2016-1570</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1570">SUSE bug 960861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1570">SUSE bug 960861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1570">SUSE bug 960861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1570">SUSE bug 960861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1570">SUSE bug 960861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1570">SUSE bug 960861</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1570">SUSE bug 960861</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1572</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1572" source="CVE"/>
    <description>
    mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1572.html">CVE-2016-1572</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1572">SUSE bug 962052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1572">SUSE bug 962052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1572">SUSE bug 962052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1572">SUSE bug 962052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1572">SUSE bug 962052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1572">SUSE bug 962052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1572">SUSE bug 962052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1572">SUSE bug 962052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1572">SUSE bug 962052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1572">SUSE bug 962052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1572">SUSE bug 962052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1572">SUSE bug 962052</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122483" comment="ecryptfs-utils-103-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152561" comment="ecryptfs-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122484" comment="ecryptfs-utils-32bit-103-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152562" comment="ecryptfs-utils-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1577</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1577" source="CVE"/>
    <description>
    Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file, a different vulnerability than CVE-2014-8137.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1577.html">CVE-2016-1577</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1577">SUSE bug 968373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1577">SUSE bug 968373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1577">SUSE bug 968373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1577">SUSE bug 968373</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135598" comment="jasper-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135599" comment="libjasper-devel-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135600" comment="libjasper1-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135601" comment="libjasper1-32bit-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1583</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1583" source="CVE"/>
    <description>
    The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1583.html">CVE-2016-1583</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 990058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983143</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 983144</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1583">SUSE bug 1052256</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129149" comment="kernel-debug-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129150" comment="kernel-debug-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129151" comment="kernel-debug-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129152" comment="kernel-default-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129153" comment="kernel-default-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129154" comment="kernel-default-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129155" comment="kernel-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129156" comment="kernel-docs-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129157" comment="kernel-docs-html-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129158" comment="kernel-docs-pdf-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129159" comment="kernel-ec2-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129160" comment="kernel-ec2-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129161" comment="kernel-ec2-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129162" comment="kernel-macros-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129163" comment="kernel-obs-build-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129164" comment="kernel-obs-qa-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129165" comment="kernel-obs-qa-xen-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129166" comment="kernel-pae-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129167" comment="kernel-pae-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129168" comment="kernel-pae-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129169" comment="kernel-pv-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129170" comment="kernel-pv-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129171" comment="kernel-pv-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129172" comment="kernel-source-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129173" comment="kernel-source-vanilla-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129174" comment="kernel-syms-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129175" comment="kernel-vanilla-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129176" comment="kernel-vanilla-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129177" comment="kernel-xen-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129178" comment="kernel-xen-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129179" comment="kernel-xen-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1601</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1601" source="CVE"/>
    <description>
    yast2-users before 3.1.47, as used in SUSE Linux Enterprise 12 SP1, does not properly set empty password fields in /etc/shadow during an AutoYaST installation when the profile does not contain inst-sys users, which might allow attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1601.html">CVE-2016-1601</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 973639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 974220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 974220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 973639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 974220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 973639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 974220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 974220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 974220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 973639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 974220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 974220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 974220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 974220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 974220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 974220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 974220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 974220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 974220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 974220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 974220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1601">SUSE bug 974220</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127224" comment="yast2-users-3.1.41.3-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153590" comment="yast2-users is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127225" comment="yast2-users-devel-doc-3.1.41.3-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153591" comment="yast2-users-devel-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1612</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612" source="CVE"/>
    <description>
    The LoadIC::UpdateCaches function in ic/ic.cc in Google V8, as used in Google Chrome before 48.0.2564.82, does not ensure receiver compatibility before performing a cast of an unspecified variable, which allows remote attackers to cause a denial of service or possibly have unknown other impact via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1612.html">CVE-2016-1612</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1612">SUSE bug 963184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1612">SUSE bug 963184</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1612">SUSE bug 963184</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122188" comment="chromedriver-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122189" comment="chromium-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122190" comment="chromium-desktop-gnome-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122191" comment="chromium-desktop-kde-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122192" comment="chromium-ffmpegsumo-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1613</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in the formfiller implementation in PDFium, as used in Google Chrome before 48.0.2564.82, allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document, related to improper tracking of the destruction of (1) IPWL_FocusHandler and (2) IPWL_Provider objects.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1613.html">CVE-2016-1613</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1613">SUSE bug 963185</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1613">SUSE bug 963185</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1613">SUSE bug 963185</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122188" comment="chromedriver-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122189" comment="chromium-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122190" comment="chromium-desktop-gnome-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122191" comment="chromium-desktop-kde-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122192" comment="chromium-ffmpegsumo-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1614</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614" source="CVE"/>
    <description>
    The UnacceleratedImageBufferSurface class in WebKit/Source/platform/graphics/UnacceleratedImageBufferSurface.cpp in Blink, as used in Google Chrome before 48.0.2564.82, mishandles the initialization mode, which allows remote attackers to obtain sensitive information from process memory via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1614.html">CVE-2016-1614</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1614">SUSE bug 963186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1614">SUSE bug 963186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1614">SUSE bug 963186</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122188" comment="chromedriver-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122189" comment="chromium-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122190" comment="chromium-desktop-gnome-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122191" comment="chromium-desktop-kde-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122192" comment="chromium-ffmpegsumo-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1615</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615" source="CVE"/>
    <description>
    The Omnibox implementation in Google Chrome before 48.0.2564.82 allows remote attackers to spoof a document's origin via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1615.html">CVE-2016-1615</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1615">SUSE bug 963187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1615">SUSE bug 963187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1615">SUSE bug 963187</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122188" comment="chromedriver-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122189" comment="chromium-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122190" comment="chromium-desktop-gnome-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122191" comment="chromium-desktop-kde-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122192" comment="chromium-ffmpegsumo-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1616</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616" source="CVE"/>
    <description>
    The CustomButton::AcceleratorPressed function in ui/views/controls/button/custom_button.cc in Google Chrome before 48.0.2564.82 allows remote attackers to spoof URLs via vectors involving an unfocused custom button.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1616.html">CVE-2016-1616</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1616">SUSE bug 963188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1616">SUSE bug 963188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1616">SUSE bug 963188</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122188" comment="chromedriver-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122189" comment="chromium-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122190" comment="chromium-desktop-gnome-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122191" comment="chromium-desktop-kde-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122192" comment="chromium-ffmpegsumo-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1617</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617" source="CVE"/>
    <description>
    The CSPSource::schemeMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation in Blink, as used in Google Chrome before 48.0.2564.82, does not apply http policies to https URLs and does not apply ws policies to wss URLs, which makes it easier for remote attackers to determine whether a specific HSTS web site has been visited by reading a CSP report.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1617.html">CVE-2016-1617</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1617">SUSE bug 963189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1617">SUSE bug 963189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1617">SUSE bug 963189</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122188" comment="chromedriver-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122189" comment="chromium-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122190" comment="chromium-desktop-gnome-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122191" comment="chromium-desktop-kde-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122192" comment="chromium-ffmpegsumo-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1618</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 48.0.2564.82, does not ensure that a proper cryptographicallyRandomValues random number generator is used, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1618.html">CVE-2016-1618</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1618">SUSE bug 963190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1618">SUSE bug 963190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1618">SUSE bug 963190</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122188" comment="chromedriver-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122189" comment="chromium-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122190" comment="chromium-desktop-gnome-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122191" comment="chromium-desktop-kde-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122192" comment="chromium-ffmpegsumo-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1619</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) sycc422_to_rgb and (2) sycc444_to_rgb functions in fxcodec/codec/fx_codec_jpx_opj.cpp in PDFium, as used in Google Chrome before 48.0.2564.82, allow remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1619.html">CVE-2016-1619</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1619">SUSE bug 963191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1619">SUSE bug 963191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1619">SUSE bug 963191</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122188" comment="chromedriver-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122189" comment="chromium-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122190" comment="chromium-desktop-gnome-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122191" comment="chromium-desktop-kde-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122192" comment="chromium-ffmpegsumo-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1620</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 48.0.2564.82 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1620.html">CVE-2016-1620</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1620">SUSE bug 963192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1620">SUSE bug 963192</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1620">SUSE bug 963192</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122188" comment="chromedriver-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122189" comment="chromium-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122190" comment="chromium-desktop-gnome-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122191" comment="chromium-desktop-kde-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122192" comment="chromium-ffmpegsumo-48.0.2564.82-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1622</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622" source="CVE"/>
    <description>
    The Extensions subsystem in Google Chrome before 48.0.2564.109 does not prevent use of the Object.defineProperty method to override intended extension behavior, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1622.html">CVE-2016-1622</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1622">SUSE bug 965999</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123322" comment="chromedriver-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123323" comment="chromium-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123324" comment="chromium-desktop-gnome-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123325" comment="chromium-desktop-kde-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123326" comment="chromium-ffmpegsumo-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1623</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623" source="CVE"/>
    <description>
    The DOM implementation in Google Chrome before 48.0.2564.109 does not properly restrict frame-attach operations from occurring during or after frame-detach operations, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, related to FrameLoader.cpp, HTMLFrameOwnerElement.h, LocalFrame.cpp, and WebLocalFrameImpl.cpp.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1623.html">CVE-2016-1623</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1623">SUSE bug 965999</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123322" comment="chromedriver-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123323" comment="chromium-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123324" comment="chromium-desktop-gnome-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123325" comment="chromium-desktop-kde-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123326" comment="chromium-ffmpegsumo-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1624</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624" source="CVE"/>
    <description>
    Integer underflow in the ProcessCommandsInternal function in dec/decode.c in Brotli, as used in Google Chrome before 48.0.2564.109, allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted data with brotli compression.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1624.html">CVE-2016-1624</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1624">SUSE bug 965999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1624">SUSE bug 965999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1624">SUSE bug 965999</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1624">SUSE bug 965999</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123322" comment="chromedriver-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123323" comment="chromium-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123324" comment="chromium-desktop-gnome-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123325" comment="chromium-desktop-kde-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123326" comment="chromium-ffmpegsumo-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1625</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625" source="CVE"/>
    <description>
    The Chrome Instant feature in Google Chrome before 48.0.2564.109 does not ensure that a New Tab Page (NTP) navigation target is on the most-visited or suggestions list, which allows remote attackers to bypass intended restrictions via unspecified vectors, related to instant_service.cc and search_tab_helper.cc.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1625.html">CVE-2016-1625</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1625">SUSE bug 965999</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123322" comment="chromedriver-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123323" comment="chromium-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123324" comment="chromium-desktop-gnome-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123325" comment="chromium-desktop-kde-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123326" comment="chromium-ffmpegsumo-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1626</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" source="CVE"/>
    <description>
    The opj_pi_update_decode_poc function in pi.c in OpenJPEG, as used in PDFium in Google Chrome before 48.0.2564.109, miscalculates a certain layer index value, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1626.html">CVE-2016-1626</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1626">SUSE bug 965999</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123322" comment="chromedriver-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123323" comment="chromium-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123324" comment="chromium-desktop-gnome-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123325" comment="chromium-desktop-kde-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123326" comment="chromium-ffmpegsumo-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1627</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627" source="CVE"/>
    <description>
    The Developer Tools (aka DevTools) subsystem in Google Chrome before 48.0.2564.109 does not validate URL schemes and ensure that the remoteBase parameter is associated with a chrome-devtools-frontend.appspot.com URL, which allows remote attackers to bypass intended access restrictions via a crafted URL, related to browser/devtools/devtools_ui_bindings.cc and WebKit/Source/devtools/front_end/Runtime.js.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1627.html">CVE-2016-1627</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1627">SUSE bug 965999</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123322" comment="chromedriver-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123323" comment="chromium-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123324" comment="chromium-desktop-gnome-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123325" comment="chromium-desktop-kde-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123326" comment="chromium-ffmpegsumo-48.0.2564.109-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1629</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629" source="CVE"/>
    <description>
    Google Chrome before 48.0.2564.116 allows remote attackers to bypass the Blink Same Origin Policy and a sandbox protection mechanism via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1629.html">CVE-2016-1629</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1629">SUSE bug 967376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1629">SUSE bug 967376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123444" comment="chromedriver-48.0.2564.116-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123445" comment="chromium-48.0.2564.116-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123446" comment="chromium-desktop-gnome-48.0.2564.116-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123447" comment="chromium-desktop-kde-48.0.2564.116-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123448" comment="chromium-ffmpegsumo-48.0.2564.116-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1630</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630" source="CVE"/>
    <description>
    The ContainerNode::parserRemoveChild function in WebKit/Source/core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 49.0.2623.75, mishandles widget updates, which makes it easier for remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1630.html">CVE-2016-1630</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1630">SUSE bug 969333</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124458" comment="chromedriver-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124459" comment="chromium-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124460" comment="chromium-desktop-gnome-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124461" comment="chromium-desktop-kde-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124462" comment="chromium-ffmpegsumo-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1631</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631" source="CVE"/>
    <description>
    The PPB_Flash_MessageLoop_Impl::InternalRun function in content/renderer/pepper/ppb_flash_message_loop_impl.cc in the Pepper plugin in Google Chrome before 49.0.2623.75 mishandles nested message loops, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1631.html">CVE-2016-1631</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1631">SUSE bug 969333</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124458" comment="chromedriver-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124459" comment="chromium-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124460" comment="chromium-desktop-gnome-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124461" comment="chromium-desktop-kde-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124462" comment="chromium-ffmpegsumo-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1632</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632" source="CVE"/>
    <description>
    The Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly maintain own properties, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code that triggers an incorrect cast, related to extensions/renderer/v8_helpers.h and gin/converter.h.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1632.html">CVE-2016-1632</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1632">SUSE bug 969333</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124458" comment="chromedriver-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124459" comment="chromium-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124460" comment="chromium-desktop-gnome-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124461" comment="chromium-desktop-kde-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124462" comment="chromium-ffmpegsumo-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1633</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633" source="CVE"/>
    <description>
    Use-after-free vulnerability in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1633.html">CVE-2016-1633</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1633">SUSE bug 969333</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124458" comment="chromedriver-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124459" comment="chromium-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124460" comment="chromium-desktop-gnome-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124461" comment="chromium-desktop-kde-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124462" comment="chromium-ffmpegsumo-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1634</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634" source="CVE"/>
    <description>
    Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1634.html">CVE-2016-1634</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1634">SUSE bug 969333</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124458" comment="chromedriver-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124459" comment="chromium-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124460" comment="chromium-desktop-gnome-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124461" comment="chromium-desktop-kde-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124462" comment="chromium-ffmpegsumo-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1635</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635" source="CVE"/>
    <description>
    extensions/renderer/render_frame_observer_natives.cc in Google Chrome before 49.0.2623.75 does not properly consider object lifetimes and re-entrancy issues during OnDocumentElementCreated handling, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1635.html">CVE-2016-1635</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1635">SUSE bug 969333</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124458" comment="chromedriver-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124459" comment="chromium-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124460" comment="chromium-desktop-gnome-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124461" comment="chromium-desktop-kde-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124462" comment="chromium-ffmpegsumo-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1636</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636" source="CVE"/>
    <description>
    The PendingScript::notifyFinished function in WebKit/Source/core/dom/PendingScript.cpp in Google Chrome before 49.0.2623.75 relies on memory-cache information about integrity-check occurrences instead of integrity-check successes, which allows remote attackers to bypass the Subresource Integrity (aka SRI) protection mechanism by triggering two loads of the same resource.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1636.html">CVE-2016-1636</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1636">SUSE bug 969333</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124458" comment="chromedriver-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124459" comment="chromium-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124460" comment="chromium-desktop-gnome-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124461" comment="chromium-desktop-kde-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124462" comment="chromium-ffmpegsumo-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1637</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637" source="CVE"/>
    <description>
    The SkATan2_255 function in effects/gradients/SkSweepGradient.cpp in Skia, as used in Google Chrome before 49.0.2623.75, mishandles arctangent calculations, which allows remote attackers to obtain sensitive information via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1637.html">CVE-2016-1637</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1637">SUSE bug 969333</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124458" comment="chromedriver-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124459" comment="chromium-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124460" comment="chromium-desktop-gnome-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124461" comment="chromium-desktop-kde-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124462" comment="chromium-ffmpegsumo-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1638</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638" source="CVE"/>
    <description>
    extensions/renderer/resources/platform_app.js in the Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly restrict use of Web APIs, which allows remote attackers to bypass intended access restrictions via a crafted platform app.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1638.html">CVE-2016-1638</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1638">SUSE bug 969333</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124458" comment="chromedriver-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124459" comment="chromium-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124460" comment="chromium-desktop-gnome-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124461" comment="chromium-desktop-kde-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124462" comment="chromium-ffmpegsumo-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1639</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639" source="CVE"/>
    <description>
    Use-after-free vulnerability in browser/extensions/api/webrtc_audio_private/webrtc_audio_private_api.cc in the WebRTC Audio Private API implementation in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect reliance on the resource context pointer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1639.html">CVE-2016-1639</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1639">SUSE bug 969333</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124458" comment="chromedriver-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124459" comment="chromium-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124460" comment="chromium-desktop-gnome-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124461" comment="chromium-desktop-kde-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124462" comment="chromium-ffmpegsumo-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1640</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640" source="CVE"/>
    <description>
    The Web Store inline-installer implementation in the Extensions UI in Google Chrome before 49.0.2623.75 does not block installations upon deletion of an installation frame, which makes it easier for remote attackers to trick a user into believing that an installation request originated from the user's next navigation target via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1640.html">CVE-2016-1640</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1640">SUSE bug 969333</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124458" comment="chromedriver-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124459" comment="chromium-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124460" comment="chromium-desktop-gnome-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124461" comment="chromium-desktop-kde-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124462" comment="chromium-ffmpegsumo-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1641</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641" source="CVE"/>
    <description>
    Use-after-free vulnerability in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an image download after a certain data structure is deleted, as demonstrated by a favicon.ico download.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1641.html">CVE-2016-1641</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1641">SUSE bug 969333</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124458" comment="chromedriver-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124459" comment="chromium-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124460" comment="chromium-desktop-gnome-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124461" comment="chromium-desktop-kde-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124462" comment="chromium-ffmpegsumo-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1642</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 49.0.2623.75 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1642.html">CVE-2016-1642</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1642">SUSE bug 969333</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124458" comment="chromedriver-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124459" comment="chromium-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124460" comment="chromium-desktop-gnome-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124461" comment="chromium-desktop-kde-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124462" comment="chromium-ffmpegsumo-49.0.2623.75-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1643</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1643" source="CVE"/>
    <description>
    The ImageInputType::ensurePrimaryContent function in WebKit/Source/core/html/forms/ImageInputType.cpp in Blink, as used in Google Chrome before 49.0.2623.87, does not properly maintain the user agent shadow DOM, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1643.html">CVE-2016-1643</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1643">SUSE bug 970514</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1643">SUSE bug 970514</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1643">SUSE bug 970514</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125134" comment="chromedriver-49.0.2623.87-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125135" comment="chromium-49.0.2623.87-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125136" comment="chromium-desktop-gnome-49.0.2623.87-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125137" comment="chromium-desktop-kde-49.0.2623.87-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125138" comment="chromium-ffmpegsumo-49.0.2623.87-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1644</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1644" source="CVE"/>
    <description>
    WebKit/Source/core/layout/LayoutObject.cpp in Blink, as used in Google Chrome before 49.0.2623.87, does not properly restrict relayout scheduling, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted HTML document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1644.html">CVE-2016-1644</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1644">SUSE bug 970509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1644">SUSE bug 970509</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1644">SUSE bug 970509</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125134" comment="chromedriver-49.0.2623.87-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125135" comment="chromium-49.0.2623.87-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125136" comment="chromium-desktop-gnome-49.0.2623.87-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125137" comment="chromium-desktop-kde-49.0.2623.87-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125138" comment="chromium-ffmpegsumo-49.0.2623.87-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1645</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1645" source="CVE"/>
    <description>
    Multiple integer signedness errors in the opj_j2k_update_image_data function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 49.0.2623.87, allow remote attackers to cause a denial of service (incorrect cast and out-of-bounds write) or possibly have unspecified other impact via crafted JPEG 2000 data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1645.html">CVE-2016-1645</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1645">SUSE bug 970511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1645">SUSE bug 970511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1645">SUSE bug 970511</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125134" comment="chromedriver-49.0.2623.87-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125135" comment="chromium-49.0.2623.87-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125136" comment="chromium-desktop-gnome-49.0.2623.87-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125137" comment="chromium-desktop-kde-49.0.2623.87-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125138" comment="chromium-ffmpegsumo-49.0.2623.87-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1646</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1646" source="CVE"/>
    <description>
    The Array.prototype.concat implementation in builtins.cc in Google V8, as used in Google Chrome before 49.0.2623.108, does not properly consider element data types, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1646.html">CVE-2016-1646</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1646">SUSE bug 972834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1646">SUSE bug 972834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1646">SUSE bug 973166</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125630" comment="chromedriver-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125631" comment="chromium-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125632" comment="chromium-desktop-gnome-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125633" comment="chromium-desktop-kde-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125634" comment="chromium-ffmpegsumo-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1647</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1647" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1647" source="CVE"/>
    <description>
    Use-after-free vulnerability in the RenderWidgetHostImpl::Destroy function in content/browser/renderer_host/render_widget_host_impl.cc in the Navigation implementation in Google Chrome before 49.0.2623.108 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1647.html">CVE-2016-1647</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1647">SUSE bug 972834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1647">SUSE bug 972834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1647">SUSE bug 973166</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125630" comment="chromedriver-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125631" comment="chromium-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125632" comment="chromium-desktop-gnome-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125633" comment="chromium-desktop-kde-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125634" comment="chromium-ffmpegsumo-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1648</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1648" source="CVE"/>
    <description>
    Use-after-free vulnerability in the GetLoadTimes function in renderer/loadtimes_extension_bindings.cc in the Extensions implementation in Google Chrome before 49.0.2623.108 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1648.html">CVE-2016-1648</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1648">SUSE bug 972834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1648">SUSE bug 972834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1648">SUSE bug 973166</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125630" comment="chromedriver-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125631" comment="chromium-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125632" comment="chromium-desktop-gnome-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125633" comment="chromium-desktop-kde-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125634" comment="chromium-ffmpegsumo-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1649</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1649" source="CVE"/>
    <description>
    The Program::getUniformInternal function in Program.cpp in libANGLE, as used in Google Chrome before 49.0.2623.108, does not properly handle a certain data-type mismatch, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted shader stages.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1649.html">CVE-2016-1649</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1649">SUSE bug 972834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1649">SUSE bug 972834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1649">SUSE bug 973166</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125630" comment="chromedriver-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125631" comment="chromium-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125632" comment="chromium-desktop-gnome-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125633" comment="chromium-desktop-kde-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125634" comment="chromium-ffmpegsumo-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1650</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1650" source="CVE"/>
    <description>
    The PageCaptureSaveAsMHTMLFunction::ReturnFailure function in browser/extensions/api/page_capture/page_capture_api.cc in Google Chrome before 49.0.2623.108 allows attackers to cause a denial of service or possibly have unspecified other impact by triggering an error in creating an MHTML document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1650.html">CVE-2016-1650</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1650">SUSE bug 972834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1650">SUSE bug 972834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1650">SUSE bug 973166</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125630" comment="chromedriver-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125631" comment="chromium-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125632" comment="chromium-desktop-gnome-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125633" comment="chromium-desktop-kde-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125634" comment="chromium-ffmpegsumo-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1651</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651" source="CVE"/>
    <description>
    fxcodec/codec/fx_codec_jpx_opj.cpp in PDFium, as used in Google Chrome before 50.0.2661.75, does not properly implement the sycc420_to_rgb and sycc422_to_rgb functions, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via crafted JPEG 2000 data in a PDF document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1651.html">CVE-2016-1651</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1651">SUSE bug 975572</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126355" comment="chromedriver-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126356" comment="chromium-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126357" comment="chromium-desktop-gnome-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126358" comment="chromium-desktop-kde-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126359" comment="chromium-ffmpegsumo-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1652</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the ModuleSystem::RequireForJsInner function in extensions/renderer/module_system.cc in the Extensions subsystem in Google Chrome before 50.0.2661.75 allows remote attackers to inject arbitrary web script or HTML via a crafted web site, aka "Universal XSS (UXSS)."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1652.html">CVE-2016-1652</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1652">SUSE bug 975572</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126355" comment="chromedriver-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126356" comment="chromium-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126357" comment="chromium-desktop-gnome-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126358" comment="chromium-desktop-kde-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126359" comment="chromium-ffmpegsumo-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1653</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653" source="CVE"/>
    <description>
    The LoadBuffer implementation in Google V8, as used in Google Chrome before 50.0.2661.75, mishandles data types, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds write operation, related to compiler/pipeline.cc and compiler/simplified-lowering.cc.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1653.html">CVE-2016-1653</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1653">SUSE bug 975572</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126355" comment="chromedriver-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126356" comment="chromium-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126357" comment="chromium-desktop-gnome-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126358" comment="chromium-desktop-kde-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126359" comment="chromium-ffmpegsumo-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1654</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654" source="CVE"/>
    <description>
    The media subsystem in Google Chrome before 50.0.2661.75 does not initialize an unspecified data structure, which allows remote attackers to cause a denial of service (invalid read operation) via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1654.html">CVE-2016-1654</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1654">SUSE bug 975572</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126355" comment="chromedriver-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126356" comment="chromium-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126357" comment="chromium-desktop-gnome-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126358" comment="chromium-desktop-kde-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126359" comment="chromium-ffmpegsumo-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1655</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655" source="CVE"/>
    <description>
    Google Chrome before 50.0.2661.75 does not properly consider that frame removal may occur during callback execution, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted extension.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1655.html">CVE-2016-1655</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1655">SUSE bug 975572</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126355" comment="chromedriver-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126356" comment="chromium-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126357" comment="chromium-desktop-gnome-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126358" comment="chromium-desktop-kde-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126359" comment="chromium-ffmpegsumo-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1656</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1656" source="CVE"/>
    <description>
    The download implementation in Google Chrome before 50.0.2661.75 on Android allows remote attackers to bypass intended pathname restrictions via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1656.html">CVE-2016-1656</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1656">SUSE bug 975572</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126355" comment="chromedriver-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126356" comment="chromium-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126357" comment="chromium-desktop-gnome-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126358" comment="chromium-desktop-kde-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126359" comment="chromium-ffmpegsumo-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1657</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657" source="CVE"/>
    <description>
    The WebContentsImpl::FocusLocationBarByDefault function in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 50.0.2661.75 mishandles focus for certain about:blank pages, which allows remote attackers to spoof the address bar via a crafted URL.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1657.html">CVE-2016-1657</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1657">SUSE bug 975572</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126355" comment="chromedriver-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126356" comment="chromium-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126357" comment="chromium-desktop-gnome-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126358" comment="chromium-desktop-kde-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126359" comment="chromium-ffmpegsumo-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1658</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658" source="CVE"/>
    <description>
    The Extensions subsystem in Google Chrome before 50.0.2661.75 incorrectly relies on GetOrigin method calls for origin comparisons, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted extension.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1658.html">CVE-2016-1658</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1658">SUSE bug 975572</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126355" comment="chromedriver-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126356" comment="chromium-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126357" comment="chromium-desktop-gnome-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126358" comment="chromium-desktop-kde-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126359" comment="chromium-ffmpegsumo-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1659</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 50.0.2661.75 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1659.html">CVE-2016-1659</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1659">SUSE bug 975572</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126355" comment="chromedriver-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126356" comment="chromium-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126357" comment="chromium-desktop-gnome-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126358" comment="chromium-desktop-kde-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126359" comment="chromium-ffmpegsumo-50.0.2661.75-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1660</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 50.0.2661.94, mishandles assertions in the WTF::BitArray and WTF::double_conversion::Vector classes, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1660.html">CVE-2016-1660</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1660">SUSE bug 977830</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127126" comment="chromedriver-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127127" comment="chromium-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127128" comment="chromium-desktop-gnome-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127129" comment="chromium-desktop-kde-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127130" comment="chromium-ffmpegsumo-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1661</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 50.0.2661.94, does not ensure that frames satisfy a check for the same renderer process in addition to a Same Origin Policy check, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted web site, related to BindingSecurity.cpp and DOMWindow.cpp.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1661.html">CVE-2016-1661</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1661">SUSE bug 977830</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127126" comment="chromedriver-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127127" comment="chromium-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127128" comment="chromium-desktop-gnome-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127129" comment="chromium-desktop-kde-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127130" comment="chromium-ffmpegsumo-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1662</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662" source="CVE"/>
    <description>
    extensions/renderer/gc_callback.cc in Google Chrome before 50.0.2661.94 does not prevent fallback execution once the Garbage Collection callback has started, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1662.html">CVE-2016-1662</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1662">SUSE bug 977830</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127126" comment="chromedriver-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127127" comment="chromium-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127128" comment="chromium-desktop-gnome-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127129" comment="chromium-desktop-kde-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127130" comment="chromium-ffmpegsumo-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1663</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663" source="CVE"/>
    <description>
    The SerializedScriptValue::transferArrayBuffers function in WebKit/Source/bindings/core/v8/SerializedScriptValue.cpp in the V8 bindings in Blink, as used in Google Chrome before 50.0.2661.94, mishandles certain array-buffer data structures, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1663.html">CVE-2016-1663</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1663">SUSE bug 977830</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127126" comment="chromedriver-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127127" comment="chromium-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127128" comment="chromium-desktop-gnome-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127129" comment="chromium-desktop-kde-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127130" comment="chromium-ffmpegsumo-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1664</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664" source="CVE"/>
    <description>
    The HistoryController::UpdateForCommit function in content/renderer/history_controller.cc in Google Chrome before 50.0.2661.94 mishandles the interaction between subframe forward navigations and other forward navigations, which allows remote attackers to spoof the address bar via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1664.html">CVE-2016-1664</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1664">SUSE bug 977830</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127126" comment="chromedriver-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127127" comment="chromium-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127128" comment="chromium-desktop-gnome-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127129" comment="chromium-desktop-kde-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127130" comment="chromium-ffmpegsumo-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1665</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665" source="CVE"/>
    <description>
    The JSGenericLowering class in compiler/js-generic-lowering.cc in Google V8, as used in Google Chrome before 50.0.2661.94, mishandles comparison operators, which allows remote attackers to obtain sensitive information via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1665.html">CVE-2016-1665</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1665">SUSE bug 977830</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127126" comment="chromedriver-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127127" comment="chromium-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127128" comment="chromium-desktop-gnome-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127129" comment="chromium-desktop-kde-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127130" comment="chromium-ffmpegsumo-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1666</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 50.0.2661.94 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1666.html">CVE-2016-1666</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1666">SUSE bug 977830</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127126" comment="chromedriver-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127127" comment="chromium-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127128" comment="chromium-desktop-gnome-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127129" comment="chromium-desktop-kde-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127130" comment="chromium-ffmpegsumo-50.0.2661.94-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1667</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1667" source="CVE"/>
    <description>
    The TreeScope::adoptIfNeeded function in WebKit/Source/core/dom/TreeScope.cpp in the DOM implementation in Blink, as used in Google Chrome before 50.0.2661.102, does not prevent script execution during node-adoption operations, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1667.html">CVE-2016-1667</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1667">SUSE bug 979859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1667">SUSE bug 979859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1667">SUSE bug 979859</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127581" comment="chromedriver-50.0.2661.102-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127582" comment="chromium-50.0.2661.102-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127583" comment="chromium-desktop-gnome-50.0.2661.102-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127584" comment="chromium-desktop-kde-50.0.2661.102-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127585" comment="chromium-ffmpegsumo-50.0.2661.102-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1668</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1668" source="CVE"/>
    <description>
    The forEachForBinding function in WebKit/Source/bindings/core/v8/Iterable.h in the V8 bindings in Blink, as used in Google Chrome before 50.0.2661.102, uses an improper creation context, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1668.html">CVE-2016-1668</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1668">SUSE bug 979859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1668">SUSE bug 979859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1668">SUSE bug 979859</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127581" comment="chromedriver-50.0.2661.102-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127582" comment="chromium-50.0.2661.102-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127583" comment="chromium-desktop-gnome-50.0.2661.102-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127584" comment="chromium-desktop-kde-50.0.2661.102-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127585" comment="chromium-ffmpegsumo-50.0.2661.102-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1669</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1669" source="CVE"/>
    <description>
    The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1669.html">CVE-2016-1669</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1669">SUSE bug 979859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1669">SUSE bug 979859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1669">SUSE bug 979859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1669">SUSE bug 987919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1669">SUSE bug 987919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1669">SUSE bug 987919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1669">SUSE bug 987919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1669">SUSE bug 987919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1669">SUSE bug 987919</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127581" comment="chromedriver-50.0.2661.102-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127582" comment="chromium-50.0.2661.102-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127583" comment="chromium-desktop-gnome-50.0.2661.102-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127584" comment="chromium-desktop-kde-50.0.2661.102-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127585" comment="chromium-ffmpegsumo-50.0.2661.102-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133731" comment="nodejs-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133732" comment="nodejs-devel-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133734" comment="nodejs-docs-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133735" comment="npm-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1670</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1670" source="CVE"/>
    <description>
    Race condition in the ResourceDispatcherHostImpl::BeginRequest function in content/browser/loader/resource_dispatcher_host_impl.cc in Google Chrome before 50.0.2661.102 allows remote attackers to make arbitrary HTTP requests by leveraging access to a renderer process and reusing a request ID.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1670.html">CVE-2016-1670</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1670">SUSE bug 979859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1670">SUSE bug 979859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1670">SUSE bug 979859</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127581" comment="chromedriver-50.0.2661.102-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127582" comment="chromium-50.0.2661.102-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127583" comment="chromium-desktop-gnome-50.0.2661.102-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127584" comment="chromium-desktop-kde-50.0.2661.102-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127585" comment="chromium-ffmpegsumo-50.0.2661.102-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1672</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1672" source="CVE"/>
    <description>
    The ModuleSystem::RequireForJsInner function in extensions/renderer/module_system.cc in the extension bindings in Google Chrome before 51.0.2704.63 mishandles properties, which allows remote attackers to conduct bindings-interception attacks and bypass the Same Origin Policy via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1672.html">CVE-2016-1672</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1672">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1673</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1673" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1673.html">CVE-2016-1673</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1673">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1674</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1674" source="CVE"/>
    <description>
    The extensions subsystem in Google Chrome before 51.0.2704.63 allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1674.html">CVE-2016-1674</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1674">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1675</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1675" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Same Origin Policy by leveraging the mishandling of Document reattachment during destruction, related to FrameLoader.cpp and LocalFrame.cpp.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1675.html">CVE-2016-1675</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1675">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1676</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1676" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1676" source="CVE"/>
    <description>
    extensions/renderer/resources/binding.js in the extension bindings in Google Chrome before 51.0.2704.63 does not properly use prototypes, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1676.html">CVE-2016-1676</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1676">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1677</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1677" source="CVE"/>
    <description>
    uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging "type confusion."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1677.html">CVE-2016-1677</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1677">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1678</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1678" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1678" source="CVE"/>
    <description>
    objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1678.html">CVE-2016-1678</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1678">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1679</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1679" source="CVE"/>
    <description>
    The ToV8Value function in content/child/v8_value_converter_impl.cc in the V8 bindings in Google Chrome before 51.0.2704.63 does not properly restrict use of getters and setters, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1679.html">CVE-2016-1679</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1679">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1680</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1680" source="CVE"/>
    <description>
    Use-after-free vulnerability in ports/SkFontHost_FreeType.cpp in Skia, as used in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1680.html">CVE-2016-1680</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1680">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1681</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1681" source="CVE"/>
    <description>
    Heap-based buffer overflow in the opj_j2k_read_SPCod_SPCoc function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1681.html">CVE-2016-1681</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1681">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1682</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1682" source="CVE"/>
    <description>
    The ServiceWorkerContainer::registerServiceWorkerImpl function in WebKit/Source/modules/serviceworkers/ServiceWorkerContainer.cpp in Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via a ServiceWorker registration.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1682.html">CVE-2016-1682</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1682">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1683</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1683" source="CVE"/>
    <description>
    numbers.c in libxslt before 1.1.29, as used in Google Chrome before 51.0.2704.63, mishandles namespace nodes, which allows remote attackers to cause a denial of service (out-of-bounds heap memory access) or possibly have unspecified other impact via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1683.html">CVE-2016-1683</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1683">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1684</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1684" source="CVE"/>
    <description>
    numbers.c in libxslt before 1.1.29, as used in Google Chrome before 51.0.2704.63, mishandles the i format token for xsl:number data, which allows remote attackers to cause a denial of service (integer overflow or resource consumption) or possibly have unspecified other impact via a crafted document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1684.html">CVE-2016-1684</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1684">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1685</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1685" source="CVE"/>
    <description>
    core/fxge/ge/fx_ge_text.cpp in PDFium, as used in Google Chrome before 51.0.2704.63, miscalculates certain index values, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1685.html">CVE-2016-1685</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1685">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1686</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1686" source="CVE"/>
    <description>
    The CPDF_DIBSource::CreateDecoder function in core/fpdfapi/fpdf_render/fpdf_render_loadimage.cpp in PDFium, as used in Google Chrome before 51.0.2704.63, mishandles decoder-initialization failure, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1686.html">CVE-2016-1686</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1686">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1687</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1687" source="CVE"/>
    <description>
    The renderer implementation in Google Chrome before 51.0.2704.63 does not properly restrict public exposure of classes, which allows remote attackers to obtain sensitive information via vectors related to extensions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1687.html">CVE-2016-1687</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1687">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1688</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1688" source="CVE"/>
    <description>
    The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1688.html">CVE-2016-1688</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1688">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1689</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1689" source="CVE"/>
    <description>
    Heap-based buffer overflow in content/renderer/media/canvas_capture_handler.cc in Google Chrome before 51.0.2704.63 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1689.html">CVE-2016-1689</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1689">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1690</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1690" source="CVE"/>
    <description>
    The Autofill implementation in Google Chrome before 51.0.2704.63 mishandles the interaction between field updates and JavaScript code that triggers a frame deletion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site, a different vulnerability than CVE-2016-1701.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1690.html">CVE-2016-1690</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1690">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1691</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1691" source="CVE"/>
    <description>
    Skia, as used in Google Chrome before 51.0.2704.63, mishandles coincidence runs, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted curves, related to SkOpCoincidence.cpp and SkPathOpsCommon.cpp.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1691.html">CVE-2016-1691</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1691">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1692</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1692" source="CVE"/>
    <description>
    WebKit/Source/core/css/StyleSheetContents.cpp in Blink, as used in Google Chrome before 51.0.2704.63, permits cross-origin loading of CSS stylesheets by a ServiceWorker even when the stylesheet download has an incorrect MIME type, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1692.html">CVE-2016-1692</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1692">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1693</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1693" source="CVE"/>
    <description>
    browser/safe_browsing/srt_field_trial_win.cc in Google Chrome before 51.0.2704.63 does not use the HTTPS service on dl.google.com to obtain the Software Removal Tool, which allows remote attackers to spoof the chrome_cleanup_tool.exe (aka CCT) file via a man-in-the-middle attack on an HTTP session.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1693.html">CVE-2016-1693</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1693">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1694</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1694" source="CVE"/>
    <description>
    browser/browsing_data/browsing_data_remover.cc in Google Chrome before 51.0.2704.63 deletes HPKP pins during cache clearing, which makes it easier for remote attackers to spoof web sites via a valid certificate from an arbitrary recognized Certification Authority.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1694.html">CVE-2016-1694</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1694">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1695</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1695" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.63 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1695.html">CVE-2016-1695</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1695">SUSE bug 981886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128184" comment="chromedriver-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128185" comment="chromium-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128186" comment="chromium-desktop-gnome-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128187" comment="chromium-desktop-kde-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128188" comment="chromium-ffmpegsumo-51.0.2704.63-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1696</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1696" source="CVE"/>
    <description>
    The extensions subsystem in Google Chrome before 51.0.2704.79 does not properly restrict bindings access, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1696.html">CVE-2016-1696</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1696">SUSE bug 982719</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128400" comment="chromedriver-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128401" comment="chromium-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128402" comment="chromium-desktop-gnome-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128403" comment="chromium-desktop-kde-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128404" comment="chromium-ffmpegsumo-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1697</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1697" source="CVE"/>
    <description>
    The FrameLoader::startLoad function in WebKit/Source/core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 51.0.2704.79, does not prevent frame navigations during DocumentLoader detach operations, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1697.html">CVE-2016-1697</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1697">SUSE bug 982719</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128400" comment="chromedriver-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128401" comment="chromium-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128402" comment="chromium-desktop-gnome-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128403" comment="chromium-desktop-kde-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128404" comment="chromium-ffmpegsumo-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1698</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1698" source="CVE"/>
    <description>
    The createCustomType function in extensions/renderer/resources/binding.js in the extension bindings in Google Chrome before 51.0.2704.79 does not validate module types, which might allow attackers to load arbitrary modules or obtain sensitive information by leveraging a poisoned definition.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1698.html">CVE-2016-1698</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1698">SUSE bug 982719</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128400" comment="chromedriver-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128401" comment="chromium-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128402" comment="chromium-desktop-gnome-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128403" comment="chromium-desktop-kde-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128404" comment="chromium-ffmpegsumo-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1699</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1699" source="CVE"/>
    <description>
    WebKit/Source/devtools/front_end/devtools.js in the Developer Tools (aka DevTools) subsystem in Blink, as used in Google Chrome before 51.0.2704.79, does not ensure that the remoteFrontendUrl parameter is associated with a chrome-devtools-frontend.appspot.com URL, which allows remote attackers to bypass intended access restrictions via a crafted URL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1699.html">CVE-2016-1699</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1699">SUSE bug 982719</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128400" comment="chromedriver-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128401" comment="chromium-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128402" comment="chromium-desktop-gnome-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128403" comment="chromium-desktop-kde-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128404" comment="chromium-ffmpegsumo-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1700</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1700" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1700" source="CVE"/>
    <description>
    extensions/renderer/runtime_custom_bindings.cc in Google Chrome before 51.0.2704.79 does not consider side effects during creation of an array of extension views, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to extensions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1700.html">CVE-2016-1700</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1700">SUSE bug 982719</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128400" comment="chromedriver-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128401" comment="chromium-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128402" comment="chromium-desktop-gnome-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128403" comment="chromium-desktop-kde-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128404" comment="chromium-ffmpegsumo-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1701</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1701" source="CVE"/>
    <description>
    The Autofill implementation in Google Chrome before 51.0.2704.79 mishandles the interaction between field updates and JavaScript code that triggers a frame deletion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site, a different vulnerability than CVE-2016-1690.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1701.html">CVE-2016-1701</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1701">SUSE bug 982719</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128400" comment="chromedriver-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128401" comment="chromium-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128402" comment="chromium-desktop-gnome-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128403" comment="chromium-desktop-kde-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128404" comment="chromium-ffmpegsumo-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1702</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1702" source="CVE"/>
    <description>
    The SkRegion::readFromMemory function in core/SkRegion.cpp in Skia, as used in Google Chrome before 51.0.2704.79, does not validate the interval count, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted serialized data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1702.html">CVE-2016-1702</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1702">SUSE bug 982719</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128400" comment="chromedriver-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128401" comment="chromium-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128402" comment="chromium-desktop-gnome-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128403" comment="chromium-desktop-kde-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128404" comment="chromium-ffmpegsumo-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1703</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1703" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.79 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1703.html">CVE-2016-1703</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1703">SUSE bug 982719</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128400" comment="chromedriver-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128401" comment="chromium-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128402" comment="chromium-desktop-gnome-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128403" comment="chromium-desktop-kde-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128404" comment="chromium-ffmpegsumo-51.0.2704.79-54.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1704</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.103 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1704.html">CVE-2016-1704</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1704">SUSE bug 985397</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1704">SUSE bug 985397</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1704">SUSE bug 985397</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1704">SUSE bug 985397</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1704">SUSE bug 985397</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1704">SUSE bug 985397</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129004" comment="chromedriver-51.0.2704.103-57.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129005" comment="chromium-51.0.2704.103-57.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129006" comment="chromium-desktop-gnome-51.0.2704.103-57.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129007" comment="chromium-desktop-kde-51.0.2704.103-57.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129008" comment="chromium-ffmpegsumo-51.0.2704.103-57.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1705</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 52.0.2743.82 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1705.html">CVE-2016-1705</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1705">SUSE bug 989901</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130665" comment="chromedriver-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130666" comment="chromium-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130667" comment="chromium-desktop-gnome-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130668" comment="chromium-desktop-kde-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130669" comment="chromium-ffmpegsumo-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1706</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706" source="CVE"/>
    <description>
    The PPAPI implementation in Google Chrome before 52.0.2743.82 does not validate the origin of IPC messages to the plugin broker process that should have come from the browser process, which allows remote attackers to bypass a sandbox protection mechanism via an unexpected message type, related to broker_process_dispatcher.cc, ppapi_plugin_process_host.cc, ppapi_thread.cc, and render_frame_message_filter.cc.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1706.html">CVE-2016-1706</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1706">SUSE bug 989901</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130665" comment="chromedriver-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130666" comment="chromium-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130667" comment="chromium-desktop-gnome-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130668" comment="chromium-desktop-kde-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130669" comment="chromium-ffmpegsumo-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1707</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707" source="CVE"/>
    <description>
    ios/web/web_state/ui/crw_web_controller.mm in Google Chrome before 52.0.2743.82 on iOS does not ensure that an invalid URL is replaced with the about:blank URL, which allows remote attackers to spoof the URL display via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1707.html">CVE-2016-1707</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1707">SUSE bug 989901</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130665" comment="chromedriver-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130666" comment="chromium-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130667" comment="chromium-desktop-gnome-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130668" comment="chromium-desktop-kde-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130669" comment="chromium-ffmpegsumo-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1708</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1708" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708" source="CVE"/>
    <description>
    The Chrome Web Store inline-installation implementation in the Extensions subsystem in Google Chrome before 52.0.2743.82 does not properly consider object lifetimes during progress observation, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1708.html">CVE-2016-1708</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1708">SUSE bug 989901</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130665" comment="chromedriver-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130666" comment="chromium-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130667" comment="chromium-desktop-gnome-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130668" comment="chromium-desktop-kde-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130669" comment="chromium-ffmpegsumo-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1709</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ByteArray::Get method in data/byte_array.cc in Google sfntly before 2016-06-10, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted SFNT font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1709.html">CVE-2016-1709</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1709">SUSE bug 989901</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130665" comment="chromedriver-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130666" comment="chromium-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130667" comment="chromium-desktop-gnome-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130668" comment="chromium-desktop-kde-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130669" comment="chromium-ffmpegsumo-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1710</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710" source="CVE"/>
    <description>
    The ChromeClientImpl::createWindow method in WebKit/Source/web/ChromeClientImpl.cpp in Blink, as used in Google Chrome before 52.0.2743.82, does not prevent window creation by a deferred frame, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1710.html">CVE-2016-1710</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1710">SUSE bug 989901</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130665" comment="chromedriver-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130666" comment="chromium-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130667" comment="chromium-desktop-gnome-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130668" comment="chromium-desktop-kde-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130669" comment="chromium-ffmpegsumo-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1711</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711" source="CVE"/>
    <description>
    WebKit/Source/core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 52.0.2743.82, does not disable frame navigation during a detach operation on a DocumentLoader object, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1711.html">CVE-2016-1711</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1711">SUSE bug 989901</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130665" comment="chromedriver-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130666" comment="chromium-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130667" comment="chromium-desktop-gnome-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130668" comment="chromium-desktop-kde-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130669" comment="chromium-ffmpegsumo-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1714</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714" source="CVE"/>
    <description>
    The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1714.html">CVE-2016-1714</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1714">SUSE bug 961691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1714">SUSE bug 961692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1714">SUSE bug 961691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1714">SUSE bug 961691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1714">SUSE bug 961692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1714">SUSE bug 961692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1714">SUSE bug 961691</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1714">SUSE bug 961692</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1762</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1762" source="CVE"/>
    <description>
    The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1762.html">CVE-2016-1762</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1762">SUSE bug 981040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1762">SUSE bug 981040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1762">SUSE bug 981040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1762">SUSE bug 981040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1762">SUSE bug 981040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1762">SUSE bug 981040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1762">SUSE bug 981040</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128929" comment="libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128930" comment="libxml2-2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128931" comment="libxml2-2-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128932" comment="libxml2-devel-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128933" comment="libxml2-devel-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128934" comment="libxml2-doc-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128935" comment="libxml2-tools-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128936" comment="python-libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1833</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1833" source="CVE"/>
    <description>
    The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1833.html">CVE-2016-1833</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1833">SUSE bug 981108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1833">SUSE bug 981108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1833">SUSE bug 981108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1833">SUSE bug 981108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1833">SUSE bug 981108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1833">SUSE bug 981108</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128929" comment="libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128930" comment="libxml2-2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128931" comment="libxml2-2-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128932" comment="libxml2-devel-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128933" comment="libxml2-devel-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128934" comment="libxml2-doc-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128935" comment="libxml2-tools-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128936" comment="python-libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1834</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1834" source="CVE"/>
    <description>
    Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1834.html">CVE-2016-1834</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1834">SUSE bug 981041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1834">SUSE bug 981041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1834">SUSE bug 981041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1834">SUSE bug 981041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1834">SUSE bug 981041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1834">SUSE bug 981041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1834">SUSE bug 981041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1834">SUSE bug 981041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1834">SUSE bug 981041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1834">SUSE bug 981041</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128929" comment="libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128930" comment="libxml2-2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128931" comment="libxml2-2-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128932" comment="libxml2-devel-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128933" comment="libxml2-devel-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128934" comment="libxml2-doc-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128935" comment="libxml2-tools-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128936" comment="python-libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1835</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1835" source="CVE"/>
    <description>
    Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1835.html">CVE-2016-1835</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1835">SUSE bug 981109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1835">SUSE bug 981109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1835">SUSE bug 981109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1835">SUSE bug 981109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1835">SUSE bug 981109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128929" comment="libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128930" comment="libxml2-2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128931" comment="libxml2-2-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128932" comment="libxml2-devel-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128933" comment="libxml2-devel-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128934" comment="libxml2-doc-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128935" comment="libxml2-tools-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128936" comment="python-libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1837</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1837" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1837.html">CVE-2016-1837</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1837">SUSE bug 981111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1837">SUSE bug 981111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1837">SUSE bug 981111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1837">SUSE bug 981111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1837">SUSE bug 981111</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128929" comment="libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128930" comment="libxml2-2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128931" comment="libxml2-2-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128932" comment="libxml2-devel-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128933" comment="libxml2-devel-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128934" comment="libxml2-doc-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128935" comment="libxml2-tools-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128936" comment="python-libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1838</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1838" source="CVE"/>
    <description>
    The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1838.html">CVE-2016-1838</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1838">SUSE bug 981112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1838">SUSE bug 981112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1838">SUSE bug 981112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1838">SUSE bug 981112</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1838">SUSE bug 981112</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128929" comment="libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128930" comment="libxml2-2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128931" comment="libxml2-2-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128932" comment="libxml2-devel-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128933" comment="libxml2-devel-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128934" comment="libxml2-doc-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128935" comment="libxml2-tools-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128936" comment="python-libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1839</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1839" source="CVE"/>
    <description>
    The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1839.html">CVE-2016-1839</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1839">SUSE bug 981114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1839">SUSE bug 981114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1839">SUSE bug 963963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1839">SUSE bug 981114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1839">SUSE bug 981114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1839">SUSE bug 981114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1839">SUSE bug 981114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1839">SUSE bug 981114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1839">SUSE bug 1039069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1839">SUSE bug 1039661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1839">SUSE bug 1039661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1839">SUSE bug 1039661</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128929" comment="libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128930" comment="libxml2-2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128931" comment="libxml2-2-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128932" comment="libxml2-devel-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128933" comment="libxml2-devel-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128934" comment="libxml2-doc-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128935" comment="libxml2-tools-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128936" comment="python-libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1840</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1840" source="CVE"/>
    <description>
    Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1840.html">CVE-2016-1840</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1840">SUSE bug 981115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1840">SUSE bug 981115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1840">SUSE bug 981115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1840">SUSE bug 981115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1840">SUSE bug 981115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1840">SUSE bug 981115</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1840">SUSE bug 981115</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128929" comment="libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128930" comment="libxml2-2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128931" comment="libxml2-2-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128932" comment="libxml2-devel-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128933" comment="libxml2-devel-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128934" comment="libxml2-doc-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128935" comment="libxml2-tools-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128936" comment="python-libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1866</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1866" source="CVE"/>
    <description>
    Salt 2015.8.x before 2015.8.4 does not properly handle clear messages on the minion, which allows man-in-the-middle attackers to execute arbitrary code by inserting packets into the minion-master data stream.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1866.html">CVE-2016-1866</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1866">SUSE bug 965403</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1866">SUSE bug 965403</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1866">SUSE bug 965403</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1866">SUSE bug 965403</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1866">SUSE bug 965403</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124515" comment="salt-2015.8.7-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124516" comment="salt-api-2015.8.7-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124517" comment="salt-bash-completion-2015.8.7-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124518" comment="salt-cloud-2015.8.7-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124519" comment="salt-doc-2015.8.7-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124520" comment="salt-fish-completion-2015.8.7-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124521" comment="salt-master-2015.8.7-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124522" comment="salt-minion-2015.8.7-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124523" comment="salt-proxy-2015.8.7-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124524" comment="salt-raet-2015.8.7-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153601" comment="salt-raet is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124525" comment="salt-ssh-2015.8.7-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124526" comment="salt-syndic-2015.8.7-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124527" comment="salt-zsh-completion-2015.8.7-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1867</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1867" source="CVE"/>
    <description>
    The jpc_pi_nextcprl function in JasPer 1.900.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG 2000 image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1867.html">CVE-2016-1867</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1867">SUSE bug 961886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1867">SUSE bug 961886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1867">SUSE bug 961886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1867">SUSE bug 961886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135598" comment="jasper-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135599" comment="libjasper-devel-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135600" comment="libjasper1-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135601" comment="libjasper1-32bit-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1897</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1897" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1897" source="CVE"/>
    <description>
    FFmpeg 2.x allows remote attackers to conduct cross-origin attacks and read arbitrary files by using the concat protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains the first line of a local file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1897.html">CVE-2016-1897</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1897">SUSE bug 961937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1897">SUSE bug 961937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1897">SUSE bug 961937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1897">SUSE bug 961937</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122081" comment="ffmpeg-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153138" comment="ffmpeg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122082" comment="ffmpeg-devel-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153139" comment="ffmpeg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122083" comment="libavcodec-devel-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122084" comment="libavcodec56-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153141" comment="libavcodec56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122085" comment="libavcodec56-32bit-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153142" comment="libavcodec56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122086" comment="libavdevice-devel-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122087" comment="libavdevice56-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153144" comment="libavdevice56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122088" comment="libavdevice56-32bit-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153145" comment="libavdevice56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122089" comment="libavfilter-devel-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122090" comment="libavfilter5-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153147" comment="libavfilter5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122091" comment="libavfilter5-32bit-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153148" comment="libavfilter5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122092" comment="libavformat-devel-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122093" comment="libavformat56-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153150" comment="libavformat56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122094" comment="libavformat56-32bit-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153151" comment="libavformat56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122095" comment="libavresample-devel-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122096" comment="libavresample2-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153153" comment="libavresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122097" comment="libavresample2-32bit-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153154" comment="libavresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122098" comment="libavutil-devel-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122099" comment="libavutil54-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153156" comment="libavutil54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122100" comment="libavutil54-32bit-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153157" comment="libavutil54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122101" comment="libpostproc-devel-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122102" comment="libpostproc53-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153159" comment="libpostproc53 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122103" comment="libpostproc53-32bit-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153160" comment="libpostproc53-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122104" comment="libswresample-devel-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122105" comment="libswresample1-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153162" comment="libswresample1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122106" comment="libswresample1-32bit-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153163" comment="libswresample1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122107" comment="libswscale-devel-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122108" comment="libswscale3-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153165" comment="libswscale3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122109" comment="libswscale3-32bit-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153166" comment="libswscale3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1898</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1898" source="CVE"/>
    <description>
    FFmpeg 2.x allows remote attackers to conduct cross-origin attacks and read arbitrary files by using the subfile protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains an arbitrary line of a local file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1898.html">CVE-2016-1898</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1898">SUSE bug 961937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1898">SUSE bug 961937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1898">SUSE bug 961937</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1898">SUSE bug 961937</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122081" comment="ffmpeg-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153138" comment="ffmpeg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122082" comment="ffmpeg-devel-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153139" comment="ffmpeg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122083" comment="libavcodec-devel-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122084" comment="libavcodec56-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153141" comment="libavcodec56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122085" comment="libavcodec56-32bit-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153142" comment="libavcodec56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122086" comment="libavdevice-devel-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122087" comment="libavdevice56-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153144" comment="libavdevice56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122088" comment="libavdevice56-32bit-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153145" comment="libavdevice56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122089" comment="libavfilter-devel-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122090" comment="libavfilter5-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153147" comment="libavfilter5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122091" comment="libavfilter5-32bit-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153148" comment="libavfilter5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122092" comment="libavformat-devel-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122093" comment="libavformat56-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153150" comment="libavformat56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122094" comment="libavformat56-32bit-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153151" comment="libavformat56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122095" comment="libavresample-devel-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122096" comment="libavresample2-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153153" comment="libavresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122097" comment="libavresample2-32bit-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153154" comment="libavresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122098" comment="libavutil-devel-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122099" comment="libavutil54-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153156" comment="libavutil54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122100" comment="libavutil54-32bit-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153157" comment="libavutil54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122101" comment="libpostproc-devel-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122102" comment="libpostproc53-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153159" comment="libpostproc53 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122103" comment="libpostproc53-32bit-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153160" comment="libpostproc53-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122104" comment="libswresample-devel-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122105" comment="libswresample1-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153162" comment="libswresample1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122106" comment="libswresample1-32bit-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153163" comment="libswresample1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122107" comment="libswscale-devel-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122108" comment="libswscale3-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153165" comment="libswscale3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122109" comment="libswscale3-32bit-2.8.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153166" comment="libswscale3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1899</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1899" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1899" source="CVE"/>
    <description>
    CRLF injection vulnerability in the ui-blob handler in CGit before 0.12 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks or cross-site scripting (XSS) attacks via CRLF sequences in the mimetype parameter, as demonstrated by a request to blob/cgit.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1899.html">CVE-2016-1899</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1899">SUSE bug 961916</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1899">SUSE bug 961916</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121925" comment="cgit-0.12-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153605" comment="cgit is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1900</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1900" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1900" source="CVE"/>
    <description>
    CRLF injection vulnerability in the cgit_print_http_headers function in ui-shared.c in CGit before 0.12 allows remote attackers with permission to write to a repository to inject arbitrary HTTP headers and conduct HTTP response splitting attacks or cross-site scripting (XSS) attacks via newline characters in a filename.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1900.html">CVE-2016-1900</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1900">SUSE bug 961916</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1900">SUSE bug 961916</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121925" comment="cgit-0.12-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153605" comment="cgit is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1901</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1901" source="CVE"/>
    <description>
    Integer overflow in the authenticate_post function in CGit before 0.12 allows remote attackers to have unspecified impact via a large value in the Content-Length HTTP header, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1901.html">CVE-2016-1901</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1901">SUSE bug 961916</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1901">SUSE bug 961916</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009121925" comment="cgit-0.12-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153605" comment="cgit is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1903</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1903" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1903" source="CVE"/>
    <description>
    The gdImageRotateInterpolated function in ext/gd/libgd/gd_interpolation.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a large bgd_color argument to the imagerotate function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1903.html">CVE-2016-1903</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1903">SUSE bug 962057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1903">SUSE bug 962057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1903">SUSE bug 962057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1903">SUSE bug 962057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1903">SUSE bug 962057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1903">SUSE bug 962057</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122935" comment="apache2-mod_php5-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122936" comment="php5-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122937" comment="php5-bcmath-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122938" comment="php5-bz2-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122939" comment="php5-calendar-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122940" comment="php5-ctype-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122941" comment="php5-curl-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122942" comment="php5-dba-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122943" comment="php5-devel-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122944" comment="php5-dom-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122945" comment="php5-enchant-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122946" comment="php5-exif-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122947" comment="php5-fastcgi-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122948" comment="php5-fileinfo-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122949" comment="php5-firebird-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122950" comment="php5-fpm-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122951" comment="php5-ftp-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122952" comment="php5-gd-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122953" comment="php5-gettext-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122954" comment="php5-gmp-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122955" comment="php5-iconv-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122956" comment="php5-imap-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122957" comment="php5-intl-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122958" comment="php5-json-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122959" comment="php5-ldap-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122960" comment="php5-mbstring-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122961" comment="php5-mcrypt-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122962" comment="php5-mssql-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122963" comment="php5-mysql-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122964" comment="php5-odbc-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122965" comment="php5-opcache-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122966" comment="php5-openssl-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122967" comment="php5-pcntl-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122968" comment="php5-pdo-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122969" comment="php5-pear-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122970" comment="php5-pgsql-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122971" comment="php5-phar-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122972" comment="php5-posix-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122973" comment="php5-pspell-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122974" comment="php5-readline-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122975" comment="php5-shmop-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122976" comment="php5-snmp-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122977" comment="php5-soap-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122978" comment="php5-sockets-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122979" comment="php5-sqlite-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122980" comment="php5-suhosin-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122981" comment="php5-sysvmsg-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122982" comment="php5-sysvsem-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122983" comment="php5-sysvshm-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122984" comment="php5-tidy-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122985" comment="php5-tokenizer-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122986" comment="php5-wddx-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122987" comment="php5-xmlreader-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122988" comment="php5-xmlrpc-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122989" comment="php5-xmlwriter-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122990" comment="php5-xsl-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122991" comment="php5-zip-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122992" comment="php5-zlib-5.5.14-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1908</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1908" source="CVE"/>
    <description>
    The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1908.html">CVE-2016-1908</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 996040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 1001712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 1005738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 962313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 1087412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1908">SUSE bug 1087412</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128339" comment="openssh-6.6p1-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128340" comment="openssh-askpass-gnome-6.6p1-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153167" comment="openssh-askpass-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128341" comment="openssh-cavs-6.6p1-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153168" comment="openssh-cavs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128342" comment="openssh-fips-6.6p1-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153169" comment="openssh-fips is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128343" comment="openssh-helpers-6.6p1-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152111" comment="openssh-helpers is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1922</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1922.html">CVE-2016-1922</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1922">SUSE bug 962320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1922">SUSE bug 962321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1922">SUSE bug 962320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1922">SUSE bug 962320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1922">SUSE bug 962320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1922">SUSE bug 962321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1922">SUSE bug 962321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1922">SUSE bug 962320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1922">SUSE bug 962321</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1922">SUSE bug 962320</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1927</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1927" source="CVE"/>
    <description>
    The suggestPassword function in js/functions.js in phpMyAdmin 4.0.x before 4.0.10.13, 4.4.x before 4.4.15.3, and 4.5.x before 4.5.4 relies on the Math.random JavaScript function, which makes it easier for remote attackers to guess passwords via a brute-force approach.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1927.html">CVE-2016-1927</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1927">SUSE bug 964024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1927">SUSE bug 964024</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122885" comment="phpMyAdmin-4.4.15.4-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1930</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1930.html">CVE-2016-1930</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1930">SUSE bug 963520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1930">SUSE bug 963632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1930">SUSE bug 963632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1930">SUSE bug 963632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1930">SUSE bug 963632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1930">SUSE bug 963632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1930">SUSE bug 963632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1930">SUSE bug 963632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1930">SUSE bug 963632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1930">SUSE bug 963632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1930">SUSE bug 963632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1930">SUSE bug 963632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1930">SUSE bug 963632</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122699" comment="MozillaFirefox-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122700" comment="MozillaFirefox-branding-upstream-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122701" comment="MozillaFirefox-buildsymbols-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122702" comment="MozillaFirefox-devel-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122703" comment="MozillaFirefox-translations-common-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122704" comment="MozillaFirefox-translations-other-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123327" comment="MozillaThunderbird-38.6.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123328" comment="MozillaThunderbird-buildsymbols-38.6.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123329" comment="MozillaThunderbird-devel-38.6.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123330" comment="MozillaThunderbird-translations-common-38.6.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123331" comment="MozillaThunderbird-translations-other-38.6.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122705" comment="libfreebl3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122706" comment="libfreebl3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122707" comment="libsoftokn3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122708" comment="libsoftokn3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122709" comment="mozilla-nspr-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122710" comment="mozilla-nspr-32bit-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122711" comment="mozilla-nspr-devel-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122712" comment="mozilla-nss-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122713" comment="mozilla-nss-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122714" comment="mozilla-nss-certs-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122715" comment="mozilla-nss-certs-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122716" comment="mozilla-nss-devel-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122717" comment="mozilla-nss-sysinit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122718" comment="mozilla-nss-sysinit-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122719" comment="mozilla-nss-tools-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122750" comment="xulrunner-38.6.0-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122751" comment="xulrunner-32bit-38.6.0-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122752" comment="xulrunner-devel-38.6.0-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1931</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1931" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to uninitialized memory encountered during brotli data compression, and other vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1931.html">CVE-2016-1931</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1931">SUSE bug 963633</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1931">SUSE bug 963633</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1931">SUSE bug 963633</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1931">SUSE bug 963633</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122699" comment="MozillaFirefox-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122700" comment="MozillaFirefox-branding-upstream-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122701" comment="MozillaFirefox-buildsymbols-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122702" comment="MozillaFirefox-devel-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122703" comment="MozillaFirefox-translations-common-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122704" comment="MozillaFirefox-translations-other-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122705" comment="libfreebl3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122706" comment="libfreebl3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122707" comment="libsoftokn3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122708" comment="libsoftokn3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122709" comment="mozilla-nspr-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122710" comment="mozilla-nspr-32bit-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122711" comment="mozilla-nspr-devel-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122712" comment="mozilla-nss-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122713" comment="mozilla-nss-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122714" comment="mozilla-nss-certs-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122715" comment="mozilla-nss-certs-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122716" comment="mozilla-nss-devel-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122717" comment="mozilla-nss-sysinit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122718" comment="mozilla-nss-sysinit-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122719" comment="mozilla-nss-tools-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1933</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1933" source="CVE"/>
    <description>
    Integer overflow in the image-deinterlacing functionality in Mozilla Firefox before 44.0 allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted GIF image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1933.html">CVE-2016-1933</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1933">SUSE bug 963634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1933">SUSE bug 963634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1933">SUSE bug 963634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1933">SUSE bug 963634</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122699" comment="MozillaFirefox-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122700" comment="MozillaFirefox-branding-upstream-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122701" comment="MozillaFirefox-buildsymbols-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122702" comment="MozillaFirefox-devel-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122703" comment="MozillaFirefox-translations-common-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122704" comment="MozillaFirefox-translations-other-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122705" comment="libfreebl3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122706" comment="libfreebl3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122707" comment="libsoftokn3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122708" comment="libsoftokn3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122709" comment="mozilla-nspr-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122710" comment="mozilla-nspr-32bit-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122711" comment="mozilla-nspr-devel-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122712" comment="mozilla-nss-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122713" comment="mozilla-nss-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122714" comment="mozilla-nss-certs-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122715" comment="mozilla-nss-certs-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122716" comment="mozilla-nss-devel-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122717" comment="mozilla-nss-sysinit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122718" comment="mozilla-nss-sysinit-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122719" comment="mozilla-nss-tools-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1935</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935" source="CVE"/>
    <description>
    Buffer overflow in the BufferSubData function in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allows remote attackers to execute arbitrary code via crafted WebGL content.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1935.html">CVE-2016-1935</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1935">SUSE bug 963520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1935">SUSE bug 963635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1935">SUSE bug 963635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1935">SUSE bug 963635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1935">SUSE bug 963635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1935">SUSE bug 963635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1935">SUSE bug 963635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1935">SUSE bug 963635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1935">SUSE bug 963635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1935">SUSE bug 963635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1935">SUSE bug 963635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1935">SUSE bug 963635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1935">SUSE bug 963635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1935">SUSE bug 963635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1935">SUSE bug 963635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1935">SUSE bug 963635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1935">SUSE bug 963635</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122699" comment="MozillaFirefox-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122700" comment="MozillaFirefox-branding-upstream-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122701" comment="MozillaFirefox-buildsymbols-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122702" comment="MozillaFirefox-devel-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122703" comment="MozillaFirefox-translations-common-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122704" comment="MozillaFirefox-translations-other-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123327" comment="MozillaThunderbird-38.6.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123328" comment="MozillaThunderbird-buildsymbols-38.6.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123329" comment="MozillaThunderbird-devel-38.6.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123330" comment="MozillaThunderbird-translations-common-38.6.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123331" comment="MozillaThunderbird-translations-other-38.6.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122705" comment="libfreebl3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122706" comment="libfreebl3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122707" comment="libsoftokn3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122708" comment="libsoftokn3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122709" comment="mozilla-nspr-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122710" comment="mozilla-nspr-32bit-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122711" comment="mozilla-nspr-devel-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122712" comment="mozilla-nss-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122713" comment="mozilla-nss-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122714" comment="mozilla-nss-certs-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122715" comment="mozilla-nss-certs-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122716" comment="mozilla-nss-devel-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122717" comment="mozilla-nss-sysinit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122718" comment="mozilla-nss-sysinit-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122719" comment="mozilla-nss-tools-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122750" comment="xulrunner-38.6.0-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152822" comment="xulrunner is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122751" comment="xulrunner-32bit-38.6.0-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152823" comment="xulrunner-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122752" comment="xulrunner-devel-38.6.0-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152824" comment="xulrunner-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1937</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1937" source="CVE"/>
    <description>
    The protocol-handler dialog in Mozilla Firefox before 44.0 allows remote attackers to conduct clickjacking attacks via a crafted web site that triggers a single-click action in a situation where a double-click action was intended.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1937.html">CVE-2016-1937</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1937">SUSE bug 963641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1937">SUSE bug 963641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1937">SUSE bug 963641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1937">SUSE bug 963641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1937">SUSE bug 963641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1937">SUSE bug 977736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1937">SUSE bug 977736</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1937">SUSE bug 963641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1937">SUSE bug 977736</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122699" comment="MozillaFirefox-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122700" comment="MozillaFirefox-branding-upstream-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122701" comment="MozillaFirefox-buildsymbols-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122702" comment="MozillaFirefox-devel-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122703" comment="MozillaFirefox-translations-common-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122704" comment="MozillaFirefox-translations-other-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122705" comment="libfreebl3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122706" comment="libfreebl3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122707" comment="libsoftokn3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122708" comment="libsoftokn3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122709" comment="mozilla-nspr-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122710" comment="mozilla-nspr-32bit-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122711" comment="mozilla-nspr-devel-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122712" comment="mozilla-nss-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122713" comment="mozilla-nss-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122714" comment="mozilla-nss-certs-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122715" comment="mozilla-nss-certs-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122716" comment="mozilla-nss-devel-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122717" comment="mozilla-nss-sysinit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122718" comment="mozilla-nss-sysinit-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122719" comment="mozilla-nss-tools-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1938</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1938" source="CVE"/>
    <description>
    The s_mp_div function in lib/freebl/mpi/mpi.c in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, improperly divides numbers, which might make it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging use of the (1) mp_div or (2) mp_exptmod function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1938.html">CVE-2016-1938</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1938">SUSE bug 963731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1938">SUSE bug 963731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1938">SUSE bug 963731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1938">SUSE bug 963731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1938">SUSE bug 963731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1938">SUSE bug 963731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1938">SUSE bug 963731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1938">SUSE bug 963731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1938">SUSE bug 963731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1938">SUSE bug 963731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1938">SUSE bug 963731</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122699" comment="MozillaFirefox-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122700" comment="MozillaFirefox-branding-upstream-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122701" comment="MozillaFirefox-buildsymbols-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122702" comment="MozillaFirefox-devel-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122703" comment="MozillaFirefox-translations-common-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122704" comment="MozillaFirefox-translations-other-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122705" comment="libfreebl3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122706" comment="libfreebl3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122707" comment="libsoftokn3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122708" comment="libsoftokn3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122709" comment="mozilla-nspr-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122710" comment="mozilla-nspr-32bit-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122711" comment="mozilla-nspr-devel-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122712" comment="mozilla-nss-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122713" comment="mozilla-nss-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122714" comment="mozilla-nss-certs-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122715" comment="mozilla-nss-certs-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122716" comment="mozilla-nss-devel-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122717" comment="mozilla-nss-sysinit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122718" comment="mozilla-nss-sysinit-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122719" comment="mozilla-nss-tools-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1939</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1939" source="CVE"/>
    <description>
    Mozilla Firefox before 44.0 stores cookies with names containing vertical tab characters, which allows remote attackers to obtain sensitive information by reading HTTP Cookie headers.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-7208.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1939.html">CVE-2016-1939</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1939">SUSE bug 963637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1939">SUSE bug 963637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1939">SUSE bug 963637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1939">SUSE bug 963637</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122699" comment="MozillaFirefox-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122700" comment="MozillaFirefox-branding-upstream-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122701" comment="MozillaFirefox-buildsymbols-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122702" comment="MozillaFirefox-devel-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122703" comment="MozillaFirefox-translations-common-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122704" comment="MozillaFirefox-translations-other-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122705" comment="libfreebl3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122706" comment="libfreebl3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122707" comment="libsoftokn3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122708" comment="libsoftokn3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122709" comment="mozilla-nspr-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122710" comment="mozilla-nspr-32bit-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122711" comment="mozilla-nspr-devel-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122712" comment="mozilla-nss-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122713" comment="mozilla-nss-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122714" comment="mozilla-nss-certs-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122715" comment="mozilla-nss-certs-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122716" comment="mozilla-nss-devel-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122717" comment="mozilla-nss-sysinit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122718" comment="mozilla-nss-sysinit-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122719" comment="mozilla-nss-tools-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1942</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1942" source="CVE"/>
    <description>
    Mozilla Firefox before 44.0 allows user-assisted remote attackers to spoof a trailing substring in the address bar by leveraging a user's paste of a (1) wyciwyg: URI or (2) resource: URI.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1942.html">CVE-2016-1942</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1942">SUSE bug 963643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1942">SUSE bug 963643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1942">SUSE bug 963643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1942">SUSE bug 963643</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122699" comment="MozillaFirefox-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122700" comment="MozillaFirefox-branding-upstream-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122701" comment="MozillaFirefox-buildsymbols-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122702" comment="MozillaFirefox-devel-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122703" comment="MozillaFirefox-translations-common-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122704" comment="MozillaFirefox-translations-other-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122705" comment="libfreebl3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122706" comment="libfreebl3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122707" comment="libsoftokn3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122708" comment="libsoftokn3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122709" comment="mozilla-nspr-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122710" comment="mozilla-nspr-32bit-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122711" comment="mozilla-nspr-devel-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122712" comment="mozilla-nss-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122713" comment="mozilla-nss-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122714" comment="mozilla-nss-certs-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122715" comment="mozilla-nss-certs-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122716" comment="mozilla-nss-devel-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122717" comment="mozilla-nss-sysinit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122718" comment="mozilla-nss-sysinit-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122719" comment="mozilla-nss-tools-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1943</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1943" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1943" source="CVE"/>
    <description>
    Mozilla Firefox before 44.0 on Android allows remote attackers to spoof the address bar via the scrollTo method.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1943.html">CVE-2016-1943</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1943">SUSE bug 963643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1943">SUSE bug 963643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1943">SUSE bug 963643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1943">SUSE bug 963643</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122699" comment="MozillaFirefox-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122700" comment="MozillaFirefox-branding-upstream-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122701" comment="MozillaFirefox-buildsymbols-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122702" comment="MozillaFirefox-devel-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122703" comment="MozillaFirefox-translations-common-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122704" comment="MozillaFirefox-translations-other-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122705" comment="libfreebl3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122706" comment="libfreebl3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122707" comment="libsoftokn3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122708" comment="libsoftokn3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122709" comment="mozilla-nspr-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122710" comment="mozilla-nspr-32bit-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122711" comment="mozilla-nspr-devel-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122712" comment="mozilla-nss-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122713" comment="mozilla-nss-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122714" comment="mozilla-nss-certs-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122715" comment="mozilla-nss-certs-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122716" comment="mozilla-nss-devel-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122717" comment="mozilla-nss-sysinit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122718" comment="mozilla-nss-sysinit-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122719" comment="mozilla-nss-tools-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1944</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1944" source="CVE"/>
    <description>
    The Buffer11::NativeBuffer11::map function in ANGLE, as used in Mozilla Firefox before 44.0, might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1944.html">CVE-2016-1944</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1944">SUSE bug 963644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1944">SUSE bug 963644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1944">SUSE bug 963644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1944">SUSE bug 963644</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122699" comment="MozillaFirefox-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122700" comment="MozillaFirefox-branding-upstream-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122701" comment="MozillaFirefox-buildsymbols-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122702" comment="MozillaFirefox-devel-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122703" comment="MozillaFirefox-translations-common-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122704" comment="MozillaFirefox-translations-other-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122705" comment="libfreebl3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122706" comment="libfreebl3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122707" comment="libsoftokn3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122708" comment="libsoftokn3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122709" comment="mozilla-nspr-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122710" comment="mozilla-nspr-32bit-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122711" comment="mozilla-nspr-devel-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122712" comment="mozilla-nss-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122713" comment="mozilla-nss-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122714" comment="mozilla-nss-certs-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122715" comment="mozilla-nss-certs-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122716" comment="mozilla-nss-devel-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122717" comment="mozilla-nss-sysinit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122718" comment="mozilla-nss-sysinit-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122719" comment="mozilla-nss-tools-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1945</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1945" source="CVE"/>
    <description>
    The nsZipArchive function in Mozilla Firefox before 44.0 might allow remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect use of a pointer during processing of a ZIP archive.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1945.html">CVE-2016-1945</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1945">SUSE bug 963644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1945">SUSE bug 963644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1945">SUSE bug 963644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1945">SUSE bug 963644</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122699" comment="MozillaFirefox-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122700" comment="MozillaFirefox-branding-upstream-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122701" comment="MozillaFirefox-buildsymbols-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122702" comment="MozillaFirefox-devel-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122703" comment="MozillaFirefox-translations-common-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122704" comment="MozillaFirefox-translations-other-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122705" comment="libfreebl3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122706" comment="libfreebl3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122707" comment="libsoftokn3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122708" comment="libsoftokn3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122709" comment="mozilla-nspr-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122710" comment="mozilla-nspr-32bit-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122711" comment="mozilla-nspr-devel-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122712" comment="mozilla-nss-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122713" comment="mozilla-nss-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122714" comment="mozilla-nss-certs-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122715" comment="mozilla-nss-certs-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122716" comment="mozilla-nss-devel-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122717" comment="mozilla-nss-sysinit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122718" comment="mozilla-nss-sysinit-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122719" comment="mozilla-nss-tools-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1946</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1946" source="CVE"/>
    <description>
    The MoofParser::Metadata function in binding/MoofParser.cpp in libstagefright in Mozilla Firefox before 44.0 does not limit the size of read operations, which might allow remote attackers to cause a denial of service (integer overflow and buffer overflow) or possibly have unspecified other impact via crafted metadata.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1946.html">CVE-2016-1946</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1946">SUSE bug 963644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1946">SUSE bug 963644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1946">SUSE bug 963644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1946">SUSE bug 963644</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122699" comment="MozillaFirefox-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122700" comment="MozillaFirefox-branding-upstream-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122701" comment="MozillaFirefox-buildsymbols-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122702" comment="MozillaFirefox-devel-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122703" comment="MozillaFirefox-translations-common-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122704" comment="MozillaFirefox-translations-other-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122705" comment="libfreebl3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122706" comment="libfreebl3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122707" comment="libsoftokn3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122708" comment="libsoftokn3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122709" comment="mozilla-nspr-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122710" comment="mozilla-nspr-32bit-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122711" comment="mozilla-nspr-devel-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122712" comment="mozilla-nss-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122713" comment="mozilla-nss-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122714" comment="mozilla-nss-certs-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122715" comment="mozilla-nss-certs-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122716" comment="mozilla-nss-devel-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122717" comment="mozilla-nss-sysinit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122718" comment="mozilla-nss-sysinit-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122719" comment="mozilla-nss-tools-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1947</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1947" source="CVE"/>
    <description>
    Mozilla Firefox 43.x mishandles attempts to connect to the Application Reputation service, which makes it easier for remote attackers to trigger an unintended download by leveraging the absence of reputation data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1947.html">CVE-2016-1947</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1947">SUSE bug 963645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1947">SUSE bug 963645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1947">SUSE bug 963645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1947">SUSE bug 963645</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122699" comment="MozillaFirefox-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122700" comment="MozillaFirefox-branding-upstream-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122701" comment="MozillaFirefox-buildsymbols-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122702" comment="MozillaFirefox-devel-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122703" comment="MozillaFirefox-translations-common-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122704" comment="MozillaFirefox-translations-other-44.0-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122705" comment="libfreebl3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122706" comment="libfreebl3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122707" comment="libsoftokn3-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122708" comment="libsoftokn3-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122709" comment="mozilla-nspr-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122710" comment="mozilla-nspr-32bit-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122711" comment="mozilla-nspr-devel-4.11-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122712" comment="mozilla-nss-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122713" comment="mozilla-nss-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122714" comment="mozilla-nss-certs-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122715" comment="mozilla-nss-certs-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122716" comment="mozilla-nss-devel-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122717" comment="mozilla-nss-sysinit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122718" comment="mozilla-nss-sysinit-32bit-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122719" comment="mozilla-nss-tools-3.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1949</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1949" source="CVE"/>
    <description>
    Mozilla Firefox before 44.0.2 does not properly restrict the interaction between Service Workers and plugins, which allows remote attackers to bypass the Same Origin Policy via a crafted web site that triggers spoofed responses to requests that use NPAPI, as demonstrated by a request for a crossdomain.xml file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1949.html">CVE-2016-1949</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1949">SUSE bug 966438</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1949">SUSE bug 966438</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1949">SUSE bug 966438</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1949">SUSE bug 966438</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1949">SUSE bug 966438</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1949">SUSE bug 967087</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123332" comment="MozillaFirefox-44.0.2-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123333" comment="MozillaFirefox-branding-upstream-44.0.2-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123334" comment="MozillaFirefox-buildsymbols-44.0.2-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123335" comment="MozillaFirefox-devel-44.0.2-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123336" comment="MozillaFirefox-translations-common-44.0.2-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123337" comment="MozillaFirefox-translations-other-44.0.2-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1950</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950" source="CVE"/>
    <description>
    Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1950.html">CVE-2016-1950</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1950">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1952</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1952" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1952.html">CVE-2016-1952</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1952">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1953</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1953" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to js/src/jit/arm/Assembler-arm.cpp, and unknown other vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1953.html">CVE-2016-1953</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1953">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1954</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1954" source="CVE"/>
    <description>
    The nsCSPContext::SendReports function in dom/security/nsCSPContext.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not prevent use of a non-HTTP report-uri for a Content Security Policy (CSP) violation report, which allows remote attackers to cause a denial of service (data overwrite) or possibly gain privileges by specifying a URL of a local file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1954.html">CVE-2016-1954</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1954">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1955</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1955" source="CVE"/>
    <description>
    Mozilla Firefox before 45.0 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information by reading a Content Security Policy (CSP) violation report that contains path information associated with an IFRAME element.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1955.html">CVE-2016-1955</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1955">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1956</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1956" source="CVE"/>
    <description>
    Mozilla Firefox before 45.0 on Linux, when an Intel video driver is used, allows remote attackers to cause a denial of service (memory consumption or stack memory corruption) by triggering use of a WebGL shader.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1956.html">CVE-2016-1956</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1956">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1957</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1957" source="CVE"/>
    <description>
    Memory leak in libstagefright in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to cause a denial of service (memory consumption) via an MPEG-4 file that triggers a delete operation on an array.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1957.html">CVE-2016-1957</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1957">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1958</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1958" source="CVE"/>
    <description>
    browser/base/content/browser.js in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to spoof the address bar via a javascript: URL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1958.html">CVE-2016-1958</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1958">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125358" comment="MozillaThunderbird-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125359" comment="MozillaThunderbird-buildsymbols-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125360" comment="MozillaThunderbird-devel-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125361" comment="MozillaThunderbird-translations-common-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125362" comment="MozillaThunderbird-translations-other-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1959</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1959" source="CVE"/>
    <description>
    The ServiceWorkerManager class in Mozilla Firefox before 45.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read and memory corruption) via unspecified use of the Clients API.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1959.html">CVE-2016-1959</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1959">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1960</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1960" source="CVE"/>
    <description>
    Integer underflow in the nsHtml5TreeBuilder class in the HTML5 string parser in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) by leveraging mishandling of end tags, as demonstrated by incorrect SVG processing, aka ZDI-CAN-3545.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1960.html">CVE-2016-1960</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1960">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1961</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1961" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHTMLDocument::SetBody function in dom/html/nsHTMLDocument.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of a root element, aka ZDI-CAN-3574.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1961.html">CVE-2016-1961</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1961">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1962</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1962" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::DataChannelConnection::Close function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of WebRTC data-channel connections.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1962.html">CVE-2016-1962</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1962">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125358" comment="MozillaThunderbird-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125359" comment="MozillaThunderbird-buildsymbols-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125360" comment="MozillaThunderbird-devel-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125361" comment="MozillaThunderbird-translations-common-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125362" comment="MozillaThunderbird-translations-other-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1963</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1963" source="CVE"/>
    <description>
    The FileReader class in Mozilla Firefox before 45.0 allows local users to gain privileges or cause a denial of service (memory corruption) by changing a file during a FileReader API read operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1963.html">CVE-2016-1963</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1963">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1964</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1964" source="CVE"/>
    <description>
    Use-after-free vulnerability in the AtomicBaseIncDec function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging mishandling of XML transformations.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1964.html">CVE-2016-1964</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1964">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1965</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1965" source="CVE"/>
    <description>
    Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 mishandle a navigation sequence that returns to the original page, which allows remote attackers to spoof the address bar via vectors involving the history.back method and the location.protocol property.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1965.html">CVE-2016-1965</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1965">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125358" comment="MozillaThunderbird-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125359" comment="MozillaThunderbird-buildsymbols-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125360" comment="MozillaThunderbird-devel-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125361" comment="MozillaThunderbird-translations-common-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125362" comment="MozillaThunderbird-translations-other-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1966</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1966" source="CVE"/>
    <description>
    The nsNPObjWrapper::GetNewOrUsed function in dom/plugins/base/nsJSNPRuntime.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (invalid pointer dereference and memory corruption) via a crafted NPAPI plugin.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1966.html">CVE-2016-1966</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1966">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125358" comment="MozillaThunderbird-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125359" comment="MozillaThunderbird-buildsymbols-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125360" comment="MozillaThunderbird-devel-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125361" comment="MozillaThunderbird-translations-common-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125362" comment="MozillaThunderbird-translations-other-38.7.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1967</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1967" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1967" source="CVE"/>
    <description>
    Mozilla Firefox before 45.0 does not properly restrict the availability of IFRAME Resource Timing API times, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that leverages history.back and performance.getEntries calls after restoring a browser session. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-7207.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1967.html">CVE-2016-1967</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1967">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1968</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1968" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1968" source="CVE"/>
    <description>
    Integer underflow in Brotli, as used in Mozilla Firefox before 45.0, allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted data with brotli compression.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1968.html">CVE-2016-1968</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1968">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1970</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1970" source="CVE"/>
    <description>
    Integer underflow in the srtp_unprotect function in the WebRTC implementation in Mozilla Firefox before 45.0 on Windows might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1970.html">CVE-2016-1970</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1970">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1971</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1971" source="CVE"/>
    <description>
    The I420VideoFrame::CreateFrame function in the WebRTC implementation in Mozilla Firefox before 45.0 on Windows omits an unspecified status check, which might allow remote attackers to cause a denial of service (memory corruption) or possibly have other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1971.html">CVE-2016-1971</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1971">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1972</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1972" source="CVE"/>
    <description>
    Race condition in libvpx in Mozilla Firefox before 45.0 on Windows might allow remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1972.html">CVE-2016-1972</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1972">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1973</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1973" source="CVE"/>
    <description>
    Race condition in the GetStaticInstance function in the WebRTC implementation in Mozilla Firefox before 45.0 might allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1973.html">CVE-2016-1973</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1973">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1974</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1974" source="CVE"/>
    <description>
    The nsScannerString::AppendUnicodeTo function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not verify that memory allocation succeeds, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via crafted Unicode data in an HTML, XML, or SVG document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1974.html">CVE-2016-1974</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1974">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1975</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1975" source="CVE"/>
    <description>
    Multiple race conditions in dom/media/systemservices/CamerasChild.cpp in the WebRTC implementation in Mozilla Firefox before 45.0 on Windows might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1975.html">CVE-2016-1975</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1975">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1976</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1976" source="CVE"/>
    <description>
    Use-after-free vulnerability in the DesktopDisplayDevice class in the WebRTC implementation in Mozilla Firefox before 45.0 on Windows might allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1976.html">CVE-2016-1976</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 969894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970378</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970380</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970431</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 970433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1976">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1977</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1977" source="CVE"/>
    <description>
    The Machine::Code::decoder::analysis::set_ref function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1977.html">CVE-2016-1977</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1977">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1979</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1979" source="CVE"/>
    <description>
    Use-after-free vulnerability in the PK11_ImportDERPrivateKeyInfoAndReturnKey function in Mozilla Network Security Services (NSS) before 3.21.1, as used in Mozilla Firefox before 45.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted key data with DER encoding.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1979.html">CVE-2016-1979</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1979">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1981</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1981.html">CVE-2016-1981</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1981">SUSE bug 963782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1981">SUSE bug 963783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1981">SUSE bug 963783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1981">SUSE bug 963782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1981">SUSE bug 963783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1981">SUSE bug 963782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1981">SUSE bug 963782</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1982</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1982" source="CVE"/>
    <description>
    The remove_chunked_transfer_coding function in filters.c in Privoxy before 3.0.24 allows remote attackers to cause a denial of service (invalid read and crash) via crafted chunk-encoded content.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1982.html">CVE-2016-1982</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1982">SUSE bug 963151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1982">SUSE bug 963151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1982">SUSE bug 963151</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122720" comment="privoxy-3.0.24-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152636" comment="privoxy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122721" comment="privoxy-doc-3.0.24-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153606" comment="privoxy-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1983</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-1983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1983" source="CVE"/>
    <description>
    The client_host function in parsers.c in Privoxy before 3.0.24 allows remote attackers to cause a denial of service (invalid read and crash) via an empty HTTP Host header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-1983.html">CVE-2016-1983</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1983">SUSE bug 963152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1983">SUSE bug 963152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-1983">SUSE bug 963152</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122720" comment="privoxy-3.0.24-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152636" comment="privoxy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122721" comment="privoxy-doc-3.0.24-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153606" comment="privoxy-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2037</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2037" source="CVE"/>
    <description>
    The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2037.html">CVE-2016-2037</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2037">SUSE bug 963448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2037">SUSE bug 963448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2037">SUSE bug 963448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2037">SUSE bug 963448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2037">SUSE bug 963448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2037">SUSE bug 963448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2037">SUSE bug 963448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2037">SUSE bug 963448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2037">SUSE bug 963448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2037">SUSE bug 963448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2037">SUSE bug 963448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2037">SUSE bug 963448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2037">SUSE bug 963448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2037">SUSE bug 1028410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2037">SUSE bug 963448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2037">SUSE bug 963448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2037">SUSE bug 963448</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148035" comment="cpio-2.11-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151389" comment="cpio is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148036" comment="cpio-lang-2.11-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151390" comment="cpio-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2038</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2038" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2038" source="CVE"/>
    <description>
    phpMyAdmin 4.0.x before 4.0.10.13, 4.4.x before 4.4.15.3, and 4.5.x before 4.5.4 allows remote attackers to obtain sensitive information via a crafted request, which reveals the full path in an error message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2038.html">CVE-2016-2038</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2038">SUSE bug 964024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2038">SUSE bug 964024</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122885" comment="phpMyAdmin-4.4.15.4-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2039</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2039" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2039" source="CVE"/>
    <description>
    libraries/session.inc.php in phpMyAdmin 4.0.x before 4.0.10.13, 4.4.x before 4.4.15.3, and 4.5.x before 4.5.4 does not properly generate CSRF token values, which allows remote attackers to bypass intended access restrictions by predicting a value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2039.html">CVE-2016-2039</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2039">SUSE bug 964024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2039">SUSE bug 964024</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122885" comment="phpMyAdmin-4.4.15.4-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2040</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2040" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.13, 4.4.x before 4.4.15.3, and 4.5.x before 4.5.4 allow remote authenticated users to inject arbitrary web script or HTML via a (1) table name, (2) SET value, (3) search query, or (4) hostname in a Location header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2040.html">CVE-2016-2040</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2040">SUSE bug 964024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2040">SUSE bug 964024</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122885" comment="phpMyAdmin-4.4.15.4-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2041</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2041" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2041" source="CVE"/>
    <description>
    libraries/common.inc.php in phpMyAdmin 4.0.x before 4.0.10.13, 4.4.x before 4.4.15.3, and 4.5.x before 4.5.4 does not use a constant-time algorithm for comparing CSRF tokens, which makes it easier for remote attackers to bypass intended access restrictions by measuring time differences.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2041.html">CVE-2016-2041</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2041">SUSE bug 964024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2041">SUSE bug 964024</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122885" comment="phpMyAdmin-4.4.15.4-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2042</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2042" source="CVE"/>
    <description>
    phpMyAdmin 4.4.x before 4.4.15.3 and 4.5.x before 4.5.4 allows remote attackers to obtain sensitive information via a crafted request to (1) libraries/phpseclib/Crypt/AES.php or (2) libraries/phpseclib/Crypt/Rijndael.php, which reveals the full path in an error message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2042.html">CVE-2016-2042</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2042">SUSE bug 964024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2042">SUSE bug 964024</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122885" comment="phpMyAdmin-4.4.15.4-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2043</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2043" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2043" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the goToFinish1NF function in js/normalization.js in phpMyAdmin 4.4.x before 4.4.15.3 and 4.5.x before 4.5.4 allows remote authenticated users to inject arbitrary web script or HTML via a table name to the normalization page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2043.html">CVE-2016-2043</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2043">SUSE bug 964024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2043">SUSE bug 964024</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009122885" comment="phpMyAdmin-4.4.15.4-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2047</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2047" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047" source="CVE"/>
    <description>
    The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2047.html">CVE-2016-2047</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2047">SUSE bug 963806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2047">SUSE bug 963806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2047">SUSE bug 976341</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2047">SUSE bug 963806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2047">SUSE bug 963806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2047">SUSE bug 963806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2047">SUSE bug 980904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2047">SUSE bug 963806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2047">SUSE bug 963806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2047">SUSE bug 963806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127794" comment="libmysql56client18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127795" comment="libmysql56client18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127796" comment="libmysql56client_r18-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127797" comment="libmysql56client_r18-32bit-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128956" comment="libmysqlclient-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128946" comment="libmysqlclient18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128947" comment="libmysqlclient18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128948" comment="libmysqlclient_r18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128949" comment="libmysqlclient_r18-32bit-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128957" comment="libmysqld-devel-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128958" comment="libmysqld18-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128950" comment="mariadb-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129341" comment="mariadb-bench-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128951" comment="mariadb-client-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128952" comment="mariadb-errormessages-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129342" comment="mariadb-test-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128960" comment="mariadb-tools-10.0.25-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127798" comment="mysql-community-server-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127799" comment="mysql-community-server-bench-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127800" comment="mysql-community-server-client-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127801" comment="mysql-community-server-errormessages-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127802" comment="mysql-community-server-test-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127803" comment="mysql-community-server-tools-5.6.30-16.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2052</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2052" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6, as used in Google Chrome before 48.0.2564.82, allow attackers to cause a denial of service or possibly have other impact via crafted data, as demonstrated by a buffer over-read resulting from an inverted length check in hb-ot-font.cc, a different issue than CVE-2015-8947.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2052.html">CVE-2016-2052</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 989564</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2052">SUSE bug 963436</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134096" comment="harfbuzz-1.0.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153258" comment="harfbuzz is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134097" comment="harfbuzz-devel-1.0.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153259" comment="harfbuzz-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134098" comment="harfbuzz-tools-1.0.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153260" comment="harfbuzz-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134099" comment="libharfbuzz-icu0-1.0.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153261" comment="libharfbuzz-icu0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134100" comment="libharfbuzz-icu0-32bit-1.0.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153262" comment="libharfbuzz-icu0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134101" comment="libharfbuzz0-1.0.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153263" comment="libharfbuzz0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134102" comment="libharfbuzz0-32bit-1.0.3-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153264" comment="libharfbuzz0-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2053</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2053" source="CVE"/>
    <description>
    The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2053.html">CVE-2016-2053</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 979074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 979074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 979074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 979074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 979074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 979074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 979074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 979074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 979074</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 990058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2053">SUSE bug 963762</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129149" comment="kernel-debug-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129150" comment="kernel-debug-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129151" comment="kernel-debug-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129152" comment="kernel-default-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129153" comment="kernel-default-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129154" comment="kernel-default-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129155" comment="kernel-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129156" comment="kernel-docs-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129157" comment="kernel-docs-html-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129158" comment="kernel-docs-pdf-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129159" comment="kernel-ec2-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129160" comment="kernel-ec2-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129161" comment="kernel-ec2-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129162" comment="kernel-macros-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129163" comment="kernel-obs-build-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129164" comment="kernel-obs-qa-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129165" comment="kernel-obs-qa-xen-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129166" comment="kernel-pae-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129167" comment="kernel-pae-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129168" comment="kernel-pae-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129169" comment="kernel-pv-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129170" comment="kernel-pv-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129171" comment="kernel-pv-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129172" comment="kernel-source-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129173" comment="kernel-source-vanilla-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129174" comment="kernel-syms-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129175" comment="kernel-vanilla-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129176" comment="kernel-vanilla-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129177" comment="kernel-xen-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129178" comment="kernel-xen-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129179" comment="kernel-xen-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2069</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2069" source="CVE"/>
    <description>
    Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2069.html">CVE-2016-2069</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 963767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 870618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2069">SUSE bug 870618</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126059" comment="kernel-debug-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126060" comment="kernel-debug-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126061" comment="kernel-debug-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126062" comment="kernel-default-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126063" comment="kernel-default-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126064" comment="kernel-default-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126065" comment="kernel-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126066" comment="kernel-docs-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126067" comment="kernel-docs-html-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126068" comment="kernel-docs-pdf-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126069" comment="kernel-ec2-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126070" comment="kernel-ec2-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126071" comment="kernel-ec2-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126072" comment="kernel-macros-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126073" comment="kernel-obs-build-4.1.20-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126074" comment="kernel-obs-qa-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126075" comment="kernel-obs-qa-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126076" comment="kernel-pae-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126077" comment="kernel-pae-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126078" comment="kernel-pae-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126079" comment="kernel-pv-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126080" comment="kernel-pv-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126081" comment="kernel-pv-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126082" comment="kernel-source-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126083" comment="kernel-source-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126084" comment="kernel-syms-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126085" comment="kernel-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126086" comment="kernel-vanilla-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126087" comment="kernel-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126088" comment="kernel-xen-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126089" comment="kernel-xen-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2073</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2073" source="CVE"/>
    <description>
    The htmlParseNameComplex function in HTMLparser.c in libxml2 allows attackers to cause a denial of service (out-of-bounds read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2073.html">CVE-2016-2073</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2073">SUSE bug 963963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2073">SUSE bug 963963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2073">SUSE bug 963963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2073">SUSE bug 963963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2073">SUSE bug 963963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2073">SUSE bug 963963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2073">SUSE bug 963963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2073">SUSE bug 963963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2073">SUSE bug 963963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2073">SUSE bug 963963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2073">SUSE bug 963963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2073">SUSE bug 963963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2073">SUSE bug 963963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2073">SUSE bug 963963</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2073">SUSE bug 963963</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128929" comment="libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128930" comment="libxml2-2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128931" comment="libxml2-2-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128932" comment="libxml2-devel-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128933" comment="libxml2-devel-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128934" comment="libxml2-doc-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128935" comment="libxml2-tools-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128936" comment="python-libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2086</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2086" source="CVE"/>
    <description>
    Node.js 0.10.x before 0.10.42, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allow remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2086.html">CVE-2016-2086</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2086">SUSE bug 966077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2086">SUSE bug 966077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2086">SUSE bug 966077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2086">SUSE bug 966076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2086">SUSE bug 966077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2086">SUSE bug 966076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2086">SUSE bug 966076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2086">SUSE bug 966077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2086">SUSE bug 966076</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123854" comment="nodejs-4.3.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123855" comment="nodejs-devel-4.3.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123857" comment="nodejs-docs-4.3.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123858" comment="npm-4.3.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2089</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2089" source="CVE"/>
    <description>
    The jas_matrix_clip function in jas_seq.c in JasPer 1.900.1 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted JPEG 2000 image.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2089.html">CVE-2016-2089</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2089">SUSE bug 963983</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2089">SUSE bug 963983</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2089">SUSE bug 963983</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2089">SUSE bug 963983</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135598" comment="jasper-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135599" comment="libjasper-devel-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135600" comment="libjasper1-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135601" comment="libjasper1-32bit-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2098</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2098" source="CVE"/>
    <description>
    Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2098.html">CVE-2016-2098</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2098">SUSE bug 968849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2098">SUSE bug 968849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2098">SUSE bug 968849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2098">SUSE bug 968849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2098">SUSE bug 968849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2098">SUSE bug 968849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2098">SUSE bug 968849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2098">SUSE bug 968849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2098">SUSE bug 968849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2098">SUSE bug 968849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2098">SUSE bug 968849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2098">SUSE bug 968849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2098">SUSE bug 968849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2098">SUSE bug 968849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2098">SUSE bug 968849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2098">SUSE bug 968849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2098">SUSE bug 993313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124852" comment="ruby2.1-rubygem-actionview-4_2-4.2.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153072" comment="ruby2.1-rubygem-actionview-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124853" comment="ruby2.1-rubygem-actionview-doc-4_2-4.2.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153073" comment="ruby2.1-rubygem-actionview-doc-4_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124854" comment="rubygem-actionview-4_2-4.2.4-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153081" comment="rubygem-actionview-4_2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2099</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2099" source="CVE"/>
    <description>
    Use-after-free vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 3.1.3 and earlier allows context-dependent attackers to have unspecified impact via an invalid character in an XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2099.html">CVE-2016-2099</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2099">SUSE bug 979208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2099">SUSE bug 979208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2099">SUSE bug 979208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2099">SUSE bug 979208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2099">SUSE bug 979208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2099">SUSE bug 979208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2099">SUSE bug 979208</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134310" comment="libxerces-c-3_1-3.1.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151260" comment="libxerces-c-3_1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134311" comment="libxerces-c-3_1-32bit-3.1.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153271" comment="libxerces-c-3_1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134312" comment="libxerces-c-devel-3.1.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153272" comment="libxerces-c-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134313" comment="xerces-c-3.1.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153273" comment="xerces-c is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2105</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105" source="CVE"/>
    <description>
    Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2105.html">CVE-2016-2105</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 978492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 989902</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 990369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 990370</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 991918</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 1025347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2105">SUSE bug 977614</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127398" comment="compat-openssl098-0.9.8j-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127252" comment="libopenssl-devel-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127253" comment="libopenssl-devel-32bit-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127399" comment="libopenssl0_9_8-0.9.8j-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127400" comment="libopenssl0_9_8-32bit-0.9.8j-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127254" comment="libopenssl1_0_0-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127255" comment="libopenssl1_0_0-32bit-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127256" comment="libopenssl1_0_0-hmac-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127257" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128870" comment="nodejs-4.4.5-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128871" comment="nodejs-devel-4.4.5-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128873" comment="nodejs-docs-4.4.5-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128874" comment="npm-4.4.5-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127258" comment="openssl-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127259" comment="openssl-doc-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2106</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2106" source="CVE"/>
    <description>
    Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2106.html">CVE-2016-2106</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 977584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 977615</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 977615</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 977615</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 977615</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 977615</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 977615</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 978492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 977615</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 977615</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 977615</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 977615</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 977615</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 977615</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 977584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 977615</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 977615</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 977615</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 977615</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 990369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 1025347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 977615</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2106">SUSE bug 977615</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127398" comment="compat-openssl098-0.9.8j-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127252" comment="libopenssl-devel-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127253" comment="libopenssl-devel-32bit-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127399" comment="libopenssl0_9_8-0.9.8j-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127400" comment="libopenssl0_9_8-32bit-0.9.8j-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127254" comment="libopenssl1_0_0-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127255" comment="libopenssl1_0_0-32bit-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127256" comment="libopenssl1_0_0-hmac-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127257" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127258" comment="openssl-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127259" comment="openssl-doc-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2107</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107" source="CVE"/>
    <description>
    The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2107.html">CVE-2016-2107</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2107">SUSE bug 977584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2107">SUSE bug 977616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2107">SUSE bug 977616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2107">SUSE bug 977616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2107">SUSE bug 977616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2107">SUSE bug 977616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2107">SUSE bug 977616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2107">SUSE bug 978492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2107">SUSE bug 977616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2107">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2107">SUSE bug 977584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2107">SUSE bug 977616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2107">SUSE bug 977616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2107">SUSE bug 977616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2107">SUSE bug 977616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2107">SUSE bug 977616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2107">SUSE bug 977616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2107">SUSE bug 990369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2107">SUSE bug 990370</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127252" comment="libopenssl-devel-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127253" comment="libopenssl-devel-32bit-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127254" comment="libopenssl1_0_0-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127255" comment="libopenssl1_0_0-32bit-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127256" comment="libopenssl1_0_0-hmac-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127257" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128870" comment="nodejs-4.4.5-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128871" comment="nodejs-devel-4.4.5-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128873" comment="nodejs-docs-4.4.5-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128874" comment="npm-4.4.5-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127258" comment="openssl-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127259" comment="openssl-doc-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2108</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2108" source="CVE"/>
    <description>
    The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2108.html">CVE-2016-2108</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 978492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 989345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 989345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 996067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 996067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 996067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 996067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 996067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 996067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 996067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1001502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1001502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1001502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1001502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1001502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1001502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1001502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1001502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1001502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1001502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1001502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1001502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1001502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1025347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1025347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 977617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1001502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1001502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1001502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1001502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1001502</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1004499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2108">SUSE bug 1001502</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127398" comment="compat-openssl098-0.9.8j-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148476" comment="libopenssl-devel-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148477" comment="libopenssl-devel-32bit-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127399" comment="libopenssl0_9_8-0.9.8j-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127400" comment="libopenssl0_9_8-32bit-0.9.8j-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148478" comment="libopenssl1_0_0-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148479" comment="libopenssl1_0_0-32bit-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148480" comment="libopenssl1_0_0-hmac-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148481" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148482" comment="openssl-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148483" comment="openssl-doc-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2109</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2109" source="CVE"/>
    <description>
    The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2109.html">CVE-2016-2109</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 977584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 978492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 977584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 977584</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 990369</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 976942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 1015243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2109">SUSE bug 1025347</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127398" comment="compat-openssl098-0.9.8j-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127252" comment="libopenssl-devel-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127253" comment="libopenssl-devel-32bit-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127399" comment="libopenssl0_9_8-0.9.8j-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127400" comment="libopenssl0_9_8-32bit-0.9.8j-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127254" comment="libopenssl1_0_0-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127255" comment="libopenssl1_0_0-32bit-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127256" comment="libopenssl1_0_0-hmac-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127257" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127258" comment="openssl-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127259" comment="openssl-doc-1.0.1i-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2110</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110" source="CVE"/>
    <description>
    The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2110.html">CVE-2016-2110</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 1009711</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 1009711</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 1009711</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2110">SUSE bug 973036</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126118" comment="ctdb-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126119" comment="ctdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152997" comment="ctdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126120" comment="ctdb-tests-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126121" comment="libdcerpc-atsvc-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152724" comment="libdcerpc-atsvc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126122" comment="libdcerpc-atsvc0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152725" comment="libdcerpc-atsvc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126123" comment="libdcerpc-atsvc0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152726" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126124" comment="libdcerpc-binding0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126125" comment="libdcerpc-binding0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126126" comment="libdcerpc-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126127" comment="libdcerpc-samr-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126128" comment="libdcerpc-samr0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126129" comment="libdcerpc-samr0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126130" comment="libdcerpc0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126131" comment="libdcerpc0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126132" comment="libgensec-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152731" comment="libgensec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126133" comment="libgensec0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126134" comment="libgensec0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126135" comment="libndr-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126136" comment="libndr-krb5pac-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126137" comment="libndr-krb5pac0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126138" comment="libndr-krb5pac0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126139" comment="libndr-nbt-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126140" comment="libndr-nbt0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126141" comment="libndr-nbt0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126142" comment="libndr-standard-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126143" comment="libndr-standard0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126144" comment="libndr-standard0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126145" comment="libndr0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126146" comment="libndr0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126147" comment="libnetapi-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126148" comment="libnetapi0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126149" comment="libnetapi0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126150" comment="libregistry-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152740" comment="libregistry-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126151" comment="libregistry0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126152" comment="libregistry0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152741" comment="libregistry0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126153" comment="libsamba-credentials-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126154" comment="libsamba-credentials0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126155" comment="libsamba-credentials0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126156" comment="libsamba-hostconfig-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126157" comment="libsamba-hostconfig0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126158" comment="libsamba-hostconfig0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126159" comment="libsamba-passdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126160" comment="libsamba-passdb0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126161" comment="libsamba-passdb0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126162" comment="libsamba-policy-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126163" comment="libsamba-policy0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126164" comment="libsamba-policy0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126165" comment="libsamba-util-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126166" comment="libsamba-util0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126167" comment="libsamba-util0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126168" comment="libsamdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126169" comment="libsamdb0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126170" comment="libsamdb0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126171" comment="libsmbclient-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126172" comment="libsmbclient-raw-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152750" comment="libsmbclient-raw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126173" comment="libsmbclient-raw0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126174" comment="libsmbclient-raw0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126175" comment="libsmbclient0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126176" comment="libsmbclient0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126177" comment="libsmbconf-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126178" comment="libsmbconf0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126179" comment="libsmbconf0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126180" comment="libsmbldap-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126181" comment="libsmbldap0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126182" comment="libsmbldap0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126183" comment="libtevent-util-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126184" comment="libtevent-util0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126185" comment="libtevent-util0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126186" comment="libwbclient-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126187" comment="libwbclient0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126188" comment="libwbclient0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126189" comment="samba-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126190" comment="samba-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126191" comment="samba-client-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126192" comment="samba-client-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126193" comment="samba-core-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126194" comment="samba-doc-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126195" comment="samba-libs-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126196" comment="samba-libs-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126197" comment="samba-pidl-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126198" comment="samba-python-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126199" comment="samba-test-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126200" comment="samba-test-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152779" comment="samba-test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126201" comment="samba-winbind-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126202" comment="samba-winbind-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2111</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111" source="CVE"/>
    <description>
    The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2, when a domain controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, a related issue to CVE-2015-0005.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2111.html">CVE-2016-2111</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 973032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 973032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 973032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 973032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 973032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 973032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 973032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 973032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 973032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 973032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 973032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 973032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 973032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 973032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 973032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 973032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 973032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 973032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 973032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2111">SUSE bug 973032</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126118" comment="ctdb-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126119" comment="ctdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152997" comment="ctdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126120" comment="ctdb-tests-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126121" comment="libdcerpc-atsvc-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152724" comment="libdcerpc-atsvc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126122" comment="libdcerpc-atsvc0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152725" comment="libdcerpc-atsvc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126123" comment="libdcerpc-atsvc0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152726" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126124" comment="libdcerpc-binding0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126125" comment="libdcerpc-binding0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126126" comment="libdcerpc-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126127" comment="libdcerpc-samr-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126128" comment="libdcerpc-samr0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126129" comment="libdcerpc-samr0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126130" comment="libdcerpc0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126131" comment="libdcerpc0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126132" comment="libgensec-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152731" comment="libgensec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126133" comment="libgensec0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126134" comment="libgensec0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126135" comment="libndr-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126136" comment="libndr-krb5pac-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126137" comment="libndr-krb5pac0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126138" comment="libndr-krb5pac0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126139" comment="libndr-nbt-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126140" comment="libndr-nbt0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126141" comment="libndr-nbt0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126142" comment="libndr-standard-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126143" comment="libndr-standard0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126144" comment="libndr-standard0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126145" comment="libndr0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126146" comment="libndr0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126147" comment="libnetapi-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126148" comment="libnetapi0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126149" comment="libnetapi0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126150" comment="libregistry-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152740" comment="libregistry-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126151" comment="libregistry0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126152" comment="libregistry0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152741" comment="libregistry0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126153" comment="libsamba-credentials-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126154" comment="libsamba-credentials0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126155" comment="libsamba-credentials0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126156" comment="libsamba-hostconfig-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126157" comment="libsamba-hostconfig0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126158" comment="libsamba-hostconfig0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126159" comment="libsamba-passdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126160" comment="libsamba-passdb0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126161" comment="libsamba-passdb0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126162" comment="libsamba-policy-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126163" comment="libsamba-policy0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126164" comment="libsamba-policy0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126165" comment="libsamba-util-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126166" comment="libsamba-util0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126167" comment="libsamba-util0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126168" comment="libsamdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126169" comment="libsamdb0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126170" comment="libsamdb0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126171" comment="libsmbclient-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126172" comment="libsmbclient-raw-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152750" comment="libsmbclient-raw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126173" comment="libsmbclient-raw0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126174" comment="libsmbclient-raw0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126175" comment="libsmbclient0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126176" comment="libsmbclient0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126177" comment="libsmbconf-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126178" comment="libsmbconf0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126179" comment="libsmbconf0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126180" comment="libsmbldap-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126181" comment="libsmbldap0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126182" comment="libsmbldap0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126183" comment="libtevent-util-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126184" comment="libtevent-util0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126185" comment="libtevent-util0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126186" comment="libwbclient-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126187" comment="libwbclient0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126188" comment="libwbclient0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126189" comment="samba-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126190" comment="samba-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126191" comment="samba-client-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126192" comment="samba-client-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126193" comment="samba-core-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126194" comment="samba-doc-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126195" comment="samba-libs-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126196" comment="samba-libs-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126197" comment="samba-pidl-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126198" comment="samba-python-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126199" comment="samba-test-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126200" comment="samba-test-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152779" comment="samba-test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126201" comment="samba-winbind-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126202" comment="samba-winbind-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2112</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112" source="CVE"/>
    <description>
    The bundled LDAP client library in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "client ldap sasl wrapping" setting, which allows man-in-the-middle attackers to perform LDAP protocol-downgrade attacks by modifying the client-server data stream.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2112.html">CVE-2016-2112</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2112">SUSE bug 973033</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126118" comment="ctdb-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126119" comment="ctdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152997" comment="ctdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126120" comment="ctdb-tests-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126121" comment="libdcerpc-atsvc-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152724" comment="libdcerpc-atsvc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126122" comment="libdcerpc-atsvc0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152725" comment="libdcerpc-atsvc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126123" comment="libdcerpc-atsvc0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152726" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126124" comment="libdcerpc-binding0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126125" comment="libdcerpc-binding0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126126" comment="libdcerpc-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126127" comment="libdcerpc-samr-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126128" comment="libdcerpc-samr0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126129" comment="libdcerpc-samr0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126130" comment="libdcerpc0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126131" comment="libdcerpc0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126132" comment="libgensec-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152731" comment="libgensec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126133" comment="libgensec0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126134" comment="libgensec0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126135" comment="libndr-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126136" comment="libndr-krb5pac-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126137" comment="libndr-krb5pac0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126138" comment="libndr-krb5pac0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126139" comment="libndr-nbt-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126140" comment="libndr-nbt0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126141" comment="libndr-nbt0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126142" comment="libndr-standard-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126143" comment="libndr-standard0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126144" comment="libndr-standard0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126145" comment="libndr0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126146" comment="libndr0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126147" comment="libnetapi-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126148" comment="libnetapi0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126149" comment="libnetapi0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126150" comment="libregistry-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152740" comment="libregistry-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126151" comment="libregistry0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126152" comment="libregistry0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152741" comment="libregistry0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126153" comment="libsamba-credentials-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126154" comment="libsamba-credentials0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126155" comment="libsamba-credentials0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126156" comment="libsamba-hostconfig-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126157" comment="libsamba-hostconfig0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126158" comment="libsamba-hostconfig0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126159" comment="libsamba-passdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126160" comment="libsamba-passdb0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126161" comment="libsamba-passdb0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126162" comment="libsamba-policy-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126163" comment="libsamba-policy0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126164" comment="libsamba-policy0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126165" comment="libsamba-util-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126166" comment="libsamba-util0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126167" comment="libsamba-util0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126168" comment="libsamdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126169" comment="libsamdb0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126170" comment="libsamdb0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126171" comment="libsmbclient-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126172" comment="libsmbclient-raw-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152750" comment="libsmbclient-raw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126173" comment="libsmbclient-raw0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126174" comment="libsmbclient-raw0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126175" comment="libsmbclient0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126176" comment="libsmbclient0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126177" comment="libsmbconf-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126178" comment="libsmbconf0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126179" comment="libsmbconf0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126180" comment="libsmbldap-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126181" comment="libsmbldap0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126182" comment="libsmbldap0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126183" comment="libtevent-util-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126184" comment="libtevent-util0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126185" comment="libtevent-util0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126186" comment="libwbclient-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126187" comment="libwbclient0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126188" comment="libwbclient0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126189" comment="samba-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126190" comment="samba-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126191" comment="samba-client-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126192" comment="samba-client-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126193" comment="samba-core-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126194" comment="samba-doc-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126195" comment="samba-libs-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126196" comment="samba-libs-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126197" comment="samba-pidl-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126198" comment="samba-python-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126199" comment="samba-test-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126200" comment="samba-test-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152779" comment="samba-test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126201" comment="samba-winbind-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126202" comment="samba-winbind-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2113</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113" source="CVE"/>
    <description>
    Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not verify X.509 certificates from TLS servers, which allows man-in-the-middle attackers to spoof LDAPS and HTTPS servers and obtain sensitive information via a crafted certificate.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2113.html">CVE-2016-2113</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973033</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2113">SUSE bug 973033</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126118" comment="ctdb-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126119" comment="ctdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152997" comment="ctdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126120" comment="ctdb-tests-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126121" comment="libdcerpc-atsvc-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152724" comment="libdcerpc-atsvc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126122" comment="libdcerpc-atsvc0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152725" comment="libdcerpc-atsvc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126123" comment="libdcerpc-atsvc0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152726" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126124" comment="libdcerpc-binding0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126125" comment="libdcerpc-binding0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126126" comment="libdcerpc-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126127" comment="libdcerpc-samr-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126128" comment="libdcerpc-samr0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126129" comment="libdcerpc-samr0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126130" comment="libdcerpc0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126131" comment="libdcerpc0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126132" comment="libgensec-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152731" comment="libgensec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126133" comment="libgensec0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126134" comment="libgensec0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126135" comment="libndr-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126136" comment="libndr-krb5pac-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126137" comment="libndr-krb5pac0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126138" comment="libndr-krb5pac0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126139" comment="libndr-nbt-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126140" comment="libndr-nbt0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126141" comment="libndr-nbt0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126142" comment="libndr-standard-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126143" comment="libndr-standard0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126144" comment="libndr-standard0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126145" comment="libndr0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126146" comment="libndr0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126147" comment="libnetapi-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126148" comment="libnetapi0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126149" comment="libnetapi0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126150" comment="libregistry-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152740" comment="libregistry-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126151" comment="libregistry0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126152" comment="libregistry0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152741" comment="libregistry0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126153" comment="libsamba-credentials-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126154" comment="libsamba-credentials0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126155" comment="libsamba-credentials0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126156" comment="libsamba-hostconfig-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126157" comment="libsamba-hostconfig0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126158" comment="libsamba-hostconfig0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126159" comment="libsamba-passdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126160" comment="libsamba-passdb0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126161" comment="libsamba-passdb0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126162" comment="libsamba-policy-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126163" comment="libsamba-policy0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126164" comment="libsamba-policy0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126165" comment="libsamba-util-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126166" comment="libsamba-util0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126167" comment="libsamba-util0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126168" comment="libsamdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126169" comment="libsamdb0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126170" comment="libsamdb0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126171" comment="libsmbclient-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126172" comment="libsmbclient-raw-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152750" comment="libsmbclient-raw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126173" comment="libsmbclient-raw0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126174" comment="libsmbclient-raw0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126175" comment="libsmbclient0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126176" comment="libsmbclient0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126177" comment="libsmbconf-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126178" comment="libsmbconf0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126179" comment="libsmbconf0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126180" comment="libsmbldap-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126181" comment="libsmbldap0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126182" comment="libsmbldap0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126183" comment="libtevent-util-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126184" comment="libtevent-util0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126185" comment="libtevent-util0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126186" comment="libwbclient-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126187" comment="libwbclient0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126188" comment="libwbclient0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126189" comment="samba-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126190" comment="samba-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126191" comment="samba-client-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126192" comment="samba-client-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126193" comment="samba-core-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126194" comment="samba-doc-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126195" comment="samba-libs-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126196" comment="samba-libs-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126197" comment="samba-pidl-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126198" comment="samba-python-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126199" comment="samba-test-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126200" comment="samba-test-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152779" comment="samba-test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126201" comment="samba-winbind-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126202" comment="samba-winbind-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2115</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115" source="CVE"/>
    <description>
    Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not require SMB signing within a DCERPC session over ncacn_np, which allows man-in-the-middle attackers to spoof SMB clients by modifying the client-server data stream.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2115.html">CVE-2016-2115</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2115">SUSE bug 973036</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126118" comment="ctdb-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126119" comment="ctdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152997" comment="ctdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126120" comment="ctdb-tests-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126121" comment="libdcerpc-atsvc-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152724" comment="libdcerpc-atsvc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126122" comment="libdcerpc-atsvc0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152725" comment="libdcerpc-atsvc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126123" comment="libdcerpc-atsvc0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152726" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126124" comment="libdcerpc-binding0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126125" comment="libdcerpc-binding0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126126" comment="libdcerpc-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126127" comment="libdcerpc-samr-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126128" comment="libdcerpc-samr0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126129" comment="libdcerpc-samr0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126130" comment="libdcerpc0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126131" comment="libdcerpc0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126132" comment="libgensec-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152731" comment="libgensec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126133" comment="libgensec0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126134" comment="libgensec0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126135" comment="libndr-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126136" comment="libndr-krb5pac-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126137" comment="libndr-krb5pac0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126138" comment="libndr-krb5pac0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126139" comment="libndr-nbt-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126140" comment="libndr-nbt0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126141" comment="libndr-nbt0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126142" comment="libndr-standard-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126143" comment="libndr-standard0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126144" comment="libndr-standard0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126145" comment="libndr0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126146" comment="libndr0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126147" comment="libnetapi-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126148" comment="libnetapi0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126149" comment="libnetapi0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126150" comment="libregistry-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152740" comment="libregistry-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126151" comment="libregistry0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126152" comment="libregistry0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152741" comment="libregistry0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126153" comment="libsamba-credentials-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126154" comment="libsamba-credentials0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126155" comment="libsamba-credentials0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126156" comment="libsamba-hostconfig-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126157" comment="libsamba-hostconfig0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126158" comment="libsamba-hostconfig0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126159" comment="libsamba-passdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126160" comment="libsamba-passdb0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126161" comment="libsamba-passdb0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126162" comment="libsamba-policy-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126163" comment="libsamba-policy0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126164" comment="libsamba-policy0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126165" comment="libsamba-util-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126166" comment="libsamba-util0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126167" comment="libsamba-util0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126168" comment="libsamdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126169" comment="libsamdb0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126170" comment="libsamdb0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126171" comment="libsmbclient-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126172" comment="libsmbclient-raw-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152750" comment="libsmbclient-raw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126173" comment="libsmbclient-raw0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126174" comment="libsmbclient-raw0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126175" comment="libsmbclient0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126176" comment="libsmbclient0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126177" comment="libsmbconf-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126178" comment="libsmbconf0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126179" comment="libsmbconf0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126180" comment="libsmbldap-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126181" comment="libsmbldap0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126182" comment="libsmbldap0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126183" comment="libtevent-util-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126184" comment="libtevent-util0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126185" comment="libtevent-util0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126186" comment="libwbclient-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126187" comment="libwbclient0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126188" comment="libwbclient0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126189" comment="samba-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126190" comment="samba-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126191" comment="samba-client-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126192" comment="samba-client-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126193" comment="samba-core-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126194" comment="samba-doc-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126195" comment="samba-libs-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126196" comment="samba-libs-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126197" comment="samba-pidl-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126198" comment="samba-python-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126199" comment="samba-test-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126200" comment="samba-test-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152779" comment="samba-test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126201" comment="samba-winbind-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126202" comment="samba-winbind-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2116</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2116" source="CVE"/>
    <description>
    Memory leak in the jas_iccprof_createfrombuf function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2116.html">CVE-2016-2116</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2116">SUSE bug 968373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2116">SUSE bug 968373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2116">SUSE bug 968373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2116">SUSE bug 968373</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135598" comment="jasper-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135599" comment="libjasper-devel-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135600" comment="libjasper1-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135601" comment="libjasper1-32bit-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2117</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2117" source="CVE"/>
    <description>
    The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel through 4.5.2 incorrectly enables scatter/gather I/O, which allows remote attackers to obtain sensitive information from kernel memory by reading packet data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2117.html">CVE-2016-2117</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2117">SUSE bug 968697</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150436" comment="kernel-debug-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150437" comment="kernel-debug-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150438" comment="kernel-debug-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150439" comment="kernel-default-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150440" comment="kernel-default-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150441" comment="kernel-default-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150442" comment="kernel-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150443" comment="kernel-docs-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150444" comment="kernel-docs-html-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150445" comment="kernel-docs-pdf-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150446" comment="kernel-ec2-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150447" comment="kernel-ec2-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150448" comment="kernel-ec2-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150449" comment="kernel-macros-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150450" comment="kernel-obs-build-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150451" comment="kernel-obs-qa-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150452" comment="kernel-pae-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150453" comment="kernel-pae-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150454" comment="kernel-pae-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150455" comment="kernel-pv-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150456" comment="kernel-pv-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150457" comment="kernel-pv-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150458" comment="kernel-source-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150459" comment="kernel-source-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150460" comment="kernel-syms-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150461" comment="kernel-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150462" comment="kernel-vanilla-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150463" comment="kernel-xen-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150464" comment="kernel-xen-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150465" comment="kernel-xen-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2118</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118" source="CVE"/>
    <description>
    The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2118.html">CVE-2016-2118</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 971965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 971965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 971965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 971965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 971965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 971965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 971965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 971965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 971965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 971965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 971965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 971965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 971965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 971965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 971965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 971965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 975276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 971965</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2118">SUSE bug 971965</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126118" comment="ctdb-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126119" comment="ctdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152997" comment="ctdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126120" comment="ctdb-tests-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126121" comment="libdcerpc-atsvc-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152724" comment="libdcerpc-atsvc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126122" comment="libdcerpc-atsvc0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152725" comment="libdcerpc-atsvc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126123" comment="libdcerpc-atsvc0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152726" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126124" comment="libdcerpc-binding0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126125" comment="libdcerpc-binding0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126126" comment="libdcerpc-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126127" comment="libdcerpc-samr-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126128" comment="libdcerpc-samr0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126129" comment="libdcerpc-samr0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126130" comment="libdcerpc0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126131" comment="libdcerpc0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126132" comment="libgensec-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152731" comment="libgensec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126133" comment="libgensec0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126134" comment="libgensec0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126135" comment="libndr-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126136" comment="libndr-krb5pac-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126137" comment="libndr-krb5pac0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126138" comment="libndr-krb5pac0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126139" comment="libndr-nbt-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126140" comment="libndr-nbt0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126141" comment="libndr-nbt0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126142" comment="libndr-standard-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126143" comment="libndr-standard0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126144" comment="libndr-standard0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126145" comment="libndr0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126146" comment="libndr0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126147" comment="libnetapi-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126148" comment="libnetapi0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126149" comment="libnetapi0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126150" comment="libregistry-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152740" comment="libregistry-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126151" comment="libregistry0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126152" comment="libregistry0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152741" comment="libregistry0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126153" comment="libsamba-credentials-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126154" comment="libsamba-credentials0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126155" comment="libsamba-credentials0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126156" comment="libsamba-hostconfig-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126157" comment="libsamba-hostconfig0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126158" comment="libsamba-hostconfig0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126159" comment="libsamba-passdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126160" comment="libsamba-passdb0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126161" comment="libsamba-passdb0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126162" comment="libsamba-policy-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126163" comment="libsamba-policy0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126164" comment="libsamba-policy0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126165" comment="libsamba-util-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126166" comment="libsamba-util0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126167" comment="libsamba-util0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126168" comment="libsamdb-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126169" comment="libsamdb0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126170" comment="libsamdb0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126171" comment="libsmbclient-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126172" comment="libsmbclient-raw-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152750" comment="libsmbclient-raw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126173" comment="libsmbclient-raw0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126174" comment="libsmbclient-raw0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126175" comment="libsmbclient0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126176" comment="libsmbclient0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126177" comment="libsmbconf-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126178" comment="libsmbconf0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126179" comment="libsmbconf0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126180" comment="libsmbldap-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126181" comment="libsmbldap0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126182" comment="libsmbldap0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126183" comment="libtevent-util-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126184" comment="libtevent-util0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126185" comment="libtevent-util0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126186" comment="libwbclient-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126187" comment="libwbclient0-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126188" comment="libwbclient0-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126189" comment="samba-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126190" comment="samba-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126191" comment="samba-client-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126192" comment="samba-client-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126193" comment="samba-core-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126194" comment="samba-doc-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126195" comment="samba-libs-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126196" comment="samba-libs-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126197" comment="samba-pidl-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126198" comment="samba-python-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126199" comment="samba-test-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126200" comment="samba-test-devel-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152779" comment="samba-test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126201" comment="samba-winbind-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126202" comment="samba-winbind-32bit-4.2.4-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2119</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2119" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119" source="CVE"/>
    <description>
    libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before 4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle attackers to bypass a client-signing protection mechanism, and consequently spoof SMB2 and SMB3 servers, via the (1) SMB2_SESSION_FLAG_IS_GUEST or (2) SMB2_SESSION_FLAG_IS_NULL flag.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2119.html">CVE-2016-2119</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2119">SUSE bug 986869</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2119">SUSE bug 986869</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2119">SUSE bug 986869</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2119">SUSE bug 986869</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2119">SUSE bug 986869</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2119">SUSE bug 986869</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2119">SUSE bug 986869</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2119">SUSE bug 986869</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2119">SUSE bug 986869</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2119">SUSE bug 986869</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134469" comment="ctdb-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134470" comment="ctdb-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152997" comment="ctdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134471" comment="ctdb-tests-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134472" comment="libdcerpc-atsvc-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152724" comment="libdcerpc-atsvc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134473" comment="libdcerpc-atsvc0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152725" comment="libdcerpc-atsvc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134474" comment="libdcerpc-atsvc0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152726" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134475" comment="libdcerpc-binding0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134476" comment="libdcerpc-binding0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134477" comment="libdcerpc-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134478" comment="libdcerpc-samr-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134479" comment="libdcerpc-samr0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134480" comment="libdcerpc-samr0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134481" comment="libdcerpc0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134482" comment="libdcerpc0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134483" comment="libgensec-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152731" comment="libgensec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134484" comment="libgensec0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134485" comment="libgensec0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134486" comment="libndr-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134487" comment="libndr-krb5pac-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134488" comment="libndr-krb5pac0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134489" comment="libndr-krb5pac0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134490" comment="libndr-nbt-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134491" comment="libndr-nbt0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134492" comment="libndr-nbt0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134493" comment="libndr-standard-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134494" comment="libndr-standard0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134495" comment="libndr-standard0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134496" comment="libndr0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134497" comment="libndr0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134498" comment="libnetapi-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134499" comment="libnetapi0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134500" comment="libnetapi0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134501" comment="libregistry-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152740" comment="libregistry-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134502" comment="libregistry0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134503" comment="libregistry0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152741" comment="libregistry0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134504" comment="libsamba-credentials-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134505" comment="libsamba-credentials0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134506" comment="libsamba-credentials0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134507" comment="libsamba-hostconfig-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134508" comment="libsamba-hostconfig0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134509" comment="libsamba-hostconfig0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134510" comment="libsamba-passdb-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134511" comment="libsamba-passdb0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134512" comment="libsamba-passdb0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134513" comment="libsamba-policy-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134514" comment="libsamba-policy0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134515" comment="libsamba-policy0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134516" comment="libsamba-util-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134517" comment="libsamba-util0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134518" comment="libsamba-util0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134519" comment="libsamdb-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134520" comment="libsamdb0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134521" comment="libsamdb0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134522" comment="libsmbclient-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134523" comment="libsmbclient-raw-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152750" comment="libsmbclient-raw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134524" comment="libsmbclient-raw0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134525" comment="libsmbclient-raw0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134526" comment="libsmbclient0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134527" comment="libsmbclient0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134528" comment="libsmbconf-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134529" comment="libsmbconf0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134530" comment="libsmbconf0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134531" comment="libsmbldap-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134532" comment="libsmbldap0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134533" comment="libsmbldap0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134534" comment="libtevent-util-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134535" comment="libtevent-util0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134536" comment="libtevent-util0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134537" comment="libwbclient-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134538" comment="libwbclient0-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134539" comment="libwbclient0-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134540" comment="samba-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134541" comment="samba-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134542" comment="samba-client-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134543" comment="samba-client-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134544" comment="samba-core-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134545" comment="samba-doc-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134546" comment="samba-libs-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134547" comment="samba-libs-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134548" comment="samba-pidl-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134549" comment="samba-python-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134550" comment="samba-test-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134551" comment="samba-test-devel-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152779" comment="samba-test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134552" comment="samba-winbind-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134553" comment="samba-winbind-32bit-4.2.4-21.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2120</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2120" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2120.html">CVE-2016-2120</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2120">SUSE bug 1018329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2120">SUSE bug 1018329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2120">SUSE bug 1018329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2120">SUSE bug 1018329</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2120">SUSE bug 1018329</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147299" comment="pdns-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152980" comment="pdns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147300" comment="pdns-backend-ldap-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152981" comment="pdns-backend-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147301" comment="pdns-backend-lua-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152982" comment="pdns-backend-lua is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147302" comment="pdns-backend-mydns-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152983" comment="pdns-backend-mydns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147303" comment="pdns-backend-mysql-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152984" comment="pdns-backend-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147304" comment="pdns-backend-postgresql-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152985" comment="pdns-backend-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147305" comment="pdns-backend-sqlite3-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152986" comment="pdns-backend-sqlite3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2123</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2123" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2123.html">CVE-2016-2123</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2123">SUSE bug 1014437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2123">SUSE bug 1014437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2123">SUSE bug 1014437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2123">SUSE bug 1014437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2123">SUSE bug 1014437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2123">SUSE bug 1014437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2123">SUSE bug 1014437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2123">SUSE bug 1014437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2123">SUSE bug 1014437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2123">SUSE bug 1014437</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146320" comment="ctdb-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146321" comment="ctdb-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152997" comment="ctdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146322" comment="ctdb-tests-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146323" comment="libdcerpc-atsvc-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152724" comment="libdcerpc-atsvc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146324" comment="libdcerpc-atsvc0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152725" comment="libdcerpc-atsvc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146325" comment="libdcerpc-atsvc0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152726" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146326" comment="libdcerpc-binding0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146327" comment="libdcerpc-binding0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146328" comment="libdcerpc-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146329" comment="libdcerpc-samr-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146330" comment="libdcerpc-samr0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146331" comment="libdcerpc-samr0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146332" comment="libdcerpc0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146333" comment="libdcerpc0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146334" comment="libgensec-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152731" comment="libgensec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146335" comment="libgensec0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146336" comment="libgensec0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146337" comment="libndr-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146338" comment="libndr-krb5pac-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146339" comment="libndr-krb5pac0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146340" comment="libndr-krb5pac0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146341" comment="libndr-nbt-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146342" comment="libndr-nbt0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146343" comment="libndr-nbt0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146344" comment="libndr-standard-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146345" comment="libndr-standard0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146346" comment="libndr-standard0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146347" comment="libndr0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146348" comment="libndr0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146349" comment="libnetapi-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146350" comment="libnetapi0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146351" comment="libnetapi0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146352" comment="libregistry-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152740" comment="libregistry-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146353" comment="libregistry0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146354" comment="libregistry0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152741" comment="libregistry0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146355" comment="libsamba-credentials-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146356" comment="libsamba-credentials0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146357" comment="libsamba-credentials0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146358" comment="libsamba-hostconfig-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146359" comment="libsamba-hostconfig0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146360" comment="libsamba-hostconfig0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146361" comment="libsamba-passdb-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146362" comment="libsamba-passdb0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146363" comment="libsamba-passdb0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146364" comment="libsamba-policy-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146365" comment="libsamba-policy0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146366" comment="libsamba-policy0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146367" comment="libsamba-util-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146368" comment="libsamba-util0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146369" comment="libsamba-util0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146370" comment="libsamdb-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146371" comment="libsamdb0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146372" comment="libsamdb0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146373" comment="libsmbclient-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146374" comment="libsmbclient-raw-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152750" comment="libsmbclient-raw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146375" comment="libsmbclient-raw0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146376" comment="libsmbclient-raw0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146377" comment="libsmbclient0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146378" comment="libsmbclient0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146379" comment="libsmbconf-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146380" comment="libsmbconf0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146381" comment="libsmbconf0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146382" comment="libsmbldap-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146383" comment="libsmbldap0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146384" comment="libsmbldap0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146385" comment="libtevent-util-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146386" comment="libtevent-util0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146387" comment="libtevent-util0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146388" comment="libwbclient-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146389" comment="libwbclient0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146390" comment="libwbclient0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146391" comment="samba-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146392" comment="samba-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146393" comment="samba-client-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146394" comment="samba-client-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146395" comment="samba-core-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146396" comment="samba-doc-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146397" comment="samba-libs-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146398" comment="samba-libs-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146399" comment="samba-pidl-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146400" comment="samba-python-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146401" comment="samba-test-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146402" comment="samba-test-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152779" comment="samba-test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146403" comment="samba-winbind-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146404" comment="samba-winbind-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2125</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2125.html">CVE-2016-2125</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2125">SUSE bug 1014441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2125">SUSE bug 1014441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2125">SUSE bug 1014441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2125">SUSE bug 1014441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2125">SUSE bug 1014441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2125">SUSE bug 1014441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2125">SUSE bug 1014441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2125">SUSE bug 1014441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2125">SUSE bug 1014441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2125">SUSE bug 1014441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2125">SUSE bug 1014441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2125">SUSE bug 1014441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2125">SUSE bug 1014441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2125">SUSE bug 1014441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2125">SUSE bug 1014441</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146320" comment="ctdb-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146321" comment="ctdb-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152997" comment="ctdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146322" comment="ctdb-tests-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146323" comment="libdcerpc-atsvc-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152724" comment="libdcerpc-atsvc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146324" comment="libdcerpc-atsvc0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152725" comment="libdcerpc-atsvc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146325" comment="libdcerpc-atsvc0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152726" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146326" comment="libdcerpc-binding0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146327" comment="libdcerpc-binding0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146328" comment="libdcerpc-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146329" comment="libdcerpc-samr-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146330" comment="libdcerpc-samr0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146331" comment="libdcerpc-samr0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146332" comment="libdcerpc0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146333" comment="libdcerpc0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146334" comment="libgensec-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152731" comment="libgensec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146335" comment="libgensec0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146336" comment="libgensec0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146337" comment="libndr-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146338" comment="libndr-krb5pac-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146339" comment="libndr-krb5pac0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146340" comment="libndr-krb5pac0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146341" comment="libndr-nbt-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146342" comment="libndr-nbt0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146343" comment="libndr-nbt0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146344" comment="libndr-standard-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146345" comment="libndr-standard0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146346" comment="libndr-standard0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146347" comment="libndr0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146348" comment="libndr0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146349" comment="libnetapi-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146350" comment="libnetapi0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146351" comment="libnetapi0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146352" comment="libregistry-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152740" comment="libregistry-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146353" comment="libregistry0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146354" comment="libregistry0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152741" comment="libregistry0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146355" comment="libsamba-credentials-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146356" comment="libsamba-credentials0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146357" comment="libsamba-credentials0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146358" comment="libsamba-hostconfig-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146359" comment="libsamba-hostconfig0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146360" comment="libsamba-hostconfig0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146361" comment="libsamba-passdb-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146362" comment="libsamba-passdb0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146363" comment="libsamba-passdb0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146364" comment="libsamba-policy-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146365" comment="libsamba-policy0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146366" comment="libsamba-policy0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146367" comment="libsamba-util-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146368" comment="libsamba-util0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146369" comment="libsamba-util0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146370" comment="libsamdb-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146371" comment="libsamdb0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146372" comment="libsamdb0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146373" comment="libsmbclient-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146374" comment="libsmbclient-raw-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152750" comment="libsmbclient-raw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146375" comment="libsmbclient-raw0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146376" comment="libsmbclient-raw0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146377" comment="libsmbclient0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146378" comment="libsmbclient0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146379" comment="libsmbconf-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146380" comment="libsmbconf0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146381" comment="libsmbconf0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146382" comment="libsmbldap-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146383" comment="libsmbldap0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146384" comment="libsmbldap0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146385" comment="libtevent-util-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146386" comment="libtevent-util0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146387" comment="libtevent-util0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146388" comment="libwbclient-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146389" comment="libwbclient0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146390" comment="libwbclient0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146391" comment="samba-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146392" comment="samba-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146393" comment="samba-client-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146394" comment="samba-client-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146395" comment="samba-core-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146396" comment="samba-doc-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146397" comment="samba-libs-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146398" comment="samba-libs-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146399" comment="samba-pidl-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146400" comment="samba-python-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146401" comment="samba-test-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146402" comment="samba-test-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152779" comment="samba-test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146403" comment="samba-winbind-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146404" comment="samba-winbind-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2126</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126" source="CVE"/>
    <description>
    Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2126.html">CVE-2016-2126</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2126">SUSE bug 1014442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2126">SUSE bug 1014442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2126">SUSE bug 1014442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2126">SUSE bug 1014442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2126">SUSE bug 1014442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2126">SUSE bug 1014442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2126">SUSE bug 1014442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2126">SUSE bug 1014442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2126">SUSE bug 1014442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2126">SUSE bug 1014442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2126">SUSE bug 1014442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2126">SUSE bug 1014442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2126">SUSE bug 1014442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2126">SUSE bug 1014442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2126">SUSE bug 1014442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2126">SUSE bug 1014442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2126">SUSE bug 1014442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2126">SUSE bug 1014442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2126">SUSE bug 1014442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2126">SUSE bug 1014442</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146320" comment="ctdb-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146321" comment="ctdb-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152997" comment="ctdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146322" comment="ctdb-tests-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146323" comment="libdcerpc-atsvc-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152724" comment="libdcerpc-atsvc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146324" comment="libdcerpc-atsvc0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152725" comment="libdcerpc-atsvc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146325" comment="libdcerpc-atsvc0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152726" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146326" comment="libdcerpc-binding0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146327" comment="libdcerpc-binding0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146328" comment="libdcerpc-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146329" comment="libdcerpc-samr-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146330" comment="libdcerpc-samr0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146331" comment="libdcerpc-samr0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146332" comment="libdcerpc0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146333" comment="libdcerpc0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146334" comment="libgensec-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152731" comment="libgensec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146335" comment="libgensec0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146336" comment="libgensec0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146337" comment="libndr-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146338" comment="libndr-krb5pac-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146339" comment="libndr-krb5pac0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146340" comment="libndr-krb5pac0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146341" comment="libndr-nbt-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146342" comment="libndr-nbt0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146343" comment="libndr-nbt0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146344" comment="libndr-standard-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146345" comment="libndr-standard0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146346" comment="libndr-standard0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146347" comment="libndr0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146348" comment="libndr0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146349" comment="libnetapi-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146350" comment="libnetapi0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146351" comment="libnetapi0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146352" comment="libregistry-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152740" comment="libregistry-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146353" comment="libregistry0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146354" comment="libregistry0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152741" comment="libregistry0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146355" comment="libsamba-credentials-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146356" comment="libsamba-credentials0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146357" comment="libsamba-credentials0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146358" comment="libsamba-hostconfig-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146359" comment="libsamba-hostconfig0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146360" comment="libsamba-hostconfig0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146361" comment="libsamba-passdb-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146362" comment="libsamba-passdb0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146363" comment="libsamba-passdb0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146364" comment="libsamba-policy-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146365" comment="libsamba-policy0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146366" comment="libsamba-policy0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146367" comment="libsamba-util-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146368" comment="libsamba-util0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146369" comment="libsamba-util0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146370" comment="libsamdb-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146371" comment="libsamdb0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146372" comment="libsamdb0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146373" comment="libsmbclient-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146374" comment="libsmbclient-raw-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152750" comment="libsmbclient-raw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146375" comment="libsmbclient-raw0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146376" comment="libsmbclient-raw0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146377" comment="libsmbclient0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146378" comment="libsmbclient0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146379" comment="libsmbconf-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146380" comment="libsmbconf0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146381" comment="libsmbconf0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146382" comment="libsmbldap-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146383" comment="libsmbldap0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146384" comment="libsmbldap0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146385" comment="libtevent-util-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146386" comment="libtevent-util0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146387" comment="libtevent-util0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146388" comment="libwbclient-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146389" comment="libwbclient0-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146390" comment="libwbclient0-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146391" comment="samba-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146392" comment="samba-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146393" comment="samba-client-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146394" comment="samba-client-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146395" comment="samba-core-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146396" comment="samba-doc-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146397" comment="samba-libs-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146398" comment="samba-libs-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146399" comment="samba-pidl-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146400" comment="samba-python-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146401" comment="samba-test-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146402" comment="samba-test-devel-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152779" comment="samba-test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146403" comment="samba-winbind-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146404" comment="samba-winbind-32bit-4.2.4-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2150</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2150" source="CVE"/>
    <description>
    SPICE allows local guest OS users to read from or write to arbitrary host memory locations via crafted primary surface parameters, a similar issue to CVE-2015-5261.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2150.html">CVE-2016-2150</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2150">SUSE bug 982385</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2150">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2150">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2150">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2150">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2150">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2150">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2150">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2150">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2150">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2150">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2150">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2150">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2150">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2150">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2150">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2150">SUSE bug 982386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2150">SUSE bug 982386</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129718" comment="libspice-server-devel-0.12.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153281" comment="libspice-server-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129719" comment="libspice-server1-0.12.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151923" comment="libspice-server1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129720" comment="spice-0.12.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153282" comment="spice is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129721" comment="spice-client-0.12.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153283" comment="spice-client is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2161</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161" source="CVE"/>
    <description>
    In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2161.html">CVE-2016-2161</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1016714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1016714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1016714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1016714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1016714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1016714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1016714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1016714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1016714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1016714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1016714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1016714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1016714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1016714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1033513</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1016714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1016714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1016714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1016714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1016714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2161">SUSE bug 1016714</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150390" comment="apache2-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150391" comment="apache2-devel-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150392" comment="apache2-doc-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150393" comment="apache2-event-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150394" comment="apache2-example-pages-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150395" comment="apache2-prefork-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150396" comment="apache2-utils-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150397" comment="apache2-worker-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2167</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2167" source="CVE"/>
    <description>
    The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2167.html">CVE-2016-2167</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2167">SUSE bug 976849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2167">SUSE bug 976849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2167">SUSE bug 976849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2167">SUSE bug 976849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2167">SUSE bug 976849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2167">SUSE bug 976849</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2167">SUSE bug 976849</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127320" comment="libsvn_auth_gnome_keyring-1-0-1.8.10-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152695" comment="libsvn_auth_gnome_keyring-1-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127321" comment="libsvn_auth_kwallet-1-0-1.8.10-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152696" comment="libsvn_auth_kwallet-1-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127322" comment="subversion-1.8.10-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127323" comment="subversion-bash-completion-1.8.10-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152697" comment="subversion-bash-completion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127324" comment="subversion-devel-1.8.10-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127325" comment="subversion-perl-1.8.10-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127326" comment="subversion-python-1.8.10-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127327" comment="subversion-ruby-1.8.10-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152698" comment="subversion-ruby is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127328" comment="subversion-server-1.8.10-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127329" comment="subversion-tools-1.8.10-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2168</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2168" source="CVE"/>
    <description>
    The req_check_access function in the mod_authz_svn module in the httpd server in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a crafted header in a (1) MOVE or (2) COPY request, involving an authorization check.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2168.html">CVE-2016-2168</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2168">SUSE bug 976850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2168">SUSE bug 976850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2168">SUSE bug 976850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2168">SUSE bug 976850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2168">SUSE bug 976850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2168">SUSE bug 976850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2168">SUSE bug 976850</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127320" comment="libsvn_auth_gnome_keyring-1-0-1.8.10-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152695" comment="libsvn_auth_gnome_keyring-1-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127321" comment="libsvn_auth_kwallet-1-0-1.8.10-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152696" comment="libsvn_auth_kwallet-1-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127322" comment="subversion-1.8.10-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127323" comment="subversion-bash-completion-1.8.10-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152697" comment="subversion-bash-completion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127324" comment="subversion-devel-1.8.10-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127325" comment="subversion-perl-1.8.10-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127326" comment="subversion-python-1.8.10-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127327" comment="subversion-ruby-1.8.10-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152698" comment="subversion-ruby is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127328" comment="subversion-server-1.8.10-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127329" comment="subversion-tools-1.8.10-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2177</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177" source="CVE"/>
    <description>
    OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2177.html">CVE-2016-2177</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 999075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 999075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 999075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 999075</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2177">SUSE bug 982575</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134771" comment="compat-openssl098-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134613" comment="libopenssl-devel-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134614" comment="libopenssl-devel-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134772" comment="libopenssl0_9_8-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134773" comment="libopenssl0_9_8-32bit-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134615" comment="libopenssl1_0_0-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134616" comment="libopenssl1_0_0-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134617" comment="libopenssl1_0_0-hmac-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134618" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134619" comment="openssl-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134620" comment="openssl-doc-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2178</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178" source="CVE"/>
    <description>
    The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2178.html">CVE-2016-2178</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983519</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2178">SUSE bug 983249</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134771" comment="compat-openssl098-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134613" comment="libopenssl-devel-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134614" comment="libopenssl-devel-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134772" comment="libopenssl0_9_8-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134773" comment="libopenssl0_9_8-32bit-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134615" comment="libopenssl1_0_0-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134616" comment="libopenssl1_0_0-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134617" comment="libopenssl1_0_0-hmac-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134618" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133731" comment="nodejs-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133732" comment="nodejs-devel-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133734" comment="nodejs-docs-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133735" comment="npm-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134619" comment="openssl-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134620" comment="openssl-doc-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2179</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179" source="CVE"/>
    <description>
    The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2179.html">CVE-2016-2179</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2179">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2179">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2179">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2179">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2179">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2179">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2179">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2179">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2179">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2179">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2179">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2179">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2179">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2179">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2179">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2179">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2179">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2179">SUSE bug 994844</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134771" comment="compat-openssl098-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134613" comment="libopenssl-devel-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134614" comment="libopenssl-devel-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134772" comment="libopenssl0_9_8-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134773" comment="libopenssl0_9_8-32bit-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134615" comment="libopenssl1_0_0-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134616" comment="libopenssl1_0_0-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134617" comment="libopenssl1_0_0-hmac-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134618" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134619" comment="openssl-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134620" comment="openssl-doc-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2180</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180" source="CVE"/>
    <description>
    The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the "openssl ts" command.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2180.html">CVE-2016-2180</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2180">SUSE bug 990419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2180">SUSE bug 990419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2180">SUSE bug 990419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2180">SUSE bug 990419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2180">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2180">SUSE bug 990419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2180">SUSE bug 990419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2180">SUSE bug 990419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2180">SUSE bug 990419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2180">SUSE bug 990419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2180">SUSE bug 990419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2180">SUSE bug 990419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2180">SUSE bug 990419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2180">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2180">SUSE bug 1003811</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2180">SUSE bug 990419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2180">SUSE bug 990419</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134613" comment="libopenssl-devel-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134614" comment="libopenssl-devel-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134615" comment="libopenssl1_0_0-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134616" comment="libopenssl1_0_0-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134617" comment="libopenssl1_0_0-hmac-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134618" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134619" comment="openssl-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134620" comment="openssl-doc-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2181</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181" source="CVE"/>
    <description>
    The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2181.html">CVE-2016-2181</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2181">SUSE bug 994749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2181">SUSE bug 994749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2181">SUSE bug 994749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2181">SUSE bug 994749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2181">SUSE bug 994749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2181">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2181">SUSE bug 994749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2181">SUSE bug 994749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2181">SUSE bug 994749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2181">SUSE bug 994749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2181">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2181">SUSE bug 994749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2181">SUSE bug 994749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2181">SUSE bug 994749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2181">SUSE bug 994749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2181">SUSE bug 994749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2181">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2181">SUSE bug 994749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2181">SUSE bug 994749</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2181">SUSE bug 994749</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134771" comment="compat-openssl098-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134613" comment="libopenssl-devel-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134614" comment="libopenssl-devel-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134772" comment="libopenssl0_9_8-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134773" comment="libopenssl0_9_8-32bit-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134615" comment="libopenssl1_0_0-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134616" comment="libopenssl1_0_0-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134617" comment="libopenssl1_0_0-hmac-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134618" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134619" comment="openssl-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134620" comment="openssl-doc-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2182</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182" source="CVE"/>
    <description>
    The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2182.html">CVE-2016-2182</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 995959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2182">SUSE bug 993819</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134771" comment="compat-openssl098-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134613" comment="libopenssl-devel-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134614" comment="libopenssl-devel-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134772" comment="libopenssl0_9_8-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134773" comment="libopenssl0_9_8-32bit-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134615" comment="libopenssl1_0_0-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134616" comment="libopenssl1_0_0-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134617" comment="libopenssl1_0_0-hmac-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134618" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134619" comment="openssl-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134620" comment="openssl-doc-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2183</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183" source="CVE"/>
    <description>
    The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2183.html">CVE-2016-2183</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1020747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1024218</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1034689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1027038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 1001912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2183">SUSE bug 995359</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134771" comment="compat-openssl098-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148627" comment="java-1_7_0-openjdk-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148628" comment="java-1_7_0-openjdk-accessibility-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148629" comment="java-1_7_0-openjdk-bootstrap-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148630" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148631" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148632" comment="java-1_7_0-openjdk-demo-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148633" comment="java-1_7_0-openjdk-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148634" comment="java-1_7_0-openjdk-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148635" comment="java-1_7_0-openjdk-javadoc-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148636" comment="java-1_7_0-openjdk-src-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148079" comment="java-1_8_0-openjdk-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148080" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148081" comment="java-1_8_0-openjdk-demo-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148082" comment="java-1_8_0-openjdk-devel-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148083" comment="java-1_8_0-openjdk-headless-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148084" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148085" comment="java-1_8_0-openjdk-src-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134613" comment="libopenssl-devel-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134614" comment="libopenssl-devel-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134772" comment="libopenssl0_9_8-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134773" comment="libopenssl0_9_8-32bit-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134615" comment="libopenssl1_0_0-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134616" comment="libopenssl1_0_0-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134617" comment="libopenssl1_0_0-hmac-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134618" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133731" comment="nodejs-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133732" comment="nodejs-devel-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133734" comment="nodejs-docs-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133735" comment="npm-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134619" comment="openssl-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134620" comment="openssl-doc-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2184</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2184" source="CVE"/>
    <description>
    The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2184.html">CVE-2016-2184</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2184">SUSE bug 971125</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126059" comment="kernel-debug-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126060" comment="kernel-debug-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126061" comment="kernel-debug-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126062" comment="kernel-default-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126063" comment="kernel-default-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126064" comment="kernel-default-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126065" comment="kernel-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126066" comment="kernel-docs-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126067" comment="kernel-docs-html-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126068" comment="kernel-docs-pdf-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126069" comment="kernel-ec2-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126070" comment="kernel-ec2-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126071" comment="kernel-ec2-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126072" comment="kernel-macros-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126073" comment="kernel-obs-build-4.1.20-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126074" comment="kernel-obs-qa-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126075" comment="kernel-obs-qa-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126076" comment="kernel-pae-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126077" comment="kernel-pae-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126078" comment="kernel-pae-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126079" comment="kernel-pv-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126080" comment="kernel-pv-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126081" comment="kernel-pv-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126082" comment="kernel-source-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126083" comment="kernel-source-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126084" comment="kernel-syms-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126085" comment="kernel-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126086" comment="kernel-vanilla-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126087" comment="kernel-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126088" comment="kernel-xen-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126089" comment="kernel-xen-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2185</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2185" source="CVE"/>
    <description>
    The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2185.html">CVE-2016-2185</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2185">SUSE bug 971124</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128019" comment="kernel-debug-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128020" comment="kernel-debug-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128021" comment="kernel-debug-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128022" comment="kernel-default-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128023" comment="kernel-default-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128024" comment="kernel-default-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128025" comment="kernel-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128026" comment="kernel-docs-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128027" comment="kernel-docs-html-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128028" comment="kernel-docs-pdf-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128029" comment="kernel-ec2-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128030" comment="kernel-ec2-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128031" comment="kernel-ec2-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128032" comment="kernel-macros-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128033" comment="kernel-obs-build-4.1.21-14.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128034" comment="kernel-obs-qa-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128035" comment="kernel-obs-qa-xen-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128036" comment="kernel-pae-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128037" comment="kernel-pae-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128038" comment="kernel-pae-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128039" comment="kernel-pv-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128040" comment="kernel-pv-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128041" comment="kernel-pv-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128042" comment="kernel-source-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128043" comment="kernel-source-vanilla-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128044" comment="kernel-syms-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128045" comment="kernel-vanilla-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128046" comment="kernel-vanilla-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128047" comment="kernel-xen-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128048" comment="kernel-xen-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128049" comment="kernel-xen-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2186</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2186" source="CVE"/>
    <description>
    The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2186.html">CVE-2016-2186</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2186">SUSE bug 970958</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128019" comment="kernel-debug-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128020" comment="kernel-debug-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128021" comment="kernel-debug-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128022" comment="kernel-default-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128023" comment="kernel-default-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128024" comment="kernel-default-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128025" comment="kernel-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128026" comment="kernel-docs-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128027" comment="kernel-docs-html-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128028" comment="kernel-docs-pdf-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128029" comment="kernel-ec2-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128030" comment="kernel-ec2-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128031" comment="kernel-ec2-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128032" comment="kernel-macros-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128033" comment="kernel-obs-build-4.1.21-14.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128034" comment="kernel-obs-qa-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128035" comment="kernel-obs-qa-xen-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128036" comment="kernel-pae-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128037" comment="kernel-pae-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128038" comment="kernel-pae-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128039" comment="kernel-pv-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128040" comment="kernel-pv-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128041" comment="kernel-pv-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128042" comment="kernel-source-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128043" comment="kernel-source-vanilla-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128044" comment="kernel-syms-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128045" comment="kernel-vanilla-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128046" comment="kernel-vanilla-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128047" comment="kernel-xen-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128048" comment="kernel-xen-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128049" comment="kernel-xen-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2188</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2188" source="CVE"/>
    <description>
    The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2188.html">CVE-2016-2188</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 970956</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2188">SUSE bug 1067912</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128019" comment="kernel-debug-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128020" comment="kernel-debug-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128021" comment="kernel-debug-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128022" comment="kernel-default-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128023" comment="kernel-default-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128024" comment="kernel-default-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128025" comment="kernel-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128026" comment="kernel-docs-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128027" comment="kernel-docs-html-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128028" comment="kernel-docs-pdf-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128029" comment="kernel-ec2-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128030" comment="kernel-ec2-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128031" comment="kernel-ec2-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128032" comment="kernel-macros-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128033" comment="kernel-obs-build-4.1.21-14.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128034" comment="kernel-obs-qa-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128035" comment="kernel-obs-qa-xen-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128036" comment="kernel-pae-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128037" comment="kernel-pae-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128038" comment="kernel-pae-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128039" comment="kernel-pv-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128040" comment="kernel-pv-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128041" comment="kernel-pv-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128042" comment="kernel-source-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128043" comment="kernel-source-vanilla-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128044" comment="kernel-syms-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128045" comment="kernel-vanilla-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128046" comment="kernel-vanilla-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128047" comment="kernel-xen-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128048" comment="kernel-xen-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128049" comment="kernel-xen-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2191</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2191" source="CVE"/>
    <description>
    The bmp_read_rows function in pngxtern/pngxrbmp.c in OptiPNG before 0.7.6 allows remote attackers to cause a denial of service (invalid memory write and crash) via a series of delta escapes in a crafted BMP image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2191.html">CVE-2016-2191</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2191">SUSE bug 973992</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2191">SUSE bug 973992</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2191">SUSE bug 973992</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126362" comment="optipng-0.7.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153607" comment="optipng is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2197</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2197" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) built with an IDE AHCI emulation support is vulnerable to a null pointer dereference flaw. It occurs while unmapping the Frame Information Structure (FIS) and Command List Block (CLB) entries. A privileged user inside guest could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2197.html">CVE-2016-2197</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2197">SUSE bug 964411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2197">SUSE bug 964411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2197">SUSE bug 964411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2197">SUSE bug 964411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2197">SUSE bug 964411</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2198</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2198" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) built with the USB EHCI emulation support is vulnerable to a null pointer dereference flaw. It could occur when an application attempts to write to EHCI capabilities registers. A privileged user inside quest could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2198.html">CVE-2016-2198</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2198">SUSE bug 964413</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2198">SUSE bug 964415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2198">SUSE bug 964415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2198">SUSE bug 964415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2198">SUSE bug 964415</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2198">SUSE bug 964413</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2198">SUSE bug 964413</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2216</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2216" source="CVE"/>
    <description>
    The HTTP header parsing code in Node.js 0.10.x before 0.10.42, 0.11.6 through 0.11.16, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allows remote attackers to bypass an HTTP response-splitting protection mechanism via UTF-8 encoded Unicode characters in the HTTP header, as demonstrated by %c4%8d%c4%8a.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2216.html">CVE-2016-2216</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2216">SUSE bug 966076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2216">SUSE bug 966076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2216">SUSE bug 966076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2216">SUSE bug 966076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2216">SUSE bug 966076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2216">SUSE bug 966076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2216">SUSE bug 966076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2216">SUSE bug 966076</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123854" comment="nodejs-4.3.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123855" comment="nodejs-devel-4.3.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123857" comment="nodejs-docs-4.3.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123858" comment="npm-4.3.1-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2313</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2313" source="CVE"/>
    <description>
    auth_login.php in Cacti before 0.8.8g allows remote authenticated users who use web authentication to bypass intended access restrictions by logging in as a user not in the cacti database.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2313.html">CVE-2016-2313</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2313">SUSE bug 965930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2313">SUSE bug 965930</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2313">SUSE bug 1022564</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2313">SUSE bug 1069693</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123268" comment="cacti-0.8.8f-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123269" comment="cacti-spine-0.8.8f-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2315</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2315" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315" source="CVE"/>
    <description>
    revision.c in git before 2.7.4 uses an incorrect integer data type, which allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2315.html">CVE-2016-2315</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2315">SUSE bug 971328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2315">SUSE bug 971328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2315">SUSE bug 971328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2315">SUSE bug 971328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2315">SUSE bug 971328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2315">SUSE bug 971328</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124867" comment="cgit-0.12-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153605" comment="cgit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125698" comment="git-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125699" comment="git-arch-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153608" comment="git-arch is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125700" comment="git-core-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125701" comment="git-credential-gnome-keyring-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153609" comment="git-credential-gnome-keyring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125702" comment="git-cvs-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125703" comment="git-daemon-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125704" comment="git-doc-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153610" comment="git-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125705" comment="git-email-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125706" comment="git-gui-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125707" comment="git-svn-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125708" comment="git-web-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125709" comment="gitk-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2317</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317" source="CVE"/>
    <description>
    Multiple buffer overflows in GraphicsMagick 1.3.23 allow remote attackers to cause a denial of service (crash) via a crafted SVG file, related to the (1) TracePoint function in magick/render.c, (2) GetToken function in magick/utility.c, and (3) GetTransformTokens function in coders/svg.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2317.html">CVE-2016-2317</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2317">SUSE bug 965853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2317">SUSE bug 965853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2317">SUSE bug 965853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2317">SUSE bug 965853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2317">SUSE bug 965853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2317">SUSE bug 965853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2317">SUSE bug 965853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2317">SUSE bug 965853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2317">SUSE bug 965853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2317">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2317">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2317">SUSE bug 999673</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2318</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2318" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318" source="CVE"/>
    <description>
    GraphicsMagick 1.3.23 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted SVG file, related to the (1) DrawImage function in magick/render.c, (2) SVGStartElement function in coders/svg.c, and (3) TraceArcPath function in magick/render.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2318.html">CVE-2016-2318</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2318">SUSE bug 965853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2318">SUSE bug 965853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2318">SUSE bug 965853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2318">SUSE bug 965853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2318">SUSE bug 965853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2318">SUSE bug 965853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2318">SUSE bug 965853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2318">SUSE bug 965853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2318">SUSE bug 965853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2318">SUSE bug 1047356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2318">SUSE bug 1047356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2318">SUSE bug 1047356</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2324</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324" source="CVE"/>
    <description>
    Integer overflow in Git before 2.7.4 allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2324.html">CVE-2016-2324</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2324">SUSE bug 971328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2324">SUSE bug 971328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2324">SUSE bug 971328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2324">SUSE bug 971328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2324">SUSE bug 971328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2324">SUSE bug 971328</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124867" comment="cgit-0.12-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153605" comment="cgit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125698" comment="git-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125699" comment="git-arch-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153608" comment="git-arch is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125700" comment="git-core-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125701" comment="git-credential-gnome-keyring-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153609" comment="git-credential-gnome-keyring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125702" comment="git-cvs-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125703" comment="git-daemon-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125704" comment="git-doc-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153610" comment="git-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125705" comment="git-email-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125706" comment="git-gui-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125707" comment="git-svn-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125708" comment="git-web-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125709" comment="gitk-2.6.6-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2329</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2329" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2329" source="CVE"/>
    <description>
    libavcodec/tiff.c in FFmpeg before 2.8.6 does not properly validate RowsPerStrip values and YCbCr chrominance subsampling factors, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via a crafted TIFF file, related to the tiff_decode_tag and decode_frame functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2329.html">CVE-2016-2329</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2329">SUSE bug 966674</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2329">SUSE bug 966674</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123449" comment="ffmpeg-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153138" comment="ffmpeg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123450" comment="ffmpeg-devel-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153139" comment="ffmpeg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123451" comment="libavcodec-devel-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123452" comment="libavcodec56-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153141" comment="libavcodec56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123453" comment="libavcodec56-32bit-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153142" comment="libavcodec56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123454" comment="libavdevice-devel-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123455" comment="libavdevice56-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153144" comment="libavdevice56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123456" comment="libavdevice56-32bit-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153145" comment="libavdevice56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123457" comment="libavfilter-devel-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123458" comment="libavfilter5-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153147" comment="libavfilter5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123459" comment="libavfilter5-32bit-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153148" comment="libavfilter5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123460" comment="libavformat-devel-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123461" comment="libavformat56-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153150" comment="libavformat56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123462" comment="libavformat56-32bit-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153151" comment="libavformat56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123463" comment="libavresample-devel-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123464" comment="libavresample2-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153153" comment="libavresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123465" comment="libavresample2-32bit-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153154" comment="libavresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123466" comment="libavutil-devel-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123467" comment="libavutil54-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153156" comment="libavutil54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123468" comment="libavutil54-32bit-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153157" comment="libavutil54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123469" comment="libpostproc-devel-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123470" comment="libpostproc53-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153159" comment="libpostproc53 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123471" comment="libpostproc53-32bit-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153160" comment="libpostproc53-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123472" comment="libswresample-devel-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123473" comment="libswresample1-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153162" comment="libswresample1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123474" comment="libswresample1-32bit-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153163" comment="libswresample1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123475" comment="libswscale-devel-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123476" comment="libswscale3-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153165" comment="libswscale3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009123477" comment="libswscale3-32bit-2.8.6-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153166" comment="libswscale3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2335</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2335" source="CVE"/>
    <description>
    The CInArchive::ReadFileItem method in Archive/Udf/UdfIn.cpp in 7zip 9.20 and 15.05 beta and p7zip allows remote attackers to cause a denial of service (out-of-bounds read) or execute arbitrary code via the PartitionRef field in the Long Allocation Descriptor in a UDF file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2335.html">CVE-2016-2335</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2335">SUSE bug 979823</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2335">SUSE bug 979823</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2335">SUSE bug 979823</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2335">SUSE bug 979823</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2335">SUSE bug 979823</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2335">SUSE bug 979823</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2335">SUSE bug 979823</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2335">SUSE bug 979823</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2335">SUSE bug 979823</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2335">SUSE bug 979823</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2335">SUSE bug 979823</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2335">SUSE bug 979823</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129261" comment="p7zip-9.20.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152637" comment="p7zip is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2339</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2339" source="CVE"/>
    <description>
    An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially constructed object passed as element of args array can increase this array size after mentioned allocation and cause heap overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2339.html">CVE-2016-2339</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2339">SUSE bug 1018808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2339">SUSE bug 1018808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2339">SUSE bug 1018808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2339">SUSE bug 1018808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2339">SUSE bug 1018808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2339">SUSE bug 1018808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2339">SUSE bug 1018808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2339">SUSE bug 1018808</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154833" comment="libruby2_1-2_1-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152217" comment="libruby2_1-2_1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150703" comment="libruby2_2-2_2-2.2.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153052" comment="libruby2_2-2_2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154834" comment="ruby2.1-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152218" comment="ruby2.1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154835" comment="ruby2.1-devel-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152219" comment="ruby2.1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154836" comment="ruby2.1-devel-extra-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154837" comment="ruby2.1-devel-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154838" comment="ruby2.1-doc-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154839" comment="ruby2.1-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154840" comment="ruby2.1-doc-ri-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154841" comment="ruby2.1-doc-ri is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154842" comment="ruby2.1-stdlib-2.1.9-10.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152220" comment="ruby2.1-stdlib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150704" comment="ruby2.2-2.2.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153053" comment="ruby2.2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150705" comment="ruby2.2-devel-2.2.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153054" comment="ruby2.2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150706" comment="ruby2.2-devel-extra-2.2.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153055" comment="ruby2.2-devel-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150707" comment="ruby2.2-doc-2.2.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153056" comment="ruby2.2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150708" comment="ruby2.2-doc-ri-2.2.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153057" comment="ruby2.2-doc-ri is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150709" comment="ruby2.2-stdlib-2.2.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153058" comment="ruby2.2-stdlib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150710" comment="ruby2.2-tk-2.2.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153059" comment="ruby2.2-tk is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2342</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2342" source="CVE"/>
    <description>
    The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2342.html">CVE-2016-2342</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2342">SUSE bug 970952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2342">SUSE bug 970952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2342">SUSE bug 970952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2342">SUSE bug 970952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2342">SUSE bug 970952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2342">SUSE bug 970952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2342">SUSE bug 970952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2342">SUSE bug 970952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2342">SUSE bug 970952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2342">SUSE bug 970952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2342">SUSE bug 970952</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2342">SUSE bug 970952</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125375" comment="quagga-0.99.24.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151418" comment="quagga is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125376" comment="quagga-devel-0.99.24.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153572" comment="quagga-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2347</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2347" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2347" source="CVE"/>
    <description>
    Integer underflow in the decode_level3_header function in lib/lha_file_header.c in Lhasa before 0.3.1 allows remote attackers to execute arbitrary code via a crafted archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2347.html">CVE-2016-2347</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2347">SUSE bug 973790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2347">SUSE bug 973790</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2347">SUSE bug 973790</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126203" comment="lhasa-0.3.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153611" comment="lhasa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126204" comment="lhasa-devel-0.3.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153612" comment="lhasa-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126205" comment="liblhasa0-0.3.1-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153613" comment="liblhasa0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2381</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381" source="CVE"/>
    <description>
    Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2381.html">CVE-2016-2381</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2381">SUSE bug 967082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2381">SUSE bug 967082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2381">SUSE bug 967082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2381">SUSE bug 967082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2381">SUSE bug 967082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2381">SUSE bug 967082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2381">SUSE bug 967082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2381">SUSE bug 967082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2381">SUSE bug 967082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2381">SUSE bug 992991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2381">SUSE bug 967082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2381">SUSE bug 967082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2381">SUSE bug 967082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2381">SUSE bug 967082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2381">SUSE bug 967082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2381">SUSE bug 967082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2381">SUSE bug 967082</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134449" comment="perl-5.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151455" comment="perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134450" comment="perl-32bit-5.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151456" comment="perl-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134451" comment="perl-base-5.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151457" comment="perl-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134452" comment="perl-base-32bit-5.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153231" comment="perl-base-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134453" comment="perl-doc-5.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151458" comment="perl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2383</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2383" source="CVE"/>
    <description>
    The adjust_branches function in kernel/bpf/verifier.c in the Linux kernel before 4.5 does not consider the delta in the backward-jump case, which allows local users to obtain sensitive information from kernel memory by creating a packet filter and then loading crafted BPF instructions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2383.html">CVE-2016-2383</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2383">SUSE bug 966684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2383">SUSE bug 966684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2383">SUSE bug 966684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2383">SUSE bug 966684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2383">SUSE bug 966684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2383">SUSE bug 966684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2383">SUSE bug 966684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2383">SUSE bug 966684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2383">SUSE bug 966684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2383">SUSE bug 966684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2383">SUSE bug 966684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2383">SUSE bug 966684</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126059" comment="kernel-debug-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126060" comment="kernel-debug-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126061" comment="kernel-debug-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126062" comment="kernel-default-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126063" comment="kernel-default-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126064" comment="kernel-default-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126065" comment="kernel-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126066" comment="kernel-docs-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126067" comment="kernel-docs-html-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126068" comment="kernel-docs-pdf-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126069" comment="kernel-ec2-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126070" comment="kernel-ec2-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126071" comment="kernel-ec2-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126072" comment="kernel-macros-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126073" comment="kernel-obs-build-4.1.20-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126074" comment="kernel-obs-qa-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126075" comment="kernel-obs-qa-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126076" comment="kernel-pae-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126077" comment="kernel-pae-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126078" comment="kernel-pae-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126079" comment="kernel-pv-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126080" comment="kernel-pv-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126081" comment="kernel-pv-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126082" comment="kernel-source-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126083" comment="kernel-source-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126084" comment="kernel-syms-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126085" comment="kernel-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126086" comment="kernel-vanilla-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126087" comment="kernel-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126088" comment="kernel-xen-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126089" comment="kernel-xen-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2384</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384" source="CVE"/>
    <description>
    Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2384.html">CVE-2016-2384</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 967773</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 967773</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 967773</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 967773</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 967773</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 967773</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 967773</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 967773</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 967773</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2384">SUSE bug 966693</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126059" comment="kernel-debug-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126060" comment="kernel-debug-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126061" comment="kernel-debug-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126062" comment="kernel-default-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126063" comment="kernel-default-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126064" comment="kernel-default-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126065" comment="kernel-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126066" comment="kernel-docs-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126067" comment="kernel-docs-html-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126068" comment="kernel-docs-pdf-4.1.20-11.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126069" comment="kernel-ec2-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126070" comment="kernel-ec2-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126071" comment="kernel-ec2-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126072" comment="kernel-macros-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126073" comment="kernel-obs-build-4.1.20-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126074" comment="kernel-obs-qa-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126075" comment="kernel-obs-qa-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126076" comment="kernel-pae-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126077" comment="kernel-pae-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126078" comment="kernel-pae-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126079" comment="kernel-pv-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126080" comment="kernel-pv-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126081" comment="kernel-pv-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126082" comment="kernel-source-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126083" comment="kernel-source-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126084" comment="kernel-syms-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126085" comment="kernel-vanilla-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126086" comment="kernel-vanilla-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126087" comment="kernel-xen-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126088" comment="kernel-xen-base-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126089" comment="kernel-xen-devel-4.1.20-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2391</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2391" source="CVE"/>
    <description>
    The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2391.html">CVE-2016-2391</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2391">SUSE bug 967013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2391">SUSE bug 967101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2391">SUSE bug 967101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2391">SUSE bug 967012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2391">SUSE bug 967012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2391">SUSE bug 967012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2391">SUSE bug 967101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2391">SUSE bug 967013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2391">SUSE bug 967013</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135119" comment="qemu-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135120" comment="qemu-arm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135121" comment="qemu-block-curl-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135122" comment="qemu-block-rbd-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135123" comment="qemu-extra-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135124" comment="qemu-guest-agent-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135125" comment="qemu-ipxe-1.0.0-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135126" comment="qemu-kvm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135127" comment="qemu-lang-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135128" comment="qemu-linux-user-2.3.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135129" comment="qemu-ppc-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135130" comment="qemu-s390-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135131" comment="qemu-seabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135132" comment="qemu-sgabios-8-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135133" comment="qemu-testsuite-2.3.1-19.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135134" comment="qemu-tools-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135135" comment="qemu-vgabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135136" comment="qemu-x86-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2392</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2392" source="CVE"/>
    <description>
    The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 does not properly validate USB configuration descriptor objects, which allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2392.html">CVE-2016-2392</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2392">SUSE bug 967012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2392">SUSE bug 967090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2392">SUSE bug 967090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2392">SUSE bug 967012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2392">SUSE bug 967090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2392">SUSE bug 967012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2392">SUSE bug 967012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2392">SUSE bug 967090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2392">SUSE bug 967012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2392">SUSE bug 967012</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135119" comment="qemu-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135120" comment="qemu-arm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135121" comment="qemu-block-curl-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135122" comment="qemu-block-rbd-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135123" comment="qemu-extra-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135124" comment="qemu-guest-agent-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135125" comment="qemu-ipxe-1.0.0-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135126" comment="qemu-kvm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135127" comment="qemu-lang-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135128" comment="qemu-linux-user-2.3.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135129" comment="qemu-ppc-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135130" comment="qemu-s390-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135131" comment="qemu-seabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135132" comment="qemu-sgabios-8-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135133" comment="qemu-testsuite-2.3.1-19.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135134" comment="qemu-tools-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135135" comment="qemu-vgabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135136" comment="qemu-x86-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2399</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2399" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2399" source="CVE"/>
    <description>
    Integer overflow in the quicktime_read_pascal function in libquicktime 1.2.4 and earlier allows remote attackers to cause a denial of service or possibly have other unspecified impact via a crafted hdlr MP4 atom.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2399.html">CVE-2016-2399</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2399">SUSE bug 1022805</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148803" comment="libquicktime-1.2.4cvs20150223-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153614" comment="libquicktime is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148804" comment="libquicktime-devel-1.2.4cvs20150223-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153615" comment="libquicktime-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148805" comment="libquicktime-tools-1.2.4cvs20150223-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153616" comment="libquicktime-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148806" comment="libquicktime0-1.2.4cvs20150223-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153617" comment="libquicktime0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148807" comment="libquicktime0-32bit-1.2.4cvs20150223-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153618" comment="libquicktime0-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2510</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2510" source="CVE"/>
    <description>
    BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2510.html">CVE-2016-2510</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2510">SUSE bug 967593</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2510">SUSE bug 967593</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2510">SUSE bug 967593</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2510">SUSE bug 967593</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2510">SUSE bug 967593</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2510">SUSE bug 967593</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2510">SUSE bug 967593</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2510">SUSE bug 967593</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2510">SUSE bug 967593</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124845" comment="bsh2-2.0.0.b5-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153619" comment="bsh2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124846" comment="bsh2-bsf-2.0.0.b5-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153620" comment="bsh2-bsf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124847" comment="bsh2-classgen-2.0.0.b5-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153621" comment="bsh2-classgen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124848" comment="bsh2-demo-2.0.0.b5-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153622" comment="bsh2-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124849" comment="bsh2-javadoc-2.0.0.b5-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153623" comment="bsh2-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124850" comment="bsh2-manual-2.0.0.b5-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153624" comment="bsh2-manual is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124851" comment="bsh2-src-2.0.0.b5-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153625" comment="bsh2-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2516</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2516" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516" source="CVE"/>
    <description>
    NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directive.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2516.html">CVE-2016-2516</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2516">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2516">SUSE bug 977452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2516">SUSE bug 977452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2516">SUSE bug 977452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2516">SUSE bug 977452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2516">SUSE bug 977452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2516">SUSE bug 977452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2516">SUSE bug 977452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2516">SUSE bug 977452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2516">SUSE bug 977452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2516">SUSE bug 977452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2516">SUSE bug 977452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2516">SUSE bug 977452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2516">SUSE bug 977452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2516">SUSE bug 0</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2516">SUSE bug 977452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2516">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2516">SUSE bug 977452</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2516">SUSE bug 977452</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127851" comment="ntp-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127852" comment="ntp-doc-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2517</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2517" source="CVE"/>
    <description>
    NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey.  NOTE: this vulnerability exists because of a CVE-2016-2516 regression.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2517.html">CVE-2016-2517</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2517">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2517">SUSE bug 977455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2517">SUSE bug 977455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2517">SUSE bug 977455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2517">SUSE bug 977455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2517">SUSE bug 977455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2517">SUSE bug 977455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2517">SUSE bug 977455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2517">SUSE bug 977455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2517">SUSE bug 977455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2517">SUSE bug 977455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2517">SUSE bug 977455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2517">SUSE bug 977455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2517">SUSE bug 977455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2517">SUSE bug 0</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2517">SUSE bug 977455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2517">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2517">SUSE bug 977455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2517">SUSE bug 977455</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127851" comment="ntp-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127852" comment="ntp-doc-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2518</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518" source="CVE"/>
    <description>
    The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2518.html">CVE-2016-2518</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2518">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2518">SUSE bug 977457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2518">SUSE bug 977457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2518">SUSE bug 977457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2518">SUSE bug 977457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2518">SUSE bug 977457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2518">SUSE bug 977457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2518">SUSE bug 977457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2518">SUSE bug 977457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2518">SUSE bug 977457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2518">SUSE bug 977457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2518">SUSE bug 977457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2518">SUSE bug 977457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2518">SUSE bug 977457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2518">SUSE bug 977457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2518">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2518">SUSE bug 977457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2518">SUSE bug 977457</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2518">SUSE bug 977457</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127851" comment="ntp-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127852" comment="ntp-doc-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2519</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2519" source="CVE"/>
    <description>
    ntpd in NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (ntpd abort) by a large request data value, which triggers the ctl_getitem function to return a NULL value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2519.html">CVE-2016-2519</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 977458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 977458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 977458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 977458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 977458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 977458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 977458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 977458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 977458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 977458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 977458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 977458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 959243</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 977458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 0</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 977458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 977446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 977458</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2519">SUSE bug 977458</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127851" comment="ntp-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127852" comment="ntp-doc-4.2.8p7-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2523</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2523" source="CVE"/>
    <description>
    The dnp3_al_process_object function in epan/dissectors/packet-dnp.c in the DNP3 dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2523.html">CVE-2016-2523</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2523">SUSE bug 968565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2523">SUSE bug 968565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2523">SUSE bug 968565</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124447" comment="wireshark-1.12.10-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124448" comment="wireshark-devel-1.12.10-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124449" comment="wireshark-ui-gtk-1.12.10-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124450" comment="wireshark-ui-qt-1.12.10-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2530</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2530" source="CVE"/>
    <description>
    The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 mishandles the case of an unrecognized TLV type, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet, a different vulnerability than CVE-2016-2531.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2530.html">CVE-2016-2530</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2530">SUSE bug 968565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2530">SUSE bug 968565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2530">SUSE bug 968565</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124447" comment="wireshark-1.12.10-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124448" comment="wireshark-devel-1.12.10-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124449" comment="wireshark-ui-gtk-1.12.10-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124450" comment="wireshark-ui-qt-1.12.10-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2531</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2531" source="CVE"/>
    <description>
    Off-by-one error in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that triggers a 0xff tag value, a different vulnerability than CVE-2016-2530.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2531.html">CVE-2016-2531</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2531">SUSE bug 968565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2531">SUSE bug 968565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2531">SUSE bug 968565</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124447" comment="wireshark-1.12.10-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124448" comment="wireshark-devel-1.12.10-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124449" comment="wireshark-ui-gtk-1.12.10-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124450" comment="wireshark-ui-qt-1.12.10-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2532</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2532" source="CVE"/>
    <description>
    The dissect_llrp_parameters function in epan/dissectors/packet-llrp.c in the LLRP dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 does not limit the recursion depth, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2532.html">CVE-2016-2532</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2532">SUSE bug 968565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2532">SUSE bug 968565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2532">SUSE bug 968565</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124447" comment="wireshark-1.12.10-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124448" comment="wireshark-devel-1.12.10-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124449" comment="wireshark-ui-gtk-1.12.10-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124450" comment="wireshark-ui-qt-1.12.10-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2538</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2538" source="CVE"/>
    <description>
    Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 allow local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_response, (2) rndis_set_response, or (3) usb_net_handle_dataout function.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2538.html">CVE-2016-2538</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2538">SUSE bug 967969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2538">SUSE bug 968004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2538">SUSE bug 968004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2538">SUSE bug 967969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2538">SUSE bug 968004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2538">SUSE bug 967969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2538">SUSE bug 967969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2538">SUSE bug 968004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2538">SUSE bug 967969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2538">SUSE bug 967969</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125600" comment="xen-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125601" comment="xen-devel-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125602" comment="xen-doc-html-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125603" comment="xen-kmp-default-4.5.2_06_k4.1.15_8-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125604" comment="xen-libs-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125605" comment="xen-libs-32bit-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125606" comment="xen-tools-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125607" comment="xen-tools-domU-4.5.2_06-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2554</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2554" source="CVE"/>
    <description>
    Stack-based buffer overflow in ext/phar/tar.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TAR archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2554.html">CVE-2016-2554</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2554">SUSE bug 968284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2554">SUSE bug 968284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2554">SUSE bug 968284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2554">SUSE bug 968284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2554">SUSE bug 968284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2554">SUSE bug 968284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2554">SUSE bug 968284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2554">SUSE bug 968284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2554">SUSE bug 968284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2554">SUSE bug 968284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2554">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127020" comment="apache2-mod_php5-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127021" comment="php5-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127022" comment="php5-bcmath-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127023" comment="php5-bz2-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127024" comment="php5-calendar-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127025" comment="php5-ctype-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127026" comment="php5-curl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127027" comment="php5-dba-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127028" comment="php5-devel-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127029" comment="php5-dom-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127030" comment="php5-enchant-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127031" comment="php5-exif-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127032" comment="php5-fastcgi-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127033" comment="php5-fileinfo-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127034" comment="php5-firebird-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127035" comment="php5-fpm-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127036" comment="php5-ftp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127037" comment="php5-gd-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127038" comment="php5-gettext-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127039" comment="php5-gmp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127040" comment="php5-iconv-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127041" comment="php5-imap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127042" comment="php5-intl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127043" comment="php5-json-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127044" comment="php5-ldap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127045" comment="php5-mbstring-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127046" comment="php5-mcrypt-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127047" comment="php5-mssql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127048" comment="php5-mysql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127049" comment="php5-odbc-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127050" comment="php5-opcache-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127051" comment="php5-openssl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127052" comment="php5-pcntl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127053" comment="php5-pdo-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127054" comment="php5-pear-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127055" comment="php5-pgsql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127056" comment="php5-phar-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127057" comment="php5-posix-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127058" comment="php5-pspell-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127059" comment="php5-readline-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127060" comment="php5-shmop-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127061" comment="php5-snmp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127062" comment="php5-soap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127063" comment="php5-sockets-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127064" comment="php5-sqlite-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127065" comment="php5-suhosin-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127066" comment="php5-sysvmsg-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127067" comment="php5-sysvsem-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127068" comment="php5-sysvshm-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127069" comment="php5-tidy-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127070" comment="php5-tokenizer-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127071" comment="php5-wddx-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127072" comment="php5-xmlreader-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127073" comment="php5-xmlrpc-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127074" comment="php5-xmlwriter-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127075" comment="php5-xsl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127076" comment="php5-zip-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127077" comment="php5-zlib-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2560</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2560" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.15, 4.4.x before 4.4.15.5, and 4.5.x before 4.5.5.1 allow remote attackers to inject arbitrary web script or HTML via (1) a crafted Host HTTP header, related to libraries/Config.class.php; (2) crafted JSON data, related to file_echo.php; (3) a crafted SQL query, related to js/functions.js; (4) the initial parameter to libraries/server_privileges.lib.php in the user accounts page; or (5) the it parameter to libraries/controllers/TableSearchController.class.php in the zoom search page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2560.html">CVE-2016-2560</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2560">SUSE bug 968938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2560">SUSE bug 968938</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124456" comment="phpMyAdmin-4.4.15.5-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2561</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2561" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.4.x before 4.4.15.5 and 4.5.x before 4.5.5.1 allow remote authenticated users to inject arbitrary web script or HTML via (1) normalization.php or (2) js/normalization.js in the database normalization page, (3) templates/database/structure/sortable_header.phtml in the database structure page, or (4) the pos parameter to db_central_columns.php in the central columns page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2561.html">CVE-2016-2561</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2561">SUSE bug 968941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2561">SUSE bug 968941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124456" comment="phpMyAdmin-4.4.15.5-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2563</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2563" source="CVE"/>
    <description>
    Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2563.html">CVE-2016-2563</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2563">SUSE bug 981407</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2563">SUSE bug 981407</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128326" comment="putty-0.67-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152979" comment="putty is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2569</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2569" source="CVE"/>
    <description>
    Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not properly append data to String objects, which allows remote servers to cause a denial of service (assertion failure and daemon exit) via a long string, as demonstrated by a crafted HTTP Vary header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2569.html">CVE-2016-2569</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2569">SUSE bug 968392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2569">SUSE bug 968392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2569">SUSE bug 968393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2569">SUSE bug 968392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2569">SUSE bug 968393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2569">SUSE bug 968392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2569">SUSE bug 968393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2569">SUSE bug 968392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2569">SUSE bug 968392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2569">SUSE bug 968392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2569">SUSE bug 968392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2569">SUSE bug 968392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2569">SUSE bug 968392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2569">SUSE bug 968392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2569">SUSE bug 968392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2569">SUSE bug 968392</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135205" comment="squid-3.3.14-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2570</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2570" source="CVE"/>
    <description>
    The Edge Side Includes (ESI) parser in Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not check buffer limits during XML parsing, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a crafted XML document, related to esi/CustomParser.cc and esi/CustomParser.h.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2570.html">CVE-2016-2570</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2570">SUSE bug 968393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2570">SUSE bug 968392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2570">SUSE bug 968393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2570">SUSE bug 968392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2570">SUSE bug 968393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2570">SUSE bug 968392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2570">SUSE bug 968393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2570">SUSE bug 968393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2570">SUSE bug 968393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2570">SUSE bug 968393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2570">SUSE bug 968393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2570">SUSE bug 968393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2570">SUSE bug 968393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2570">SUSE bug 968393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2570">SUSE bug 968393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2570">SUSE bug 968392</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135205" comment="squid-3.3.14-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2571</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2571" source="CVE"/>
    <description>
    http.cc in Squid 3.x before 3.5.15 and 4.x before 4.0.7 proceeds with the storage of certain data after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2571.html">CVE-2016-2571</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2571">SUSE bug 968394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2571">SUSE bug 968394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2571">SUSE bug 968395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2571">SUSE bug 968394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2571">SUSE bug 968394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2571">SUSE bug 968395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2571">SUSE bug 968394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2571">SUSE bug 968394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2571">SUSE bug 968394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2571">SUSE bug 968394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2571">SUSE bug 968394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2571">SUSE bug 968394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2571">SUSE bug 968394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2571">SUSE bug 968394</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135205" comment="squid-3.3.14-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2572</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2572" source="CVE"/>
    <description>
    http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2572.html">CVE-2016-2572</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2572">SUSE bug 968395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2572">SUSE bug 968395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2572">SUSE bug 968394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2572">SUSE bug 968395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2572">SUSE bug 968394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2572">SUSE bug 968394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2572">SUSE bug 968395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2572">SUSE bug 968395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2572">SUSE bug 968395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2572">SUSE bug 968395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2572">SUSE bug 968395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2572">SUSE bug 968395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2572">SUSE bug 968395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2572">SUSE bug 968395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2572">SUSE bug 968395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2572">SUSE bug 968395</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135205" comment="squid-3.3.14-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2774</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2774" source="CVE"/>
    <description>
    ISC DHCP 4.1.x before 4.1-ESV-R13 and 4.2.x and 4.3.x before 4.3.4 does not restrict the number of concurrent TCP sessions, which allows remote attackers to cause a denial of service (INSIST assertion failure or request-processing outage) by establishing many sessions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2774.html">CVE-2016-2774</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2774">SUSE bug 969820</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130648" comment="dhcp-4.3.3-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151310" comment="dhcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130649" comment="dhcp-client-4.3.3-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151311" comment="dhcp-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130650" comment="dhcp-devel-4.3.3-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153188" comment="dhcp-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130651" comment="dhcp-doc-4.3.3-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151312" comment="dhcp-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130652" comment="dhcp-relay-4.3.3-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151313" comment="dhcp-relay is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130653" comment="dhcp-server-4.3.3-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151314" comment="dhcp-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2775</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2775" source="CVE"/>
    <description>
    ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or the named lwres option is enabled, allows remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2775.html">CVE-2016-2775</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2775">SUSE bug 989528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2775">SUSE bug 989528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2775">SUSE bug 989528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2775">SUSE bug 989528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2775">SUSE bug 989528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2775">SUSE bug 989528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2775">SUSE bug 989528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2775">SUSE bug 989528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2775">SUSE bug 989528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2775">SUSE bug 989528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2775">SUSE bug 989528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2775">SUSE bug 989528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2775">SUSE bug 989528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2775">SUSE bug 989528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2775">SUSE bug 989528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2775">SUSE bug 989528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2775">SUSE bug 989528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2775">SUSE bug 989528</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154530" comment="bind-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154531" comment="bind-chrootenv-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154532" comment="bind-devel-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154533" comment="bind-doc-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154534" comment="bind-libs-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154535" comment="bind-libs-32bit-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153103" comment="bind-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154536" comment="bind-lwresd-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153104" comment="bind-lwresd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154537" comment="bind-utils-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2776</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2776" source="CVE"/>
    <description>
    buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2776.html">CVE-2016-2776</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1000362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1000362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1000362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1000362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1000362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1001595</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1001597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1000362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1001597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1001597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1001597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1000362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1001597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1007829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1001597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1001597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1000362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1000362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1001597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1000362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1001597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2776">SUSE bug 1000362</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133608" comment="bind-9.9.9P1-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133609" comment="bind-chrootenv-9.9.9P1-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133610" comment="bind-devel-9.9.9P1-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133611" comment="bind-doc-9.9.9P1-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133612" comment="bind-libs-9.9.9P1-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133613" comment="bind-libs-32bit-9.9.9P1-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153103" comment="bind-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133614" comment="bind-lwresd-9.9.9P1-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153104" comment="bind-lwresd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133615" comment="bind-utils-9.9.9P1-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2790</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2790" source="CVE"/>
    <description>
    The graphite2::TtfUtil::GetTableInfo function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2790.html">CVE-2016-2790</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2790">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2791</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2791" source="CVE"/>
    <description>
    The graphite2::GlyphCache::glyph function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2791.html">CVE-2016-2791</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2791">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2792</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2792" source="CVE"/>
    <description>
    The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2800.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2792.html">CVE-2016-2792</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2792">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2793</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2793" source="CVE"/>
    <description>
    CachedCmap.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2793.html">CVE-2016-2793</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2793">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2794</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2794" source="CVE"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12NextCodepoint function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2794.html">CVE-2016-2794</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2794">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2795</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2795" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2795" source="CVE"/>
    <description>
    The graphite2::FileFace::get_table_fn function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2795.html">CVE-2016-2795</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2795">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2796</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2796" source="CVE"/>
    <description>
    Heap-based buffer overflow in the graphite2::vm::Machine::Code::Code function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2796.html">CVE-2016-2796</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2796">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2797</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2797" source="CVE"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12Lookup function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2801.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2797.html">CVE-2016-2797</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2797">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2798</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2798" source="CVE"/>
    <description>
    The graphite2::GlyphCache::Loader::Loader function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2798.html">CVE-2016-2798</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2798">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2799</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2799" source="CVE"/>
    <description>
    Heap-based buffer overflow in the graphite2::Slot::setAttr function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2799.html">CVE-2016-2799</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2799">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2800</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2800" source="CVE"/>
    <description>
    The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2792.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2800.html">CVE-2016-2800</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2800">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2801</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2801" source="CVE"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12Lookup function in TtfUtil.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2797.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2801.html">CVE-2016-2801</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2801">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2802</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2802" source="CVE"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable4NextCodepoint function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2802.html">CVE-2016-2802</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2802">SUSE bug 969894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124636" comment="MozillaFirefox-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124637" comment="MozillaFirefox-branding-upstream-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124638" comment="MozillaFirefox-buildsymbols-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124639" comment="MozillaFirefox-devel-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124640" comment="MozillaFirefox-translations-common-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124641" comment="MozillaFirefox-translations-other-45.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124642" comment="libfreebl3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124643" comment="libfreebl3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124644" comment="libsoftokn3-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124645" comment="libsoftokn3-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124646" comment="mozilla-nspr-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124647" comment="mozilla-nspr-32bit-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124648" comment="mozilla-nspr-devel-4.12-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124649" comment="mozilla-nss-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124650" comment="mozilla-nss-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124651" comment="mozilla-nss-certs-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124652" comment="mozilla-nss-certs-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124653" comment="mozilla-nss-devel-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124654" comment="mozilla-nss-sysinit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124655" comment="mozilla-nss-sysinit-32bit-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124656" comment="mozilla-nss-tools-3.21.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2804</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2804" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2804.html">CVE-2016-2804</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2804">SUSE bug 977373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2804">SUSE bug 977373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2804">SUSE bug 977373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2804">SUSE bug 977373</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2804">SUSE bug 977373</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127156" comment="MozillaFirefox-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127157" comment="MozillaFirefox-branding-upstream-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127158" comment="MozillaFirefox-buildsymbols-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127159" comment="MozillaFirefox-devel-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127160" comment="MozillaFirefox-translations-common-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127161" comment="MozillaFirefox-translations-other-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127162" comment="libfreebl3-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127163" comment="libfreebl3-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127164" comment="libsoftokn3-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127165" comment="libsoftokn3-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127166" comment="mozilla-nss-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127167" comment="mozilla-nss-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127168" comment="mozilla-nss-certs-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127169" comment="mozilla-nss-certs-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127170" comment="mozilla-nss-devel-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127171" comment="mozilla-nss-sysinit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127172" comment="mozilla-nss-sysinit-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127173" comment="mozilla-nss-tools-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2806</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2806" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2806.html">CVE-2016-2806</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2806">SUSE bug 977375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2806">SUSE bug 977375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2806">SUSE bug 977375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2806">SUSE bug 977375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2806">SUSE bug 977375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2806">SUSE bug 977375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2806">SUSE bug 977375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2806">SUSE bug 977375</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127156" comment="MozillaFirefox-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127157" comment="MozillaFirefox-branding-upstream-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127158" comment="MozillaFirefox-buildsymbols-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127159" comment="MozillaFirefox-devel-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127160" comment="MozillaFirefox-translations-common-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127161" comment="MozillaFirefox-translations-other-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127162" comment="libfreebl3-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127163" comment="libfreebl3-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127164" comment="libsoftokn3-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127165" comment="libsoftokn3-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127166" comment="mozilla-nss-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127167" comment="mozilla-nss-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127168" comment="mozilla-nss-certs-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127169" comment="mozilla-nss-certs-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127170" comment="mozilla-nss-devel-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127171" comment="mozilla-nss-sysinit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127172" comment="mozilla-nss-sysinit-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127173" comment="mozilla-nss-tools-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2807</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2807.html">CVE-2016-2807</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2807">SUSE bug 977333</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2807">SUSE bug 977376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2807">SUSE bug 977376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2807">SUSE bug 977376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2807">SUSE bug 977376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2807">SUSE bug 977376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2807">SUSE bug 977376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2807">SUSE bug 977376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2807">SUSE bug 977376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2807">SUSE bug 977376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2807">SUSE bug 977376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2807">SUSE bug 977376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2807">SUSE bug 977376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2807">SUSE bug 977376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2807">SUSE bug 977376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2807">SUSE bug 977376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2807">SUSE bug 977376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2807">SUSE bug 977376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127156" comment="MozillaFirefox-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127157" comment="MozillaFirefox-branding-upstream-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127158" comment="MozillaFirefox-buildsymbols-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127159" comment="MozillaFirefox-devel-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127160" comment="MozillaFirefox-translations-common-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127161" comment="MozillaFirefox-translations-other-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127162" comment="libfreebl3-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127163" comment="libfreebl3-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127164" comment="libsoftokn3-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127165" comment="libsoftokn3-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127166" comment="mozilla-nss-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127167" comment="mozilla-nss-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127168" comment="mozilla-nss-certs-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127169" comment="mozilla-nss-certs-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127170" comment="mozilla-nss-devel-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127171" comment="mozilla-nss-sysinit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127172" comment="mozilla-nss-sysinit-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127173" comment="mozilla-nss-tools-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2808</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2808" source="CVE"/>
    <description>
    The watch implementation in the JavaScript engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code or cause a denial of service (generation-count overflow, out-of-bounds HashMap write access, and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2808.html">CVE-2016-2808</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2808">SUSE bug 977333</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2808">SUSE bug 977386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2808">SUSE bug 977386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2808">SUSE bug 977386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2808">SUSE bug 977386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2808">SUSE bug 977386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2808">SUSE bug 977386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2808">SUSE bug 977386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2808">SUSE bug 977386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2808">SUSE bug 977386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2808">SUSE bug 977386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2808">SUSE bug 977386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2808">SUSE bug 977386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2808">SUSE bug 977386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2808">SUSE bug 977386</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127156" comment="MozillaFirefox-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127157" comment="MozillaFirefox-branding-upstream-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127158" comment="MozillaFirefox-buildsymbols-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127159" comment="MozillaFirefox-devel-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127160" comment="MozillaFirefox-translations-common-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127161" comment="MozillaFirefox-translations-other-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127162" comment="libfreebl3-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127163" comment="libfreebl3-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127164" comment="libsoftokn3-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127165" comment="libsoftokn3-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127166" comment="mozilla-nss-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127167" comment="mozilla-nss-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127168" comment="mozilla-nss-certs-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127169" comment="mozilla-nss-certs-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127170" comment="mozilla-nss-devel-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127171" comment="mozilla-nss-sysinit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127172" comment="mozilla-nss-sysinit-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127173" comment="mozilla-nss-tools-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2811</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2811" source="CVE"/>
    <description>
    Use-after-free vulnerability in the ServiceWorkerInfo class in the Service Worker subsystem in Mozilla Firefox before 46.0 allows remote attackers to execute arbitrary code via vectors related to the BeginReading method.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2811.html">CVE-2016-2811</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2811">SUSE bug 977379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2811">SUSE bug 977379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2811">SUSE bug 977379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2811">SUSE bug 977379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2811">SUSE bug 977379</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127156" comment="MozillaFirefox-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127157" comment="MozillaFirefox-branding-upstream-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127158" comment="MozillaFirefox-buildsymbols-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127159" comment="MozillaFirefox-devel-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127160" comment="MozillaFirefox-translations-common-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127161" comment="MozillaFirefox-translations-other-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127162" comment="libfreebl3-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127163" comment="libfreebl3-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127164" comment="libsoftokn3-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127165" comment="libsoftokn3-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127166" comment="mozilla-nss-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127167" comment="mozilla-nss-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127168" comment="mozilla-nss-certs-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127169" comment="mozilla-nss-certs-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127170" comment="mozilla-nss-devel-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127171" comment="mozilla-nss-sysinit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127172" comment="mozilla-nss-sysinit-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127173" comment="mozilla-nss-tools-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2812</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2812" source="CVE"/>
    <description>
    Race condition in the get implementation in the ServiceWorkerManager class in the Service Worker subsystem in Mozilla Firefox before 46.0 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2812.html">CVE-2016-2812</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2812">SUSE bug 977379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2812">SUSE bug 977379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2812">SUSE bug 977379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2812">SUSE bug 977379</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2812">SUSE bug 977379</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127156" comment="MozillaFirefox-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127157" comment="MozillaFirefox-branding-upstream-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127158" comment="MozillaFirefox-buildsymbols-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127159" comment="MozillaFirefox-devel-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127160" comment="MozillaFirefox-translations-common-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127161" comment="MozillaFirefox-translations-other-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127162" comment="libfreebl3-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127163" comment="libfreebl3-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127164" comment="libsoftokn3-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127165" comment="libsoftokn3-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127166" comment="mozilla-nss-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127167" comment="mozilla-nss-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127168" comment="mozilla-nss-certs-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127169" comment="mozilla-nss-certs-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127170" comment="mozilla-nss-devel-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127171" comment="mozilla-nss-sysinit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127172" comment="mozilla-nss-sysinit-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127173" comment="mozilla-nss-tools-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2814</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2814" source="CVE"/>
    <description>
    Heap-based buffer overflow in the stagefright::SampleTable::parseSampleCencInfo function in libstagefright in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code via crafted CENC offsets that lead to mismanagement of the sizes table.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2814.html">CVE-2016-2814</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2814">SUSE bug 977333</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2814">SUSE bug 977381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2814">SUSE bug 977381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2814">SUSE bug 977381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2814">SUSE bug 977381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2814">SUSE bug 977381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2814">SUSE bug 977381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2814">SUSE bug 977381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2814">SUSE bug 977381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2814">SUSE bug 977381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2814">SUSE bug 977381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2814">SUSE bug 977381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2814">SUSE bug 977381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2814">SUSE bug 977381</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2814">SUSE bug 977381</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127156" comment="MozillaFirefox-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127157" comment="MozillaFirefox-branding-upstream-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127158" comment="MozillaFirefox-buildsymbols-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127159" comment="MozillaFirefox-devel-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127160" comment="MozillaFirefox-translations-common-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127161" comment="MozillaFirefox-translations-other-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127162" comment="libfreebl3-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127163" comment="libfreebl3-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127164" comment="libsoftokn3-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127165" comment="libsoftokn3-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127166" comment="mozilla-nss-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127167" comment="mozilla-nss-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127168" comment="mozilla-nss-certs-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127169" comment="mozilla-nss-certs-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127170" comment="mozilla-nss-devel-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127171" comment="mozilla-nss-sysinit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127172" comment="mozilla-nss-sysinit-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127173" comment="mozilla-nss-tools-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2815</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2815" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2815.html">CVE-2016-2815</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2815">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2815">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2815">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2815">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2815">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2815">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2815">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2815">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2815">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2815">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2815">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2815">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2815">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2815">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2815">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2815">SUSE bug 983638</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128750" comment="MozillaFirefox-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128751" comment="MozillaFirefox-branding-upstream-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128752" comment="MozillaFirefox-buildsymbols-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128753" comment="MozillaFirefox-devel-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128754" comment="MozillaFirefox-translations-common-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128755" comment="MozillaFirefox-translations-other-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128756" comment="libfreebl3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128757" comment="libfreebl3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128758" comment="libsoftokn3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128759" comment="libsoftokn3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128760" comment="mozilla-nss-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128761" comment="mozilla-nss-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128762" comment="mozilla-nss-certs-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128763" comment="mozilla-nss-certs-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128764" comment="mozilla-nss-devel-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128765" comment="mozilla-nss-sysinit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128766" comment="mozilla-nss-sysinit-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128767" comment="mozilla-nss-tools-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2816</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2816" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2816" source="CVE"/>
    <description>
    Mozilla Firefox before 46.0 allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via the multipart/x-mixed-replace content type.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2816.html">CVE-2016-2816</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2816">SUSE bug 977382</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2816">SUSE bug 977382</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2816">SUSE bug 977382</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2816">SUSE bug 977382</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2816">SUSE bug 977382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127156" comment="MozillaFirefox-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127157" comment="MozillaFirefox-branding-upstream-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127158" comment="MozillaFirefox-buildsymbols-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127159" comment="MozillaFirefox-devel-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127160" comment="MozillaFirefox-translations-common-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127161" comment="MozillaFirefox-translations-other-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127162" comment="libfreebl3-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127163" comment="libfreebl3-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127164" comment="libsoftokn3-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127165" comment="libsoftokn3-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127166" comment="mozilla-nss-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127167" comment="mozilla-nss-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127168" comment="mozilla-nss-certs-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127169" comment="mozilla-nss-certs-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127170" comment="mozilla-nss-devel-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127171" comment="mozilla-nss-sysinit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127172" comment="mozilla-nss-sysinit-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127173" comment="mozilla-nss-tools-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2817</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2817" source="CVE"/>
    <description>
    The WebExtension sandbox feature in browser/components/extensions/ext-tabs.js in Mozilla Firefox before 46.0 does not properly restrict principal inheritance during chrome.tabs.create and chrome.tabs.update API calls, which allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted extension that accesses a (1) javascript: or (2) data: URL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2817.html">CVE-2016-2817</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2817">SUSE bug 977384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2817">SUSE bug 977384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2817">SUSE bug 977384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2817">SUSE bug 977384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2817">SUSE bug 977384</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2817">SUSE bug 977384</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127156" comment="MozillaFirefox-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127157" comment="MozillaFirefox-branding-upstream-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127158" comment="MozillaFirefox-buildsymbols-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127159" comment="MozillaFirefox-devel-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127160" comment="MozillaFirefox-translations-common-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127161" comment="MozillaFirefox-translations-other-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127162" comment="libfreebl3-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127163" comment="libfreebl3-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127164" comment="libsoftokn3-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127165" comment="libsoftokn3-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127166" comment="mozilla-nss-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127167" comment="mozilla-nss-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127168" comment="mozilla-nss-certs-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127169" comment="mozilla-nss-certs-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127170" comment="mozilla-nss-devel-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127171" comment="mozilla-nss-sysinit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127172" comment="mozilla-nss-sysinit-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127173" comment="mozilla-nss-tools-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2818</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2818" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2818.html">CVE-2016-2818</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2818">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2818">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2818">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2818">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2818">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2818">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2818">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2818">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2818">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2818">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2818">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2818">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2818">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2818">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2818">SUSE bug 983638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2818">SUSE bug 983638</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128750" comment="MozillaFirefox-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128751" comment="MozillaFirefox-branding-upstream-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128752" comment="MozillaFirefox-buildsymbols-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128753" comment="MozillaFirefox-devel-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128754" comment="MozillaFirefox-translations-common-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128755" comment="MozillaFirefox-translations-other-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129875" comment="MozillaThunderbird-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129876" comment="MozillaThunderbird-buildsymbols-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129877" comment="MozillaThunderbird-devel-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129878" comment="MozillaThunderbird-translations-common-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129879" comment="MozillaThunderbird-translations-other-45.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128756" comment="libfreebl3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128757" comment="libfreebl3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128758" comment="libsoftokn3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128759" comment="libsoftokn3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128760" comment="mozilla-nss-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128761" comment="mozilla-nss-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128762" comment="mozilla-nss-certs-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128763" comment="mozilla-nss-certs-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128764" comment="mozilla-nss-devel-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128765" comment="mozilla-nss-sysinit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128766" comment="mozilla-nss-sysinit-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128767" comment="mozilla-nss-tools-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2819</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2819" source="CVE"/>
    <description>
    Heap-based buffer overflow in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via foreign-context HTML5 fragments, as demonstrated by fragments within an SVG element.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2819.html">CVE-2016-2819</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2819">SUSE bug 983655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2819">SUSE bug 983655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2819">SUSE bug 983655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2819">SUSE bug 983655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2819">SUSE bug 983655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2819">SUSE bug 983655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2819">SUSE bug 983655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2819">SUSE bug 983655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2819">SUSE bug 983655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2819">SUSE bug 983655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2819">SUSE bug 983655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2819">SUSE bug 983655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2819">SUSE bug 983655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2819">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2819">SUSE bug 983655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2819">SUSE bug 983655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2819">SUSE bug 983655</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128750" comment="MozillaFirefox-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128751" comment="MozillaFirefox-branding-upstream-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128752" comment="MozillaFirefox-buildsymbols-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128753" comment="MozillaFirefox-devel-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128754" comment="MozillaFirefox-translations-common-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128755" comment="MozillaFirefox-translations-other-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128756" comment="libfreebl3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128757" comment="libfreebl3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128758" comment="libsoftokn3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128759" comment="libsoftokn3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128760" comment="mozilla-nss-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128761" comment="mozilla-nss-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128762" comment="mozilla-nss-certs-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128763" comment="mozilla-nss-certs-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128764" comment="mozilla-nss-devel-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128765" comment="mozilla-nss-sysinit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128766" comment="mozilla-nss-sysinit-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128767" comment="mozilla-nss-tools-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2820</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2820" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2820" source="CVE"/>
    <description>
    The Firefox Health Reports (aka FHR or about:healthreport) feature in Mozilla Firefox before 46.0 does not properly restrict the origin of events, which makes it easier for remote attackers to modify sharing preferences by leveraging access to the remote-report IFRAME element.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2820.html">CVE-2016-2820</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2820">SUSE bug 977388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2820">SUSE bug 977388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2820">SUSE bug 977388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2820">SUSE bug 977388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2820">SUSE bug 977388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2820">SUSE bug 977388</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127156" comment="MozillaFirefox-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127157" comment="MozillaFirefox-branding-upstream-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127158" comment="MozillaFirefox-buildsymbols-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127159" comment="MozillaFirefox-devel-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127160" comment="MozillaFirefox-translations-common-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127161" comment="MozillaFirefox-translations-other-46.0-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127162" comment="libfreebl3-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127163" comment="libfreebl3-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127164" comment="libsoftokn3-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127165" comment="libsoftokn3-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127166" comment="mozilla-nss-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127167" comment="mozilla-nss-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127168" comment="mozilla-nss-certs-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127169" comment="mozilla-nss-certs-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127170" comment="mozilla-nss-devel-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127171" comment="mozilla-nss-sysinit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127172" comment="mozilla-nss-sysinit-32bit-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127173" comment="mozilla-nss-tools-3.22.3-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2821</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2821" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2821" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::Element class in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2, when contenteditable mode is enabled, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by triggering deletion of DOM elements that were created in the editor.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2821.html">CVE-2016-2821</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2821">SUSE bug 983653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2821">SUSE bug 983653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2821">SUSE bug 983653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2821">SUSE bug 983653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2821">SUSE bug 983653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2821">SUSE bug 983653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2821">SUSE bug 983653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2821">SUSE bug 983653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2821">SUSE bug 983653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2821">SUSE bug 983653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2821">SUSE bug 983653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2821">SUSE bug 983653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2821">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2821">SUSE bug 983653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2821">SUSE bug 983653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2821">SUSE bug 983653</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128750" comment="MozillaFirefox-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128751" comment="MozillaFirefox-branding-upstream-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128752" comment="MozillaFirefox-buildsymbols-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128753" comment="MozillaFirefox-devel-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128754" comment="MozillaFirefox-translations-common-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128755" comment="MozillaFirefox-translations-other-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128756" comment="libfreebl3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128757" comment="libfreebl3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128758" comment="libsoftokn3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128759" comment="libsoftokn3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128760" comment="mozilla-nss-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128761" comment="mozilla-nss-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128762" comment="mozilla-nss-certs-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128763" comment="mozilla-nss-certs-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128764" comment="mozilla-nss-devel-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128765" comment="mozilla-nss-sysinit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128766" comment="mozilla-nss-sysinit-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128767" comment="mozilla-nss-tools-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2822</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2822" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2822" source="CVE"/>
    <description>
    Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to spoof the address bar via a SELECT element with a persistent menu.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2822.html">CVE-2016-2822</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2822">SUSE bug 983652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2822">SUSE bug 983652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2822">SUSE bug 983652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2822">SUSE bug 983652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2822">SUSE bug 983652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2822">SUSE bug 983652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2822">SUSE bug 983652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2822">SUSE bug 983652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2822">SUSE bug 983652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2822">SUSE bug 983652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2822">SUSE bug 983652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2822">SUSE bug 983652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2822">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2822">SUSE bug 983652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2822">SUSE bug 983652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2822">SUSE bug 983652</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128750" comment="MozillaFirefox-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128751" comment="MozillaFirefox-branding-upstream-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128752" comment="MozillaFirefox-buildsymbols-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128753" comment="MozillaFirefox-devel-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128754" comment="MozillaFirefox-translations-common-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128755" comment="MozillaFirefox-translations-other-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128756" comment="libfreebl3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128757" comment="libfreebl3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128758" comment="libsoftokn3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128759" comment="libsoftokn3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128760" comment="mozilla-nss-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128761" comment="mozilla-nss-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128762" comment="mozilla-nss-certs-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128763" comment="mozilla-nss-certs-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128764" comment="mozilla-nss-devel-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128765" comment="mozilla-nss-sysinit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128766" comment="mozilla-nss-sysinit-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128767" comment="mozilla-nss-tools-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2824</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2824" source="CVE"/>
    <description>
    The TSymbolTableLevel class in ANGLE, as used in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 on Windows, allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact by triggering use of a WebGL shader that writes to an array.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2824.html">CVE-2016-2824</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2824">SUSE bug 983651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2824">SUSE bug 983651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2824">SUSE bug 983651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2824">SUSE bug 983651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2824">SUSE bug 983651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2824">SUSE bug 983651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2824">SUSE bug 983651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2824">SUSE bug 983651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2824">SUSE bug 983651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2824">SUSE bug 983651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2824">SUSE bug 983651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2824">SUSE bug 983651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2824">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2824">SUSE bug 983651</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128750" comment="MozillaFirefox-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128751" comment="MozillaFirefox-branding-upstream-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128752" comment="MozillaFirefox-buildsymbols-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128753" comment="MozillaFirefox-devel-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128754" comment="MozillaFirefox-translations-common-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128755" comment="MozillaFirefox-translations-other-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128756" comment="libfreebl3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128757" comment="libfreebl3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128758" comment="libsoftokn3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128759" comment="libsoftokn3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128760" comment="mozilla-nss-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128761" comment="mozilla-nss-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128762" comment="mozilla-nss-certs-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128763" comment="mozilla-nss-certs-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128764" comment="mozilla-nss-devel-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128765" comment="mozilla-nss-sysinit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128766" comment="mozilla-nss-sysinit-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128767" comment="mozilla-nss-tools-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2825</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2825" source="CVE"/>
    <description>
    Mozilla Firefox before 47.0 allows remote attackers to bypass the Same Origin Policy and modify the location.host property via an invalid data: URL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2825.html">CVE-2016-2825</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2825">SUSE bug 983649</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2825">SUSE bug 983649</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2825">SUSE bug 983649</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2825">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2825">SUSE bug 983649</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128750" comment="MozillaFirefox-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128751" comment="MozillaFirefox-branding-upstream-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128752" comment="MozillaFirefox-buildsymbols-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128753" comment="MozillaFirefox-devel-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128754" comment="MozillaFirefox-translations-common-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128755" comment="MozillaFirefox-translations-other-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128756" comment="libfreebl3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128757" comment="libfreebl3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128758" comment="libsoftokn3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128759" comment="libsoftokn3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128760" comment="mozilla-nss-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128761" comment="mozilla-nss-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128762" comment="mozilla-nss-certs-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128763" comment="mozilla-nss-certs-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128764" comment="mozilla-nss-devel-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128765" comment="mozilla-nss-sysinit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128766" comment="mozilla-nss-sysinit-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128767" comment="mozilla-nss-tools-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2827</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2827" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2827" source="CVE"/>
    <description>
    The mozilla::net::IsValidReferrerPolicy function in Mozilla Firefox before 49.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a Content Security Policy (CSP) referrer directive with zero values.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2827.html">CVE-2016-2827</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2827">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2827">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2827">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2827">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2827">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2827">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133578" comment="MozillaFirefox-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133579" comment="MozillaFirefox-branding-upstream-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133580" comment="MozillaFirefox-buildsymbols-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133581" comment="MozillaFirefox-devel-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133582" comment="MozillaFirefox-translations-common-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133583" comment="MozillaFirefox-translations-other-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133584" comment="libfreebl3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133585" comment="libfreebl3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133586" comment="libsoftokn3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133587" comment="libsoftokn3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133588" comment="mozilla-nss-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133589" comment="mozilla-nss-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133590" comment="mozilla-nss-certs-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133591" comment="mozilla-nss-certs-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133592" comment="mozilla-nss-devel-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133593" comment="mozilla-nss-sysinit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133594" comment="mozilla-nss-sysinit-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133595" comment="mozilla-nss-tools-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2828</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2828" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2828" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via WebGL content that triggers texture access after destruction of the texture's recycle pool.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2828.html">CVE-2016-2828</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2828">SUSE bug 983646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2828">SUSE bug 983646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2828">SUSE bug 983646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2828">SUSE bug 983646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2828">SUSE bug 983646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2828">SUSE bug 983646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2828">SUSE bug 983646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2828">SUSE bug 983646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2828">SUSE bug 983646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2828">SUSE bug 983646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2828">SUSE bug 983646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2828">SUSE bug 983646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2828">SUSE bug 983646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2828">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2828">SUSE bug 983646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2828">SUSE bug 983646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2828">SUSE bug 983646</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128750" comment="MozillaFirefox-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128751" comment="MozillaFirefox-branding-upstream-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128752" comment="MozillaFirefox-buildsymbols-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128753" comment="MozillaFirefox-devel-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128754" comment="MozillaFirefox-translations-common-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128755" comment="MozillaFirefox-translations-other-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128756" comment="libfreebl3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128757" comment="libfreebl3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128758" comment="libsoftokn3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128759" comment="libsoftokn3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128760" comment="mozilla-nss-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128761" comment="mozilla-nss-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128762" comment="mozilla-nss-certs-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128763" comment="mozilla-nss-certs-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128764" comment="mozilla-nss-devel-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128765" comment="mozilla-nss-sysinit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128766" comment="mozilla-nss-sysinit-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128767" comment="mozilla-nss-tools-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2829</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2829" source="CVE"/>
    <description>
    Mozilla Firefox before 47.0 allows remote attackers to spoof permission notifications via a crafted web site that rapidly triggers permission requests, as demonstrated by the microphone permission or the geolocation permission.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2829.html">CVE-2016-2829</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2829">SUSE bug 983644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2829">SUSE bug 983644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2829">SUSE bug 983644</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2829">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2829">SUSE bug 983644</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128750" comment="MozillaFirefox-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128751" comment="MozillaFirefox-branding-upstream-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128752" comment="MozillaFirefox-buildsymbols-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128753" comment="MozillaFirefox-devel-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128754" comment="MozillaFirefox-translations-common-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128755" comment="MozillaFirefox-translations-other-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128756" comment="libfreebl3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128757" comment="libfreebl3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128758" comment="libsoftokn3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128759" comment="libsoftokn3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128760" comment="mozilla-nss-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128761" comment="mozilla-nss-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128762" comment="mozilla-nss-certs-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128763" comment="mozilla-nss-certs-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128764" comment="mozilla-nss-devel-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128765" comment="mozilla-nss-sysinit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128766" comment="mozilla-nss-sysinit-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128767" comment="mozilla-nss-tools-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2830</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2830" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 preserve the network connection used for favicon resource retrieval after the associated browser window is closed, which makes it easier for remote web servers to track users by observing network traffic from multiple IP addresses.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2830.html">CVE-2016-2830</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2830">SUSE bug 983922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2830">SUSE bug 983922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2830">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2830">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2830">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2830">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2830">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2830">SUSE bug 983922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2830">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2830">SUSE bug 983922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2830">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2830">SUSE bug 983922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2830">SUSE bug 983922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2830">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2830">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2830">SUSE bug 983922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2830">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133410" comment="MozillaThunderbird-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133411" comment="MozillaThunderbird-buildsymbols-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133412" comment="MozillaThunderbird-devel-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133413" comment="MozillaThunderbird-translations-common-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133414" comment="MozillaThunderbird-translations-other-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2831</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2831" source="CVE"/>
    <description>
    Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 do not ensure that the user approves the fullscreen and pointerlock settings, which allows remote attackers to cause a denial of service (UI outage), or conduct clickjacking or spoofing attacks, via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2831.html">CVE-2016-2831</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2831">SUSE bug 983632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2831">SUSE bug 983643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2831">SUSE bug 983643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2831">SUSE bug 983643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2831">SUSE bug 983643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2831">SUSE bug 983643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2831">SUSE bug 983643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2831">SUSE bug 983643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2831">SUSE bug 983643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2831">SUSE bug 983643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2831">SUSE bug 983643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2831">SUSE bug 983643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2831">SUSE bug 983643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2831">SUSE bug 983643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2831">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2831">SUSE bug 983643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2831">SUSE bug 983643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2831">SUSE bug 983643</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128750" comment="MozillaFirefox-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128751" comment="MozillaFirefox-branding-upstream-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128752" comment="MozillaFirefox-buildsymbols-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128753" comment="MozillaFirefox-devel-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128754" comment="MozillaFirefox-translations-common-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128755" comment="MozillaFirefox-translations-other-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128756" comment="libfreebl3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128757" comment="libfreebl3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128758" comment="libsoftokn3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128759" comment="libsoftokn3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128760" comment="mozilla-nss-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128761" comment="mozilla-nss-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128762" comment="mozilla-nss-certs-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128763" comment="mozilla-nss-certs-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128764" comment="mozilla-nss-devel-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128765" comment="mozilla-nss-sysinit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128766" comment="mozilla-nss-sysinit-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128767" comment="mozilla-nss-tools-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2832</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2832" source="CVE"/>
    <description>
    Mozilla Firefox before 47.0 allows remote attackers to discover the list of disabled plugins via a fingerprinting attack involving Cascading Style Sheets (CSS) pseudo-classes.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2832.html">CVE-2016-2832</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2832">SUSE bug 983632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2832">SUSE bug 983632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2832">SUSE bug 983632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2832">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2832">SUSE bug 983632</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128750" comment="MozillaFirefox-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128751" comment="MozillaFirefox-branding-upstream-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128752" comment="MozillaFirefox-buildsymbols-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128753" comment="MozillaFirefox-devel-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128754" comment="MozillaFirefox-translations-common-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128755" comment="MozillaFirefox-translations-other-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128756" comment="libfreebl3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128757" comment="libfreebl3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128758" comment="libsoftokn3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128759" comment="libsoftokn3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128760" comment="mozilla-nss-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128761" comment="mozilla-nss-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128762" comment="mozilla-nss-certs-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128763" comment="mozilla-nss-certs-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128764" comment="mozilla-nss-devel-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128765" comment="mozilla-nss-sysinit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128766" comment="mozilla-nss-sysinit-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128767" comment="mozilla-nss-tools-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2833</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2833" source="CVE"/>
    <description>
    Mozilla Firefox before 47.0 ignores Content Security Policy (CSP) directives for cross-domain Java applets, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted applet.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2833.html">CVE-2016-2833</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2833">SUSE bug 983640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2833">SUSE bug 983640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2833">SUSE bug 983640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2833">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2833">SUSE bug 983640</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128750" comment="MozillaFirefox-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128751" comment="MozillaFirefox-branding-upstream-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128752" comment="MozillaFirefox-buildsymbols-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128753" comment="MozillaFirefox-devel-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128754" comment="MozillaFirefox-translations-common-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128755" comment="MozillaFirefox-translations-other-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128756" comment="libfreebl3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128757" comment="libfreebl3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128758" comment="libsoftokn3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128759" comment="libsoftokn3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128760" comment="mozilla-nss-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128761" comment="mozilla-nss-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128762" comment="mozilla-nss-certs-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128763" comment="mozilla-nss-certs-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128764" comment="mozilla-nss-devel-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128765" comment="mozilla-nss-sysinit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128766" comment="mozilla-nss-sysinit-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128767" comment="mozilla-nss-tools-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2834</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2834" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox before 47.0, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2834.html">CVE-2016-2834</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2834">SUSE bug 983639</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128750" comment="MozillaFirefox-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128751" comment="MozillaFirefox-branding-upstream-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128752" comment="MozillaFirefox-buildsymbols-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128753" comment="MozillaFirefox-devel-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128754" comment="MozillaFirefox-translations-common-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128755" comment="MozillaFirefox-translations-other-47.0-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128756" comment="libfreebl3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128757" comment="libfreebl3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128758" comment="libsoftokn3-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128759" comment="libsoftokn3-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128760" comment="mozilla-nss-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128761" comment="mozilla-nss-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128762" comment="mozilla-nss-certs-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128763" comment="mozilla-nss-certs-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128764" comment="mozilla-nss-devel-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128765" comment="mozilla-nss-sysinit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128766" comment="mozilla-nss-sysinit-32bit-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128767" comment="mozilla-nss-tools-3.23-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2835</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2835" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2835.html">CVE-2016-2835</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2835">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2835">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2835">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2835">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2835">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2835">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2835">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2835">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2835">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2835">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2836</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2836" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to Http2Session::Shutdown and SpdySession31::Shutdown, and other vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2836.html">CVE-2016-2836</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2836">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2836">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2836">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2836">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2836">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2836">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2836">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2836">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2836">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2836">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133410" comment="MozillaThunderbird-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133411" comment="MozillaThunderbird-buildsymbols-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133412" comment="MozillaThunderbird-devel-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133413" comment="MozillaThunderbird-translations-common-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133414" comment="MozillaThunderbird-translations-other-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2837</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2837" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ClearKey Content Decryption Module (CDM) in the Encrypted Media Extensions (EME) API in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 might allow remote attackers to execute arbitrary code by providing a malformed video and leveraging a Gecko Media Plugin (GMP) sandbox bypass.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2837.html">CVE-2016-2837</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2837">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2837">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2837">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2837">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2837">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2837">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2837">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2837">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2837">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2837">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133410" comment="MozillaThunderbird-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133411" comment="MozillaThunderbird-buildsymbols-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133412" comment="MozillaThunderbird-devel-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133413" comment="MozillaThunderbird-translations-common-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133414" comment="MozillaThunderbird-translations-other-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2838</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2838" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsBidi::BracketData::AddOpening function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via directional content in an SVG document.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2838.html">CVE-2016-2838</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2838">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2838">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2838">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2838">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2838">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2838">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2838">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2838">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2838">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2838">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133410" comment="MozillaThunderbird-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133411" comment="MozillaThunderbird-buildsymbols-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133412" comment="MozillaThunderbird-devel-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133413" comment="MozillaThunderbird-translations-common-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133414" comment="MozillaThunderbird-translations-other-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2839</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2839" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 on Linux make cairo _cairo_surface_get_extents calls that do not properly interact with libav header allocation in FFmpeg 0.10, which allows remote attackers to cause a denial of service (application crash) via a crafted video.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2839.html">CVE-2016-2839</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2839">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2839">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2839">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2839">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2839">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2839">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2839">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2839">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2839">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2839">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133410" comment="MozillaThunderbird-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133411" comment="MozillaThunderbird-buildsymbols-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133412" comment="MozillaThunderbird-devel-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133413" comment="MozillaThunderbird-translations-common-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133414" comment="MozillaThunderbird-translations-other-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2841</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2841" source="CVE"/>
    <description>
    The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2841.html">CVE-2016-2841</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2841">SUSE bug 969350</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2841">SUSE bug 969351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2841">SUSE bug 969350</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2841">SUSE bug 969351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2841">SUSE bug 969351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2841">SUSE bug 969350</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2841">SUSE bug 969350</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2841">SUSE bug 969351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2841">SUSE bug 969350</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2841">SUSE bug 969351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2841">SUSE bug 969350</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2841">SUSE bug 969350</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2847</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2847" source="CVE"/>
    <description>
    fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2847.html">CVE-2016-2847</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 974646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2847">SUSE bug 970948</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134384" comment="drbd-8.4.6-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134385" comment="drbd-kmp-default-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134386" comment="drbd-kmp-pv-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134387" comment="drbd-kmp-xen-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134388" comment="hdjmod-1.28-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134389" comment="hdjmod-kmp-default-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134390" comment="hdjmod-kmp-pae-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134391" comment="hdjmod-kmp-pv-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134392" comment="hdjmod-kmp-xen-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134393" comment="ipset-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134394" comment="ipset-devel-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134395" comment="ipset-kmp-default-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134396" comment="ipset-kmp-pae-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134397" comment="ipset-kmp-pv-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134398" comment="ipset-kmp-xen-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134399" comment="kernel-debug-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134400" comment="kernel-debug-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134401" comment="kernel-debug-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134402" comment="kernel-default-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134403" comment="kernel-default-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134404" comment="kernel-default-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134405" comment="kernel-devel-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134406" comment="kernel-docs-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134407" comment="kernel-docs-html-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134408" comment="kernel-docs-pdf-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134409" comment="kernel-ec2-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134410" comment="kernel-ec2-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134411" comment="kernel-ec2-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134412" comment="kernel-macros-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134413" comment="kernel-obs-build-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134414" comment="kernel-obs-qa-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134415" comment="kernel-obs-qa-xen-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134416" comment="kernel-pae-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134417" comment="kernel-pae-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134418" comment="kernel-pae-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134419" comment="kernel-pv-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134420" comment="kernel-pv-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134421" comment="kernel-pv-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134422" comment="kernel-source-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134423" comment="kernel-source-vanilla-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134424" comment="kernel-syms-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134425" comment="kernel-vanilla-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134426" comment="kernel-vanilla-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134427" comment="kernel-xen-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134428" comment="kernel-xen-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134429" comment="kernel-xen-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134430" comment="libipset3-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134431" comment="lttng-modules-2.7.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134432" comment="lttng-modules-kmp-default-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134433" comment="lttng-modules-kmp-pv-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134434" comment="pcfclock-0.44-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134435" comment="pcfclock-kmp-default-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134436" comment="pcfclock-kmp-pae-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134437" comment="pcfclock-kmp-pv-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134438" comment="vhba-kmp-20140928-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134439" comment="vhba-kmp-default-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134440" comment="vhba-kmp-pae-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134441" comment="vhba-kmp-pv-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134442" comment="vhba-kmp-xen-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2851</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2851" source="CVE"/>
    <description>
    Integer overflow in proto.c in libotr before 4.1.1 on 64-bit platforms allows remote attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via a series of large OTR messages, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2851.html">CVE-2016-2851</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2851">SUSE bug 969785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2851">SUSE bug 969785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2851">SUSE bug 969785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2851">SUSE bug 969785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2851">SUSE bug 969785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2851">SUSE bug 969785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2851">SUSE bug 969785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2851">SUSE bug 969785</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124494" comment="libotr-4.1.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153626" comment="libotr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124495" comment="libotr-devel-4.1.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153627" comment="libotr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124496" comment="libotr-tools-4.1.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153628" comment="libotr-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124497" comment="libotr2-3.2.1-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153629" comment="libotr2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124498" comment="libotr2-devel-3.2.1-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153630" comment="libotr2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124499" comment="libotr2-tools-3.2.1-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153631" comment="libotr2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124500" comment="libotr5-4.1.1-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153632" comment="libotr5 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2857</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2857" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2857" source="CVE"/>
    <description>
    The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2857.html">CVE-2016-2857</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2857">SUSE bug 970037</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2857">SUSE bug 970037</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2857">SUSE bug 970037</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2857">SUSE bug 970037</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2857">SUSE bug 970037</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2857">SUSE bug 970037</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2858</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-2858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2858" source="CVE"/>
    <description>
    QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-2858.html">CVE-2016-2858</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2858">SUSE bug 970036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2858">SUSE bug 970036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2858">SUSE bug 970036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2858">SUSE bug 970036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2858">SUSE bug 970036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-2858">SUSE bug 970036</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3062</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3062" source="CVE"/>
    <description>
    The mov_read_dref function in libavformat/mov.c in Libav before 11.7 and FFmpeg before 0.11 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via the entries value in a dref box in an MP4 file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3062.html">CVE-2016-3062</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3062">SUSE bug 984487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3062">SUSE bug 984487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3062">SUSE bug 984487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3062">SUSE bug 984487</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129325" comment="libav-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152999" comment="libav is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129326" comment="libav-tools-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153000" comment="libav-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129327" comment="libavcodec-libav-devel-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153001" comment="libavcodec-libav-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129328" comment="libavcodec-libav56-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153002" comment="libavcodec-libav56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129329" comment="libavdevice-libav-devel-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153003" comment="libavdevice-libav-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129330" comment="libavdevice-libav55-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153004" comment="libavdevice-libav55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129331" comment="libavfilter-libav-devel-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153005" comment="libavfilter-libav-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129332" comment="libavfilter-libav5-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153006" comment="libavfilter-libav5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129333" comment="libavformat-libav-devel-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153007" comment="libavformat-libav-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129334" comment="libavformat-libav56-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153008" comment="libavformat-libav56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129335" comment="libavresample-libav-devel-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153009" comment="libavresample-libav-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129336" comment="libavresample-libav2-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153010" comment="libavresample-libav2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129337" comment="libavutil-libav-devel-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153011" comment="libavutil-libav-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129338" comment="libavutil-libav54-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153012" comment="libavutil-libav54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129339" comment="libswscale-libav-devel-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153013" comment="libswscale-libav-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129340" comment="libswscale-libav3-11.4-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153014" comment="libswscale-libav3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3068</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3068" source="CVE"/>
    <description>
    Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a crafted git ext:: URL when cloning a subrepository.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3068.html">CVE-2016-3068</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3068">SUSE bug 973177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3068">SUSE bug 973175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3068">SUSE bug 973177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3068">SUSE bug 973177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3068">SUSE bug 973177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3068">SUSE bug 973177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3068">SUSE bug 973177</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126360" comment="mercurial-3.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153633" comment="mercurial is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126361" comment="mercurial-lang-3.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153634" comment="mercurial-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3069</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3069" source="CVE"/>
    <description>
    Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a crafted name when converting a Git repository.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3069.html">CVE-2016-3069</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3069">SUSE bug 973176</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3069">SUSE bug 973175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3069">SUSE bug 973176</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3069">SUSE bug 973176</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3069">SUSE bug 973176</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3069">SUSE bug 973176</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126360" comment="mercurial-3.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153633" comment="mercurial is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126361" comment="mercurial-lang-3.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153634" comment="mercurial-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3075</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075" source="CVE"/>
    <description>
    Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3075.html">CVE-2016-3075</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3075">SUSE bug 973164</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129885" comment="glibc-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129886" comment="glibc-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129887" comment="glibc-devel-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129888" comment="glibc-devel-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152566" comment="glibc-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129889" comment="glibc-devel-static-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129890" comment="glibc-devel-static-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152568" comment="glibc-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129891" comment="glibc-extra-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129892" comment="glibc-html-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129893" comment="glibc-i18ndata-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129894" comment="glibc-info-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129895" comment="glibc-locale-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129896" comment="glibc-locale-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129897" comment="glibc-obsolete-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152571" comment="glibc-obsolete is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129898" comment="glibc-profile-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129899" comment="glibc-profile-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152573" comment="glibc-profile-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129900" comment="glibc-testsuite-2.19-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152574" comment="glibc-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129901" comment="glibc-utils-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129902" comment="glibc-utils-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152576" comment="glibc-utils-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129903" comment="nscd-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3092</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092" source="CVE"/>
    <description>
    The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3092.html">CVE-2016-3092</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3092">SUSE bug 986359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3092">SUSE bug 986359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3092">SUSE bug 986359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3092">SUSE bug 986359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3092">SUSE bug 988489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3092">SUSE bug 986359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3092">SUSE bug 988489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3092">SUSE bug 986359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3092">SUSE bug 986359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3092">SUSE bug 986359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3092">SUSE bug 986359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3092">SUSE bug 986359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3092">SUSE bug 986359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3092">SUSE bug 986359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3092">SUSE bug 986359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3092">SUSE bug 986359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3092">SUSE bug 986359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3092">SUSE bug 986359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3092">SUSE bug 986359</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3092">SUSE bug 1068865</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134314" comment="tomcat-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134315" comment="tomcat-admin-webapps-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134316" comment="tomcat-docs-webapp-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134317" comment="tomcat-el-3_0-api-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134318" comment="tomcat-embed-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134319" comment="tomcat-javadoc-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134320" comment="tomcat-jsp-2_3-api-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134321" comment="tomcat-jsvc-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134322" comment="tomcat-lib-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134323" comment="tomcat-servlet-3_1-api-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152853" comment="tomcat-servlet-3_1-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134324" comment="tomcat-webapps-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3100</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3100" source="CVE"/>
    <description>
    kinit in KDE Frameworks before 5.23.0 uses weak permissions (644) for /tmp/xauth-xxx-_y, which allows local users to obtain X11 cookies of other users and consequently capture keystrokes and possibly gain privileges by reading the file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3100.html">CVE-2016-3100</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3100">SUSE bug 983926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3100">SUSE bug 983926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3100">SUSE bug 983926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3100">SUSE bug 983926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3100">SUSE bug 983926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3100">SUSE bug 983926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3100">SUSE bug 983926</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129704" comment="kinit-5.21.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153635" comment="kinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129705" comment="kinit-32bit-5.21.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153636" comment="kinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129706" comment="kinit-devel-5.21.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153637" comment="kinit-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129707" comment="kinit-lang-5.21.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153638" comment="kinit-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3105</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3105" source="CVE"/>
    <description>
    The convert extension in Mercurial before 3.8 might allow context-dependent attackers to execute arbitrary code via a crafted git repository name.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3105.html">CVE-2016-3105</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3105">SUSE bug 978391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3105">SUSE bug 978391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3105">SUSE bug 978391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3105">SUSE bug 978391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3105">SUSE bug 978391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127812" comment="mercurial-3.5.1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153633" comment="mercurial is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127813" comment="mercurial-lang-3.5.1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153634" comment="mercurial-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3115</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3115" source="CVE"/>
    <description>
    Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3115.html">CVE-2016-3115</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 992296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 992296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 992296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 992991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 992296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 996040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 992296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 992296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 992296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 996040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 996040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 992296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 996040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 996040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 992296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 996040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 996040</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 1005738</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 992296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 992296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 992296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 992296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 970632</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 1087412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3115">SUSE bug 1087412</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128339" comment="openssh-6.6p1-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128340" comment="openssh-askpass-gnome-6.6p1-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153167" comment="openssh-askpass-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128341" comment="openssh-cavs-6.6p1-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153168" comment="openssh-cavs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128342" comment="openssh-fips-6.6p1-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153169" comment="openssh-fips is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128343" comment="openssh-helpers-6.6p1-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152111" comment="openssh-helpers is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3116</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3116" source="CVE"/>
    <description>
    CRLF injection vulnerability in Dropbear SSH before 2016.72 allows remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3116.html">CVE-2016-3116</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3116">SUSE bug 970633</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3116">SUSE bug 970633</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3116">SUSE bug 970633</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3116">SUSE bug 970633</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3116">SUSE bug 970633</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125352" comment="dropbear-2016.72-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153639" comment="dropbear is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3119</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3119" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119" source="CVE"/>
    <description>
    The process_db_args function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) through 1.13.4 and 1.14.x through 1.14.1 mishandles the DB argument, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request to modify a principal.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3119.html">CVE-2016-3119</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3119">SUSE bug 971942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3119">SUSE bug 971942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3119">SUSE bug 971942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3119">SUSE bug 971942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3119">SUSE bug 971942</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3119">SUSE bug 971942</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126416" comment="krb5-1.12.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126417" comment="krb5-32bit-1.12.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126418" comment="krb5-client-1.12.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126419" comment="krb5-devel-1.12.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126420" comment="krb5-devel-32bit-1.12.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152677" comment="krb5-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126421" comment="krb5-doc-1.12.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152678" comment="krb5-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126422" comment="krb5-mini-1.12.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152679" comment="krb5-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126423" comment="krb5-mini-devel-1.12.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152680" comment="krb5-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126424" comment="krb5-plugin-kdb-ldap-1.12.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152681" comment="krb5-plugin-kdb-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126425" comment="krb5-plugin-preauth-otp-1.12.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152682" comment="krb5-plugin-preauth-otp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126426" comment="krb5-plugin-preauth-pkinit-1.12.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152683" comment="krb5-plugin-preauth-pkinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126427" comment="krb5-server-1.12.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152684" comment="krb5-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3120</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3120" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120" source="CVE"/>
    <description>
    The validate_as_request function in kdc_util.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.13.6 and 1.4.x before 1.14.3, when restrict_anonymous_to_tgt is enabled, uses an incorrect client data structure, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an S4U2Self request.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3120.html">CVE-2016-3120</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3120">SUSE bug 991088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3120">SUSE bug 991088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3120">SUSE bug 991088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3120">SUSE bug 991088</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134339" comment="krb5-1.12.1-36.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134340" comment="krb5-32bit-1.12.1-36.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134341" comment="krb5-client-1.12.1-36.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134342" comment="krb5-devel-1.12.1-36.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134343" comment="krb5-devel-32bit-1.12.1-36.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152677" comment="krb5-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134344" comment="krb5-doc-1.12.1-36.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152678" comment="krb5-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134345" comment="krb5-mini-1.12.1-36.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152679" comment="krb5-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134346" comment="krb5-mini-devel-1.12.1-36.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152680" comment="krb5-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134347" comment="krb5-plugin-kdb-ldap-1.12.1-36.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152681" comment="krb5-plugin-kdb-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134348" comment="krb5-plugin-preauth-otp-1.12.1-36.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152682" comment="krb5-plugin-preauth-otp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134349" comment="krb5-plugin-preauth-pkinit-1.12.1-36.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152683" comment="krb5-plugin-preauth-pkinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134350" comment="krb5-server-1.12.1-36.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152684" comment="krb5-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3125</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3125" source="CVE"/>
    <description>
    The mod_tls module in ProFTPD before 1.3.5b and 1.3.6 before 1.3.6rc2 does not properly handle the TLSDHParamFile directive, which might cause a weaker than intended Diffie-Hellman (DH) key to be used and consequently allow attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3125.html">CVE-2016-3125</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3125">SUSE bug 970890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3125">SUSE bug 970890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3125">SUSE bug 970890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3125">SUSE bug 970890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3125">SUSE bug 970890</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127762" comment="proftpd-1.3.5b-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153640" comment="proftpd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127763" comment="proftpd-devel-1.3.5b-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153641" comment="proftpd-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127764" comment="proftpd-doc-1.3.5b-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153642" comment="proftpd-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127765" comment="proftpd-lang-1.3.5b-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153643" comment="proftpd-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127766" comment="proftpd-ldap-1.3.5b-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153644" comment="proftpd-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127767" comment="proftpd-mysql-1.3.5b-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153645" comment="proftpd-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127768" comment="proftpd-pgsql-1.3.5b-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153646" comment="proftpd-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127769" comment="proftpd-radius-1.3.5b-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153647" comment="proftpd-radius is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127770" comment="proftpd-sqlite-1.3.5b-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153648" comment="proftpd-sqlite is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3134</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3134" source="CVE"/>
    <description>
    The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3134.html">CVE-2016-3134</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971793</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971793</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971793</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971793</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971793</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971793</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 986365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971793</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971793</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971793</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971793</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971793</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971793</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3134">SUSE bug 971793</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134384" comment="drbd-8.4.6-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134385" comment="drbd-kmp-default-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134386" comment="drbd-kmp-pv-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134387" comment="drbd-kmp-xen-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134388" comment="hdjmod-1.28-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134389" comment="hdjmod-kmp-default-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134390" comment="hdjmod-kmp-pae-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134391" comment="hdjmod-kmp-pv-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134392" comment="hdjmod-kmp-xen-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134393" comment="ipset-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134394" comment="ipset-devel-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134395" comment="ipset-kmp-default-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134396" comment="ipset-kmp-pae-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134397" comment="ipset-kmp-pv-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134398" comment="ipset-kmp-xen-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134399" comment="kernel-debug-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134400" comment="kernel-debug-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134401" comment="kernel-debug-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134402" comment="kernel-default-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134403" comment="kernel-default-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134404" comment="kernel-default-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134405" comment="kernel-devel-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134406" comment="kernel-docs-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134407" comment="kernel-docs-html-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134408" comment="kernel-docs-pdf-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134409" comment="kernel-ec2-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134410" comment="kernel-ec2-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134411" comment="kernel-ec2-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134412" comment="kernel-macros-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134413" comment="kernel-obs-build-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134414" comment="kernel-obs-qa-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134415" comment="kernel-obs-qa-xen-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134416" comment="kernel-pae-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134417" comment="kernel-pae-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134418" comment="kernel-pae-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134419" comment="kernel-pv-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134420" comment="kernel-pv-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134421" comment="kernel-pv-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134422" comment="kernel-source-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134423" comment="kernel-source-vanilla-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134424" comment="kernel-syms-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134425" comment="kernel-vanilla-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134426" comment="kernel-vanilla-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134427" comment="kernel-xen-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134428" comment="kernel-xen-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134429" comment="kernel-xen-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134430" comment="libipset3-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134431" comment="lttng-modules-2.7.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134432" comment="lttng-modules-kmp-default-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134433" comment="lttng-modules-kmp-pv-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134434" comment="pcfclock-0.44-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134435" comment="pcfclock-kmp-default-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134436" comment="pcfclock-kmp-pae-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134437" comment="pcfclock-kmp-pv-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134438" comment="vhba-kmp-20140928-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134439" comment="vhba-kmp-default-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134440" comment="vhba-kmp-pae-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134441" comment="vhba-kmp-pv-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134442" comment="vhba-kmp-xen-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3136</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3136" source="CVE"/>
    <description>
    The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3136.html">CVE-2016-3136</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3136">SUSE bug 970955</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128019" comment="kernel-debug-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128020" comment="kernel-debug-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128021" comment="kernel-debug-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128022" comment="kernel-default-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128023" comment="kernel-default-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128024" comment="kernel-default-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128025" comment="kernel-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128026" comment="kernel-docs-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128027" comment="kernel-docs-html-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128028" comment="kernel-docs-pdf-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128029" comment="kernel-ec2-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128030" comment="kernel-ec2-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128031" comment="kernel-ec2-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128032" comment="kernel-macros-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128033" comment="kernel-obs-build-4.1.21-14.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128034" comment="kernel-obs-qa-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128035" comment="kernel-obs-qa-xen-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128036" comment="kernel-pae-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128037" comment="kernel-pae-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128038" comment="kernel-pae-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128039" comment="kernel-pv-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128040" comment="kernel-pv-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128041" comment="kernel-pv-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128042" comment="kernel-source-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128043" comment="kernel-source-vanilla-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128044" comment="kernel-syms-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128045" comment="kernel-vanilla-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128046" comment="kernel-vanilla-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128047" comment="kernel-xen-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128048" comment="kernel-xen-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128049" comment="kernel-xen-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3137</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3137" source="CVE"/>
    <description>
    drivers/usb/serial/cypress_m8.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3137.html">CVE-2016-3137</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3137">SUSE bug 970970</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128019" comment="kernel-debug-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128020" comment="kernel-debug-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128021" comment="kernel-debug-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128022" comment="kernel-default-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128023" comment="kernel-default-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128024" comment="kernel-default-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128025" comment="kernel-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128026" comment="kernel-docs-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128027" comment="kernel-docs-html-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128028" comment="kernel-docs-pdf-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128029" comment="kernel-ec2-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128030" comment="kernel-ec2-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128031" comment="kernel-ec2-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128032" comment="kernel-macros-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128033" comment="kernel-obs-build-4.1.21-14.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128034" comment="kernel-obs-qa-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128035" comment="kernel-obs-qa-xen-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128036" comment="kernel-pae-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128037" comment="kernel-pae-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128038" comment="kernel-pae-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128039" comment="kernel-pv-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128040" comment="kernel-pv-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128041" comment="kernel-pv-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128042" comment="kernel-source-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128043" comment="kernel-source-vanilla-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128044" comment="kernel-syms-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128045" comment="kernel-vanilla-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128046" comment="kernel-vanilla-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128047" comment="kernel-xen-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128048" comment="kernel-xen-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128049" comment="kernel-xen-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3138</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3138" source="CVE"/>
    <description>
    The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3138.html">CVE-2016-3138</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970970</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3138">SUSE bug 970911</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128019" comment="kernel-debug-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128020" comment="kernel-debug-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128021" comment="kernel-debug-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128022" comment="kernel-default-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128023" comment="kernel-default-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128024" comment="kernel-default-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128025" comment="kernel-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128026" comment="kernel-docs-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128027" comment="kernel-docs-html-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128028" comment="kernel-docs-pdf-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128029" comment="kernel-ec2-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128030" comment="kernel-ec2-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128031" comment="kernel-ec2-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128032" comment="kernel-macros-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128033" comment="kernel-obs-build-4.1.21-14.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128034" comment="kernel-obs-qa-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128035" comment="kernel-obs-qa-xen-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128036" comment="kernel-pae-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128037" comment="kernel-pae-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128038" comment="kernel-pae-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128039" comment="kernel-pv-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128040" comment="kernel-pv-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128041" comment="kernel-pv-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128042" comment="kernel-source-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128043" comment="kernel-source-vanilla-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128044" comment="kernel-syms-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128045" comment="kernel-vanilla-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128046" comment="kernel-vanilla-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128047" comment="kernel-xen-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128048" comment="kernel-xen-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128049" comment="kernel-xen-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3140</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3140" source="CVE"/>
    <description>
    The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3140.html">CVE-2016-3140</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3140">SUSE bug 970892</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128019" comment="kernel-debug-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128020" comment="kernel-debug-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128021" comment="kernel-debug-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128022" comment="kernel-default-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128023" comment="kernel-default-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128024" comment="kernel-default-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128025" comment="kernel-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128026" comment="kernel-docs-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128027" comment="kernel-docs-html-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128028" comment="kernel-docs-pdf-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128029" comment="kernel-ec2-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128030" comment="kernel-ec2-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128031" comment="kernel-ec2-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128032" comment="kernel-macros-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128033" comment="kernel-obs-build-4.1.21-14.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128034" comment="kernel-obs-qa-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128035" comment="kernel-obs-qa-xen-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128036" comment="kernel-pae-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128037" comment="kernel-pae-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128038" comment="kernel-pae-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128039" comment="kernel-pv-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128040" comment="kernel-pv-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128041" comment="kernel-pv-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128042" comment="kernel-source-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128043" comment="kernel-source-vanilla-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128044" comment="kernel-syms-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128045" comment="kernel-vanilla-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128046" comment="kernel-vanilla-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128047" comment="kernel-xen-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128048" comment="kernel-xen-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128049" comment="kernel-xen-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3141</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3141" source="CVE"/>
    <description>
    Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3141.html">CVE-2016-3141</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3141">SUSE bug 969821</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127020" comment="apache2-mod_php5-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127021" comment="php5-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127022" comment="php5-bcmath-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127023" comment="php5-bz2-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127024" comment="php5-calendar-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127025" comment="php5-ctype-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127026" comment="php5-curl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127027" comment="php5-dba-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127028" comment="php5-devel-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127029" comment="php5-dom-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127030" comment="php5-enchant-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127031" comment="php5-exif-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127032" comment="php5-fastcgi-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127033" comment="php5-fileinfo-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127034" comment="php5-firebird-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127035" comment="php5-fpm-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127036" comment="php5-ftp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127037" comment="php5-gd-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127038" comment="php5-gettext-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127039" comment="php5-gmp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127040" comment="php5-iconv-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127041" comment="php5-imap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127042" comment="php5-intl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127043" comment="php5-json-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127044" comment="php5-ldap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127045" comment="php5-mbstring-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127046" comment="php5-mcrypt-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127047" comment="php5-mssql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127048" comment="php5-mysql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127049" comment="php5-odbc-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127050" comment="php5-opcache-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127051" comment="php5-openssl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127052" comment="php5-pcntl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127053" comment="php5-pdo-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127054" comment="php5-pear-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127055" comment="php5-pgsql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127056" comment="php5-phar-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127057" comment="php5-posix-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127058" comment="php5-pspell-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127059" comment="php5-readline-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127060" comment="php5-shmop-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127061" comment="php5-snmp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127062" comment="php5-soap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127063" comment="php5-sockets-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127064" comment="php5-sqlite-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127065" comment="php5-suhosin-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127066" comment="php5-sysvmsg-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127067" comment="php5-sysvsem-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127068" comment="php5-sysvshm-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127069" comment="php5-tidy-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127070" comment="php5-tokenizer-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127071" comment="php5-wddx-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127072" comment="php5-xmlreader-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127073" comment="php5-xmlrpc-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127074" comment="php5-xmlwriter-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127075" comment="php5-xsl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127076" comment="php5-zip-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127077" comment="php5-zlib-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3142</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3142" source="CVE"/>
    <description>
    The phar_parse_zipfile function in zip.c in the PHAR extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) by placing a PK\x05\x06 signature at an invalid location.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3142.html">CVE-2016-3142</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3142">SUSE bug 971912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3142">SUSE bug 971912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3142">SUSE bug 971912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3142">SUSE bug 971912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3142">SUSE bug 971912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3142">SUSE bug 971912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3142">SUSE bug 971912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3142">SUSE bug 971912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3142">SUSE bug 971912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3142">SUSE bug 971912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3142">SUSE bug 971912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3142">SUSE bug 971912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3142">SUSE bug 971912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3142">SUSE bug 971912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3142">SUSE bug 971912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3142">SUSE bug 971912</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3142">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3142">SUSE bug 971912</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127020" comment="apache2-mod_php5-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127021" comment="php5-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127022" comment="php5-bcmath-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127023" comment="php5-bz2-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127024" comment="php5-calendar-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127025" comment="php5-ctype-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127026" comment="php5-curl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127027" comment="php5-dba-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127028" comment="php5-devel-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127029" comment="php5-dom-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127030" comment="php5-enchant-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127031" comment="php5-exif-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127032" comment="php5-fastcgi-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127033" comment="php5-fileinfo-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127034" comment="php5-firebird-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127035" comment="php5-fpm-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127036" comment="php5-ftp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127037" comment="php5-gd-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127038" comment="php5-gettext-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127039" comment="php5-gmp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127040" comment="php5-iconv-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127041" comment="php5-imap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127042" comment="php5-intl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127043" comment="php5-json-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127044" comment="php5-ldap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127045" comment="php5-mbstring-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127046" comment="php5-mcrypt-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127047" comment="php5-mssql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127048" comment="php5-mysql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127049" comment="php5-odbc-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127050" comment="php5-opcache-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127051" comment="php5-openssl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127052" comment="php5-pcntl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127053" comment="php5-pdo-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127054" comment="php5-pear-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127055" comment="php5-pgsql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127056" comment="php5-phar-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127057" comment="php5-posix-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127058" comment="php5-pspell-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127059" comment="php5-readline-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127060" comment="php5-shmop-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127061" comment="php5-snmp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127062" comment="php5-soap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127063" comment="php5-sockets-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127064" comment="php5-sqlite-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127065" comment="php5-suhosin-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127066" comment="php5-sysvmsg-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127067" comment="php5-sysvsem-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127068" comment="php5-sysvshm-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127069" comment="php5-tidy-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127070" comment="php5-tokenizer-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127071" comment="php5-wddx-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127072" comment="php5-xmlreader-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127073" comment="php5-xmlrpc-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127074" comment="php5-xmlwriter-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127075" comment="php5-xsl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127076" comment="php5-zip-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127077" comment="php5-zlib-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3156</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3156" source="CVE"/>
    <description>
    The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3156.html">CVE-2016-3156</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3156">SUSE bug 971360</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134384" comment="drbd-8.4.6-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134385" comment="drbd-kmp-default-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134386" comment="drbd-kmp-pv-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134387" comment="drbd-kmp-xen-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134388" comment="hdjmod-1.28-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134389" comment="hdjmod-kmp-default-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134390" comment="hdjmod-kmp-pae-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134391" comment="hdjmod-kmp-pv-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134392" comment="hdjmod-kmp-xen-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134393" comment="ipset-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134394" comment="ipset-devel-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134395" comment="ipset-kmp-default-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134396" comment="ipset-kmp-pae-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134397" comment="ipset-kmp-pv-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134398" comment="ipset-kmp-xen-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134399" comment="kernel-debug-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134400" comment="kernel-debug-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134401" comment="kernel-debug-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134402" comment="kernel-default-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134403" comment="kernel-default-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134404" comment="kernel-default-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134405" comment="kernel-devel-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134406" comment="kernel-docs-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134407" comment="kernel-docs-html-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134408" comment="kernel-docs-pdf-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134409" comment="kernel-ec2-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134410" comment="kernel-ec2-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134411" comment="kernel-ec2-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134412" comment="kernel-macros-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134413" comment="kernel-obs-build-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134414" comment="kernel-obs-qa-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134415" comment="kernel-obs-qa-xen-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134416" comment="kernel-pae-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134417" comment="kernel-pae-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134418" comment="kernel-pae-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134419" comment="kernel-pv-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134420" comment="kernel-pv-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134421" comment="kernel-pv-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134422" comment="kernel-source-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134423" comment="kernel-source-vanilla-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134424" comment="kernel-syms-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134425" comment="kernel-vanilla-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134426" comment="kernel-vanilla-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134427" comment="kernel-xen-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134428" comment="kernel-xen-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134429" comment="kernel-xen-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134430" comment="libipset3-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134431" comment="lttng-modules-2.7.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134432" comment="lttng-modules-kmp-default-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134433" comment="lttng-modules-kmp-pv-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134434" comment="pcfclock-0.44-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134435" comment="pcfclock-kmp-default-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134436" comment="pcfclock-kmp-pae-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134437" comment="pcfclock-kmp-pv-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134438" comment="vhba-kmp-20140928-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134439" comment="vhba-kmp-default-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134440" comment="vhba-kmp-pae-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134441" comment="vhba-kmp-pv-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134442" comment="vhba-kmp-xen-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3158</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3158" source="CVE"/>
    <description>
    The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3158.html">CVE-2016-3158</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3158">SUSE bug 973188</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3159</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3159" source="CVE"/>
    <description>
    The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3159.html">CVE-2016-3159</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3159">SUSE bug 973188</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3172</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3172" source="CVE"/>
    <description>
    SQL injection vulnerability in tree.php in Cacti 0.8.8g and earlier allows remote authenticated users to execute arbitrary SQL commands via the parent_id parameter in an item_edit action.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3172.html">CVE-2016-3172</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3172">SUSE bug 971357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3172">SUSE bug 971357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3172">SUSE bug 974013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3172">SUSE bug 971357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3172">SUSE bug 971357</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127752" comment="cacti-0.8.8f-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3185</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3185" source="CVE"/>
    <description>
    The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, 5.6.x before 5.6.12, and 7.x before 7.0.4 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (type confusion and application crash) via crafted serialized _cookies data, related to the SoapClient::__call method in ext/soap/soap.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3185.html">CVE-2016-3185</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3185">SUSE bug 971611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3185">SUSE bug 971611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3185">SUSE bug 971611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3185">SUSE bug 971611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3185">SUSE bug 973351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3185">SUSE bug 971611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3185">SUSE bug 971611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3185">SUSE bug 971611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3185">SUSE bug 971611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3185">SUSE bug 971611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3185">SUSE bug 971611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3185">SUSE bug 971611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3185">SUSE bug 971611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3185">SUSE bug 971611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3185">SUSE bug 971611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3185">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3185">SUSE bug 971611</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127020" comment="apache2-mod_php5-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127021" comment="php5-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127022" comment="php5-bcmath-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127023" comment="php5-bz2-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127024" comment="php5-calendar-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127025" comment="php5-ctype-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127026" comment="php5-curl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127027" comment="php5-dba-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127028" comment="php5-devel-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127029" comment="php5-dom-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127030" comment="php5-enchant-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127031" comment="php5-exif-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127032" comment="php5-fastcgi-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127033" comment="php5-fileinfo-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127034" comment="php5-firebird-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127035" comment="php5-fpm-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127036" comment="php5-ftp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127037" comment="php5-gd-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127038" comment="php5-gettext-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127039" comment="php5-gmp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127040" comment="php5-iconv-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127041" comment="php5-imap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127042" comment="php5-intl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127043" comment="php5-json-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127044" comment="php5-ldap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127045" comment="php5-mbstring-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127046" comment="php5-mcrypt-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127047" comment="php5-mssql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127048" comment="php5-mysql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127049" comment="php5-odbc-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127050" comment="php5-opcache-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127051" comment="php5-openssl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127052" comment="php5-pcntl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127053" comment="php5-pdo-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127054" comment="php5-pear-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127055" comment="php5-pgsql-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127056" comment="php5-phar-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127057" comment="php5-posix-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127058" comment="php5-pspell-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127059" comment="php5-readline-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127060" comment="php5-shmop-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127061" comment="php5-snmp-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127062" comment="php5-soap-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127063" comment="php5-sockets-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127064" comment="php5-sqlite-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127065" comment="php5-suhosin-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127066" comment="php5-sysvmsg-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127067" comment="php5-sysvsem-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127068" comment="php5-sysvshm-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127069" comment="php5-tidy-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127070" comment="php5-tokenizer-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127071" comment="php5-wddx-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127072" comment="php5-xmlreader-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127073" comment="php5-xmlrpc-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127074" comment="php5-xmlwriter-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127075" comment="php5-xsl-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127076" comment="php5-zip-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127077" comment="php5-zlib-5.5.14-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3186</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3186" source="CVE"/>
    <description>
    Buffer overflow in the readextension function in gif2tiff.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted GIF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3186.html">CVE-2016-3186</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3186">SUSE bug 973340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3186">SUSE bug 973340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3186">SUSE bug 973340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3186">SUSE bug 973340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3186">SUSE bug 983268</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3186">SUSE bug 973340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3186">SUSE bug 973340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3186">SUSE bug 973340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3186">SUSE bug 973340</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134455" comment="libtiff-devel-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134456" comment="libtiff-devel-32bit-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134457" comment="libtiff5-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134458" comment="libtiff5-32bit-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134459" comment="tiff-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3191</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3191" source="CVE"/>
    <description>
    The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3191.html">CVE-2016-3191</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3191">SUSE bug 971741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3191">SUSE bug 971741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3191">SUSE bug 971741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3191">SUSE bug 971741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3191">SUSE bug 971741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3191">SUSE bug 971741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3191">SUSE bug 971741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3191">SUSE bug 971741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3191">SUSE bug 971741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3191">SUSE bug 971741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3191">SUSE bug 971741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3191">SUSE bug 971741</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136208" comment="libpcre1-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152526" comment="libpcre1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136209" comment="libpcre1-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152527" comment="libpcre1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136210" comment="libpcre16-0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152528" comment="libpcre16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142540" comment="libpcre16-0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152529" comment="libpcre16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135156" comment="libpcre2-16-0-10.22-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153649" comment="libpcre2-16-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135157" comment="libpcre2-16-0-32bit-10.22-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153650" comment="libpcre2-16-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135158" comment="libpcre2-32-0-10.22-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153651" comment="libpcre2-32-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135159" comment="libpcre2-32-0-32bit-10.22-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153652" comment="libpcre2-32-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135160" comment="libpcre2-8-0-10.22-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153653" comment="libpcre2-8-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135161" comment="libpcre2-8-0-32bit-10.22-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153654" comment="libpcre2-8-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135162" comment="libpcre2-posix1-10.22-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153655" comment="libpcre2-posix1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135163" comment="libpcre2-posix1-32bit-10.22-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153656" comment="libpcre2-posix1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136211" comment="libpcrecpp0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152530" comment="libpcrecpp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136212" comment="libpcrecpp0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152531" comment="libpcrecpp0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136228" comment="libpcreposix0-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152532" comment="libpcreposix0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142541" comment="libpcreposix0-32bit-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152533" comment="libpcreposix0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136213" comment="pcre-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152534" comment="pcre is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136284" comment="pcre-devel-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152535" comment="pcre-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136285" comment="pcre-devel-static-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152536" comment="pcre-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142542" comment="pcre-doc-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152537" comment="pcre-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136286" comment="pcre-tools-8.39-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152538" comment="pcre-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135164" comment="pcre2-10.22-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153657" comment="pcre2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135165" comment="pcre2-devel-10.22-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153658" comment="pcre2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135166" comment="pcre2-devel-static-10.22-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153659" comment="pcre2-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135167" comment="pcre2-doc-10.22-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153660" comment="pcre2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135168" comment="pcre2-tools-10.22-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153661" comment="pcre2-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3425</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect availability via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3425.html">CVE-2016-3425</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3425">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3425">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3425">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3425">SUSE bug 979252</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127337" comment="java-1_7_0-openjdk-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127338" comment="java-1_7_0-openjdk-accessibility-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127339" comment="java-1_7_0-openjdk-bootstrap-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127340" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127341" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127342" comment="java-1_7_0-openjdk-demo-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127343" comment="java-1_7_0-openjdk-devel-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127344" comment="java-1_7_0-openjdk-headless-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127345" comment="java-1_7_0-openjdk-javadoc-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127346" comment="java-1_7_0-openjdk-src-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127330" comment="java-1_8_0-openjdk-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127331" comment="java-1_8_0-openjdk-accessibility-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127332" comment="java-1_8_0-openjdk-demo-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127333" comment="java-1_8_0-openjdk-devel-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127334" comment="java-1_8_0-openjdk-headless-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127335" comment="java-1_8_0-openjdk-javadoc-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127336" comment="java-1_8_0-openjdk-src-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3426</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3426.html">CVE-2016-3426</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3426">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3426">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3426">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3426">SUSE bug 979252</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127330" comment="java-1_8_0-openjdk-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127331" comment="java-1_8_0-openjdk-accessibility-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127332" comment="java-1_8_0-openjdk-demo-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127333" comment="java-1_8_0-openjdk-devel-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127334" comment="java-1_8_0-openjdk-headless-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127335" comment="java-1_8_0-openjdk-javadoc-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127336" comment="java-1_8_0-openjdk-src-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3427</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3427.html">CVE-2016-3427</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3427">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3427">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3427">SUSE bug 976340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3427">SUSE bug 979252</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3427">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3427">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3427">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3427">SUSE bug 1011805</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127337" comment="java-1_7_0-openjdk-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127338" comment="java-1_7_0-openjdk-accessibility-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127339" comment="java-1_7_0-openjdk-bootstrap-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127340" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127341" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127342" comment="java-1_7_0-openjdk-demo-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127343" comment="java-1_7_0-openjdk-devel-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127344" comment="java-1_7_0-openjdk-headless-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127345" comment="java-1_7_0-openjdk-javadoc-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127346" comment="java-1_7_0-openjdk-src-1.7.0.101-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127330" comment="java-1_8_0-openjdk-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127331" comment="java-1_8_0-openjdk-accessibility-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127332" comment="java-1_8_0-openjdk-demo-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127333" comment="java-1_8_0-openjdk-devel-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127334" comment="java-1_8_0-openjdk-headless-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127335" comment="java-1_8_0-openjdk-javadoc-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127336" comment="java-1_8_0-openjdk-src-1.8.0.91-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3458</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; and Java SE Embedded 8u91 allows remote attackers to affect integrity via vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3458.html">CVE-2016-3458</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3458">SUSE bug 989732</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3458">SUSE bug 989732</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3458">SUSE bug 989732</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3458">SUSE bug 989732</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3458">SUSE bug 989732</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3458">SUSE bug 989732</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3458">SUSE bug 989732</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135180" comment="java-1_7_0-openjdk-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135181" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135182" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135183" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135184" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135185" comment="java-1_7_0-openjdk-demo-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135186" comment="java-1_7_0-openjdk-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135187" comment="java-1_7_0-openjdk-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135188" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135189" comment="java-1_7_0-openjdk-src-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135190" comment="java-1_8_0-openjdk-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135191" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135192" comment="java-1_8_0-openjdk-demo-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135193" comment="java-1_8_0-openjdk-devel-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135194" comment="java-1_8_0-openjdk-headless-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135195" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135196" comment="java-1_8_0-openjdk-src-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3459</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3459" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier and MariaDB 10.0.x before 10.0.25 and 10.1.x before 10.1.14 allows remote administrators to affect availability via vectors related to Server: InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3459.html">CVE-2016-3459</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3459">SUSE bug 989911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3459">SUSE bug 989911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3459">SUSE bug 989911</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3477</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Parser.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3477.html">CVE-2016-3477</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3477">SUSE bug 989913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3477">SUSE bug 989913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3477">SUSE bug 991616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3477">SUSE bug 989913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3477">SUSE bug 989913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3477">SUSE bug 989913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3477">SUSE bug 989913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3477">SUSE bug 989913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134352" comment="libmysqlclient-devel-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134353" comment="libmysqlclient18-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134354" comment="libmysqlclient18-32bit-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134355" comment="libmysqlclient_r18-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134356" comment="libmysqlclient_r18-32bit-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134357" comment="libmysqld-devel-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134358" comment="libmysqld18-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134359" comment="mariadb-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134360" comment="mariadb-bench-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134361" comment="mariadb-client-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134362" comment="mariadb-errormessages-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134363" comment="mariadb-test-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134364" comment="mariadb-tools-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3485</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3485" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows local users to affect integrity via vectors related to Networking.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3485.html">CVE-2016-3485</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3485">SUSE bug 989734</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3485">SUSE bug 989734</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3485">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3485">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3485">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3485">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3485">SUSE bug 1009280</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135180" comment="java-1_7_0-openjdk-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135181" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135182" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135183" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135184" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135185" comment="java-1_7_0-openjdk-demo-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135186" comment="java-1_7_0-openjdk-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135187" comment="java-1_7_0-openjdk-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135188" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135189" comment="java-1_7_0-openjdk-src-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135190" comment="java-1_8_0-openjdk-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135191" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135192" comment="java-1_8_0-openjdk-demo-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135193" comment="java-1_8_0-openjdk-devel-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135194" comment="java-1_8_0-openjdk-headless-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135195" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135196" comment="java-1_8_0-openjdk-src-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3486</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3486" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote authenticated users to affect availability via vectors related to Server: FTS.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3486.html">CVE-2016-3486</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3486">SUSE bug 989914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3486">SUSE bug 989914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3486">SUSE bug 989914</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3492</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3492.html">CVE-2016-3492</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3492">SUSE bug 1005555</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3492">SUSE bug 1005555</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3492">SUSE bug 1005555</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3492">SUSE bug 1005555</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3492">SUSE bug 1008318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3492">SUSE bug 1005555</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136615" comment="libmysqlclient-devel-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136616" comment="libmysqlclient18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136617" comment="libmysqlclient18-32bit-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136618" comment="libmysqlclient_r18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136619" comment="libmysqlclient_r18-32bit-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136620" comment="libmysqld-devel-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136621" comment="libmysqld18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136622" comment="mariadb-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136623" comment="mariadb-bench-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136624" comment="mariadb-client-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136625" comment="mariadb-errormessages-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136626" comment="mariadb-test-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136627" comment="mariadb-tools-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3498</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3498" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 allows remote attackers to affect availability via vectors related to JavaFX.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3498.html">CVE-2016-3498</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3498">SUSE bug 989729</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3498">SUSE bug 989729</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3498">SUSE bug 989729</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3498">SUSE bug 989729</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3498">SUSE bug 989729</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3498">SUSE bug 989729</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135180" comment="java-1_7_0-openjdk-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135181" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135182" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135183" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135184" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135185" comment="java-1_7_0-openjdk-demo-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135186" comment="java-1_7_0-openjdk-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135187" comment="java-1_7_0-openjdk-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135188" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135189" comment="java-1_7_0-openjdk-src-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135190" comment="java-1_8_0-openjdk-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135191" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135192" comment="java-1_8_0-openjdk-demo-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135193" comment="java-1_8_0-openjdk-devel-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135194" comment="java-1_8_0-openjdk-headless-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135195" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135196" comment="java-1_8_0-openjdk-src-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3500</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2016-3508.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3500.html">CVE-2016-3500</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3500">SUSE bug 989730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3500">SUSE bug 989730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3500">SUSE bug 989730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3500">SUSE bug 989730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3500">SUSE bug 989730</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3500">SUSE bug 989730</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135180" comment="java-1_7_0-openjdk-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135181" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135182" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135183" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135184" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135185" comment="java-1_7_0-openjdk-demo-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135186" comment="java-1_7_0-openjdk-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135187" comment="java-1_7_0-openjdk-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135188" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135189" comment="java-1_7_0-openjdk-src-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135190" comment="java-1_8_0-openjdk-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135191" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135192" comment="java-1_8_0-openjdk-demo-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135193" comment="java-1_8_0-openjdk-devel-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135194" comment="java-1_8_0-openjdk-headless-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135195" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135196" comment="java-1_8_0-openjdk-src-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3501</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3501" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote authenticated users to affect availability via vectors related to Server: Optimizer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3501.html">CVE-2016-3501</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3501">SUSE bug 989915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3501">SUSE bug 989915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3501">SUSE bug 989915</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3503</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3503" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3503.html">CVE-2016-3503</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3503">SUSE bug 989728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3503">SUSE bug 989728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3503">SUSE bug 989728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3503">SUSE bug 989728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3503">SUSE bug 989728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3503">SUSE bug 989728</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135180" comment="java-1_7_0-openjdk-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135181" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135182" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135183" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135184" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135185" comment="java-1_7_0-openjdk-demo-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135186" comment="java-1_7_0-openjdk-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135187" comment="java-1_7_0-openjdk-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135188" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135189" comment="java-1_7_0-openjdk-src-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135190" comment="java-1_8_0-openjdk-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135191" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135192" comment="java-1_8_0-openjdk-demo-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135193" comment="java-1_8_0-openjdk-devel-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135194" comment="java-1_8_0-openjdk-headless-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135195" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135196" comment="java-1_8_0-openjdk-src-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3508</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2016-3500.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3508.html">CVE-2016-3508</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3508">SUSE bug 989731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3508">SUSE bug 989731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3508">SUSE bug 989731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3508">SUSE bug 989731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3508">SUSE bug 989731</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3508">SUSE bug 989731</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135180" comment="java-1_7_0-openjdk-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135181" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135182" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135183" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135184" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135185" comment="java-1_7_0-openjdk-demo-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135186" comment="java-1_7_0-openjdk-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135187" comment="java-1_7_0-openjdk-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135188" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135189" comment="java-1_7_0-openjdk-src-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135190" comment="java-1_8_0-openjdk-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135191" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135192" comment="java-1_8_0-openjdk-demo-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135193" comment="java-1_8_0-openjdk-devel-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135194" comment="java-1_8_0-openjdk-headless-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135195" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135196" comment="java-1_8_0-openjdk-src-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3511</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3511" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3511.html">CVE-2016-3511</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3511">SUSE bug 989727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3511">SUSE bug 989727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3511">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3511">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3511">SUSE bug 989727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3511">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3511">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3511">SUSE bug 989727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3511">SUSE bug 989727</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3511">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3511">SUSE bug 989727</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135180" comment="java-1_7_0-openjdk-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135181" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135182" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135183" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135184" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135185" comment="java-1_7_0-openjdk-demo-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135186" comment="java-1_7_0-openjdk-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135187" comment="java-1_7_0-openjdk-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135188" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135189" comment="java-1_7_0-openjdk-src-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135190" comment="java-1_8_0-openjdk-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135191" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135192" comment="java-1_8_0-openjdk-demo-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135193" comment="java-1_8_0-openjdk-devel-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135194" comment="java-1_8_0-openjdk-headless-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135195" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135196" comment="java-1_8_0-openjdk-src-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3521</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: Types.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3521.html">CVE-2016-3521</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3521">SUSE bug 989919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3521">SUSE bug 989919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3521">SUSE bug 991616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3521">SUSE bug 989919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3521">SUSE bug 989919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3521">SUSE bug 989919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3521">SUSE bug 989919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3521">SUSE bug 989919</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134352" comment="libmysqlclient-devel-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134353" comment="libmysqlclient18-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134354" comment="libmysqlclient18-32bit-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134355" comment="libmysqlclient_r18-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134356" comment="libmysqlclient_r18-32bit-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134357" comment="libmysqld-devel-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134358" comment="libmysqld18-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134359" comment="mariadb-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134360" comment="mariadb-bench-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134361" comment="mariadb-client-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134362" comment="mariadb-errormessages-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134363" comment="mariadb-test-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134364" comment="mariadb-tools-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3550</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality via vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3550.html">CVE-2016-3550</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3550">SUSE bug 989733</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3550">SUSE bug 989733</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3550">SUSE bug 989733</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3550">SUSE bug 989733</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3550">SUSE bug 989733</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3550">SUSE bug 989733</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135180" comment="java-1_7_0-openjdk-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135181" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135182" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135183" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135184" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135185" comment="java-1_7_0-openjdk-demo-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135186" comment="java-1_7_0-openjdk-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135187" comment="java-1_7_0-openjdk-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135188" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135189" comment="java-1_7_0-openjdk-src-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135190" comment="java-1_8_0-openjdk-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135191" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135192" comment="java-1_8_0-openjdk-demo-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135193" comment="java-1_8_0-openjdk-devel-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135194" comment="java-1_8_0-openjdk-headless-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135195" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135196" comment="java-1_8_0-openjdk-src-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3552</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3552" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3552.html">CVE-2016-3552</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3552">SUSE bug 989726</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3552">SUSE bug 989726</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135190" comment="java-1_8_0-openjdk-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135191" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135192" comment="java-1_8_0-openjdk-demo-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135193" comment="java-1_8_0-openjdk-devel-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135194" comment="java-1_8_0-openjdk-headless-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135195" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135196" comment="java-1_8_0-openjdk-src-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3587</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3587" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3587.html">CVE-2016-3587</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3587">SUSE bug 989721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3587">SUSE bug 989721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3587">SUSE bug 989721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3587">SUSE bug 989721</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3587">SUSE bug 998845</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135190" comment="java-1_8_0-openjdk-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135191" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135192" comment="java-1_8_0-openjdk-demo-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135193" comment="java-1_8_0-openjdk-devel-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135194" comment="java-1_8_0-openjdk-headless-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135195" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135196" comment="java-1_8_0-openjdk-src-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3598</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3610.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3598.html">CVE-2016-3598</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3598">SUSE bug 989723</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3598">SUSE bug 989723</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3598">SUSE bug 989723</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3598">SUSE bug 989723</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3598">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3598">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3598">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3598">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3598">SUSE bug 1009280</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135180" comment="java-1_7_0-openjdk-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135181" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135182" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135183" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135184" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135185" comment="java-1_7_0-openjdk-demo-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135186" comment="java-1_7_0-openjdk-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135187" comment="java-1_7_0-openjdk-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135188" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135189" comment="java-1_7_0-openjdk-src-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135190" comment="java-1_8_0-openjdk-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135191" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135192" comment="java-1_8_0-openjdk-demo-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135193" comment="java-1_8_0-openjdk-devel-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135194" comment="java-1_8_0-openjdk-headless-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135195" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135196" comment="java-1_8_0-openjdk-src-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3606</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3606" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3606.html">CVE-2016-3606</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3606">SUSE bug 989722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3606">SUSE bug 989722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3606">SUSE bug 989722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3606">SUSE bug 989722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3606">SUSE bug 989722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3606">SUSE bug 989722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3606">SUSE bug 989722</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135180" comment="java-1_7_0-openjdk-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135181" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135182" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135183" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135184" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135185" comment="java-1_7_0-openjdk-demo-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135186" comment="java-1_7_0-openjdk-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135187" comment="java-1_7_0-openjdk-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135188" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135189" comment="java-1_7_0-openjdk-src-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135190" comment="java-1_8_0-openjdk-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135191" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135192" comment="java-1_8_0-openjdk-demo-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135193" comment="java-1_8_0-openjdk-devel-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135194" comment="java-1_8_0-openjdk-headless-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135195" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135196" comment="java-1_8_0-openjdk-src-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3610</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3610" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3598.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3610.html">CVE-2016-3610</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3610">SUSE bug 989725</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3610">SUSE bug 989725</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3610">SUSE bug 989725</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135180" comment="java-1_7_0-openjdk-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135181" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135182" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135183" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135184" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135185" comment="java-1_7_0-openjdk-demo-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135186" comment="java-1_7_0-openjdk-devel-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135187" comment="java-1_7_0-openjdk-headless-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135188" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135189" comment="java-1_7_0-openjdk-src-1.7.0.111-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135190" comment="java-1_8_0-openjdk-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135191" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135192" comment="java-1_8_0-openjdk-demo-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135193" comment="java-1_8_0-openjdk-devel-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135194" comment="java-1_8_0-openjdk-headless-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135195" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135196" comment="java-1_8_0-openjdk-src-1.8.0.101-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3614</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3614" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote authenticated users to affect availability via vectors related to Server: Security: Encryption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3614.html">CVE-2016-3614</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3614">SUSE bug 989921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3614">SUSE bug 989921</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3614">SUSE bug 989921</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3615</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: DML.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3615.html">CVE-2016-3615</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3615">SUSE bug 989922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3615">SUSE bug 989922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3615">SUSE bug 991616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3615">SUSE bug 989922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3615">SUSE bug 989922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3615">SUSE bug 989922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3615">SUSE bug 989922</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3615">SUSE bug 989922</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134352" comment="libmysqlclient-devel-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134353" comment="libmysqlclient18-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134354" comment="libmysqlclient18-32bit-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134355" comment="libmysqlclient_r18-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134356" comment="libmysqlclient_r18-32bit-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134357" comment="libmysqld-devel-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134358" comment="libmysqld18-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134359" comment="mariadb-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134360" comment="mariadb-bench-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134361" comment="mariadb-client-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134362" comment="mariadb-errormessages-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134363" comment="mariadb-test-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134364" comment="mariadb-tools-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3622</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" source="CVE"/>
    <description>
    The fpAcc function in tif_predict.c in the tiff2rgba tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3622.html">CVE-2016-3622</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3622">SUSE bug 974449</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3622">SUSE bug 974449</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3622">SUSE bug 974449</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3622">SUSE bug 974449</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3622">SUSE bug 974449</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3622">SUSE bug 974449</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146600" comment="libtiff-devel-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146601" comment="libtiff-devel-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146602" comment="libtiff5-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146603" comment="libtiff5-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146604" comment="tiff-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3623</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" source="CVE"/>
    <description>
    The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero) by setting the (1) v or (2) h parameter to 0.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3623.html">CVE-2016-3623</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3623">SUSE bug 974618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3623">SUSE bug 974618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3623">SUSE bug 974618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3623">SUSE bug 974618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3623">SUSE bug 974618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3623">SUSE bug 974618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3623">SUSE bug 974618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3623">SUSE bug 974617</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3623">SUSE bug 974618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3623">SUSE bug 974618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3623">SUSE bug 974618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3623">SUSE bug 974618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3623">SUSE bug 974618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3623">SUSE bug 974618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3623">SUSE bug 974618</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134766" comment="libtiff-devel-4.0.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134767" comment="libtiff-devel-32bit-4.0.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134768" comment="libtiff5-4.0.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134769" comment="libtiff5-32bit-4.0.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134770" comment="tiff-4.0.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3627</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3627" source="CVE"/>
    <description>
    The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3627.html">CVE-2016-3627</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 972335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 972335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 972335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 972335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 972335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 972335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 972335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 972335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 972335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 975947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 972335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 972335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 972335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 972335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 972335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 972335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 975947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 972335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 972335</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 1026099</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 1026101</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3627">SUSE bug 972335</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127571" comment="libxml2-2.9.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127572" comment="libxml2-2-2.9.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127573" comment="libxml2-2-32bit-2.9.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127574" comment="libxml2-devel-2.9.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127575" comment="libxml2-devel-32bit-2.9.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127576" comment="libxml2-doc-2.9.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127577" comment="libxml2-tools-2.9.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127578" comment="python-libxml2-2.9.1-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3630</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3630" source="CVE"/>
    <description>
    The binary delta decoder in Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a (1) clone, (2) push, or (3) pull command, related to (a) a list sizing rounding error and (b) short records.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3630.html">CVE-2016-3630</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3630">SUSE bug 973175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3630">SUSE bug 973175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3630">SUSE bug 973175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3630">SUSE bug 973175</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3630">SUSE bug 973175</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126360" comment="mercurial-3.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153633" comment="mercurial is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126361" comment="mercurial-lang-3.5.1-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153634" comment="mercurial-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3658</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658" source="CVE"/>
    <description>
    The TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving the ma variable.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3658.html">CVE-2016-3658</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3658">SUSE bug 974840</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3658">SUSE bug 974840</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3658">SUSE bug 974840</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3658">SUSE bug 974840</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3658">SUSE bug 974840</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3658">SUSE bug 974840</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3658">SUSE bug 974840</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3658">SUSE bug 974840</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3658">SUSE bug 974840</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3658">SUSE bug 974840</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3658">SUSE bug 974840</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3658">SUSE bug 974840</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3658">SUSE bug 974840</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3658">SUSE bug 974840</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146600" comment="libtiff-devel-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146601" comment="libtiff-devel-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146602" comment="libtiff5-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146603" comment="libtiff5-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146604" comment="tiff-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3659</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3659" source="CVE"/>
    <description>
    SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows remote authenticated users to execute arbitrary SQL commands via the host_group_data parameter.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3659.html">CVE-2016-3659</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3659">SUSE bug 974013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3659">SUSE bug 974013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3659">SUSE bug 974013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3659">SUSE bug 974013</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127752" comment="cacti-0.8.8f-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3672</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3672" source="CVE"/>
    <description>
    The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3672.html">CVE-2016-3672</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 990058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3672">SUSE bug 974308</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129149" comment="kernel-debug-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129150" comment="kernel-debug-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129151" comment="kernel-debug-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129152" comment="kernel-default-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129153" comment="kernel-default-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129154" comment="kernel-default-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129155" comment="kernel-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129156" comment="kernel-docs-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129157" comment="kernel-docs-html-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129158" comment="kernel-docs-pdf-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129159" comment="kernel-ec2-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129160" comment="kernel-ec2-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129161" comment="kernel-ec2-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129162" comment="kernel-macros-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129163" comment="kernel-obs-build-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129164" comment="kernel-obs-qa-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129165" comment="kernel-obs-qa-xen-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129166" comment="kernel-pae-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129167" comment="kernel-pae-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129168" comment="kernel-pae-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129169" comment="kernel-pv-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129170" comment="kernel-pv-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129171" comment="kernel-pv-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129172" comment="kernel-source-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129173" comment="kernel-source-vanilla-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129174" comment="kernel-syms-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129175" comment="kernel-vanilla-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129176" comment="kernel-vanilla-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129177" comment="kernel-xen-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129178" comment="kernel-xen-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129179" comment="kernel-xen-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3679</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3679" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3679.html">CVE-2016-3679</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3679">SUSE bug 973166</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3679">SUSE bug 972834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3679">SUSE bug 973166</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125630" comment="chromedriver-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125631" comment="chromium-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125632" comment="chromium-desktop-gnome-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125633" comment="chromium-desktop-kde-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009125634" comment="chromium-ffmpegsumo-49.0.2623.110-37.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3689</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3689" source="CVE"/>
    <description>
    The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3689.html">CVE-2016-3689</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3689">SUSE bug 971628</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128019" comment="kernel-debug-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128020" comment="kernel-debug-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128021" comment="kernel-debug-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128022" comment="kernel-default-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128023" comment="kernel-default-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128024" comment="kernel-default-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128025" comment="kernel-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128026" comment="kernel-docs-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128027" comment="kernel-docs-html-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128028" comment="kernel-docs-pdf-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128029" comment="kernel-ec2-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128030" comment="kernel-ec2-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128031" comment="kernel-ec2-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128032" comment="kernel-macros-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128033" comment="kernel-obs-build-4.1.21-14.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128034" comment="kernel-obs-qa-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128035" comment="kernel-obs-qa-xen-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128036" comment="kernel-pae-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128037" comment="kernel-pae-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128038" comment="kernel-pae-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128039" comment="kernel-pv-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128040" comment="kernel-pv-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128041" comment="kernel-pv-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128042" comment="kernel-source-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128043" comment="kernel-source-vanilla-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128044" comment="kernel-syms-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128045" comment="kernel-vanilla-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128046" comment="kernel-vanilla-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128047" comment="kernel-xen-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128048" comment="kernel-xen-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128049" comment="kernel-xen-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3705</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3705" source="CVE"/>
    <description>
    The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3705.html">CVE-2016-3705</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3705">SUSE bug 975947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3705">SUSE bug 975947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3705">SUSE bug 975947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3705">SUSE bug 975947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3705">SUSE bug 975947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3705">SUSE bug 975947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3705">SUSE bug 975947</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3705">SUSE bug 975947</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128929" comment="libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128930" comment="libxml2-2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128931" comment="libxml2-2-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128932" comment="libxml2-devel-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128933" comment="libxml2-devel-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128934" comment="libxml2-doc-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128935" comment="libxml2-tools-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128936" comment="python-libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3706</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706" source="CVE"/>
    <description>
    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3706.html">CVE-2016-3706</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3706">SUSE bug 980483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3706">SUSE bug 980483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3706">SUSE bug 980483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3706">SUSE bug 980483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3706">SUSE bug 980483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3706">SUSE bug 997423</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3706">SUSE bug 980483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3706">SUSE bug 997423</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3706">SUSE bug 980483</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3706">SUSE bug 997423</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129885" comment="glibc-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129886" comment="glibc-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129887" comment="glibc-devel-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129888" comment="glibc-devel-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152566" comment="glibc-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129889" comment="glibc-devel-static-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129890" comment="glibc-devel-static-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152568" comment="glibc-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129891" comment="glibc-extra-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129892" comment="glibc-html-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129893" comment="glibc-i18ndata-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129894" comment="glibc-info-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129895" comment="glibc-locale-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129896" comment="glibc-locale-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129897" comment="glibc-obsolete-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152571" comment="glibc-obsolete is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129898" comment="glibc-profile-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129899" comment="glibc-profile-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152573" comment="glibc-profile-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129900" comment="glibc-testsuite-2.19-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152574" comment="glibc-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129901" comment="glibc-utils-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129902" comment="glibc-utils-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152576" comment="glibc-utils-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129903" comment="nscd-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3710</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3710" source="CVE"/>
    <description>
    The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3710.html">CVE-2016-3710</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3710">SUSE bug 978158</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3710">SUSE bug 978164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3710">SUSE bug 978158</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3710">SUSE bug 978164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3710">SUSE bug 978158</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3710">SUSE bug 978164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3710">SUSE bug 978167</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3710">SUSE bug 978164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3710">SUSE bug 978158</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3710">SUSE bug 978158</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3710">SUSE bug 978164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3710">SUSE bug 978164</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3712</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3712" source="CVE"/>
    <description>
    Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3712.html">CVE-2016-3712</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3712">SUSE bug 978160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3712">SUSE bug 978167</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3712">SUSE bug 978160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3712">SUSE bug 978164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3712">SUSE bug 978167</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3712">SUSE bug 978160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3712">SUSE bug 978164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3712">SUSE bug 978167</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3712">SUSE bug 978164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3712">SUSE bug 978160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3712">SUSE bug 978160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3712">SUSE bug 978160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3712">SUSE bug 978160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3712">SUSE bug 978164</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3712">SUSE bug 978164</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3714</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714" source="CVE"/>
    <description>
    The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3714.html">CVE-2016-3714</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3714">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3714">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3714">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3714">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3714">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3714">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3714">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3714">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3714">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3714">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3714">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3714">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3714">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3714">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3714">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3714">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3714">SUSE bug 982178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3714">SUSE bug 982178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3714">SUSE bug 982178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3714">SUSE bug 982178</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127753" comment="GraphicsMagick-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127754" comment="GraphicsMagick-devel-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127347" comment="ImageMagick-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127348" comment="ImageMagick-devel-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127349" comment="ImageMagick-devel-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127350" comment="ImageMagick-doc-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127351" comment="ImageMagick-extra-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127755" comment="libGraphicsMagick++-Q16-11-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127757" comment="libGraphicsMagick++-devel-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127758" comment="libGraphicsMagick-Q16-3-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127759" comment="libGraphicsMagick3-config-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127760" comment="libGraphicsMagickWand-Q16-2-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127352" comment="libMagick++-6_Q16-3-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127353" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127354" comment="libMagick++-devel-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127355" comment="libMagick++-devel-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127356" comment="libMagickCore-6_Q16-1-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127357" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127358" comment="libMagickWand-6_Q16-1-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127359" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127761" comment="perl-GraphicsMagick-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127360" comment="perl-PerlMagick-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3715</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3715" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715" source="CVE"/>
    <description>
    The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3715.html">CVE-2016-3715</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3715">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3715">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3715">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3715">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3715">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3715">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3715">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3715">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3715">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3715">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3715">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3715">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3715">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3715">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3715">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3715">SUSE bug 978061</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127753" comment="GraphicsMagick-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127754" comment="GraphicsMagick-devel-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127347" comment="ImageMagick-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127348" comment="ImageMagick-devel-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127349" comment="ImageMagick-devel-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127350" comment="ImageMagick-doc-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127351" comment="ImageMagick-extra-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127755" comment="libGraphicsMagick++-Q16-11-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127757" comment="libGraphicsMagick++-devel-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127758" comment="libGraphicsMagick-Q16-3-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127759" comment="libGraphicsMagick3-config-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127760" comment="libGraphicsMagickWand-Q16-2-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127352" comment="libMagick++-6_Q16-3-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127353" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127354" comment="libMagick++-devel-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127355" comment="libMagick++-devel-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127356" comment="libMagickCore-6_Q16-1-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127357" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127358" comment="libMagickWand-6_Q16-1-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127359" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127761" comment="perl-GraphicsMagick-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127360" comment="perl-PerlMagick-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3716</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716" source="CVE"/>
    <description>
    The MSL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to move arbitrary files via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3716.html">CVE-2016-3716</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3716">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3716">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3716">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3716">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3716">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3716">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3716">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3716">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3716">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3716">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3716">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3716">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3716">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3716">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3716">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3716">SUSE bug 978061</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127347" comment="ImageMagick-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127348" comment="ImageMagick-devel-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127349" comment="ImageMagick-devel-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127350" comment="ImageMagick-doc-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127351" comment="ImageMagick-extra-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127352" comment="libMagick++-6_Q16-3-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127353" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127354" comment="libMagick++-devel-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127355" comment="libMagick++-devel-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127356" comment="libMagickCore-6_Q16-1-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127357" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127358" comment="libMagickWand-6_Q16-1-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127359" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127360" comment="perl-PerlMagick-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3717</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717" source="CVE"/>
    <description>
    The LABEL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to read arbitrary files via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3717.html">CVE-2016-3717</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3717">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3717">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3717">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3717">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3717">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3717">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3717">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3717">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3717">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3717">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3717">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3717">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3717">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3717">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3717">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3717">SUSE bug 978061</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127753" comment="GraphicsMagick-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127754" comment="GraphicsMagick-devel-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127347" comment="ImageMagick-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127348" comment="ImageMagick-devel-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127349" comment="ImageMagick-devel-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127350" comment="ImageMagick-doc-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127351" comment="ImageMagick-extra-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127755" comment="libGraphicsMagick++-Q16-11-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127757" comment="libGraphicsMagick++-devel-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127758" comment="libGraphicsMagick-Q16-3-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127759" comment="libGraphicsMagick3-config-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127760" comment="libGraphicsMagickWand-Q16-2-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127352" comment="libMagick++-6_Q16-3-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127353" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127354" comment="libMagick++-devel-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127355" comment="libMagick++-devel-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127356" comment="libMagickCore-6_Q16-1-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127357" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127358" comment="libMagickWand-6_Q16-1-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127359" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127761" comment="perl-GraphicsMagick-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127360" comment="perl-PerlMagick-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3718</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718" source="CVE"/>
    <description>
    The (1) HTTP and (2) FTP coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3718.html">CVE-2016-3718</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3718">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3718">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3718">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3718">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3718">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3718">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3718">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3718">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3718">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3718">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3718">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3718">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3718">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3718">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3718">SUSE bug 978061</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3718">SUSE bug 978061</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127753" comment="GraphicsMagick-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127754" comment="GraphicsMagick-devel-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127347" comment="ImageMagick-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127348" comment="ImageMagick-devel-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127349" comment="ImageMagick-devel-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127350" comment="ImageMagick-doc-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127351" comment="ImageMagick-extra-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127755" comment="libGraphicsMagick++-Q16-11-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127757" comment="libGraphicsMagick++-devel-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127758" comment="libGraphicsMagick-Q16-3-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127759" comment="libGraphicsMagick3-config-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127760" comment="libGraphicsMagickWand-Q16-2-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127352" comment="libMagick++-6_Q16-3-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127353" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127354" comment="libMagick++-devel-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127355" comment="libMagick++-devel-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127356" comment="libMagickCore-6_Q16-1-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127357" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127358" comment="libMagickWand-6_Q16-1-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127359" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127761" comment="perl-GraphicsMagick-1.3.21-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127360" comment="perl-PerlMagick-6.8.8.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3945</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) cvt_by_strip and (2) cvt_by_tile functions in the tiff2rgba tool in LibTIFF 4.0.6 and earlier, when -b mode is enabled, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3945.html">CVE-2016-3945</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3945">SUSE bug 974614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3945">SUSE bug 974614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3945">SUSE bug 974614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3945">SUSE bug 974614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3945">SUSE bug 974614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3945">SUSE bug 974614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3945">SUSE bug 974614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3945">SUSE bug 974614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3945">SUSE bug 974614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3945">SUSE bug 974614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3945">SUSE bug 974614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3945">SUSE bug 974614</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134766" comment="libtiff-devel-4.0.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134767" comment="libtiff-devel-32bit-4.0.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134768" comment="libtiff5-4.0.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134769" comment="libtiff5-32bit-4.0.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134770" comment="tiff-4.0.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3947</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3947" source="CVE"/>
    <description>
    Heap-based buffer overflow in the Icmp6::Recv function in icmp/Icmp6.cc in the pinger utility in Squid before 3.5.16 and 4.x before 4.0.8 allows remote servers to cause a denial of service (performance degradation or transition failures) or write sensitive information to log files via an ICMPv6 packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3947.html">CVE-2016-3947</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3947">SUSE bug 973782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3947">SUSE bug 973782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3947">SUSE bug 973782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3947">SUSE bug 973782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3947">SUSE bug 973782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3947">SUSE bug 973782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3947">SUSE bug 973782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3947">SUSE bug 973782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3947">SUSE bug 973782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3947">SUSE bug 973782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3947">SUSE bug 973782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3947">SUSE bug 973782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3947">SUSE bug 973782</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135205" comment="squid-3.3.14-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3948</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3948" source="CVE"/>
    <description>
    Squid 3.x before 3.5.16 and 4.x before 4.0.8 improperly perform bounds checking, which allows remote attackers to cause a denial of service via a crafted HTTP response, related to Vary headers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3948.html">CVE-2016-3948</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3948">SUSE bug 973783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3948">SUSE bug 973783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3948">SUSE bug 973783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3948">SUSE bug 973783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3948">SUSE bug 973783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3948">SUSE bug 973783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3948">SUSE bug 973783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3948">SUSE bug 973783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3948">SUSE bug 973783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3948">SUSE bug 973783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3948">SUSE bug 973783</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3948">SUSE bug 973783</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135205" comment="squid-3.3.14-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3951</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3951" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3951" source="CVE"/>
    <description>
    Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3951.html">CVE-2016-3951</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3951">SUSE bug 974418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3951">SUSE bug 974418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3951">SUSE bug 974418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3951">SUSE bug 974418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3951">SUSE bug 974418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3951">SUSE bug 974418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3951">SUSE bug 974418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3951">SUSE bug 974418</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128019" comment="kernel-debug-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128020" comment="kernel-debug-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128021" comment="kernel-debug-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128022" comment="kernel-default-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128023" comment="kernel-default-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128024" comment="kernel-default-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128025" comment="kernel-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128026" comment="kernel-docs-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128027" comment="kernel-docs-html-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128028" comment="kernel-docs-pdf-4.1.21-14.5 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128029" comment="kernel-ec2-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128030" comment="kernel-ec2-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128031" comment="kernel-ec2-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128032" comment="kernel-macros-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128033" comment="kernel-obs-build-4.1.21-14.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128034" comment="kernel-obs-qa-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128035" comment="kernel-obs-qa-xen-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128036" comment="kernel-pae-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128037" comment="kernel-pae-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128038" comment="kernel-pae-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128039" comment="kernel-pv-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128040" comment="kernel-pv-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128041" comment="kernel-pv-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128042" comment="kernel-source-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128043" comment="kernel-source-vanilla-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128044" comment="kernel-syms-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128045" comment="kernel-vanilla-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128046" comment="kernel-vanilla-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128047" comment="kernel-xen-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128048" comment="kernel-xen-base-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128049" comment="kernel-xen-devel-4.1.21-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3955</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3955" source="CVE"/>
    <description>
    The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel before 4.5.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3955.html">CVE-2016-3955</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3955">SUSE bug 975945</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129149" comment="kernel-debug-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129150" comment="kernel-debug-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129151" comment="kernel-debug-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129152" comment="kernel-default-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129153" comment="kernel-default-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129154" comment="kernel-default-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129155" comment="kernel-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129156" comment="kernel-docs-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129157" comment="kernel-docs-html-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129158" comment="kernel-docs-pdf-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129159" comment="kernel-ec2-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129160" comment="kernel-ec2-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129161" comment="kernel-ec2-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129162" comment="kernel-macros-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129163" comment="kernel-obs-build-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129164" comment="kernel-obs-qa-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129165" comment="kernel-obs-qa-xen-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129166" comment="kernel-pae-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129167" comment="kernel-pae-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129168" comment="kernel-pae-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129169" comment="kernel-pv-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129170" comment="kernel-pv-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129171" comment="kernel-pv-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129172" comment="kernel-source-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129173" comment="kernel-source-vanilla-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129174" comment="kernel-syms-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129175" comment="kernel-vanilla-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129176" comment="kernel-vanilla-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129177" comment="kernel-xen-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129178" comment="kernel-xen-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129179" comment="kernel-xen-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3959</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3959" source="CVE"/>
    <description>
    The Verify function in crypto/dsa/dsa.go in Go before 1.5.4 and 1.6.x before 1.6.1 does not properly check parameters passed to the big integer library, which might allow remote attackers to cause a denial of service (infinite loop) via a crafted public key to a program that uses HTTPS client certificates or SSH server libraries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3959.html">CVE-2016-3959</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3959">SUSE bug 974232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3959">SUSE bug 974232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3959">SUSE bug 974232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3959">SUSE bug 974232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3959">SUSE bug 974232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3959">SUSE bug 974232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3959">SUSE bug 974232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3959">SUSE bug 974232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3959">SUSE bug 974232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3959">SUSE bug 974232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3959">SUSE bug 974232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3959">SUSE bug 974232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3959">SUSE bug 974232</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3959">SUSE bug 974232</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127853" comment="go-1.6.1-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153190" comment="go is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127854" comment="go-doc-1.6.1-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153191" comment="go-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3960</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3960" source="CVE"/>
    <description>
    Integer overflow in the x86 shadow pagetable code in Xen allows local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3960.html">CVE-2016-3960</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3960">SUSE bug 974038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3960">SUSE bug 974038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3960">SUSE bug 974038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3960">SUSE bug 974038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3960">SUSE bug 974038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3960">SUSE bug 974038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3960">SUSE bug 974038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3960">SUSE bug 974038</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3977</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3977" source="CVE"/>
    <description>
    Heap-based buffer overflow in util/gif2rgb.c in gif2rgb in giflib 5.1.2 allows remote attackers to cause a denial of service (application crash) via the background color index in a GIF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3977.html">CVE-2016-3977</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3977">SUSE bug 974847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3977">SUSE bug 974847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3977">SUSE bug 974847</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3977">SUSE bug 974847</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127226" comment="giflib-5.0.5-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153062" comment="giflib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127227" comment="giflib-devel-5.0.5-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153063" comment="giflib-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127228" comment="giflib-devel-32bit-5.0.5-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153064" comment="giflib-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127229" comment="giflib-progs-5.0.5-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153065" comment="giflib-progs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127230" comment="libgif6-5.0.5-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153066" comment="libgif6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127231" comment="libgif6-32bit-5.0.5-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153067" comment="libgif6-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3981</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3981" source="CVE"/>
    <description>
    Heap-based buffer overflow in the bmp_read_rows function in pngxrbmp.c in OptiPNG before 0.7.6 allows remote attackers to cause a denial of service (out-of-bounds read or write access and crash) or possibly execute arbitrary code via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3981.html">CVE-2016-3981</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3981">SUSE bug 973992</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126362" comment="optipng-0.7.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153607" comment="optipng is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3982</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3982" source="CVE"/>
    <description>
    Off-by-one error in the bmp_rle4_fread function in pngxrbmp.c in OptiPNG before 0.7.6 allows remote attackers to cause a denial of service (out-of-bounds read or write access and crash) or possibly execute arbitrary code via a crafted image file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3982.html">CVE-2016-3982</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3982">SUSE bug 973992</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126362" comment="optipng-0.7.5-8.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153607" comment="optipng is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3990</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" source="CVE"/>
    <description>
    Heap-based buffer overflow in the horizontalDifference8 function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image to tiffcp.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3990.html">CVE-2016-3990</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3990">SUSE bug 975069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3990">SUSE bug 975069</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3990">SUSE bug 975069</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134766" comment="libtiff-devel-4.0.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134767" comment="libtiff-devel-32bit-4.0.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134768" comment="libtiff5-4.0.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134769" comment="libtiff5-32bit-4.0.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134770" comment="tiff-4.0.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3991</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" source="CVE"/>
    <description>
    Heap-based buffer overflow in the loadImage function in the tiffcrop tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image with zero tiles.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3991.html">CVE-2016-3991</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3991">SUSE bug 975070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3991">SUSE bug 975070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3991">SUSE bug 975070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3991">SUSE bug 975070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3991">SUSE bug 975070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3991">SUSE bug 975070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3991">SUSE bug 975070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3991">SUSE bug 975070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3991">SUSE bug 975070</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134766" comment="libtiff-devel-4.0.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134767" comment="libtiff-devel-32bit-4.0.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134768" comment="libtiff5-4.0.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134769" comment="libtiff5-32bit-4.0.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134770" comment="tiff-4.0.6-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3992</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-3992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3992" source="CVE"/>
    <description>
    cronic before 3 allows local users to write to arbitrary files via a symlink attack on a (1) cronic.out.$$, (2) cronic.err.$$, or (3) cronic.trace.$$ file in /tmp.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-3992.html">CVE-2016-3992</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3992">SUSE bug 974845</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-3992">SUSE bug 974845</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129743" comment="cronic-3-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153663" comment="cronic is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4001</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4001" source="CVE"/>
    <description>
    Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4001.html">CVE-2016-4001</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4001">SUSE bug 975128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4001">SUSE bug 975130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4001">SUSE bug 975128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4001">SUSE bug 975128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4001">SUSE bug 975128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4001">SUSE bug 975128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4001">SUSE bug 975128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4001">SUSE bug 975130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4001">SUSE bug 975130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4001">SUSE bug 975128</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4002</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4002" source="CVE"/>
    <description>
    Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4002.html">CVE-2016-4002</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4002">SUSE bug 975136</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4002">SUSE bug 975138</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4002">SUSE bug 975136</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4002">SUSE bug 975136</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4002">SUSE bug 975136</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4002">SUSE bug 975136</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4002">SUSE bug 975136</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4002">SUSE bug 975138</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4002">SUSE bug 975138</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4002">SUSE bug 975136</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4007</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4007" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the obs-service-extract_file package before 0.3-5.1 in openSUSE Leap 42.1 and before 0.3-3.1 in openSUSE 13.2 allow attackers to execute arbitrary commands via a service definition, related to executing unzip with "illegal options."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4007.html">CVE-2016-4007</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4007">SUSE bug 967265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4007">SUSE bug 967265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4007">SUSE bug 967265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4007">SUSE bug 967265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4007">SUSE bug 967265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4007">SUSE bug 967265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4007">SUSE bug 967265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4007">SUSE bug 967265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4007">SUSE bug 967265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4007">SUSE bug 967265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4007">SUSE bug 967265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4007">SUSE bug 967265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4007">SUSE bug 967265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4007">SUSE bug 967265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4007">SUSE bug 967265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4007">SUSE bug 967265</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129215" comment="obs-service-source_validator-0.6+git20160531.fbfe336-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153664" comment="obs-service-source_validator is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4008</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4008" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4008" source="CVE"/>
    <description>
    The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4008.html">CVE-2016-4008</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4008">SUSE bug 982779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4008">SUSE bug 982779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4008">SUSE bug 982779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4008">SUSE bug 982779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4008">SUSE bug 982779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4008">SUSE bug 982779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4008">SUSE bug 982779</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4008">SUSE bug 982779</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129262" comment="libtasn1-3.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152119" comment="libtasn1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129263" comment="libtasn1-6-3.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152120" comment="libtasn1-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129264" comment="libtasn1-6-32bit-3.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152121" comment="libtasn1-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129265" comment="libtasn1-devel-3.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152122" comment="libtasn1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129266" comment="libtasn1-devel-32bit-3.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152787" comment="libtasn1-devel-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4020</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4020" source="CVE"/>
    <description>
    The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4020.html">CVE-2016-4020</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4020">SUSE bug 975700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4020">SUSE bug 975700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4020">SUSE bug 975907</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4020">SUSE bug 975700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4020">SUSE bug 975700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4020">SUSE bug 975700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4020">SUSE bug 975907</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4020">SUSE bug 975907</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4020">SUSE bug 975700</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4037</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4037" source="CVE"/>
    <description>
    The ehci_advance_state function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list, a related issue to CVE-2015-8558.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4037.html">CVE-2016-4037</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4037">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4037">SUSE bug 959006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4037">SUSE bug 976109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4037">SUSE bug 976111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4037">SUSE bug 976109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4037">SUSE bug 959005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4037">SUSE bug 959006</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4037">SUSE bug 976111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4037">SUSE bug 976109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4037">SUSE bug 976111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4037">SUSE bug 976111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4037">SUSE bug 976109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4049</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4049" source="CVE"/>
    <description>
    The bgp_dump_routes_func function in bgpd/bgp_dump.c in Quagga does not perform size checks when dumping data, which might allow remote attackers to cause a denial of service (assertion failure and daemon crash) via a large BGP packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4049.html">CVE-2016-4049</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4049">SUSE bug 977012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4049">SUSE bug 977012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4049">SUSE bug 977012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4049">SUSE bug 977012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4049">SUSE bug 977012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4049">SUSE bug 977012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4049">SUSE bug 977012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4049">SUSE bug 977012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4049">SUSE bug 977012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4049">SUSE bug 977012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4049">SUSE bug 977012</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127674" comment="quagga-0.99.24.1-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151418" comment="quagga is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127675" comment="quagga-devel-0.99.24.1-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153572" comment="quagga-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4051</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4051" source="CVE"/>
    <description>
    Buffer overflow in cachemgr.cgi in Squid 2.x, 3.x before 3.5.17, and 4.x before 4.0.9 might allow remote attackers to cause a denial of service or execute arbitrary code by seeding manager reports with crafted data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4051.html">CVE-2016-4051</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4051">SUSE bug 976553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4051">SUSE bug 976553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4051">SUSE bug 976553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4051">SUSE bug 976553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4051">SUSE bug 976553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4051">SUSE bug 976553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4051">SUSE bug 976553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4051">SUSE bug 976553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4051">SUSE bug 976553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4051">SUSE bug 976553</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135205" comment="squid-3.3.14-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4052</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4052" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote HTTP servers to cause a denial of service or execute arbitrary code via crafted Edge Side Includes (ESI) responses.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4052.html">CVE-2016-4052</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4052">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4052">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4052">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4052">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4052">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4052">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4052">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4052">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4052">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4052">SUSE bug 976556</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135205" comment="squid-3.3.14-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4053</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4053" source="CVE"/>
    <description>
    Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote attackers to obtain sensitive stack layout information via crafted Edge Side Includes (ESI) responses, related to incorrect use of assert and compiler optimization.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4053.html">CVE-2016-4053</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4053">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4053">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4053">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4053">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4053">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4053">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4053">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4053">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4053">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4053">SUSE bug 976556</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135205" comment="squid-3.3.14-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4054</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4054" source="CVE"/>
    <description>
    Buffer overflow in Squid 3.x before 3.5.17 and 4.x before 4.0.9 allows remote attackers to execute arbitrary code via crafted Edge Side Includes (ESI) responses.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4054.html">CVE-2016-4054</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4054">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4054">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4054">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4054">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4054">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4054">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4054">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4054">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4054">SUSE bug 976556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4054">SUSE bug 976556</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135205" comment="squid-3.3.14-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4069</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4069" source="CVE"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in Roundcube Webmail before 1.1.5 allows remote attackers to hijack the authentication of users for requests that download attachments and cause a denial of service (disk consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4069.html">CVE-2016-4069</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4069">SUSE bug 976988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4069">SUSE bug 976988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4069">SUSE bug 976988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4069">SUSE bug 976988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4069">SUSE bug 976988</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135206" comment="roundcubemail-1.1.5-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4070</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4070" source="CVE"/>
    <description>
    ** DISPUTED ** Integer overflow in the php_raw_url_encode function in ext/standard/url.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to cause a denial of service (application crash) via a long string to the rawurlencode function. NOTE: the vendor says "Not sure if this qualifies as security issue (probably not)."
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4070.html">CVE-2016-4070</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4070">SUSE bug 976997</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4070">SUSE bug 976997</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4070">SUSE bug 976997</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4070">SUSE bug 976997</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4070">SUSE bug 976997</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4070">SUSE bug 976997</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4070">SUSE bug 976997</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4070">SUSE bug 976997</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4070">SUSE bug 976997</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4070">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4070">SUSE bug 976997</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127954" comment="apache2-mod_php5-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127955" comment="php5-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127956" comment="php5-bcmath-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127957" comment="php5-bz2-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127958" comment="php5-calendar-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127959" comment="php5-ctype-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127960" comment="php5-curl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127961" comment="php5-dba-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127962" comment="php5-devel-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127963" comment="php5-dom-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127964" comment="php5-enchant-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127965" comment="php5-exif-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127966" comment="php5-fastcgi-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127967" comment="php5-fileinfo-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127968" comment="php5-firebird-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127969" comment="php5-fpm-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127970" comment="php5-ftp-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127971" comment="php5-gd-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127972" comment="php5-gettext-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127973" comment="php5-gmp-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127974" comment="php5-iconv-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127975" comment="php5-imap-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127976" comment="php5-intl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127977" comment="php5-json-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127978" comment="php5-ldap-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127979" comment="php5-mbstring-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127980" comment="php5-mcrypt-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127981" comment="php5-mssql-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127982" comment="php5-mysql-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127983" comment="php5-odbc-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127984" comment="php5-opcache-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127985" comment="php5-openssl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127986" comment="php5-pcntl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127987" comment="php5-pdo-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127988" comment="php5-pear-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127989" comment="php5-pgsql-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127990" comment="php5-phar-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127991" comment="php5-posix-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127992" comment="php5-pspell-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127993" comment="php5-readline-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127994" comment="php5-shmop-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127995" comment="php5-snmp-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127996" comment="php5-soap-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127997" comment="php5-sockets-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127998" comment="php5-sqlite-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127999" comment="php5-suhosin-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128000" comment="php5-sysvmsg-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128001" comment="php5-sysvsem-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128002" comment="php5-sysvshm-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128003" comment="php5-tidy-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128004" comment="php5-tokenizer-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128005" comment="php5-wddx-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128006" comment="php5-xmlreader-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128007" comment="php5-xmlrpc-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128008" comment="php5-xmlwriter-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128009" comment="php5-xsl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128010" comment="php5-zip-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128011" comment="php5-zlib-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4071</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4071" source="CVE"/>
    <description>
    Format string vulnerability in the php_snmp_error function in ext/snmp/snmp.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via format string specifiers in an SNMP::get call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4071.html">CVE-2016-4071</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4071">SUSE bug 977000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4071">SUSE bug 977000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4071">SUSE bug 977000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4071">SUSE bug 977000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4071">SUSE bug 977000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4071">SUSE bug 977000</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127954" comment="apache2-mod_php5-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127955" comment="php5-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127956" comment="php5-bcmath-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127957" comment="php5-bz2-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127958" comment="php5-calendar-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127959" comment="php5-ctype-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127960" comment="php5-curl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127961" comment="php5-dba-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127962" comment="php5-devel-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127963" comment="php5-dom-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127964" comment="php5-enchant-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127965" comment="php5-exif-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127966" comment="php5-fastcgi-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127967" comment="php5-fileinfo-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127968" comment="php5-firebird-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127969" comment="php5-fpm-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127970" comment="php5-ftp-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127971" comment="php5-gd-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127972" comment="php5-gettext-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127973" comment="php5-gmp-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127974" comment="php5-iconv-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127975" comment="php5-imap-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127976" comment="php5-intl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127977" comment="php5-json-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127978" comment="php5-ldap-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127979" comment="php5-mbstring-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127980" comment="php5-mcrypt-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127981" comment="php5-mssql-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127982" comment="php5-mysql-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127983" comment="php5-odbc-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127984" comment="php5-opcache-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127985" comment="php5-openssl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127986" comment="php5-pcntl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127987" comment="php5-pdo-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127988" comment="php5-pear-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127989" comment="php5-pgsql-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127990" comment="php5-phar-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127991" comment="php5-posix-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127992" comment="php5-pspell-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127993" comment="php5-readline-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127994" comment="php5-shmop-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127995" comment="php5-snmp-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127996" comment="php5-soap-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127997" comment="php5-sockets-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127998" comment="php5-sqlite-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127999" comment="php5-suhosin-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128000" comment="php5-sysvmsg-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128001" comment="php5-sysvsem-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128002" comment="php5-sysvshm-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128003" comment="php5-tidy-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128004" comment="php5-tokenizer-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128005" comment="php5-wddx-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128006" comment="php5-xmlreader-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128007" comment="php5-xmlrpc-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128008" comment="php5-xmlwriter-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128009" comment="php5-xsl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128010" comment="php5-zip-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128011" comment="php5-zlib-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4073</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4073" source="CVE"/>
    <description>
    Multiple integer overflows in the mbfl_strcut function in ext/mbstring/libmbfl/mbfl/mbfilter.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted mb_strcut call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4073.html">CVE-2016-4073</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4073">SUSE bug 977003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4073">SUSE bug 977003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4073">SUSE bug 977003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4073">SUSE bug 977003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4073">SUSE bug 977003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4073">SUSE bug 977003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4073">SUSE bug 980366</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127954" comment="apache2-mod_php5-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127955" comment="php5-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127956" comment="php5-bcmath-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127957" comment="php5-bz2-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127958" comment="php5-calendar-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127959" comment="php5-ctype-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127960" comment="php5-curl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127961" comment="php5-dba-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127962" comment="php5-devel-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127963" comment="php5-dom-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127964" comment="php5-enchant-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127965" comment="php5-exif-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127966" comment="php5-fastcgi-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127967" comment="php5-fileinfo-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127968" comment="php5-firebird-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127969" comment="php5-fpm-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127970" comment="php5-ftp-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127971" comment="php5-gd-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127972" comment="php5-gettext-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127973" comment="php5-gmp-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127974" comment="php5-iconv-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127975" comment="php5-imap-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127976" comment="php5-intl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127977" comment="php5-json-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127978" comment="php5-ldap-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127979" comment="php5-mbstring-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127980" comment="php5-mcrypt-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127981" comment="php5-mssql-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127982" comment="php5-mysql-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127983" comment="php5-odbc-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127984" comment="php5-opcache-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127985" comment="php5-openssl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127986" comment="php5-pcntl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127987" comment="php5-pdo-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127988" comment="php5-pear-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127989" comment="php5-pgsql-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127990" comment="php5-phar-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127991" comment="php5-posix-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127992" comment="php5-pspell-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127993" comment="php5-readline-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127994" comment="php5-shmop-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127995" comment="php5-snmp-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127996" comment="php5-soap-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127997" comment="php5-sockets-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127998" comment="php5-sqlite-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127999" comment="php5-suhosin-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128000" comment="php5-sysvmsg-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128001" comment="php5-sysvsem-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128002" comment="php5-sysvshm-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128003" comment="php5-tidy-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128004" comment="php5-tokenizer-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128005" comment="php5-wddx-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128006" comment="php5-xmlreader-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128007" comment="php5-xmlrpc-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128008" comment="php5-xmlwriter-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128009" comment="php5-xsl-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128010" comment="php5-zip-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128011" comment="php5-zlib-5.5.14-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4300</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4300" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4300" source="CVE"/>
    <description>
    Integer overflow in the read_SubStreamsInfo function in archive_read_support_format_7zip.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a 7zip file with a large number of substreams, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4300.html">CVE-2016-4300</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4300">SUSE bug 985832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4300">SUSE bug 985832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4300">SUSE bug 985832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4300">SUSE bug 985832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4300">SUSE bug 985832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4300">SUSE bug 985832</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135169" comment="bsdtar-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135170" comment="libarchive-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135171" comment="libarchive-devel-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135172" comment="libarchive13-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135173" comment="libarchive13-32bit-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4301</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4301" source="CVE"/>
    <description>
    Stack-based buffer overflow in the parse_device function in archive_read_support_format_mtree.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a crafted mtree file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4301.html">CVE-2016-4301</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4301">SUSE bug 985826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4301">SUSE bug 985826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4301">SUSE bug 985826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4301">SUSE bug 985826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4301">SUSE bug 985826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4301">SUSE bug 985826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4301">SUSE bug 985826</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135169" comment="bsdtar-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135170" comment="libarchive-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135171" comment="libarchive-devel-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135172" comment="libarchive13-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135173" comment="libarchive13-32bit-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4302</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4302" source="CVE"/>
    <description>
    Heap-based buffer overflow in the parse_codes function in archive_read_support_format_rar.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a RAR file with a zero-sized dictionary.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4302.html">CVE-2016-4302</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4302">SUSE bug 985835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4302">SUSE bug 985835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4302">SUSE bug 985835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4302">SUSE bug 985835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4302">SUSE bug 985835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4302">SUSE bug 985835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4302">SUSE bug 985835</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135169" comment="bsdtar-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135170" comment="libarchive-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135171" comment="libarchive-devel-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135172" comment="libarchive13-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135173" comment="libarchive13-32bit-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4303</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4303" source="CVE"/>
    <description>
    The parse_string function in cjson.c in the cJSON library mishandles UTF8/16 strings, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a non-hex character in a JSON string, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4303.html">CVE-2016-4303</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4303">SUSE bug 984453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4303">SUSE bug 984453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4303">SUSE bug 984453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4303">SUSE bug 984453</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133269" comment="iperf-3.0.12-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153665" comment="iperf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133270" comment="iperf-devel-3.0.12-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153666" comment="iperf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133271" comment="libiperf0-3.0.12-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153667" comment="libiperf0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4324</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4324" source="CVE"/>
    <description>
    Use-after-free vulnerability in LibreOffice before 5.1.4 allows remote attackers to execute arbitrary code via a crafted RTF file, related to stylesheet and superscript tokens.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4324.html">CVE-2016-4324</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4324">SUSE bug 987553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4324">SUSE bug 987553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4324">SUSE bug 987553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4324">SUSE bug 987553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4324">SUSE bug 987553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4324">SUSE bug 987553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4324">SUSE bug 987553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4324">SUSE bug 987553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4324">SUSE bug 987553</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134774" comment="libreoffice-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134775" comment="libreoffice-base-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134776" comment="libreoffice-base-drivers-mysql-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151464" comment="libreoffice-base-drivers-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134777" comment="libreoffice-base-drivers-postgresql-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153330" comment="libreoffice-base-drivers-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134778" comment="libreoffice-branding-upstream-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134779" comment="libreoffice-calc-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134780" comment="libreoffice-calc-extensions-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134781" comment="libreoffice-draw-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134782" comment="libreoffice-filters-optional-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134783" comment="libreoffice-gdb-pretty-printers-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153331" comment="libreoffice-gdb-pretty-printers is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134784" comment="libreoffice-glade-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153332" comment="libreoffice-glade is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134785" comment="libreoffice-gnome-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134786" comment="libreoffice-gtk3-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153333" comment="libreoffice-gtk3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134787" comment="libreoffice-icon-theme-breeze-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151471" comment="libreoffice-icon-theme-breeze is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134788" comment="libreoffice-icon-theme-galaxy-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151472" comment="libreoffice-icon-theme-galaxy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134789" comment="libreoffice-icon-theme-hicontrast-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151473" comment="libreoffice-icon-theme-hicontrast is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134790" comment="libreoffice-icon-theme-oxygen-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151474" comment="libreoffice-icon-theme-oxygen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134791" comment="libreoffice-icon-theme-sifr-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151475" comment="libreoffice-icon-theme-sifr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134792" comment="libreoffice-icon-theme-tango-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151476" comment="libreoffice-icon-theme-tango is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134793" comment="libreoffice-impress-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134794" comment="libreoffice-kde4-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151478" comment="libreoffice-kde4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134795" comment="libreoffice-l10n-af-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153334" comment="libreoffice-l10n-af is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134796" comment="libreoffice-l10n-ar-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153335" comment="libreoffice-l10n-ar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134797" comment="libreoffice-l10n-as-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153336" comment="libreoffice-l10n-as is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134798" comment="libreoffice-l10n-bg-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153337" comment="libreoffice-l10n-bg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134799" comment="libreoffice-l10n-bn-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153338" comment="libreoffice-l10n-bn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134800" comment="libreoffice-l10n-br-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153339" comment="libreoffice-l10n-br is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134801" comment="libreoffice-l10n-ca-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153340" comment="libreoffice-l10n-ca is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134802" comment="libreoffice-l10n-cs-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134803" comment="libreoffice-l10n-cy-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153341" comment="libreoffice-l10n-cy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134804" comment="libreoffice-l10n-da-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134805" comment="libreoffice-l10n-de-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134806" comment="libreoffice-l10n-dz-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153342" comment="libreoffice-l10n-dz is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134807" comment="libreoffice-l10n-el-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134808" comment="libreoffice-l10n-en-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134809" comment="libreoffice-l10n-es-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134810" comment="libreoffice-l10n-et-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153343" comment="libreoffice-l10n-et is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134811" comment="libreoffice-l10n-eu-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153344" comment="libreoffice-l10n-eu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134812" comment="libreoffice-l10n-fa-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153345" comment="libreoffice-l10n-fa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134813" comment="libreoffice-l10n-fi-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153346" comment="libreoffice-l10n-fi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134814" comment="libreoffice-l10n-fr-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134815" comment="libreoffice-l10n-ga-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153347" comment="libreoffice-l10n-ga is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134816" comment="libreoffice-l10n-gl-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153348" comment="libreoffice-l10n-gl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134817" comment="libreoffice-l10n-gu-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153349" comment="libreoffice-l10n-gu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134818" comment="libreoffice-l10n-he-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153350" comment="libreoffice-l10n-he is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134819" comment="libreoffice-l10n-hi-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153351" comment="libreoffice-l10n-hi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134820" comment="libreoffice-l10n-hr-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153352" comment="libreoffice-l10n-hr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134821" comment="libreoffice-l10n-hu-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134822" comment="libreoffice-l10n-it-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134823" comment="libreoffice-l10n-ja-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134824" comment="libreoffice-l10n-kk-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153353" comment="libreoffice-l10n-kk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134825" comment="libreoffice-l10n-kn-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153354" comment="libreoffice-l10n-kn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134826" comment="libreoffice-l10n-ko-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153355" comment="libreoffice-l10n-ko is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134827" comment="libreoffice-l10n-lt-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153356" comment="libreoffice-l10n-lt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134828" comment="libreoffice-l10n-lv-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153357" comment="libreoffice-l10n-lv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134829" comment="libreoffice-l10n-mai-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153358" comment="libreoffice-l10n-mai is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134830" comment="libreoffice-l10n-ml-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153359" comment="libreoffice-l10n-ml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134831" comment="libreoffice-l10n-mr-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153360" comment="libreoffice-l10n-mr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134832" comment="libreoffice-l10n-nb-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153361" comment="libreoffice-l10n-nb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134833" comment="libreoffice-l10n-nl-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153362" comment="libreoffice-l10n-nl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134834" comment="libreoffice-l10n-nn-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153363" comment="libreoffice-l10n-nn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134835" comment="libreoffice-l10n-nr-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153364" comment="libreoffice-l10n-nr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134836" comment="libreoffice-l10n-nso-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153365" comment="libreoffice-l10n-nso is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134837" comment="libreoffice-l10n-or-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153366" comment="libreoffice-l10n-or is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134838" comment="libreoffice-l10n-pa-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153367" comment="libreoffice-l10n-pa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134839" comment="libreoffice-l10n-pl-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134840" comment="libreoffice-l10n-pt-BR-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153368" comment="libreoffice-l10n-pt-BR is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134841" comment="libreoffice-l10n-pt-PT-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153369" comment="libreoffice-l10n-pt-PT is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134842" comment="libreoffice-l10n-ro-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153370" comment="libreoffice-l10n-ro is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134843" comment="libreoffice-l10n-ru-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134844" comment="libreoffice-l10n-si-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153371" comment="libreoffice-l10n-si is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134845" comment="libreoffice-l10n-sk-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153372" comment="libreoffice-l10n-sk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134846" comment="libreoffice-l10n-sl-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153373" comment="libreoffice-l10n-sl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134847" comment="libreoffice-l10n-sr-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153374" comment="libreoffice-l10n-sr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134848" comment="libreoffice-l10n-ss-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153375" comment="libreoffice-l10n-ss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134849" comment="libreoffice-l10n-st-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153376" comment="libreoffice-l10n-st is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134850" comment="libreoffice-l10n-sv-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153377" comment="libreoffice-l10n-sv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134851" comment="libreoffice-l10n-ta-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153378" comment="libreoffice-l10n-ta is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134852" comment="libreoffice-l10n-te-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153379" comment="libreoffice-l10n-te is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134853" comment="libreoffice-l10n-th-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153380" comment="libreoffice-l10n-th is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134854" comment="libreoffice-l10n-tn-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153381" comment="libreoffice-l10n-tn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134855" comment="libreoffice-l10n-tr-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153382" comment="libreoffice-l10n-tr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134856" comment="libreoffice-l10n-ts-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153383" comment="libreoffice-l10n-ts is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134857" comment="libreoffice-l10n-uk-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153384" comment="libreoffice-l10n-uk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134858" comment="libreoffice-l10n-ve-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153385" comment="libreoffice-l10n-ve is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134859" comment="libreoffice-l10n-xh-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153386" comment="libreoffice-l10n-xh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134860" comment="libreoffice-l10n-zh-Hans-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153387" comment="libreoffice-l10n-zh-Hans is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134861" comment="libreoffice-l10n-zh-Hant-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153388" comment="libreoffice-l10n-zh-Hant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134862" comment="libreoffice-l10n-zu-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153389" comment="libreoffice-l10n-zu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134863" comment="libreoffice-mailmerge-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134864" comment="libreoffice-math-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134865" comment="libreoffice-officebean-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153390" comment="libreoffice-officebean is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134866" comment="libreoffice-pyuno-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134867" comment="libreoffice-sdk-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153391" comment="libreoffice-sdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134868" comment="libreoffice-sdk-doc-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153392" comment="libreoffice-sdk-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134869" comment="libreoffice-writer-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134870" comment="libreoffice-writer-extensions-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134871" comment="libreofficekit-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153393" comment="libreofficekit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134872" comment="libreofficekit-devel-5.1.5.2-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153394" comment="libreofficekit-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4342</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4342" source="CVE"/>
    <description>
    ext/phar/phar_object.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 mishandles zero-length uncompressed data, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) TAR, (2) ZIP, or (3) PHAR archive.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4342.html">CVE-2016-4342</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4342">SUSE bug 977991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4342">SUSE bug 977991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4342">SUSE bug 977991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4342">SUSE bug 977991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4342">SUSE bug 977991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4342">SUSE bug 977991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4342">SUSE bug 977991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4342">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4342">SUSE bug 977991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4342">SUSE bug 977991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128554" comment="apache2-mod_php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128555" comment="php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128556" comment="php5-bcmath-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128557" comment="php5-bz2-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128558" comment="php5-calendar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128559" comment="php5-ctype-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128560" comment="php5-curl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128561" comment="php5-dba-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128562" comment="php5-devel-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128563" comment="php5-dom-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128564" comment="php5-enchant-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128565" comment="php5-exif-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128566" comment="php5-fastcgi-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128567" comment="php5-fileinfo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128568" comment="php5-firebird-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128569" comment="php5-fpm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128570" comment="php5-ftp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128571" comment="php5-gd-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128572" comment="php5-gettext-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128573" comment="php5-gmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128574" comment="php5-iconv-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128575" comment="php5-imap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128576" comment="php5-intl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128577" comment="php5-json-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128578" comment="php5-ldap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128579" comment="php5-mbstring-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128580" comment="php5-mcrypt-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128581" comment="php5-mssql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128582" comment="php5-mysql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128583" comment="php5-odbc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128584" comment="php5-opcache-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128585" comment="php5-openssl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128586" comment="php5-pcntl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128587" comment="php5-pdo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128588" comment="php5-pear-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128589" comment="php5-pgsql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128590" comment="php5-phar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128591" comment="php5-posix-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128592" comment="php5-pspell-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128593" comment="php5-readline-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128594" comment="php5-shmop-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128595" comment="php5-snmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128596" comment="php5-soap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128597" comment="php5-sockets-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128598" comment="php5-sqlite-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128599" comment="php5-suhosin-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128600" comment="php5-sysvmsg-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128601" comment="php5-sysvsem-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128602" comment="php5-sysvshm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128603" comment="php5-tidy-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128604" comment="php5-tokenizer-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128605" comment="php5-wddx-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128606" comment="php5-xmlreader-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128607" comment="php5-xmlrpc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128608" comment="php5-xmlwriter-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128609" comment="php5-xsl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128610" comment="php5-zip-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128611" comment="php5-zlib-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4346</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4346" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4346" source="CVE"/>
    <description>
    Integer overflow in the str_pad function in ext/standard/string.c in PHP before 7.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a long string, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4346.html">CVE-2016-4346</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4346">SUSE bug 977993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4346">SUSE bug 977994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4346">SUSE bug 977995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4346">SUSE bug 977994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4346">SUSE bug 977994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4346">SUSE bug 977994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4346">SUSE bug 977994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4346">SUSE bug 977994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4346">SUSE bug 977994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4346">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4346">SUSE bug 977994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4346">SUSE bug 977994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4346">SUSE bug 977994</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4346">SUSE bug 977994</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128554" comment="apache2-mod_php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128555" comment="php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128556" comment="php5-bcmath-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128557" comment="php5-bz2-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128558" comment="php5-calendar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128559" comment="php5-ctype-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128560" comment="php5-curl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128561" comment="php5-dba-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128562" comment="php5-devel-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128563" comment="php5-dom-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128564" comment="php5-enchant-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128565" comment="php5-exif-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128566" comment="php5-fastcgi-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128567" comment="php5-fileinfo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128568" comment="php5-firebird-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128569" comment="php5-fpm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128570" comment="php5-ftp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128571" comment="php5-gd-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128572" comment="php5-gettext-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128573" comment="php5-gmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128574" comment="php5-iconv-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128575" comment="php5-imap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128576" comment="php5-intl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128577" comment="php5-json-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128578" comment="php5-ldap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128579" comment="php5-mbstring-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128580" comment="php5-mcrypt-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128581" comment="php5-mssql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128582" comment="php5-mysql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128583" comment="php5-odbc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128584" comment="php5-opcache-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128585" comment="php5-openssl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128586" comment="php5-pcntl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128587" comment="php5-pdo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128588" comment="php5-pear-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128589" comment="php5-pgsql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128590" comment="php5-phar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128591" comment="php5-posix-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128592" comment="php5-pspell-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128593" comment="php5-readline-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128594" comment="php5-shmop-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128595" comment="php5-snmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128596" comment="php5-soap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128597" comment="php5-sockets-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128598" comment="php5-sqlite-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128599" comment="php5-suhosin-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128600" comment="php5-sysvmsg-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128601" comment="php5-sysvsem-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128602" comment="php5-sysvshm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128603" comment="php5-tidy-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128604" comment="php5-tokenizer-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128605" comment="php5-wddx-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128606" comment="php5-xmlreader-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128607" comment="php5-xmlrpc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128608" comment="php5-xmlwriter-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128609" comment="php5-xsl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128610" comment="php5-zip-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128611" comment="php5-zlib-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4348</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4348" source="CVE"/>
    <description>
    The _rsvg_css_normalize_font_size function in librsvg 2.40.2 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via circular definitions in an SVG document.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4348.html">CVE-2016-4348</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4348">SUSE bug 977986</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4348">SUSE bug 977986</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4348">SUSE bug 977986</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4348">SUSE bug 977986</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127804" comment="gdk-pixbuf-loader-rsvg-2.40.15-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151634" comment="gdk-pixbuf-loader-rsvg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127805" comment="gdk-pixbuf-loader-rsvg-32bit-2.40.15-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153668" comment="gdk-pixbuf-loader-rsvg-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127806" comment="librsvg-2.40.15-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153669" comment="librsvg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127807" comment="librsvg-2-2-2.40.15-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151635" comment="librsvg-2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127808" comment="librsvg-2-2-32bit-2.40.15-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153670" comment="librsvg-2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127809" comment="librsvg-devel-2.40.15-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151636" comment="librsvg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127810" comment="rsvg-view-2.40.15-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153671" comment="rsvg-view is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127811" comment="typelib-1_0-Rsvg-2_0-2.40.15-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151637" comment="typelib-1_0-Rsvg-2_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4414</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4414" source="CVE"/>
    <description>
    The onReadyRead function in core/coreauthhandler.cpp in Quassel before 0.12.4 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via invalid handshake data.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4414.html">CVE-2016-4414</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4414">SUSE bug 978002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4414">SUSE bug 978002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4414">SUSE bug 978002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4414">SUSE bug 978002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4414">SUSE bug 978002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4414">SUSE bug 978002</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127666" comment="quassel-0.12.2-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153183" comment="quassel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127667" comment="quassel-base-0.12.2-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153184" comment="quassel-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127668" comment="quassel-client-0.12.2-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153185" comment="quassel-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127669" comment="quassel-core-0.12.2-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153186" comment="quassel-core is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127670" comment="quassel-mono-0.12.2-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153187" comment="quassel-mono is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4429</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429" source="CVE"/>
    <description>
    Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4429.html">CVE-2016-4429</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4429">SUSE bug 980854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4429">SUSE bug 980854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4429">SUSE bug 980854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4429">SUSE bug 980854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4429">SUSE bug 980854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4429">SUSE bug 980854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4429">SUSE bug 980854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4429">SUSE bug 980854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4429">SUSE bug 980854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4429">SUSE bug 980854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4429">SUSE bug 980854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4429">SUSE bug 980854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4429">SUSE bug 980854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4429">SUSE bug 1081556</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4429">SUSE bug 980854</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129885" comment="glibc-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129886" comment="glibc-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129887" comment="glibc-devel-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129888" comment="glibc-devel-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152566" comment="glibc-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129889" comment="glibc-devel-static-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129890" comment="glibc-devel-static-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152568" comment="glibc-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129891" comment="glibc-extra-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129892" comment="glibc-html-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129893" comment="glibc-i18ndata-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129894" comment="glibc-info-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129895" comment="glibc-locale-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129896" comment="glibc-locale-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151374" comment="glibc-locale-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129897" comment="glibc-obsolete-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152571" comment="glibc-obsolete is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129898" comment="glibc-profile-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129899" comment="glibc-profile-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152573" comment="glibc-profile-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129900" comment="glibc-testsuite-2.19-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152574" comment="glibc-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129901" comment="glibc-utils-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129902" comment="glibc-utils-32bit-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152576" comment="glibc-utils-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129903" comment="nscd-2.19-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4439</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4439" source="CVE"/>
    <description>
    The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4439.html">CVE-2016-4439</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4439">SUSE bug 980711</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4439">SUSE bug 980716</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4439">SUSE bug 980711</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4439">SUSE bug 980716</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4439">SUSE bug 980711</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4439">SUSE bug 980711</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4439">SUSE bug 980716</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4439">SUSE bug 980716</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4439">SUSE bug 980716</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4441</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4441" source="CVE"/>
    <description>
    The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4441.html">CVE-2016-4441</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980723</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980723</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980723</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980723</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980723</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4441">SUSE bug 980724</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4447</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4447" source="CVE"/>
    <description>
    The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4447.html">CVE-2016-4447</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4447">SUSE bug 981548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4447">SUSE bug 981548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4447">SUSE bug 981548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4447">SUSE bug 981548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4447">SUSE bug 981548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4447">SUSE bug 981548</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128929" comment="libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128930" comment="libxml2-2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128931" comment="libxml2-2-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128932" comment="libxml2-devel-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128933" comment="libxml2-devel-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128934" comment="libxml2-doc-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128935" comment="libxml2-tools-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128936" comment="python-libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4448</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448" source="CVE"/>
    <description>
    Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4448.html">CVE-2016-4448</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4448">SUSE bug 981549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4448">SUSE bug 981549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4448">SUSE bug 981549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4448">SUSE bug 981549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4448">SUSE bug 981549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4448">SUSE bug 981549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4448">SUSE bug 981549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4448">SUSE bug 981549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4448">SUSE bug 981549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4448">SUSE bug 981549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4448">SUSE bug 981549</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4448">SUSE bug 1010299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4448">SUSE bug 1010299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4448">SUSE bug 1010299</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128929" comment="libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128930" comment="libxml2-2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128931" comment="libxml2-2-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128932" comment="libxml2-devel-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128933" comment="libxml2-devel-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128934" comment="libxml2-doc-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128935" comment="libxml2-tools-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128936" comment="python-libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4449</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4449" source="CVE"/>
    <description>
    XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4449.html">CVE-2016-4449</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4449">SUSE bug 981550</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4449">SUSE bug 981550</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4449">SUSE bug 981550</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4449">SUSE bug 981550</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4449">SUSE bug 981550</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4449">SUSE bug 981550</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128929" comment="libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128930" comment="libxml2-2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128931" comment="libxml2-2-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128932" comment="libxml2-devel-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128933" comment="libxml2-devel-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128934" comment="libxml2-doc-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128935" comment="libxml2-tools-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128936" comment="python-libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4450</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4450" source="CVE"/>
    <description>
    os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4450.html">CVE-2016-4450</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4450">SUSE bug 982484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4450">SUSE bug 982505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4450">SUSE bug 982507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4450">SUSE bug 982505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4450">SUSE bug 982507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4450">SUSE bug 982484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4450">SUSE bug 982505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4450">SUSE bug 982505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4450">SUSE bug 982505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4450">SUSE bug 982505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4450">SUSE bug 982505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4450">SUSE bug 982505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4450">SUSE bug 982505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4450">SUSE bug 982505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4450">SUSE bug 982505</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148026" comment="nginx-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153280" comment="nginx is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4453</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4453" source="CVE"/>
    <description>
    The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4453.html">CVE-2016-4453</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4453">SUSE bug 982223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4453">SUSE bug 982225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4453">SUSE bug 982223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4453">SUSE bug 982223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4453">SUSE bug 982225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4453">SUSE bug 982223</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4453">SUSE bug 982225</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135119" comment="qemu-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135120" comment="qemu-arm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135121" comment="qemu-block-curl-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135122" comment="qemu-block-rbd-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135123" comment="qemu-extra-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135124" comment="qemu-guest-agent-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135125" comment="qemu-ipxe-1.0.0-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135126" comment="qemu-kvm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135127" comment="qemu-lang-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135128" comment="qemu-linux-user-2.3.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135129" comment="qemu-ppc-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135130" comment="qemu-s390-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135131" comment="qemu-seabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135132" comment="qemu-sgabios-8-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135133" comment="qemu-testsuite-2.3.1-19.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135134" comment="qemu-tools-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135135" comment="qemu-vgabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135136" comment="qemu-x86-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4454</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4454" source="CVE"/>
    <description>
    The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4454.html">CVE-2016-4454</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4454">SUSE bug 982222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4454">SUSE bug 982224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4454">SUSE bug 982222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4454">SUSE bug 982222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4454">SUSE bug 982224</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4454">SUSE bug 982222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4454">SUSE bug 982224</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135119" comment="qemu-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135120" comment="qemu-arm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135121" comment="qemu-block-curl-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135122" comment="qemu-block-rbd-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135123" comment="qemu-extra-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135124" comment="qemu-guest-agent-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135125" comment="qemu-ipxe-1.0.0-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135126" comment="qemu-kvm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135127" comment="qemu-lang-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135128" comment="qemu-linux-user-2.3.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135129" comment="qemu-ppc-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135130" comment="qemu-s390-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135131" comment="qemu-seabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135132" comment="qemu-sgabios-8-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135133" comment="qemu-testsuite-2.3.1-19.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135134" comment="qemu-tools-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135135" comment="qemu-vgabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135136" comment="qemu-x86-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4463</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4463" source="CVE"/>
    <description>
    Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4463.html">CVE-2016-4463</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4463">SUSE bug 985860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4463">SUSE bug 985860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4463">SUSE bug 985860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4463">SUSE bug 985860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4463">SUSE bug 985860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4463">SUSE bug 985860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4463">SUSE bug 985860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4463">SUSE bug 985860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4463">SUSE bug 985860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4463">SUSE bug 985860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4463">SUSE bug 985860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4463">SUSE bug 985860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4463">SUSE bug 985860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4463">SUSE bug 985860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4463">SUSE bug 985860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4463">SUSE bug 985860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4463">SUSE bug 985860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4463">SUSE bug 985860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4463">SUSE bug 985860</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4463">SUSE bug 985860</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134310" comment="libxerces-c-3_1-3.1.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151260" comment="libxerces-c-3_1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134311" comment="libxerces-c-3_1-32bit-3.1.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153271" comment="libxerces-c-3_1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134312" comment="libxerces-c-devel-3.1.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153272" comment="libxerces-c-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134313" comment="xerces-c-3.1.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153273" comment="xerces-c is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4470</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4470" source="CVE"/>
    <description>
    The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4470.html">CVE-2016-4470</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 990058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984764</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4470">SUSE bug 984755</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130071" comment="kernel-debug-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130072" comment="kernel-debug-base-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130073" comment="kernel-debug-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130074" comment="kernel-default-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130075" comment="kernel-default-base-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130076" comment="kernel-default-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130077" comment="kernel-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130078" comment="kernel-docs-4.1.27-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130079" comment="kernel-docs-html-4.1.27-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130080" comment="kernel-docs-pdf-4.1.27-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130081" comment="kernel-ec2-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130082" comment="kernel-ec2-base-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130083" comment="kernel-ec2-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130084" comment="kernel-macros-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130085" comment="kernel-obs-build-4.1.27-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130086" comment="kernel-obs-qa-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130087" comment="kernel-obs-qa-xen-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130088" comment="kernel-pae-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130089" comment="kernel-pae-base-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130090" comment="kernel-pae-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130091" comment="kernel-pv-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130092" comment="kernel-pv-base-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130093" comment="kernel-pv-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130094" comment="kernel-source-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130095" comment="kernel-source-vanilla-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130096" comment="kernel-syms-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130097" comment="kernel-vanilla-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130098" comment="kernel-vanilla-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130099" comment="kernel-xen-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130100" comment="kernel-xen-base-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130101" comment="kernel-xen-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4478</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4478" source="CVE"/>
    <description>
    Buffer overflow in the xmlrpc_char_encode function in modules/transport/xmlrpc/xmlrpclib.c in Atheme before 7.2.7 allows remote attackers to cause a denial of service via vectors related to XMLRPC response encoding.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4478.html">CVE-2016-4478</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4478">SUSE bug 978170</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4478">SUSE bug 978170</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4478">SUSE bug 978170</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4478">SUSE bug 978170</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127671" comment="atheme-7.2.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152588" comment="atheme is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127672" comment="atheme-devel-7.2.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152589" comment="atheme-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127673" comment="libathemecore1-7.2.6-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152590" comment="libathemecore1 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4480</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4480" source="CVE"/>
    <description>
    The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4480.html">CVE-2016-4480</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4480">SUSE bug 978295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4480">SUSE bug 978295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4480">SUSE bug 978288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4480">SUSE bug 978295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4480">SUSE bug 978288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4480">SUSE bug 978295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4480">SUSE bug 978295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4480">SUSE bug 978295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4480">SUSE bug 978295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4480">SUSE bug 978295</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4480">SUSE bug 978288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4480">SUSE bug 978295</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4482</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4482" source="CVE"/>
    <description>
    The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4482.html">CVE-2016-4482</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4482">SUSE bug 978401</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129149" comment="kernel-debug-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129150" comment="kernel-debug-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129151" comment="kernel-debug-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129152" comment="kernel-default-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129153" comment="kernel-default-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129154" comment="kernel-default-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129155" comment="kernel-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129156" comment="kernel-docs-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129157" comment="kernel-docs-html-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129158" comment="kernel-docs-pdf-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129159" comment="kernel-ec2-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129160" comment="kernel-ec2-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129161" comment="kernel-ec2-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129162" comment="kernel-macros-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129163" comment="kernel-obs-build-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129164" comment="kernel-obs-qa-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129165" comment="kernel-obs-qa-xen-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129166" comment="kernel-pae-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129167" comment="kernel-pae-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129168" comment="kernel-pae-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129169" comment="kernel-pv-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129170" comment="kernel-pv-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129171" comment="kernel-pv-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129172" comment="kernel-source-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129173" comment="kernel-source-vanilla-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129174" comment="kernel-syms-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129175" comment="kernel-vanilla-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129176" comment="kernel-vanilla-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129177" comment="kernel-xen-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129178" comment="kernel-xen-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129179" comment="kernel-xen-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4483</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4483" source="CVE"/>
    <description>
    The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization.  NOTE: this vulnerability may be a duplicate of CVE-2016-3627.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4483.html">CVE-2016-4483</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4483">SUSE bug 978395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4483">SUSE bug 978395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4483">SUSE bug 978395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4483">SUSE bug 978395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4483">SUSE bug 978395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4483">SUSE bug 978395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4483">SUSE bug 978395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4483">SUSE bug 1026101</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128929" comment="libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128930" comment="libxml2-2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128931" comment="libxml2-2-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128932" comment="libxml2-devel-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128933" comment="libxml2-devel-32bit-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128934" comment="libxml2-doc-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128935" comment="libxml2-tools-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128936" comment="python-libxml2-2.9.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4485</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4485" source="CVE"/>
    <description>
    The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4485.html">CVE-2016-4485</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4485">SUSE bug 978821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4485">SUSE bug 978821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4485">SUSE bug 978821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4485">SUSE bug 978821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4485">SUSE bug 978821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4485">SUSE bug 978821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4485">SUSE bug 978821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4485">SUSE bug 978821</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134384" comment="drbd-8.4.6-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134385" comment="drbd-kmp-default-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134386" comment="drbd-kmp-pv-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134387" comment="drbd-kmp-xen-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134388" comment="hdjmod-1.28-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134389" comment="hdjmod-kmp-default-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134390" comment="hdjmod-kmp-pae-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134391" comment="hdjmod-kmp-pv-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134392" comment="hdjmod-kmp-xen-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134393" comment="ipset-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134394" comment="ipset-devel-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134395" comment="ipset-kmp-default-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134396" comment="ipset-kmp-pae-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134397" comment="ipset-kmp-pv-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134398" comment="ipset-kmp-xen-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134399" comment="kernel-debug-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134400" comment="kernel-debug-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134401" comment="kernel-debug-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134402" comment="kernel-default-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134403" comment="kernel-default-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134404" comment="kernel-default-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134405" comment="kernel-devel-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134406" comment="kernel-docs-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134407" comment="kernel-docs-html-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134408" comment="kernel-docs-pdf-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134409" comment="kernel-ec2-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134410" comment="kernel-ec2-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134411" comment="kernel-ec2-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134412" comment="kernel-macros-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134413" comment="kernel-obs-build-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134414" comment="kernel-obs-qa-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134415" comment="kernel-obs-qa-xen-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134416" comment="kernel-pae-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134417" comment="kernel-pae-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134418" comment="kernel-pae-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134419" comment="kernel-pv-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134420" comment="kernel-pv-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134421" comment="kernel-pv-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134422" comment="kernel-source-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134423" comment="kernel-source-vanilla-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134424" comment="kernel-syms-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134425" comment="kernel-vanilla-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134426" comment="kernel-vanilla-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134427" comment="kernel-xen-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134428" comment="kernel-xen-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134429" comment="kernel-xen-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134430" comment="libipset3-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134431" comment="lttng-modules-2.7.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134432" comment="lttng-modules-kmp-default-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134433" comment="lttng-modules-kmp-pv-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134434" comment="pcfclock-0.44-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134435" comment="pcfclock-kmp-default-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134436" comment="pcfclock-kmp-pae-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134437" comment="pcfclock-kmp-pv-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134438" comment="vhba-kmp-20140928-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134439" comment="vhba-kmp-default-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134440" comment="vhba-kmp-pae-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134441" comment="vhba-kmp-pv-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134442" comment="vhba-kmp-xen-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4486</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4486" source="CVE"/>
    <description>
    The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4486.html">CVE-2016-4486</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 990058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4486">SUSE bug 978822</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134384" comment="drbd-8.4.6-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134385" comment="drbd-kmp-default-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134386" comment="drbd-kmp-pv-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134387" comment="drbd-kmp-xen-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134388" comment="hdjmod-1.28-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134389" comment="hdjmod-kmp-default-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134390" comment="hdjmod-kmp-pae-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134391" comment="hdjmod-kmp-pv-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134392" comment="hdjmod-kmp-xen-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134393" comment="ipset-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134394" comment="ipset-devel-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134395" comment="ipset-kmp-default-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134396" comment="ipset-kmp-pae-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134397" comment="ipset-kmp-pv-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134398" comment="ipset-kmp-xen-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134399" comment="kernel-debug-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134400" comment="kernel-debug-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134401" comment="kernel-debug-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134402" comment="kernel-default-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134403" comment="kernel-default-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134404" comment="kernel-default-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134405" comment="kernel-devel-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134406" comment="kernel-docs-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134407" comment="kernel-docs-html-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134408" comment="kernel-docs-pdf-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134409" comment="kernel-ec2-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134410" comment="kernel-ec2-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134411" comment="kernel-ec2-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134412" comment="kernel-macros-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134413" comment="kernel-obs-build-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134414" comment="kernel-obs-qa-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134415" comment="kernel-obs-qa-xen-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134416" comment="kernel-pae-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134417" comment="kernel-pae-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134418" comment="kernel-pae-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134419" comment="kernel-pv-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134420" comment="kernel-pv-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134421" comment="kernel-pv-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134422" comment="kernel-source-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134423" comment="kernel-source-vanilla-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134424" comment="kernel-syms-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134425" comment="kernel-vanilla-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134426" comment="kernel-vanilla-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134427" comment="kernel-xen-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134428" comment="kernel-xen-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134429" comment="kernel-xen-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134430" comment="libipset3-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134431" comment="lttng-modules-2.7.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134432" comment="lttng-modules-kmp-default-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134433" comment="lttng-modules-kmp-pv-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134434" comment="pcfclock-0.44-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134435" comment="pcfclock-kmp-default-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134436" comment="pcfclock-kmp-pae-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134437" comment="pcfclock-kmp-pv-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134438" comment="vhba-kmp-20140928-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134439" comment="vhba-kmp-default-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134440" comment="vhba-kmp-pae-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134441" comment="vhba-kmp-pv-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134442" comment="vhba-kmp-xen-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4537</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537" source="CVE"/>
    <description>
    The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 accepts a negative integer for the scale argument, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4537.html">CVE-2016-4537</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4537">SUSE bug 978827</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128554" comment="apache2-mod_php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128555" comment="php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128556" comment="php5-bcmath-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128557" comment="php5-bz2-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128558" comment="php5-calendar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128559" comment="php5-ctype-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128560" comment="php5-curl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128561" comment="php5-dba-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128562" comment="php5-devel-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128563" comment="php5-dom-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128564" comment="php5-enchant-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128565" comment="php5-exif-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128566" comment="php5-fastcgi-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128567" comment="php5-fileinfo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128568" comment="php5-firebird-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128569" comment="php5-fpm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128570" comment="php5-ftp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128571" comment="php5-gd-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128572" comment="php5-gettext-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128573" comment="php5-gmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128574" comment="php5-iconv-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128575" comment="php5-imap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128576" comment="php5-intl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128577" comment="php5-json-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128578" comment="php5-ldap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128579" comment="php5-mbstring-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128580" comment="php5-mcrypt-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128581" comment="php5-mssql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128582" comment="php5-mysql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128583" comment="php5-odbc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128584" comment="php5-opcache-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128585" comment="php5-openssl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128586" comment="php5-pcntl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128587" comment="php5-pdo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128588" comment="php5-pear-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128589" comment="php5-pgsql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128590" comment="php5-phar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128591" comment="php5-posix-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128592" comment="php5-pspell-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128593" comment="php5-readline-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128594" comment="php5-shmop-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128595" comment="php5-snmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128596" comment="php5-soap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128597" comment="php5-sockets-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128598" comment="php5-sqlite-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128599" comment="php5-suhosin-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128600" comment="php5-sysvmsg-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128601" comment="php5-sysvsem-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128602" comment="php5-sysvshm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128603" comment="php5-tidy-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128604" comment="php5-tokenizer-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128605" comment="php5-wddx-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128606" comment="php5-xmlreader-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128607" comment="php5-xmlrpc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128608" comment="php5-xmlwriter-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128609" comment="php5-xsl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128610" comment="php5-zip-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128611" comment="php5-zlib-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4538</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538" source="CVE"/>
    <description>
    The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 modifies certain data structures without considering whether they are copies of the _zero_, _one_, or _two_ global variable, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4538.html">CVE-2016-4538</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4538">SUSE bug 978827</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128554" comment="apache2-mod_php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128555" comment="php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128556" comment="php5-bcmath-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128557" comment="php5-bz2-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128558" comment="php5-calendar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128559" comment="php5-ctype-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128560" comment="php5-curl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128561" comment="php5-dba-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128562" comment="php5-devel-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128563" comment="php5-dom-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128564" comment="php5-enchant-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128565" comment="php5-exif-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128566" comment="php5-fastcgi-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128567" comment="php5-fileinfo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128568" comment="php5-firebird-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128569" comment="php5-fpm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128570" comment="php5-ftp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128571" comment="php5-gd-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128572" comment="php5-gettext-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128573" comment="php5-gmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128574" comment="php5-iconv-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128575" comment="php5-imap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128576" comment="php5-intl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128577" comment="php5-json-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128578" comment="php5-ldap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128579" comment="php5-mbstring-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128580" comment="php5-mcrypt-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128581" comment="php5-mssql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128582" comment="php5-mysql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128583" comment="php5-odbc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128584" comment="php5-opcache-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128585" comment="php5-openssl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128586" comment="php5-pcntl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128587" comment="php5-pdo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128588" comment="php5-pear-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128589" comment="php5-pgsql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128590" comment="php5-phar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128591" comment="php5-posix-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128592" comment="php5-pspell-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128593" comment="php5-readline-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128594" comment="php5-shmop-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128595" comment="php5-snmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128596" comment="php5-soap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128597" comment="php5-sockets-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128598" comment="php5-sqlite-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128599" comment="php5-suhosin-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128600" comment="php5-sysvmsg-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128601" comment="php5-sysvsem-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128602" comment="php5-sysvshm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128603" comment="php5-tidy-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128604" comment="php5-tokenizer-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128605" comment="php5-wddx-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128606" comment="php5-xmlreader-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128607" comment="php5-xmlrpc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128608" comment="php5-xmlwriter-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128609" comment="php5-xsl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128610" comment="php5-zip-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128611" comment="php5-zlib-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4539</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539" source="CVE"/>
    <description>
    The xml_parse_into_struct function in ext/xml/xml.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (buffer under-read and segmentation fault) or possibly have unspecified other impact via crafted XML data in the second argument, leading to a parser level of zero.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4539.html">CVE-2016-4539</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4539">SUSE bug 978828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4539">SUSE bug 978828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4539">SUSE bug 978828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4539">SUSE bug 978828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4539">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4539">SUSE bug 978828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4539">SUSE bug 978828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4539">SUSE bug 978828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4539">SUSE bug 978828</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128554" comment="apache2-mod_php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128555" comment="php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128556" comment="php5-bcmath-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128557" comment="php5-bz2-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128558" comment="php5-calendar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128559" comment="php5-ctype-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128560" comment="php5-curl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128561" comment="php5-dba-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128562" comment="php5-devel-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128563" comment="php5-dom-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128564" comment="php5-enchant-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128565" comment="php5-exif-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128566" comment="php5-fastcgi-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128567" comment="php5-fileinfo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128568" comment="php5-firebird-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128569" comment="php5-fpm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128570" comment="php5-ftp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128571" comment="php5-gd-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128572" comment="php5-gettext-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128573" comment="php5-gmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128574" comment="php5-iconv-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128575" comment="php5-imap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128576" comment="php5-intl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128577" comment="php5-json-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128578" comment="php5-ldap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128579" comment="php5-mbstring-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128580" comment="php5-mcrypt-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128581" comment="php5-mssql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128582" comment="php5-mysql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128583" comment="php5-odbc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128584" comment="php5-opcache-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128585" comment="php5-openssl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128586" comment="php5-pcntl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128587" comment="php5-pdo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128588" comment="php5-pear-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128589" comment="php5-pgsql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128590" comment="php5-phar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128591" comment="php5-posix-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128592" comment="php5-pspell-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128593" comment="php5-readline-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128594" comment="php5-shmop-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128595" comment="php5-snmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128596" comment="php5-soap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128597" comment="php5-sockets-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128598" comment="php5-sqlite-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128599" comment="php5-suhosin-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128600" comment="php5-sysvmsg-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128601" comment="php5-sysvsem-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128602" comment="php5-sysvshm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128603" comment="php5-tidy-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128604" comment="php5-tokenizer-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128605" comment="php5-wddx-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128606" comment="php5-xmlreader-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128607" comment="php5-xmlrpc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128608" comment="php5-xmlwriter-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128609" comment="php5-xsl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128610" comment="php5-zip-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128611" comment="php5-zlib-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4540</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540" source="CVE"/>
    <description>
    The grapheme_stripos function in ext/intl/grapheme/grapheme_string.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4540.html">CVE-2016-4540</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4540">SUSE bug 978829</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128554" comment="apache2-mod_php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128555" comment="php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128556" comment="php5-bcmath-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128557" comment="php5-bz2-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128558" comment="php5-calendar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128559" comment="php5-ctype-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128560" comment="php5-curl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128561" comment="php5-dba-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128562" comment="php5-devel-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128563" comment="php5-dom-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128564" comment="php5-enchant-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128565" comment="php5-exif-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128566" comment="php5-fastcgi-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128567" comment="php5-fileinfo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128568" comment="php5-firebird-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128569" comment="php5-fpm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128570" comment="php5-ftp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128571" comment="php5-gd-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128572" comment="php5-gettext-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128573" comment="php5-gmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128574" comment="php5-iconv-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128575" comment="php5-imap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128576" comment="php5-intl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128577" comment="php5-json-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128578" comment="php5-ldap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128579" comment="php5-mbstring-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128580" comment="php5-mcrypt-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128581" comment="php5-mssql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128582" comment="php5-mysql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128583" comment="php5-odbc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128584" comment="php5-opcache-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128585" comment="php5-openssl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128586" comment="php5-pcntl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128587" comment="php5-pdo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128588" comment="php5-pear-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128589" comment="php5-pgsql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128590" comment="php5-phar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128591" comment="php5-posix-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128592" comment="php5-pspell-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128593" comment="php5-readline-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128594" comment="php5-shmop-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128595" comment="php5-snmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128596" comment="php5-soap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128597" comment="php5-sockets-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128598" comment="php5-sqlite-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128599" comment="php5-suhosin-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128600" comment="php5-sysvmsg-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128601" comment="php5-sysvsem-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128602" comment="php5-sysvshm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128603" comment="php5-tidy-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128604" comment="php5-tokenizer-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128605" comment="php5-wddx-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128606" comment="php5-xmlreader-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128607" comment="php5-xmlrpc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128608" comment="php5-xmlwriter-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128609" comment="php5-xsl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128610" comment="php5-zip-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128611" comment="php5-zlib-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4541</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541" source="CVE"/>
    <description>
    The grapheme_strpos function in ext/intl/grapheme/grapheme_string.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4541.html">CVE-2016-4541</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4541">SUSE bug 978829</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128554" comment="apache2-mod_php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128555" comment="php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128556" comment="php5-bcmath-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128557" comment="php5-bz2-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128558" comment="php5-calendar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128559" comment="php5-ctype-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128560" comment="php5-curl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128561" comment="php5-dba-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128562" comment="php5-devel-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128563" comment="php5-dom-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128564" comment="php5-enchant-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128565" comment="php5-exif-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128566" comment="php5-fastcgi-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128567" comment="php5-fileinfo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128568" comment="php5-firebird-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128569" comment="php5-fpm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128570" comment="php5-ftp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128571" comment="php5-gd-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128572" comment="php5-gettext-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128573" comment="php5-gmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128574" comment="php5-iconv-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128575" comment="php5-imap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128576" comment="php5-intl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128577" comment="php5-json-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128578" comment="php5-ldap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128579" comment="php5-mbstring-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128580" comment="php5-mcrypt-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128581" comment="php5-mssql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128582" comment="php5-mysql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128583" comment="php5-odbc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128584" comment="php5-opcache-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128585" comment="php5-openssl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128586" comment="php5-pcntl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128587" comment="php5-pdo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128588" comment="php5-pear-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128589" comment="php5-pgsql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128590" comment="php5-phar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128591" comment="php5-posix-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128592" comment="php5-pspell-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128593" comment="php5-readline-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128594" comment="php5-shmop-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128595" comment="php5-snmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128596" comment="php5-soap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128597" comment="php5-sockets-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128598" comment="php5-sqlite-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128599" comment="php5-suhosin-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128600" comment="php5-sysvmsg-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128601" comment="php5-sysvsem-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128602" comment="php5-sysvshm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128603" comment="php5-tidy-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128604" comment="php5-tokenizer-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128605" comment="php5-wddx-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128606" comment="php5-xmlreader-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128607" comment="php5-xmlrpc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128608" comment="php5-xmlwriter-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128609" comment="php5-xsl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128610" comment="php5-zip-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128611" comment="php5-zlib-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4542</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542" source="CVE"/>
    <description>
    The exif_process_IFD_TAG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not properly construct spprintf arguments, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4542.html">CVE-2016-4542</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4542">SUSE bug 978830</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128554" comment="apache2-mod_php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128555" comment="php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128556" comment="php5-bcmath-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128557" comment="php5-bz2-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128558" comment="php5-calendar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128559" comment="php5-ctype-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128560" comment="php5-curl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128561" comment="php5-dba-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128562" comment="php5-devel-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128563" comment="php5-dom-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128564" comment="php5-enchant-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128565" comment="php5-exif-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128566" comment="php5-fastcgi-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128567" comment="php5-fileinfo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128568" comment="php5-firebird-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128569" comment="php5-fpm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128570" comment="php5-ftp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128571" comment="php5-gd-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128572" comment="php5-gettext-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128573" comment="php5-gmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128574" comment="php5-iconv-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128575" comment="php5-imap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128576" comment="php5-intl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128577" comment="php5-json-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128578" comment="php5-ldap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128579" comment="php5-mbstring-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128580" comment="php5-mcrypt-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128581" comment="php5-mssql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128582" comment="php5-mysql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128583" comment="php5-odbc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128584" comment="php5-opcache-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128585" comment="php5-openssl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128586" comment="php5-pcntl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128587" comment="php5-pdo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128588" comment="php5-pear-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128589" comment="php5-pgsql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128590" comment="php5-phar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128591" comment="php5-posix-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128592" comment="php5-pspell-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128593" comment="php5-readline-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128594" comment="php5-shmop-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128595" comment="php5-snmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128596" comment="php5-soap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128597" comment="php5-sockets-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128598" comment="php5-sqlite-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128599" comment="php5-suhosin-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128600" comment="php5-sysvmsg-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128601" comment="php5-sysvsem-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128602" comment="php5-sysvshm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128603" comment="php5-tidy-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128604" comment="php5-tokenizer-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128605" comment="php5-wddx-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128606" comment="php5-xmlreader-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128607" comment="php5-xmlrpc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128608" comment="php5-xmlwriter-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128609" comment="php5-xsl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128610" comment="php5-zip-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128611" comment="php5-zlib-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4543</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543" source="CVE"/>
    <description>
    The exif_process_IFD_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate IFD sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4543.html">CVE-2016-4543</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4543">SUSE bug 978830</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128554" comment="apache2-mod_php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128555" comment="php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128556" comment="php5-bcmath-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128557" comment="php5-bz2-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128558" comment="php5-calendar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128559" comment="php5-ctype-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128560" comment="php5-curl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128561" comment="php5-dba-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128562" comment="php5-devel-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128563" comment="php5-dom-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128564" comment="php5-enchant-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128565" comment="php5-exif-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128566" comment="php5-fastcgi-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128567" comment="php5-fileinfo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128568" comment="php5-firebird-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128569" comment="php5-fpm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128570" comment="php5-ftp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128571" comment="php5-gd-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128572" comment="php5-gettext-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128573" comment="php5-gmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128574" comment="php5-iconv-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128575" comment="php5-imap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128576" comment="php5-intl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128577" comment="php5-json-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128578" comment="php5-ldap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128579" comment="php5-mbstring-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128580" comment="php5-mcrypt-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128581" comment="php5-mssql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128582" comment="php5-mysql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128583" comment="php5-odbc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128584" comment="php5-opcache-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128585" comment="php5-openssl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128586" comment="php5-pcntl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128587" comment="php5-pdo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128588" comment="php5-pear-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128589" comment="php5-pgsql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128590" comment="php5-phar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128591" comment="php5-posix-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128592" comment="php5-pspell-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128593" comment="php5-readline-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128594" comment="php5-shmop-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128595" comment="php5-snmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128596" comment="php5-soap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128597" comment="php5-sockets-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128598" comment="php5-sqlite-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128599" comment="php5-suhosin-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128600" comment="php5-sysvmsg-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128601" comment="php5-sysvsem-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128602" comment="php5-sysvshm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128603" comment="php5-tidy-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128604" comment="php5-tokenizer-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128605" comment="php5-wddx-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128606" comment="php5-xmlreader-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128607" comment="php5-xmlrpc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128608" comment="php5-xmlwriter-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128609" comment="php5-xsl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128610" comment="php5-zip-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128611" comment="php5-zlib-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4544</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544" source="CVE"/>
    <description>
    The exif_process_TIFF_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate TIFF start data, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4544.html">CVE-2016-4544</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 980366</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4544">SUSE bug 978830</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128554" comment="apache2-mod_php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128555" comment="php5-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128556" comment="php5-bcmath-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128557" comment="php5-bz2-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128558" comment="php5-calendar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128559" comment="php5-ctype-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128560" comment="php5-curl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128561" comment="php5-dba-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128562" comment="php5-devel-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128563" comment="php5-dom-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128564" comment="php5-enchant-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128565" comment="php5-exif-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128566" comment="php5-fastcgi-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128567" comment="php5-fileinfo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128568" comment="php5-firebird-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128569" comment="php5-fpm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128570" comment="php5-ftp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128571" comment="php5-gd-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128572" comment="php5-gettext-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128573" comment="php5-gmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128574" comment="php5-iconv-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128575" comment="php5-imap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128576" comment="php5-intl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128577" comment="php5-json-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128578" comment="php5-ldap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128579" comment="php5-mbstring-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128580" comment="php5-mcrypt-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128581" comment="php5-mssql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128582" comment="php5-mysql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128583" comment="php5-odbc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128584" comment="php5-opcache-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128585" comment="php5-openssl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128586" comment="php5-pcntl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128587" comment="php5-pdo-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128588" comment="php5-pear-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128589" comment="php5-pgsql-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128590" comment="php5-phar-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128591" comment="php5-posix-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128592" comment="php5-pspell-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128593" comment="php5-readline-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128594" comment="php5-shmop-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128595" comment="php5-snmp-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128596" comment="php5-soap-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128597" comment="php5-sockets-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128598" comment="php5-sqlite-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128599" comment="php5-suhosin-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128600" comment="php5-sysvmsg-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128601" comment="php5-sysvsem-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128602" comment="php5-sysvshm-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128603" comment="php5-tidy-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128604" comment="php5-tokenizer-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128605" comment="php5-wddx-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128606" comment="php5-xmlreader-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128607" comment="php5-xmlrpc-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128608" comment="php5-xmlwriter-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128609" comment="php5-xsl-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128610" comment="php5-zip-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128611" comment="php5-zlib-5.5.14-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4553</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4553" source="CVE"/>
    <description>
    client_side.cc in Squid before 3.5.18 and 4.x before 4.0.10 does not properly ignore the Host header when absolute-URI is provided, which allows remote attackers to conduct cache-poisoning attacks via an HTTP request.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4553.html">CVE-2016-4553</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4553">SUSE bug 979009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4553">SUSE bug 979009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4553">SUSE bug 979009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4553">SUSE bug 979009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4553">SUSE bug 979009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4553">SUSE bug 979009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4553">SUSE bug 990451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4553">SUSE bug 979009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4553">SUSE bug 979009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4553">SUSE bug 979009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4553">SUSE bug 990451</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135205" comment="squid-3.3.14-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4554</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4554" source="CVE"/>
    <description>
    mime_header.cc in Squid before 3.5.18 allows remote attackers to bypass intended same-origin restrictions and possibly conduct cache-poisoning attacks via a crafted HTTP Host header, aka a "header smuggling" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4554.html">CVE-2016-4554</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4554">SUSE bug 979010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4554">SUSE bug 979010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4554">SUSE bug 979010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4554">SUSE bug 979010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4554">SUSE bug 979010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4554">SUSE bug 979010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4554">SUSE bug 979010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4554">SUSE bug 979010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4554">SUSE bug 979010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4554">SUSE bug 979010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4554">SUSE bug 979010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4554">SUSE bug 979010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4554">SUSE bug 990451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4554">SUSE bug 979010</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135205" comment="squid-3.3.14-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4555</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4555" source="CVE"/>
    <description>
    client_side_request.cc in Squid 3.x before 3.5.18 and 4.x before 4.0.10 allows remote servers to cause a denial of service (crash) via crafted Edge Side Includes (ESI) responses.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4555.html">CVE-2016-4555</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4555">SUSE bug 979008</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4555">SUSE bug 979011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4555">SUSE bug 979008</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4555">SUSE bug 979011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4555">SUSE bug 979011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4555">SUSE bug 979011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4555">SUSE bug 979011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4555">SUSE bug 979011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4555">SUSE bug 979011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4555">SUSE bug 979011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4555">SUSE bug 979011</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135205" comment="squid-3.3.14-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4556</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4556" source="CVE"/>
    <description>
    Double free vulnerability in Esi.cc in Squid 3.x before 3.5.18 and 4.x before 4.0.10 allows remote servers to cause a denial of service (crash) via a crafted Edge Side Includes (ESI) response.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4556.html">CVE-2016-4556</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4556">SUSE bug 979008</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4556">SUSE bug 979011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4556">SUSE bug 979008</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4556">SUSE bug 979011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4556">SUSE bug 979008</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4556">SUSE bug 979008</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4556">SUSE bug 979008</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4556">SUSE bug 979008</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4556">SUSE bug 979008</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4556">SUSE bug 979008</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4556">SUSE bug 979008</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135205" comment="squid-3.3.14-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4557</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4557" source="CVE"/>
    <description>
    The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4557.html">CVE-2016-4557</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4557">SUSE bug 979018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4557">SUSE bug 979077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4557">SUSE bug 979018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4557">SUSE bug 979077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4557">SUSE bug 979018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4557">SUSE bug 979077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4557">SUSE bug 979018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4557">SUSE bug 979018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4557">SUSE bug 979018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4557">SUSE bug 979018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4557">SUSE bug 979018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4557">SUSE bug 979018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4557">SUSE bug 979018</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134384" comment="drbd-8.4.6-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134385" comment="drbd-kmp-default-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134386" comment="drbd-kmp-pv-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134387" comment="drbd-kmp-xen-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134388" comment="hdjmod-1.28-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134389" comment="hdjmod-kmp-default-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134390" comment="hdjmod-kmp-pae-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134391" comment="hdjmod-kmp-pv-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134392" comment="hdjmod-kmp-xen-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134393" comment="ipset-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134394" comment="ipset-devel-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134395" comment="ipset-kmp-default-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134396" comment="ipset-kmp-pae-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134397" comment="ipset-kmp-pv-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134398" comment="ipset-kmp-xen-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134399" comment="kernel-debug-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134400" comment="kernel-debug-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134401" comment="kernel-debug-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134402" comment="kernel-default-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134403" comment="kernel-default-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134404" comment="kernel-default-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134405" comment="kernel-devel-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134406" comment="kernel-docs-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134407" comment="kernel-docs-html-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134408" comment="kernel-docs-pdf-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134409" comment="kernel-ec2-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134410" comment="kernel-ec2-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134411" comment="kernel-ec2-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134412" comment="kernel-macros-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134413" comment="kernel-obs-build-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134414" comment="kernel-obs-qa-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134415" comment="kernel-obs-qa-xen-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134416" comment="kernel-pae-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134417" comment="kernel-pae-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134418" comment="kernel-pae-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134419" comment="kernel-pv-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134420" comment="kernel-pv-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134421" comment="kernel-pv-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134422" comment="kernel-source-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134423" comment="kernel-source-vanilla-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134424" comment="kernel-syms-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134425" comment="kernel-vanilla-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134426" comment="kernel-vanilla-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134427" comment="kernel-xen-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134428" comment="kernel-xen-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134429" comment="kernel-xen-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134430" comment="libipset3-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134431" comment="lttng-modules-2.7.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134432" comment="lttng-modules-kmp-default-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134433" comment="lttng-modules-kmp-pv-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134434" comment="pcfclock-0.44-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134435" comment="pcfclock-kmp-default-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134436" comment="pcfclock-kmp-pae-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134437" comment="pcfclock-kmp-pv-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134438" comment="vhba-kmp-20140928-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134439" comment="vhba-kmp-default-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134440" comment="vhba-kmp-pae-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134441" comment="vhba-kmp-pv-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134442" comment="vhba-kmp-xen-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4562</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4562" source="CVE"/>
    <description>
    The DrawDashPolygon function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 mishandles calculations of certain vertices integer data, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4562.html">CVE-2016-4562</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4562">SUSE bug 983292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4562">SUSE bug 983305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4562">SUSE bug 983308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4562">SUSE bug 983292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4562">SUSE bug 983292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4562">SUSE bug 983309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4562">SUSE bug 983292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4562">SUSE bug 983292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4562">SUSE bug 983292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4562">SUSE bug 983292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4562">SUSE bug 983292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4562">SUSE bug 983292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4562">SUSE bug 983292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4562">SUSE bug 983292</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4563</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4563" source="CVE"/>
    <description>
    The TraceStrokePolygon function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 mishandles the relationship between the BezierQuantum value and certain strokes data, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4563.html">CVE-2016-4563</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4563">SUSE bug 983305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4563">SUSE bug 983305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4563">SUSE bug 983305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4563">SUSE bug 983305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4563">SUSE bug 983305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4563">SUSE bug 983305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4563">SUSE bug 983305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4563">SUSE bug 983305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4563">SUSE bug 983305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4563">SUSE bug 983305</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4564</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4564" source="CVE"/>
    <description>
    The DrawImage function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 makes an incorrect function call in attempting to locate the next token, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4564.html">CVE-2016-4564</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4564">SUSE bug 983308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4564">SUSE bug 983308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4564">SUSE bug 983308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4564">SUSE bug 983308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4564">SUSE bug 983308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4564">SUSE bug 983308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4564">SUSE bug 983308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4564">SUSE bug 983308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4564">SUSE bug 983308</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4564">SUSE bug 983308</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4565</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4565" source="CVE"/>
    <description>
    The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4565.html">CVE-2016-4565</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 980363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 980363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 980883</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 980883</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 980363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 980883</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 980883</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 980883</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 980883</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 980883</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 980883</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 980883</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 980883</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 990058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4565">SUSE bug 979548</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129149" comment="kernel-debug-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129150" comment="kernel-debug-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129151" comment="kernel-debug-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129152" comment="kernel-default-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129153" comment="kernel-default-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129154" comment="kernel-default-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129155" comment="kernel-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129156" comment="kernel-docs-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129157" comment="kernel-docs-html-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129158" comment="kernel-docs-pdf-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129159" comment="kernel-ec2-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129160" comment="kernel-ec2-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129161" comment="kernel-ec2-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129162" comment="kernel-macros-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129163" comment="kernel-obs-build-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129164" comment="kernel-obs-qa-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129165" comment="kernel-obs-qa-xen-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129166" comment="kernel-pae-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129167" comment="kernel-pae-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129168" comment="kernel-pae-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129169" comment="kernel-pv-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129170" comment="kernel-pv-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129171" comment="kernel-pv-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129172" comment="kernel-source-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129173" comment="kernel-source-vanilla-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129174" comment="kernel-syms-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129175" comment="kernel-vanilla-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129176" comment="kernel-vanilla-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129177" comment="kernel-xen-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129178" comment="kernel-xen-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129179" comment="kernel-xen-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4569</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4569" source="CVE"/>
    <description>
    The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4569.html">CVE-2016-4569</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 990058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4569">SUSE bug 979213</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134384" comment="drbd-8.4.6-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134385" comment="drbd-kmp-default-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134386" comment="drbd-kmp-pv-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134387" comment="drbd-kmp-xen-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134388" comment="hdjmod-1.28-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134389" comment="hdjmod-kmp-default-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134390" comment="hdjmod-kmp-pae-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134391" comment="hdjmod-kmp-pv-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134392" comment="hdjmod-kmp-xen-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134393" comment="ipset-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134394" comment="ipset-devel-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134395" comment="ipset-kmp-default-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134396" comment="ipset-kmp-pae-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134397" comment="ipset-kmp-pv-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134398" comment="ipset-kmp-xen-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134399" comment="kernel-debug-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134400" comment="kernel-debug-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134401" comment="kernel-debug-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134402" comment="kernel-default-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134403" comment="kernel-default-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134404" comment="kernel-default-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134405" comment="kernel-devel-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134406" comment="kernel-docs-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134407" comment="kernel-docs-html-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134408" comment="kernel-docs-pdf-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134409" comment="kernel-ec2-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134410" comment="kernel-ec2-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134411" comment="kernel-ec2-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134412" comment="kernel-macros-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134413" comment="kernel-obs-build-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134414" comment="kernel-obs-qa-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134415" comment="kernel-obs-qa-xen-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134416" comment="kernel-pae-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134417" comment="kernel-pae-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134418" comment="kernel-pae-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134419" comment="kernel-pv-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134420" comment="kernel-pv-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134421" comment="kernel-pv-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134422" comment="kernel-source-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134423" comment="kernel-source-vanilla-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134424" comment="kernel-syms-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134425" comment="kernel-vanilla-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134426" comment="kernel-vanilla-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134427" comment="kernel-xen-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134428" comment="kernel-xen-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134429" comment="kernel-xen-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134430" comment="libipset3-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134431" comment="lttng-modules-2.7.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134432" comment="lttng-modules-kmp-default-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134433" comment="lttng-modules-kmp-pv-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134434" comment="pcfclock-0.44-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134435" comment="pcfclock-kmp-default-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134436" comment="pcfclock-kmp-pae-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134437" comment="pcfclock-kmp-pv-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134438" comment="vhba-kmp-20140928-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134439" comment="vhba-kmp-default-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134440" comment="vhba-kmp-pae-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134441" comment="vhba-kmp-pv-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134442" comment="vhba-kmp-xen-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4570</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4570" source="CVE"/>
    <description>
    The mxmlDelete function in mxml-node.c in mxml 2.9, 2.7, and possibly earlier allows remote attackers to cause a denial of service (stack consumption) via crafted xml file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4570.html">CVE-2016-4570</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4570">SUSE bug 979205</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4570">SUSE bug 979206</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4570">SUSE bug 979205</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4570">SUSE bug 979206</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4570">SUSE bug 979205</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4570">SUSE bug 979205</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4570">SUSE bug 979205</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4570">SUSE bug 979206</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4570">SUSE bug 979205</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4570">SUSE bug 979205</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4570">SUSE bug 979205</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4570">SUSE bug 979205</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4570">SUSE bug 979205</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4570">SUSE bug 979205</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4570">SUSE bug 979205</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4570">SUSE bug 979205</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149854" comment="libmxml1-2.9-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153672" comment="libmxml1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149855" comment="libmxml1-32bit-2.9-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153673" comment="libmxml1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149856" comment="mxml-2.9-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153674" comment="mxml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149857" comment="mxml-devel-2.9-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153675" comment="mxml-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4571</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4571" source="CVE"/>
    <description>
    The mxml_write_node function in mxml-file.c in mxml 2.9, 2.7, and possibly earlier allows remote attackers to cause a denial of service (stack consumption) via crafted xml file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4571.html">CVE-2016-4571</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4571">SUSE bug 979205</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4571">SUSE bug 979206</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4571">SUSE bug 979205</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4571">SUSE bug 979206</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4571">SUSE bug 979206</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4571">SUSE bug 979206</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4571">SUSE bug 979206</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4571">SUSE bug 979205</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4571">SUSE bug 979206</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4571">SUSE bug 979206</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4571">SUSE bug 979206</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4571">SUSE bug 979206</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4571">SUSE bug 979206</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4571">SUSE bug 979206</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149854" comment="libmxml1-2.9-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153672" comment="libmxml1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149855" comment="libmxml1-32bit-2.9-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153673" comment="libmxml1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149856" comment="mxml-2.9-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153674" comment="mxml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149857" comment="mxml-devel-2.9-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153675" comment="mxml-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4574</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4574" source="CVE"/>
    <description>
    Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-4356.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4574.html">CVE-2016-4574</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4574">SUSE bug 979261</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4574">SUSE bug 979261</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4574">SUSE bug 979261</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128612" comment="libksba-1.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153676" comment="libksba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128613" comment="libksba-devel-1.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153677" comment="libksba-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128614" comment="libksba8-1.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152539" comment="libksba8 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4578</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4578" source="CVE"/>
    <description>
    sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4578.html">CVE-2016-4578</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 990058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 979879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4578">SUSE bug 1052256</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134384" comment="drbd-8.4.6-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134385" comment="drbd-kmp-default-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134386" comment="drbd-kmp-pv-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134387" comment="drbd-kmp-xen-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134388" comment="hdjmod-1.28-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134389" comment="hdjmod-kmp-default-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134390" comment="hdjmod-kmp-pae-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134391" comment="hdjmod-kmp-pv-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134392" comment="hdjmod-kmp-xen-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134393" comment="ipset-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134394" comment="ipset-devel-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134395" comment="ipset-kmp-default-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134396" comment="ipset-kmp-pae-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134397" comment="ipset-kmp-pv-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134398" comment="ipset-kmp-xen-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134399" comment="kernel-debug-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134400" comment="kernel-debug-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134401" comment="kernel-debug-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134402" comment="kernel-default-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134403" comment="kernel-default-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134404" comment="kernel-default-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134405" comment="kernel-devel-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134406" comment="kernel-docs-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134407" comment="kernel-docs-html-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134408" comment="kernel-docs-pdf-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134409" comment="kernel-ec2-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134410" comment="kernel-ec2-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134411" comment="kernel-ec2-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134412" comment="kernel-macros-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134413" comment="kernel-obs-build-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134414" comment="kernel-obs-qa-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134415" comment="kernel-obs-qa-xen-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134416" comment="kernel-pae-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134417" comment="kernel-pae-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134418" comment="kernel-pae-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134419" comment="kernel-pv-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134420" comment="kernel-pv-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134421" comment="kernel-pv-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134422" comment="kernel-source-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134423" comment="kernel-source-vanilla-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134424" comment="kernel-syms-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134425" comment="kernel-vanilla-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134426" comment="kernel-vanilla-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134427" comment="kernel-xen-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134428" comment="kernel-xen-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134429" comment="kernel-xen-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134430" comment="libipset3-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134431" comment="lttng-modules-2.7.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134432" comment="lttng-modules-kmp-default-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134433" comment="lttng-modules-kmp-pv-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134434" comment="pcfclock-0.44-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134435" comment="pcfclock-kmp-default-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134436" comment="pcfclock-kmp-pae-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134437" comment="pcfclock-kmp-pv-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134438" comment="vhba-kmp-20140928-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134439" comment="vhba-kmp-default-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134440" comment="vhba-kmp-pae-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134441" comment="vhba-kmp-pv-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134442" comment="vhba-kmp-xen-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4579</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4579" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4579" source="CVE"/>
    <description>
    Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the "returned length of the object from _ksba_ber_parse_tl."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4579.html">CVE-2016-4579</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4579">SUSE bug 979906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4579">SUSE bug 979906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4579">SUSE bug 979906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4579">SUSE bug 979906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4579">SUSE bug 979906</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128612" comment="libksba-1.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153676" comment="libksba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128613" comment="libksba-devel-1.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153677" comment="libksba-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128614" comment="libksba8-1.3.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152539" comment="libksba8 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4580</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4580" source="CVE"/>
    <description>
    The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4580.html">CVE-2016-4580</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 985132</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 981267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 870618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4580">SUSE bug 870618</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134384" comment="drbd-8.4.6-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134385" comment="drbd-kmp-default-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134386" comment="drbd-kmp-pv-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134387" comment="drbd-kmp-xen-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134388" comment="hdjmod-1.28-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134389" comment="hdjmod-kmp-default-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134390" comment="hdjmod-kmp-pae-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134391" comment="hdjmod-kmp-pv-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134392" comment="hdjmod-kmp-xen-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134393" comment="ipset-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134394" comment="ipset-devel-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134395" comment="ipset-kmp-default-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134396" comment="ipset-kmp-pae-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134397" comment="ipset-kmp-pv-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134398" comment="ipset-kmp-xen-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134399" comment="kernel-debug-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134400" comment="kernel-debug-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134401" comment="kernel-debug-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134402" comment="kernel-default-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134403" comment="kernel-default-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134404" comment="kernel-default-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134405" comment="kernel-devel-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134406" comment="kernel-docs-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134407" comment="kernel-docs-html-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134408" comment="kernel-docs-pdf-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134409" comment="kernel-ec2-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134410" comment="kernel-ec2-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134411" comment="kernel-ec2-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134412" comment="kernel-macros-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134413" comment="kernel-obs-build-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134414" comment="kernel-obs-qa-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134415" comment="kernel-obs-qa-xen-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134416" comment="kernel-pae-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134417" comment="kernel-pae-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134418" comment="kernel-pae-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134419" comment="kernel-pv-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134420" comment="kernel-pv-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134421" comment="kernel-pv-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134422" comment="kernel-source-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134423" comment="kernel-source-vanilla-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134424" comment="kernel-syms-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134425" comment="kernel-vanilla-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134426" comment="kernel-vanilla-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134427" comment="kernel-xen-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134428" comment="kernel-xen-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134429" comment="kernel-xen-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134430" comment="libipset3-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134431" comment="lttng-modules-2.7.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134432" comment="lttng-modules-kmp-default-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134433" comment="lttng-modules-kmp-pv-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134434" comment="pcfclock-0.44-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134435" comment="pcfclock-kmp-default-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134436" comment="pcfclock-kmp-pae-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134437" comment="pcfclock-kmp-pv-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134438" comment="vhba-kmp-20140928-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134439" comment="vhba-kmp-default-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134440" comment="vhba-kmp-pae-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134441" comment="vhba-kmp-pv-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134442" comment="vhba-kmp-xen-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4581</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4581" source="CVE"/>
    <description>
    fs/pnode.c in the Linux kernel before 4.5.4 does not properly traverse a mount propagation tree in a certain case involving a slave mount, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted series of mount system calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4581.html">CVE-2016-4581</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4581">SUSE bug 979913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4581">SUSE bug 979913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4581">SUSE bug 979913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4581">SUSE bug 979913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4581">SUSE bug 979913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4581">SUSE bug 979913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4581">SUSE bug 979913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4581">SUSE bug 979913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4581">SUSE bug 979913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4581">SUSE bug 979913</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4581">SUSE bug 979913</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129149" comment="kernel-debug-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129150" comment="kernel-debug-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129151" comment="kernel-debug-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129152" comment="kernel-default-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129153" comment="kernel-default-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129154" comment="kernel-default-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129155" comment="kernel-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129156" comment="kernel-docs-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129157" comment="kernel-docs-html-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129158" comment="kernel-docs-pdf-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129159" comment="kernel-ec2-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129160" comment="kernel-ec2-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129161" comment="kernel-ec2-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129162" comment="kernel-macros-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129163" comment="kernel-obs-build-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129164" comment="kernel-obs-qa-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129165" comment="kernel-obs-qa-xen-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129166" comment="kernel-pae-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129167" comment="kernel-pae-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129168" comment="kernel-pae-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129169" comment="kernel-pv-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129170" comment="kernel-pv-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129171" comment="kernel-pv-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129172" comment="kernel-source-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129173" comment="kernel-source-vanilla-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129174" comment="kernel-syms-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129175" comment="kernel-vanilla-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129176" comment="kernel-vanilla-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129177" comment="kernel-xen-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129178" comment="kernel-xen-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129179" comment="kernel-xen-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4658</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658" source="CVE"/>
    <description>
    xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4658.html">CVE-2016-4658</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1005544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1005544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1005544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1005544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1005544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1005544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1005544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1014873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1005544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1005544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1005544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1014873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1014873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1005544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1005544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1005544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1005544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1005544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1005544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1005544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1005544</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1069433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4658">SUSE bug 1078813</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135253" comment="libxml2-2.9.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152662" comment="libxml2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135254" comment="libxml2-2-2.9.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135255" comment="libxml2-2-32bit-2.9.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135256" comment="libxml2-devel-2.9.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135257" comment="libxml2-devel-32bit-2.9.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135258" comment="libxml2-doc-2.9.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135259" comment="libxml2-tools-2.9.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135260" comment="python-libxml2-2.9.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151141" comment="python-libxml2 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4794</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4794" source="CVE"/>
    <description>
    Use-after-free vulnerability in mm/percpu.c in the Linux kernel through 4.6 allows local users to cause a denial of service (BUG) or possibly have unspecified other impact via crafted use of the mmap and bpf system calls.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4794.html">CVE-2016-4794</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4794">SUSE bug 980265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4794">SUSE bug 980265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4794">SUSE bug 980265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4794">SUSE bug 980265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4794">SUSE bug 981517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4794">SUSE bug 981517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4794">SUSE bug 981517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4794">SUSE bug 980265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4794">SUSE bug 981517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4794">SUSE bug 980265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4794">SUSE bug 980265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4794">SUSE bug 980265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4794">SUSE bug 980265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4794">SUSE bug 980265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4794">SUSE bug 980265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4794">SUSE bug 980265</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130071" comment="kernel-debug-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130072" comment="kernel-debug-base-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130073" comment="kernel-debug-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130074" comment="kernel-default-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130075" comment="kernel-default-base-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130076" comment="kernel-default-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130077" comment="kernel-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130078" comment="kernel-docs-4.1.27-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130079" comment="kernel-docs-html-4.1.27-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130080" comment="kernel-docs-pdf-4.1.27-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130081" comment="kernel-ec2-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130082" comment="kernel-ec2-base-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130083" comment="kernel-ec2-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130084" comment="kernel-macros-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130085" comment="kernel-obs-build-4.1.27-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130086" comment="kernel-obs-qa-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130087" comment="kernel-obs-qa-xen-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130088" comment="kernel-pae-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130089" comment="kernel-pae-base-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130090" comment="kernel-pae-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130091" comment="kernel-pv-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130092" comment="kernel-pv-base-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130093" comment="kernel-pv-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130094" comment="kernel-source-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130095" comment="kernel-source-vanilla-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130096" comment="kernel-syms-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130097" comment="kernel-vanilla-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130098" comment="kernel-vanilla-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130099" comment="kernel-xen-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130100" comment="kernel-xen-base-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130101" comment="kernel-xen-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4804</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4804" source="CVE"/>
    <description>
    The read_boot function in boot.c in dosfstools before 4.0 allows attackers to cause a denial of service (crash) via a crafted filesystem, which triggers a heap-based buffer overflow in the (1) read_fat function or an out-of-bounds heap read in (2) get_fat function.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4804.html">CVE-2016-4804</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4804">SUSE bug 980377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4804">SUSE bug 980377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4804">SUSE bug 980377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4804">SUSE bug 980377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4804">SUSE bug 980377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4804">SUSE bug 980364</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4804">SUSE bug 980377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4804">SUSE bug 980377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4804">SUSE bug 980377</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134309" comment="dosfstools-3.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153254" comment="dosfstools is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4805</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4805" source="CVE"/>
    <description>
    Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4805.html">CVE-2016-4805</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4805">SUSE bug 980371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4805">SUSE bug 980371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4805">SUSE bug 980371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4805">SUSE bug 980371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4805">SUSE bug 980371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4805">SUSE bug 980371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4805">SUSE bug 980371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4805">SUSE bug 980371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4805">SUSE bug 980371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4805">SUSE bug 980371</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4805">SUSE bug 990058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4805">SUSE bug 980371</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134384" comment="drbd-8.4.6-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134385" comment="drbd-kmp-default-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134386" comment="drbd-kmp-pv-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134387" comment="drbd-kmp-xen-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134388" comment="hdjmod-1.28-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134389" comment="hdjmod-kmp-default-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134390" comment="hdjmod-kmp-pae-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134391" comment="hdjmod-kmp-pv-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134392" comment="hdjmod-kmp-xen-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134393" comment="ipset-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134394" comment="ipset-devel-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134395" comment="ipset-kmp-default-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134396" comment="ipset-kmp-pae-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134397" comment="ipset-kmp-pv-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134398" comment="ipset-kmp-xen-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134399" comment="kernel-debug-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134400" comment="kernel-debug-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134401" comment="kernel-debug-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134402" comment="kernel-default-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134403" comment="kernel-default-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134404" comment="kernel-default-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134405" comment="kernel-devel-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134406" comment="kernel-docs-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134407" comment="kernel-docs-html-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134408" comment="kernel-docs-pdf-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134409" comment="kernel-ec2-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134410" comment="kernel-ec2-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134411" comment="kernel-ec2-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134412" comment="kernel-macros-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134413" comment="kernel-obs-build-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134414" comment="kernel-obs-qa-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134415" comment="kernel-obs-qa-xen-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134416" comment="kernel-pae-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134417" comment="kernel-pae-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134418" comment="kernel-pae-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134419" comment="kernel-pv-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134420" comment="kernel-pv-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134421" comment="kernel-pv-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134422" comment="kernel-source-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134423" comment="kernel-source-vanilla-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134424" comment="kernel-syms-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134425" comment="kernel-vanilla-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134426" comment="kernel-vanilla-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134427" comment="kernel-xen-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134428" comment="kernel-xen-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134429" comment="kernel-xen-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134430" comment="libipset3-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134431" comment="lttng-modules-2.7.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134432" comment="lttng-modules-kmp-default-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134433" comment="lttng-modules-kmp-pv-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134434" comment="pcfclock-0.44-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134435" comment="pcfclock-kmp-default-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134436" comment="pcfclock-kmp-pae-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134437" comment="pcfclock-kmp-pv-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134438" comment="vhba-kmp-20140928-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134439" comment="vhba-kmp-default-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134440" comment="vhba-kmp-pae-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134441" comment="vhba-kmp-pv-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134442" comment="vhba-kmp-xen-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4809</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4809" source="CVE"/>
    <description>
    The archive_read_format_cpio_read_header function in archive_read_support_format_cpio.c in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a CPIO archive with a large symlink.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4809.html">CVE-2016-4809</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4809">SUSE bug 984990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4809">SUSE bug 984990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4809">SUSE bug 984990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4809">SUSE bug 984990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4809">SUSE bug 984990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4809">SUSE bug 984990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4809">SUSE bug 984990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4809">SUSE bug 984990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4809">SUSE bug 984990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4809">SUSE bug 984990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4809">SUSE bug 984990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4809">SUSE bug 984990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4809">SUSE bug 984990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4809">SUSE bug 984990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4809">SUSE bug 984990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4809">SUSE bug 984990</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135169" comment="bsdtar-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135170" comment="libarchive-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135171" comment="libarchive-devel-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135172" comment="libarchive13-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135173" comment="libarchive13-32bit-3.1.2-13.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4912</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4912" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4912" source="CVE"/>
    <description>
    The _xrealloc function in xlsp_xmalloc.c in OpenSLP 2.0.0 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a large number of crafted packets, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4912.html">CVE-2016-4912</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4912">SUSE bug 980722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4912">SUSE bug 980722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4912">SUSE bug 980722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4912">SUSE bug 980722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4912">SUSE bug 980722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4912">SUSE bug 980722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4912">SUSE bug 1074356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4912">SUSE bug 1074356</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131298" comment="openslp-2.0.0-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151507" comment="openslp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131299" comment="openslp-32bit-2.0.0-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153678" comment="openslp-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131843" comment="openslp-devel-2.0.0-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151508" comment="openslp-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131966" comment="openslp-server-2.0.0-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151509" comment="openslp-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4951</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4951" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4951" source="CVE"/>
    <description>
    The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4951.html">CVE-2016-4951</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4951">SUSE bug 981058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4951">SUSE bug 981058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4951">SUSE bug 981058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4951">SUSE bug 981058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4951">SUSE bug 981058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4951">SUSE bug 981058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4951">SUSE bug 985132</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4951">SUSE bug 981058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4951">SUSE bug 981058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4951">SUSE bug 981058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4951">SUSE bug 981058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4951">SUSE bug 981058</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134384" comment="drbd-8.4.6-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134385" comment="drbd-kmp-default-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134386" comment="drbd-kmp-pv-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134387" comment="drbd-kmp-xen-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134388" comment="hdjmod-1.28-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134389" comment="hdjmod-kmp-default-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134390" comment="hdjmod-kmp-pae-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134391" comment="hdjmod-kmp-pv-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134392" comment="hdjmod-kmp-xen-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134393" comment="ipset-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134394" comment="ipset-devel-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134395" comment="ipset-kmp-default-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134396" comment="ipset-kmp-pae-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134397" comment="ipset-kmp-pv-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134398" comment="ipset-kmp-xen-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134399" comment="kernel-debug-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134400" comment="kernel-debug-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134401" comment="kernel-debug-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134402" comment="kernel-default-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134403" comment="kernel-default-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134404" comment="kernel-default-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134405" comment="kernel-devel-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134406" comment="kernel-docs-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134407" comment="kernel-docs-html-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134408" comment="kernel-docs-pdf-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134409" comment="kernel-ec2-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134410" comment="kernel-ec2-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134411" comment="kernel-ec2-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134412" comment="kernel-macros-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134413" comment="kernel-obs-build-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134414" comment="kernel-obs-qa-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134415" comment="kernel-obs-qa-xen-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134416" comment="kernel-pae-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134417" comment="kernel-pae-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134418" comment="kernel-pae-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134419" comment="kernel-pv-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134420" comment="kernel-pv-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134421" comment="kernel-pv-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134422" comment="kernel-source-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134423" comment="kernel-source-vanilla-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134424" comment="kernel-syms-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134425" comment="kernel-vanilla-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134426" comment="kernel-vanilla-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134427" comment="kernel-xen-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134428" comment="kernel-xen-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134429" comment="kernel-xen-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134430" comment="libipset3-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134431" comment="lttng-modules-2.7.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134432" comment="lttng-modules-kmp-default-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134433" comment="lttng-modules-kmp-pv-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134434" comment="pcfclock-0.44-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134435" comment="pcfclock-kmp-default-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134436" comment="pcfclock-kmp-pae-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134437" comment="pcfclock-kmp-pv-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134438" comment="vhba-kmp-20140928-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134439" comment="vhba-kmp-default-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134440" comment="vhba-kmp-pae-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134441" comment="vhba-kmp-pv-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134442" comment="vhba-kmp-xen-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4952</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4952" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4952.html">CVE-2016-4952</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4952">SUSE bug 981266</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4952">SUSE bug 981276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4952">SUSE bug 981266</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4952">SUSE bug 981276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4952">SUSE bug 981276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4952">SUSE bug 981276</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129834" comment="qemu-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129835" comment="qemu-arm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129836" comment="qemu-block-curl-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129837" comment="qemu-block-rbd-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129838" comment="qemu-extra-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129839" comment="qemu-guest-agent-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129840" comment="qemu-ipxe-1.0.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129841" comment="qemu-kvm-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129842" comment="qemu-lang-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129843" comment="qemu-linux-user-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129844" comment="qemu-ppc-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129845" comment="qemu-s390-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129846" comment="qemu-seabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129847" comment="qemu-sgabios-8-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129848" comment="qemu-testsuite-2.3.1-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129849" comment="qemu-tools-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129850" comment="qemu-vgabios-1.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129851" comment="qemu-x86-2.3.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4953</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4953" source="CVE"/>
    <description>
    ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4953.html">CVE-2016-4953</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 982056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 982065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 982065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 982065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 962784</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 982065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 982065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 982065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 982065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 982065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 982065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 982065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 982065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 982065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 982065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 982065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 982065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 982065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 982065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4953">SUSE bug 982065</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129087" comment="ntp-4.2.8p8-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129088" comment="ntp-doc-4.2.8p8-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4954</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954" source="CVE"/>
    <description>
    The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4954.html">CVE-2016-4954</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4954">SUSE bug 982056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4954">SUSE bug 982066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4954">SUSE bug 982066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4954">SUSE bug 982066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4954">SUSE bug 982066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4954">SUSE bug 982066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4954">SUSE bug 982066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4954">SUSE bug 982066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4954">SUSE bug 982066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4954">SUSE bug 982066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4954">SUSE bug 982066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4954">SUSE bug 982066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4954">SUSE bug 982066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4954">SUSE bug 982066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4954">SUSE bug 982066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4954">SUSE bug 982066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4954">SUSE bug 982066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4954">SUSE bug 982066</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129087" comment="ntp-4.2.8p8-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129088" comment="ntp-doc-4.2.8p8-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4955</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955" source="CVE"/>
    <description>
    ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4955.html">CVE-2016-4955</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4955">SUSE bug 982056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4955">SUSE bug 982067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4955">SUSE bug 982067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4955">SUSE bug 982067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4955">SUSE bug 982067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4955">SUSE bug 982067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4955">SUSE bug 982067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4955">SUSE bug 982067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4955">SUSE bug 982067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4955">SUSE bug 982067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4955">SUSE bug 982067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4955">SUSE bug 982067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4955">SUSE bug 982067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4955">SUSE bug 982067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4955">SUSE bug 982067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4955">SUSE bug 982067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4955">SUSE bug 982067</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4955">SUSE bug 982067</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129087" comment="ntp-4.2.8p8-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129088" comment="ntp-doc-4.2.8p8-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4956</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956" source="CVE"/>
    <description>
    ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4956.html">CVE-2016-4956</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4956">SUSE bug 982056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4956">SUSE bug 982068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4956">SUSE bug 982068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4956">SUSE bug 982068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4956">SUSE bug 977461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4956">SUSE bug 982068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4956">SUSE bug 982068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4956">SUSE bug 982068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4956">SUSE bug 982068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4956">SUSE bug 982068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4956">SUSE bug 982068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4956">SUSE bug 982068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4956">SUSE bug 982068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4956">SUSE bug 982068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4956">SUSE bug 982068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4956">SUSE bug 982068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4956">SUSE bug 982068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4956">SUSE bug 982068</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4956">SUSE bug 982068</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129087" comment="ntp-4.2.8p8-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129088" comment="ntp-doc-4.2.8p8-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4957</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957" source="CVE"/>
    <description>
    ntpd in NTP before 4.2.8p8 allows remote attackers to cause a denial of service (daemon crash) via a crypto-NAK packet.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-1547.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4957.html">CVE-2016-4957</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4957">SUSE bug 982056</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4957">SUSE bug 982064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4957">SUSE bug 982064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4957">SUSE bug 982064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4957">SUSE bug 977459</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4957">SUSE bug 982064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4957">SUSE bug 982064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4957">SUSE bug 982064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4957">SUSE bug 982064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4957">SUSE bug 982064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4957">SUSE bug 982064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4957">SUSE bug 982064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4957">SUSE bug 982064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4957">SUSE bug 982064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4957">SUSE bug 982064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4957">SUSE bug 982064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4957">SUSE bug 982064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4957">SUSE bug 982064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4957">SUSE bug 982064</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4957">SUSE bug 982064</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129087" comment="ntp-4.2.8p8-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129088" comment="ntp-doc-4.2.8p8-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4962</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4962" source="CVE"/>
    <description>
    The libxl device-handling in Xen 4.6.x and earlier allows local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4962.html">CVE-2016-4962</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4962">SUSE bug 979620</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4962">SUSE bug 979620</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4962">SUSE bug 979620</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4962">SUSE bug 979620</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4962">SUSE bug 979620</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4962">SUSE bug 979620</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4962">SUSE bug 979620</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4963</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4963" source="CVE"/>
    <description>
    The libxl device-handling in Xen through 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4963.html">CVE-2016-4963</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4963">SUSE bug 979670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4963">SUSE bug 979641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4963">SUSE bug 979670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4963">SUSE bug 979641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4963">SUSE bug 979670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4963">SUSE bug 979641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4963">SUSE bug 979670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4963">SUSE bug 979641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4963">SUSE bug 979670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4963">SUSE bug 979670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4963">SUSE bug 979670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4963">SUSE bug 979670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4963">SUSE bug 979670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4963">SUSE bug 979670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4963">SUSE bug 979670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4963">SUSE bug 979670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4963">SUSE bug 979670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4963">SUSE bug 979670</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4963">SUSE bug 979670</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4971</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4971" source="CVE"/>
    <description>
    GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4971.html">CVE-2016-4971</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 1023231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4971">SUSE bug 984060</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134351" comment="wget-1.14-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151442" comment="wget is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4983</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4983" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4983.html">CVE-2016-4983</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4983">SUSE bug 984639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4983">SUSE bug 984639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4983">SUSE bug 984639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4983">SUSE bug 984639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4983">SUSE bug 984639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4983">SUSE bug 984639</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4983">SUSE bug 984639</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135920" comment="dovecot22-2.2.18-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153679" comment="dovecot22 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135921" comment="dovecot22-backend-mysql-2.2.18-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153680" comment="dovecot22-backend-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135922" comment="dovecot22-backend-pgsql-2.2.18-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153681" comment="dovecot22-backend-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135923" comment="dovecot22-backend-sqlite-2.2.18-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153682" comment="dovecot22-backend-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135924" comment="dovecot22-devel-2.2.18-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153683" comment="dovecot22-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135925" comment="dovecot22-fts-2.2.18-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153684" comment="dovecot22-fts is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135926" comment="dovecot22-fts-lucene-2.2.18-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153685" comment="dovecot22-fts-lucene is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135927" comment="dovecot22-fts-solr-2.2.18-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153686" comment="dovecot22-fts-solr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135928" comment="dovecot22-fts-squat-2.2.18-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153687" comment="dovecot22-fts-squat is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4994</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4994" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4994" source="CVE"/>
    <description>
    Use-after-free vulnerability in the xcf_load_image function in app/xcf/xcf-load.c in GIMP allows remote attackers to cause a denial of service (program crash) or possibly execute arbitrary code via a crafted XCF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4994.html">CVE-2016-4994</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4994">SUSE bug 986021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4994">SUSE bug 986021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4994">SUSE bug 986021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4994">SUSE bug 986021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4994">SUSE bug 986021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4994">SUSE bug 986021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4994">SUSE bug 986021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4994">SUSE bug 986021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4994">SUSE bug 986021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4994">SUSE bug 986021</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129708" comment="gimp-2.8.16-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129709" comment="gimp-devel-2.8.16-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129710" comment="gimp-help-browser-2.8.16-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151541" comment="gimp-help-browser is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129711" comment="gimp-lang-2.8.16-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129712" comment="gimp-plugin-aa-2.8.16-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129713" comment="gimp-plugins-python-2.8.16-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151544" comment="gimp-plugins-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129714" comment="libgimp-2_0-0-2.8.16-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151545" comment="libgimp-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129715" comment="libgimp-2_0-0-32bit-2.8.16-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153689" comment="libgimp-2_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129716" comment="libgimpui-2_0-0-2.8.16-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151546" comment="libgimpui-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129717" comment="libgimpui-2_0-0-32bit-2.8.16-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153690" comment="libgimpui-2_0-0-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4997</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-4997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997" source="CVE"/>
    <description>
    The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-4997.html">CVE-2016-4997</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986365</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 990058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-4997">SUSE bug 986362</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134384" comment="drbd-8.4.6-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134385" comment="drbd-kmp-default-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134386" comment="drbd-kmp-pv-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134387" comment="drbd-kmp-xen-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134388" comment="hdjmod-1.28-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134389" comment="hdjmod-kmp-default-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134390" comment="hdjmod-kmp-pae-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134391" comment="hdjmod-kmp-pv-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134392" comment="hdjmod-kmp-xen-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134393" comment="ipset-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134394" comment="ipset-devel-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134395" comment="ipset-kmp-default-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134396" comment="ipset-kmp-pae-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134397" comment="ipset-kmp-pv-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134398" comment="ipset-kmp-xen-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134399" comment="kernel-debug-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134400" comment="kernel-debug-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134401" comment="kernel-debug-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134402" comment="kernel-default-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134403" comment="kernel-default-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134404" comment="kernel-default-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134405" comment="kernel-devel-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134406" comment="kernel-docs-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134407" comment="kernel-docs-html-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134408" comment="kernel-docs-pdf-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134409" comment="kernel-ec2-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134410" comment="kernel-ec2-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134411" comment="kernel-ec2-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134412" comment="kernel-macros-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134413" comment="kernel-obs-build-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134414" comment="kernel-obs-qa-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134415" comment="kernel-obs-qa-xen-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134416" comment="kernel-pae-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134417" comment="kernel-pae-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134418" comment="kernel-pae-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134419" comment="kernel-pv-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134420" comment="kernel-pv-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134421" comment="kernel-pv-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134422" comment="kernel-source-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134423" comment="kernel-source-vanilla-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134424" comment="kernel-syms-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134425" comment="kernel-vanilla-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134426" comment="kernel-vanilla-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134427" comment="kernel-xen-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134428" comment="kernel-xen-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134429" comment="kernel-xen-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134430" comment="libipset3-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134431" comment="lttng-modules-2.7.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134432" comment="lttng-modules-kmp-default-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134433" comment="lttng-modules-kmp-pv-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134434" comment="pcfclock-0.44-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134435" comment="pcfclock-kmp-default-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134436" comment="pcfclock-kmp-pae-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134437" comment="pcfclock-kmp-pv-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134438" comment="vhba-kmp-20140928-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134439" comment="vhba-kmp-default-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134440" comment="vhba-kmp-pae-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134441" comment="vhba-kmp-pv-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134442" comment="vhba-kmp-xen-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5008</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5008" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5008" source="CVE"/>
    <description>
    libvirt before 2.0.0 improperly disables password checking when the password on a VNC server is set to an empty string, which allows remote attackers to bypass authentication and establish a VNC session by connecting to the server.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5008.html">CVE-2016-5008</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5008">SUSE bug 987527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5008">SUSE bug 987527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5008">SUSE bug 987527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5008">SUSE bug 987527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5008">SUSE bug 987527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5008">SUSE bug 987527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5008">SUSE bug 987527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5008">SUSE bug 987527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5008">SUSE bug 987527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5008">SUSE bug 987527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5008">SUSE bug 987527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5008">SUSE bug 987527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5008">SUSE bug 987527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5008">SUSE bug 987527</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130883" comment="libvirt-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130884" comment="libvirt-client-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130885" comment="libvirt-client-32bit-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152987" comment="libvirt-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130886" comment="libvirt-daemon-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130887" comment="libvirt-daemon-config-network-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130888" comment="libvirt-daemon-config-nwfilter-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130889" comment="libvirt-daemon-driver-interface-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130890" comment="libvirt-daemon-driver-libxl-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130891" comment="libvirt-daemon-driver-lxc-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130892" comment="libvirt-daemon-driver-network-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130893" comment="libvirt-daemon-driver-nodedev-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130894" comment="libvirt-daemon-driver-nwfilter-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130895" comment="libvirt-daemon-driver-qemu-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130896" comment="libvirt-daemon-driver-secret-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130897" comment="libvirt-daemon-driver-storage-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130898" comment="libvirt-daemon-driver-uml-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151437" comment="libvirt-daemon-driver-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130899" comment="libvirt-daemon-driver-vbox-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151438" comment="libvirt-daemon-driver-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130900" comment="libvirt-daemon-lxc-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130901" comment="libvirt-daemon-qemu-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130902" comment="libvirt-daemon-uml-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152989" comment="libvirt-daemon-uml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130903" comment="libvirt-daemon-vbox-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152990" comment="libvirt-daemon-vbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130904" comment="libvirt-daemon-xen-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130905" comment="libvirt-devel-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152991" comment="libvirt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130906" comment="libvirt-devel-32bit-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152992" comment="libvirt-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130907" comment="libvirt-doc-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152993" comment="libvirt-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130908" comment="libvirt-lock-sanlock-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152994" comment="libvirt-lock-sanlock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130909" comment="libvirt-login-shell-1.2.18.4-14.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152995" comment="libvirt-login-shell is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5010</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5010" source="CVE"/>
    <description>
    coders/tiff.c in ImageMagick before 6.9.5-3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5010.html">CVE-2016-5010</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5010">SUSE bug 991444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5010">SUSE bug 991444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5010">SUSE bug 991444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5010">SUSE bug 991444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5010">SUSE bug 991444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5010">SUSE bug 991444</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134264" comment="ImageMagick-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134265" comment="ImageMagick-devel-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134266" comment="ImageMagick-devel-32bit-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134267" comment="ImageMagick-doc-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134268" comment="ImageMagick-extra-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134269" comment="libMagick++-6_Q16-3-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134270" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134271" comment="libMagick++-devel-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134272" comment="libMagick++-devel-32bit-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134273" comment="libMagickCore-6_Q16-1-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134274" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134275" comment="libMagickWand-6_Q16-1-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134276" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134277" comment="perl-PerlMagick-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5011</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5011" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011" source="CVE"/>
    <description>
    The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5011.html">CVE-2016-5011</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5011">SUSE bug 988361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5011">SUSE bug 988361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5011">SUSE bug 988361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5011">SUSE bug 988361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5011">SUSE bug 988361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5011">SUSE bug 988361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5011">SUSE bug 988361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5011">SUSE bug 988361</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5011">SUSE bug 988361</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135602" comment="libblkid-devel-2.25-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151786" comment="libblkid-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135603" comment="libblkid-devel-32bit-2.25-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152861" comment="libblkid-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135604" comment="libblkid1-2.25-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151787" comment="libblkid1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135605" comment="libblkid1-32bit-2.25-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151788" comment="libblkid1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135606" comment="libmount-devel-2.25-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152863" comment="libmount-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135607" comment="libmount-devel-32bit-2.25-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152864" comment="libmount-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135608" comment="libmount1-2.25-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151789" comment="libmount1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135609" comment="libmount1-32bit-2.25-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151790" comment="libmount1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135610" comment="libsmartcols-devel-2.25-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152866" comment="libsmartcols-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135611" comment="libsmartcols1-2.25-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151791" comment="libsmartcols1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135612" comment="libuuid-devel-2.25-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151792" comment="libuuid-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135613" comment="libuuid-devel-32bit-2.25-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152868" comment="libuuid-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135614" comment="libuuid1-2.25-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151793" comment="libuuid1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135615" comment="libuuid1-32bit-2.25-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151794" comment="libuuid1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135616" comment="python-libmount-2.25-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152870" comment="python-libmount is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135617" comment="util-linux-2.25-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151795" comment="util-linux is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135618" comment="util-linux-lang-2.25-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151796" comment="util-linux-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135619" comment="util-linux-systemd-2.25-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151797" comment="util-linux-systemd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135620" comment="uuidd-2.25-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152871" comment="uuidd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5018</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5018" source="CVE"/>
    <description>
    In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5018.html">CVE-2016-5018</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5018">SUSE bug 1007855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5018">SUSE bug 1007855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5018">SUSE bug 1007855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5018">SUSE bug 1007855</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5018">SUSE bug 1007855</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142899" comment="apache-commons-dbcp-2.1.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153286" comment="apache-commons-dbcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142900" comment="apache-commons-dbcp-javadoc-2.1.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153287" comment="apache-commons-dbcp-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142901" comment="apache-commons-pool2-2.4.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153288" comment="apache-commons-pool2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142902" comment="apache-commons-pool2-javadoc-2.4.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153289" comment="apache-commons-pool2-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142903" comment="tomcat-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142904" comment="tomcat-admin-webapps-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142905" comment="tomcat-docs-webapp-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142906" comment="tomcat-el-3_0-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142907" comment="tomcat-embed-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142908" comment="tomcat-javadoc-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142909" comment="tomcat-jsp-2_3-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142910" comment="tomcat-jsvc-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142911" comment="tomcat-lib-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142912" comment="tomcat-servlet-3_1-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152853" comment="tomcat-servlet-3_1-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142913" comment="tomcat-webapps-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5093</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093" source="CVE"/>
    <description>
    The get_icu_value_internal function in ext/intl/locale/locale_methods.c in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x before 7.0.7 does not ensure the presence of a '\0' character, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted locale_get_primary_language call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5093.html">CVE-2016-5093</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5093">SUSE bug 982010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5093">SUSE bug 982010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5093">SUSE bug 982010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5093">SUSE bug 982010</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5093">SUSE bug 982010</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126792" comment="apache2-mod_php5-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129316" comment="imap-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152031" comment="imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129317" comment="imap-devel-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152032" comment="imap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129318" comment="libc-client2007e_suse-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152033" comment="libc-client2007e_suse is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126793" comment="php5-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126794" comment="php5-bcmath-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126795" comment="php5-bz2-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126796" comment="php5-calendar-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126797" comment="php5-ctype-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126798" comment="php5-curl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126799" comment="php5-dba-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126843" comment="php5-devel-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126800" comment="php5-dom-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126801" comment="php5-enchant-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126802" comment="php5-exif-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126803" comment="php5-fastcgi-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126804" comment="php5-fileinfo-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129319" comment="php5-firebird-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126805" comment="php5-fpm-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126806" comment="php5-ftp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126807" comment="php5-gd-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126808" comment="php5-gettext-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126809" comment="php5-gmp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126810" comment="php5-iconv-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129320" comment="php5-imap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126811" comment="php5-intl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126812" comment="php5-json-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126813" comment="php5-ldap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126814" comment="php5-mbstring-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126815" comment="php5-mcrypt-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129321" comment="php5-mssql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126816" comment="php5-mysql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126817" comment="php5-odbc-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126818" comment="php5-opcache-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126819" comment="php5-openssl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126820" comment="php5-pcntl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126821" comment="php5-pdo-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126822" comment="php5-pear-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126823" comment="php5-pgsql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129322" comment="php5-phar-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126824" comment="php5-posix-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126825" comment="php5-pspell-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129323" comment="php5-readline-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126826" comment="php5-shmop-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126827" comment="php5-snmp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126828" comment="php5-soap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126829" comment="php5-sockets-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126830" comment="php5-sqlite-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126831" comment="php5-suhosin-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126832" comment="php5-sysvmsg-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126833" comment="php5-sysvsem-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126834" comment="php5-sysvshm-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129324" comment="php5-tidy-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126835" comment="php5-tokenizer-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126836" comment="php5-wddx-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126837" comment="php5-xmlreader-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126838" comment="php5-xmlrpc-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126839" comment="php5-xmlwriter-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126840" comment="php5-xsl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126841" comment="php5-zip-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126842" comment="php5-zlib-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5094</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094" source="CVE"/>
    <description>
    Integer overflow in the php_html_entities function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from the htmlspecialchars function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5094.html">CVE-2016-5094</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5094">SUSE bug 982011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5094">SUSE bug 982012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5094">SUSE bug 982011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5094">SUSE bug 982012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5094">SUSE bug 982011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5094">SUSE bug 982012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5094">SUSE bug 982011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5094">SUSE bug 982012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5094">SUSE bug 982011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5094">SUSE bug 982011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5094">SUSE bug 982012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5094">SUSE bug 982011</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126792" comment="apache2-mod_php5-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129316" comment="imap-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152031" comment="imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129317" comment="imap-devel-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152032" comment="imap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129318" comment="libc-client2007e_suse-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152033" comment="libc-client2007e_suse is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126793" comment="php5-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126794" comment="php5-bcmath-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126795" comment="php5-bz2-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126796" comment="php5-calendar-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126797" comment="php5-ctype-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126798" comment="php5-curl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126799" comment="php5-dba-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126843" comment="php5-devel-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126800" comment="php5-dom-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126801" comment="php5-enchant-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126802" comment="php5-exif-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126803" comment="php5-fastcgi-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126804" comment="php5-fileinfo-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129319" comment="php5-firebird-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126805" comment="php5-fpm-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126806" comment="php5-ftp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126807" comment="php5-gd-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126808" comment="php5-gettext-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126809" comment="php5-gmp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126810" comment="php5-iconv-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129320" comment="php5-imap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126811" comment="php5-intl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126812" comment="php5-json-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126813" comment="php5-ldap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126814" comment="php5-mbstring-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126815" comment="php5-mcrypt-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129321" comment="php5-mssql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126816" comment="php5-mysql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126817" comment="php5-odbc-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126818" comment="php5-opcache-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126819" comment="php5-openssl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126820" comment="php5-pcntl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126821" comment="php5-pdo-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126822" comment="php5-pear-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126823" comment="php5-pgsql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129322" comment="php5-phar-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126824" comment="php5-posix-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126825" comment="php5-pspell-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129323" comment="php5-readline-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126826" comment="php5-shmop-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126827" comment="php5-snmp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126828" comment="php5-soap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126829" comment="php5-sockets-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126830" comment="php5-sqlite-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126831" comment="php5-suhosin-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126832" comment="php5-sysvmsg-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126833" comment="php5-sysvsem-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126834" comment="php5-sysvshm-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129324" comment="php5-tidy-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126835" comment="php5-tokenizer-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126836" comment="php5-wddx-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126837" comment="php5-xmlreader-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126838" comment="php5-xmlrpc-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126839" comment="php5-xmlwriter-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126840" comment="php5-xsl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126841" comment="php5-zip-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126842" comment="php5-zlib-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5095</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095" source="CVE"/>
    <description>
    Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-5094.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5095.html">CVE-2016-5095</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5095">SUSE bug 982012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5095">SUSE bug 982011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5095">SUSE bug 982012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5095">SUSE bug 982012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5095">SUSE bug 982012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5095">SUSE bug 982011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5095">SUSE bug 982012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5095">SUSE bug 982011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5095">SUSE bug 982011</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5095">SUSE bug 982012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5095">SUSE bug 982012</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126792" comment="apache2-mod_php5-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129316" comment="imap-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152031" comment="imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129317" comment="imap-devel-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152032" comment="imap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129318" comment="libc-client2007e_suse-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152033" comment="libc-client2007e_suse is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126793" comment="php5-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126794" comment="php5-bcmath-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126795" comment="php5-bz2-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126796" comment="php5-calendar-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126797" comment="php5-ctype-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126798" comment="php5-curl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126799" comment="php5-dba-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126843" comment="php5-devel-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126800" comment="php5-dom-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126801" comment="php5-enchant-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126802" comment="php5-exif-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126803" comment="php5-fastcgi-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126804" comment="php5-fileinfo-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129319" comment="php5-firebird-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126805" comment="php5-fpm-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126806" comment="php5-ftp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126807" comment="php5-gd-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126808" comment="php5-gettext-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126809" comment="php5-gmp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126810" comment="php5-iconv-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129320" comment="php5-imap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126811" comment="php5-intl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126812" comment="php5-json-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126813" comment="php5-ldap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126814" comment="php5-mbstring-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126815" comment="php5-mcrypt-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129321" comment="php5-mssql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126816" comment="php5-mysql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126817" comment="php5-odbc-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126818" comment="php5-opcache-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126819" comment="php5-openssl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126820" comment="php5-pcntl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126821" comment="php5-pdo-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126822" comment="php5-pear-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126823" comment="php5-pgsql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129322" comment="php5-phar-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126824" comment="php5-posix-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126825" comment="php5-pspell-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129323" comment="php5-readline-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126826" comment="php5-shmop-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126827" comment="php5-snmp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126828" comment="php5-soap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126829" comment="php5-sockets-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126830" comment="php5-sqlite-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126831" comment="php5-suhosin-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126832" comment="php5-sysvmsg-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126833" comment="php5-sysvsem-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126834" comment="php5-sysvshm-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129324" comment="php5-tidy-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126835" comment="php5-tokenizer-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126836" comment="php5-wddx-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126837" comment="php5-xmlreader-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126838" comment="php5-xmlrpc-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126839" comment="php5-xmlwriter-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126840" comment="php5-xsl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126841" comment="php5-zip-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126842" comment="php5-zlib-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5096</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096" source="CVE"/>
    <description>
    Integer overflow in the fread function in ext/standard/file.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer in the second argument.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5096.html">CVE-2016-5096</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5096">SUSE bug 982013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5096">SUSE bug 982013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5096">SUSE bug 982013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5096">SUSE bug 982013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5096">SUSE bug 982013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5096">SUSE bug 982013</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126792" comment="apache2-mod_php5-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129316" comment="imap-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152031" comment="imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129317" comment="imap-devel-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152032" comment="imap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129318" comment="libc-client2007e_suse-2007e_suse-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152033" comment="libc-client2007e_suse is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126793" comment="php5-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126794" comment="php5-bcmath-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126795" comment="php5-bz2-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126796" comment="php5-calendar-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126797" comment="php5-ctype-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126798" comment="php5-curl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126799" comment="php5-dba-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126843" comment="php5-devel-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126800" comment="php5-dom-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126801" comment="php5-enchant-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126802" comment="php5-exif-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126803" comment="php5-fastcgi-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126804" comment="php5-fileinfo-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129319" comment="php5-firebird-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126805" comment="php5-fpm-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126806" comment="php5-ftp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126807" comment="php5-gd-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126808" comment="php5-gettext-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126809" comment="php5-gmp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126810" comment="php5-iconv-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129320" comment="php5-imap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126811" comment="php5-intl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126812" comment="php5-json-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126813" comment="php5-ldap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126814" comment="php5-mbstring-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126815" comment="php5-mcrypt-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129321" comment="php5-mssql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126816" comment="php5-mysql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126817" comment="php5-odbc-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126818" comment="php5-opcache-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126819" comment="php5-openssl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126820" comment="php5-pcntl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126821" comment="php5-pdo-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126822" comment="php5-pear-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126823" comment="php5-pgsql-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129322" comment="php5-phar-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126824" comment="php5-posix-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126825" comment="php5-pspell-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129323" comment="php5-readline-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126826" comment="php5-shmop-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126827" comment="php5-snmp-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126828" comment="php5-soap-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126829" comment="php5-sockets-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126830" comment="php5-sqlite-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126831" comment="php5-suhosin-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126832" comment="php5-sysvmsg-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126833" comment="php5-sysvsem-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126834" comment="php5-sysvshm-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129324" comment="php5-tidy-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126835" comment="php5-tokenizer-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126836" comment="php5-wddx-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126837" comment="php5-xmlreader-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126838" comment="php5-xmlrpc-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126839" comment="php5-xmlwriter-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126840" comment="php5-xsl-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126841" comment="php5-zip-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009126842" comment="php5-zlib-5.5.14-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5099</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5099" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in phpMyAdmin 4.4.x before 4.4.15.6 and 4.6.x before 4.6.2 allows remote attackers to inject arbitrary web script or HTML via special characters that are mishandled during double URL decoding.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5099.html">CVE-2016-5099</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5099">SUSE bug 982128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5099">SUSE bug 982126</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5099">SUSE bug 982128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5099">SUSE bug 982128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5099">SUSE bug 982128</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128189" comment="phpMyAdmin-4.4.15.6-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5103</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5103" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-4552.  Reason: This candidate is a reservation duplicate of CVE-2016-4552.  Notes: All CVE users should reference CVE-2016-4552 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5103.html">CVE-2016-5103</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5103">SUSE bug 982703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5103">SUSE bug 982703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5103">SUSE bug 982003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5103">SUSE bug 982003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5103">SUSE bug 982003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5103">SUSE bug 1016744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5103">SUSE bug 982003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5103">SUSE bug 982003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136830" comment="roundcubemail-1.1.7-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5104</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5104" source="CVE"/>
    <description>
    The socket_create function in common/socket.c in libimobiledevice and libusbmuxd allows remote attackers to bypass intended access restrictions and communicate with services on iOS devices by connecting to an IPv4 TCP socket.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5104.html">CVE-2016-5104</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5104">SUSE bug 982014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5104">SUSE bug 982014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5104">SUSE bug 982014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5104">SUSE bug 982014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5104">SUSE bug 982014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5104">SUSE bug 982014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5104">SUSE bug 982014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5104">SUSE bug 982014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5104">SUSE bug 982014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5104">SUSE bug 982014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5104">SUSE bug 982014</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128502" comment="imobiledevice-tools-1.2.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153691" comment="imobiledevice-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128503" comment="iproxy-1.0.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153692" comment="iproxy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128504" comment="libimobiledevice-1.2.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153693" comment="libimobiledevice is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128505" comment="libimobiledevice-devel-1.2.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151903" comment="libimobiledevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128506" comment="libimobiledevice-doc-1.2.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153694" comment="libimobiledevice-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128509" comment="libimobiledevice6-1.2.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151904" comment="libimobiledevice6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128510" comment="libimobiledevice6-32bit-1.2.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153697" comment="libimobiledevice6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128511" comment="libusbmuxd-1.0.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153698" comment="libusbmuxd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128512" comment="libusbmuxd-devel-1.0.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153699" comment="libusbmuxd-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128515" comment="libusbmuxd4-1.0.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153702" comment="libusbmuxd4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128516" comment="libusbmuxd4-32bit-1.0.10-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153703" comment="libusbmuxd4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128517" comment="python-imobiledevice-1.2.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153704" comment="python-imobiledevice is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5105</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5105" source="CVE"/>
    <description>
    The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5105.html">CVE-2016-5105</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5105">SUSE bug 982017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5105">SUSE bug 982024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5105">SUSE bug 982017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5105">SUSE bug 982017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5105">SUSE bug 982024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5105">SUSE bug 982017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5105">SUSE bug 982024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5105">SUSE bug 982017</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135119" comment="qemu-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135120" comment="qemu-arm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135121" comment="qemu-block-curl-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135122" comment="qemu-block-rbd-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135123" comment="qemu-extra-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135124" comment="qemu-guest-agent-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135125" comment="qemu-ipxe-1.0.0-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135126" comment="qemu-kvm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135127" comment="qemu-lang-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135128" comment="qemu-linux-user-2.3.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135129" comment="qemu-ppc-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135130" comment="qemu-s390-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135131" comment="qemu-seabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135132" comment="qemu-sgabios-8-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135133" comment="qemu-testsuite-2.3.1-19.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135134" comment="qemu-tools-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135135" comment="qemu-vgabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135136" comment="qemu-x86-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5106</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5106" source="CVE"/>
    <description>
    The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5106.html">CVE-2016-5106</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5106">SUSE bug 982018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5106">SUSE bug 982025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5106">SUSE bug 982018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5106">SUSE bug 982025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5106">SUSE bug 982018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5106">SUSE bug 982025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5106">SUSE bug 982018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5106">SUSE bug 982018</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135119" comment="qemu-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135120" comment="qemu-arm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135121" comment="qemu-block-curl-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135122" comment="qemu-block-rbd-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135123" comment="qemu-extra-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135124" comment="qemu-guest-agent-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135125" comment="qemu-ipxe-1.0.0-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135126" comment="qemu-kvm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135127" comment="qemu-lang-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135128" comment="qemu-linux-user-2.3.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135129" comment="qemu-ppc-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135130" comment="qemu-s390-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135131" comment="qemu-seabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135132" comment="qemu-sgabios-8-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135133" comment="qemu-testsuite-2.3.1-19.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135134" comment="qemu-tools-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135135" comment="qemu-vgabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135136" comment="qemu-x86-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5107</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5107" source="CVE"/>
    <description>
    The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5107.html">CVE-2016-5107</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5107">SUSE bug 982019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5107">SUSE bug 982026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5107">SUSE bug 982019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5107">SUSE bug 982026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5107">SUSE bug 982019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5107">SUSE bug 982026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5107">SUSE bug 982019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5107">SUSE bug 982019</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135119" comment="qemu-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135120" comment="qemu-arm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135121" comment="qemu-block-curl-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135122" comment="qemu-block-rbd-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135123" comment="qemu-extra-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135124" comment="qemu-guest-agent-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135125" comment="qemu-ipxe-1.0.0-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135126" comment="qemu-kvm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135127" comment="qemu-lang-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135128" comment="qemu-linux-user-2.3.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135129" comment="qemu-ppc-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135130" comment="qemu-s390-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135131" comment="qemu-seabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135132" comment="qemu-sgabios-8-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135133" comment="qemu-testsuite-2.3.1-19.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135134" comment="qemu-tools-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135135" comment="qemu-vgabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135136" comment="qemu-x86-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5108</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5108" source="CVE"/>
    <description>
    Buffer overflow in the DecodeAdpcmImaQT function in modules/codec/adpcm.c in VideoLAN VLC media player before 2.2.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted QuickTime IMA file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5108.html">CVE-2016-5108</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5108">SUSE bug 984382</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129194" comment="libvlc5-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129195" comment="libvlccore8-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153022" comment="libvlccore8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129196" comment="vlc-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129197" comment="vlc-devel-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129198" comment="vlc-noX-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129199" comment="vlc-noX-lang-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153027" comment="vlc-noX-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129200" comment="vlc-qt-2.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5116</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116" source="CVE"/>
    <description>
    gd_xbm.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in certain custom PHP 5.5.x configurations, allows context-dependent attackers to obtain sensitive information from process memory or cause a denial of service (stack-based buffer under-read and application crash) via a long name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5116.html">CVE-2016-5116</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5116">SUSE bug 982176</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5116">SUSE bug 982176</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5116">SUSE bug 982176</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5116">SUSE bug 982176</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5116">SUSE bug 982176</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134466" comment="gd-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134467" comment="gd-32bit-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152101" comment="gd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134468" comment="gd-devel-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153569" comment="gd-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5118</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118" source="CVE"/>
    <description>
    The OpenBlob function in blob.c in GraphicsMagick before 1.3.24 and ImageMagick allows remote attackers to execute arbitrary code via a | (pipe) character at the start of a filename.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5118.html">CVE-2016-5118</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5118">SUSE bug 982178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5118">SUSE bug 982178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5118">SUSE bug 982178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5118">SUSE bug 982178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5118">SUSE bug 982178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5118">SUSE bug 982178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5118">SUSE bug 982178</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128545" comment="GraphicsMagick-1.3.21-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128546" comment="GraphicsMagick-devel-1.3.21-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129201" comment="ImageMagick-6.8.8.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129202" comment="ImageMagick-devel-6.8.8.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129203" comment="ImageMagick-devel-32bit-6.8.8.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129204" comment="ImageMagick-doc-6.8.8.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129205" comment="ImageMagick-extra-6.8.8.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128547" comment="libGraphicsMagick++-Q16-11-1.3.21-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128548" comment="libGraphicsMagick++-devel-1.3.21-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128549" comment="libGraphicsMagick-Q16-3-1.3.21-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128550" comment="libGraphicsMagick3-config-1.3.21-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128551" comment="libGraphicsMagickWand-Q16-2-1.3.21-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129206" comment="libMagick++-6_Q16-3-6.8.8.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129207" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129208" comment="libMagick++-devel-6.8.8.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129209" comment="libMagick++-devel-32bit-6.8.8.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129210" comment="libMagickCore-6_Q16-1-6.8.8.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129211" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129212" comment="libMagickWand-6_Q16-1-6.8.8.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129213" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128552" comment="perl-GraphicsMagick-1.3.21-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129214" comment="perl-PerlMagick-6.8.8.1-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5126</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5126" source="CVE"/>
    <description>
    Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5126.html">CVE-2016-5126</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5126">SUSE bug 982285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5126">SUSE bug 982286</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5126">SUSE bug 982286</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5126">SUSE bug 982286</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5126">SUSE bug 982285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5126">SUSE bug 982286</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5126">SUSE bug 982285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5126">SUSE bug 982286</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135119" comment="qemu-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135120" comment="qemu-arm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135121" comment="qemu-block-curl-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135122" comment="qemu-block-rbd-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135123" comment="qemu-extra-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135124" comment="qemu-guest-agent-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135125" comment="qemu-ipxe-1.0.0-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135126" comment="qemu-kvm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135127" comment="qemu-lang-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135128" comment="qemu-linux-user-2.3.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135129" comment="qemu-ppc-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135130" comment="qemu-s390-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135131" comment="qemu-seabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135132" comment="qemu-sgabios-8-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135133" comment="qemu-testsuite-2.3.1-19.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135134" comment="qemu-tools-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135135" comment="qemu-vgabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135136" comment="qemu-x86-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5127</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127" source="CVE"/>
    <description>
    Use-after-free vulnerability in WebKit/Source/core/editing/VisibleUnits.cpp in Blink, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code involving an @import at-rule in a Cascading Style Sheets (CSS) token sequence in conjunction with a rel=import attribute of a LINK element.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5127.html">CVE-2016-5127</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5127">SUSE bug 989901</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130665" comment="chromedriver-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130666" comment="chromium-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130667" comment="chromium-desktop-gnome-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130668" comment="chromium-desktop-kde-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130669" comment="chromium-ffmpegsumo-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5128</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128" source="CVE"/>
    <description>
    objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5128.html">CVE-2016-5128</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5128">SUSE bug 989901</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130665" comment="chromedriver-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130666" comment="chromium-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130667" comment="chromium-desktop-gnome-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130668" comment="chromium-desktop-kde-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130669" comment="chromium-ffmpegsumo-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5129</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5129" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129" source="CVE"/>
    <description>
    Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5129.html">CVE-2016-5129</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5129">SUSE bug 989901</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130665" comment="chromedriver-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130666" comment="chromium-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130667" comment="chromium-desktop-gnome-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130668" comment="chromium-desktop-kde-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130669" comment="chromium-ffmpegsumo-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5130</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130" source="CVE"/>
    <description>
    content/renderer/history_controller.cc in Google Chrome before 52.0.2743.82 does not properly restrict multiple uses of a JavaScript forward method, which allows remote attackers to spoof the URL display via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5130.html">CVE-2016-5130</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5130">SUSE bug 989901</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130665" comment="chromedriver-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130666" comment="chromium-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130667" comment="chromium-desktop-gnome-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130668" comment="chromium-desktop-kde-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130669" comment="chromium-ffmpegsumo-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5131</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" source="CVE"/>
    <description>
    Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5131.html">CVE-2016-5131</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5131">SUSE bug 989901</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5131">SUSE bug 1014873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5131">SUSE bug 1069433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5131">SUSE bug 1078813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5131">SUSE bug 1078813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5131">SUSE bug 1078813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5131">SUSE bug 1078813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5131">SUSE bug 1078813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5131">SUSE bug 1078813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5131">SUSE bug 1078813</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130665" comment="chromedriver-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130666" comment="chromium-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130667" comment="chromium-desktop-gnome-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130668" comment="chromium-desktop-kde-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130669" comment="chromium-ffmpegsumo-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5132</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132" source="CVE"/>
    <description>
    The Service Workers subsystem in Google Chrome before 52.0.2743.82 does not properly implement the Secure Contexts specification during decisions about whether to control a subframe, which allows remote attackers to bypass the Same Origin Policy via an https IFRAME element inside an http IFRAME element.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5132.html">CVE-2016-5132</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5132">SUSE bug 989901</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130665" comment="chromedriver-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130666" comment="chromium-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130667" comment="chromium-desktop-gnome-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130668" comment="chromium-desktop-kde-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130669" comment="chromium-ffmpegsumo-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5133</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133" source="CVE"/>
    <description>
    Google Chrome before 52.0.2743.82 mishandles origin information during proxy authentication, which allows man-in-the-middle attackers to spoof a proxy-authentication login prompt or trigger incorrect credential storage by modifying the client-server data stream.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5133.html">CVE-2016-5133</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5133">SUSE bug 989901</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130665" comment="chromedriver-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130666" comment="chromium-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130667" comment="chromium-desktop-gnome-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130668" comment="chromium-desktop-kde-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130669" comment="chromium-ffmpegsumo-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5134</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134" source="CVE"/>
    <description>
    net/proxy/proxy_service.cc in the Proxy Auto-Config (PAC) feature in Google Chrome before 52.0.2743.82 does not ensure that URL information is restricted to a scheme, host, and port, which allows remote attackers to discover credentials by operating a server with a PAC script, a related issue to CVE-2016-3763.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5134.html">CVE-2016-5134</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5134">SUSE bug 989901</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130665" comment="chromedriver-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130666" comment="chromium-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130667" comment="chromium-desktop-gnome-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130668" comment="chromium-desktop-kde-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130669" comment="chromium-ffmpegsumo-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5135</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135" source="CVE"/>
    <description>
    WebKit/Source/core/html/parser/HTMLPreloadScanner.cpp in Blink, as used in Google Chrome before 52.0.2743.82, does not consider referrer-policy information inside an HTML document during a preload request, which allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via a crafted web site, as demonstrated by a "Content-Security-Policy: referrer origin-when-cross-origin" header that overrides a "&lt;META name='referrer' content='no-referrer'&gt;" element.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5135.html">CVE-2016-5135</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5135">SUSE bug 989901</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130665" comment="chromedriver-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130666" comment="chromium-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130667" comment="chromium-desktop-gnome-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130668" comment="chromium-desktop-kde-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130669" comment="chromium-ffmpegsumo-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5136</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136" source="CVE"/>
    <description>
    Use-after-free vulnerability in extensions/renderer/user_script_injector.cc in the Extensions subsystem in Google Chrome before 52.0.2743.82 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to script deletion.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5136.html">CVE-2016-5136</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5136">SUSE bug 989901</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130665" comment="chromedriver-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130666" comment="chromium-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130667" comment="chromium-desktop-gnome-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130668" comment="chromium-desktop-kde-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130669" comment="chromium-ffmpegsumo-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5137</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137" source="CVE"/>
    <description>
    The CSPSource::schemeMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation in Blink, as used in Google Chrome before 52.0.2743.82, does not apply http :80 policies to https :443 URLs and does not apply ws :80 policies to wss :443 URLs, which makes it easier for remote attackers to determine whether a specific HSTS web site has been visited by reading a CSP report.  NOTE: this vulnerability is associated with a specification change after CVE-2016-1617 resolution.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5137.html">CVE-2016-5137</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5137">SUSE bug 989901</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130665" comment="chromedriver-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130666" comment="chromium-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130667" comment="chromium-desktop-gnome-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130668" comment="chromium-desktop-kde-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130669" comment="chromium-ffmpegsumo-52.0.2743.82-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5139</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5139" source="CVE"/>
    <description>
    Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 52.0.2743.116, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5139.html">CVE-2016-5139</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5139">SUSE bug 992305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5139">SUSE bug 992311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5139">SUSE bug 992311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5139">SUSE bug 992311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5139">SUSE bug 992325</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130910" comment="chromedriver-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130911" comment="chromium-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130912" comment="chromium-desktop-gnome-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130913" comment="chromium-desktop-kde-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130914" comment="chromium-ffmpegsumo-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5140</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5140" source="CVE"/>
    <description>
    Heap-based buffer overflow in the opj_j2k_read_SQcd_SQcc function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 52.0.2743.116, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JPEG 2000 data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5140.html">CVE-2016-5140</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5140">SUSE bug 992305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5140">SUSE bug 992310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5140">SUSE bug 992310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5140">SUSE bug 992310</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5140">SUSE bug 992325</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130910" comment="chromedriver-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130911" comment="chromium-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130912" comment="chromium-desktop-gnome-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130913" comment="chromium-desktop-kde-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130914" comment="chromium-ffmpegsumo-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5141</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5141" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 52.0.2743.116, allows remote attackers to spoof the address bar via vectors involving a provisional URL for an initially empty document, related to FrameLoader.cpp and ScopedPageLoadDeferrer.cpp.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5141.html">CVE-2016-5141</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5141">SUSE bug 992305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5141">SUSE bug 992314</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5141">SUSE bug 992314</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5141">SUSE bug 992314</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5141">SUSE bug 992325</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130910" comment="chromedriver-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130911" comment="chromium-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130912" comment="chromium-desktop-gnome-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130913" comment="chromium-desktop-kde-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130914" comment="chromium-ffmpegsumo-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5142</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5142" source="CVE"/>
    <description>
    The Web Cryptography API (aka WebCrypto) implementation in Blink, as used in Google Chrome before 52.0.2743.116, does not properly copy data buffers, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code, related to NormalizeAlgorithm.cpp and SubtleCrypto.cpp.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5142.html">CVE-2016-5142</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5142">SUSE bug 992305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5142">SUSE bug 992313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5142">SUSE bug 992313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5142">SUSE bug 992313</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5142">SUSE bug 992325</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130910" comment="chromedriver-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130911" comment="chromium-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130912" comment="chromium-desktop-gnome-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130913" comment="chromium-desktop-kde-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130914" comment="chromium-ffmpegsumo-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5143</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5143" source="CVE"/>
    <description>
    The Developer Tools (aka DevTools) subsystem in Blink, as used in Google Chrome before 52.0.2743.116, mishandles the script-path hostname, remoteBase parameter, and remoteFrontendUrl parameter, which allows remote attackers to bypass intended access restrictions via a crafted URL, a different vulnerability than CVE-2016-5144.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5143.html">CVE-2016-5143</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5143">SUSE bug 992305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5143">SUSE bug 992319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5143">SUSE bug 992319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5143">SUSE bug 992319</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5143">SUSE bug 992325</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130910" comment="chromedriver-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130911" comment="chromium-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130912" comment="chromium-desktop-gnome-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130913" comment="chromium-desktop-kde-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130914" comment="chromium-ffmpegsumo-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5144</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5144" source="CVE"/>
    <description>
    The Developer Tools (aka DevTools) subsystem in Blink, as used in Google Chrome before 52.0.2743.116, mishandles the script-path hostname, remoteBase parameter, and remoteFrontendUrl parameter, which allows remote attackers to bypass intended access restrictions via a crafted URL, a different vulnerability than CVE-2016-5143.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5144.html">CVE-2016-5144</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5144">SUSE bug 992305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5144">SUSE bug 992315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5144">SUSE bug 992315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5144">SUSE bug 992315</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5144">SUSE bug 992325</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130910" comment="chromedriver-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130911" comment="chromium-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130912" comment="chromium-desktop-gnome-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130913" comment="chromium-desktop-kde-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130914" comment="chromium-ffmpegsumo-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5145</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5145" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 52.0.2743.116, does not ensure that a taint property is preserved after a structure-clone operation on an ImageBitmap object derived from a cross-origin image, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5145.html">CVE-2016-5145</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5145">SUSE bug 992305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5145">SUSE bug 992320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5145">SUSE bug 992320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5145">SUSE bug 992320</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5145">SUSE bug 992325</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130910" comment="chromedriver-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130911" comment="chromium-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130912" comment="chromium-desktop-gnome-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130913" comment="chromium-desktop-kde-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130914" comment="chromium-ffmpegsumo-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5146</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5146" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 52.0.2743.116 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5146.html">CVE-2016-5146</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5146">SUSE bug 992305</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5146">SUSE bug 992309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5146">SUSE bug 992309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5146">SUSE bug 992309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5146">SUSE bug 992325</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130910" comment="chromedriver-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130911" comment="chromium-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130912" comment="chromium-desktop-gnome-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130913" comment="chromium-desktop-kde-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130914" comment="chromium-ffmpegsumo-52.0.2743.116-64.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5147</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, mishandles deferred page loads, which allows remote attackers to inject arbitrary web script or HTML via a crafted web site, aka "Universal XSS (UXSS)."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5147.html">CVE-2016-5147</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5147">SUSE bug 996648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134254" comment="chromedriver-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134255" comment="chromium-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134256" comment="chromium-desktop-gnome-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134257" comment="chromium-desktop-kde-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134258" comment="chromium-ffmpegsumo-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5148</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to inject arbitrary web script or HTML via vectors related to widget updates, aka "Universal XSS (UXSS)."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5148.html">CVE-2016-5148</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5148">SUSE bug 996648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134254" comment="chromedriver-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134255" comment="chromium-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134256" comment="chromium-desktop-gnome-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134257" comment="chromium-desktop-kde-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134258" comment="chromium-ffmpegsumo-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5149</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149" source="CVE"/>
    <description>
    The extensions subsystem in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux relies on an IFRAME source URL to identify an associated extension, which allows remote attackers to conduct extension-bindings injection attacks by leveraging script access to a resource that initially has the about:blank URL.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5149.html">CVE-2016-5149</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5149">SUSE bug 996648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134254" comment="chromedriver-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134255" comment="chromium-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134256" comment="chromium-desktop-gnome-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134257" comment="chromium-desktop-kde-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134258" comment="chromium-ffmpegsumo-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5150</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150" source="CVE"/>
    <description>
    WebKit/Source/bindings/modules/v8/V8BindingForModules.cpp in Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, has an Indexed Database (aka IndexedDB) API implementation that does not properly restrict key-path evaluation, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code that leverages certain side effects.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5150.html">CVE-2016-5150</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5150">SUSE bug 996648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134254" comment="chromedriver-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134255" comment="chromium-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134256" comment="chromium-desktop-gnome-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134257" comment="chromium-desktop-kde-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134258" comment="chromium-ffmpegsumo-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5151</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151" source="CVE"/>
    <description>
    PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux mishandles timers, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted PDF document, related to fpdfsdk/javascript/JS_Object.cpp and fpdfsdk/javascript/app.cpp.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5151.html">CVE-2016-5151</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5151">SUSE bug 996648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134254" comment="chromedriver-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134255" comment="chromium-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134256" comment="chromium-desktop-gnome-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134257" comment="chromium-desktop-kde-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134258" comment="chromium-ffmpegsumo-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5152</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" source="CVE"/>
    <description>
    Integer overflow in the opj_tcd_get_decoded_tile_size function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5152.html">CVE-2016-5152</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5152">SUSE bug 996648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134254" comment="chromedriver-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134255" comment="chromium-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134256" comment="chromium-desktop-gnome-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134257" comment="chromium-desktop-kde-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134258" comment="chromium-ffmpegsumo-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5153</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153" source="CVE"/>
    <description>
    The Web Animations implementation in Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, improperly relies on list iteration, which allows remote attackers to cause a denial of service (use-after-destruction) or possibly have unspecified other impact via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5153.html">CVE-2016-5153</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5153">SUSE bug 996648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134254" comment="chromedriver-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134255" comment="chromium-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134256" comment="chromium-desktop-gnome-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134257" comment="chromium-desktop-kde-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134258" comment="chromium-ffmpegsumo-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5154</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in PDFium, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted JBig2 image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5154.html">CVE-2016-5154</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5154">SUSE bug 996648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134254" comment="chromedriver-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134255" comment="chromium-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134256" comment="chromium-desktop-gnome-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134257" comment="chromium-desktop-kde-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134258" comment="chromium-ffmpegsumo-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5155</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155" source="CVE"/>
    <description>
    Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly validate access to the initial document, which allows remote attackers to spoof the address bar via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5155.html">CVE-2016-5155</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5155">SUSE bug 996648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134254" comment="chromedriver-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134255" comment="chromium-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134256" comment="chromium-desktop-gnome-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134257" comment="chromium-desktop-kde-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134258" comment="chromium-ffmpegsumo-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5156</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156" source="CVE"/>
    <description>
    extensions/renderer/event_bindings.cc in the event bindings in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux attempts to process filtered events after failure to add an event matcher, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5156.html">CVE-2016-5156</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5156">SUSE bug 996648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134254" comment="chromedriver-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134255" comment="chromium-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134256" comment="chromium-desktop-gnome-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134257" comment="chromium-desktop-kde-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134258" comment="chromium-ffmpegsumo-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5157</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157" source="CVE"/>
    <description>
    Heap-based buffer overflow in the opj_dwt_interleave_v function in dwt.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to execute arbitrary code via crafted coordinate values in JPEG 2000 data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5157.html">CVE-2016-5157</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5157">SUSE bug 996648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134254" comment="chromedriver-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134255" comment="chromium-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134256" comment="chromium-desktop-gnome-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134257" comment="chromium-desktop-kde-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134258" comment="chromium-ffmpegsumo-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5158</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158" source="CVE"/>
    <description>
    Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5158.html">CVE-2016-5158</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5158">SUSE bug 996648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134254" comment="chromedriver-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134255" comment="chromium-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134256" comment="chromium-desktop-gnome-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134257" comment="chromium-desktop-kde-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134258" comment="chromium-ffmpegsumo-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5159</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159" source="CVE"/>
    <description>
    Multiple integer overflows in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data that is mishandled during opj_aligned_malloc calls in dwt.c and t1.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5159.html">CVE-2016-5159</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5159">SUSE bug 996648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134254" comment="chromedriver-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134255" comment="chromium-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134256" comment="chromium-desktop-gnome-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134257" comment="chromium-desktop-kde-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134258" comment="chromium-ffmpegsumo-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5160</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160" source="CVE"/>
    <description>
    The AllowCrossRendererResourceLoad function in extensions/browser/url_request_util.cc in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly use an extension's manifest.json web_accessible_resources field for restrictions on IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks, and trick users into changing extension settings, via a crafted web site, a different vulnerability than CVE-2016-5162.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5160.html">CVE-2016-5160</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5160">SUSE bug 996648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134254" comment="chromedriver-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134255" comment="chromium-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134256" comment="chromium-desktop-gnome-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134257" comment="chromium-desktop-kde-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134258" comment="chromium-ffmpegsumo-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5161</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161" source="CVE"/>
    <description>
    The EditingStyle::mergeStyle function in WebKit/Source/core/editing/EditingStyle.cpp in Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, mishandles custom properties, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that leverages "type confusion" in the StylePropertySerializer class.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5161.html">CVE-2016-5161</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5161">SUSE bug 996648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134254" comment="chromedriver-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134255" comment="chromium-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134256" comment="chromium-desktop-gnome-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134257" comment="chromium-desktop-kde-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134258" comment="chromium-ffmpegsumo-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5162</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162" source="CVE"/>
    <description>
    The AllowCrossRendererResourceLoad function in extensions/browser/url_request_util.cc in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly use an extension's manifest.json web_accessible_resources field for restrictions on IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks, and trick users into changing extension settings, via a crafted web site, a different vulnerability than CVE-2016-5160.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5162.html">CVE-2016-5162</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5162">SUSE bug 996648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134254" comment="chromedriver-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134255" comment="chromium-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134256" comment="chromium-desktop-gnome-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134257" comment="chromium-desktop-kde-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134258" comment="chromium-ffmpegsumo-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5163</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163" source="CVE"/>
    <description>
    The bidirectional-text implementation in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not ensure left-to-right (LTR) rendering of URLs, which allows remote attackers to spoof the address bar via crafted right-to-left (RTL) Unicode text, related to omnibox/SuggestionView.java and omnibox/UrlBar.java in Chrome for Android.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5163.html">CVE-2016-5163</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5163">SUSE bug 996648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134254" comment="chromedriver-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134255" comment="chromium-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134256" comment="chromium-desktop-gnome-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134257" comment="chromium-desktop-kde-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134258" comment="chromium-ffmpegsumo-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5164</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in WebKit/Source/platform/v8_inspector/V8Debugger.cpp in Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to inject arbitrary web script or HTML into the Developer Tools (aka DevTools) subsystem via a crafted web site, aka "Universal XSS (UXSS)."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5164.html">CVE-2016-5164</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5164">SUSE bug 996648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134254" comment="chromedriver-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134255" comment="chromium-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134256" comment="chromium-desktop-gnome-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134257" comment="chromium-desktop-kde-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134258" comment="chromium-ffmpegsumo-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5165</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the Developer Tools (aka DevTools) subsystem in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux allows remote attackers to inject arbitrary web script or HTML via the settings parameter in a chrome-devtools-frontend.appspot.com URL's query string.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5165.html">CVE-2016-5165</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5165">SUSE bug 996648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134254" comment="chromedriver-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134255" comment="chromium-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134256" comment="chromium-desktop-gnome-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134257" comment="chromium-desktop-kde-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134258" comment="chromium-ffmpegsumo-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5166</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166" source="CVE"/>
    <description>
    The download implementation in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly restrict saving a file:// URL that is referenced by an http:// URL, which makes it easier for user-assisted remote attackers to discover NetNTLM hashes and conduct SMB relay attacks via a crafted web page that is accessed with the "Save page as" menu choice.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5166.html">CVE-2016-5166</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5166">SUSE bug 996648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134254" comment="chromedriver-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134255" comment="chromium-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134256" comment="chromium-desktop-gnome-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134257" comment="chromium-desktop-kde-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134258" comment="chromium-ffmpegsumo-53.0.2785.89-68.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5170</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5170" source="CVE"/>
    <description>
    WebKit/Source/bindings/modules/v8/V8BindingForModules.cpp in Blink, as used in Google Chrome before 53.0.2785.113, does not properly consider getter side effects during array key conversion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted Indexed Database (aka IndexedDB) API calls.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5170.html">CVE-2016-5170</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5170">SUSE bug 998743</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134444" comment="chromedriver-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134445" comment="chromium-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134446" comment="chromium-desktop-gnome-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134447" comment="chromium-desktop-kde-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134448" comment="chromium-ffmpegsumo-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5171</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5171" source="CVE"/>
    <description>
    WebKit/Source/bindings/templates/interface.cpp in Blink, as used in Google Chrome before 53.0.2785.113, does not prevent certain constructor calls, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5171.html">CVE-2016-5171</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5171">SUSE bug 998743</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134444" comment="chromedriver-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134445" comment="chromium-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134446" comment="chromium-desktop-gnome-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134447" comment="chromium-desktop-kde-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134448" comment="chromium-ffmpegsumo-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5172</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5172" source="CVE"/>
    <description>
    The parser in Google V8, as used in Google Chrome before 53.0.2785.113, mishandles scopes, which allows remote attackers to obtain sensitive information from arbitrary memory locations via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5172.html">CVE-2016-5172</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5172">SUSE bug 998743</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134444" comment="chromedriver-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134445" comment="chromium-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134446" comment="chromium-desktop-gnome-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134447" comment="chromium-desktop-kde-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134448" comment="chromium-ffmpegsumo-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5173</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5173" source="CVE"/>
    <description>
    The extensions subsystem in Google Chrome before 53.0.2785.113 does not properly restrict access to Object.prototype, which allows remote attackers to load unintended resources, and consequently trigger unintended JavaScript function calls and bypass the Same Origin Policy via an indirect interception attack.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5173.html">CVE-2016-5173</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5173">SUSE bug 998743</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134444" comment="chromedriver-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134445" comment="chromium-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134446" comment="chromium-desktop-gnome-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134447" comment="chromium-desktop-kde-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134448" comment="chromium-ffmpegsumo-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5174</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5174" source="CVE"/>
    <description>
    browser/ui/cocoa/browser_window_controller_private.mm in Google Chrome before 53.0.2785.113 does not process fullscreen toggle requests during a fullscreen transition, which allows remote attackers to cause a denial of service (unsuppressed popup) via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5174.html">CVE-2016-5174</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5174">SUSE bug 998743</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134444" comment="chromedriver-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134445" comment="chromium-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134446" comment="chromium-desktop-gnome-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134447" comment="chromium-desktop-kde-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134448" comment="chromium-ffmpegsumo-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5175</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5175" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 53.0.2785.113 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5175.html">CVE-2016-5175</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5175">SUSE bug 998743</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134444" comment="chromedriver-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134445" comment="chromium-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134446" comment="chromium-desktop-gnome-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134447" comment="chromium-desktop-kde-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134448" comment="chromium-ffmpegsumo-53.0.2785.113-74.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5177</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5177" source="CVE"/>
    <description>
    Use-after-free vulnerability in V8 in Google Chrome before 53.0.2785.143 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5177.html">CVE-2016-5177</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5177">SUSE bug 1002140</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5177">SUSE bug 1002140</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5177">SUSE bug 1002140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133630" comment="chromedriver-53.0.2785.143-79.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133631" comment="chromium-53.0.2785.143-79.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133632" comment="chromium-desktop-gnome-53.0.2785.143-79.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133633" comment="chromium-desktop-kde-53.0.2785.143-79.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133634" comment="chromium-ffmpegsumo-53.0.2785.143-79.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5178</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5178" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 53.0.2785.143 allow remote attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5178.html">CVE-2016-5178</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5178">SUSE bug 1002140</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5178">SUSE bug 1002140</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5178">SUSE bug 1002140</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133630" comment="chromedriver-53.0.2785.143-79.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133631" comment="chromium-53.0.2785.143-79.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133632" comment="chromium-desktop-gnome-53.0.2785.143-79.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152653" comment="chromium-desktop-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133633" comment="chromium-desktop-kde-53.0.2785.143-79.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152654" comment="chromium-desktop-kde is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133634" comment="chromium-ffmpegsumo-53.0.2785.143-79.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5180</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5180" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a hostname with an escaped trailing dot.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5180.html">CVE-2016-5180</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5180">SUSE bug 1007728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5180">SUSE bug 1007728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5180">SUSE bug 1007728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5180">SUSE bug 1007728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5180">SUSE bug 1007728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5180">SUSE bug 1007728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5180">SUSE bug 1007728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5180">SUSE bug 1007728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5180">SUSE bug 1007728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5180">SUSE bug 1007728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5180">SUSE bug 1007728</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5180">SUSE bug 1007728</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146076" comment="libcares-devel-1.9.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153705" comment="libcares-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146003" comment="libcares2-1.9.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153706" comment="libcares2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146004" comment="libcares2-32bit-1.9.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153707" comment="libcares2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135435" comment="nodejs-4.6.1-36.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135436" comment="nodejs-devel-4.6.1-36.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135438" comment="nodejs-docs-4.6.1-36.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135439" comment="npm-4.6.1-36.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5181</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5181" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android permitted execution of v8 microtasks while the DOM was in an inconsistent state, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via crafted HTML pages.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5181.html">CVE-2016-5181</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5181">SUSE bug 1004465</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133247" comment="chromedriver-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133248" comment="chromium-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133249" comment="chromium-ffmpegsumo-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5182</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5182" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation in bitmap handling, which allowed a remote attacker to potentially exploit heap corruption via crafted HTML pages.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5182.html">CVE-2016-5182</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5182">SUSE bug 1004465</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133247" comment="chromedriver-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133248" comment="chromium-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133249" comment="chromium-ffmpegsumo-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5183</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5183" source="CVE"/>
    <description>
    A heap use after free in PDFium in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android allows a remote attacker to potentially exploit heap corruption via crafted PDF files.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5183.html">CVE-2016-5183</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5183">SUSE bug 1004465</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133247" comment="chromedriver-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133248" comment="chromium-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133249" comment="chromium-ffmpegsumo-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5184</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5184" source="CVE"/>
    <description>
    PDFium in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly handled object lifecycles in CFFL_FormFillter::KillFocusForAnnot, which allowed a remote attacker to potentially exploit heap corruption via crafted PDF files.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5184.html">CVE-2016-5184</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5184">SUSE bug 1004465</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133247" comment="chromedriver-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133248" comment="chromium-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133249" comment="chromium-ffmpegsumo-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5185</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5185" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly allowed reentrance of FrameView::updateLifecyclePhasesInternal(), which allowed a remote attacker to perform an out of bounds memory read via crafted HTML pages.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5185.html">CVE-2016-5185</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5185">SUSE bug 1004465</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133247" comment="chromedriver-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133248" comment="chromium-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133249" comment="chromium-ffmpegsumo-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5186</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5186" source="CVE"/>
    <description>
    Devtools in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly handled objects after a tab crash, which allowed a remote attacker to perform an out of bounds memory read via crafted PDF files.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5186.html">CVE-2016-5186</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5186">SUSE bug 1004465</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133247" comment="chromedriver-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133248" comment="chromium-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133249" comment="chromium-ffmpegsumo-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5187</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5187" source="CVE"/>
    <description>
    Google Chrome prior to 54.0.2840.85 for Android incorrectly handled rapid transition into and out of full screen mode, which allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via crafted HTML pages.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5187.html">CVE-2016-5187</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5187">SUSE bug 1004465</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133247" comment="chromedriver-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133248" comment="chromium-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133249" comment="chromium-ffmpegsumo-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5188</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5188" source="CVE"/>
    <description>
    Multiple issues in Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux allow a remote attacker to spoof various parts of browser UI via crafted HTML pages.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5188.html">CVE-2016-5188</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5188">SUSE bug 1004465</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133247" comment="chromedriver-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133248" comment="chromium-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133249" comment="chromium-ffmpegsumo-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5189</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5189" source="CVE"/>
    <description>
    Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android permitted navigation to blob URLs with non-canonical origins, which allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via crafted HTML pages.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5189.html">CVE-2016-5189</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5189">SUSE bug 1004465</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133247" comment="chromedriver-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133248" comment="chromium-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133249" comment="chromium-ffmpegsumo-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5190</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5190" source="CVE"/>
    <description>
    Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly handled object lifecycles during shutdown, which allowed a remote attacker to perform an out of bounds memory read via crafted HTML pages.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5190.html">CVE-2016-5190</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5190">SUSE bug 1004465</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133247" comment="chromedriver-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133248" comment="chromium-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133249" comment="chromium-ffmpegsumo-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5191</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5191" source="CVE"/>
    <description>
    Bookmark handling in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation of supplied data, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via crafted HTML pages, as demonstrated by an interpretation conflict between userinfo and scheme in an http://javascript:payload@example.com URL.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5191.html">CVE-2016-5191</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5191">SUSE bug 1004465</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133247" comment="chromedriver-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133248" comment="chromium-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133249" comment="chromium-ffmpegsumo-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5192</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5192" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 54.0.2840.59 for Windows missed a CORS check on redirect in TextTrackLoader, which allowed a remote attacker to bypass cross-origin restrictions via crafted HTML pages.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5192.html">CVE-2016-5192</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5192">SUSE bug 1004465</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133247" comment="chromedriver-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133248" comment="chromium-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133249" comment="chromium-ffmpegsumo-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5193</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5193" source="CVE"/>
    <description>
    Google Chrome prior to 54.0 for iOS had insufficient validation of URLs for windows open by DOM, which allowed a remote attacker to bypass restrictions on navigation to certain URL schemes via crafted HTML pages.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5193.html">CVE-2016-5193</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5193">SUSE bug 1004465</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133247" comment="chromedriver-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133248" comment="chromium-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133249" comment="chromium-ffmpegsumo-54.0.2840.59-82.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5195</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195" source="CVE"/>
    <description>
    Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5195.html">CVE-2016-5195</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1006323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1006323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 998689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1006323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1006695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1006323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1006695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1006695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1006695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 987565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1006323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1008110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 986445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1006695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1006695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1008110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1006323</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1006695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1008110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1008110</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1030118</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004419</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 870618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 870618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5195">SUSE bug 1069496</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134991" comment="drbd-8.4.6-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134992" comment="drbd-kmp-default-8.4.6_k4.1.34_33-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134993" comment="drbd-kmp-pv-8.4.6_k4.1.34_33-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134994" comment="drbd-kmp-xen-8.4.6_k4.1.34_33-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134995" comment="hdjmod-1.28-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134996" comment="hdjmod-kmp-default-1.28_k4.1.34_33-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134997" comment="hdjmod-kmp-pae-1.28_k4.1.34_33-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134998" comment="hdjmod-kmp-pv-1.28_k4.1.34_33-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134999" comment="hdjmod-kmp-xen-1.28_k4.1.34_33-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135000" comment="ipset-6.25.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135001" comment="ipset-devel-6.25.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135002" comment="ipset-kmp-default-6.25.1_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135003" comment="ipset-kmp-pae-6.25.1_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135004" comment="ipset-kmp-pv-6.25.1_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135005" comment="ipset-kmp-xen-6.25.1_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135006" comment="kernel-debug-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135007" comment="kernel-debug-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135008" comment="kernel-debug-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135009" comment="kernel-default-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135010" comment="kernel-default-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135011" comment="kernel-default-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135012" comment="kernel-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135013" comment="kernel-docs-4.1.34-33.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135014" comment="kernel-docs-html-4.1.34-33.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135015" comment="kernel-docs-pdf-4.1.34-33.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135016" comment="kernel-ec2-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135017" comment="kernel-ec2-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135018" comment="kernel-ec2-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135019" comment="kernel-macros-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135020" comment="kernel-obs-build-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135021" comment="kernel-obs-qa-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135022" comment="kernel-obs-qa-xen-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135023" comment="kernel-pae-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135024" comment="kernel-pae-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135025" comment="kernel-pae-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135026" comment="kernel-pv-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135027" comment="kernel-pv-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135028" comment="kernel-pv-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135029" comment="kernel-source-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135030" comment="kernel-source-vanilla-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135031" comment="kernel-syms-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135032" comment="kernel-vanilla-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135033" comment="kernel-vanilla-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135034" comment="kernel-xen-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135035" comment="kernel-xen-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135036" comment="kernel-xen-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135037" comment="libipset3-6.25.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135038" comment="lttng-modules-2.7.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135039" comment="lttng-modules-kmp-default-2.7.0_k4.1.34_33-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135040" comment="lttng-modules-kmp-pv-2.7.0_k4.1.34_33-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135041" comment="pcfclock-0.44-268.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135042" comment="pcfclock-kmp-default-0.44_k4.1.34_33-268.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135043" comment="pcfclock-kmp-pae-0.44_k4.1.34_33-268.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135044" comment="pcfclock-kmp-pv-0.44_k4.1.34_33-268.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135045" comment="vhba-kmp-20140928-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135046" comment="vhba-kmp-default-20140928_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135047" comment="vhba-kmp-pae-20140928_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135048" comment="vhba-kmp-pv-20140928_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135049" comment="vhba-kmp-xen-20140928_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5198</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5198" source="CVE"/>
    <description>
    V8 in Google Chrome prior to 54.0.2840.90 for Linux, and 54.0.2840.85 for Android, and 54.0.2840.87 for Windows and Mac included incorrect optimisation assumptions, which allowed a remote attacker to perform arbitrary read/write operations, leading to code execution, via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5198.html">CVE-2016-5198</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5198">SUSE bug 1008274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5198">SUSE bug 1008274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5198">SUSE bug 1008274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5198">SUSE bug 1008274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5198">SUSE bug 1008274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5198">SUSE bug 1008274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5198">SUSE bug 1008274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5198">SUSE bug 1008274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5198">SUSE bug 1008274</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135299" comment="chromedriver-54.0.2840.90-85.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135300" comment="chromium-54.0.2840.90-85.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135301" comment="chromium-ffmpegsumo-54.0.2840.90-85.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5199</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5199" source="CVE"/>
    <description>
    An off by one error resulting in an allocation of zero size in FFmpeg in Google Chrome prior to 54.0.2840.98 for Mac, and 54.0.2840.99 for Windows, and 54.0.2840.100 for Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted video file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5199.html">CVE-2016-5199</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5199">SUSE bug 1009892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5199">SUSE bug 1009892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5199">SUSE bug 1009892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5199">SUSE bug 1009892</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5199">SUSE bug 1009892</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135516" comment="chromedriver-54.0.2840.100-91.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135517" comment="chromium-54.0.2840.100-91.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135518" comment="chromium-ffmpegsumo-54.0.2840.100-91.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5200</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5200" source="CVE"/>
    <description>
    V8 in Google Chrome prior to 54.0.2840.98 for Mac, and 54.0.2840.99 for Windows, and 54.0.2840.100 for Linux, and 55.0.2883.84 for Android incorrectly applied type rules, which allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5200.html">CVE-2016-5200</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5200">SUSE bug 1009893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5200">SUSE bug 1009893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5200">SUSE bug 1009893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5200">SUSE bug 1009893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5200">SUSE bug 1009893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5200">SUSE bug 1009893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5200">SUSE bug 1009893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5200">SUSE bug 1009893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5200">SUSE bug 1009893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5200">SUSE bug 1009893</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135516" comment="chromedriver-54.0.2840.100-91.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135517" comment="chromium-54.0.2840.100-91.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135518" comment="chromium-ffmpegsumo-54.0.2840.100-91.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5201</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5201" source="CVE"/>
    <description>
    A leak of privateClass in the extensions API in Google Chrome prior to 54.0.2840.100 for Linux, and 54.0.2840.99 for Windows, and 54.0.2840.98 for Mac allowed a remote attacker to access privileged JavaScript code via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5201.html">CVE-2016-5201</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5201">SUSE bug 1009894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5201">SUSE bug 1009894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5201">SUSE bug 1009894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5201">SUSE bug 1009894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135516" comment="chromedriver-54.0.2840.100-91.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135517" comment="chromium-54.0.2840.100-91.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135518" comment="chromium-ffmpegsumo-54.0.2840.100-91.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5202</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5202" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5202.html">CVE-2016-5202</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5202">SUSE bug 1009895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5202">SUSE bug 1009895</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5202">SUSE bug 1009895</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135516" comment="chromedriver-54.0.2840.100-91.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135517" comment="chromium-54.0.2840.100-91.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135518" comment="chromium-ffmpegsumo-54.0.2840.100-91.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152655" comment="chromium-ffmpegsumo is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5203</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5203" source="CVE"/>
    <description>
    A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5203.html">CVE-2016-5203</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5203">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5204</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5204" source="CVE"/>
    <description>
    Leaking of an SVG shadow tree leading to corruption of the DOM tree in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5204.html">CVE-2016-5204</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5204">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5205</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5205" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 55.0.2883.75 for Linux, Windows and Mac, incorrectly handles deferred page loads, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5205.html">CVE-2016-5205</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5205">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5206</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5206" source="CVE"/>
    <description>
    The PDF plugin in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly followed redirects, which allowed a remote attacker to bypass the Same Origin Policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5206.html">CVE-2016-5206</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5206">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5207</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5207" source="CVE"/>
    <description>
    In Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android, corruption of the DOM tree could occur during the removal of a full screen element, which allowed a remote attacker to achieve arbitrary code execution via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5207.html">CVE-2016-5207</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5207">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5208</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5208" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 55.0.2883.75 for Linux and Windows, and 55.0.2883.84 for Android allowed possible corruption of the DOM tree during synchronous event handling, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5208.html">CVE-2016-5208</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5208">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5209</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5209" source="CVE"/>
    <description>
    Bad casting in bitmap manipulation in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5209.html">CVE-2016-5209</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5209">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5210</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5210" source="CVE"/>
    <description>
    Heap buffer overflow during TIFF image parsing in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5210.html">CVE-2016-5210</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5210">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5211</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5211" source="CVE"/>
    <description>
    A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5211.html">CVE-2016-5211</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5211">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5212</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5212" source="CVE"/>
    <description>
    Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android insufficiently sanitized DevTools URLs, which allowed a remote attacker to read local files via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5212.html">CVE-2016-5212</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5212">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5213</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5213" source="CVE"/>
    <description>
    A use after free in V8 in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5213.html">CVE-2016-5213</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5213">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5214</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5214" source="CVE"/>
    <description>
    Google Chrome prior to 55.0.2883.75 for Windows mishandled downloaded files, which allowed a remote attacker to prevent the downloaded file from receiving the Mark of the Web via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5214.html">CVE-2016-5214</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5214">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5215</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5215" source="CVE"/>
    <description>
    A use after free in webaudio in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5215.html">CVE-2016-5215</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5215">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5216</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5216" source="CVE"/>
    <description>
    A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5216.html">CVE-2016-5216</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5216">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5217</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5217" source="CVE"/>
    <description>
    The extensions API in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly permitted access to privileged plugins, which allowed a remote attacker to bypass site isolation via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5217.html">CVE-2016-5217</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5217">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5218</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5218" source="CVE"/>
    <description>
    The extensions API in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled navigation within PDFs, which allowed a remote attacker to temporarily spoof the contents of the Omnibox (URL bar) via a crafted HTML page containing PDF data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5218.html">CVE-2016-5218</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5218">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5219</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5219" source="CVE"/>
    <description>
    A heap use after free in V8 in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5219.html">CVE-2016-5219</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5219">SUSE bug 1013236</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5219">SUSE bug 1013274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5219">SUSE bug 1013274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5219">SUSE bug 1013274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5219">SUSE bug 1013274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5219">SUSE bug 1013274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5219">SUSE bug 1013274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5219">SUSE bug 1013274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5219">SUSE bug 1013274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5219">SUSE bug 1013274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5219">SUSE bug 1013274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5219">SUSE bug 1013274</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5220</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5220" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5220" source="CVE"/>
    <description>
    PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled navigation within PDFs, which allowed a remote attacker to read local files via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5220.html">CVE-2016-5220</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5220">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5221</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5221" source="CVE"/>
    <description>
    Type confusion in libGLESv2 in ANGLE in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android possibly allowed a remote attacker to bypass buffer validation via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5221.html">CVE-2016-5221</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5221">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5222</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5222" source="CVE"/>
    <description>
    Incorrect handling of invalid URLs in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5222.html">CVE-2016-5222</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5222">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5223</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5223" source="CVE"/>
    <description>
    Integer overflow in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption or DoS via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5223.html">CVE-2016-5223</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5223">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5224</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5224" source="CVE"/>
    <description>
    A timing attack on denormalized floating point arithmetic in SVG filters in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to bypass the Same Origin Policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5224.html">CVE-2016-5224</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5224">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5225</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5225" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled form actions, which allowed a remote attacker to bypass Content Security Policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5225.html">CVE-2016-5225</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5225">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5226</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5226" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 55.0.2883.75 for Linux, Windows and Mac executed javascript: URLs entered in the URL bar in the context of the current tab, which allowed a socially engineered user to XSS themselves by dragging and dropping a javascript: URL into the URL bar.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5226.html">CVE-2016-5226</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5226">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5238</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5238" source="CVE"/>
    <description>
    The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5238.html">CVE-2016-5238</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5238">SUSE bug 982960</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135119" comment="qemu-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135120" comment="qemu-arm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135121" comment="qemu-block-curl-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135122" comment="qemu-block-rbd-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135123" comment="qemu-extra-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135124" comment="qemu-guest-agent-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135125" comment="qemu-ipxe-1.0.0-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135126" comment="qemu-kvm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135127" comment="qemu-lang-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135128" comment="qemu-linux-user-2.3.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135129" comment="qemu-ppc-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135130" comment="qemu-s390-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135131" comment="qemu-seabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135132" comment="qemu-sgabios-8-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135133" comment="qemu-testsuite-2.3.1-19.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135134" comment="qemu-tools-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135135" comment="qemu-vgabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135136" comment="qemu-x86-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5240</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240" source="CVE"/>
    <description>
    The DrawDashPolygon function in magick/render.c in GraphicsMagick before 1.3.24 and the SVG renderer in ImageMagick allow remote attackers to cause a denial of service (infinite loop) by converting a circularly defined SVG file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5240.html">CVE-2016-5240</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5240">SUSE bug 983309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5240">SUSE bug 983309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5240">SUSE bug 983309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5240">SUSE bug 983309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5240">SUSE bug 983309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5240">SUSE bug 983309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5240">SUSE bug 983309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5240">SUSE bug 983309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5240">SUSE bug 983309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5240">SUSE bug 983309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5240">SUSE bug 983309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5240">SUSE bug 983309</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5241</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5241" source="CVE"/>
    <description>
    magick/render.c in GraphicsMagick before 1.3.24 allows remote attackers to cause a denial of service (arithmetic exception and application crash) via a crafted svg file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5241.html">CVE-2016-5241</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5241">SUSE bug 983455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5241">SUSE bug 983455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5241">SUSE bug 983455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5241">SUSE bug 983455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5241">SUSE bug 983455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5241">SUSE bug 983455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5241">SUSE bug 983455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5241">SUSE bug 983455</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5241">SUSE bug 983455</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135197" comment="GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135198" comment="GraphicsMagick-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135199" comment="libGraphicsMagick++-Q16-11-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135200" comment="libGraphicsMagick++-devel-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135201" comment="libGraphicsMagick-Q16-3-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135202" comment="libGraphicsMagick3-config-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135203" comment="libGraphicsMagickWand-Q16-2-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135204" comment="perl-GraphicsMagick-1.3.21-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5244</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5244" source="CVE"/>
    <description>
    The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5244.html">CVE-2016-5244</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 990058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5244">SUSE bug 983213</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129149" comment="kernel-debug-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129150" comment="kernel-debug-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129151" comment="kernel-debug-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129152" comment="kernel-default-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129153" comment="kernel-default-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129154" comment="kernel-default-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129155" comment="kernel-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129156" comment="kernel-docs-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129157" comment="kernel-docs-html-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129158" comment="kernel-docs-pdf-4.1.26-21.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129159" comment="kernel-ec2-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129160" comment="kernel-ec2-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129161" comment="kernel-ec2-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129162" comment="kernel-macros-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129163" comment="kernel-obs-build-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129164" comment="kernel-obs-qa-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129165" comment="kernel-obs-qa-xen-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129166" comment="kernel-pae-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129167" comment="kernel-pae-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129168" comment="kernel-pae-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129169" comment="kernel-pv-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129170" comment="kernel-pv-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129171" comment="kernel-pv-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129172" comment="kernel-source-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129173" comment="kernel-source-vanilla-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129174" comment="kernel-syms-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129175" comment="kernel-vanilla-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129176" comment="kernel-vanilla-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129177" comment="kernel-xen-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129178" comment="kernel-xen-base-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129179" comment="kernel-xen-devel-4.1.26-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5250</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5250" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 allows remote attackers to obtain sensitive information about the previously retrieved page via Resource Timing API calls.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5250.html">CVE-2016-5250</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5250">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5250">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5250">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5250">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5250">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5250">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5250">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5250">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5250">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5250">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5250">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5250">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5250">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5250">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5250">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5250">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5250">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5251</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5251" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5251" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 allows remote attackers to spoof the location bar via crafted characters in the media type of a data: URL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5251.html">CVE-2016-5251</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5251">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5251">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5251">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5251">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5251">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5251">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5251">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5251">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5251">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5251">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5252</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5252" source="CVE"/>
    <description>
    Stack-based buffer underflow in the mozilla::gfx::BasePoint4d function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via crafted two-dimensional graphics data that is mishandled during clipping-region calculations.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5252.html">CVE-2016-5252</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5252">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5252">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5252">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5252">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5252">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5252">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5252">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5252">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5252">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5252">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133410" comment="MozillaThunderbird-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133411" comment="MozillaThunderbird-buildsymbols-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133412" comment="MozillaThunderbird-devel-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133413" comment="MozillaThunderbird-translations-common-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133414" comment="MozillaThunderbird-translations-other-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5254</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5254" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5254" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsXULPopupManager::KeyDown function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) by leveraging keyboard access to use the Alt key during selection of top-level menu items.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5254.html">CVE-2016-5254</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5254">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5254">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5254">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5254">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5254">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5254">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5254">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5254">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5254">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5254">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133410" comment="MozillaThunderbird-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133411" comment="MozillaThunderbird-buildsymbols-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133412" comment="MozillaThunderbird-devel-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133413" comment="MozillaThunderbird-translations-common-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133414" comment="MozillaThunderbird-translations-other-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5255</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5255" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5255" source="CVE"/>
    <description>
    Use-after-free vulnerability in the js::PreliminaryObjectArray::sweep function in Mozilla Firefox before 48.0 allows remote attackers to execute arbitrary code via crafted JavaScript that is mishandled during incremental garbage collection.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5255.html">CVE-2016-5255</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5255">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5255">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5255">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5255">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5255">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5255">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5255">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5255">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5255">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5255">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5256</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5256" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5256" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 49.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5256.html">CVE-2016-5256</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5256">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5256">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5256">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5256">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5256">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5256">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133578" comment="MozillaFirefox-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133579" comment="MozillaFirefox-branding-upstream-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133580" comment="MozillaFirefox-buildsymbols-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133581" comment="MozillaFirefox-devel-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133582" comment="MozillaFirefox-translations-common-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133583" comment="MozillaFirefox-translations-other-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133584" comment="libfreebl3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133585" comment="libfreebl3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133586" comment="libsoftokn3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133587" comment="libsoftokn3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133588" comment="mozilla-nss-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133589" comment="mozilla-nss-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133590" comment="mozilla-nss-certs-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133591" comment="mozilla-nss-certs-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133592" comment="mozilla-nss-devel-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133593" comment="mozilla-nss-sysinit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133594" comment="mozilla-nss-sysinit-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133595" comment="mozilla-nss-tools-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5257</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5257" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5257" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5257.html">CVE-2016-5257</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5257">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5257">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5257">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5257">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5257">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5257">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5257">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133578" comment="MozillaFirefox-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133579" comment="MozillaFirefox-branding-upstream-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133580" comment="MozillaFirefox-buildsymbols-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133581" comment="MozillaFirefox-devel-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133582" comment="MozillaFirefox-translations-common-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133583" comment="MozillaFirefox-translations-other-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133584" comment="libfreebl3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133585" comment="libfreebl3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133586" comment="libsoftokn3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133587" comment="libsoftokn3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133588" comment="mozilla-nss-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133589" comment="mozilla-nss-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133590" comment="mozilla-nss-certs-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133591" comment="mozilla-nss-certs-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133592" comment="mozilla-nss-devel-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133593" comment="mozilla-nss-sysinit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133594" comment="mozilla-nss-sysinit-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133595" comment="mozilla-nss-tools-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5258</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5258" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5258" source="CVE"/>
    <description>
    Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5258.html">CVE-2016-5258</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5258">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5258">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5258">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5258">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5258">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5258">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5258">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5258">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5258">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5258">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133410" comment="MozillaThunderbird-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133411" comment="MozillaThunderbird-buildsymbols-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133412" comment="MozillaThunderbird-devel-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133413" comment="MozillaThunderbird-translations-common-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133414" comment="MozillaThunderbird-translations-other-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5259</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5259" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5259" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via a script that closes its own Service Worker within a nested sync event loop.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5259.html">CVE-2016-5259</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5259">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5259">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5259">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5259">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5259">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5259">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5259">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5259">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5259">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5259">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133410" comment="MozillaThunderbird-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133411" comment="MozillaThunderbird-buildsymbols-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133412" comment="MozillaThunderbird-devel-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133413" comment="MozillaThunderbird-translations-common-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133414" comment="MozillaThunderbird-translations-other-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5260</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5260" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5260" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 mishandles changes from 'INPUT type="password"' to 'INPUT type="text"' within a single Session Manager session, which might allow attackers to discover cleartext passwords by reading a session restoration file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5260.html">CVE-2016-5260</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5260">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5261</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5261" source="CVE"/>
    <description>
    Integer overflow in the WebSocketChannel class in the WebSockets subsystem in Mozilla Firefox before 48.0 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted packets that trigger incorrect buffer-resize operations during buffering.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5261.html">CVE-2016-5261</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5261">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5261">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5261">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5261">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5261">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5261">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5261">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5261">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5261">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5261">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5261">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5261">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5261">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5261">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5261">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5261">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5261">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5262</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5262" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 process JavaScript event-handler attributes of a MARQUEE element within a sandboxed IFRAME element that lacks the sandbox="allow-scripts" attribute value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5262.html">CVE-2016-5262</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5262">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5262">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5262">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5262">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5262">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5262">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5262">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5262">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5262">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5262">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133410" comment="MozillaThunderbird-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133411" comment="MozillaThunderbird-buildsymbols-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133412" comment="MozillaThunderbird-devel-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133413" comment="MozillaThunderbird-translations-common-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133414" comment="MozillaThunderbird-translations-other-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5263</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5263" source="CVE"/>
    <description>
    The nsDisplayList::HitTest function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 mishandles rendering display transformation, which allows remote attackers to execute arbitrary code via a crafted web site that leverages "type confusion."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5263.html">CVE-2016-5263</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5263">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5263">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5263">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5263">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5263">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5263">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5263">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5263">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5263">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5263">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133410" comment="MozillaThunderbird-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133411" comment="MozillaThunderbird-buildsymbols-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133412" comment="MozillaThunderbird-devel-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133413" comment="MozillaThunderbird-translations-common-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133414" comment="MozillaThunderbird-translations-other-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5264</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5264" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5264" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsNodeUtils::NativeAnonymousChildListChange function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG element that is mishandled during effect application.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5264.html">CVE-2016-5264</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5264">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5264">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5264">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5264">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5264">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5264">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5264">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5264">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5264">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5264">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133410" comment="MozillaThunderbird-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133411" comment="MozillaThunderbird-buildsymbols-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133412" comment="MozillaThunderbird-devel-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133413" comment="MozillaThunderbird-translations-common-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133414" comment="MozillaThunderbird-translations-other-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5265</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5265" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow user-assisted remote attackers to bypass the Same Origin Policy, and conduct Universal XSS (UXSS) attacks or read arbitrary files, by arranging for the presence of a crafted HTML document and a crafted shortcut file in the same local directory.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5265.html">CVE-2016-5265</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5265">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5265">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5265">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5265">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5265">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5265">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5265">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5265">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5265">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5265">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133410" comment="MozillaThunderbird-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133411" comment="MozillaThunderbird-buildsymbols-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133412" comment="MozillaThunderbird-devel-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133413" comment="MozillaThunderbird-translations-common-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133414" comment="MozillaThunderbird-translations-other-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5266</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5266" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 does not properly restrict drag-and-drop (aka dataTransfer) actions for file: URIs, which allows user-assisted remote attackers to access local files via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5266.html">CVE-2016-5266</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5266">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5266">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5266">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5266">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5266">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5266">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5266">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5266">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5266">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5266">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5268</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5268" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 does not properly set the LINKABLE and URI_SAFE_FOR_UNTRUSTED_CONTENT flags of about: URLs that are used for error pages, which makes it easier for remote attackers to conduct spoofing attacks via a crafted URL, as demonstrated by misleading text after an about:neterror?d= substring.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5268.html">CVE-2016-5268</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5268">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5268">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5268">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5268">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5268">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5268">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5268">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5268">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5268">SUSE bug 991809</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5268">SUSE bug 991809</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130796" comment="MozillaFirefox-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130797" comment="MozillaFirefox-branding-upstream-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130798" comment="MozillaFirefox-buildsymbols-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130799" comment="MozillaFirefox-devel-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130800" comment="MozillaFirefox-translations-common-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130801" comment="MozillaFirefox-translations-other-48.0-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130802" comment="libfreebl3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130803" comment="libfreebl3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130804" comment="libsoftokn3-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130805" comment="libsoftokn3-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130806" comment="mozilla-nss-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130807" comment="mozilla-nss-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130808" comment="mozilla-nss-certs-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130809" comment="mozilla-nss-certs-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130810" comment="mozilla-nss-devel-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130811" comment="mozilla-nss-sysinit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130812" comment="mozilla-nss-sysinit-32bit-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130813" comment="mozilla-nss-tools-3.24-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5270</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5270" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsCaseTransformTextRunFactory::TransformString function in Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 allows remote attackers to cause a denial of service (boolean out-of-bounds write) or possibly have unspecified other impact via Unicode characters that are mishandled during text conversion.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5270.html">CVE-2016-5270</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5270">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5270">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5270">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5270">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5270">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5270">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5270">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133578" comment="MozillaFirefox-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133579" comment="MozillaFirefox-branding-upstream-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133580" comment="MozillaFirefox-buildsymbols-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133581" comment="MozillaFirefox-devel-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133582" comment="MozillaFirefox-translations-common-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133583" comment="MozillaFirefox-translations-other-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133584" comment="libfreebl3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133585" comment="libfreebl3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133586" comment="libsoftokn3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133587" comment="libsoftokn3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133588" comment="mozilla-nss-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133589" comment="mozilla-nss-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133590" comment="mozilla-nss-certs-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133591" comment="mozilla-nss-certs-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133592" comment="mozilla-nss-devel-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133593" comment="mozilla-nss-sysinit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133594" comment="mozilla-nss-sysinit-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133595" comment="mozilla-nss-tools-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5271</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5271" source="CVE"/>
    <description>
    The PropertyProvider::GetSpacingInternal function in Mozilla Firefox before 49.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via text runs in conjunction with a "display: contents" Cascading Style Sheets (CSS) property.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5271.html">CVE-2016-5271</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5271">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5271">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5271">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5271">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5271">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5271">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133578" comment="MozillaFirefox-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133579" comment="MozillaFirefox-branding-upstream-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133580" comment="MozillaFirefox-buildsymbols-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133581" comment="MozillaFirefox-devel-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133582" comment="MozillaFirefox-translations-common-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133583" comment="MozillaFirefox-translations-other-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133584" comment="libfreebl3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133585" comment="libfreebl3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133586" comment="libsoftokn3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133587" comment="libsoftokn3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133588" comment="mozilla-nss-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133589" comment="mozilla-nss-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133590" comment="mozilla-nss-certs-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133591" comment="mozilla-nss-certs-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133592" comment="mozilla-nss-devel-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133593" comment="mozilla-nss-sysinit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133594" comment="mozilla-nss-sysinit-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133595" comment="mozilla-nss-tools-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5272</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5272" source="CVE"/>
    <description>
    The nsImageGeometryMixin class in Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 does not properly perform a cast of an unspecified variable during handling of INPUT elements, which allows remote attackers to execute arbitrary code via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5272.html">CVE-2016-5272</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5272">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5272">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5272">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5272">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5272">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5272">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5272">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133578" comment="MozillaFirefox-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133579" comment="MozillaFirefox-branding-upstream-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133580" comment="MozillaFirefox-buildsymbols-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133581" comment="MozillaFirefox-devel-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133582" comment="MozillaFirefox-translations-common-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133583" comment="MozillaFirefox-translations-other-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133584" comment="libfreebl3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133585" comment="libfreebl3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133586" comment="libsoftokn3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133587" comment="libsoftokn3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133588" comment="mozilla-nss-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133589" comment="mozilla-nss-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133590" comment="mozilla-nss-certs-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133591" comment="mozilla-nss-certs-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133592" comment="mozilla-nss-devel-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133593" comment="mozilla-nss-sysinit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133594" comment="mozilla-nss-sysinit-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133595" comment="mozilla-nss-tools-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5273</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5273" source="CVE"/>
    <description>
    The mozilla::a11y::HyperTextAccessible::GetChildOffset function in the accessibility implementation in Mozilla Firefox before 49.0 allows remote attackers to execute arbitrary code via a crafted web site.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5273.html">CVE-2016-5273</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5273">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5273">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5273">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5273">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5273">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5273">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133578" comment="MozillaFirefox-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133579" comment="MozillaFirefox-branding-upstream-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133580" comment="MozillaFirefox-buildsymbols-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133581" comment="MozillaFirefox-devel-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133582" comment="MozillaFirefox-translations-common-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133583" comment="MozillaFirefox-translations-other-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133584" comment="libfreebl3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133585" comment="libfreebl3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133586" comment="libsoftokn3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133587" comment="libsoftokn3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133588" comment="mozilla-nss-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133589" comment="mozilla-nss-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133590" comment="mozilla-nss-certs-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133591" comment="mozilla-nss-certs-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133592" comment="mozilla-nss-devel-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133593" comment="mozilla-nss-sysinit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133594" comment="mozilla-nss-sysinit-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133595" comment="mozilla-nss-tools-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5274</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5274" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsFrameManager::CaptureFrameState function in Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between restyling and the Web Animations model implementation.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5274.html">CVE-2016-5274</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5274">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5274">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5274">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5274">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5274">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5274">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5274">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133578" comment="MozillaFirefox-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133579" comment="MozillaFirefox-branding-upstream-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133580" comment="MozillaFirefox-buildsymbols-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133581" comment="MozillaFirefox-devel-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133582" comment="MozillaFirefox-translations-common-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133583" comment="MozillaFirefox-translations-other-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133584" comment="libfreebl3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133585" comment="libfreebl3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133586" comment="libsoftokn3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133587" comment="libsoftokn3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133588" comment="mozilla-nss-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133589" comment="mozilla-nss-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133590" comment="mozilla-nss-certs-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133591" comment="mozilla-nss-certs-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133592" comment="mozilla-nss-devel-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133593" comment="mozilla-nss-sysinit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133594" comment="mozilla-nss-sysinit-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133595" comment="mozilla-nss-tools-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5275</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5275" source="CVE"/>
    <description>
    Buffer overflow in the mozilla::gfx::FilterSupport::ComputeSourceNeededRegions function in Mozilla Firefox before 49.0 allows remote attackers to execute arbitrary code by leveraging improper interaction between empty filters and CANVAS element rendering.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5275.html">CVE-2016-5275</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5275">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5275">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5275">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5275">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5275">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5275">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133578" comment="MozillaFirefox-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133579" comment="MozillaFirefox-branding-upstream-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133580" comment="MozillaFirefox-buildsymbols-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133581" comment="MozillaFirefox-devel-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133582" comment="MozillaFirefox-translations-common-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133583" comment="MozillaFirefox-translations-other-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133584" comment="libfreebl3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133585" comment="libfreebl3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133586" comment="libsoftokn3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133587" comment="libsoftokn3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133588" comment="mozilla-nss-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133589" comment="mozilla-nss-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133590" comment="mozilla-nss-certs-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133591" comment="mozilla-nss-certs-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133592" comment="mozilla-nss-devel-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133593" comment="mozilla-nss-sysinit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133594" comment="mozilla-nss-sysinit-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133595" comment="mozilla-nss-tools-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5276</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5276" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5276" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::a11y::DocAccessible::ProcessInvalidationList function in Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an aria-owns attribute.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5276.html">CVE-2016-5276</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5276">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5276">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5276">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5276">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5276">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5276">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5276">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133578" comment="MozillaFirefox-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133579" comment="MozillaFirefox-branding-upstream-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133580" comment="MozillaFirefox-buildsymbols-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133581" comment="MozillaFirefox-devel-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133582" comment="MozillaFirefox-translations-common-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133583" comment="MozillaFirefox-translations-other-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133584" comment="libfreebl3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133585" comment="libfreebl3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133586" comment="libsoftokn3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133587" comment="libsoftokn3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133588" comment="mozilla-nss-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133589" comment="mozilla-nss-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133590" comment="mozilla-nss-certs-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133591" comment="mozilla-nss-certs-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133592" comment="mozilla-nss-devel-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133593" comment="mozilla-nss-sysinit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133594" comment="mozilla-nss-sysinit-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133595" comment="mozilla-nss-tools-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5277</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5277" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsRefreshDriver::Tick function in Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging improper interaction between timeline destruction and the Web Animations model implementation.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5277.html">CVE-2016-5277</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5277">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5277">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5277">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5277">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5277">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5277">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5277">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133578" comment="MozillaFirefox-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133579" comment="MozillaFirefox-branding-upstream-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133580" comment="MozillaFirefox-buildsymbols-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133581" comment="MozillaFirefox-devel-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133582" comment="MozillaFirefox-translations-common-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133583" comment="MozillaFirefox-translations-other-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133584" comment="libfreebl3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133585" comment="libfreebl3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133586" comment="libsoftokn3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133587" comment="libsoftokn3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133588" comment="mozilla-nss-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133589" comment="mozilla-nss-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133590" comment="mozilla-nss-certs-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133591" comment="mozilla-nss-certs-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133592" comment="mozilla-nss-devel-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133593" comment="mozilla-nss-sysinit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133594" comment="mozilla-nss-sysinit-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133595" comment="mozilla-nss-tools-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5278</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5278" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5278" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsBMPEncoder::AddImageFrame function in Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 allows remote attackers to execute arbitrary code via a crafted image data that is mishandled during the encoding of an image frame to an image.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5278.html">CVE-2016-5278</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5278">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5278">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5278">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5278">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5278">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5278">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5278">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133578" comment="MozillaFirefox-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133579" comment="MozillaFirefox-branding-upstream-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133580" comment="MozillaFirefox-buildsymbols-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133581" comment="MozillaFirefox-devel-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133582" comment="MozillaFirefox-translations-common-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133583" comment="MozillaFirefox-translations-other-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133584" comment="libfreebl3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133585" comment="libfreebl3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133586" comment="libsoftokn3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133587" comment="libsoftokn3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133588" comment="mozilla-nss-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133589" comment="mozilla-nss-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133590" comment="mozilla-nss-certs-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133591" comment="mozilla-nss-certs-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133592" comment="mozilla-nss-devel-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133593" comment="mozilla-nss-sysinit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133594" comment="mozilla-nss-sysinit-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133595" comment="mozilla-nss-tools-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5279</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5279" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5279" source="CVE"/>
    <description>
    Mozilla Firefox before 49.0 allows user-assisted remote attackers to obtain sensitive full-pathname information during a local-file drag-and-drop operation via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5279.html">CVE-2016-5279</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5279">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5279">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5279">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5279">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5279">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5279">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133578" comment="MozillaFirefox-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133579" comment="MozillaFirefox-branding-upstream-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133580" comment="MozillaFirefox-buildsymbols-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133581" comment="MozillaFirefox-devel-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133582" comment="MozillaFirefox-translations-common-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133583" comment="MozillaFirefox-translations-other-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133584" comment="libfreebl3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133585" comment="libfreebl3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133586" comment="libsoftokn3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133587" comment="libsoftokn3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133588" comment="mozilla-nss-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133589" comment="mozilla-nss-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133590" comment="mozilla-nss-certs-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133591" comment="mozilla-nss-certs-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133592" comment="mozilla-nss-devel-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133593" comment="mozilla-nss-sysinit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133594" comment="mozilla-nss-sysinit-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133595" comment="mozilla-nss-tools-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5280</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5280" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5280" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap function in Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 allows remote attackers to execute arbitrary code via bidirectional text.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5280.html">CVE-2016-5280</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5280">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5280">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5280">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5280">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5280">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5280">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5280">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133578" comment="MozillaFirefox-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133579" comment="MozillaFirefox-branding-upstream-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133580" comment="MozillaFirefox-buildsymbols-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133581" comment="MozillaFirefox-devel-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133582" comment="MozillaFirefox-translations-common-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133583" comment="MozillaFirefox-translations-other-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133584" comment="libfreebl3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133585" comment="libfreebl3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133586" comment="libsoftokn3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133587" comment="libsoftokn3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133588" comment="mozilla-nss-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133589" comment="mozilla-nss-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133590" comment="mozilla-nss-certs-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133591" comment="mozilla-nss-certs-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133592" comment="mozilla-nss-devel-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133593" comment="mozilla-nss-sysinit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133594" comment="mozilla-nss-sysinit-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133595" comment="mozilla-nss-tools-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5281</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5281" source="CVE"/>
    <description>
    Use-after-free vulnerability in the DOMSVGLength class in Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between JavaScript code and an SVG document.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5281.html">CVE-2016-5281</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5281">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5281">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5281">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5281">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5281">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5281">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5281">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133578" comment="MozillaFirefox-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133579" comment="MozillaFirefox-branding-upstream-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133580" comment="MozillaFirefox-buildsymbols-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133581" comment="MozillaFirefox-devel-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133582" comment="MozillaFirefox-translations-common-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133583" comment="MozillaFirefox-translations-other-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133584" comment="libfreebl3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133585" comment="libfreebl3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133586" comment="libsoftokn3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133587" comment="libsoftokn3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133588" comment="mozilla-nss-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133589" comment="mozilla-nss-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133590" comment="mozilla-nss-certs-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133591" comment="mozilla-nss-certs-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133592" comment="mozilla-nss-devel-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133593" comment="mozilla-nss-sysinit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133594" comment="mozilla-nss-sysinit-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133595" comment="mozilla-nss-tools-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5282</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5282" source="CVE"/>
    <description>
    Mozilla Firefox before 49.0 does not properly restrict the scheme in favicon requests, which might allow remote attackers to obtain sensitive information via unspecified vectors, as demonstrated by a jar: URL for a favicon resource.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5282.html">CVE-2016-5282</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5282">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5282">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5282">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5282">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5282">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5282">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133578" comment="MozillaFirefox-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133579" comment="MozillaFirefox-branding-upstream-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133580" comment="MozillaFirefox-buildsymbols-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133581" comment="MozillaFirefox-devel-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133582" comment="MozillaFirefox-translations-common-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133583" comment="MozillaFirefox-translations-other-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133584" comment="libfreebl3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133585" comment="libfreebl3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133586" comment="libsoftokn3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133587" comment="libsoftokn3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133588" comment="mozilla-nss-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133589" comment="mozilla-nss-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133590" comment="mozilla-nss-certs-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133591" comment="mozilla-nss-certs-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133592" comment="mozilla-nss-devel-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133593" comment="mozilla-nss-sysinit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133594" comment="mozilla-nss-sysinit-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133595" comment="mozilla-nss-tools-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5283</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5283" source="CVE"/>
    <description>
    Mozilla Firefox before 49.0 allows remote attackers to bypass the Same Origin Policy via a crafted fragment identifier in the SRC attribute of an IFRAME element, leading to insufficient restrictions on link-color information after a document is resized.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5283.html">CVE-2016-5283</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5283">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5283">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5283">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5283">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5283">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5283">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133578" comment="MozillaFirefox-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133579" comment="MozillaFirefox-branding-upstream-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133580" comment="MozillaFirefox-buildsymbols-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133581" comment="MozillaFirefox-devel-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133582" comment="MozillaFirefox-translations-common-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133583" comment="MozillaFirefox-translations-other-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133584" comment="libfreebl3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133585" comment="libfreebl3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133586" comment="libsoftokn3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133587" comment="libsoftokn3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133588" comment="mozilla-nss-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133589" comment="mozilla-nss-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133590" comment="mozilla-nss-certs-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133591" comment="mozilla-nss-certs-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133592" comment="mozilla-nss-devel-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133593" comment="mozilla-nss-sysinit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133594" comment="mozilla-nss-sysinit-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133595" comment="mozilla-nss-tools-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5284</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5284" source="CVE"/>
    <description>
    Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5284.html">CVE-2016-5284</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5284">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5284">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5284">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5284">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5284">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5284">SUSE bug 999701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5284">SUSE bug 999701</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133578" comment="MozillaFirefox-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133579" comment="MozillaFirefox-branding-upstream-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133580" comment="MozillaFirefox-buildsymbols-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133581" comment="MozillaFirefox-devel-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133582" comment="MozillaFirefox-translations-common-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133583" comment="MozillaFirefox-translations-other-49.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133584" comment="libfreebl3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133585" comment="libfreebl3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133586" comment="libsoftokn3-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133587" comment="libsoftokn3-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133588" comment="mozilla-nss-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133589" comment="mozilla-nss-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133590" comment="mozilla-nss-certs-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133591" comment="mozilla-nss-certs-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133592" comment="mozilla-nss-devel-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133593" comment="mozilla-nss-sysinit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133594" comment="mozilla-nss-sysinit-32bit-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133595" comment="mozilla-nss-tools-3.25-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5287</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5287" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5287.html">CVE-2016-5287</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5287">SUSE bug 1006475</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5287">SUSE bug 1006475</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5287">SUSE bug 1006475</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5287">SUSE bug 1006475</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133250" comment="MozillaFirefox-49.0.2-36.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133251" comment="MozillaFirefox-branding-upstream-49.0.2-36.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133252" comment="MozillaFirefox-buildsymbols-49.0.2-36.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133253" comment="MozillaFirefox-devel-49.0.2-36.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133254" comment="MozillaFirefox-translations-common-49.0.2-36.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133255" comment="MozillaFirefox-translations-other-49.0.2-36.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5288</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5288" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5288.html">CVE-2016-5288</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5288">SUSE bug 1006476</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5288">SUSE bug 1006476</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5288">SUSE bug 1006476</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5288">SUSE bug 1006476</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133250" comment="MozillaFirefox-49.0.2-36.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133251" comment="MozillaFirefox-branding-upstream-49.0.2-36.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133252" comment="MozillaFirefox-buildsymbols-49.0.2-36.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133253" comment="MozillaFirefox-devel-49.0.2-36.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133254" comment="MozillaFirefox-translations-common-49.0.2-36.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133255" comment="MozillaFirefox-translations-other-49.0.2-36.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5289</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5289" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5289.html">CVE-2016-5289</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5289">SUSE bug 1010426</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5289">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5289">SUSE bug 1010426</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5289">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5289">SUSE bug 1010426</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5289">SUSE bug 1010426</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135684" comment="MozillaFirefox-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135685" comment="MozillaFirefox-branding-upstream-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135686" comment="MozillaFirefox-buildsymbols-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135687" comment="MozillaFirefox-devel-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135688" comment="MozillaFirefox-translations-common-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135689" comment="MozillaFirefox-translations-other-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135690" comment="libfreebl3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135691" comment="libfreebl3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135692" comment="libsoftokn3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135693" comment="libsoftokn3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135694" comment="mozilla-nss-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135695" comment="mozilla-nss-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135696" comment="mozilla-nss-certs-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135697" comment="mozilla-nss-certs-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135698" comment="mozilla-nss-devel-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135699" comment="mozilla-nss-sysinit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135700" comment="mozilla-nss-sysinit-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135701" comment="mozilla-nss-tools-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5290</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5290" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5290.html">CVE-2016-5290</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5290">SUSE bug 1010427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5290">SUSE bug 1010427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5290">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5290">SUSE bug 1010427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5290">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5290">SUSE bug 1010427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5290">SUSE bug 1010427</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135684" comment="MozillaFirefox-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135685" comment="MozillaFirefox-branding-upstream-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135686" comment="MozillaFirefox-buildsymbols-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135687" comment="MozillaFirefox-devel-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135688" comment="MozillaFirefox-translations-common-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135689" comment="MozillaFirefox-translations-other-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135690" comment="libfreebl3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135691" comment="libfreebl3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135692" comment="libsoftokn3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135693" comment="libsoftokn3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135694" comment="mozilla-nss-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135695" comment="mozilla-nss-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135696" comment="mozilla-nss-certs-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135697" comment="mozilla-nss-certs-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135698" comment="mozilla-nss-devel-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135699" comment="mozilla-nss-sysinit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135700" comment="mozilla-nss-sysinit-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135701" comment="mozilla-nss-tools-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5291</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5291" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5291.html">CVE-2016-5291</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5291">SUSE bug 1010410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5291">SUSE bug 1010410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5291">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5291">SUSE bug 1010410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5291">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5291">SUSE bug 1010410</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5291">SUSE bug 1010410</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135684" comment="MozillaFirefox-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135685" comment="MozillaFirefox-branding-upstream-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135686" comment="MozillaFirefox-buildsymbols-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135687" comment="MozillaFirefox-devel-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135688" comment="MozillaFirefox-translations-common-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135689" comment="MozillaFirefox-translations-other-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135690" comment="libfreebl3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135691" comment="libfreebl3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135692" comment="libsoftokn3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135693" comment="libsoftokn3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135694" comment="mozilla-nss-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135695" comment="mozilla-nss-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135696" comment="mozilla-nss-certs-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135697" comment="mozilla-nss-certs-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135698" comment="mozilla-nss-devel-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135699" comment="mozilla-nss-sysinit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135700" comment="mozilla-nss-sysinit-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135701" comment="mozilla-nss-tools-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5292</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5292" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5292.html">CVE-2016-5292</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5292">SUSE bug 1010399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5292">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5292">SUSE bug 1010399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5292">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5292">SUSE bug 1010399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5292">SUSE bug 1010399</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135684" comment="MozillaFirefox-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135685" comment="MozillaFirefox-branding-upstream-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135686" comment="MozillaFirefox-buildsymbols-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135687" comment="MozillaFirefox-devel-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135688" comment="MozillaFirefox-translations-common-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135689" comment="MozillaFirefox-translations-other-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135690" comment="libfreebl3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135691" comment="libfreebl3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135692" comment="libsoftokn3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135693" comment="libsoftokn3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135694" comment="mozilla-nss-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135695" comment="mozilla-nss-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135696" comment="mozilla-nss-certs-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135697" comment="mozilla-nss-certs-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135698" comment="mozilla-nss-devel-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135699" comment="mozilla-nss-sysinit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135700" comment="mozilla-nss-sysinit-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135701" comment="mozilla-nss-tools-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5296</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5296" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5296.html">CVE-2016-5296</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5296">SUSE bug 1010395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5296">SUSE bug 1010395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5296">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5296">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5296">SUSE bug 1010395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5296">SUSE bug 1010395</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135684" comment="MozillaFirefox-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135685" comment="MozillaFirefox-branding-upstream-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135686" comment="MozillaFirefox-buildsymbols-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135687" comment="MozillaFirefox-devel-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135688" comment="MozillaFirefox-translations-common-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135689" comment="MozillaFirefox-translations-other-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135690" comment="libfreebl3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135691" comment="libfreebl3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135692" comment="libsoftokn3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135693" comment="libsoftokn3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135694" comment="mozilla-nss-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135695" comment="mozilla-nss-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135696" comment="mozilla-nss-certs-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135697" comment="mozilla-nss-certs-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135698" comment="mozilla-nss-devel-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135699" comment="mozilla-nss-sysinit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135700" comment="mozilla-nss-sysinit-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135701" comment="mozilla-nss-tools-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5297</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5297" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5297.html">CVE-2016-5297</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5297">SUSE bug 1010401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5297">SUSE bug 1010401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5297">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5297">SUSE bug 1010401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5297">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5297">SUSE bug 1010401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5297">SUSE bug 1010401</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5297">SUSE bug 1010401</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135684" comment="MozillaFirefox-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135685" comment="MozillaFirefox-branding-upstream-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135686" comment="MozillaFirefox-buildsymbols-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135687" comment="MozillaFirefox-devel-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135688" comment="MozillaFirefox-translations-common-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135689" comment="MozillaFirefox-translations-other-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135690" comment="libfreebl3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135691" comment="libfreebl3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135692" comment="libsoftokn3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135693" comment="libsoftokn3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135694" comment="mozilla-nss-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135695" comment="mozilla-nss-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135696" comment="mozilla-nss-certs-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135697" comment="mozilla-nss-certs-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135698" comment="mozilla-nss-devel-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135699" comment="mozilla-nss-sysinit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135700" comment="mozilla-nss-sysinit-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135701" comment="mozilla-nss-tools-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5300</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5300" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300" source="CVE"/>
    <description>
    The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5300.html">CVE-2016-5300</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5300">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5300">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5300">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5300">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5300">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5300">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5300">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5300">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5300">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5300">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5300">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5300">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5300">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5300">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5300">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5300">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5300">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5300">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5300">SUSE bug 983216</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5300">SUSE bug 983216</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148518" comment="expat-2.1.0-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151330" comment="expat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148519" comment="libexpat-devel-2.1.0-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151331" comment="libexpat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148520" comment="libexpat-devel-32bit-2.1.0-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151785" comment="libexpat-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148521" comment="libexpat1-2.1.0-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148522" comment="libexpat1-32bit-2.1.0-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151333" comment="libexpat1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5301</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5301" source="CVE"/>
    <description>
    The parse_chunk_header function in libtorrent before 1.1.1 allows remote attackers to cause a denial of service (crash) via a crafted (1) HTTP response or possibly a (2) UPnP broadcast.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5301.html">CVE-2016-5301</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5301">SUSE bug 983228</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5301">SUSE bug 983228</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5301">SUSE bug 983228</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5301">SUSE bug 983228</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5301">SUSE bug 983228</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5301">SUSE bug 983228</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5301">SUSE bug 983228</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5301">SUSE bug 983228</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5301">SUSE bug 983228</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5301">SUSE bug 983228</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134379" comment="libtorrent-rasterbar-1.0.10-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153708" comment="libtorrent-rasterbar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134380" comment="libtorrent-rasterbar-devel-1.0.10-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153709" comment="libtorrent-rasterbar-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134381" comment="libtorrent-rasterbar-doc-1.0.10-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153710" comment="libtorrent-rasterbar-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134382" comment="libtorrent-rasterbar8-1.0.10-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153712" comment="libtorrent-rasterbar8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134383" comment="python-libtorrent-rasterbar-1.0.10-11.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153713" comment="python-libtorrent-rasterbar is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5314</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" source="CVE"/>
    <description>
    Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5314.html">CVE-2016-5314</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 987351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5314">SUSE bug 984831</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134455" comment="libtiff-devel-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134456" comment="libtiff-devel-32bit-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134457" comment="libtiff5-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134458" comment="libtiff5-32bit-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134459" comment="tiff-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5316</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" source="CVE"/>
    <description>
    Out-of-bounds read in the PixarLogCleanup function in tif_pixarlog.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application by sending a crafted TIFF image to the rgb2ycbcr tool.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5316.html">CVE-2016-5316</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5316">SUSE bug 984837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5316">SUSE bug 984837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5316">SUSE bug 984837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5316">SUSE bug 984837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5316">SUSE bug 984837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5316">SUSE bug 984837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5316">SUSE bug 984837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5316">SUSE bug 984837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5316">SUSE bug 984837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5316">SUSE bug 984837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5316">SUSE bug 984837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5316">SUSE bug 984837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5316">SUSE bug 984837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5316">SUSE bug 984837</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134455" comment="libtiff-devel-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134456" comment="libtiff-devel-32bit-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134457" comment="libtiff5-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134458" comment="libtiff5-32bit-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134459" comment="tiff-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5317</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" source="CVE"/>
    <description>
    Buffer overflow in the PixarLogDecode function in libtiff.so in the PixarLogDecode function in libtiff 4.0.6 and earlier, as used in GNOME nautilus, allows attackers to cause a denial of service attack (crash) via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5317.html">CVE-2016-5317</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5317">SUSE bug 984842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5317">SUSE bug 984842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5317">SUSE bug 984842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5317">SUSE bug 984842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5317">SUSE bug 984842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5317">SUSE bug 984842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5317">SUSE bug 984842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5317">SUSE bug 984842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5317">SUSE bug 984842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5317">SUSE bug 984842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5317">SUSE bug 984842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5317">SUSE bug 984842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5317">SUSE bug 984842</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5317">SUSE bug 984842</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134455" comment="libtiff-devel-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134456" comment="libtiff-devel-32bit-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134457" comment="libtiff5-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134458" comment="libtiff5-32bit-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134459" comment="tiff-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5320</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5320" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5320" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-5314.  Reason: This candidate is a reservation duplicate of CVE-2016-5314.  Notes: All CVE users should reference CVE-2016-5314 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5320.html">CVE-2016-5320</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 984808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 984808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 984808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 987351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 984808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 984808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 984808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 984808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 984808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 984808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 984808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 984808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 984808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 984808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 984808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 984808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 984808</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 1007284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 1007284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 1007284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 1007284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 1007284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5320">SUSE bug 1007284</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134455" comment="libtiff-devel-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134456" comment="libtiff-devel-32bit-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134457" comment="libtiff5-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134458" comment="libtiff5-32bit-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134459" comment="tiff-4.0.6-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5321</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5321" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" source="CVE"/>
    <description>
    The DumpModeDecode function in libtiff 4.0.6 and earlier allows attackers to cause a denial of service (invalid read and crash) via a crafted tiff image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5321.html">CVE-2016-5321</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5321">SUSE bug 984813</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146600" comment="libtiff-devel-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146601" comment="libtiff-devel-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146602" comment="libtiff5-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146603" comment="libtiff5-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146604" comment="tiff-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5323</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5323" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" source="CVE"/>
    <description>
    The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5323.html">CVE-2016-5323</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5323">SUSE bug 984815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5323">SUSE bug 984815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5323">SUSE bug 984815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5323">SUSE bug 984815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5323">SUSE bug 984815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5323">SUSE bug 984815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5323">SUSE bug 984815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5323">SUSE bug 984815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5323">SUSE bug 984815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5323">SUSE bug 984815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5323">SUSE bug 984815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5323">SUSE bug 984815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5323">SUSE bug 984815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5323">SUSE bug 984815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5323">SUSE bug 984815</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5323">SUSE bug 984815</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146600" comment="libtiff-devel-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146601" comment="libtiff-devel-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146602" comment="libtiff5-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146603" comment="libtiff5-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146604" comment="tiff-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5325</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5325" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5325" source="CVE"/>
    <description>
    CRLF injection vulnerability in the ServerResponse#writeHead function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the reason argument.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5325.html">CVE-2016-5325</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985202</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985201</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5325">SUSE bug 985202</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133731" comment="nodejs-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133732" comment="nodejs-devel-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133734" comment="nodejs-docs-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133735" comment="npm-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5337</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5337" source="CVE"/>
    <description>
    The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5337.html">CVE-2016-5337</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983973</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983961</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5337">SUSE bug 983961</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135119" comment="qemu-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135120" comment="qemu-arm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135121" comment="qemu-block-curl-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135122" comment="qemu-block-rbd-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135123" comment="qemu-extra-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135124" comment="qemu-guest-agent-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135125" comment="qemu-ipxe-1.0.0-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135126" comment="qemu-kvm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135127" comment="qemu-lang-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135128" comment="qemu-linux-user-2.3.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135129" comment="qemu-ppc-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135130" comment="qemu-s390-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135131" comment="qemu-seabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135132" comment="qemu-sgabios-8-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135133" comment="qemu-testsuite-2.3.1-19.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135134" comment="qemu-tools-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135135" comment="qemu-vgabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135136" comment="qemu-x86-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5338</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5338" source="CVE"/>
    <description>
    The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5338.html">CVE-2016-5338</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5338">SUSE bug 983982</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135119" comment="qemu-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135120" comment="qemu-arm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135121" comment="qemu-block-curl-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135122" comment="qemu-block-rbd-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135123" comment="qemu-extra-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135124" comment="qemu-guest-agent-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135125" comment="qemu-ipxe-1.0.0-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135126" comment="qemu-kvm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135127" comment="qemu-lang-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135128" comment="qemu-linux-user-2.3.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135129" comment="qemu-ppc-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135130" comment="qemu-s390-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135131" comment="qemu-seabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135132" comment="qemu-sgabios-8-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135133" comment="qemu-testsuite-2.3.1-19.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135134" comment="qemu-tools-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135135" comment="qemu-vgabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135136" comment="qemu-x86-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5350</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5350" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5350" source="CVE"/>
    <description>
    epan/dissectors/packet-dcerpc-spoolss.c in the SPOOLS component in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles unexpected offsets, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5350.html">CVE-2016-5350</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5350">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5350">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5350">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5350">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5350">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5350">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5350">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5350">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5350">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128990" comment="wireshark-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128991" comment="wireshark-devel-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128992" comment="wireshark-ui-gtk-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128993" comment="wireshark-ui-qt-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5351</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5351" source="CVE"/>
    <description>
    epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the lack of an EAPOL_RSN_KEY, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5351.html">CVE-2016-5351</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5351">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5351">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5351">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5351">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5351">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5351">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5351">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5351">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5351">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128990" comment="wireshark-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128991" comment="wireshark-devel-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128992" comment="wireshark-ui-gtk-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128993" comment="wireshark-ui-qt-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5353</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5353" source="CVE"/>
    <description>
    epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the reserved C/T value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5353.html">CVE-2016-5353</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5353">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5353">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5353">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5353">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5353">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5353">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5353">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5353">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5353">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128990" comment="wireshark-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128991" comment="wireshark-devel-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128992" comment="wireshark-ui-gtk-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128993" comment="wireshark-ui-qt-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5354</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5354" source="CVE"/>
    <description>
    The USB subsystem in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles class types, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5354.html">CVE-2016-5354</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5354">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5354">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5354">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5354">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5354">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5354">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5354">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5354">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5354">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128990" comment="wireshark-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128991" comment="wireshark-devel-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128992" comment="wireshark-ui-gtk-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128993" comment="wireshark-ui-qt-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5355</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5355" source="CVE"/>
    <description>
    wiretap/toshiba.c in the Toshiba file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5355.html">CVE-2016-5355</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5355">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5355">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5355">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5355">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5355">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5355">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5355">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5355">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5355">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128990" comment="wireshark-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128991" comment="wireshark-devel-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128992" comment="wireshark-ui-gtk-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128993" comment="wireshark-ui-qt-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5356</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5356" source="CVE"/>
    <description>
    wiretap/cosine.c in the CoSine file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5356.html">CVE-2016-5356</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5356">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5356">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5356">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5356">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5356">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5356">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5356">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5356">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5356">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128990" comment="wireshark-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128991" comment="wireshark-devel-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128992" comment="wireshark-ui-gtk-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128993" comment="wireshark-ui-qt-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5357</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5357" source="CVE"/>
    <description>
    wiretap/netscreen.c in the NetScreen file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5357.html">CVE-2016-5357</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5357">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5357">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5357">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5357">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5357">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5357">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5357">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5357">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5357">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128990" comment="wireshark-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128991" comment="wireshark-devel-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128992" comment="wireshark-ui-gtk-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128993" comment="wireshark-ui-qt-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5358</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5358" source="CVE"/>
    <description>
    epan/dissectors/packet-pktap.c in the Ethernet dissector in Wireshark 2.x before 2.0.4 mishandles the packet-header data type, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5358.html">CVE-2016-5358</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5358">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5358">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5358">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5358">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5358">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5358">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5358">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5358">SUSE bug 983671</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5358">SUSE bug 983671</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128990" comment="wireshark-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128991" comment="wireshark-devel-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128992" comment="wireshark-ui-gtk-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009128993" comment="wireshark-ui-qt-1.12.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5384</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5384" source="CVE"/>
    <description>
    fontconfig before 2.12.1 does not validate offsets, which allows local users to trigger arbitrary free calls and consequently conduct double free attacks and execute arbitrary code via a crafted cache file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5384.html">CVE-2016-5384</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5384">SUSE bug 992534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5384">SUSE bug 992534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5384">SUSE bug 992534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5384">SUSE bug 992534</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134365" comment="fontconfig-2.11.0-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153714" comment="fontconfig is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134366" comment="fontconfig-32bit-2.11.0-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153715" comment="fontconfig-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134367" comment="fontconfig-devel-2.11.0-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153716" comment="fontconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134368" comment="fontconfig-devel-32bit-2.11.0-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153717" comment="fontconfig-devel-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5385</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5385" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385" source="CVE"/>
    <description>
    PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP, aka an "httpoxy" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5385.html">CVE-2016-5385</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 989125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 989174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5385">SUSE bug 988486</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127401" comment="apache2-mod_php5-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127402" comment="php5-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127403" comment="php5-bcmath-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127404" comment="php5-bz2-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127405" comment="php5-calendar-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127406" comment="php5-ctype-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127407" comment="php5-curl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127408" comment="php5-dba-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127453" comment="php5-devel-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127409" comment="php5-dom-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127410" comment="php5-enchant-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127411" comment="php5-exif-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127412" comment="php5-fastcgi-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127413" comment="php5-fileinfo-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130751" comment="php5-firebird-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127414" comment="php5-fpm-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127415" comment="php5-ftp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127416" comment="php5-gd-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127417" comment="php5-gettext-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127418" comment="php5-gmp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127419" comment="php5-iconv-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130752" comment="php5-imap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127420" comment="php5-intl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127421" comment="php5-json-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127422" comment="php5-ldap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127423" comment="php5-mbstring-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127424" comment="php5-mcrypt-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130753" comment="php5-mssql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127425" comment="php5-mysql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127426" comment="php5-odbc-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127427" comment="php5-opcache-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127428" comment="php5-openssl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127429" comment="php5-pcntl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127430" comment="php5-pdo-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127431" comment="php5-pear-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127432" comment="php5-pgsql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127433" comment="php5-phar-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127434" comment="php5-posix-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127435" comment="php5-pspell-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130754" comment="php5-readline-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127436" comment="php5-shmop-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127437" comment="php5-snmp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127438" comment="php5-soap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127439" comment="php5-sockets-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127440" comment="php5-sqlite-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127441" comment="php5-suhosin-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127442" comment="php5-sysvmsg-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127443" comment="php5-sysvsem-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127444" comment="php5-sysvshm-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130755" comment="php5-tidy-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127445" comment="php5-tokenizer-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127446" comment="php5-wddx-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127447" comment="php5-xmlreader-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127448" comment="php5-xmlrpc-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127449" comment="php5-xmlwriter-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127450" comment="php5-xsl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127451" comment="php5-zip-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127452" comment="php5-zlib-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5386</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5386" source="CVE"/>
    <description>
    The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5386.html">CVE-2016-5386</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5386">SUSE bug 988484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5386">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5386">SUSE bug 988487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5386">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5386">SUSE bug 988489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5386">SUSE bug 988491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5386">SUSE bug 988492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5386">SUSE bug 988487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5386">SUSE bug 988487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5386">SUSE bug 989125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5386">SUSE bug 989174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5386">SUSE bug 988487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5386">SUSE bug 988487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5386">SUSE bug 988487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5386">SUSE bug 988487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5386">SUSE bug 988487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5386">SUSE bug 988487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5386">SUSE bug 988484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5386">SUSE bug 988487</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134022" comment="go-1.6.2-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153190" comment="go is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134023" comment="go-doc-1.6.2-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153191" comment="go-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5387</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387" source="CVE"/>
    <description>
    The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.  NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5387.html">CVE-2016-5387</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 989125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 989174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 989684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 989684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 989684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 989684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5387">SUSE bug 989684</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130467" comment="apache2-2.4.16-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130468" comment="apache2-devel-2.4.16-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130469" comment="apache2-doc-2.4.16-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130470" comment="apache2-event-2.4.16-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130471" comment="apache2-example-pages-2.4.16-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133268" comment="apache2-mod_fcgid-2.3.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153550" comment="apache2-mod_fcgid is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130472" comment="apache2-prefork-2.4.16-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130473" comment="apache2-utils-2.4.16-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130474" comment="apache2-worker-2.4.16-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5388</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5388" source="CVE"/>
    <description>
    Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5388.html">CVE-2016-5388</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5388">SUSE bug 988484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5388">SUSE bug 988486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5388">SUSE bug 988487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5388">SUSE bug 988488</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5388">SUSE bug 988489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5388">SUSE bug 988491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5388">SUSE bug 988492</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5388">SUSE bug 988489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5388">SUSE bug 988489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5388">SUSE bug 988489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5388">SUSE bug 989125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5388">SUSE bug 989174</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5388">SUSE bug 988489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5388">SUSE bug 988489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5388">SUSE bug 988489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5388">SUSE bug 988484</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5388">SUSE bug 988489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5388">SUSE bug 988489</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5388">SUSE bug 988489</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134314" comment="tomcat-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134315" comment="tomcat-admin-webapps-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134316" comment="tomcat-docs-webapp-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134317" comment="tomcat-el-3_0-api-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134318" comment="tomcat-embed-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134319" comment="tomcat-javadoc-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134320" comment="tomcat-jsp-2_3-api-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134321" comment="tomcat-jsvc-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134322" comment="tomcat-lib-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134323" comment="tomcat-servlet-3_1-api-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152853" comment="tomcat-servlet-3_1-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134324" comment="tomcat-webapps-8.0.32-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5399</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5399" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5399" source="CVE"/>
    <description>
    The bzread function in ext/bz2/bz2.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted bz2 archive.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5399.html">CVE-2016-5399</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5399">SUSE bug 991430</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5399">SUSE bug 991430</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5399">SUSE bug 991430</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5399">SUSE bug 991430</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5399">SUSE bug 991430</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5399">SUSE bug 991430</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5399">SUSE bug 991430</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5399">SUSE bug 991430</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5399">SUSE bug 991430</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5399">SUSE bug 991430</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5399">SUSE bug 991430</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5399">SUSE bug 991430</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5399">SUSE bug 991430</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5399">SUSE bug 991430</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5399">SUSE bug 991430</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5399">SUSE bug 991430</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5399">SUSE bug 991430</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5399">SUSE bug 991430</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5403</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5403" source="CVE"/>
    <description>
    The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5403.html">CVE-2016-5403</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5403">SUSE bug 990923</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5403">SUSE bug 990923</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5403">SUSE bug 991080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5403">SUSE bug 990923</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5403">SUSE bug 991080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5403">SUSE bug 991080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5403">SUSE bug 990923</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5403">SUSE bug 990923</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5403">SUSE bug 991080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5403">SUSE bug 990923</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5403">SUSE bug 990923</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5403">SUSE bug 990923</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5403">SUSE bug 991080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5403">SUSE bug 991080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5403">SUSE bug 990923</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5403">SUSE bug 991080</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5403">SUSE bug 990923</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5403">SUSE bug 991080</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135119" comment="qemu-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135120" comment="qemu-arm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135121" comment="qemu-block-curl-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135122" comment="qemu-block-rbd-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135123" comment="qemu-extra-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135124" comment="qemu-guest-agent-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135125" comment="qemu-ipxe-1.0.0-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135126" comment="qemu-kvm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135127" comment="qemu-lang-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135128" comment="qemu-linux-user-2.3.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135129" comment="qemu-ppc-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135130" comment="qemu-s390-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135131" comment="qemu-seabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135132" comment="qemu-sgabios-8-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135133" comment="qemu-testsuite-2.3.1-19.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135134" comment="qemu-tools-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135135" comment="qemu-vgabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135136" comment="qemu-x86-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5407</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5407" source="CVE"/>
    <description>
    The (1) XvQueryAdaptors and (2) XvQueryEncodings functions in X.org libXv before 1.0.11 allow remote X servers to trigger out-of-bounds memory access operations via vectors involving length specifications in received data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5407.html">CVE-2016-5407</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5407">SUSE bug 1003017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5407">SUSE bug 1003017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5407">SUSE bug 1003017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5407">SUSE bug 1003017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5407">SUSE bug 1003017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5407">SUSE bug 1003017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5407">SUSE bug 1003017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5407">SUSE bug 1003017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5407">SUSE bug 1003017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5407">SUSE bug 1003017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5407">SUSE bug 1003017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5407">SUSE bug 1003017</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135050" comment="libX11-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153718" comment="libX11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135051" comment="libX11-6-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135052" comment="libX11-6-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151818" comment="libX11-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135053" comment="libX11-data-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135054" comment="libX11-devel-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151820" comment="libX11-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135055" comment="libX11-devel-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153719" comment="libX11-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135056" comment="libX11-xcb1-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135057" comment="libX11-xcb1-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151822" comment="libX11-xcb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135058" comment="libXfixes-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153720" comment="libXfixes is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135059" comment="libXfixes-devel-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151826" comment="libXfixes-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135060" comment="libXfixes-devel-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153721" comment="libXfixes-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135061" comment="libXfixes3-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151827" comment="libXfixes3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135062" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151828" comment="libXfixes3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135063" comment="libXi-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153722" comment="libXi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135064" comment="libXi-devel-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151829" comment="libXi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135065" comment="libXi-devel-32bit-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153723" comment="libXi-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135066" comment="libXi6-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151830" comment="libXi6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135067" comment="libXi6-32bit-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151831" comment="libXi6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135068" comment="libXrandr-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153724" comment="libXrandr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135069" comment="libXrandr-devel-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151835" comment="libXrandr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135070" comment="libXrandr-devel-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153725" comment="libXrandr-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135071" comment="libXrandr2-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151836" comment="libXrandr2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135072" comment="libXrandr2-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151837" comment="libXrandr2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135073" comment="libXrender-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153726" comment="libXrender is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135074" comment="libXrender-devel-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151838" comment="libXrender-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135075" comment="libXrender-devel-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153727" comment="libXrender-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135076" comment="libXrender1-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151839" comment="libXrender1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135077" comment="libXrender1-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151840" comment="libXrender1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135078" comment="libXtst-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153728" comment="libXtst is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135079" comment="libXtst-devel-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151864" comment="libXtst-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135080" comment="libXtst-devel-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153729" comment="libXtst-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135081" comment="libXtst6-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151865" comment="libXtst6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135082" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153730" comment="libXtst6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135083" comment="libXv-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153731" comment="libXv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135084" comment="libXv-devel-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151843" comment="libXv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135085" comment="libXv-devel-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153732" comment="libXv-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135086" comment="libXv1-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151844" comment="libXv1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135087" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151845" comment="libXv1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135088" comment="libXvMC-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153733" comment="libXvMC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135089" comment="libXvMC-devel-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151846" comment="libXvMC-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135090" comment="libXvMC-devel-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153734" comment="libXvMC-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135091" comment="libXvMC1-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151847" comment="libXvMC1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135092" comment="libXvMC1-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153735" comment="libXvMC1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5418</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5418" source="CVE"/>
    <description>
    The sandboxing code in libarchive 3.2.0 and earlier mishandles hardlink archive entries of non-zero data size, which might allow remote attackers to write to arbitrary files via a crafted archive file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5418.html">CVE-2016-5418</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5418">SUSE bug 998677</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5418">SUSE bug 998677</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5418">SUSE bug 998677</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136448" comment="bsdtar-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136449" comment="libarchive-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136450" comment="libarchive-devel-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136451" comment="libarchive13-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136452" comment="libarchive13-32bit-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5419</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419" source="CVE"/>
    <description>
    curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5419.html">CVE-2016-5419</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5419">SUSE bug 991389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5419">SUSE bug 991389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5419">SUSE bug 991389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5419">SUSE bug 991389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5419">SUSE bug 991389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5419">SUSE bug 991389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5419">SUSE bug 991389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5419">SUSE bug 991389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5419">SUSE bug 991389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5419">SUSE bug 991389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5419">SUSE bug 991389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5419">SUSE bug 1033413</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5419">SUSE bug 1033442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5419">SUSE bug 1033413</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5419">SUSE bug 991389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5419">SUSE bug 991389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5419">SUSE bug 991389</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5419">SUSE bug 991389</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134604" comment="curl-7.37.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134605" comment="libcurl-devel-7.37.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134606" comment="libcurl-devel-32bit-7.37.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134607" comment="libcurl4-7.37.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134608" comment="libcurl4-32bit-7.37.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5420</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420" source="CVE"/>
    <description>
    curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5420.html">CVE-2016-5420</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5420">SUSE bug 991390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5420">SUSE bug 991390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5420">SUSE bug 991390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5420">SUSE bug 991390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5420">SUSE bug 991390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5420">SUSE bug 991390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5420">SUSE bug 997420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5420">SUSE bug 991390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5420">SUSE bug 991390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5420">SUSE bug 991390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5420">SUSE bug 991390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5420">SUSE bug 991390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5420">SUSE bug 991390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5420">SUSE bug 991390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5420">SUSE bug 991390</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134604" comment="curl-7.37.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134605" comment="libcurl-devel-7.37.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134606" comment="libcurl-devel-32bit-7.37.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134607" comment="libcurl4-7.37.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134608" comment="libcurl4-32bit-7.37.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5421</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421" source="CVE"/>
    <description>
    Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5421.html">CVE-2016-5421</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5421">SUSE bug 991391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5421">SUSE bug 991391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5421">SUSE bug 991391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5421">SUSE bug 991391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5421">SUSE bug 991391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5421">SUSE bug 991391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5421">SUSE bug 1017590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5421">SUSE bug 1017590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5421">SUSE bug 1017590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5421">SUSE bug 1017590</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134604" comment="curl-7.37.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134605" comment="libcurl-devel-7.37.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134606" comment="libcurl-devel-32bit-7.37.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134607" comment="libcurl4-7.37.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134608" comment="libcurl4-32bit-7.37.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5423</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423" source="CVE"/>
    <description>
    PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 allow remote authenticated users to cause a denial of service (NULL pointer dereference and server crash), obtain sensitive memory information, or possibly execute arbitrary code via (1) a CASE expression within the test value subexpression of another CASE or (2) inlining of an SQL function that implements the equality operator used for a CASE expression involving values of different types.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5423.html">CVE-2016-5423</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 993454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 993454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 993454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 1042497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 1042497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 1042497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 1042497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 1042497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 1041981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 1041981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 1042497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 1042497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 1042497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 1052683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 993454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 1052683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 993454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 1052683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 1052683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 1052683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 1052683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 1052683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 1052683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5423">SUSE bug 1052683</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134743" comment="libecpg6-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134744" comment="libecpg6-32bit-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151070" comment="libecpg6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134745" comment="libpq5-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134746" comment="libpq5-32bit-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154355" comment="postgresql93-9.3.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151074" comment="postgresql93 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154356" comment="postgresql93-contrib-9.3.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151075" comment="postgresql93-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154357" comment="postgresql93-devel-9.3.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151076" comment="postgresql93-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154358" comment="postgresql93-docs-9.3.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151077" comment="postgresql93-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154359" comment="postgresql93-libs-9.3.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151078" comment="postgresql93-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154360" comment="postgresql93-plperl-9.3.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151079" comment="postgresql93-plperl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154361" comment="postgresql93-plpython-9.3.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151080" comment="postgresql93-plpython is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154362" comment="postgresql93-pltcl-9.3.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151081" comment="postgresql93-pltcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154363" comment="postgresql93-server-9.3.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151082" comment="postgresql93-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154364" comment="postgresql93-test-9.3.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151083" comment="postgresql93-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134747" comment="postgresql94-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134748" comment="postgresql94-contrib-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134749" comment="postgresql94-devel-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134750" comment="postgresql94-docs-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134751" comment="postgresql94-libs-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151088" comment="postgresql94-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134752" comment="postgresql94-plperl-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151089" comment="postgresql94-plperl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134753" comment="postgresql94-plpython-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151090" comment="postgresql94-plpython is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134754" comment="postgresql94-pltcl-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151091" comment="postgresql94-pltcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134755" comment="postgresql94-server-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134756" comment="postgresql94-test-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151093" comment="postgresql94-test is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5424</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424" source="CVE"/>
    <description>
    PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 might allow remote authenticated users with the CREATEDB or CREATEROLE role to gain superuser privileges via a (1) " (double quote), (2) \ (backslash), (3) carriage return, or (4) newline character in a (a) database or (b) role name that is mishandled during an administrative operation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5424.html">CVE-2016-5424</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 993453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 993453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 993453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 993453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1041981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1041981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1041981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1041981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1042497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1042497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1041981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1041981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1042497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1041981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1042497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1042497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1041981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1041981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1041981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1041981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1042497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1042497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1041981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1042497</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1052683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1052683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1052683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1041981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1052683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1052683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1052683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1052683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1052683</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1041981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5424">SUSE bug 1052683</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134743" comment="libecpg6-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134744" comment="libecpg6-32bit-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151070" comment="libecpg6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134745" comment="libpq5-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134746" comment="libpq5-32bit-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154355" comment="postgresql93-9.3.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151074" comment="postgresql93 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154356" comment="postgresql93-contrib-9.3.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151075" comment="postgresql93-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154357" comment="postgresql93-devel-9.3.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151076" comment="postgresql93-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154358" comment="postgresql93-docs-9.3.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151077" comment="postgresql93-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154359" comment="postgresql93-libs-9.3.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151078" comment="postgresql93-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154360" comment="postgresql93-plperl-9.3.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151079" comment="postgresql93-plperl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154361" comment="postgresql93-plpython-9.3.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151080" comment="postgresql93-plpython is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154362" comment="postgresql93-pltcl-9.3.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151081" comment="postgresql93-pltcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154363" comment="postgresql93-server-9.3.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151082" comment="postgresql93-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154364" comment="postgresql93-test-9.3.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151083" comment="postgresql93-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134747" comment="postgresql94-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151084" comment="postgresql94 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134748" comment="postgresql94-contrib-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151085" comment="postgresql94-contrib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134749" comment="postgresql94-devel-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151086" comment="postgresql94-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134750" comment="postgresql94-docs-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151087" comment="postgresql94-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134751" comment="postgresql94-libs-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151088" comment="postgresql94-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134752" comment="postgresql94-plperl-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151089" comment="postgresql94-plperl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134753" comment="postgresql94-plpython-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151090" comment="postgresql94-plpython is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134754" comment="postgresql94-pltcl-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151091" comment="postgresql94-pltcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134755" comment="postgresql94-server-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151092" comment="postgresql94-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134756" comment="postgresql94-test-9.4.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151093" comment="postgresql94-test is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5426</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5426" source="CVE"/>
    <description>
    PowerDNS (aka pdns) Authoritative Server before 3.4.10 allows remote attackers to cause a denial of service (backend CPU consumption) via a long qname.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5426.html">CVE-2016-5426</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5426">SUSE bug 998159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5426">SUSE bug 998159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5426">SUSE bug 998159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5426">SUSE bug 998159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5426">SUSE bug 998159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5426">SUSE bug 998159</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133521" comment="pdns-3.4.6-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152980" comment="pdns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133522" comment="pdns-backend-ldap-3.4.6-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152981" comment="pdns-backend-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133523" comment="pdns-backend-lua-3.4.6-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152982" comment="pdns-backend-lua is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133524" comment="pdns-backend-mydns-3.4.6-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152983" comment="pdns-backend-mydns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133525" comment="pdns-backend-mysql-3.4.6-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152984" comment="pdns-backend-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133526" comment="pdns-backend-postgresql-3.4.6-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152985" comment="pdns-backend-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133527" comment="pdns-backend-sqlite3-3.4.6-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152986" comment="pdns-backend-sqlite3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5427</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427" source="CVE"/>
    <description>
    PowerDNS (aka pdns) Authoritative Server before 3.4.10 does not properly handle a . (dot) inside labels, which allows remote attackers to cause a denial of service (backend CPU consumption) via a crafted DNS query.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5427.html">CVE-2016-5427</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5427">SUSE bug 998159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5427">SUSE bug 998159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5427">SUSE bug 998159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5427">SUSE bug 998159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5427">SUSE bug 998159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5427">SUSE bug 998159</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133521" comment="pdns-3.4.6-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152980" comment="pdns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133522" comment="pdns-backend-ldap-3.4.6-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152981" comment="pdns-backend-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133523" comment="pdns-backend-lua-3.4.6-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152982" comment="pdns-backend-lua is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133524" comment="pdns-backend-mydns-3.4.6-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152983" comment="pdns-backend-mydns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133525" comment="pdns-backend-mysql-3.4.6-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152984" comment="pdns-backend-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133526" comment="pdns-backend-postgresql-3.4.6-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152985" comment="pdns-backend-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133527" comment="pdns-backend-sqlite3-3.4.6-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152986" comment="pdns-backend-sqlite3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5439</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5439" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote administrators to affect availability via vectors related to Server: Privileges.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5439.html">CVE-2016-5439</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5439">SUSE bug 989925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5439">SUSE bug 989925</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5439">SUSE bug 989925</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5440</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote administrators to affect availability via vectors related to Server: RBR.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5440.html">CVE-2016-5440</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5440">SUSE bug 989926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5440">SUSE bug 989926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5440">SUSE bug 991616</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5440">SUSE bug 989926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5440">SUSE bug 989926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5440">SUSE bug 989926</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5440">SUSE bug 989926</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134352" comment="libmysqlclient-devel-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134353" comment="libmysqlclient18-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134354" comment="libmysqlclient18-32bit-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134355" comment="libmysqlclient_r18-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134356" comment="libmysqlclient_r18-32bit-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134357" comment="libmysqld-devel-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134358" comment="libmysqld18-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134359" comment="mariadb-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134360" comment="mariadb-bench-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134361" comment="mariadb-client-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134362" comment="mariadb-errormessages-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134363" comment="mariadb-test-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134364" comment="mariadb-tools-10.0.26-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5483</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5483" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2017-3600.  Reason: This candidate is a reservation duplicate of CVE-2017-3600.  Notes: All CVE users should reference CVE-2017-3600 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5483.html">CVE-2016-5483</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5483">SUSE bug 1029014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5483">SUSE bug 1029014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5483">SUSE bug 1029014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5483">SUSE bug 1029014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5483">SUSE bug 1029014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5483">SUSE bug 1029014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5483">SUSE bug 1029014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5483">SUSE bug 1029014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5483">SUSE bug 1029014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5483">SUSE bug 1029014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5483">SUSE bug 1029014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5483">SUSE bug 1029014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5483">SUSE bug 1029014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5483">SUSE bug 1029014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5483">SUSE bug 1029014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5483">SUSE bug 1034850</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155228" comment="libmysql56client18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155229" comment="libmysql56client18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155230" comment="libmysql56client_r18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155231" comment="libmysql56client_r18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155232" comment="mysql-community-server-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155233" comment="mysql-community-server-bench-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155234" comment="mysql-community-server-client-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155235" comment="mysql-community-server-errormessages-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155236" comment="mysql-community-server-test-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155237" comment="mysql-community-server-tools-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5507</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5507" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.32 and earlier and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5507.html">CVE-2016-5507</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5507">SUSE bug 1005557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5507">SUSE bug 1005557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5507">SUSE bug 1005557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5507">SUSE bug 1005557</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5542</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect integrity via vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5542.html">CVE-2016-5542</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5542">SUSE bug 1005522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5542">SUSE bug 1005522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5542">SUSE bug 1005522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5542">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5542">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5542">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5542">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5542">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5542">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5542">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5542">SUSE bug 1005522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5542">SUSE bug 1005522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5542">SUSE bug 1005522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5542">SUSE bug 1005522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5542">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5542">SUSE bug 1005522</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5542">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5542">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5542">SUSE bug 1009280</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142435" comment="java-1_7_0-openjdk-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142436" comment="java-1_7_0-openjdk-accessibility-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142437" comment="java-1_7_0-openjdk-bootstrap-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142438" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142439" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142440" comment="java-1_7_0-openjdk-demo-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142441" comment="java-1_7_0-openjdk-devel-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142442" comment="java-1_7_0-openjdk-headless-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142443" comment="java-1_7_0-openjdk-javadoc-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142444" comment="java-1_7_0-openjdk-src-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136361" comment="java-1_8_0-openjdk-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136362" comment="java-1_8_0-openjdk-accessibility-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136363" comment="java-1_8_0-openjdk-demo-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136364" comment="java-1_8_0-openjdk-devel-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136365" comment="java-1_8_0-openjdk-headless-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136366" comment="java-1_8_0-openjdk-javadoc-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136367" comment="java-1_8_0-openjdk-src-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5545</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5545" source="CVE"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: GUI). Supported versions that are affected are VirtualBox prior to 5.0.32 and prior to 5.1.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS v3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5545.html">CVE-2016-5545</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5545">SUSE bug 1020856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5545">SUSE bug 1020856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5545">SUSE bug 1020856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5545">SUSE bug 1020856</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147955" comment="python-virtualbox-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153266" comment="python-virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147956" comment="virtualbox-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147957" comment="virtualbox-devel-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147958" comment="virtualbox-guest-desktop-icons-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147959" comment="virtualbox-guest-kmp-default-5.0.32_k4.1.36_44-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147960" comment="virtualbox-guest-tools-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147961" comment="virtualbox-guest-x11-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147962" comment="virtualbox-host-kmp-default-5.0.32_k4.1.36_44-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147963" comment="virtualbox-host-source-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147964" comment="virtualbox-qt-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147965" comment="virtualbox-websrv-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5546</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Integrity impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5546.html">CVE-2016-5546</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5546">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5546">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5546">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5546">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5546">SUSE bug 1020905</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148627" comment="java-1_7_0-openjdk-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148628" comment="java-1_7_0-openjdk-accessibility-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148629" comment="java-1_7_0-openjdk-bootstrap-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148630" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148631" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148632" comment="java-1_7_0-openjdk-demo-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148633" comment="java-1_7_0-openjdk-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148634" comment="java-1_7_0-openjdk-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148635" comment="java-1_7_0-openjdk-javadoc-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148636" comment="java-1_7_0-openjdk-src-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148079" comment="java-1_8_0-openjdk-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148080" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148081" comment="java-1_8_0-openjdk-demo-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148082" comment="java-1_8_0-openjdk-devel-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148083" comment="java-1_8_0-openjdk-headless-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148084" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148085" comment="java-1_8_0-openjdk-src-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5547</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.3 (Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5547.html">CVE-2016-5547</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5547">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5547">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5547">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5547">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5547">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5547">SUSE bug 1024218</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148627" comment="java-1_7_0-openjdk-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148628" comment="java-1_7_0-openjdk-accessibility-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148629" comment="java-1_7_0-openjdk-bootstrap-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148630" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148631" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148632" comment="java-1_7_0-openjdk-demo-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148633" comment="java-1_7_0-openjdk-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148634" comment="java-1_7_0-openjdk-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148635" comment="java-1_7_0-openjdk-javadoc-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148636" comment="java-1_7_0-openjdk-src-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148079" comment="java-1_8_0-openjdk-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148080" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148081" comment="java-1_8_0-openjdk-demo-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148082" comment="java-1_8_0-openjdk-devel-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148083" comment="java-1_8_0-openjdk-headless-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148084" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148085" comment="java-1_8_0-openjdk-src-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5548</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5548.html">CVE-2016-5548</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5548">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5548">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5548">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5548">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5548">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5548">SUSE bug 1024218</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148627" comment="java-1_7_0-openjdk-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148628" comment="java-1_7_0-openjdk-accessibility-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148629" comment="java-1_7_0-openjdk-bootstrap-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148630" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148631" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148632" comment="java-1_7_0-openjdk-demo-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148633" comment="java-1_7_0-openjdk-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148634" comment="java-1_7_0-openjdk-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148635" comment="java-1_7_0-openjdk-javadoc-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148636" comment="java-1_7_0-openjdk-src-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148079" comment="java-1_8_0-openjdk-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148080" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148081" comment="java-1_8_0-openjdk-demo-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148082" comment="java-1_8_0-openjdk-devel-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148083" comment="java-1_8_0-openjdk-headless-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148084" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148085" comment="java-1_8_0-openjdk-src-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5549</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5549" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5549.html">CVE-2016-5549</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5549">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5549">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5549">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5549">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5549">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5549">SUSE bug 1024218</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148627" comment="java-1_7_0-openjdk-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148628" comment="java-1_7_0-openjdk-accessibility-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148629" comment="java-1_7_0-openjdk-bootstrap-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148630" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148631" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148632" comment="java-1_7_0-openjdk-demo-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148633" comment="java-1_7_0-openjdk-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148634" comment="java-1_7_0-openjdk-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148635" comment="java-1_7_0-openjdk-javadoc-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148636" comment="java-1_7_0-openjdk-src-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148079" comment="java-1_8_0-openjdk-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148080" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148081" comment="java-1_8_0-openjdk-demo-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148082" comment="java-1_8_0-openjdk-devel-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148083" comment="java-1_8_0-openjdk-headless-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148084" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148085" comment="java-1_8_0-openjdk-src-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5552</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.3 (Integrity impacts).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5552.html">CVE-2016-5552</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5552">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5552">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5552">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5552">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5552">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5552">SUSE bug 1024218</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148627" comment="java-1_7_0-openjdk-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148628" comment="java-1_7_0-openjdk-accessibility-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148629" comment="java-1_7_0-openjdk-bootstrap-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148630" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148631" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148632" comment="java-1_7_0-openjdk-demo-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148633" comment="java-1_7_0-openjdk-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148634" comment="java-1_7_0-openjdk-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148635" comment="java-1_7_0-openjdk-javadoc-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148636" comment="java-1_7_0-openjdk-src-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148079" comment="java-1_8_0-openjdk-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148080" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148081" comment="java-1_8_0-openjdk-demo-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148082" comment="java-1_8_0-openjdk-devel-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148083" comment="java-1_8_0-openjdk-headless-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148084" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148085" comment="java-1_8_0-openjdk-src-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5554</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect integrity via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5554.html">CVE-2016-5554</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5554">SUSE bug 1005523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5554">SUSE bug 1005523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5554">SUSE bug 1005523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5554">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5554">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5554">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5554">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5554">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5554">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5554">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5554">SUSE bug 1005523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5554">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5554">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5554">SUSE bug 1005523</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5554">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5554">SUSE bug 1009280</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142435" comment="java-1_7_0-openjdk-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142436" comment="java-1_7_0-openjdk-accessibility-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142437" comment="java-1_7_0-openjdk-bootstrap-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142438" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142439" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142440" comment="java-1_7_0-openjdk-demo-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142441" comment="java-1_7_0-openjdk-devel-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142442" comment="java-1_7_0-openjdk-headless-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142443" comment="java-1_7_0-openjdk-javadoc-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142444" comment="java-1_7_0-openjdk-src-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136361" comment="java-1_8_0-openjdk-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136362" comment="java-1_8_0-openjdk-accessibility-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136363" comment="java-1_8_0-openjdk-demo-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136364" comment="java-1_8_0-openjdk-devel-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136365" comment="java-1_8_0-openjdk-headless-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136366" comment="java-1_8_0-openjdk-javadoc-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136367" comment="java-1_8_0-openjdk-src-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5556</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5556" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, and 8u102 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to 2D.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5556.html">CVE-2016-5556</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1005524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1005524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1005524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1005524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1005524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1016265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1016289</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1016265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1016265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1005524</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1016265</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5556">SUSE bug 1009280</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142435" comment="java-1_7_0-openjdk-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142436" comment="java-1_7_0-openjdk-accessibility-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142437" comment="java-1_7_0-openjdk-bootstrap-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142438" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142439" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142440" comment="java-1_7_0-openjdk-demo-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142441" comment="java-1_7_0-openjdk-devel-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142442" comment="java-1_7_0-openjdk-headless-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142443" comment="java-1_7_0-openjdk-javadoc-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142444" comment="java-1_7_0-openjdk-src-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136361" comment="java-1_8_0-openjdk-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136362" comment="java-1_8_0-openjdk-accessibility-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136363" comment="java-1_8_0-openjdk-demo-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136364" comment="java-1_8_0-openjdk-devel-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136365" comment="java-1_8_0-openjdk-headless-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136366" comment="java-1_8_0-openjdk-javadoc-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136367" comment="java-1_8_0-openjdk-src-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5568</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5568" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, and 8u102 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5568.html">CVE-2016-5568</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5568">SUSE bug 1005525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5568">SUSE bug 1005525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5568">SUSE bug 1005525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5568">SUSE bug 1005525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5568">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5568">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5568">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5568">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5568">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5568">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5568">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5568">SUSE bug 1005525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5568">SUSE bug 1005525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5568">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5568">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5568">SUSE bug 1005525</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5568">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5568">SUSE bug 1009280</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142435" comment="java-1_7_0-openjdk-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142436" comment="java-1_7_0-openjdk-accessibility-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142437" comment="java-1_7_0-openjdk-bootstrap-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142438" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142439" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142440" comment="java-1_7_0-openjdk-demo-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142441" comment="java-1_7_0-openjdk-devel-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142442" comment="java-1_7_0-openjdk-headless-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142443" comment="java-1_7_0-openjdk-javadoc-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142444" comment="java-1_7_0-openjdk-src-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136361" comment="java-1_8_0-openjdk-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136362" comment="java-1_8_0-openjdk-accessibility-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136363" comment="java-1_8_0-openjdk-demo-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136364" comment="java-1_8_0-openjdk-devel-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136365" comment="java-1_8_0-openjdk-headless-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136366" comment="java-1_8_0-openjdk-javadoc-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136367" comment="java-1_8_0-openjdk-src-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5573</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot, a different vulnerability than CVE-2016-5582.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5573.html">CVE-2016-5573</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5573">SUSE bug 1005526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5573">SUSE bug 1005526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5573">SUSE bug 1005526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5573">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5573">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5573">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5573">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5573">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5573">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5573">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5573">SUSE bug 1005526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5573">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5573">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5573">SUSE bug 1005526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5573">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5573">SUSE bug 1009280</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142435" comment="java-1_7_0-openjdk-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142436" comment="java-1_7_0-openjdk-accessibility-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142437" comment="java-1_7_0-openjdk-bootstrap-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142438" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142439" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142440" comment="java-1_7_0-openjdk-demo-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142441" comment="java-1_7_0-openjdk-devel-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142442" comment="java-1_7_0-openjdk-headless-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142443" comment="java-1_7_0-openjdk-javadoc-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142444" comment="java-1_7_0-openjdk-src-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136361" comment="java-1_8_0-openjdk-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136362" comment="java-1_8_0-openjdk-accessibility-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136363" comment="java-1_8_0-openjdk-demo-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136364" comment="java-1_8_0-openjdk-devel-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136365" comment="java-1_8_0-openjdk-headless-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136366" comment="java-1_8_0-openjdk-javadoc-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136367" comment="java-1_8_0-openjdk-src-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5582</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot, a different vulnerability than CVE-2016-5573.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5582.html">CVE-2016-5582</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5582">SUSE bug 1005527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5582">SUSE bug 1005527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5582">SUSE bug 1005527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5582">SUSE bug 1005527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5582">SUSE bug 1005527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5582">SUSE bug 1005527</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142435" comment="java-1_7_0-openjdk-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142436" comment="java-1_7_0-openjdk-accessibility-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142437" comment="java-1_7_0-openjdk-bootstrap-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142438" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142439" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142440" comment="java-1_7_0-openjdk-demo-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142441" comment="java-1_7_0-openjdk-devel-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142442" comment="java-1_7_0-openjdk-headless-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142443" comment="java-1_7_0-openjdk-javadoc-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142444" comment="java-1_7_0-openjdk-src-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136361" comment="java-1_8_0-openjdk-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136362" comment="java-1_8_0-openjdk-accessibility-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136363" comment="java-1_8_0-openjdk-demo-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136364" comment="java-1_8_0-openjdk-devel-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136365" comment="java-1_8_0-openjdk-headless-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136366" comment="java-1_8_0-openjdk-javadoc-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136367" comment="java-1_8_0-openjdk-src-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5584</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.52 and earlier, 5.6.33 and earlier, and 5.7.15 and earlier allows remote administrators to affect confidentiality via vectors related to Server: Security: Encryption.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5584.html">CVE-2016-5584</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5584">SUSE bug 1005558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5584">SUSE bug 1005558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5584">SUSE bug 1005558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5584">SUSE bug 1005558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5584">SUSE bug 1005558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5584">SUSE bug 1005558</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5584">SUSE bug 1008318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5584">SUSE bug 1005558</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136615" comment="libmysqlclient-devel-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136616" comment="libmysqlclient18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136617" comment="libmysqlclient18-32bit-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136618" comment="libmysqlclient_r18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136619" comment="libmysqlclient_r18-32bit-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136620" comment="libmysqld-devel-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136621" comment="libmysqld18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136622" comment="mariadb-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136623" comment="mariadb-bench-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136624" comment="mariadb-client-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136625" comment="mariadb-errormessages-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136626" comment="mariadb-test-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136627" comment="mariadb-tools-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5597</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality via vectors related to Networking.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5597.html">CVE-2016-5597</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5597">SUSE bug 1005528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5597">SUSE bug 1005528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5597">SUSE bug 1005528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5597">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5597">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5597">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5597">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5597">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5597">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5597">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5597">SUSE bug 1005528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5597">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5597">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5597">SUSE bug 1005528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5597">SUSE bug 1009280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5597">SUSE bug 1009280</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142435" comment="java-1_7_0-openjdk-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142436" comment="java-1_7_0-openjdk-accessibility-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142437" comment="java-1_7_0-openjdk-bootstrap-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142438" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142439" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142440" comment="java-1_7_0-openjdk-demo-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142441" comment="java-1_7_0-openjdk-devel-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142442" comment="java-1_7_0-openjdk-headless-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142443" comment="java-1_7_0-openjdk-javadoc-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142444" comment="java-1_7_0-openjdk-src-1.7.0.121-37.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136361" comment="java-1_8_0-openjdk-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136362" comment="java-1_8_0-openjdk-accessibility-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136363" comment="java-1_8_0-openjdk-demo-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136364" comment="java-1_8_0-openjdk-devel-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136365" comment="java-1_8_0-openjdk-headless-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136366" comment="java-1_8_0-openjdk-javadoc-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136367" comment="java-1_8_0-openjdk-src-1.8.0.111-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5609</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5609" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.31 and earlier and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5609.html">CVE-2016-5609</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5609">SUSE bug 1005560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5609">SUSE bug 1005560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5609">SUSE bug 1005560</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5609">SUSE bug 1005560</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5612</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5612" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5612.html">CVE-2016-5612</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5612">SUSE bug 1005561</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5612">SUSE bug 1005561</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5612">SUSE bug 1005561</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5612">SUSE bug 1005561</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5616</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5616" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-6663. Reason:  This candidate is a reservation duplicate of CVE-2016-6663.  Notes: All CVE users should reference CVE-2016-6663 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5616.html">CVE-2016-5616</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5616">SUSE bug 1005562</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5616">SUSE bug 1005562</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5616">SUSE bug 1005562</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5616">SUSE bug 1005562</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5616">SUSE bug 1008318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5616">SUSE bug 1005562</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5616">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5616">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5616">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5616">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5616">SUSE bug 998309</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136615" comment="libmysqlclient-devel-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136616" comment="libmysqlclient18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136617" comment="libmysqlclient18-32bit-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136618" comment="libmysqlclient_r18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136619" comment="libmysqlclient_r18-32bit-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136620" comment="libmysqld-devel-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136621" comment="libmysqld18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136622" comment="mariadb-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136623" comment="mariadb-bench-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136624" comment="mariadb-client-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136625" comment="mariadb-errormessages-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136626" comment="mariadb-test-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136627" comment="mariadb-tools-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5617</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5617" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-6664.  Reason: This candidate is a reservation duplicate of CVE-2016-6664.  Notes: All CVE users should reference CVE-2016-6664 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5617.html">CVE-2016-5617</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5617">SUSE bug 1005563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5617">SUSE bug 1005563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5617">SUSE bug 1005563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5617">SUSE bug 1005563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5617">SUSE bug 1008253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5617">SUSE bug 1005563</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5617">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5617">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5617">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5617">SUSE bug 998309</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5624</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5624.html">CVE-2016-5624</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5624">SUSE bug 1005564</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5624">SUSE bug 1005564</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5624">SUSE bug 1008318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5624">SUSE bug 1005564</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5624">SUSE bug 1005564</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136615" comment="libmysqlclient-devel-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136616" comment="libmysqlclient18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136617" comment="libmysqlclient18-32bit-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136618" comment="libmysqlclient_r18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136619" comment="libmysqlclient_r18-32bit-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136620" comment="libmysqld-devel-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136621" comment="libmysqld18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136622" comment="mariadb-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136623" comment="mariadb-bench-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136624" comment="mariadb-client-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136625" comment="mariadb-errormessages-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136626" comment="mariadb-test-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136627" comment="mariadb-tools-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5626</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to GIS.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5626.html">CVE-2016-5626</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5626">SUSE bug 1005566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5626">SUSE bug 1005566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5626">SUSE bug 1005566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5626">SUSE bug 1008318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5626">SUSE bug 1005566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5626">SUSE bug 1005566</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136615" comment="libmysqlclient-devel-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136616" comment="libmysqlclient18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136617" comment="libmysqlclient18-32bit-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136618" comment="libmysqlclient_r18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136619" comment="libmysqlclient_r18-32bit-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136620" comment="libmysqld-devel-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136621" comment="libmysqld18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136622" comment="mariadb-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136623" comment="mariadb-bench-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136624" comment="mariadb-client-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136625" comment="mariadb-errormessages-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136626" comment="mariadb-test-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136627" comment="mariadb-tools-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5627</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5627" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.31 and earlier and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to Server: InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5627.html">CVE-2016-5627</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5627">SUSE bug 1005567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5627">SUSE bug 1005567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5627">SUSE bug 1005567</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5629</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: Federated.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5629.html">CVE-2016-5629</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5629">SUSE bug 1005569</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5629">SUSE bug 1005569</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5629">SUSE bug 1005569</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5629">SUSE bug 1008318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5629">SUSE bug 1005569</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5629">SUSE bug 1005569</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136615" comment="libmysqlclient-devel-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136616" comment="libmysqlclient18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136617" comment="libmysqlclient18-32bit-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136618" comment="libmysqlclient_r18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136619" comment="libmysqlclient_r18-32bit-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136620" comment="libmysqld-devel-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136621" comment="libmysqld18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136622" comment="mariadb-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136623" comment="mariadb-bench-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136624" comment="mariadb-client-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136625" comment="mariadb-errormessages-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136626" comment="mariadb-test-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136627" comment="mariadb-tools-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5630</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5630" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.31 and earlier and 5.7.13 and earlier allows remote administrators to affect availability via vectors related to Server: InnoDB.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5630.html">CVE-2016-5630</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5630">SUSE bug 1005570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5630">SUSE bug 1005570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5630">SUSE bug 1005570</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5636</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636" source="CVE"/>
    <description>
    Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5636.html">CVE-2016-5636</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 985177</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 1065451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 1065451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 1065451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 1065451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 1065451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 1065451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5636">SUSE bug 1065451</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130675" comment="libpython2_7-1_0-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130676" comment="libpython2_7-1_0-32bit-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134104" comment="libpython3_4m1_0-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151646" comment="libpython3_4m1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134105" comment="libpython3_4m1_0-32bit-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152170" comment="libpython3_4m1_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130677" comment="python-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130678" comment="python-32bit-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153290" comment="python-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130679" comment="python-base-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130680" comment="python-base-32bit-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153291" comment="python-base-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130681" comment="python-curses-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130682" comment="python-demo-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153292" comment="python-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130683" comment="python-devel-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130684" comment="python-doc-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153293" comment="python-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130685" comment="python-doc-pdf-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153294" comment="python-doc-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130686" comment="python-gdbm-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130687" comment="python-idle-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153295" comment="python-idle is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130688" comment="python-tk-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153296" comment="python-tk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130689" comment="python-xml-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134106" comment="python3-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134107" comment="python3-32bit-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134108" comment="python3-base-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134109" comment="python3-base-32bit-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134110" comment="python3-curses-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134111" comment="python3-dbm-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134112" comment="python3-devel-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134113" comment="python3-doc-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134114" comment="python3-doc-pdf-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152175" comment="python3-doc-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134115" comment="python3-idle-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134116" comment="python3-testsuite-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134117" comment="python3-tk-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134118" comment="python3-tools-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5652</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" source="CVE"/>
    <description>
    An exploitable heap-based buffer overflow exists in the handling of TIFF images in LibTIFF's TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5652.html">CVE-2016-5652</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5652">SUSE bug 1007280</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146600" comment="libtiff-devel-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146601" comment="libtiff-devel-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146602" comment="libtiff5-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146603" comment="libtiff5-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146604" comment="tiff-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5687</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5687" source="CVE"/>
    <description>
    The VerticalFilter function in the DDS coder in ImageMagick before 6.9.4-3 and 7.x before 7.0.1-4 allows remote attackers to have unspecified impact via a crafted DDS file, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5687.html">CVE-2016-5687</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5687">SUSE bug 985448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5687">SUSE bug 985448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5687">SUSE bug 985448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5687">SUSE bug 985448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5687">SUSE bug 985448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5687">SUSE bug 985448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5687">SUSE bug 985448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5687">SUSE bug 985448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5687">SUSE bug 985448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5687">SUSE bug 985448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5687">SUSE bug 1000713</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5687">SUSE bug 1000714</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5687">SUSE bug 1074610</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5688</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5688" source="CVE"/>
    <description>
    The WPG parser in ImageMagick before 6.9.4-4 and 7.x before 7.0.1-5, when a memory limit is set, allows remote attackers to have unspecified impact via vectors related to the SetImageExtent return-value check, which trigger (1) a heap-based buffer overflow in the SetPixelIndex function or an invalid write operation in the (2) ScaleCharToQuantum or (3) SetPixelIndex functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5688.html">CVE-2016-5688</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5688">SUSE bug 985442</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5689</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5689" source="CVE"/>
    <description>
    The DCM reader in ImageMagick before 6.9.4-5 and 7.x before 7.0.1-7 allows remote attackers to have unspecified impact by leveraging lack of NULL pointer checks.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5689.html">CVE-2016-5689</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5689">SUSE bug 985460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5689">SUSE bug 985460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5689">SUSE bug 985460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5689">SUSE bug 985460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5689">SUSE bug 985460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5689">SUSE bug 985460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5689">SUSE bug 985460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5689">SUSE bug 985460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5689">SUSE bug 985460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5689">SUSE bug 985460</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5690</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5690" source="CVE"/>
    <description>
    The ReadDCMImage function in DCM reader in ImageMagick before 6.9.4-5 and 7.x before 7.0.1-7 allows remote attackers to have unspecified impact via vectors involving the for statement in computing the pixel scaling table.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5690.html">CVE-2016-5690</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5690">SUSE bug 985451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5690">SUSE bug 985451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5690">SUSE bug 985451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5690">SUSE bug 985451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5690">SUSE bug 985451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5690">SUSE bug 985460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5690">SUSE bug 985451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5690">SUSE bug 985451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5690">SUSE bug 985451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5690">SUSE bug 985451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5690">SUSE bug 985451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5690">SUSE bug 985451</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5691</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5691" source="CVE"/>
    <description>
    The DCM reader in ImageMagick before 6.9.4-5 and 7.x before 7.0.1-7 allows remote attackers to have unspecified impact by leveraging lack of validation of (1) pixel.red, (2) pixel.green, and (3) pixel.blue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5691.html">CVE-2016-5691</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5691">SUSE bug 985456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5691">SUSE bug 985456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5691">SUSE bug 985456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5691">SUSE bug 985456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5691">SUSE bug 985456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5691">SUSE bug 985460</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5691">SUSE bug 985456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5691">SUSE bug 985456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5691">SUSE bug 985456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5691">SUSE bug 985456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5691">SUSE bug 985456</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5691">SUSE bug 985456</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5696</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696" source="CVE"/>
    <description>
    net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5696.html">CVE-2016-5696</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 994167</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5696">SUSE bug 989152</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134384" comment="drbd-8.4.6-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134385" comment="drbd-kmp-default-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134386" comment="drbd-kmp-pv-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134387" comment="drbd-kmp-xen-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134388" comment="hdjmod-1.28-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134389" comment="hdjmod-kmp-default-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134390" comment="hdjmod-kmp-pae-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134391" comment="hdjmod-kmp-pv-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134392" comment="hdjmod-kmp-xen-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134393" comment="ipset-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134394" comment="ipset-devel-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134395" comment="ipset-kmp-default-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134396" comment="ipset-kmp-pae-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134397" comment="ipset-kmp-pv-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134398" comment="ipset-kmp-xen-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134399" comment="kernel-debug-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134400" comment="kernel-debug-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134401" comment="kernel-debug-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134402" comment="kernel-default-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134403" comment="kernel-default-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134404" comment="kernel-default-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134405" comment="kernel-devel-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134406" comment="kernel-docs-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134407" comment="kernel-docs-html-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134408" comment="kernel-docs-pdf-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134409" comment="kernel-ec2-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134410" comment="kernel-ec2-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134411" comment="kernel-ec2-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134412" comment="kernel-macros-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134413" comment="kernel-obs-build-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134414" comment="kernel-obs-qa-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134415" comment="kernel-obs-qa-xen-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134416" comment="kernel-pae-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134417" comment="kernel-pae-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134418" comment="kernel-pae-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134419" comment="kernel-pv-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134420" comment="kernel-pv-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134421" comment="kernel-pv-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134422" comment="kernel-source-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134423" comment="kernel-source-vanilla-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134424" comment="kernel-syms-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134425" comment="kernel-vanilla-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134426" comment="kernel-vanilla-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134427" comment="kernel-xen-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134428" comment="kernel-xen-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134429" comment="kernel-xen-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134430" comment="libipset3-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134431" comment="lttng-modules-2.7.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134432" comment="lttng-modules-kmp-default-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134433" comment="lttng-modules-kmp-pv-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134434" comment="pcfclock-0.44-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134435" comment="pcfclock-kmp-default-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134436" comment="pcfclock-kmp-pae-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134437" comment="pcfclock-kmp-pv-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134438" comment="vhba-kmp-20140928-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134439" comment="vhba-kmp-default-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134440" comment="vhba-kmp-pae-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134441" comment="vhba-kmp-pv-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134442" comment="vhba-kmp-xen-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5699</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699" source="CVE"/>
    <description>
    CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5699.html">CVE-2016-5699</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 986630</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5699">SUSE bug 985348</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130675" comment="libpython2_7-1_0-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130676" comment="libpython2_7-1_0-32bit-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134104" comment="libpython3_4m1_0-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151646" comment="libpython3_4m1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134105" comment="libpython3_4m1_0-32bit-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152170" comment="libpython3_4m1_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130677" comment="python-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130678" comment="python-32bit-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153290" comment="python-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130679" comment="python-base-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130680" comment="python-base-32bit-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153291" comment="python-base-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130681" comment="python-curses-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130682" comment="python-demo-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153292" comment="python-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130683" comment="python-devel-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130684" comment="python-doc-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153293" comment="python-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130685" comment="python-doc-pdf-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153294" comment="python-doc-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130686" comment="python-gdbm-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130687" comment="python-idle-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153295" comment="python-idle is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130688" comment="python-tk-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153296" comment="python-tk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130689" comment="python-xml-2.7.12-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134106" comment="python3-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134107" comment="python3-32bit-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134108" comment="python3-base-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134109" comment="python3-base-32bit-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134110" comment="python3-curses-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134111" comment="python3-dbm-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134112" comment="python3-devel-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134113" comment="python3-doc-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134114" comment="python3-doc-pdf-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152175" comment="python3-doc-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134115" comment="python3-idle-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134116" comment="python3-testsuite-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134117" comment="python3-tk-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134118" comment="python3-tools-3.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5701</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5701" source="CVE"/>
    <description>
    setup/frames/index.inc.php in phpMyAdmin 4.0.10.x before 4.0.10.16, 4.4.15.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to conduct BBCode injection attacks against HTTP sessions via a crafted URI.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5701.html">CVE-2016-5701</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5701">SUSE bug 986154</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129367" comment="phpMyAdmin-4.4.15.7-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5703</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5703" source="CVE"/>
    <description>
    SQL injection vulnerability in libraries/central_columns.lib.php in phpMyAdmin 4.4.x before 4.4.15.7 and 4.6.x before 4.6.3 allows remote attackers to execute arbitrary SQL commands via a crafted database name that is mishandled in a central column query.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5703.html">CVE-2016-5703</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5703">SUSE bug 986154</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129367" comment="phpMyAdmin-4.4.15.7-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5705</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5705" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.4.x before 4.4.15.7 and 4.6.x before 4.6.3 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) server-privileges certificate data fields on the user privileges page, (2) an "invalid JSON" error message in the error console, (3) a database name in the central columns implementation, (4) a group name, or (5) a search name in the bookmarks implementation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5705.html">CVE-2016-5705</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5705">SUSE bug 986154</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129367" comment="phpMyAdmin-4.4.15.7-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5706</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5706" source="CVE"/>
    <description>
    js/get_scripts.js.php in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to cause a denial of service via a large array in the scripts parameter.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5706.html">CVE-2016-5706</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5706">SUSE bug 986154</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129367" comment="phpMyAdmin-4.4.15.7-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5730</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5730" source="CVE"/>
    <description>
    phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to obtain sensitive information via vectors involving (1) an array value to FormDisplay.php, (2) incorrect data to validate.php, (3) unexpected data to Validator.php, (4) a missing config directory during setup, or (5) an incorrect OpenID identifier data type, which reveals the full path in an error message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5730.html">CVE-2016-5730</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5730">SUSE bug 986154</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129367" comment="phpMyAdmin-4.4.15.7-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5731</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5731" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in examples/openid.php in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to inject arbitrary web script or HTML via vectors involving an OpenID error message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5731.html">CVE-2016-5731</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5731">SUSE bug 986154</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129367" comment="phpMyAdmin-4.4.15.7-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5733</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5733" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) a crafted table name that is mishandled during privilege checking in table_row.phtml, (2) a crafted mysqld log_bin directive that is mishandled in log_selector.phtml, (3) the Transformation implementation, (4) AJAX error handling in js/ajax.js, (5) the Designer implementation, (6) the charts implementation in js/tbl_chart.js, or (7) the zoom-search implementation in rows_zoom.phtml.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5733.html">CVE-2016-5733</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5733">SUSE bug 986154</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129367" comment="phpMyAdmin-4.4.15.7-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5739</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5739" source="CVE"/>
    <description>
    The Transformation implementation in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not use the no-referrer Content Security Policy (CSP) protection mechanism, which makes it easier for remote attackers to conduct CSRF attacks by reading an authentication token in a Referer header, related to libraries/Header.php.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5739.html">CVE-2016-5739</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5739">SUSE bug 986154</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009129367" comment="phpMyAdmin-4.4.15.7-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5746</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5746" source="CVE"/>
    <description>
    libstorage, libstorage-ng, and yast-storage improperly store passphrases for encrypted storage devices in a temporary file on disk, which might allow local users to obtain sensitive information by reading the file, as demonstrated by /tmp/libstorage-XXXXXX/pwdf.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5746.html">CVE-2016-5746</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 984245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5746">SUSE bug 986971</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134325" comment="libstorage-2.25.35.1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153736" comment="libstorage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134326" comment="libstorage-devel-2.25.35.1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153737" comment="libstorage-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134327" comment="libstorage-python-2.25.35.1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153738" comment="libstorage-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134328" comment="libstorage-ruby-2.25.35.1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153739" comment="libstorage-ruby is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134329" comment="libstorage-testsuite-2.25.35.1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153740" comment="libstorage-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134330" comment="libstorage6-2.25.35.1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153741" comment="libstorage6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134331" comment="yast2-storage-3.1.71-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153742" comment="yast2-storage is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134332" comment="yast2-storage-devel-3.1.71-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153743" comment="yast2-storage-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5759</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5759" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5759" source="CVE"/>
    <description>
    The mkdumprd script called "dracut" in the current working directory "." allows local users to trick the administrator into executing code as root.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5759.html">CVE-2016-5759</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5759">SUSE bug 990200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5759">SUSE bug 990200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5759">SUSE bug 990200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5759">SUSE bug 990200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5759">SUSE bug 990200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5759">SUSE bug 990200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5759">SUSE bug 990200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5759">SUSE bug 990200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5759">SUSE bug 990200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5759">SUSE bug 990200</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5759">SUSE bug 990200</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135093" comment="kdump-0.8.15-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153744" comment="kdump is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5766</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766" source="CVE"/>
    <description>
    Integer overflow in the _gd2GetHeader function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5766.html">CVE-2016-5766</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5766">SUSE bug 986386</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127401" comment="apache2-mod_php5-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127402" comment="php5-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127403" comment="php5-bcmath-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127404" comment="php5-bz2-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127405" comment="php5-calendar-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127406" comment="php5-ctype-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127407" comment="php5-curl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127408" comment="php5-dba-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127453" comment="php5-devel-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127409" comment="php5-dom-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127410" comment="php5-enchant-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127411" comment="php5-exif-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127412" comment="php5-fastcgi-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127413" comment="php5-fileinfo-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130751" comment="php5-firebird-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127414" comment="php5-fpm-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127415" comment="php5-ftp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127416" comment="php5-gd-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127417" comment="php5-gettext-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127418" comment="php5-gmp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127419" comment="php5-iconv-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130752" comment="php5-imap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127420" comment="php5-intl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127421" comment="php5-json-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127422" comment="php5-ldap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127423" comment="php5-mbstring-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127424" comment="php5-mcrypt-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130753" comment="php5-mssql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127425" comment="php5-mysql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127426" comment="php5-odbc-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127427" comment="php5-opcache-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127428" comment="php5-openssl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127429" comment="php5-pcntl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127430" comment="php5-pdo-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127431" comment="php5-pear-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127432" comment="php5-pgsql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127433" comment="php5-phar-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127434" comment="php5-posix-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127435" comment="php5-pspell-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130754" comment="php5-readline-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127436" comment="php5-shmop-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127437" comment="php5-snmp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127438" comment="php5-soap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127439" comment="php5-sockets-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127440" comment="php5-sqlite-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127441" comment="php5-suhosin-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127442" comment="php5-sysvmsg-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127443" comment="php5-sysvsem-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127444" comment="php5-sysvshm-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130755" comment="php5-tidy-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127445" comment="php5-tokenizer-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127446" comment="php5-wddx-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127447" comment="php5-xmlreader-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127448" comment="php5-xmlrpc-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127449" comment="php5-xmlwriter-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127450" comment="php5-xsl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127451" comment="php5-zip-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127452" comment="php5-zlib-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5767</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767" source="CVE"/>
    <description>
    Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted image dimensions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5767.html">CVE-2016-5767</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5767">SUSE bug 986393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5767">SUSE bug 986393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5767">SUSE bug 986393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5767">SUSE bug 986393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5767">SUSE bug 986393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5767">SUSE bug 986393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5767">SUSE bug 986393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5767">SUSE bug 986393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5767">SUSE bug 986393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5767">SUSE bug 986393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5767">SUSE bug 986393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5767">SUSE bug 986393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5767">SUSE bug 986393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5767">SUSE bug 986393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5767">SUSE bug 986393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5767">SUSE bug 986393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5767">SUSE bug 986393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5767">SUSE bug 986393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5767">SUSE bug 986393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127401" comment="apache2-mod_php5-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127402" comment="php5-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127403" comment="php5-bcmath-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127404" comment="php5-bz2-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127405" comment="php5-calendar-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127406" comment="php5-ctype-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127407" comment="php5-curl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127408" comment="php5-dba-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127453" comment="php5-devel-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127409" comment="php5-dom-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127410" comment="php5-enchant-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127411" comment="php5-exif-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127412" comment="php5-fastcgi-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127413" comment="php5-fileinfo-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130751" comment="php5-firebird-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127414" comment="php5-fpm-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127415" comment="php5-ftp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127416" comment="php5-gd-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127417" comment="php5-gettext-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127418" comment="php5-gmp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127419" comment="php5-iconv-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130752" comment="php5-imap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127420" comment="php5-intl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127421" comment="php5-json-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127422" comment="php5-ldap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127423" comment="php5-mbstring-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127424" comment="php5-mcrypt-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130753" comment="php5-mssql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127425" comment="php5-mysql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127426" comment="php5-odbc-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127427" comment="php5-opcache-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127428" comment="php5-openssl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127429" comment="php5-pcntl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127430" comment="php5-pdo-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127431" comment="php5-pear-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127432" comment="php5-pgsql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127433" comment="php5-phar-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127434" comment="php5-posix-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127435" comment="php5-pspell-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130754" comment="php5-readline-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127436" comment="php5-shmop-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127437" comment="php5-snmp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127438" comment="php5-soap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127439" comment="php5-sockets-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127440" comment="php5-sqlite-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127441" comment="php5-suhosin-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127442" comment="php5-sysvmsg-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127443" comment="php5-sysvsem-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127444" comment="php5-sysvshm-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130755" comment="php5-tidy-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127445" comment="php5-tokenizer-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127446" comment="php5-wddx-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127447" comment="php5-xmlreader-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127448" comment="php5-xmlrpc-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127449" comment="php5-xmlwriter-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127450" comment="php5-xsl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127451" comment="php5-zip-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127452" comment="php5-zlib-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5768</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768" source="CVE"/>
    <description>
    Double free vulnerability in the _php_mb_regex_ereg_replace_exec function in php_mbregex.c in the mbstring extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by leveraging a callback exception.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5768.html">CVE-2016-5768</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5768">SUSE bug 986246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5768">SUSE bug 986246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5768">SUSE bug 986246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5768">SUSE bug 986246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5768">SUSE bug 986246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5768">SUSE bug 986246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5768">SUSE bug 986246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5768">SUSE bug 986246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5768">SUSE bug 986246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5768">SUSE bug 986246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5768">SUSE bug 986246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5768">SUSE bug 986246</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5768">SUSE bug 986246</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127401" comment="apache2-mod_php5-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127402" comment="php5-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127403" comment="php5-bcmath-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127404" comment="php5-bz2-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127405" comment="php5-calendar-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127406" comment="php5-ctype-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127407" comment="php5-curl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127408" comment="php5-dba-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127453" comment="php5-devel-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127409" comment="php5-dom-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127410" comment="php5-enchant-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127411" comment="php5-exif-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127412" comment="php5-fastcgi-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127413" comment="php5-fileinfo-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130751" comment="php5-firebird-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127414" comment="php5-fpm-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127415" comment="php5-ftp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127416" comment="php5-gd-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127417" comment="php5-gettext-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127418" comment="php5-gmp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127419" comment="php5-iconv-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130752" comment="php5-imap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127420" comment="php5-intl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127421" comment="php5-json-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127422" comment="php5-ldap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127423" comment="php5-mbstring-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127424" comment="php5-mcrypt-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130753" comment="php5-mssql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127425" comment="php5-mysql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127426" comment="php5-odbc-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127427" comment="php5-opcache-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127428" comment="php5-openssl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127429" comment="php5-pcntl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127430" comment="php5-pdo-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127431" comment="php5-pear-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127432" comment="php5-pgsql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127433" comment="php5-phar-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127434" comment="php5-posix-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127435" comment="php5-pspell-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130754" comment="php5-readline-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127436" comment="php5-shmop-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127437" comment="php5-snmp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127438" comment="php5-soap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127439" comment="php5-sockets-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127440" comment="php5-sqlite-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127441" comment="php5-suhosin-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127442" comment="php5-sysvmsg-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127443" comment="php5-sysvsem-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127444" comment="php5-sysvshm-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130755" comment="php5-tidy-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127445" comment="php5-tokenizer-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127446" comment="php5-wddx-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127447" comment="php5-xmlreader-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127448" comment="php5-xmlrpc-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127449" comment="php5-xmlwriter-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127450" comment="php5-xsl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127451" comment="php5-zip-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127452" comment="php5-zlib-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5769</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769" source="CVE"/>
    <description>
    Multiple integer overflows in mcrypt.c in the mcrypt extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allow remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted length value, related to the (1) mcrypt_generic and (2) mdecrypt_generic functions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5769.html">CVE-2016-5769</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5769">SUSE bug 986388</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127401" comment="apache2-mod_php5-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127402" comment="php5-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127403" comment="php5-bcmath-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127404" comment="php5-bz2-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127405" comment="php5-calendar-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127406" comment="php5-ctype-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127407" comment="php5-curl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127408" comment="php5-dba-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127453" comment="php5-devel-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127409" comment="php5-dom-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127410" comment="php5-enchant-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127411" comment="php5-exif-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127412" comment="php5-fastcgi-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127413" comment="php5-fileinfo-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130751" comment="php5-firebird-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127414" comment="php5-fpm-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127415" comment="php5-ftp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127416" comment="php5-gd-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127417" comment="php5-gettext-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127418" comment="php5-gmp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127419" comment="php5-iconv-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130752" comment="php5-imap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127420" comment="php5-intl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127421" comment="php5-json-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127422" comment="php5-ldap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127423" comment="php5-mbstring-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127424" comment="php5-mcrypt-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130753" comment="php5-mssql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127425" comment="php5-mysql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127426" comment="php5-odbc-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127427" comment="php5-opcache-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127428" comment="php5-openssl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127429" comment="php5-pcntl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127430" comment="php5-pdo-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127431" comment="php5-pear-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127432" comment="php5-pgsql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127433" comment="php5-phar-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127434" comment="php5-posix-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127435" comment="php5-pspell-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130754" comment="php5-readline-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127436" comment="php5-shmop-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127437" comment="php5-snmp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127438" comment="php5-soap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127439" comment="php5-sockets-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127440" comment="php5-sqlite-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127441" comment="php5-suhosin-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127442" comment="php5-sysvmsg-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127443" comment="php5-sysvsem-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127444" comment="php5-sysvshm-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130755" comment="php5-tidy-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127445" comment="php5-tokenizer-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127446" comment="php5-wddx-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127447" comment="php5-xmlreader-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127448" comment="php5-xmlrpc-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127449" comment="php5-xmlwriter-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127450" comment="php5-xsl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127451" comment="php5-zip-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127452" comment="php5-zlib-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5770</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5770" source="CVE"/>
    <description>
    Integer overflow in the SplFileObject::fread function in spl_directory.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer argument, a related issue to CVE-2016-5096.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5770.html">CVE-2016-5770</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5770">SUSE bug 986392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5770">SUSE bug 986392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5770">SUSE bug 986392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5770">SUSE bug 986392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5770">SUSE bug 986392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5770">SUSE bug 986392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5770">SUSE bug 986392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5770">SUSE bug 986392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5770">SUSE bug 986392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5770">SUSE bug 986392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5770">SUSE bug 986392</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5770">SUSE bug 986392</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127401" comment="apache2-mod_php5-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127402" comment="php5-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127403" comment="php5-bcmath-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127404" comment="php5-bz2-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127405" comment="php5-calendar-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127406" comment="php5-ctype-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127407" comment="php5-curl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127408" comment="php5-dba-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127453" comment="php5-devel-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127409" comment="php5-dom-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127410" comment="php5-enchant-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127411" comment="php5-exif-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127412" comment="php5-fastcgi-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127413" comment="php5-fileinfo-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130751" comment="php5-firebird-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127414" comment="php5-fpm-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127415" comment="php5-ftp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127416" comment="php5-gd-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127417" comment="php5-gettext-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127418" comment="php5-gmp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127419" comment="php5-iconv-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130752" comment="php5-imap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127420" comment="php5-intl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127421" comment="php5-json-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127422" comment="php5-ldap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127423" comment="php5-mbstring-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127424" comment="php5-mcrypt-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130753" comment="php5-mssql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127425" comment="php5-mysql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127426" comment="php5-odbc-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127427" comment="php5-opcache-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127428" comment="php5-openssl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127429" comment="php5-pcntl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127430" comment="php5-pdo-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127431" comment="php5-pear-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127432" comment="php5-pgsql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127433" comment="php5-phar-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127434" comment="php5-posix-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127435" comment="php5-pspell-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130754" comment="php5-readline-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127436" comment="php5-shmop-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127437" comment="php5-snmp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127438" comment="php5-soap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127439" comment="php5-sockets-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127440" comment="php5-sqlite-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127441" comment="php5-suhosin-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127442" comment="php5-sysvmsg-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127443" comment="php5-sysvsem-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127444" comment="php5-sysvshm-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130755" comment="php5-tidy-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127445" comment="php5-tokenizer-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127446" comment="php5-wddx-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127447" comment="php5-xmlreader-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127448" comment="php5-xmlrpc-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127449" comment="php5-xmlwriter-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127450" comment="php5-xsl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127451" comment="php5-zip-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127452" comment="php5-zlib-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5771</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771" source="CVE"/>
    <description>
    spl_array.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5771.html">CVE-2016-5771</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5771">SUSE bug 986391</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127401" comment="apache2-mod_php5-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127402" comment="php5-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127403" comment="php5-bcmath-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127404" comment="php5-bz2-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127405" comment="php5-calendar-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127406" comment="php5-ctype-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127407" comment="php5-curl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127408" comment="php5-dba-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127453" comment="php5-devel-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127409" comment="php5-dom-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127410" comment="php5-enchant-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127411" comment="php5-exif-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127412" comment="php5-fastcgi-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127413" comment="php5-fileinfo-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130751" comment="php5-firebird-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127414" comment="php5-fpm-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127415" comment="php5-ftp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127416" comment="php5-gd-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127417" comment="php5-gettext-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127418" comment="php5-gmp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127419" comment="php5-iconv-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130752" comment="php5-imap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127420" comment="php5-intl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127421" comment="php5-json-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127422" comment="php5-ldap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127423" comment="php5-mbstring-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127424" comment="php5-mcrypt-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130753" comment="php5-mssql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127425" comment="php5-mysql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127426" comment="php5-odbc-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127427" comment="php5-opcache-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127428" comment="php5-openssl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127429" comment="php5-pcntl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127430" comment="php5-pdo-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127431" comment="php5-pear-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127432" comment="php5-pgsql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127433" comment="php5-phar-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127434" comment="php5-posix-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127435" comment="php5-pspell-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130754" comment="php5-readline-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127436" comment="php5-shmop-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127437" comment="php5-snmp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127438" comment="php5-soap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127439" comment="php5-sockets-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127440" comment="php5-sqlite-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127441" comment="php5-suhosin-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127442" comment="php5-sysvmsg-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127443" comment="php5-sysvsem-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127444" comment="php5-sysvshm-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130755" comment="php5-tidy-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127445" comment="php5-tokenizer-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127446" comment="php5-wddx-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127447" comment="php5-xmlreader-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127448" comment="php5-xmlrpc-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127449" comment="php5-xmlwriter-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127450" comment="php5-xsl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127451" comment="php5-zip-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127452" comment="php5-zlib-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5772</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772" source="CVE"/>
    <description>
    Double free vulnerability in the php_wddx_process_data function in wddx.c in the WDDX extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted XML data that is mishandled in a wddx_deserialize call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5772.html">CVE-2016-5772</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5772">SUSE bug 986244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5772">SUSE bug 986244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5772">SUSE bug 986244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5772">SUSE bug 986244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5772">SUSE bug 986244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5772">SUSE bug 986244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5772">SUSE bug 986244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5772">SUSE bug 986244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5772">SUSE bug 986244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5772">SUSE bug 986244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5772">SUSE bug 986244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5772">SUSE bug 986244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5772">SUSE bug 986244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5772">SUSE bug 986244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5772">SUSE bug 986244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5772">SUSE bug 986244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5772">SUSE bug 986244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5772">SUSE bug 986244</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127401" comment="apache2-mod_php5-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127402" comment="php5-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127403" comment="php5-bcmath-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127404" comment="php5-bz2-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127405" comment="php5-calendar-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127406" comment="php5-ctype-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127407" comment="php5-curl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127408" comment="php5-dba-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127453" comment="php5-devel-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127409" comment="php5-dom-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127410" comment="php5-enchant-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127411" comment="php5-exif-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127412" comment="php5-fastcgi-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127413" comment="php5-fileinfo-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130751" comment="php5-firebird-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127414" comment="php5-fpm-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127415" comment="php5-ftp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127416" comment="php5-gd-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127417" comment="php5-gettext-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127418" comment="php5-gmp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127419" comment="php5-iconv-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130752" comment="php5-imap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127420" comment="php5-intl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127421" comment="php5-json-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127422" comment="php5-ldap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127423" comment="php5-mbstring-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127424" comment="php5-mcrypt-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130753" comment="php5-mssql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127425" comment="php5-mysql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127426" comment="php5-odbc-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127427" comment="php5-opcache-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127428" comment="php5-openssl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127429" comment="php5-pcntl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127430" comment="php5-pdo-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127431" comment="php5-pear-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127432" comment="php5-pgsql-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127433" comment="php5-phar-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127434" comment="php5-posix-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127435" comment="php5-pspell-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130754" comment="php5-readline-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127436" comment="php5-shmop-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127437" comment="php5-snmp-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127438" comment="php5-soap-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127439" comment="php5-sockets-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127440" comment="php5-sqlite-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127441" comment="php5-suhosin-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127442" comment="php5-sysvmsg-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127443" comment="php5-sysvsem-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127444" comment="php5-sysvshm-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130755" comment="php5-tidy-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127445" comment="php5-tokenizer-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127446" comment="php5-wddx-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127447" comment="php5-xmlreader-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127448" comment="php5-xmlrpc-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127449" comment="php5-xmlwriter-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127450" comment="php5-xsl-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127451" comment="php5-zip-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009127452" comment="php5-zlib-5.5.14-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5773</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773" source="CVE"/>
    <description>
    php_zip.c in the zip extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data containing a ZipArchive object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5773.html">CVE-2016-5773</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5773">SUSE bug 986247</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142543" comment="apache2-mod_php5-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142544" comment="php5-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142545" comment="php5-bcmath-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142546" comment="php5-bz2-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142547" comment="php5-calendar-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142548" comment="php5-ctype-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142549" comment="php5-curl-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142550" comment="php5-dba-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142551" comment="php5-devel-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142552" comment="php5-dom-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142553" comment="php5-enchant-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142554" comment="php5-exif-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142555" comment="php5-fastcgi-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142556" comment="php5-fileinfo-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142557" comment="php5-firebird-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142558" comment="php5-fpm-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142559" comment="php5-ftp-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142560" comment="php5-gd-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142561" comment="php5-gettext-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142562" comment="php5-gmp-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142563" comment="php5-iconv-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142564" comment="php5-imap-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142565" comment="php5-intl-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142566" comment="php5-json-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142567" comment="php5-ldap-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142568" comment="php5-mbstring-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142569" comment="php5-mcrypt-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142570" comment="php5-mssql-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142571" comment="php5-mysql-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142572" comment="php5-odbc-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142573" comment="php5-opcache-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142574" comment="php5-openssl-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142575" comment="php5-pcntl-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142576" comment="php5-pdo-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142577" comment="php5-pear-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142578" comment="php5-pgsql-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142579" comment="php5-phar-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142580" comment="php5-posix-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142581" comment="php5-pspell-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142582" comment="php5-readline-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142583" comment="php5-shmop-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142584" comment="php5-snmp-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142585" comment="php5-soap-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142586" comment="php5-sockets-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142587" comment="php5-sqlite-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142588" comment="php5-suhosin-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142589" comment="php5-sysvmsg-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142590" comment="php5-sysvsem-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142591" comment="php5-sysvshm-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142592" comment="php5-tidy-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142593" comment="php5-tokenizer-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142594" comment="php5-wddx-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142595" comment="php5-xmlreader-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142596" comment="php5-xmlrpc-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142597" comment="php5-xmlwriter-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142598" comment="php5-xsl-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142599" comment="php5-zip-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142600" comment="php5-zlib-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5829</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5829" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5829.html">CVE-2016-5829</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 990058</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 991651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 1054127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 1054127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 986572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 1053919</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5829">SUSE bug 1054127</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130071" comment="kernel-debug-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130072" comment="kernel-debug-base-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130073" comment="kernel-debug-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130074" comment="kernel-default-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130075" comment="kernel-default-base-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130076" comment="kernel-default-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130077" comment="kernel-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130078" comment="kernel-docs-4.1.27-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130079" comment="kernel-docs-html-4.1.27-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130080" comment="kernel-docs-pdf-4.1.27-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130081" comment="kernel-ec2-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130082" comment="kernel-ec2-base-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130083" comment="kernel-ec2-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130084" comment="kernel-macros-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130085" comment="kernel-obs-build-4.1.27-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130086" comment="kernel-obs-qa-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130087" comment="kernel-obs-qa-xen-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130088" comment="kernel-pae-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130089" comment="kernel-pae-base-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130090" comment="kernel-pae-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130091" comment="kernel-pv-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130092" comment="kernel-pv-base-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130093" comment="kernel-pv-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130094" comment="kernel-source-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130095" comment="kernel-source-vanilla-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130096" comment="kernel-syms-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130097" comment="kernel-vanilla-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130098" comment="kernel-vanilla-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130099" comment="kernel-xen-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130100" comment="kernel-xen-base-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130101" comment="kernel-xen-devel-4.1.27-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5841</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5841" source="CVE"/>
    <description>
    Integer overflow in MagickCore/profile.c in ImageMagick before 7.0.2-1 allows remote attackers to cause a denial of service (segmentation fault) or possibly execute arbitrary code via vectors involving the offset variable.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5841.html">CVE-2016-5841</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5841">SUSE bug 986609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5841">SUSE bug 986609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5841">SUSE bug 986609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5841">SUSE bug 986609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5841">SUSE bug 986609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5841">SUSE bug 986609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5841">SUSE bug 986609</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5841">SUSE bug 986609</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5842</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5842" source="CVE"/>
    <description>
    MagickCore/property.c in ImageMagick before 7.0.2-1 allows remote attackers to obtain sensitive memory information via vectors involving the q variable, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5842.html">CVE-2016-5842</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5842">SUSE bug 986608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5842">SUSE bug 986608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5842">SUSE bug 986608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5842">SUSE bug 986608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5842">SUSE bug 986608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5842">SUSE bug 986608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5842">SUSE bug 986608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5842">SUSE bug 986608</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130633" comment="ImageMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130634" comment="ImageMagick-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130635" comment="ImageMagick-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130636" comment="ImageMagick-doc-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130637" comment="ImageMagick-extra-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130638" comment="libMagick++-6_Q16-3-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130639" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130640" comment="libMagick++-devel-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130641" comment="libMagick++-devel-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130642" comment="libMagickCore-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130643" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130644" comment="libMagickWand-6_Q16-1-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130645" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130646" comment="perl-PerlMagick-6.8.8.1-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5844</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5844" source="CVE"/>
    <description>
    Integer overflow in the ISO parser in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a crafted ISO file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5844.html">CVE-2016-5844</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5844">SUSE bug 986566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5844">SUSE bug 986566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5844">SUSE bug 986566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5844">SUSE bug 986566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5844">SUSE bug 986566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5844">SUSE bug 986566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5844">SUSE bug 986566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5844">SUSE bug 986566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5844">SUSE bug 986566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5844">SUSE bug 986566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5844">SUSE bug 986566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5844">SUSE bug 986566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5844">SUSE bug 986566</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5844">SUSE bug 986566</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136448" comment="bsdtar-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136449" comment="libarchive-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136450" comment="libarchive-devel-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136451" comment="libarchive13-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136452" comment="libarchive13-32bit-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5875</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-5875" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5875" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-5314.  Reason: This candidate is a reservation duplicate of CVE-2016-5314.  Notes: All CVE users should reference CVE-2016-5314 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-5875.html">CVE-2016-5875</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5875">SUSE bug 987351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5875">SUSE bug 984831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5875">SUSE bug 987351</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5875">SUSE bug 1007284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5875">SUSE bug 1007284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-5875">SUSE bug 1007284</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146600" comment="libtiff-devel-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146601" comment="libtiff-devel-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146602" comment="libtiff5-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146603" comment="libtiff5-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146604" comment="tiff-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6128</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128" source="CVE"/>
    <description>
    The gdImageCropThreshold function in gd_crop.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 7.0.9, allows remote attackers to cause a denial of service (application crash) via an invalid color index.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6128.html">CVE-2016-6128</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6128">SUSE bug 987580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6128">SUSE bug 987580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6128">SUSE bug 991710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6128">SUSE bug 987580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6128">SUSE bug 987580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6128">SUSE bug 991710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6128">SUSE bug 991710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6128">SUSE bug 987580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6128">SUSE bug 987580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6128">SUSE bug 991710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6128">SUSE bug 991710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6128">SUSE bug 987580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6128">SUSE bug 987580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6128">SUSE bug 987580</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134466" comment="gd-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134467" comment="gd-32bit-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152101" comment="gd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134468" comment="gd-devel-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153569" comment="gd-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6132</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132" source="CVE"/>
    <description>
    The gdImageCreateFromTgaCtx function in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6132.html">CVE-2016-6132</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6132">SUSE bug 987577</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6132">SUSE bug 987577</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6132">SUSE bug 991436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6132">SUSE bug 987577</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6132">SUSE bug 987577</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6132">SUSE bug 991436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6132">SUSE bug 987577</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6132">SUSE bug 995034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6132">SUSE bug 987577</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134466" comment="gd-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134467" comment="gd-32bit-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152101" comment="gd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134468" comment="gd-devel-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153569" comment="gd-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6153</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6153" source="CVE"/>
    <description>
    os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6153.html">CVE-2016-6153</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6153">SUSE bug 987394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6153">SUSE bug 987394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6153">SUSE bug 987394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6153">SUSE bug 987394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6153">SUSE bug 987394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6153">SUSE bug 987394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6153">SUSE bug 987394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6153">SUSE bug 987394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6153">SUSE bug 987394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6153">SUSE bug 987394</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135174" comment="libsqlite3-0-3.8.10.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135175" comment="libsqlite3-0-32bit-3.8.10.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135176" comment="sqlite3-3.8.10.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135177" comment="sqlite3-devel-3.8.10.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135178" comment="sqlite3-doc-3.8.10.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6161</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161" source="CVE"/>
    <description>
    The output function in gd_gif_out.c in the GD Graphics Library (aka libgd) allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6161.html">CVE-2016-6161</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6161">SUSE bug 988032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6161">SUSE bug 988032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6161">SUSE bug 988032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6161">SUSE bug 988032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6161">SUSE bug 988032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6161">SUSE bug 988032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6161">SUSE bug 988032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6161">SUSE bug 988032</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134466" comment="gd-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134467" comment="gd-32bit-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152101" comment="gd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134468" comment="gd-devel-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153569" comment="gd-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6170</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6170" source="CVE"/>
    <description>
    ISC BIND through 9.9.9-P1, 9.10.x through 9.10.4-P1, and 9.11.x through 9.11.0b1 allows primary DNS servers to cause a denial of service (secondary DNS server crash) via a large AXFR response, and possibly allows IXFR servers to cause a denial of service (IXFR client crash) via a large IXFR response and allows remote authenticated users to cause a denial of service (primary DNS server crash) via a large UPDATE message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6170.html">CVE-2016-6170</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6170">SUSE bug 987866</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154530" comment="bind-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154531" comment="bind-chrootenv-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154532" comment="bind-devel-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154533" comment="bind-doc-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154534" comment="bind-libs-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154535" comment="bind-libs-32bit-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153103" comment="bind-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154536" comment="bind-lwresd-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153104" comment="bind-lwresd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154537" comment="bind-utils-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6172</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6172" source="CVE"/>
    <description>
    PowerDNS (aka pdns) Authoritative Server before 4.0.1 allows remote primary DNS servers to cause a denial of service (memory exhaustion and secondary DNS server crash) via a large (1) AXFR or (2) IXFR response.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6172.html">CVE-2016-6172</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6172">SUSE bug 987872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6172">SUSE bug 987872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6172">SUSE bug 987872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6172">SUSE bug 987872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6172">SUSE bug 987872</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133261" comment="pdns-3.4.6-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152980" comment="pdns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133262" comment="pdns-backend-ldap-3.4.6-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152981" comment="pdns-backend-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133263" comment="pdns-backend-lua-3.4.6-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152982" comment="pdns-backend-lua is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133264" comment="pdns-backend-mydns-3.4.6-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152983" comment="pdns-backend-mydns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133265" comment="pdns-backend-mysql-3.4.6-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152984" comment="pdns-backend-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133266" comment="pdns-backend-postgresql-3.4.6-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152985" comment="pdns-backend-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133267" comment="pdns-backend-sqlite3-3.4.6-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152986" comment="pdns-backend-sqlite3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6185</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185" source="CVE"/>
    <description>
    The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6185.html">CVE-2016-6185</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6185">SUSE bug 988311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6185">SUSE bug 988311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6185">SUSE bug 999993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6185">SUSE bug 988311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6185">SUSE bug 988311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6185">SUSE bug 988311</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6185">SUSE bug 988311</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134449" comment="perl-5.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151455" comment="perl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134450" comment="perl-32bit-5.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151456" comment="perl-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134451" comment="perl-base-5.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151457" comment="perl-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134452" comment="perl-base-32bit-5.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153231" comment="perl-base-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134453" comment="perl-doc-5.18.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151458" comment="perl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6207</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6207" source="CVE"/>
    <description>
    Integer overflow in the _gdContributionsAlloc function in gd_interpolation.c in GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds memory write or memory consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6207.html">CVE-2016-6207</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6207">SUSE bug 991434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6207">SUSE bug 991434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6207">SUSE bug 991622</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6207">SUSE bug 991434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6207">SUSE bug 991434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6207">SUSE bug 991434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6207">SUSE bug 991622</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6207">SUSE bug 991622</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6207">SUSE bug 991434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6207">SUSE bug 991622</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6207">SUSE bug 991622</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134466" comment="gd-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134467" comment="gd-32bit-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152101" comment="gd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134468" comment="gd-devel-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153569" comment="gd-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6210</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210" source="CVE"/>
    <description>
    sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6210.html">CVE-2016-6210</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 1001712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 989363</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 1087412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6210">SUSE bug 1087412</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134460" comment="openssh-6.6p1-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134461" comment="openssh-askpass-gnome-6.6p1-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153167" comment="openssh-askpass-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134462" comment="openssh-cavs-6.6p1-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153168" comment="openssh-cavs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134463" comment="openssh-fips-6.6p1-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153169" comment="openssh-fips is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134464" comment="openssh-helpers-6.6p1-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152111" comment="openssh-helpers is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6214</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214" source="CVE"/>
    <description>
    gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6214.html">CVE-2016-6214</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6214">SUSE bug 987577</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6214">SUSE bug 991436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6214">SUSE bug 991436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6214">SUSE bug 991436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6214">SUSE bug 991436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6214">SUSE bug 995034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6214">SUSE bug 991436</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134466" comment="gd-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134467" comment="gd-32bit-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152101" comment="gd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134468" comment="gd-devel-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153569" comment="gd-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6225</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6225" source="CVE"/>
    <description>
    xbcrypt in Percona XtraBackup before 2.3.6 and 2.4.x before 2.4.5 does not properly set the initialization vector (IV) for encryption, which makes it easier for context-dependent attackers to obtain sensitive information from encrypted backup files via a Chosen-Plaintext attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-6394.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6225.html">CVE-2016-6225</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6225">SUSE bug 1019858</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6225">SUSE bug 1019858</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6225">SUSE bug 1019858</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147468" comment="xtrabackup-2.2.12-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153750" comment="xtrabackup is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147469" comment="xtrabackup-test-2.2.12-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153751" comment="xtrabackup-test is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6232</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6232" source="CVE"/>
    <description>
    Directory traversal vulnerability in KArchive before 5.24, as used in KDE Frameworks, allows remote attackers to write to arbitrary files via a ../ (dot dot slash) in a filename in an archive file, related to KNewsstuff downloads.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6232.html">CVE-2016-6232</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6232">SUSE bug 989698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6232">SUSE bug 989698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6232">SUSE bug 989698</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130670" comment="karchive-5.21.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153752" comment="karchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130671" comment="karchive-devel-5.21.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153753" comment="karchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130672" comment="karchive-devel-32bit-5.21.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153754" comment="karchive-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130673" comment="libKF5Archive5-5.21.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153755" comment="libKF5Archive5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130674" comment="libKF5Archive5-32bit-5.21.0-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153756" comment="libKF5Archive5-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6250</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6250" source="CVE"/>
    <description>
    Integer overflow in the ISO9660 writer in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors related to verifying filename lengths when writing an ISO9660 archive, which trigger a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6250.html">CVE-2016-6250</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6250">SUSE bug 989980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6250">SUSE bug 989980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6250">SUSE bug 989980</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136448" comment="bsdtar-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136449" comment="libarchive-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136450" comment="libarchive-devel-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136451" comment="libarchive13-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136452" comment="libarchive13-32bit-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6258</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6258" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6258" source="CVE"/>
    <description>
    The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6258.html">CVE-2016-6258</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988675</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6258">SUSE bug 988692</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6259</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6259" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6259" source="CVE"/>
    <description>
    Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6259.html">CVE-2016-6259</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6259">SUSE bug 988676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6259">SUSE bug 988676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6259">SUSE bug 988676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6259">SUSE bug 988676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6259">SUSE bug 988694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6259">SUSE bug 988676</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6259">SUSE bug 988676</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6261</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6261" source="CVE"/>
    <description>
    The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6261.html">CVE-2016-6261</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6261">SUSE bug 990190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6261">SUSE bug 990190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6261">SUSE bug 990190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6261">SUSE bug 990190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6261">SUSE bug 990190</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134259" comment="libidn-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152665" comment="libidn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134260" comment="libidn-devel-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152666" comment="libidn-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134261" comment="libidn-tools-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152667" comment="libidn-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134262" comment="libidn11-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152668" comment="libidn11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134263" comment="libidn11-32bit-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152669" comment="libidn11-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6262</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6262" source="CVE"/>
    <description>
    idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6262.html">CVE-2016-6262</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6262">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6262">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6262">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6262">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6262">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6262">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6262">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6262">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6262">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6262">SUSE bug 1014473</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6262">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6262">SUSE bug 1014473</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6262">SUSE bug 990189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6262">SUSE bug 1014473</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6262">SUSE bug 990189</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134259" comment="libidn-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152665" comment="libidn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134260" comment="libidn-devel-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152666" comment="libidn-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134261" comment="libidn-tools-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152667" comment="libidn-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134262" comment="libidn11-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152668" comment="libidn11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134263" comment="libidn11-32bit-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152669" comment="libidn11-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6263</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6263" source="CVE"/>
    <description>
    The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6263.html">CVE-2016-6263</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6263">SUSE bug 990191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6263">SUSE bug 990191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6263">SUSE bug 990191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6263">SUSE bug 990191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6263">SUSE bug 990191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6263">SUSE bug 990191</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6263">SUSE bug 990191</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134259" comment="libidn-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152665" comment="libidn is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134260" comment="libidn-devel-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152666" comment="libidn-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134261" comment="libidn-tools-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152667" comment="libidn-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134262" comment="libidn11-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152668" comment="libidn11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134263" comment="libidn11-32bit-1.28-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152669" comment="libidn11-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6265</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6265" source="CVE"/>
    <description>
    Use-after-free vulnerability in the pdf_load_xref function in pdf/pdf-xref.c in MuPDF allows remote attackers to cause a denial of service (crash) via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6265.html">CVE-2016-6265</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6265">SUSE bug 990195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6265">SUSE bug 990195</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6265">SUSE bug 990195</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130739" comment="mupdf-1.7a-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153561" comment="mupdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130740" comment="mupdf-devel-static-1.7a-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153562" comment="mupdf-devel-static is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6271</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6271" source="CVE"/>
    <description>
    The Bzrtp library (aka libbzrtp) 1.0.x before 1.0.4 allows man-in-the-middle attackers to conduct spoofing attacks by leveraging a missing HVI check on DHPart2 packet reception.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6271.html">CVE-2016-6271</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6271">SUSE bug 1020844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6271">SUSE bug 1020844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6271">SUSE bug 1020844</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148031" comment="bzrtp-1.0.3-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153757" comment="bzrtp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148032" comment="bzrtp-devel-1.0.3-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153758" comment="bzrtp-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148033" comment="libbzrtp0-1.0.3-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153759" comment="libbzrtp0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148034" comment="libbzrtp0-32bit-1.0.3-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153760" comment="libbzrtp0-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6288</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6288" source="CVE"/>
    <description>
    The php_url_parse_ex function in ext/standard/url.c in PHP before 5.5.38 allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via vectors involving the smart_str data type.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6288.html">CVE-2016-6288</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6288">SUSE bug 991433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6288">SUSE bug 991433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6288">SUSE bug 991433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6288">SUSE bug 991433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6288">SUSE bug 991433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6288">SUSE bug 991433</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6289</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6289" source="CVE"/>
    <description>
    Integer overflow in the virtual_file_ex function in TSRM/tsrm_virtual_cwd.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted extract operation on a ZIP archive.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6289.html">CVE-2016-6289</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6289">SUSE bug 991428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6289">SUSE bug 991428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6289">SUSE bug 991428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6289">SUSE bug 991428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6289">SUSE bug 991428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6289">SUSE bug 991428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6289">SUSE bug 991428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6289">SUSE bug 991428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6289">SUSE bug 991428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6289">SUSE bug 991428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6289">SUSE bug 991428</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6290</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6290" source="CVE"/>
    <description>
    ext/session/session.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 does not properly maintain a certain hash data structure, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to session deserialization.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6290.html">CVE-2016-6290</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6290">SUSE bug 991429</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6291</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6291" source="CVE"/>
    <description>
    The exif_process_IFD_in_MAKERNOTE function in ext/exif/exif.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (out-of-bounds array access and memory corruption), obtain sensitive information from process memory, or possibly have unspecified other impact via a crafted JPEG image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6291.html">CVE-2016-6291</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6291">SUSE bug 991427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6291">SUSE bug 991427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6291">SUSE bug 991427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6291">SUSE bug 991427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6291">SUSE bug 991427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6291">SUSE bug 991427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6291">SUSE bug 991427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6291">SUSE bug 991427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6291">SUSE bug 991427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6291">SUSE bug 991427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6291">SUSE bug 991427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6291">SUSE bug 991427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6291">SUSE bug 991427</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6291">SUSE bug 991427</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6292</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6292" source="CVE"/>
    <description>
    The exif_process_user_comment function in ext/exif/exif.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted JPEG image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6292.html">CVE-2016-6292</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6292">SUSE bug 991422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6292">SUSE bug 991422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6292">SUSE bug 991422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6292">SUSE bug 991422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6292">SUSE bug 991422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6292">SUSE bug 991422</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6295</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6295" source="CVE"/>
    <description>
    ext/snmp/snmp.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via crafted serialized data, a related issue to CVE-2016-5773.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6295.html">CVE-2016-6295</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6295">SUSE bug 991424</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6295">SUSE bug 991424</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6295">SUSE bug 991424</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6295">SUSE bug 991424</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6295">SUSE bug 991424</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6295">SUSE bug 991424</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6295">SUSE bug 991424</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6296</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6296" source="CVE"/>
    <description>
    Integer signedness error in the simplestring_addn function in simplestring.c in xmlrpc-epi through 0.54.2, as used in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a long first argument to the PHP xmlrpc_encode_request function.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6296.html">CVE-2016-6296</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6296">SUSE bug 991437</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6297</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6297" source="CVE"/>
    <description>
    Integer overflow in the php_stream_zip_opener function in ext/zip/zip_stream.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted zip:// URL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6297.html">CVE-2016-6297</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6297">SUSE bug 991426</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6297">SUSE bug 991426</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6297">SUSE bug 991426</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6297">SUSE bug 991426</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6297">SUSE bug 991426</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6297">SUSE bug 991426</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6297">SUSE bug 991426</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6297">SUSE bug 991426</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6297">SUSE bug 991426</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6297">SUSE bug 991426</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6297">SUSE bug 991426</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6302</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302" source="CVE"/>
    <description>
    The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6302.html">CVE-2016-6302</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6302">SUSE bug 995324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6302">SUSE bug 995324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6302">SUSE bug 995324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6302">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6302">SUSE bug 995324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6302">SUSE bug 995324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6302">SUSE bug 995324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6302">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6302">SUSE bug 995324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6302">SUSE bug 995324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6302">SUSE bug 995324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6302">SUSE bug 995324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6302">SUSE bug 995324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6302">SUSE bug 995324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6302">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6302">SUSE bug 995324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6302">SUSE bug 995324</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6302">SUSE bug 995324</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134771" comment="compat-openssl098-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134613" comment="libopenssl-devel-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134614" comment="libopenssl-devel-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134772" comment="libopenssl0_9_8-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134773" comment="libopenssl0_9_8-32bit-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134615" comment="libopenssl1_0_0-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134616" comment="libopenssl1_0_0-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134617" comment="libopenssl1_0_0-hmac-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134618" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134619" comment="openssl-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134620" comment="openssl-doc-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6303</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303" source="CVE"/>
    <description>
    Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6303.html">CVE-2016-6303</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 994844</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6303">SUSE bug 995377</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134771" comment="compat-openssl098-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134613" comment="libopenssl-devel-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134614" comment="libopenssl-devel-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134772" comment="libopenssl0_9_8-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134773" comment="libopenssl0_9_8-32bit-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134615" comment="libopenssl1_0_0-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134616" comment="libopenssl1_0_0-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134617" comment="libopenssl1_0_0-hmac-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134618" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134619" comment="openssl-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134620" comment="openssl-doc-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6304</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304" source="CVE"/>
    <description>
    Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6304.html">CVE-2016-6304</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 1001706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 1003811</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 1003811</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 1005579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 1021375</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999666</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6304">SUSE bug 999666</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134771" comment="compat-openssl098-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134613" comment="libopenssl-devel-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134614" comment="libopenssl-devel-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134772" comment="libopenssl0_9_8-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134773" comment="libopenssl0_9_8-32bit-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134615" comment="libopenssl1_0_0-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134616" comment="libopenssl1_0_0-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134617" comment="libopenssl1_0_0-hmac-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134618" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133731" comment="nodejs-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133732" comment="nodejs-devel-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133734" comment="nodejs-docs-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133735" comment="npm-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134619" comment="openssl-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134620" comment="openssl-doc-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6306</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6306" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306" source="CVE"/>
    <description>
    The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6306.html">CVE-2016-6306</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999665</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6306">SUSE bug 999668</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134771" comment="compat-openssl098-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152719" comment="compat-openssl098 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134613" comment="libopenssl-devel-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134614" comment="libopenssl-devel-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134772" comment="libopenssl0_9_8-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151798" comment="libopenssl0_9_8 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134773" comment="libopenssl0_9_8-32bit-0.9.8j-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151799" comment="libopenssl0_9_8-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134615" comment="libopenssl1_0_0-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134616" comment="libopenssl1_0_0-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134617" comment="libopenssl1_0_0-hmac-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134618" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133731" comment="nodejs-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133732" comment="nodejs-devel-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133734" comment="nodejs-docs-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133735" comment="npm-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134619" comment="openssl-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134620" comment="openssl-doc-1.0.1i-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6313</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313" source="CVE"/>
    <description>
    The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6313.html">CVE-2016-6313</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6313">SUSE bug 994157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6313">SUSE bug 994157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6313">SUSE bug 994157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6313">SUSE bug 994157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6313">SUSE bug 994157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6313">SUSE bug 994157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6313">SUSE bug 994157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6313">SUSE bug 994157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6313">SUSE bug 994157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6313">SUSE bug 994157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6313">SUSE bug 994157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6313">SUSE bug 994157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6313">SUSE bug 994157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6313">SUSE bug 994157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6313">SUSE bug 994157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6313">SUSE bug 994157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6313">SUSE bug 994157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6313">SUSE bug 994157</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134621" comment="libgcrypt-1.6.1-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153047" comment="libgcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134622" comment="libgcrypt-cavs-1.6.1-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153048" comment="libgcrypt-cavs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134623" comment="libgcrypt-devel-1.6.1-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151920" comment="libgcrypt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134624" comment="libgcrypt-devel-32bit-1.6.1-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153049" comment="libgcrypt-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134625" comment="libgcrypt20-1.6.1-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151921" comment="libgcrypt20 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134626" comment="libgcrypt20-32bit-1.6.1-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151922" comment="libgcrypt20-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134627" comment="libgcrypt20-hmac-1.6.1-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153050" comment="libgcrypt20-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134628" comment="libgcrypt20-hmac-32bit-1.6.1-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153051" comment="libgcrypt20-hmac-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6318</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6318" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6318" source="CVE"/>
    <description>
    Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6318.html">CVE-2016-6318</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6318">SUSE bug 992966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6318">SUSE bug 992966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6318">SUSE bug 992966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6318">SUSE bug 992966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6318">SUSE bug 992966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6318">SUSE bug 992966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6318">SUSE bug 992966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6318">SUSE bug 992966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6318">SUSE bug 992966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6318">SUSE bug 992966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6318">SUSE bug 992966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6318">SUSE bug 992966</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6318">SUSE bug 1021932</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130930" comment="cracklib-2.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153761" comment="cracklib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131751" comment="cracklib-devel-2.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153762" comment="cracklib-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134301" comment="cracklib-devel-32bit-2.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153763" comment="cracklib-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130931" comment="cracklib-dict-small-2.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153764" comment="cracklib-dict-small is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131013" comment="libcrack2-2.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153765" comment="libcrack2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131014" comment="libcrack2-32bit-2.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153766" comment="libcrack2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134302" comment="libpwquality-1.2.3-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153767" comment="libpwquality is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134303" comment="libpwquality-devel-1.2.3-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153768" comment="libpwquality-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134304" comment="libpwquality-lang-1.2.3-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153769" comment="libpwquality-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134305" comment="libpwquality-tools-1.2.3-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153770" comment="libpwquality-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134306" comment="libpwquality1-1.2.3-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153771" comment="libpwquality1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134307" comment="pam_pwquality-1.2.3-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153772" comment="pam_pwquality is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134308" comment="python-pwquality-1.2.3-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153773" comment="python-pwquality is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6321</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6321" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6321" source="CVE"/>
    <description>
    Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6321.html">CVE-2016-6321</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6321">SUSE bug 1007188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6321">SUSE bug 1007188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6321">SUSE bug 1007188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6321">SUSE bug 1007188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6321">SUSE bug 1007188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6321">SUSE bug 1007188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6321">SUSE bug 1007188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6321">SUSE bug 1007188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6321">SUSE bug 1007188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6321">SUSE bug 1007188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6321">SUSE bug 1007188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6321">SUSE bug 1007188</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136453" comment="tar-1.27.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151391" comment="tar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136454" comment="tar-backup-scripts-1.27.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153774" comment="tar-backup-scripts is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136455" comment="tar-lang-1.27.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151392" comment="tar-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136456" comment="tar-tests-1.27.1-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153775" comment="tar-tests is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6351</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6351" source="CVE"/>
    <description>
    The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when built with ESP/NCR53C9x controller emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the QEMU host via vectors involving DMA read into ESP command buffer.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6351.html">CVE-2016-6351</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6351">SUSE bug 990835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6351">SUSE bug 990843</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6351">SUSE bug 990843</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6351">SUSE bug 990835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6351">SUSE bug 990843</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6351">SUSE bug 990843</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6351">SUSE bug 990835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6351">SUSE bug 990835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6351">SUSE bug 990835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6351">SUSE bug 990835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6351">SUSE bug 990843</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6352</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6352" source="CVE"/>
    <description>
    The OneLine32 function in io-ico.c in gdk-pixbuf before 2.35.3 allows remote attackers to cause a denial of service (out-of-bounds write and crash) via crafted dimensions in an ICO file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6352.html">CVE-2016-6352</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6352">SUSE bug 991450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6352">SUSE bug 991450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6352">SUSE bug 991450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6352">SUSE bug 991450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6352">SUSE bug 991450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6352">SUSE bug 991450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6352">SUSE bug 991450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6352">SUSE bug 991450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6352">SUSE bug 991450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6352">SUSE bug 991450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6352">SUSE bug 991450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6352">SUSE bug 991450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6352">SUSE bug 991450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6352">SUSE bug 991450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6352">SUSE bug 991450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6352">SUSE bug 991450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6352">SUSE bug 991450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6352">SUSE bug 991450</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133420" comment="gdk-pixbuf-2.32.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153060" comment="gdk-pixbuf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133421" comment="gdk-pixbuf-devel-2.32.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151614" comment="gdk-pixbuf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133422" comment="gdk-pixbuf-devel-32bit-2.32.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153061" comment="gdk-pixbuf-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133423" comment="gdk-pixbuf-lang-2.32.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151615" comment="gdk-pixbuf-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133424" comment="gdk-pixbuf-query-loaders-2.32.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151616" comment="gdk-pixbuf-query-loaders is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133425" comment="gdk-pixbuf-query-loaders-32bit-2.32.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151617" comment="gdk-pixbuf-query-loaders-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133426" comment="libgdk_pixbuf-2_0-0-2.32.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151618" comment="libgdk_pixbuf-2_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133427" comment="libgdk_pixbuf-2_0-0-32bit-2.32.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151619" comment="libgdk_pixbuf-2_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133428" comment="typelib-1_0-GdkPixbuf-2_0-2.32.3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151620" comment="typelib-1_0-GdkPixbuf-2_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6354</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6354" source="CVE"/>
    <description>
    Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6354.html">CVE-2016-6354</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1026047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 990856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6354">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133372" comment="MozillaFirefox-48.0.1-30.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133373" comment="MozillaFirefox-branding-upstream-48.0.1-30.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133374" comment="MozillaFirefox-buildsymbols-48.0.1-30.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133375" comment="MozillaFirefox-devel-48.0.1-30.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133376" comment="MozillaFirefox-translations-common-48.0.1-30.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133377" comment="MozillaFirefox-translations-other-48.0.1-30.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133410" comment="MozillaThunderbird-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133411" comment="MozillaThunderbird-buildsymbols-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133412" comment="MozillaThunderbird-devel-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133413" comment="MozillaThunderbird-translations-common-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133414" comment="MozillaThunderbird-translations-other-45.3.0-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134636" comment="at-3.1.14-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153776" comment="at is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134637" comment="flex-2.5.37-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153777" comment="flex is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134638" comment="flex-32bit-2.5.37-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153778" comment="flex-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134639" comment="libbonobo-2.32.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153779" comment="libbonobo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134640" comment="libbonobo-32bit-2.32.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153780" comment="libbonobo-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134641" comment="libbonobo-devel-2.32.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153781" comment="libbonobo-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134642" comment="libbonobo-doc-2.32.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153782" comment="libbonobo-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134643" comment="libbonobo-lang-2.32.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153783" comment="libbonobo-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133378" comment="libfreebl3-3.24-26.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133379" comment="libfreebl3-32bit-3.24-26.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134644" comment="libnetpbm-devel-10.66.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153784" comment="libnetpbm-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134645" comment="libnetpbm11-10.66.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153785" comment="libnetpbm11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134646" comment="libnetpbm11-32bit-10.66.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153786" comment="libnetpbm11-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133380" comment="libsoftokn3-3.24-26.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133381" comment="libsoftokn3-32bit-3.24-26.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133382" comment="mozilla-nss-3.24-26.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133383" comment="mozilla-nss-32bit-3.24-26.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133384" comment="mozilla-nss-certs-3.24-26.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133385" comment="mozilla-nss-certs-32bit-3.24-26.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133386" comment="mozilla-nss-devel-3.24-26.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133387" comment="mozilla-nss-sysinit-3.24-26.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133388" comment="mozilla-nss-sysinit-32bit-3.24-26.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133389" comment="mozilla-nss-tools-3.24-26.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134647" comment="netpbm-10.66.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153787" comment="netpbm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134648" comment="openslp-2.0.0-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151507" comment="openslp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134649" comment="openslp-32bit-2.0.0-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153678" comment="openslp-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134650" comment="openslp-devel-2.0.0-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151508" comment="openslp-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134651" comment="openslp-server-2.0.0-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151509" comment="openslp-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148023" comment="seamonkey-2.46-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152817" comment="seamonkey is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148024" comment="seamonkey-translations-common-2.46-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152820" comment="seamonkey-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148025" comment="seamonkey-translations-other-2.46-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152821" comment="seamonkey-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134652" comment="sgmltool-1.0.9-1078.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153788" comment="sgmltool is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134653" comment="virtuoso-6.1.6-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153789" comment="virtuoso is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134654" comment="virtuoso-drivers-6.1.6-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153790" comment="virtuoso-drivers is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134655" comment="virtuoso-server-6.1.6-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153791" comment="virtuoso-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6480</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480" source="CVE"/>
    <description>
    Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6480.html">CVE-2016-6480</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 992568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 992568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 992568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 992568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 992568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 992568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 1004418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 992568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 992568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 992568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 992568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991608</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6480">SUSE bug 991667</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134384" comment="drbd-8.4.6-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134385" comment="drbd-kmp-default-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134386" comment="drbd-kmp-pv-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134387" comment="drbd-kmp-xen-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134388" comment="hdjmod-1.28-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134389" comment="hdjmod-kmp-default-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134390" comment="hdjmod-kmp-pae-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134391" comment="hdjmod-kmp-pv-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134392" comment="hdjmod-kmp-xen-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134393" comment="ipset-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134394" comment="ipset-devel-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134395" comment="ipset-kmp-default-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134396" comment="ipset-kmp-pae-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134397" comment="ipset-kmp-pv-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134398" comment="ipset-kmp-xen-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134399" comment="kernel-debug-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134400" comment="kernel-debug-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134401" comment="kernel-debug-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134402" comment="kernel-default-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134403" comment="kernel-default-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134404" comment="kernel-default-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134405" comment="kernel-devel-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134406" comment="kernel-docs-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134407" comment="kernel-docs-html-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134408" comment="kernel-docs-pdf-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134409" comment="kernel-ec2-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134410" comment="kernel-ec2-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134411" comment="kernel-ec2-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134412" comment="kernel-macros-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134413" comment="kernel-obs-build-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134414" comment="kernel-obs-qa-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134415" comment="kernel-obs-qa-xen-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134416" comment="kernel-pae-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134417" comment="kernel-pae-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134418" comment="kernel-pae-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134419" comment="kernel-pv-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134420" comment="kernel-pv-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134421" comment="kernel-pv-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134422" comment="kernel-source-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134423" comment="kernel-source-vanilla-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134424" comment="kernel-syms-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134425" comment="kernel-vanilla-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134426" comment="kernel-vanilla-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134427" comment="kernel-xen-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134428" comment="kernel-xen-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134429" comment="kernel-xen-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134430" comment="libipset3-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134431" comment="lttng-modules-2.7.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134432" comment="lttng-modules-kmp-default-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134433" comment="lttng-modules-kmp-pv-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134434" comment="pcfclock-0.44-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134435" comment="pcfclock-kmp-default-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134436" comment="pcfclock-kmp-pae-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134437" comment="pcfclock-kmp-pv-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134438" comment="vhba-kmp-20140928-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134439" comment="vhba-kmp-default-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134440" comment="vhba-kmp-pae-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134441" comment="vhba-kmp-pv-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134442" comment="vhba-kmp-xen-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6490</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6490" source="CVE"/>
    <description>
    The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6490.html">CVE-2016-6490</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6490">SUSE bug 991466</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6490">SUSE bug 991466</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6490">SUSE bug 991466</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6490">SUSE bug 991466</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6490">SUSE bug 993854</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6490">SUSE bug 991466</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6490">SUSE bug 991466</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135119" comment="qemu-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135120" comment="qemu-arm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135121" comment="qemu-block-curl-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135122" comment="qemu-block-rbd-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135123" comment="qemu-extra-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135124" comment="qemu-guest-agent-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135125" comment="qemu-ipxe-1.0.0-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135126" comment="qemu-kvm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135127" comment="qemu-lang-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135128" comment="qemu-linux-user-2.3.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135129" comment="qemu-ppc-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135130" comment="qemu-s390-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135131" comment="qemu-seabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135132" comment="qemu-sgabios-8-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135133" comment="qemu-testsuite-2.3.1-19.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135134" comment="qemu-tools-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135135" comment="qemu-vgabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135136" comment="qemu-x86-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6491</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6491" source="CVE"/>
    <description>
    Buffer overflow in the Get8BIMProperty function in MagickCore/property.c in ImageMagick before 6.9.5-4 and 7.x before 7.0.2-6 allows remote attackers to cause a denial of service (out-of-bounds read, memory leak, and crash) via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6491.html">CVE-2016-6491</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6491">SUSE bug 991445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6491">SUSE bug 991445</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6491">SUSE bug 991445</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134264" comment="ImageMagick-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134265" comment="ImageMagick-devel-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134266" comment="ImageMagick-devel-32bit-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134267" comment="ImageMagick-doc-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134268" comment="ImageMagick-extra-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134269" comment="libMagick++-6_Q16-3-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134270" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134271" comment="libMagick++-devel-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134272" comment="libMagick++-devel-32bit-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134273" comment="libMagickCore-6_Q16-1-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134274" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134275" comment="libMagickWand-6_Q16-1-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134276" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134277" comment="perl-PerlMagick-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6504</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6504" source="CVE"/>
    <description>
    epan/dissectors/packet-ncp2222.inc in the NDS dissector in Wireshark 1.12.x before 1.12.13 does not properly maintain a ptvc data structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6504.html">CVE-2016-6504</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6504">SUSE bug 991012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6504">SUSE bug 991012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6504">SUSE bug 991012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6504">SUSE bug 991012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6504">SUSE bug 991012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6504">SUSE bug 991012</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130873" comment="wireshark-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130874" comment="wireshark-devel-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130875" comment="wireshark-ui-gtk-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130876" comment="wireshark-ui-qt-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6505</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6505" source="CVE"/>
    <description>
    epan/dissectors/packet-packetbb.c in the PacketBB dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6505.html">CVE-2016-6505</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6505">SUSE bug 991013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6505">SUSE bug 991013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6505">SUSE bug 991013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6505">SUSE bug 991013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6505">SUSE bug 991013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6505">SUSE bug 991013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6505">SUSE bug 991013</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130873" comment="wireshark-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130874" comment="wireshark-devel-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130875" comment="wireshark-ui-gtk-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130876" comment="wireshark-ui-qt-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6506</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6506" source="CVE"/>
    <description>
    epan/dissectors/packet-wsp.c in the WSP dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6506.html">CVE-2016-6506</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6506">SUSE bug 991015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6506">SUSE bug 991015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6506">SUSE bug 991015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6506">SUSE bug 991015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6506">SUSE bug 991015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6506">SUSE bug 991015</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6506">SUSE bug 991015</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130873" comment="wireshark-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130874" comment="wireshark-devel-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130875" comment="wireshark-ui-gtk-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130876" comment="wireshark-ui-qt-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6507</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6507" source="CVE"/>
    <description>
    epan/dissectors/packet-mmse.c in the MMSE dissector in Wireshark 1.12.x before 1.12.13 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6507.html">CVE-2016-6507</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6507">SUSE bug 991016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6507">SUSE bug 991016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6507">SUSE bug 991016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6507">SUSE bug 991016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6507">SUSE bug 991016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6507">SUSE bug 991016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6507">SUSE bug 991016</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130873" comment="wireshark-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130874" comment="wireshark-devel-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130875" comment="wireshark-ui-gtk-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130876" comment="wireshark-ui-qt-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6508</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6508" source="CVE"/>
    <description>
    epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (large loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6508.html">CVE-2016-6508</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6508">SUSE bug 991017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6508">SUSE bug 991017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6508">SUSE bug 991017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6508">SUSE bug 991017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6508">SUSE bug 991017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6508">SUSE bug 991017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6508">SUSE bug 991017</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130873" comment="wireshark-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130874" comment="wireshark-devel-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130875" comment="wireshark-ui-gtk-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130876" comment="wireshark-ui-qt-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6509</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6509" source="CVE"/>
    <description>
    epan/dissectors/packet-ldss.c in the LDSS dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 mishandles conversations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6509.html">CVE-2016-6509</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6509">SUSE bug 991018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6509">SUSE bug 991018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6509">SUSE bug 991018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6509">SUSE bug 991018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6509">SUSE bug 991018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6509">SUSE bug 991018</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6509">SUSE bug 991018</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130873" comment="wireshark-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130874" comment="wireshark-devel-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130875" comment="wireshark-ui-gtk-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130876" comment="wireshark-ui-qt-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6510</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6510" source="CVE"/>
    <description>
    Off-by-one error in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6510.html">CVE-2016-6510</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6510">SUSE bug 991019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6510">SUSE bug 991019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6510">SUSE bug 991019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6510">SUSE bug 991019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6510">SUSE bug 991019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6510">SUSE bug 991019</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6510">SUSE bug 991019</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130873" comment="wireshark-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130874" comment="wireshark-devel-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130875" comment="wireshark-ui-gtk-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130876" comment="wireshark-ui-qt-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6511</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6511" source="CVE"/>
    <description>
    epan/proto.c in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (OpenFlow dissector large loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6511.html">CVE-2016-6511</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6511">SUSE bug 991020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6511">SUSE bug 991020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6511">SUSE bug 991020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6511">SUSE bug 991020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6511">SUSE bug 991020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6511">SUSE bug 991020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6511">SUSE bug 991020</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130873" comment="wireshark-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130874" comment="wireshark-devel-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130875" comment="wireshark-ui-gtk-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151251" comment="wireshark-ui-gtk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130876" comment="wireshark-ui-qt-1.12.13-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6515</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6515" source="CVE"/>
    <description>
    The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6515.html">CVE-2016-6515</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 992533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 1087412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6515">SUSE bug 1087412</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134460" comment="openssh-6.6p1-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134461" comment="openssh-askpass-gnome-6.6p1-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153167" comment="openssh-askpass-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134462" comment="openssh-cavs-6.6p1-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153168" comment="openssh-cavs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134463" comment="openssh-fips-6.6p1-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153169" comment="openssh-fips is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134464" comment="openssh-helpers-6.6p1-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152111" comment="openssh-helpers is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6520</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6520" source="CVE"/>
    <description>
    Buffer overflow in MagickCore/enhance.c in ImageMagick before 7.0.2-7 allows remote attackers to have unspecified impact via vectors related to pixel cache morphology.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6520.html">CVE-2016-6520</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6520">SUSE bug 991872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6520">SUSE bug 991872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6520">SUSE bug 991872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6520">SUSE bug 991872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6520">SUSE bug 991872</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134264" comment="ImageMagick-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134265" comment="ImageMagick-devel-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134266" comment="ImageMagick-devel-32bit-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134267" comment="ImageMagick-doc-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134268" comment="ImageMagick-extra-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134269" comment="libMagick++-6_Q16-3-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134270" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134271" comment="libMagick++-devel-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134272" comment="libMagick++-devel-32bit-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134273" comment="libMagickCore-6_Q16-1-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134274" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134275" comment="libMagickWand-6_Q16-1-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134276" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134277" comment="perl-PerlMagick-6.8.8.1-18.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6606</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6606" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6606" source="CVE"/>
    <description>
    An issue was discovered in cookie encryption in phpMyAdmin. The decryption of the username/password is vulnerable to a padding oracle attack. This can allow an attacker who has access to a user's browser cookie file to decrypt the username and password. Furthermore, the same initialization vector (IV) is used to hash the username and password stored in the phpMyAdmin cookie. If a user has the same password as their username, an attacker who examines the browser cookie can see that they are the same - but the attacker can not directly decode these values from the cookie as it is still hashed. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6606.html">CVE-2016-6606</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6606">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6607</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6607" source="CVE"/>
    <description>
    XSS issues were discovered in phpMyAdmin. This affects Zoom search (specially crafted column content can be used to trigger an XSS attack); GIS editor (certain fields in the graphical GIS editor are not properly escaped and can be used to trigger an XSS attack); Relation view; the following Transformations: Formatted, Imagelink, JPEG: Upload, RegexValidation, JPEG inline, PNG inline, and transformation wrapper; XML export; MediaWiki export; Designer; When the MySQL server is running with a specially-crafted log_bin directive; Database tab; Replication feature; and Database search. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6607.html">CVE-2016-6607</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6607">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6608</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6608" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6608" source="CVE"/>
    <description>
    XSS issues were discovered in phpMyAdmin. This affects the database privilege check and the "Remove partitioning" functionality. Specially crafted database names can trigger the XSS attack. All 4.6.x versions (prior to 4.6.4) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6608.html">CVE-2016-6608</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6608">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6609</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6609" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. A specially crafted database name could be used to run arbitrary PHP commands through the array export feature. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6609.html">CVE-2016-6609</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6609">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6610</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6610" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6610" source="CVE"/>
    <description>
    A full path disclosure vulnerability was discovered in phpMyAdmin where a user can trigger a particular error in the export mechanism to discover the full path of phpMyAdmin on the disk. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6610.html">CVE-2016-6610</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6610">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6611</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6611" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. A specially crafted database and/or table name can be used to trigger an SQL injection attack through the export functionality. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6611.html">CVE-2016-6611</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6611">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6612</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6612" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. A user can exploit the LOAD LOCAL INFILE functionality to expose files on the server to the database system. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6612.html">CVE-2016-6612</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6612">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6613</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6613" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. A user can specially craft a symlink on disk, to a file which phpMyAdmin is permitted to read but the user is not, which phpMyAdmin will then expose to the user. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6613.html">CVE-2016-6613</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6613">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6614</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6614" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin involving the %u username replacement functionality of the SaveDir and UploadDir features. When the username substitution is configured, a specially-crafted user name can be used to circumvent restrictions to traverse the file system. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6614.html">CVE-2016-6614</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6614">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6615</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6615" source="CVE"/>
    <description>
    XSS issues were discovered in phpMyAdmin. This affects navigation pane and database/table hiding feature (a specially-crafted database name can be used to trigger an XSS attack); the "Tracking" feature (a specially-crafted query can be used to trigger an XSS attack); and GIS visualization feature. All 4.6.x versions (prior to 4.6.4) and 4.4.x versions (prior to 4.4.15.8) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6615.html">CVE-2016-6615</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6615">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6616</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6616" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. In the "User group" and "Designer" features, a user can execute an SQL injection attack against the account of the control user. All 4.6.x versions (prior to 4.6.4) and 4.4.x versions (prior to 4.4.15.8) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6616.html">CVE-2016-6616</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6616">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6617</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6617" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. A specially crafted database and/or table name can be used to trigger an SQL injection attack through the export functionality. All 4.6.x versions (prior to 4.6.4) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6617.html">CVE-2016-6617</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6617">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6618</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6618" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. The transformation feature allows a user to trigger a denial-of-service (DoS) attack against the server. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6618.html">CVE-2016-6618</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6618">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6619</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6619" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. In the user interface preference feature, a user can execute an SQL injection attack against the account of the control user. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6619.html">CVE-2016-6619</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6619">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6620</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6620" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. Some data is passed to the PHP unserialize() function without verification that it's valid serialized data. The unserialization can result in code execution because of the interaction with object instantiation and autoloading. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6620.html">CVE-2016-6620</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6620">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6621</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6621" source="CVE"/>
    <description>
    The setup script for phpMyAdmin before 4.0.10.19, 4.4.x before 4.4.15.10, and 4.6.x before 4.6.6 allows remote attackers to conduct server-side request forgery (SSRF) attacks via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6621.html">CVE-2016-6621</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6621">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148040" comment="phpMyAdmin-4.4.15.10-31.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6622</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6622" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. An unauthenticated user is able to execute a denial-of-service (DoS) attack by forcing persistent connections when phpMyAdmin is running with $cfg['AllowArbitraryServer']=true. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6622.html">CVE-2016-6622</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6622">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6623</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6623" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. An authorized user can cause a denial-of-service (DoS) attack on a server by passing large values to a loop. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6623.html">CVE-2016-6623</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6623">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6624</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6624" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin involving improper enforcement of the IP-based authentication rules. When phpMyAdmin is used with IPv6 in a proxy server environment, and the proxy server is in the allowed range but the attacking computer is not allowed, this vulnerability can allow the attacking computer to connect despite the IP rules. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6624.html">CVE-2016-6624</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6624">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6625</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6625" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. An attacker can determine whether a user is logged in to phpMyAdmin. The user's session, username, and password are not compromised by this vulnerability. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6625.html">CVE-2016-6625</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6625">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6626</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6626" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. An attacker could redirect a user to a malicious web page. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6626.html">CVE-2016-6626</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6626">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6627</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6627" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. An attacker can determine the phpMyAdmin host location through the file url.php. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6627.html">CVE-2016-6627</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6627">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6628</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6628" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. An attacker may be able to trigger a user to download a specially crafted malicious SVG file. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6628.html">CVE-2016-6628</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6628">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6629</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6629" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin involving the $cfg['ArbitraryServerRegexp'] configuration directive. An attacker could reuse certain cookie values in a way of bypassing the servers defined by ArbitraryServerRegexp. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6629.html">CVE-2016-6629</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6629">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6630</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6630" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. An authenticated user can trigger a denial-of-service (DoS) attack by entering a very long password at the change password dialog. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6630.html">CVE-2016-6630</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6630">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6631</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6631" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. A user can execute a remote code execution attack against a server when phpMyAdmin is being run as a CGI application. Under certain server configurations, a user can pass a query string which is executed as a command-line argument by the file generator_plugin.sh. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6631.html">CVE-2016-6631</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6631">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6632</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6632" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin where, under certain conditions, phpMyAdmin may not delete temporary files during the import of ESRI files. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6632.html">CVE-2016-6632</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6632">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6633</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6633" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. phpMyAdmin can be used to trigger a remote code execution attack against certain PHP installations that are running with the dbase extension. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6633.html">CVE-2016-6633</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6633">SUSE bug 994313</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133370" comment="phpMyAdmin-4.4.15.8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6662</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662" source="CVE"/>
    <description>
    Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6662.html">CVE-2016-6662</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 1005580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 1005580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 1001367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 1005580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 1001367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 1005580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 1020884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 1021755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 1020884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6662">SUSE bug 998309</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131803" comment="libmysqlclient-devel-10.0.27-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131130" comment="libmysqlclient_r18-10.0.27-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131131" comment="libmysqlclient_r18-32bit-10.0.27-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131804" comment="libmysqld-devel-10.0.27-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131805" comment="libmysqld18-10.0.27-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134634" comment="mariadb-bench-10.0.27-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134635" comment="mariadb-test-10.0.27-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6663</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" source="CVE"/>
    <description>
    Race condition in Oracle MySQL before 5.5.52, 5.6.x before 5.6.33, 5.7.x before 5.7.15, and 8.x before 8.0.1; MariaDB before 5.5.52, 10.0.x before 10.0.28, and 10.1.x before 10.1.18; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17 allows local users with certain permissions to gain privileges by leveraging use of my_copystat by REPAIR TABLE to repair a MyISAM table.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6663.html">CVE-2016-6663</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6663">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6663">SUSE bug 1001367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6663">SUSE bug 1001367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6663">SUSE bug 1001367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6663">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6663">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6663">SUSE bug 1001367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6663">SUSE bug 1008253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6663">SUSE bug 1008318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6663">SUSE bug 1001367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6663">SUSE bug 1001367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6663">SUSE bug 1001367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6663">SUSE bug 1001367</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6663">SUSE bug 1021755</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6663">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6663">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6663">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6663">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6663">SUSE bug 998309</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136615" comment="libmysqlclient-devel-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136616" comment="libmysqlclient18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136617" comment="libmysqlclient18-32bit-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136618" comment="libmysqlclient_r18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136619" comment="libmysqlclient_r18-32bit-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136620" comment="libmysqld-devel-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136621" comment="libmysqld18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136622" comment="mariadb-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136623" comment="mariadb-bench-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136624" comment="mariadb-client-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136625" comment="mariadb-errormessages-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136626" comment="mariadb-test-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136627" comment="mariadb-tools-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6664</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664" source="CVE"/>
    <description>
    mysqld_safe in Oracle MySQL through 5.5.51, 5.6.x through 5.6.32, and 5.7.x through 5.7.14; MariaDB; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17, when using file-based logging, allows local users with access to the mysql account to gain root privileges via a symlink attack on error logs and possibly other files.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6664.html">CVE-2016-6664</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 1008253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 1008253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 1008253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 1008253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 1008253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 1008253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 1008253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 1008253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 1008253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6664">SUSE bug 998309</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148484" comment="libmysqlclient-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148485" comment="libmysqlclient18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148486" comment="libmysqlclient18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148487" comment="libmysqlclient_r18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148488" comment="libmysqlclient_r18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148489" comment="libmysqld-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148490" comment="libmysqld18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148491" comment="mariadb-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148492" comment="mariadb-bench-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148493" comment="mariadb-client-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148494" comment="mariadb-errormessages-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148495" comment="mariadb-test-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148496" comment="mariadb-tools-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6794</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6794" source="CVE"/>
    <description>
    When a SecurityManager is configured, a web application's ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6794.html">CVE-2016-6794</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6794">SUSE bug 1007857</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6794">SUSE bug 1007857</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6794">SUSE bug 1007857</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6794">SUSE bug 1007857</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6794">SUSE bug 1007857</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142899" comment="apache-commons-dbcp-2.1.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153286" comment="apache-commons-dbcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142900" comment="apache-commons-dbcp-javadoc-2.1.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153287" comment="apache-commons-dbcp-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142901" comment="apache-commons-pool2-2.4.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153288" comment="apache-commons-pool2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142902" comment="apache-commons-pool2-javadoc-2.4.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153289" comment="apache-commons-pool2-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142903" comment="tomcat-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142904" comment="tomcat-admin-webapps-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142905" comment="tomcat-docs-webapp-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142906" comment="tomcat-el-3_0-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142907" comment="tomcat-embed-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142908" comment="tomcat-javadoc-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142909" comment="tomcat-jsp-2_3-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142910" comment="tomcat-jsvc-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142911" comment="tomcat-lib-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142912" comment="tomcat-servlet-3_1-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152853" comment="tomcat-servlet-3_1-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142913" comment="tomcat-webapps-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6796</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6796" source="CVE"/>
    <description>
    A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6796.html">CVE-2016-6796</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6796">SUSE bug 1007858</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6796">SUSE bug 1007858</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6796">SUSE bug 1007858</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6796">SUSE bug 1007858</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6796">SUSE bug 1007858</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142899" comment="apache-commons-dbcp-2.1.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153286" comment="apache-commons-dbcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142900" comment="apache-commons-dbcp-javadoc-2.1.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153287" comment="apache-commons-dbcp-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142901" comment="apache-commons-pool2-2.4.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153288" comment="apache-commons-pool2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142902" comment="apache-commons-pool2-javadoc-2.4.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153289" comment="apache-commons-pool2-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142903" comment="tomcat-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142904" comment="tomcat-admin-webapps-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142905" comment="tomcat-docs-webapp-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142906" comment="tomcat-el-3_0-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142907" comment="tomcat-embed-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142908" comment="tomcat-javadoc-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142909" comment="tomcat-jsp-2_3-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142910" comment="tomcat-jsvc-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142911" comment="tomcat-lib-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142912" comment="tomcat-servlet-3_1-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152853" comment="tomcat-servlet-3_1-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142913" comment="tomcat-webapps-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6797</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6797" source="CVE"/>
    <description>
    The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6797.html">CVE-2016-6797</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6797">SUSE bug 1007853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6797">SUSE bug 1007853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6797">SUSE bug 1007853</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6797">SUSE bug 1007853</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142899" comment="apache-commons-dbcp-2.1.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153286" comment="apache-commons-dbcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142900" comment="apache-commons-dbcp-javadoc-2.1.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153287" comment="apache-commons-dbcp-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142901" comment="apache-commons-pool2-2.4.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153288" comment="apache-commons-pool2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142902" comment="apache-commons-pool2-javadoc-2.4.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153289" comment="apache-commons-pool2-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142903" comment="tomcat-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142904" comment="tomcat-admin-webapps-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142905" comment="tomcat-docs-webapp-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142906" comment="tomcat-el-3_0-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142907" comment="tomcat-embed-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142908" comment="tomcat-javadoc-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142909" comment="tomcat-jsp-2_3-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142910" comment="tomcat-jsvc-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142911" comment="tomcat-lib-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142912" comment="tomcat-servlet-3_1-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152853" comment="tomcat-servlet-3_1-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142913" comment="tomcat-webapps-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6816</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6816" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6816" source="CVE"/>
    <description>
    The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6816.html">CVE-2016-6816</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6816">SUSE bug 1011812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6816">SUSE bug 1011812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6816">SUSE bug 1011812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6816">SUSE bug 1011812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6816">SUSE bug 1011812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6816">SUSE bug 1011812</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6816">SUSE bug 1011812</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142899" comment="apache-commons-dbcp-2.1.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153286" comment="apache-commons-dbcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142900" comment="apache-commons-dbcp-javadoc-2.1.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153287" comment="apache-commons-dbcp-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142901" comment="apache-commons-pool2-2.4.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153288" comment="apache-commons-pool2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142902" comment="apache-commons-pool2-javadoc-2.4.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153289" comment="apache-commons-pool2-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142903" comment="tomcat-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142904" comment="tomcat-admin-webapps-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142905" comment="tomcat-docs-webapp-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142906" comment="tomcat-el-3_0-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142907" comment="tomcat-embed-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142908" comment="tomcat-javadoc-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142909" comment="tomcat-jsp-2_3-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142910" comment="tomcat-jsvc-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142911" comment="tomcat-lib-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142912" comment="tomcat-servlet-3_1-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152853" comment="tomcat-servlet-3_1-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142913" comment="tomcat-webapps-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6823</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6823" source="CVE"/>
    <description>
    Integer overflow in the BMP coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (crash) via crafted height and width values, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6823.html">CVE-2016-6823</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1002207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6823">SUSE bug 1001066</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142421" comment="ImageMagick-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142422" comment="ImageMagick-devel-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142423" comment="ImageMagick-devel-32bit-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142424" comment="ImageMagick-doc-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142425" comment="ImageMagick-extra-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142426" comment="libMagick++-6_Q16-3-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142427" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142428" comment="libMagick++-devel-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142429" comment="libMagick++-devel-32bit-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142430" comment="libMagickCore-6_Q16-1-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142431" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142432" comment="libMagickWand-6_Q16-1-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142433" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142434" comment="perl-PerlMagick-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6828</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6828" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6828" source="CVE"/>
    <description>
    The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6828.html">CVE-2016-6828</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 994296</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6828">SUSE bug 1052256</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134384" comment="drbd-8.4.6-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134385" comment="drbd-kmp-default-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134386" comment="drbd-kmp-pv-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134387" comment="drbd-kmp-xen-8.4.6_k4.1.31_30-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134388" comment="hdjmod-1.28-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134389" comment="hdjmod-kmp-default-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134390" comment="hdjmod-kmp-pae-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134391" comment="hdjmod-kmp-pv-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134392" comment="hdjmod-kmp-xen-1.28_k4.1.31_30-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134393" comment="ipset-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134394" comment="ipset-devel-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134395" comment="ipset-kmp-default-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134396" comment="ipset-kmp-pae-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134397" comment="ipset-kmp-pv-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134398" comment="ipset-kmp-xen-6.25.1_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134399" comment="kernel-debug-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134400" comment="kernel-debug-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134401" comment="kernel-debug-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134402" comment="kernel-default-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134403" comment="kernel-default-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134404" comment="kernel-default-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134405" comment="kernel-devel-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134406" comment="kernel-docs-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134407" comment="kernel-docs-html-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134408" comment="kernel-docs-pdf-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134409" comment="kernel-ec2-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134410" comment="kernel-ec2-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134411" comment="kernel-ec2-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134412" comment="kernel-macros-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134413" comment="kernel-obs-build-4.1.31-30.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134414" comment="kernel-obs-qa-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134415" comment="kernel-obs-qa-xen-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134416" comment="kernel-pae-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134417" comment="kernel-pae-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134418" comment="kernel-pae-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134419" comment="kernel-pv-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134420" comment="kernel-pv-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134421" comment="kernel-pv-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134422" comment="kernel-source-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134423" comment="kernel-source-vanilla-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134424" comment="kernel-syms-4.1.31-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134425" comment="kernel-vanilla-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134426" comment="kernel-vanilla-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134427" comment="kernel-xen-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134428" comment="kernel-xen-base-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134429" comment="kernel-xen-devel-4.1.31-30.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134430" comment="libipset3-6.25.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134431" comment="lttng-modules-2.7.0-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134432" comment="lttng-modules-kmp-default-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134433" comment="lttng-modules-kmp-pv-2.7.0_k4.1.31_30-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134434" comment="pcfclock-0.44-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134435" comment="pcfclock-kmp-default-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134436" comment="pcfclock-kmp-pae-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134437" comment="pcfclock-kmp-pv-0.44_k4.1.31_30-266.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134438" comment="vhba-kmp-20140928-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134439" comment="vhba-kmp-default-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134440" comment="vhba-kmp-pae-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134441" comment="vhba-kmp-pv-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134442" comment="vhba-kmp-xen-20140928_k4.1.31_30-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6833</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6833" source="CVE"/>
    <description>
    Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6833.html">CVE-2016-6833</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6833">SUSE bug 994774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6833">SUSE bug 994775</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6833">SUSE bug 994774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6833">SUSE bug 994775</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6833">SUSE bug 994774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6833">SUSE bug 994775</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6833">SUSE bug 994775</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6833">SUSE bug 994774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6833">SUSE bug 994775</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6833">SUSE bug 994775</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6833">SUSE bug 994775</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6833">SUSE bug 994775</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6833">SUSE bug 994775</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6833">SUSE bug 994775</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6833">SUSE bug 994775</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6833">SUSE bug 994774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6833">SUSE bug 994774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6833">SUSE bug 994774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6833">SUSE bug 994774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6833">SUSE bug 994774</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135119" comment="qemu-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135120" comment="qemu-arm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135121" comment="qemu-block-curl-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135122" comment="qemu-block-rbd-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135123" comment="qemu-extra-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135124" comment="qemu-guest-agent-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135125" comment="qemu-ipxe-1.0.0-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135126" comment="qemu-kvm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135127" comment="qemu-lang-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135128" comment="qemu-linux-user-2.3.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135129" comment="qemu-ppc-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135130" comment="qemu-s390-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135131" comment="qemu-seabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135132" comment="qemu-sgabios-8-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135133" comment="qemu-testsuite-2.3.1-19.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135134" comment="qemu-tools-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135135" comment="qemu-vgabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135136" comment="qemu-x86-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6834</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6834" source="CVE"/>
    <description>
    The net_tx_pkt_do_sw_fragmentation function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the current fragment length.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6834.html">CVE-2016-6834</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6834">SUSE bug 994418</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6835</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6835" source="CVE"/>
    <description>
    The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6835.html">CVE-2016-6835</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994605</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994605</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994605</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994605</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994605</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994605</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994605</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994605</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994605</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994605</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994605</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994605</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994605</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994625</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994605</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994605</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6835">SUSE bug 994605</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6836</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6836" source="CVE"/>
    <description>
    The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host memory information by leveraging failure to initialize the txcq_descr object.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6836.html">CVE-2016-6836</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994761</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6836">SUSE bug 994760</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135119" comment="qemu-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135120" comment="qemu-arm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135121" comment="qemu-block-curl-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135122" comment="qemu-block-rbd-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135123" comment="qemu-extra-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135124" comment="qemu-guest-agent-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135125" comment="qemu-ipxe-1.0.0-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135126" comment="qemu-kvm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135127" comment="qemu-lang-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135128" comment="qemu-linux-user-2.3.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135129" comment="qemu-ppc-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135130" comment="qemu-s390-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135131" comment="qemu-seabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135132" comment="qemu-sgabios-8-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135133" comment="qemu-testsuite-2.3.1-19.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135134" comment="qemu-tools-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135135" comment="qemu-vgabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135136" comment="qemu-x86-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6855</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6855" source="CVE"/>
    <description>
    Eye of GNOME (aka eog) 3.16.5, 3.17.x, 3.18.x before 3.18.3, 3.19.x, and 3.20.x before 3.20.4, when used with glib before 2.44.1, allow remote attackers to cause a denial of service (out-of-bounds write and crash) via vectors involving passing invalid UTF-8 to GMarkup.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6855.html">CVE-2016-6855</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6855">SUSE bug 994819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6855">SUSE bug 994819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6855">SUSE bug 994819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6855">SUSE bug 994819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6855">SUSE bug 994819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6855">SUSE bug 994819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6855">SUSE bug 994819</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133407" comment="eog-3.16.5-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151978" comment="eog is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133408" comment="eog-devel-3.16.5-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151979" comment="eog-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133409" comment="eog-lang-3.16.5-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151980" comment="eog-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6888</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6888" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6888" source="CVE"/>
    <description>
    Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6888.html">CVE-2016-6888</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6888">SUSE bug 994771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6888">SUSE bug 994772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6888">SUSE bug 994771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6888">SUSE bug 994772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6888">SUSE bug 994771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6888">SUSE bug 994772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6888">SUSE bug 994772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6888">SUSE bug 994771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6888">SUSE bug 994772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6888">SUSE bug 994772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6888">SUSE bug 994772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6888">SUSE bug 994771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6888">SUSE bug 994772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6888">SUSE bug 994772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6888">SUSE bug 994772</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6888">SUSE bug 994771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6888">SUSE bug 994771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6888">SUSE bug 994771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6888">SUSE bug 994771</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6888">SUSE bug 994771</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135119" comment="qemu-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135120" comment="qemu-arm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135121" comment="qemu-block-curl-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135122" comment="qemu-block-rbd-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135123" comment="qemu-extra-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135124" comment="qemu-guest-agent-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135125" comment="qemu-ipxe-1.0.0-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135126" comment="qemu-kvm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135127" comment="qemu-lang-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135128" comment="qemu-linux-user-2.3.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135129" comment="qemu-ppc-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135130" comment="qemu-s390-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135131" comment="qemu-seabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135132" comment="qemu-sgabios-8-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135133" comment="qemu-testsuite-2.3.1-19.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135134" comment="qemu-tools-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135135" comment="qemu-vgabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135136" comment="qemu-x86-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6905</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905" source="CVE"/>
    <description>
    The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6905.html">CVE-2016-6905</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6905">SUSE bug 995034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6905">SUSE bug 995034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6905">SUSE bug 995034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6905">SUSE bug 995034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6905">SUSE bug 995034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6905">SUSE bug 995034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6905">SUSE bug 995034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6905">SUSE bug 995034</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134466" comment="gd-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134467" comment="gd-32bit-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152101" comment="gd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134468" comment="gd-devel-2.1.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153569" comment="gd-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6906</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906" source="CVE"/>
    <description>
    The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file, related to the decompression buffer.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6906.html">CVE-2016-6906</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6906">SUSE bug 1022553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6906">SUSE bug 1022553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6906">SUSE bug 1022553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6906">SUSE bug 1022553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6906">SUSE bug 1022553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6906">SUSE bug 1022553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6906">SUSE bug 1022553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6906">SUSE bug 1022553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6906">SUSE bug 1022553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6906">SUSE bug 1022553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6906">SUSE bug 1022553</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6906">SUSE bug 1022553</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148800" comment="gd-2.1.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148801" comment="gd-32bit-2.1.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152101" comment="gd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148802" comment="gd-devel-2.1.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153569" comment="gd-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6911</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6911" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911" source="CVE"/>
    <description>
    The dynamicGetbuf function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6911.html">CVE-2016-6911</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6911">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6911">SUSE bug 1005274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6911">SUSE bug 1005274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6911">SUSE bug 1005274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6911">SUSE bug 1005274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6911">SUSE bug 1005274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6911">SUSE bug 1005274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6911">SUSE bug 1005274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6911">SUSE bug 1005274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6911">SUSE bug 1005274</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6911">SUSE bug 1005274</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135621" comment="apache2-mod_php5-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135470" comment="gd-2.1.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135471" comment="gd-32bit-2.1.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152101" comment="gd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135472" comment="gd-devel-2.1.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153569" comment="gd-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135622" comment="php5-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135623" comment="php5-bcmath-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135624" comment="php5-bz2-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135625" comment="php5-calendar-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135626" comment="php5-ctype-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135627" comment="php5-curl-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135628" comment="php5-dba-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135629" comment="php5-devel-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135630" comment="php5-dom-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135631" comment="php5-enchant-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135632" comment="php5-exif-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135633" comment="php5-fastcgi-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135634" comment="php5-fileinfo-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135635" comment="php5-firebird-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135636" comment="php5-fpm-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135637" comment="php5-ftp-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135638" comment="php5-gd-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135639" comment="php5-gettext-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135640" comment="php5-gmp-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135641" comment="php5-iconv-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135642" comment="php5-imap-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135643" comment="php5-intl-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135644" comment="php5-json-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135645" comment="php5-ldap-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135646" comment="php5-mbstring-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135647" comment="php5-mcrypt-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135648" comment="php5-mssql-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135649" comment="php5-mysql-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135650" comment="php5-odbc-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135651" comment="php5-opcache-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135652" comment="php5-openssl-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135653" comment="php5-pcntl-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135654" comment="php5-pdo-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135655" comment="php5-pear-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135656" comment="php5-pgsql-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135657" comment="php5-phar-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135658" comment="php5-posix-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135659" comment="php5-pspell-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135660" comment="php5-readline-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135661" comment="php5-shmop-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135662" comment="php5-snmp-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135663" comment="php5-soap-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135664" comment="php5-sockets-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135665" comment="php5-sqlite-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135666" comment="php5-suhosin-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135667" comment="php5-sysvmsg-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135668" comment="php5-sysvsem-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135669" comment="php5-sysvshm-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135670" comment="php5-tidy-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135671" comment="php5-tokenizer-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135672" comment="php5-wddx-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135673" comment="php5-xmlreader-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135674" comment="php5-xmlrpc-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135675" comment="php5-xmlwriter-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135676" comment="php5-xsl-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135677" comment="php5-zip-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135678" comment="php5-zlib-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6912</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-6912" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912" source="CVE"/>
    <description>
    Double free vulnerability in the gdImageWebPtr function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via large width and height values.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-6912.html">CVE-2016-6912</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6912">SUSE bug 1022284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6912">SUSE bug 1022284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6912">SUSE bug 1022284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6912">SUSE bug 1022284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6912">SUSE bug 1022284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-6912">SUSE bug 1022284</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148800" comment="gd-2.1.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148801" comment="gd-32bit-2.1.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152101" comment="gd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148802" comment="gd-devel-2.1.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153569" comment="gd-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7032</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7032" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7032" source="CVE"/>
    <description>
    sudo_noexec.so in Sudo before 1.8.15 on Linux might allow local users to bypass intended noexec command restrictions via an application that calls the (1) system or (2) popen function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7032.html">CVE-2016-7032</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7032">SUSE bug 1007501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7032">SUSE bug 1007501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7032">SUSE bug 1007766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7032">SUSE bug 1007766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7032">SUSE bug 1007766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7032">SUSE bug 1007766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7032">SUSE bug 1007766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7032">SUSE bug 1011975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7032">SUSE bug 1011976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7032">SUSE bug 1007766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7032">SUSE bug 1007766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7032">SUSE bug 1007766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7032">SUSE bug 1007766</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7032">SUSE bug 1007501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7032">SUSE bug 1007766</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135931" comment="sudo-1.8.10p3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135934" comment="sudo-devel-1.8.10p3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152559" comment="sudo-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136447" comment="sudo-test-1.8.10p3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152560" comment="sudo-test is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7035</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7035" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7035" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7035.html">CVE-2016-7035</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7035">SUSE bug 1007433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7035">SUSE bug 1007433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7035">SUSE bug 1007433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7035">SUSE bug 1007433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7035">SUSE bug 1007433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7035">SUSE bug 1007433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7035">SUSE bug 1007433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7035">SUSE bug 1007433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7035">SUSE bug 1007433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7035">SUSE bug 1007433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7035">SUSE bug 1007433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7035">SUSE bug 1007433</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7035">SUSE bug 1007433</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142445" comment="libpacemaker-devel-1.1.13-23.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153792" comment="libpacemaker-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142446" comment="libpacemaker3-1.1.13-23.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153793" comment="libpacemaker3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142447" comment="pacemaker-1.1.13-23.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153794" comment="pacemaker is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142448" comment="pacemaker-cli-1.1.13-23.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153795" comment="pacemaker-cli is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142449" comment="pacemaker-cts-1.1.13-23.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153796" comment="pacemaker-cts is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142450" comment="pacemaker-remote-1.1.13-23.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153797" comment="pacemaker-remote is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7039</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7039" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7039" source="CVE"/>
    <description>
    The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7039.html">CVE-2016-7039</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1003964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1003964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1003964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1003964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1003964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001486</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1003964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001487</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7039">SUSE bug 1001487</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134991" comment="drbd-8.4.6-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134992" comment="drbd-kmp-default-8.4.6_k4.1.34_33-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134993" comment="drbd-kmp-pv-8.4.6_k4.1.34_33-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134994" comment="drbd-kmp-xen-8.4.6_k4.1.34_33-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134995" comment="hdjmod-1.28-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134996" comment="hdjmod-kmp-default-1.28_k4.1.34_33-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134997" comment="hdjmod-kmp-pae-1.28_k4.1.34_33-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134998" comment="hdjmod-kmp-pv-1.28_k4.1.34_33-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134999" comment="hdjmod-kmp-xen-1.28_k4.1.34_33-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135000" comment="ipset-6.25.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135001" comment="ipset-devel-6.25.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135002" comment="ipset-kmp-default-6.25.1_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135003" comment="ipset-kmp-pae-6.25.1_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135004" comment="ipset-kmp-pv-6.25.1_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135005" comment="ipset-kmp-xen-6.25.1_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135006" comment="kernel-debug-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135007" comment="kernel-debug-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135008" comment="kernel-debug-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135009" comment="kernel-default-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135010" comment="kernel-default-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135011" comment="kernel-default-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135012" comment="kernel-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135013" comment="kernel-docs-4.1.34-33.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135014" comment="kernel-docs-html-4.1.34-33.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135015" comment="kernel-docs-pdf-4.1.34-33.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135016" comment="kernel-ec2-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135017" comment="kernel-ec2-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135018" comment="kernel-ec2-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135019" comment="kernel-macros-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135020" comment="kernel-obs-build-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135021" comment="kernel-obs-qa-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135022" comment="kernel-obs-qa-xen-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135023" comment="kernel-pae-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135024" comment="kernel-pae-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135025" comment="kernel-pae-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135026" comment="kernel-pv-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135027" comment="kernel-pv-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135028" comment="kernel-pv-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135029" comment="kernel-source-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135030" comment="kernel-source-vanilla-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135031" comment="kernel-syms-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135032" comment="kernel-vanilla-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135033" comment="kernel-vanilla-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135034" comment="kernel-xen-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135035" comment="kernel-xen-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135036" comment="kernel-xen-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135037" comment="libipset3-6.25.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135038" comment="lttng-modules-2.7.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135039" comment="lttng-modules-kmp-default-2.7.0_k4.1.34_33-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135040" comment="lttng-modules-kmp-pv-2.7.0_k4.1.34_33-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135041" comment="pcfclock-0.44-268.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135042" comment="pcfclock-kmp-default-0.44_k4.1.34_33-268.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135043" comment="pcfclock-kmp-pae-0.44_k4.1.34_33-268.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135044" comment="pcfclock-kmp-pv-0.44_k4.1.34_33-268.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135045" comment="vhba-kmp-20140928-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135046" comment="vhba-kmp-default-20140928_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135047" comment="vhba-kmp-pae-20140928_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135048" comment="vhba-kmp-pv-20140928_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135049" comment="vhba-kmp-xen-20140928_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7042</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042" source="CVE"/>
    <description>
    The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7042.html">CVE-2016-7042</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7042">SUSE bug 1004517</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136831" comment="drbd-8.4.6-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136832" comment="drbd-kmp-default-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136833" comment="drbd-kmp-pv-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136834" comment="drbd-kmp-xen-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136835" comment="hdjmod-1.28-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136836" comment="hdjmod-kmp-default-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136837" comment="hdjmod-kmp-pae-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136838" comment="hdjmod-kmp-pv-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136839" comment="hdjmod-kmp-xen-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136840" comment="ipset-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136841" comment="ipset-devel-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136842" comment="ipset-kmp-default-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136843" comment="ipset-kmp-pae-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136844" comment="ipset-kmp-pv-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136845" comment="ipset-kmp-xen-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136846" comment="kernel-debug-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136847" comment="kernel-debug-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136848" comment="kernel-debug-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136849" comment="kernel-default-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136850" comment="kernel-default-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136851" comment="kernel-default-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136852" comment="kernel-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136853" comment="kernel-docs-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136854" comment="kernel-docs-html-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136855" comment="kernel-docs-pdf-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136856" comment="kernel-ec2-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136857" comment="kernel-ec2-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136858" comment="kernel-ec2-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136859" comment="kernel-macros-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136860" comment="kernel-obs-build-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136861" comment="kernel-obs-qa-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136862" comment="kernel-pae-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136863" comment="kernel-pae-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136864" comment="kernel-pae-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136865" comment="kernel-pv-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136866" comment="kernel-pv-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136867" comment="kernel-pv-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136868" comment="kernel-source-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136869" comment="kernel-source-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136870" comment="kernel-syms-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136871" comment="kernel-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136872" comment="kernel-vanilla-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136873" comment="kernel-xen-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136874" comment="kernel-xen-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136875" comment="kernel-xen-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136876" comment="libipset3-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136877" comment="lttng-modules-2.7.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136878" comment="lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136879" comment="lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136880" comment="pcfclock-0.44-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136881" comment="pcfclock-kmp-default-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136882" comment="pcfclock-kmp-pae-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136883" comment="pcfclock-kmp-pv-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136884" comment="vhba-kmp-20140928-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136885" comment="vhba-kmp-default-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136886" comment="vhba-kmp-pae-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136887" comment="vhba-kmp-pv-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136888" comment="vhba-kmp-xen-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7044</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7044" source="CVE"/>
    <description>
    The unformat_24bit_color function in the format parsing code in Irssi before 0.8.20, when compiled with true-color enabled, allows remote attackers to cause a denial of service (heap corruption and crash) via an incomplete 24bit color code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7044.html">CVE-2016-7044</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7044">SUSE bug 999199</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7044">SUSE bug 999199</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7044">SUSE bug 999199</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7044">SUSE bug 999199</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7044">SUSE bug 999199</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7044">SUSE bug 999199</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7044">SUSE bug 999199</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133245" comment="irssi-0.8.20-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151315" comment="irssi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133246" comment="irssi-devel-0.8.20-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153798" comment="irssi-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7045</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7045" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7045" source="CVE"/>
    <description>
    The format_send_to_gui function in the format parsing code in Irssi before 0.8.20 allows remote attackers to cause a denial of service (heap corruption and crash) via vectors involving the length of a string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7045.html">CVE-2016-7045</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7045">SUSE bug 999199</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7045">SUSE bug 999199</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7045">SUSE bug 999199</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7045">SUSE bug 999199</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7045">SUSE bug 999199</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7045">SUSE bug 999199</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7045">SUSE bug 999199</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133245" comment="irssi-0.8.20-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151315" comment="irssi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133246" comment="irssi-devel-0.8.20-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153798" comment="irssi-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7052</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7052" source="CVE"/>
    <description>
    crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7052.html">CVE-2016-7052</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7052">SUSE bug 1001148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7052">SUSE bug 1001148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7052">SUSE bug 1001148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7052">SUSE bug 1001148</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7052">SUSE bug 1001148</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133731" comment="nodejs-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133732" comment="nodejs-devel-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133734" comment="nodejs-docs-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133735" comment="npm-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7055</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7055" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7055" source="CVE"/>
    <description>
    There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients that chose the curve will be affected.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7055.html">CVE-2016-7055</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1021641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7055">SUSE bug 1009528</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148694" comment="nodejs-4.7.3-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148695" comment="nodejs-devel-4.7.3-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148696" comment="nodejs-docs-4.7.3-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148697" comment="npm-4.7.3-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7056</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7056" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7056" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7056.html">CVE-2016-7056</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1025347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1025347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1018910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1018910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1018910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1018910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1018910</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7056">SUSE bug 1019334</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148223" comment="libcrypto36-2.3.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152701" comment="libcrypto36 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148224" comment="libcrypto36-32bit-2.3.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152702" comment="libcrypto36-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155163" comment="libcrypto41-2.5.3-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155219" comment="libcrypto41 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155164" comment="libcrypto41-32bit-2.5.3-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155220" comment="libcrypto41-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148476" comment="libopenssl-devel-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148477" comment="libopenssl-devel-32bit-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148478" comment="libopenssl1_0_0-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148479" comment="libopenssl1_0_0-32bit-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148480" comment="libopenssl1_0_0-hmac-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148481" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155165" comment="libressl-2.5.3-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152706" comment="libressl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155166" comment="libressl-devel-2.5.3-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152707" comment="libressl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155167" comment="libressl-devel-32bit-2.5.3-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152708" comment="libressl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155168" comment="libressl-devel-doc-2.5.3-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152709" comment="libressl-devel-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148231" comment="libssl37-2.3.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152712" comment="libssl37 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148232" comment="libssl37-32bit-2.3.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152713" comment="libssl37-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155169" comment="libssl43-2.5.3-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155221" comment="libssl43 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155170" comment="libssl43-32bit-2.5.3-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155222" comment="libssl43-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155171" comment="libtls15-2.5.3-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155223" comment="libtls15 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155172" comment="libtls15-32bit-2.5.3-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155224" comment="libtls15-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148237" comment="libtls9-2.3.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152716" comment="libtls9 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148238" comment="libtls9-32bit-2.3.0-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152717" comment="libtls9-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148482" comment="openssl-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148483" comment="openssl-doc-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7067</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7067" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7067.html">CVE-2016-7067</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7067">SUSE bug 1007455</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135893" comment="monit-5.20.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152136" comment="monit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135894" comment="monit-doc-5.20.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152137" comment="monit-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7068</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7068.html">CVE-2016-7068</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7068">SUSE bug 1018326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7068">SUSE bug 1018326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7068">SUSE bug 1018326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7068">SUSE bug 1018326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7068">SUSE bug 1018326</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7068">SUSE bug 1018326</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147299" comment="pdns-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152980" comment="pdns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147300" comment="pdns-backend-ldap-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152981" comment="pdns-backend-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147301" comment="pdns-backend-lua-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152982" comment="pdns-backend-lua is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147302" comment="pdns-backend-mydns-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152983" comment="pdns-backend-mydns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147303" comment="pdns-backend-mysql-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152984" comment="pdns-backend-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147304" comment="pdns-backend-postgresql-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152985" comment="pdns-backend-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147305" comment="pdns-backend-sqlite3-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152986" comment="pdns-backend-sqlite3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147397" comment="pdns-recursor-3.7.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153799" comment="pdns-recursor is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7072</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7072.html">CVE-2016-7072</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7072">SUSE bug 1018327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7072">SUSE bug 1018327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7072">SUSE bug 1018327</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7072">SUSE bug 1018327</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147299" comment="pdns-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152980" comment="pdns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147300" comment="pdns-backend-ldap-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152981" comment="pdns-backend-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147301" comment="pdns-backend-lua-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152982" comment="pdns-backend-lua is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147302" comment="pdns-backend-mydns-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152983" comment="pdns-backend-mydns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147303" comment="pdns-backend-mysql-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152984" comment="pdns-backend-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147304" comment="pdns-backend-postgresql-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152985" comment="pdns-backend-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147305" comment="pdns-backend-sqlite3-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152986" comment="pdns-backend-sqlite3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7073</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7073.html">CVE-2016-7073</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7073">SUSE bug 1018328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7073">SUSE bug 1018328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7073">SUSE bug 1018328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7073">SUSE bug 1018328</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147299" comment="pdns-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152980" comment="pdns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147300" comment="pdns-backend-ldap-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152981" comment="pdns-backend-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147301" comment="pdns-backend-lua-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152982" comment="pdns-backend-lua is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147302" comment="pdns-backend-mydns-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152983" comment="pdns-backend-mydns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147303" comment="pdns-backend-mysql-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152984" comment="pdns-backend-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147304" comment="pdns-backend-postgresql-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152985" comment="pdns-backend-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147305" comment="pdns-backend-sqlite3-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152986" comment="pdns-backend-sqlite3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7074</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7074.html">CVE-2016-7074</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7074">SUSE bug 1018328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7074">SUSE bug 1018328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7074">SUSE bug 1018328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7074">SUSE bug 1018328</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147299" comment="pdns-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152980" comment="pdns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147300" comment="pdns-backend-ldap-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152981" comment="pdns-backend-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147301" comment="pdns-backend-lua-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152982" comment="pdns-backend-lua is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147302" comment="pdns-backend-mydns-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152983" comment="pdns-backend-mydns is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147303" comment="pdns-backend-mysql-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152984" comment="pdns-backend-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147304" comment="pdns-backend-postgresql-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152985" comment="pdns-backend-postgresql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147305" comment="pdns-backend-sqlite3-3.4.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152986" comment="pdns-backend-sqlite3 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7076</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7076" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7076.html">CVE-2016-7076</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7076">SUSE bug 1007501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7076">SUSE bug 1007501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7076">SUSE bug 1007501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7076">SUSE bug 1007501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7076">SUSE bug 1007501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7076">SUSE bug 1011975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7076">SUSE bug 1011976</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7076">SUSE bug 1007501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7076">SUSE bug 1007501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7076">SUSE bug 1007501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7076">SUSE bug 1007501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7076">SUSE bug 1007501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7076">SUSE bug 1007501</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7076">SUSE bug 1007501</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135931" comment="sudo-1.8.10p3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135934" comment="sudo-devel-1.8.10p3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152559" comment="sudo-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136447" comment="sudo-test-1.8.10p3-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152560" comment="sudo-test is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7092</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7092" source="CVE"/>
    <description>
    The get_page_from_l3e function in arch/x86/mm.c in Xen allows local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7092.html">CVE-2016-7092</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7092">SUSE bug 995785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7092">SUSE bug 995785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7092">SUSE bug 995785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7092">SUSE bug 995785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7092">SUSE bug 995785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7092">SUSE bug 995785</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7093</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7093" source="CVE"/>
    <description>
    Xen 4.5.3, 4.6.3, and 4.7.x allow local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7093.html">CVE-2016-7093</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7093">SUSE bug 995789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7093">SUSE bug 995789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7093">SUSE bug 995789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7093">SUSE bug 995789</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7093">SUSE bug 995789</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7094</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7094" source="CVE"/>
    <description>
    Buffer overflow in Xen 4.7.x and earlier allows local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7094.html">CVE-2016-7094</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7094">SUSE bug 995792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7094">SUSE bug 995792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7094">SUSE bug 995792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7094">SUSE bug 995792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7094">SUSE bug 995792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7094">SUSE bug 995792</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7094">SUSE bug 995792</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134757" comment="xen-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134758" comment="xen-devel-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134759" comment="xen-doc-html-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134760" comment="xen-kmp-default-4.5.3_10_k4.1.31_30-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134761" comment="xen-libs-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134762" comment="xen-libs-32bit-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134763" comment="xen-tools-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134764" comment="xen-tools-domU-4.5.3_10-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7097</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097" source="CVE"/>
    <description>
    The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7097.html">CVE-2016-7097</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 870618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 870618</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 1052256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7097">SUSE bug 1052256</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136831" comment="drbd-8.4.6-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136832" comment="drbd-kmp-default-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136833" comment="drbd-kmp-pv-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136834" comment="drbd-kmp-xen-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136835" comment="hdjmod-1.28-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136836" comment="hdjmod-kmp-default-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136837" comment="hdjmod-kmp-pae-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136838" comment="hdjmod-kmp-pv-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136839" comment="hdjmod-kmp-xen-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136840" comment="ipset-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136841" comment="ipset-devel-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136842" comment="ipset-kmp-default-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136843" comment="ipset-kmp-pae-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136844" comment="ipset-kmp-pv-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136845" comment="ipset-kmp-xen-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136846" comment="kernel-debug-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136847" comment="kernel-debug-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136848" comment="kernel-debug-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136849" comment="kernel-default-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136850" comment="kernel-default-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136851" comment="kernel-default-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136852" comment="kernel-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136853" comment="kernel-docs-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136854" comment="kernel-docs-html-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136855" comment="kernel-docs-pdf-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136856" comment="kernel-ec2-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136857" comment="kernel-ec2-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136858" comment="kernel-ec2-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136859" comment="kernel-macros-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136860" comment="kernel-obs-build-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136861" comment="kernel-obs-qa-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136862" comment="kernel-pae-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136863" comment="kernel-pae-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136864" comment="kernel-pae-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136865" comment="kernel-pv-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136866" comment="kernel-pv-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136867" comment="kernel-pv-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136868" comment="kernel-source-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136869" comment="kernel-source-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136870" comment="kernel-syms-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136871" comment="kernel-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136872" comment="kernel-vanilla-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136873" comment="kernel-xen-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136874" comment="kernel-xen-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136875" comment="kernel-xen-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136876" comment="libipset3-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136877" comment="lttng-modules-2.7.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136878" comment="lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136879" comment="lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136880" comment="pcfclock-0.44-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136881" comment="pcfclock-kmp-default-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136882" comment="pcfclock-kmp-pae-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136883" comment="pcfclock-kmp-pv-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136884" comment="vhba-kmp-20140928-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136885" comment="vhba-kmp-default-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136886" comment="vhba-kmp-pae-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136887" comment="vhba-kmp-pv-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136888" comment="vhba-kmp-xen-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7098</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7098" source="CVE"/>
    <description>
    Race condition in wget 1.17 and earlier, when used in recursive or mirroring mode to download a single file, might allow remote servers to bypass intended access list restrictions by keeping an HTTP connection open.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7098.html">CVE-2016-7098</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7098">SUSE bug 995964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7098">SUSE bug 995964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7098">SUSE bug 995964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7098">SUSE bug 995964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7098">SUSE bug 995964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7098">SUSE bug 995964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7098">SUSE bug 995964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7098">SUSE bug 995964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7098">SUSE bug 995964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7098">SUSE bug 995964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7098">SUSE bug 995964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7098">SUSE bug 995964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7098">SUSE bug 995964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7098">SUSE bug 995964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7098">SUSE bug 995964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7098">SUSE bug 995964</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146259" comment="wget-1.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151442" comment="wget is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7099</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7099" source="CVE"/>
    <description>
    The tls.checkServerIdentity function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 does not properly handle wildcards in name fields of X.509 certificates, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7099.html">CVE-2016-7099</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7099">SUSE bug 1001652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7099">SUSE bug 1001652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7099">SUSE bug 1001652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7099">SUSE bug 1001652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7099">SUSE bug 1001652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7099">SUSE bug 1001652</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133731" comment="nodejs-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133732" comment="nodejs-devel-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133734" comment="nodejs-docs-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133735" comment="npm-4.6.0-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7101</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7101" source="CVE"/>
    <description>
    The SGI coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large row value in an sgi file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7101.html">CVE-2016-7101</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7101">SUSE bug 1001221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7101">SUSE bug 1001221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7101">SUSE bug 1001221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7101">SUSE bug 1001221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7101">SUSE bug 1002207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7101">SUSE bug 1001221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7101">SUSE bug 1001221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7101">SUSE bug 1001221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7116</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7116" source="CVE"/>
    <description>
    Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7116.html">CVE-2016-7116</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7116">SUSE bug 996441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7116">SUSE bug 996441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7116">SUSE bug 996441</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135119" comment="qemu-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135120" comment="qemu-arm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135121" comment="qemu-block-curl-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135122" comment="qemu-block-rbd-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135123" comment="qemu-extra-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135124" comment="qemu-guest-agent-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135125" comment="qemu-ipxe-1.0.0-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135126" comment="qemu-kvm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135127" comment="qemu-lang-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135128" comment="qemu-linux-user-2.3.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135129" comment="qemu-ppc-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135130" comment="qemu-s390-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135131" comment="qemu-seabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135132" comment="qemu-sgabios-8-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135133" comment="qemu-testsuite-2.3.1-19.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135134" comment="qemu-tools-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135135" comment="qemu-vgabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135136" comment="qemu-x86-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7117</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7117" source="CVE"/>
    <description>
    Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7117.html">CVE-2016-7117</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003253</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1057478</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7117">SUSE bug 1003077</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148345" comment="kernel-debug-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148346" comment="kernel-debug-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148347" comment="kernel-debug-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148348" comment="kernel-default-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148349" comment="kernel-default-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148350" comment="kernel-default-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148351" comment="kernel-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148352" comment="kernel-docs-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148353" comment="kernel-docs-html-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148354" comment="kernel-docs-pdf-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148355" comment="kernel-ec2-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148356" comment="kernel-ec2-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148357" comment="kernel-ec2-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148358" comment="kernel-macros-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148359" comment="kernel-obs-build-4.1.38-47.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148360" comment="kernel-obs-qa-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148361" comment="kernel-pae-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148362" comment="kernel-pae-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148363" comment="kernel-pae-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148364" comment="kernel-pv-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148365" comment="kernel-pv-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148366" comment="kernel-pv-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148367" comment="kernel-source-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148368" comment="kernel-source-vanilla-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148369" comment="kernel-syms-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148370" comment="kernel-vanilla-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148371" comment="kernel-vanilla-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148372" comment="kernel-xen-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148373" comment="kernel-xen-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148374" comment="kernel-xen-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7124</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7124" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124" source="CVE"/>
    <description>
    ext/standard/var_unserializer.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles certain invalid objects, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that leads to a (1) __destruct call or (2) magic method call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7124.html">CVE-2016-7124</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7124">SUSE bug 997206</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7124">SUSE bug 997206</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7124">SUSE bug 997206</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7124">SUSE bug 997206</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7124">SUSE bug 997206</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7124">SUSE bug 997206</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7124">SUSE bug 997206</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7125</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125" source="CVE"/>
    <description>
    ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7125.html">CVE-2016-7125</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7125">SUSE bug 997207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7125">SUSE bug 997207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7125">SUSE bug 997207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7125">SUSE bug 997207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7125">SUSE bug 997207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7125">SUSE bug 997207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7125">SUSE bug 997207</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7125">SUSE bug 997207</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7126</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126" source="CVE"/>
    <description>
    The imagetruecolortopalette function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate the number of colors, which allows remote attackers to cause a denial of service (select_colors allocation error and out-of-bounds write) or possibly have unspecified other impact via a large value in the third argument.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7126.html">CVE-2016-7126</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7126">SUSE bug 997208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7126">SUSE bug 997208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7126">SUSE bug 997208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7126">SUSE bug 997208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7126">SUSE bug 997208</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7126">SUSE bug 997208</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7127</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127" source="CVE"/>
    <description>
    The imagegammacorrect function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate gamma values, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by providing different signs for the second and third arguments.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7127.html">CVE-2016-7127</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7127">SUSE bug 997210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7127">SUSE bug 997210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7127">SUSE bug 997210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7127">SUSE bug 997210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7127">SUSE bug 997210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7127">SUSE bug 997210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7127">SUSE bug 997210</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7127">SUSE bug 997210</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7128</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128" source="CVE"/>
    <description>
    The exif_process_IFD_in_TIFF function in ext/exif/exif.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles the case of a thumbnail offset that exceeds the file size, which allows remote attackers to obtain sensitive information from process memory via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7128.html">CVE-2016-7128</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7128">SUSE bug 997211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7128">SUSE bug 997211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7128">SUSE bug 997211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7128">SUSE bug 997211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7128">SUSE bug 997211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7128">SUSE bug 997211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7128">SUSE bug 997211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7128">SUSE bug 997211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7128">SUSE bug 997211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7128">SUSE bug 997211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7128">SUSE bug 997211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7128">SUSE bug 997211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7128">SUSE bug 997211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7128">SUSE bug 997211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7128">SUSE bug 997211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7128">SUSE bug 997211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7128">SUSE bug 997211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7128">SUSE bug 997211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7128">SUSE bug 997211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7128">SUSE bug 997211</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7129</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7129" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129" source="CVE"/>
    <description>
    The php_wddx_process_data function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via an invalid ISO 8601 time value, as demonstrated by a wddx_deserialize call that mishandles a dateTime element in a wddxPacket XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7129.html">CVE-2016-7129</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7129">SUSE bug 997220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7129">SUSE bug 997220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7129">SUSE bug 997220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7129">SUSE bug 997220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7129">SUSE bug 997220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7129">SUSE bug 997220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7129">SUSE bug 997220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7129">SUSE bug 997220</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7129">SUSE bug 997220</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7130</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130" source="CVE"/>
    <description>
    The php_wddx_pop_element function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid base64 binary value, as demonstrated by a wddx_deserialize call that mishandles a binary element in a wddxPacket XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7130.html">CVE-2016-7130</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7130">SUSE bug 997257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7130">SUSE bug 997257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7130">SUSE bug 997257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7130">SUSE bug 997257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7130">SUSE bug 997257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7130">SUSE bug 997257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7130">SUSE bug 997257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7130">SUSE bug 997257</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7130">SUSE bug 997257</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7131</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131" source="CVE"/>
    <description>
    ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via a malformed wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a tag that lacks a &lt; (less than) character.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7131.html">CVE-2016-7131</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7131">SUSE bug 997225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7131">SUSE bug 997225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7131">SUSE bug 997225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7131">SUSE bug 997225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7131">SUSE bug 997225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7131">SUSE bug 997225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7131">SUSE bug 997225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7131">SUSE bug 997225</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7131">SUSE bug 997225</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7132</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132" source="CVE"/>
    <description>
    ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a stray element inside a boolean element, leading to incorrect pop processing.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7132.html">CVE-2016-7132</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7132">SUSE bug 997230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7132">SUSE bug 997230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7132">SUSE bug 997230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7132">SUSE bug 997230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7132">SUSE bug 997230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7132">SUSE bug 997230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7132">SUSE bug 997230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7132">SUSE bug 997230</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7132">SUSE bug 997230</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7134</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7134" source="CVE"/>
    <description>
    ext/curl/interface.c in PHP 7.x before 7.0.10 does not work around a libcurl integer overflow, which allows remote attackers to cause a denial of service (allocation error and heap-based buffer overflow) or possibly have unspecified other impact via a long string that is mishandled in a curl_escape call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7134.html">CVE-2016-7134</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7134">SUSE bug 997248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7134">SUSE bug 997248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7134">SUSE bug 997248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7134">SUSE bug 997248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7134">SUSE bug 997248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7134">SUSE bug 997248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7134">SUSE bug 997248</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7134">SUSE bug 997248</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134656" comment="apache2-mod_php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134657" comment="php5-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134658" comment="php5-bcmath-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134659" comment="php5-bz2-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134660" comment="php5-calendar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134661" comment="php5-ctype-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134662" comment="php5-curl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134663" comment="php5-dba-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134664" comment="php5-devel-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134665" comment="php5-dom-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134666" comment="php5-enchant-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134667" comment="php5-exif-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134668" comment="php5-fastcgi-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134669" comment="php5-fileinfo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134670" comment="php5-firebird-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134671" comment="php5-fpm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134672" comment="php5-ftp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134673" comment="php5-gd-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134674" comment="php5-gettext-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134675" comment="php5-gmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134676" comment="php5-iconv-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134677" comment="php5-imap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134678" comment="php5-intl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134679" comment="php5-json-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134680" comment="php5-ldap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134681" comment="php5-mbstring-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134682" comment="php5-mcrypt-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134683" comment="php5-mssql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134684" comment="php5-mysql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134685" comment="php5-odbc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134686" comment="php5-opcache-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134687" comment="php5-openssl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134688" comment="php5-pcntl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134689" comment="php5-pdo-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134690" comment="php5-pear-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134691" comment="php5-pgsql-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134692" comment="php5-phar-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134693" comment="php5-posix-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134694" comment="php5-pspell-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134695" comment="php5-readline-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134696" comment="php5-shmop-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134697" comment="php5-snmp-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134698" comment="php5-soap-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134699" comment="php5-sockets-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134700" comment="php5-sqlite-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134701" comment="php5-suhosin-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134702" comment="php5-sysvmsg-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134703" comment="php5-sysvsem-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134704" comment="php5-sysvshm-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134705" comment="php5-tidy-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134706" comment="php5-tokenizer-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134707" comment="php5-wddx-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134708" comment="php5-xmlreader-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134709" comment="php5-xmlrpc-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134710" comment="php5-xmlwriter-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134711" comment="php5-xsl-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134712" comment="php5-zip-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134713" comment="php5-zlib-5.5.14-59.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7141</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7141" source="CVE"/>
    <description>
    curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7141.html">CVE-2016-7141</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 991390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 997420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 997420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 997420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 997420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 997420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 997420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 997420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 997420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 997420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 997420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 997420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 997420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 997420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 997420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 991390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 997420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 991390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 991390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 997420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7141">SUSE bug 997420</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134604" comment="curl-7.37.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134605" comment="libcurl-devel-7.37.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134606" comment="libcurl-devel-32bit-7.37.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134607" comment="libcurl4-7.37.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134608" comment="libcurl4-32bit-7.37.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7155</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7155" source="CVE"/>
    <description>
    hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds access or infinite loop, and QEMU process crash) via a crafted page count for descriptor rings.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7155.html">CVE-2016-7155</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7155">SUSE bug 997858</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7155">SUSE bug 997858</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7155">SUSE bug 997858</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7155">SUSE bug 997858</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135119" comment="qemu-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135120" comment="qemu-arm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135121" comment="qemu-block-curl-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135122" comment="qemu-block-rbd-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135123" comment="qemu-extra-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135124" comment="qemu-guest-agent-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135125" comment="qemu-ipxe-1.0.0-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135126" comment="qemu-kvm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135127" comment="qemu-lang-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135128" comment="qemu-linux-user-2.3.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135129" comment="qemu-ppc-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135130" comment="qemu-s390-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135131" comment="qemu-seabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135132" comment="qemu-sgabios-8-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135133" comment="qemu-testsuite-2.3.1-19.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135134" comment="qemu-tools-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135135" comment="qemu-vgabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135136" comment="qemu-x86-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7156</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7156" source="CVE"/>
    <description>
    The pvscsi_convert_sglist function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging an incorrect cast.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7156.html">CVE-2016-7156</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7156">SUSE bug 997859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7156">SUSE bug 997859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7156">SUSE bug 997859</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7156">SUSE bug 997859</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135119" comment="qemu-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135120" comment="qemu-arm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135121" comment="qemu-block-curl-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135122" comment="qemu-block-rbd-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135123" comment="qemu-extra-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135124" comment="qemu-guest-agent-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135125" comment="qemu-ipxe-1.0.0-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135126" comment="qemu-kvm-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135127" comment="qemu-lang-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135128" comment="qemu-linux-user-2.3.1-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135129" comment="qemu-ppc-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135130" comment="qemu-s390-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135131" comment="qemu-seabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135132" comment="qemu-sgabios-8-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135133" comment="qemu-testsuite-2.3.1-19.6 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135134" comment="qemu-tools-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135135" comment="qemu-vgabios-1.8.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135136" comment="qemu-x86-2.3.1-19.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7161</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7161" source="CVE"/>
    <description>
    Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7161.html">CVE-2016-7161</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7161">SUSE bug 1001151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7161">SUSE bug 1001152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7161">SUSE bug 1001151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7161">SUSE bug 1001152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7161">SUSE bug 1001151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7161">SUSE bug 1001151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7161">SUSE bug 1001151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7161">SUSE bug 1001152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7161">SUSE bug 1001151</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142522" comment="qemu-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142523" comment="qemu-arm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142524" comment="qemu-block-curl-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142525" comment="qemu-block-rbd-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142526" comment="qemu-extra-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142527" comment="qemu-guest-agent-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142528" comment="qemu-ipxe-1.0.0-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142529" comment="qemu-kvm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142530" comment="qemu-lang-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142531" comment="qemu-linux-user-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142532" comment="qemu-ppc-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142533" comment="qemu-s390-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142534" comment="qemu-seabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142535" comment="qemu-sgabios-8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142536" comment="qemu-testsuite-2.3.1-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142537" comment="qemu-tools-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142538" comment="qemu-vgabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142539" comment="qemu-x86-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7162</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7162" source="CVE"/>
    <description>
    The _g_file_remove_directory function in file-utils.c in File Roller 3.5.4 through 3.20.2 allows remote attackers to delete arbitrary files via a symlink attack on a folder in an archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7162.html">CVE-2016-7162</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7162">SUSE bug 997822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7162">SUSE bug 997822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7162">SUSE bug 997822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7162">SUSE bug 997822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7162">SUSE bug 997822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7162">SUSE bug 997822</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133518" comment="file-roller-3.16.5-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153800" comment="file-roller is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133519" comment="file-roller-lang-3.16.5-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153801" comment="file-roller-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133520" comment="nautilus-file-roller-3.16.5-7.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153802" comment="nautilus-file-roller is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7167</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7167.html">CVE-2016-7167</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7167">SUSE bug 998760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7167">SUSE bug 998760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7167">SUSE bug 998760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7167">SUSE bug 998760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7167">SUSE bug 998760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7167">SUSE bug 998760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7167">SUSE bug 998760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7167">SUSE bug 998760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7167">SUSE bug 998760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7167">SUSE bug 998760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7167">SUSE bug 998760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7167">SUSE bug 998760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7167">SUSE bug 998760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7167">SUSE bug 998760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7167">SUSE bug 1017590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7167">SUSE bug 1017590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7167">SUSE bug 998760</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7167">SUSE bug 1017590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7167">SUSE bug 1017590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7167">SUSE bug 998760</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135465" comment="curl-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135466" comment="libcurl-devel-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135467" comment="libcurl-devel-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135468" comment="libcurl4-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135469" comment="libcurl4-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7170</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7170" source="CVE"/>
    <description>
    The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7170.html">CVE-2016-7170</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7170">SUSE bug 998516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7170">SUSE bug 998516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7170">SUSE bug 998516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7170">SUSE bug 998516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7170">SUSE bug 998516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7170">SUSE bug 998516</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7170">SUSE bug 998516</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142522" comment="qemu-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142523" comment="qemu-arm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142524" comment="qemu-block-curl-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142525" comment="qemu-block-rbd-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142526" comment="qemu-extra-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142527" comment="qemu-guest-agent-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142528" comment="qemu-ipxe-1.0.0-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142529" comment="qemu-kvm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142530" comment="qemu-lang-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142531" comment="qemu-linux-user-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142532" comment="qemu-ppc-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142533" comment="qemu-s390-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142534" comment="qemu-seabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142535" comment="qemu-sgabios-8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142536" comment="qemu-testsuite-2.3.1-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142537" comment="qemu-tools-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142538" comment="qemu-vgabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142539" comment="qemu-x86-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7411</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411" source="CVE"/>
    <description>
    ext/standard/var_unserializer.re in PHP before 5.6.26 mishandles object-deserialization failures, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via an unserialize call that references a partially constructed object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7411.html">CVE-2016-7411</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7411">SUSE bug 999682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7411">SUSE bug 999682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7411">SUSE bug 999682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7411">SUSE bug 999682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7411">SUSE bug 999682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7411">SUSE bug 999682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7411">SUSE bug 999682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7411">SUSE bug 999682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7411">SUSE bug 999682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7411">SUSE bug 999682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7411">SUSE bug 999682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7411">SUSE bug 999682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7411">SUSE bug 999682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7411">SUSE bug 999682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7411">SUSE bug 999682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7411">SUSE bug 999682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7411">SUSE bug 999682</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7411">SUSE bug 999682</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134873" comment="apache2-mod_php5-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134874" comment="php5-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134875" comment="php5-bcmath-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134876" comment="php5-bz2-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134877" comment="php5-calendar-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134878" comment="php5-ctype-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134879" comment="php5-curl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134880" comment="php5-dba-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134881" comment="php5-devel-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134882" comment="php5-dom-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134883" comment="php5-enchant-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134884" comment="php5-exif-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134885" comment="php5-fastcgi-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134886" comment="php5-fileinfo-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134887" comment="php5-firebird-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134888" comment="php5-fpm-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134889" comment="php5-ftp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134890" comment="php5-gd-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134891" comment="php5-gettext-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134892" comment="php5-gmp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134893" comment="php5-iconv-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134894" comment="php5-imap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134895" comment="php5-intl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134896" comment="php5-json-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134897" comment="php5-ldap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134898" comment="php5-mbstring-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134899" comment="php5-mcrypt-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134900" comment="php5-mssql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134901" comment="php5-mysql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134902" comment="php5-odbc-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134903" comment="php5-opcache-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134904" comment="php5-openssl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134905" comment="php5-pcntl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134906" comment="php5-pdo-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134907" comment="php5-pear-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134908" comment="php5-pgsql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134909" comment="php5-phar-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134910" comment="php5-posix-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134911" comment="php5-pspell-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134912" comment="php5-readline-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134913" comment="php5-shmop-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134914" comment="php5-snmp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134915" comment="php5-soap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134916" comment="php5-sockets-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134917" comment="php5-sqlite-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134918" comment="php5-suhosin-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134919" comment="php5-sysvmsg-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134920" comment="php5-sysvsem-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134921" comment="php5-sysvshm-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134922" comment="php5-tidy-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134923" comment="php5-tokenizer-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134924" comment="php5-wddx-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134925" comment="php5-xmlreader-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134926" comment="php5-xmlrpc-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134927" comment="php5-xmlwriter-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134928" comment="php5-xsl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134929" comment="php5-zip-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134930" comment="php5-zlib-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7412</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412" source="CVE"/>
    <description>
    ext/mysqlnd/mysqlnd_wireprotocol.c in PHP before 5.6.26 and 7.x before 7.0.11 does not verify that a BIT field has the UNSIGNED_FLAG flag, which allows remote MySQL servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted field metadata.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7412.html">CVE-2016-7412</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7412">SUSE bug 999680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7412">SUSE bug 999680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7412">SUSE bug 999680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7412">SUSE bug 999680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7412">SUSE bug 999680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7412">SUSE bug 999680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7412">SUSE bug 999680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7412">SUSE bug 999680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7412">SUSE bug 999680</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134873" comment="apache2-mod_php5-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134874" comment="php5-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134875" comment="php5-bcmath-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134876" comment="php5-bz2-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134877" comment="php5-calendar-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134878" comment="php5-ctype-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134879" comment="php5-curl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134880" comment="php5-dba-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134881" comment="php5-devel-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134882" comment="php5-dom-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134883" comment="php5-enchant-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134884" comment="php5-exif-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134885" comment="php5-fastcgi-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134886" comment="php5-fileinfo-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134887" comment="php5-firebird-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134888" comment="php5-fpm-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134889" comment="php5-ftp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134890" comment="php5-gd-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134891" comment="php5-gettext-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134892" comment="php5-gmp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134893" comment="php5-iconv-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134894" comment="php5-imap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134895" comment="php5-intl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134896" comment="php5-json-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134897" comment="php5-ldap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134898" comment="php5-mbstring-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134899" comment="php5-mcrypt-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134900" comment="php5-mssql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134901" comment="php5-mysql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134902" comment="php5-odbc-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134903" comment="php5-opcache-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134904" comment="php5-openssl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134905" comment="php5-pcntl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134906" comment="php5-pdo-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134907" comment="php5-pear-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134908" comment="php5-pgsql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134909" comment="php5-phar-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134910" comment="php5-posix-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134911" comment="php5-pspell-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134912" comment="php5-readline-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134913" comment="php5-shmop-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134914" comment="php5-snmp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134915" comment="php5-soap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134916" comment="php5-sockets-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134917" comment="php5-sqlite-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134918" comment="php5-suhosin-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134919" comment="php5-sysvmsg-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134920" comment="php5-sysvsem-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134921" comment="php5-sysvshm-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134922" comment="php5-tidy-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134923" comment="php5-tokenizer-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134924" comment="php5-wddx-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134925" comment="php5-xmlreader-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134926" comment="php5-xmlrpc-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134927" comment="php5-xmlwriter-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134928" comment="php5-xsl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134929" comment="php5-zip-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134930" comment="php5-zlib-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7413</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7413" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413" source="CVE"/>
    <description>
    Use-after-free vulnerability in the wddx_stack_destroy function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a wddxPacket XML document that lacks an end-tag for a recordset field element, leading to mishandling in a wddx_deserialize call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7413.html">CVE-2016-7413</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7413">SUSE bug 999679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7413">SUSE bug 999679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7413">SUSE bug 999679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7413">SUSE bug 999679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7413">SUSE bug 999679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7413">SUSE bug 999679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7413">SUSE bug 999679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7413">SUSE bug 999679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7413">SUSE bug 999679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7413">SUSE bug 999679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7413">SUSE bug 999679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7413">SUSE bug 999679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7413">SUSE bug 999679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7413">SUSE bug 999679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7413">SUSE bug 999679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7413">SUSE bug 999679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7413">SUSE bug 999679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7413">SUSE bug 999679</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134873" comment="apache2-mod_php5-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134874" comment="php5-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134875" comment="php5-bcmath-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134876" comment="php5-bz2-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134877" comment="php5-calendar-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134878" comment="php5-ctype-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134879" comment="php5-curl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134880" comment="php5-dba-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134881" comment="php5-devel-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134882" comment="php5-dom-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134883" comment="php5-enchant-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134884" comment="php5-exif-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134885" comment="php5-fastcgi-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134886" comment="php5-fileinfo-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134887" comment="php5-firebird-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134888" comment="php5-fpm-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134889" comment="php5-ftp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134890" comment="php5-gd-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134891" comment="php5-gettext-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134892" comment="php5-gmp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134893" comment="php5-iconv-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134894" comment="php5-imap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134895" comment="php5-intl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134896" comment="php5-json-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134897" comment="php5-ldap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134898" comment="php5-mbstring-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134899" comment="php5-mcrypt-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134900" comment="php5-mssql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134901" comment="php5-mysql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134902" comment="php5-odbc-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134903" comment="php5-opcache-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134904" comment="php5-openssl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134905" comment="php5-pcntl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134906" comment="php5-pdo-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134907" comment="php5-pear-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134908" comment="php5-pgsql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134909" comment="php5-phar-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134910" comment="php5-posix-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134911" comment="php5-pspell-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134912" comment="php5-readline-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134913" comment="php5-shmop-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134914" comment="php5-snmp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134915" comment="php5-soap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134916" comment="php5-sockets-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134917" comment="php5-sqlite-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134918" comment="php5-suhosin-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134919" comment="php5-sysvmsg-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134920" comment="php5-sysvsem-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134921" comment="php5-sysvshm-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134922" comment="php5-tidy-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134923" comment="php5-tokenizer-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134924" comment="php5-wddx-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134925" comment="php5-xmlreader-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134926" comment="php5-xmlrpc-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134927" comment="php5-xmlwriter-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134928" comment="php5-xsl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134929" comment="php5-zip-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134930" comment="php5-zlib-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7414</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414" source="CVE"/>
    <description>
    The ZIP signature-verification feature in PHP before 5.6.26 and 7.x before 7.0.11 does not ensure that the uncompressed_filesize field is large enough, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a crafted PHAR archive, related to ext/phar/util.c and ext/phar/zip.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7414.html">CVE-2016-7414</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7414">SUSE bug 999820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7414">SUSE bug 999820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7414">SUSE bug 999820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7414">SUSE bug 999820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7414">SUSE bug 999820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7414">SUSE bug 999820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7414">SUSE bug 999820</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134873" comment="apache2-mod_php5-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134874" comment="php5-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134875" comment="php5-bcmath-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134876" comment="php5-bz2-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134877" comment="php5-calendar-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134878" comment="php5-ctype-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134879" comment="php5-curl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134880" comment="php5-dba-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134881" comment="php5-devel-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134882" comment="php5-dom-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134883" comment="php5-enchant-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134884" comment="php5-exif-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134885" comment="php5-fastcgi-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134886" comment="php5-fileinfo-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134887" comment="php5-firebird-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134888" comment="php5-fpm-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134889" comment="php5-ftp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134890" comment="php5-gd-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134891" comment="php5-gettext-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134892" comment="php5-gmp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134893" comment="php5-iconv-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134894" comment="php5-imap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134895" comment="php5-intl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134896" comment="php5-json-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134897" comment="php5-ldap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134898" comment="php5-mbstring-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134899" comment="php5-mcrypt-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134900" comment="php5-mssql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134901" comment="php5-mysql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134902" comment="php5-odbc-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134903" comment="php5-opcache-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134904" comment="php5-openssl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134905" comment="php5-pcntl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134906" comment="php5-pdo-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134907" comment="php5-pear-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134908" comment="php5-pgsql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134909" comment="php5-phar-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134910" comment="php5-posix-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134911" comment="php5-pspell-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134912" comment="php5-readline-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134913" comment="php5-shmop-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134914" comment="php5-snmp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134915" comment="php5-soap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134916" comment="php5-sockets-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134917" comment="php5-sqlite-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134918" comment="php5-suhosin-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134919" comment="php5-sysvmsg-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134920" comment="php5-sysvsem-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134921" comment="php5-sysvshm-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134922" comment="php5-tidy-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134923" comment="php5-tokenizer-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134924" comment="php5-wddx-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134925" comment="php5-xmlreader-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134926" comment="php5-xmlrpc-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134927" comment="php5-xmlwriter-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134928" comment="php5-xsl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134929" comment="php5-zip-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134930" comment="php5-zlib-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7416</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416" source="CVE"/>
    <description>
    ext/intl/msgformat/msgformat_format.c in PHP before 5.6.26 and 7.x before 7.0.11 does not properly restrict the locale length provided to the Locale class in the ICU library, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a MessageFormatter::formatMessage call with a long first argument.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7416.html">CVE-2016-7416</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7416">SUSE bug 999685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7416">SUSE bug 999685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7416">SUSE bug 999685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7416">SUSE bug 999685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7416">SUSE bug 999685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7416">SUSE bug 999685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7416">SUSE bug 999685</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134873" comment="apache2-mod_php5-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134874" comment="php5-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134875" comment="php5-bcmath-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134876" comment="php5-bz2-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134877" comment="php5-calendar-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134878" comment="php5-ctype-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134879" comment="php5-curl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134880" comment="php5-dba-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134881" comment="php5-devel-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134882" comment="php5-dom-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134883" comment="php5-enchant-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134884" comment="php5-exif-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134885" comment="php5-fastcgi-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134886" comment="php5-fileinfo-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134887" comment="php5-firebird-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134888" comment="php5-fpm-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134889" comment="php5-ftp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134890" comment="php5-gd-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134891" comment="php5-gettext-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134892" comment="php5-gmp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134893" comment="php5-iconv-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134894" comment="php5-imap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134895" comment="php5-intl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134896" comment="php5-json-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134897" comment="php5-ldap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134898" comment="php5-mbstring-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134899" comment="php5-mcrypt-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134900" comment="php5-mssql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134901" comment="php5-mysql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134902" comment="php5-odbc-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134903" comment="php5-opcache-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134904" comment="php5-openssl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134905" comment="php5-pcntl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134906" comment="php5-pdo-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134907" comment="php5-pear-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134908" comment="php5-pgsql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134909" comment="php5-phar-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134910" comment="php5-posix-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134911" comment="php5-pspell-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134912" comment="php5-readline-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134913" comment="php5-shmop-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134914" comment="php5-snmp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134915" comment="php5-soap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134916" comment="php5-sockets-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134917" comment="php5-sqlite-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134918" comment="php5-suhosin-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134919" comment="php5-sysvmsg-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134920" comment="php5-sysvsem-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134921" comment="php5-sysvshm-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134922" comment="php5-tidy-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134923" comment="php5-tokenizer-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134924" comment="php5-wddx-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134925" comment="php5-xmlreader-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134926" comment="php5-xmlrpc-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134927" comment="php5-xmlwriter-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134928" comment="php5-xsl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134929" comment="php5-zip-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134930" comment="php5-zlib-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7417</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417" source="CVE"/>
    <description>
    ext/spl/spl_array.c in PHP before 5.6.26 and 7.x before 7.0.11 proceeds with SplArray unserialization without validating a return value and data type, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7417.html">CVE-2016-7417</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7417">SUSE bug 999684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7417">SUSE bug 999684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7417">SUSE bug 999684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7417">SUSE bug 999684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7417">SUSE bug 999684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7417">SUSE bug 999684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7417">SUSE bug 999684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7417">SUSE bug 999684</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7417">SUSE bug 999684</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134873" comment="apache2-mod_php5-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134874" comment="php5-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134875" comment="php5-bcmath-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134876" comment="php5-bz2-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134877" comment="php5-calendar-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134878" comment="php5-ctype-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134879" comment="php5-curl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134880" comment="php5-dba-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134881" comment="php5-devel-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134882" comment="php5-dom-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134883" comment="php5-enchant-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134884" comment="php5-exif-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134885" comment="php5-fastcgi-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134886" comment="php5-fileinfo-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134887" comment="php5-firebird-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134888" comment="php5-fpm-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134889" comment="php5-ftp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134890" comment="php5-gd-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134891" comment="php5-gettext-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134892" comment="php5-gmp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134893" comment="php5-iconv-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134894" comment="php5-imap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134895" comment="php5-intl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134896" comment="php5-json-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134897" comment="php5-ldap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134898" comment="php5-mbstring-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134899" comment="php5-mcrypt-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134900" comment="php5-mssql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134901" comment="php5-mysql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134902" comment="php5-odbc-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134903" comment="php5-opcache-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134904" comment="php5-openssl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134905" comment="php5-pcntl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134906" comment="php5-pdo-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134907" comment="php5-pear-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134908" comment="php5-pgsql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134909" comment="php5-phar-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134910" comment="php5-posix-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134911" comment="php5-pspell-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134912" comment="php5-readline-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134913" comment="php5-shmop-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134914" comment="php5-snmp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134915" comment="php5-soap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134916" comment="php5-sockets-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134917" comment="php5-sqlite-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134918" comment="php5-suhosin-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134919" comment="php5-sysvmsg-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134920" comment="php5-sysvsem-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134921" comment="php5-sysvshm-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134922" comment="php5-tidy-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134923" comment="php5-tokenizer-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134924" comment="php5-wddx-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134925" comment="php5-xmlreader-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134926" comment="php5-xmlrpc-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134927" comment="php5-xmlwriter-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134928" comment="php5-xsl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134929" comment="php5-zip-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134930" comment="php5-zlib-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7418</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418" source="CVE"/>
    <description>
    The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service (invalid pointer access and out-of-bounds read) or possibly have unspecified other impact via an incorrect boolean element in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7418.html">CVE-2016-7418</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7418">SUSE bug 999819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7418">SUSE bug 999819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7418">SUSE bug 999819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7418">SUSE bug 999819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7418">SUSE bug 999819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7418">SUSE bug 999819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7418">SUSE bug 999819</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134873" comment="apache2-mod_php5-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134874" comment="php5-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134875" comment="php5-bcmath-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134876" comment="php5-bz2-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134877" comment="php5-calendar-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134878" comment="php5-ctype-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134879" comment="php5-curl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134880" comment="php5-dba-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134881" comment="php5-devel-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134882" comment="php5-dom-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134883" comment="php5-enchant-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134884" comment="php5-exif-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134885" comment="php5-fastcgi-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134886" comment="php5-fileinfo-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134887" comment="php5-firebird-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134888" comment="php5-fpm-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134889" comment="php5-ftp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134890" comment="php5-gd-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134891" comment="php5-gettext-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134892" comment="php5-gmp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134893" comment="php5-iconv-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134894" comment="php5-imap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134895" comment="php5-intl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134896" comment="php5-json-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134897" comment="php5-ldap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134898" comment="php5-mbstring-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134899" comment="php5-mcrypt-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134900" comment="php5-mssql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134901" comment="php5-mysql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134902" comment="php5-odbc-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134903" comment="php5-opcache-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134904" comment="php5-openssl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134905" comment="php5-pcntl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134906" comment="php5-pdo-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134907" comment="php5-pear-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134908" comment="php5-pgsql-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134909" comment="php5-phar-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134910" comment="php5-posix-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134911" comment="php5-pspell-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134912" comment="php5-readline-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134913" comment="php5-shmop-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134914" comment="php5-snmp-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134915" comment="php5-soap-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134916" comment="php5-sockets-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134917" comment="php5-sqlite-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134918" comment="php5-suhosin-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134919" comment="php5-sysvmsg-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134920" comment="php5-sysvsem-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134921" comment="php5-sysvshm-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134922" comment="php5-tidy-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134923" comment="php5-tokenizer-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134924" comment="php5-wddx-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134925" comment="php5-xmlreader-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134926" comment="php5-xmlrpc-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134927" comment="php5-xmlwriter-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134928" comment="php5-xsl-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134929" comment="php5-zip-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134930" comment="php5-zlib-5.5.14-62.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7421</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7421" source="CVE"/>
    <description>
    The pvscsi_ring_pop_req_descr function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit process IO loop to the ring size.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7421.html">CVE-2016-7421</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7421">SUSE bug 999661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7421">SUSE bug 999661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7421">SUSE bug 999661</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7421">SUSE bug 999661</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142522" comment="qemu-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142523" comment="qemu-arm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142524" comment="qemu-block-curl-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142525" comment="qemu-block-rbd-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142526" comment="qemu-extra-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142527" comment="qemu-guest-agent-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142528" comment="qemu-ipxe-1.0.0-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142529" comment="qemu-kvm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142530" comment="qemu-lang-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142531" comment="qemu-linux-user-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142532" comment="qemu-ppc-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142533" comment="qemu-s390-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142534" comment="qemu-seabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142535" comment="qemu-sgabios-8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142536" comment="qemu-testsuite-2.3.1-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142537" comment="qemu-tools-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142538" comment="qemu-vgabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142539" comment="qemu-x86-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7425</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425" source="CVE"/>
    <description>
    The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7425.html">CVE-2016-7425</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7425">SUSE bug 999932</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134991" comment="drbd-8.4.6-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134992" comment="drbd-kmp-default-8.4.6_k4.1.34_33-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134993" comment="drbd-kmp-pv-8.4.6_k4.1.34_33-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134994" comment="drbd-kmp-xen-8.4.6_k4.1.34_33-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134995" comment="hdjmod-1.28-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134996" comment="hdjmod-kmp-default-1.28_k4.1.34_33-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134997" comment="hdjmod-kmp-pae-1.28_k4.1.34_33-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134998" comment="hdjmod-kmp-pv-1.28_k4.1.34_33-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134999" comment="hdjmod-kmp-xen-1.28_k4.1.34_33-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135000" comment="ipset-6.25.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135001" comment="ipset-devel-6.25.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135002" comment="ipset-kmp-default-6.25.1_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135003" comment="ipset-kmp-pae-6.25.1_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135004" comment="ipset-kmp-pv-6.25.1_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135005" comment="ipset-kmp-xen-6.25.1_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135006" comment="kernel-debug-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135007" comment="kernel-debug-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135008" comment="kernel-debug-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135009" comment="kernel-default-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135010" comment="kernel-default-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135011" comment="kernel-default-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135012" comment="kernel-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135013" comment="kernel-docs-4.1.34-33.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135014" comment="kernel-docs-html-4.1.34-33.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135015" comment="kernel-docs-pdf-4.1.34-33.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135016" comment="kernel-ec2-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135017" comment="kernel-ec2-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135018" comment="kernel-ec2-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135019" comment="kernel-macros-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135020" comment="kernel-obs-build-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135021" comment="kernel-obs-qa-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135022" comment="kernel-obs-qa-xen-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135023" comment="kernel-pae-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135024" comment="kernel-pae-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135025" comment="kernel-pae-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135026" comment="kernel-pv-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135027" comment="kernel-pv-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135028" comment="kernel-pv-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135029" comment="kernel-source-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135030" comment="kernel-source-vanilla-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135031" comment="kernel-syms-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135032" comment="kernel-vanilla-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135033" comment="kernel-vanilla-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135034" comment="kernel-xen-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135035" comment="kernel-xen-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135036" comment="kernel-xen-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135037" comment="libipset3-6.25.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135038" comment="lttng-modules-2.7.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135039" comment="lttng-modules-kmp-default-2.7.0_k4.1.34_33-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135040" comment="lttng-modules-kmp-pv-2.7.0_k4.1.34_33-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135041" comment="pcfclock-0.44-268.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135042" comment="pcfclock-kmp-default-0.44_k4.1.34_33-268.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135043" comment="pcfclock-kmp-pae-0.44_k4.1.34_33-268.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135044" comment="pcfclock-kmp-pv-0.44_k4.1.34_33-268.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135045" comment="vhba-kmp-20140928-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135046" comment="vhba-kmp-default-20140928_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135047" comment="vhba-kmp-pae-20140928_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135048" comment="vhba-kmp-pv-20140928_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135049" comment="vhba-kmp-xen-20140928_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7426</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426" source="CVE"/>
    <description>
    NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7426.html">CVE-2016-7426</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7426">SUSE bug 1011406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7426">SUSE bug 1011421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7426">SUSE bug 1011406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7426">SUSE bug 1011406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7426">SUSE bug 1011406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7426">SUSE bug 1011406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7426">SUSE bug 1011406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7426">SUSE bug 1011421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7426">SUSE bug 1011406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7426">SUSE bug 1011406</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145996" comment="ntp-4.2.8p9-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145997" comment="ntp-doc-4.2.8p9-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7427</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7427" source="CVE"/>
    <description>
    The broadcast mode replay prevention functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via a crafted broadcast mode packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7427.html">CVE-2016-7427</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7427">SUSE bug 1011390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7427">SUSE bug 1011421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7427">SUSE bug 1011390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7427">SUSE bug 1011390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7427">SUSE bug 1011390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7427">SUSE bug 1011390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7427">SUSE bug 1011421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7427">SUSE bug 1011390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7427">SUSE bug 1011390</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7427">SUSE bug 1011390</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145996" comment="ntp-4.2.8p9-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145997" comment="ntp-doc-4.2.8p9-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7428</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7428" source="CVE"/>
    <description>
    ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via the poll interval in a broadcast packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7428.html">CVE-2016-7428</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7428">SUSE bug 1011417</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7428">SUSE bug 1011421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7428">SUSE bug 1011417</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7428">SUSE bug 1011417</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7428">SUSE bug 1011417</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7428">SUSE bug 1011417</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7428">SUSE bug 1011417</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7428">SUSE bug 1011421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7428">SUSE bug 1011417</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7428">SUSE bug 1011417</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145996" comment="ntp-4.2.8p9-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145997" comment="ntp-doc-4.2.8p9-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7429</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7429" source="CVE"/>
    <description>
    NTP before 4.2.8p9 changes the peer structure to the interface it receives the response from a source, which allows remote attackers to cause a denial of service (prevent communication with a source) by sending a response for a source to an interface the source does not use.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7429.html">CVE-2016-7429</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7429">SUSE bug 1011404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7429">SUSE bug 1011421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7429">SUSE bug 1011404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7429">SUSE bug 1011404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7429">SUSE bug 1011404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7429">SUSE bug 1011404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7429">SUSE bug 1011404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7429">SUSE bug 1011421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7429">SUSE bug 1011404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7429">SUSE bug 1011404</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145996" comment="ntp-4.2.8p9-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145997" comment="ntp-doc-4.2.8p9-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7431</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7431" source="CVE"/>
    <description>
    NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero.  NOTE: this vulnerability exists because of a CVE-2015-8138 regression.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7431.html">CVE-2016-7431</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7431">SUSE bug 1011395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7431">SUSE bug 1011421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7431">SUSE bug 1011395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7431">SUSE bug 1011395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7431">SUSE bug 1011395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7431">SUSE bug 1011395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7431">SUSE bug 1011395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7431">SUSE bug 1011421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7431">SUSE bug 1011395</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7431">SUSE bug 1011395</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145996" comment="ntp-4.2.8p9-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145997" comment="ntp-doc-4.2.8p9-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7433</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7433" source="CVE"/>
    <description>
    NTP before 4.2.8p9 does not properly perform the initial sync calculations, which allows remote attackers to unspecified impact via unknown vectors, related to a "root distance that did not include the peer dispersion."
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7433.html">CVE-2016-7433</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7433">SUSE bug 1011411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7433">SUSE bug 1011421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7433">SUSE bug 1011411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7433">SUSE bug 1011411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7433">SUSE bug 1011411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7433">SUSE bug 1011411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7433">SUSE bug 1011411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7433">SUSE bug 1011421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7433">SUSE bug 1011411</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7433">SUSE bug 1011411</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145996" comment="ntp-4.2.8p9-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145997" comment="ntp-doc-4.2.8p9-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7434</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7434" source="CVE"/>
    <description>
    The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7434.html">CVE-2016-7434</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7434">SUSE bug 1011398</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145996" comment="ntp-4.2.8p9-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145997" comment="ntp-doc-4.2.8p9-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7440</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" source="CVE"/>
    <description>
    The C software implementation of AES Encryption and Decryption in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover AES keys by leveraging cache-bank timing differences.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7440.html">CVE-2016-7440</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7440">SUSE bug 1005581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7440">SUSE bug 1005581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7440">SUSE bug 1005581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7440">SUSE bug 1005581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7440">SUSE bug 1005581</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7440">SUSE bug 1008318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7440">SUSE bug 1005581</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136615" comment="libmysqlclient-devel-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136616" comment="libmysqlclient18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136617" comment="libmysqlclient18-32bit-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136618" comment="libmysqlclient_r18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136619" comment="libmysqlclient_r18-32bit-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136620" comment="libmysqld-devel-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136621" comment="libmysqld18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136622" comment="mariadb-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136623" comment="mariadb-bench-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136624" comment="mariadb-client-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136625" comment="mariadb-errormessages-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136626" comment="mariadb-test-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136627" comment="mariadb-tools-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7444</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7444" source="CVE"/>
    <description>
    The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7444.html">CVE-2016-7444</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7444">SUSE bug 999646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7444">SUSE bug 999646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7444">SUSE bug 999646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7444">SUSE bug 999646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7444">SUSE bug 999646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7444">SUSE bug 999646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7444">SUSE bug 999646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7444">SUSE bug 999646</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148108" comment="gnutls-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148109" comment="libgnutls-devel-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148110" comment="libgnutls-devel-32bit-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153803" comment="libgnutls-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148111" comment="libgnutls-openssl-devel-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153804" comment="libgnutls-openssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148112" comment="libgnutls-openssl27-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151158" comment="libgnutls-openssl27 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148113" comment="libgnutls28-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151159" comment="libgnutls28 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148114" comment="libgnutls28-32bit-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151160" comment="libgnutls28-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148115" comment="libgnutlsxx-devel-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153805" comment="libgnutlsxx-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148116" comment="libgnutlsxx28-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153806" comment="libgnutlsxx28 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7445</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7445" source="CVE"/>
    <description>
    convert.c in OpenJPEG before 2.1.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors involving the variable s.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7445.html">CVE-2016-7445</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7445">SUSE bug 999817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7445">SUSE bug 999817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7445">SUSE bug 999817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7445">SUSE bug 999817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7445">SUSE bug 999817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7445">SUSE bug 999817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7445">SUSE bug 999817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7445">SUSE bug 999817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7445">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7445">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7445">SUSE bug 1015662</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7445">SUSE bug 999817</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147387" comment="libopenjp2-7-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153807" comment="libopenjp2-7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147388" comment="libopenjp2-7-32bit-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153808" comment="libopenjp2-7-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134629" comment="libopenjpeg1-1.5.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151376" comment="libopenjpeg1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134630" comment="libopenjpeg1-32bit-1.5.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153809" comment="libopenjpeg1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134631" comment="openjpeg-1.5.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153810" comment="openjpeg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134632" comment="openjpeg-devel-1.5.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153811" comment="openjpeg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134633" comment="openjpeg-devel-32bit-1.5.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153812" comment="openjpeg-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147389" comment="openjpeg2-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153813" comment="openjpeg2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147390" comment="openjpeg2-devel-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153814" comment="openjpeg2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7446</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7446" source="CVE"/>
    <description>
    Buffer overflow in the MVG and SVG rendering code in GraphicsMagick 1.3.24 allows remote attackers to have unspecified impact via unknown vectors. Note: This vulnerability exists due to an incomplete patch for CVE-2016-2317.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7446.html">CVE-2016-7446</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7446">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7446">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7446">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7446">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7446">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7446">SUSE bug 999673</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7447</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7447" source="CVE"/>
    <description>
    Heap-based buffer overflow in the EscapeParenthesis function in GraphicsMagick before 1.3.25 allows remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7447.html">CVE-2016-7447</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7447">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7447">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7447">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7447">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7447">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7447">SUSE bug 999673</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7448</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7448" source="CVE"/>
    <description>
    The Utah RLE reader in GraphicsMagick before 1.3.25 allows remote attackers to cause a denial of service (CPU consumption or large memory allocations) via vectors involving the header information and the file size.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7448.html">CVE-2016-7448</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7448">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7448">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7448">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7448">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7448">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7448">SUSE bug 999673</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7449</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7449" source="CVE"/>
    <description>
    The TIFFGetField function in coders/tiff.c in GraphicsMagick 1.3.24 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a file containing an "unterminated" string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7449.html">CVE-2016-7449</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7449">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7449">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7449">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7449">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7449">SUSE bug 999673</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7449">SUSE bug 999673</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7466</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7466" source="CVE"/>
    <description>
    Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7466.html">CVE-2016-7466</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7466">SUSE bug 1000345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7466">SUSE bug 1000345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7466">SUSE bug 1000345</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7466">SUSE bug 1000345</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142522" comment="qemu-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142523" comment="qemu-arm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142524" comment="qemu-block-curl-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142525" comment="qemu-block-rbd-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142526" comment="qemu-extra-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142527" comment="qemu-guest-agent-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142528" comment="qemu-ipxe-1.0.0-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142529" comment="qemu-kvm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142530" comment="qemu-lang-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142531" comment="qemu-linux-user-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142532" comment="qemu-ppc-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142533" comment="qemu-s390-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142534" comment="qemu-seabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142535" comment="qemu-sgabios-8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142536" comment="qemu-testsuite-2.3.1-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142537" comment="qemu-tools-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142538" comment="qemu-vgabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142539" comment="qemu-x86-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7502</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7502" source="CVE"/>
    <description>
    The cavs_idct8_add_c function in libavcodec/cavsdsp.c in FFmpeg before 3.1.4 is vulnerable to reading out-of-bounds memory when decoding with cavs_decode.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7502.html">CVE-2016-7502</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7502">SUSE bug 1003806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7502">SUSE bug 1003806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7502">SUSE bug 1003806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7502">SUSE bug 1003806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7502">SUSE bug 1003806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134954" comment="ffmpeg-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153138" comment="ffmpeg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134955" comment="ffmpeg-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153139" comment="ffmpeg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134956" comment="libavcodec-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134957" comment="libavcodec56-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153141" comment="libavcodec56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134958" comment="libavcodec56-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153142" comment="libavcodec56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134959" comment="libavdevice-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134960" comment="libavdevice56-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153144" comment="libavdevice56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134961" comment="libavdevice56-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153145" comment="libavdevice56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134962" comment="libavfilter-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134963" comment="libavfilter5-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153147" comment="libavfilter5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134964" comment="libavfilter5-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153148" comment="libavfilter5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134965" comment="libavformat-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134966" comment="libavformat56-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153150" comment="libavformat56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134967" comment="libavformat56-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153151" comment="libavformat56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134968" comment="libavresample-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134969" comment="libavresample2-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153153" comment="libavresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134970" comment="libavresample2-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153154" comment="libavresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134971" comment="libavutil-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134972" comment="libavutil54-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153156" comment="libavutil54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134973" comment="libavutil54-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153157" comment="libavutil54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134974" comment="libpostproc-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134975" comment="libpostproc53-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153159" comment="libpostproc53 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134976" comment="libpostproc53-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153160" comment="libpostproc53-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134977" comment="libswresample-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134978" comment="libswresample1-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153162" comment="libswresample1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134979" comment="libswresample1-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153163" comment="libswresample1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134980" comment="libswscale-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134981" comment="libswscale3-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153165" comment="libswscale3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134982" comment="libswscale3-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153166" comment="libswscale3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7513</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7513" source="CVE"/>
    <description>
    Off-by-one error in magick/cache.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7513.html">CVE-2016-7513</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7513">SUSE bug 1000686</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7513">SUSE bug 1000686</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7513">SUSE bug 1000686</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7513">SUSE bug 1000686</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7513">SUSE bug 1000686</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7513">SUSE bug 1000686</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7513">SUSE bug 1000686</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7514</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7514" source="CVE"/>
    <description>
    The ReadPSDChannelPixels function in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7514.html">CVE-2016-7514</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7514">SUSE bug 1000688</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7514">SUSE bug 1000688</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7514">SUSE bug 1000688</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7514">SUSE bug 1000688</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7514">SUSE bug 1000688</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7514">SUSE bug 1000688</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7514">SUSE bug 1000688</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7514">SUSE bug 1000688</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7515</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7515" source="CVE"/>
    <description>
    The ReadRLEImage function in coders/rle.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the number of pixels.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7515.html">CVE-2016-7515</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7515">SUSE bug 1000689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7515">SUSE bug 1000689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7515">SUSE bug 1000689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7515">SUSE bug 1000695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7515">SUSE bug 1000689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7515">SUSE bug 1000689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7515">SUSE bug 1000689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7515">SUSE bug 1000689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7515">SUSE bug 1000689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7515">SUSE bug 1000689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7515">SUSE bug 1000689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7515">SUSE bug 1000689</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7516</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7516" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7516" source="CVE"/>
    <description>
    The ReadVIFFImage function in coders/viff.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted VIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7516.html">CVE-2016-7516</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7516">SUSE bug 1000692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7516">SUSE bug 1000692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7516">SUSE bug 1000693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7516">SUSE bug 1000695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7516">SUSE bug 1000692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7516">SUSE bug 1000692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7516">SUSE bug 1000692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7516">SUSE bug 1000692</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7516">SUSE bug 1000692</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7517</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7517" source="CVE"/>
    <description>
    The EncodeImage function in coders/pict.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PICT file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7517.html">CVE-2016-7517</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7517">SUSE bug 1000693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7517">SUSE bug 1000693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7517">SUSE bug 1000693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7517">SUSE bug 1000693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7517">SUSE bug 1000693</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7517">SUSE bug 1000693</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7518</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7518" source="CVE"/>
    <description>
    The ReadSUNImage function in coders/sun.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted SUN file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7518.html">CVE-2016-7518</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7518">SUSE bug 1000694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7518">SUSE bug 1000694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7518">SUSE bug 1000694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7518">SUSE bug 1000694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7518">SUSE bug 1000694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7518">SUSE bug 1000694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7518">SUSE bug 1000694</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7518">SUSE bug 1028079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7518">SUSE bug 1028079</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7519</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7519" source="CVE"/>
    <description>
    The ReadRLEImage function in coders/rle.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7519.html">CVE-2016-7519</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7519">SUSE bug 1000695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7519">SUSE bug 1000689</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7519">SUSE bug 1000695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7519">SUSE bug 1000695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7519">SUSE bug 1000695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7519">SUSE bug 1000695</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7519">SUSE bug 1000695</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7520</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7520" source="CVE"/>
    <description>
    Heap-based buffer overflow in coders/hdr.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted HDR file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7520.html">CVE-2016-7520</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7520">SUSE bug 1000696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7520">SUSE bug 1000696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7520">SUSE bug 1000696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7520">SUSE bug 1000696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7520">SUSE bug 1000696</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7521</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7521" source="CVE"/>
    <description>
    Heap-based buffer overflow in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7521.html">CVE-2016-7521</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7521">SUSE bug 1000697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7521">SUSE bug 1000697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7521">SUSE bug 1000697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7521">SUSE bug 1000697</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7521">SUSE bug 1000697</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7522</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7522" source="CVE"/>
    <description>
    The ReadPSDImage function in MagickCore/locale.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7522.html">CVE-2016-7522</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7522">SUSE bug 1000698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7522">SUSE bug 1000698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7522">SUSE bug 1000698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7522">SUSE bug 1000698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7522">SUSE bug 1000698</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7522">SUSE bug 1000698</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7523</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7523" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7523.html">CVE-2016-7523</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7523">SUSE bug 1000699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7523">SUSE bug 1000699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7523">SUSE bug 1000699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7523">SUSE bug 1000699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7523">SUSE bug 1000699</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7524</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7524" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7524.html">CVE-2016-7524</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7524">SUSE bug 1000700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7524">SUSE bug 1000700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7524">SUSE bug 1002422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7524">SUSE bug 1000700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7524">SUSE bug 1000700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7524">SUSE bug 1000700</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7525</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7525" source="CVE"/>
    <description>
    Heap-based buffer overflow in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7525.html">CVE-2016-7525</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7525">SUSE bug 1000701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7525">SUSE bug 1000701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7525">SUSE bug 1000701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7525">SUSE bug 1000688</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7525">SUSE bug 1000701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7525">SUSE bug 1000701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7525">SUSE bug 1000701</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7526</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7526" source="CVE"/>
    <description>
    coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7526.html">CVE-2016-7526</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7526">SUSE bug 1000702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7526">SUSE bug 1000436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7526">SUSE bug 1000436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7526">SUSE bug 1000702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7526">SUSE bug 1000702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7526">SUSE bug 1000702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7526">SUSE bug 1000702</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7527</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7527" source="CVE"/>
    <description>
    coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7527.html">CVE-2016-7527</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7527">SUSE bug 1000436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7527">SUSE bug 1000436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7527">SUSE bug 1000436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7527">SUSE bug 1000436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7527">SUSE bug 1000436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7527">SUSE bug 1000436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7527">SUSE bug 1000702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7527">SUSE bug 1000436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7527">SUSE bug 1000436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7527">SUSE bug 1000436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7527">SUSE bug 1000436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7527">SUSE bug 1000436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7527">SUSE bug 1000436</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7528</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7528" source="CVE"/>
    <description>
    The ReadVIFFImage function in coders/viff.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted VIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7528.html">CVE-2016-7528</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7528">SUSE bug 1000434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7528">SUSE bug 1000434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7528">SUSE bug 1000434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7528">SUSE bug 1000434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7528">SUSE bug 1000434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7528">SUSE bug 1000434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7528">SUSE bug 1000434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7528">SUSE bug 1000434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7528">SUSE bug 1000434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7528">SUSE bug 1000434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7528">SUSE bug 1000434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7528">SUSE bug 1000434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7528">SUSE bug 1000434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7528">SUSE bug 1000434</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7529</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7529" source="CVE"/>
    <description>
    coders/xcf.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted XCF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7529.html">CVE-2016-7529</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7529">SUSE bug 1000399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7529">SUSE bug 1000399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7529">SUSE bug 1000399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7529">SUSE bug 1000434</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7529">SUSE bug 1000399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7529">SUSE bug 1000703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7529">SUSE bug 1000399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7529">SUSE bug 1000399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7529">SUSE bug 1000399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7529">SUSE bug 1000399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7529">SUSE bug 1000399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7529">SUSE bug 1000399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7529">SUSE bug 1000399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7529">SUSE bug 1000399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7529">SUSE bug 1000399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7529">SUSE bug 1000399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7529">SUSE bug 1054924</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7530</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7530" source="CVE"/>
    <description>
    The quantum handling code in ImageMagick allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds write) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7530.html">CVE-2016-7530</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7530">SUSE bug 1000703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7530">SUSE bug 1000399</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7530">SUSE bug 1000703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7530">SUSE bug 1000703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7530">SUSE bug 1000703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7530">SUSE bug 1000703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7530">SUSE bug 1000703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7530">SUSE bug 1000703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7530">SUSE bug 1000703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7530">SUSE bug 1000703</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7530">SUSE bug 1054924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7530">SUSE bug 1054924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7530">SUSE bug 1054924</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7531</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7531" source="CVE"/>
    <description>
    MagickCore/memory.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted PDB file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7531.html">CVE-2016-7531</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7531">SUSE bug 1000704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7531">SUSE bug 1000704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7531">SUSE bug 1000704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7531">SUSE bug 1000704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7531">SUSE bug 1000704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7531">SUSE bug 1000704</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7531">SUSE bug 1000704</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7532</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7532" source="CVE"/>
    <description>
    coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7532.html">CVE-2016-7532</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7532">SUSE bug 1000706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7532">SUSE bug 1000706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7532">SUSE bug 1000706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7532">SUSE bug 1000706</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7532">SUSE bug 1000706</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7533</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7533" source="CVE"/>
    <description>
    The ReadWPGImage function in coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WPG file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7533.html">CVE-2016-7533</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7533">SUSE bug 1000707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7533">SUSE bug 1000707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7533">SUSE bug 1000707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7533">SUSE bug 1000707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7533">SUSE bug 1000707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7533">SUSE bug 1000707</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7534</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7534" source="CVE"/>
    <description>
    The generic decoder in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7534.html">CVE-2016-7534</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7534">SUSE bug 1000708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7534">SUSE bug 1000708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7534">SUSE bug 1000708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7534">SUSE bug 1000708</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7534">SUSE bug 1000708</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7535</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7535" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7535" source="CVE"/>
    <description>
    coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted PSD file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7535.html">CVE-2016-7535</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7535">SUSE bug 1000709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7535">SUSE bug 1000709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7535">SUSE bug 1000709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7535">SUSE bug 1000709</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7535">SUSE bug 1000709</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7537</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7537" source="CVE"/>
    <description>
    MagickCore/memory.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted PDB file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7537.html">CVE-2016-7537</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7537">SUSE bug 1000711</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7537">SUSE bug 1000711</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7537">SUSE bug 1000711</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7537">SUSE bug 1000711</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7537">SUSE bug 1000711</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7537">SUSE bug 1000711</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7537">SUSE bug 1000711</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7538</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7538" source="CVE"/>
    <description>
    coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7538.html">CVE-2016-7538</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7538">SUSE bug 1000712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7538">SUSE bug 1000712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7538">SUSE bug 1000712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7538">SUSE bug 1000712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7538">SUSE bug 1000712</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7538">SUSE bug 1000712</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7539</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7539" source="CVE"/>
    <description>
    Memory leak in AcquireVirtualMemory in ImageMagick before 7 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7539.html">CVE-2016-7539</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7539">SUSE bug 1000715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7539">SUSE bug 1000715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7539">SUSE bug 1000715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7539">SUSE bug 1000715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7539">SUSE bug 1000715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7539">SUSE bug 1000715</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7540</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7540" source="CVE"/>
    <description>
    coders/rgf.c in ImageMagick before 6.9.4-10 allows remote attackers to cause a denial of service (assertion failure) by converting an image to rgf format.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7540.html">CVE-2016-7540</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7540">SUSE bug 1000394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7540">SUSE bug 1000394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7540">SUSE bug 1000394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7540">SUSE bug 1000394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7540">SUSE bug 1000394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7540">SUSE bug 1000394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7540">SUSE bug 1000394</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7540">SUSE bug 1000394</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7543</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7543" source="CVE"/>
    <description>
    Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7543.html">CVE-2016-7543</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7543">SUSE bug 1001299</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136190" comment="bash-4.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152102" comment="bash is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136191" comment="bash-devel-4.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152210" comment="bash-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136192" comment="bash-doc-4.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152103" comment="bash-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136193" comment="bash-lang-4.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152104" comment="bash-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136194" comment="bash-loadables-4.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152211" comment="bash-loadables is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136195" comment="libreadline6-6.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152107" comment="libreadline6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136196" comment="libreadline6-32bit-6.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152212" comment="libreadline6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136197" comment="readline-devel-6.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152108" comment="readline-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136198" comment="readline-devel-32bit-6.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152213" comment="readline-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136199" comment="readline-doc-6.2-81.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152109" comment="readline-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7553</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7553" source="CVE"/>
    <description>
    The buf.pl script before 2.20 in Irssi before 0.8.20 uses weak permissions for the scrollbuffer dump file created between upgrades, which might allow local users to obtain sensitive information from private chat conversations by reading the file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7553.html">CVE-2016-7553</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7553">SUSE bug 1001215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7553">SUSE bug 1001215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7553">SUSE bug 1001215</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133245" comment="irssi-0.8.20-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151315" comment="irssi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133246" comment="irssi-devel-0.8.20-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153798" comment="irssi-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7555</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7555" source="CVE"/>
    <description>
    The avi_read_header function in libavformat/avidec.c in FFmpeg before 3.1.4 is vulnerable to memory leak when decoding an AVI file that has a crafted "strh" structure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7555.html">CVE-2016-7555</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7555">SUSE bug 1003806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7555">SUSE bug 1003806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7555">SUSE bug 1003806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7555">SUSE bug 1003806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7555">SUSE bug 1003806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134954" comment="ffmpeg-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153138" comment="ffmpeg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134955" comment="ffmpeg-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153139" comment="ffmpeg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134956" comment="libavcodec-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134957" comment="libavcodec56-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153141" comment="libavcodec56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134958" comment="libavcodec56-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153142" comment="libavcodec56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134959" comment="libavdevice-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134960" comment="libavdevice56-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153144" comment="libavdevice56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134961" comment="libavdevice56-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153145" comment="libavdevice56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134962" comment="libavfilter-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134963" comment="libavfilter5-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153147" comment="libavfilter5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134964" comment="libavfilter5-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153148" comment="libavfilter5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134965" comment="libavformat-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134966" comment="libavformat56-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153150" comment="libavformat56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134967" comment="libavformat56-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153151" comment="libavformat56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134968" comment="libavresample-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134969" comment="libavresample2-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153153" comment="libavresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134970" comment="libavresample2-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153154" comment="libavresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134971" comment="libavutil-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134972" comment="libavutil54-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153156" comment="libavutil54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134973" comment="libavutil54-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153157" comment="libavutil54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134974" comment="libpostproc-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134975" comment="libpostproc53-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153159" comment="libpostproc53 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134976" comment="libpostproc53-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153160" comment="libpostproc53-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134977" comment="libswresample-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134978" comment="libswresample1-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153162" comment="libswresample1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134979" comment="libswresample1-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153163" comment="libswresample1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134980" comment="libswscale-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134981" comment="libswscale3-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153165" comment="libswscale3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134982" comment="libswscale3-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153166" comment="libswscale3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7562</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7562" source="CVE"/>
    <description>
    The ff_draw_pc_font function in libavcodec/cga_data.c in FFmpeg before 3.1.4 allows remote attackers to cause a denial of service (buffer overflow) via a crafted AVI file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7562.html">CVE-2016-7562</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7562">SUSE bug 1003806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7562">SUSE bug 1003806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7562">SUSE bug 1003806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7562">SUSE bug 1003806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7562">SUSE bug 1003806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134954" comment="ffmpeg-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153138" comment="ffmpeg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134955" comment="ffmpeg-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153139" comment="ffmpeg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134956" comment="libavcodec-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134957" comment="libavcodec56-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153141" comment="libavcodec56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134958" comment="libavcodec56-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153142" comment="libavcodec56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134959" comment="libavdevice-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134960" comment="libavdevice56-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153144" comment="libavdevice56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134961" comment="libavdevice56-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153145" comment="libavdevice56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134962" comment="libavfilter-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134963" comment="libavfilter5-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153147" comment="libavfilter5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134964" comment="libavfilter5-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153148" comment="libavfilter5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134965" comment="libavformat-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134966" comment="libavformat56-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153150" comment="libavformat56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134967" comment="libavformat56-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153151" comment="libavformat56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134968" comment="libavresample-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134969" comment="libavresample2-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153153" comment="libavresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134970" comment="libavresample2-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153154" comment="libavresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134971" comment="libavutil-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134972" comment="libavutil54-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153156" comment="libavutil54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134973" comment="libavutil54-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153157" comment="libavutil54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134974" comment="libpostproc-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134975" comment="libpostproc53-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153159" comment="libpostproc53 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134976" comment="libpostproc53-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153160" comment="libpostproc53-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134977" comment="libswresample-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134978" comment="libswresample1-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153162" comment="libswresample1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134979" comment="libswresample1-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153163" comment="libswresample1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134980" comment="libswscale-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134981" comment="libswscale3-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153165" comment="libswscale3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134982" comment="libswscale3-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153166" comment="libswscale3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7567</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7567" source="CVE"/>
    <description>
    Buffer overflow in the SLPFoldWhiteSpace function in common/slp_compare.c in OpenSLP 2.0 allows remote attackers to have unspecified impact via a crafted string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7567.html">CVE-2016-7567</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7567">SUSE bug 1001600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7567">SUSE bug 1001600</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7567">SUSE bug 1074356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7567">SUSE bug 1074356</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7567">SUSE bug 1001600</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131298" comment="openslp-2.0.0-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151507" comment="openslp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131299" comment="openslp-32bit-2.0.0-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153678" comment="openslp-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131843" comment="openslp-devel-2.0.0-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151508" comment="openslp-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131966" comment="openslp-server-2.0.0-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151509" comment="openslp-server is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7568</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568" source="CVE"/>
    <description>
    Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP through 7.0.11, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted imagewebp and imagedestroy calls.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7568.html">CVE-2016-7568</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7568">SUSE bug 1001900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7568">SUSE bug 1001900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7568">SUSE bug 1001900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7568">SUSE bug 1001900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7568">SUSE bug 1001900</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7568">SUSE bug 1001900</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135621" comment="apache2-mod_php5-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135470" comment="gd-2.1.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135471" comment="gd-32bit-2.1.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152101" comment="gd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135472" comment="gd-devel-2.1.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153569" comment="gd-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135622" comment="php5-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135623" comment="php5-bcmath-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135624" comment="php5-bz2-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135625" comment="php5-calendar-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135626" comment="php5-ctype-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135627" comment="php5-curl-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135628" comment="php5-dba-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135629" comment="php5-devel-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135630" comment="php5-dom-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135631" comment="php5-enchant-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135632" comment="php5-exif-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135633" comment="php5-fastcgi-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135634" comment="php5-fileinfo-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135635" comment="php5-firebird-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135636" comment="php5-fpm-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135637" comment="php5-ftp-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135638" comment="php5-gd-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135639" comment="php5-gettext-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135640" comment="php5-gmp-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135641" comment="php5-iconv-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135642" comment="php5-imap-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135643" comment="php5-intl-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135644" comment="php5-json-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135645" comment="php5-ldap-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135646" comment="php5-mbstring-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135647" comment="php5-mcrypt-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135648" comment="php5-mssql-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135649" comment="php5-mysql-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135650" comment="php5-odbc-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135651" comment="php5-opcache-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135652" comment="php5-openssl-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135653" comment="php5-pcntl-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135654" comment="php5-pdo-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135655" comment="php5-pear-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135656" comment="php5-pgsql-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135657" comment="php5-phar-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135658" comment="php5-posix-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135659" comment="php5-pspell-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135660" comment="php5-readline-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135661" comment="php5-shmop-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135662" comment="php5-snmp-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135663" comment="php5-soap-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135664" comment="php5-sockets-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135665" comment="php5-sqlite-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135666" comment="php5-suhosin-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135667" comment="php5-sysvmsg-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135668" comment="php5-sysvsem-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135669" comment="php5-sysvshm-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135670" comment="php5-tidy-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135671" comment="php5-tokenizer-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135672" comment="php5-wddx-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135673" comment="php5-xmlreader-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135674" comment="php5-xmlrpc-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135675" comment="php5-xmlwriter-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135676" comment="php5-xsl-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135677" comment="php5-zip-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135678" comment="php5-zlib-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7777</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7777" source="CVE"/>
    <description>
    Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7777.html">CVE-2016-7777</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7777">SUSE bug 1000106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7777">SUSE bug 1000106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7777">SUSE bug 1000106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7777">SUSE bug 1000106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7777">SUSE bug 1000106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7777">SUSE bug 1000106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7777">SUSE bug 1000106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7777">SUSE bug 1000106</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7777">SUSE bug 1000106</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7785</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7785" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7785" source="CVE"/>
    <description>
    The avi_read_seek function in libavformat/avidec.c in FFmpeg before 3.1.4 allows remote attackers to cause a denial of service (assert fault) via a crafted AVI file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7785.html">CVE-2016-7785</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7785">SUSE bug 1003806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7785">SUSE bug 1003806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7785">SUSE bug 1003806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7785">SUSE bug 1003806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7785">SUSE bug 1003806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134954" comment="ffmpeg-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153138" comment="ffmpeg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134955" comment="ffmpeg-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153139" comment="ffmpeg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134956" comment="libavcodec-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134957" comment="libavcodec56-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153141" comment="libavcodec56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134958" comment="libavcodec56-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153142" comment="libavcodec56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134959" comment="libavdevice-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134960" comment="libavdevice56-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153144" comment="libavdevice56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134961" comment="libavdevice56-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153145" comment="libavdevice56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134962" comment="libavfilter-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134963" comment="libavfilter5-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153147" comment="libavfilter5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134964" comment="libavfilter5-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153148" comment="libavfilter5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134965" comment="libavformat-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134966" comment="libavformat56-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153150" comment="libavformat56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134967" comment="libavformat56-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153151" comment="libavformat56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134968" comment="libavresample-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134969" comment="libavresample2-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153153" comment="libavresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134970" comment="libavresample2-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153154" comment="libavresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134971" comment="libavutil-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134972" comment="libavutil54-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153156" comment="libavutil54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134973" comment="libavutil54-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153157" comment="libavutil54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134974" comment="libpostproc-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134975" comment="libpostproc53-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153159" comment="libpostproc53 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134976" comment="libpostproc53-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153160" comment="libpostproc53-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134977" comment="libswresample-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134978" comment="libswresample1-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153162" comment="libswresample1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134979" comment="libswresample1-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153163" comment="libswresample1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134980" comment="libswscale-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134981" comment="libswscale3-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153165" comment="libswscale3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134982" comment="libswscale3-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153166" comment="libswscale3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7787</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7787" source="CVE"/>
    <description>
    A maliciously crafted command line for kdesu can result in the user only seeing part of the commands that will actually get executed as super user.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7787.html">CVE-2016-7787</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7787">SUSE bug 1001916</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7787">SUSE bug 1001916</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7787">SUSE bug 1001916</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7787">SUSE bug 1001916</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133729" comment="kde-cli-tools5-5.5.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153815" comment="kde-cli-tools5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133730" comment="kde-cli-tools5-lang-5.5.5-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153816" comment="kde-cli-tools5-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7796</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7796" source="CVE"/>
    <description>
    The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7796.html">CVE-2016-7796</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7796">SUSE bug 1001765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7796">SUSE bug 1001765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7796">SUSE bug 1001765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7796">SUSE bug 1001765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7796">SUSE bug 1001765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7796">SUSE bug 1001765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7796">SUSE bug 1001765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7796">SUSE bug 1001765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7796">SUSE bug 1001765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7796">SUSE bug 1001765</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7796">SUSE bug 1001765</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134931" comment="libgudev-1_0-0-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151688" comment="libgudev-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134932" comment="libgudev-1_0-0-32bit-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152577" comment="libgudev-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134933" comment="libgudev-1_0-devel-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151689" comment="libgudev-1_0-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134934" comment="libudev-devel-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151690" comment="libudev-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134935" comment="libudev-mini-devel-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152578" comment="libudev-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134936" comment="libudev-mini1-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152579" comment="libudev-mini1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134937" comment="libudev1-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151691" comment="libudev1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134938" comment="libudev1-32bit-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151692" comment="libudev1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134939" comment="nss-myhostname-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152580" comment="nss-myhostname is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134940" comment="nss-myhostname-32bit-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152581" comment="nss-myhostname-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134941" comment="systemd-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151693" comment="systemd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134942" comment="systemd-32bit-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151694" comment="systemd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134943" comment="systemd-bash-completion-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151695" comment="systemd-bash-completion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134944" comment="systemd-devel-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152582" comment="systemd-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134945" comment="systemd-journal-gateway-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152583" comment="systemd-journal-gateway is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134946" comment="systemd-logger-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151696" comment="systemd-logger is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134947" comment="systemd-mini-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152584" comment="systemd-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134948" comment="systemd-mini-devel-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152585" comment="systemd-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134949" comment="systemd-mini-sysvinit-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152586" comment="systemd-mini-sysvinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134950" comment="systemd-sysvinit-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151697" comment="systemd-sysvinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134951" comment="typelib-1_0-GUdev-1_0-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151698" comment="typelib-1_0-GUdev-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134952" comment="udev-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151699" comment="udev is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134953" comment="udev-mini-210-98.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152587" comment="udev-mini is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7797</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7797" source="CVE"/>
    <description>
    Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7797.html">CVE-2016-7797</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7797">SUSE bug 1002767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7797">SUSE bug 1002767</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7797">SUSE bug 1002767</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142445" comment="libpacemaker-devel-1.1.13-23.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153792" comment="libpacemaker-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142446" comment="libpacemaker3-1.1.13-23.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153793" comment="libpacemaker3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142447" comment="pacemaker-1.1.13-23.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153794" comment="pacemaker is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142448" comment="pacemaker-cli-1.1.13-23.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153795" comment="pacemaker-cli is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142449" comment="pacemaker-cts-1.1.13-23.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153796" comment="pacemaker-cts is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142450" comment="pacemaker-remote-1.1.13-23.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153797" comment="pacemaker-remote is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7799</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7799" source="CVE"/>
    <description>
    MagickCore/profile.c in ImageMagick before 7.0.3-2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7799.html">CVE-2016-7799</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7799">SUSE bug 1002421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7799">SUSE bug 1002421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7799">SUSE bug 1002421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7799">SUSE bug 1002421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7799">SUSE bug 1002421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7799">SUSE bug 1002421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7799">SUSE bug 1002421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7799">SUSE bug 1002421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7799">SUSE bug 1002421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7799">SUSE bug 1002421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7799">SUSE bug 1002421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7799">SUSE bug 1002421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7799">SUSE bug 1002421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7799">SUSE bug 1002421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7799">SUSE bug 1002421</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7800</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800" source="CVE"/>
    <description>
    Integer underflow in the parse8BIM function in coders/meta.c in GraphicsMagick 1.3.25 and earlier allows remote attackers to cause a denial of service (application crash) via a crafted 8BIM chunk, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7800.html">CVE-2016-7800</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7800">SUSE bug 1002422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7800">SUSE bug 1002422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7800">SUSE bug 1002422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7800">SUSE bug 1002422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7800">SUSE bug 1002422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7800">SUSE bug 1002422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7800">SUSE bug 1002422</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7905</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7905" source="CVE"/>
    <description>
    The read_gab2_sub function in libavformat/avidec.c in FFmpeg before 3.1.4 allows remote attackers to cause a denial of service (NULL pointer used) via a crafted AVI file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7905.html">CVE-2016-7905</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7905">SUSE bug 1003806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7905">SUSE bug 1003806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7905">SUSE bug 1003806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7905">SUSE bug 1003806</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7905">SUSE bug 1003806</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134954" comment="ffmpeg-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153138" comment="ffmpeg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134955" comment="ffmpeg-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153139" comment="ffmpeg-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134956" comment="libavcodec-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134957" comment="libavcodec56-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153141" comment="libavcodec56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134958" comment="libavcodec56-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153142" comment="libavcodec56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134959" comment="libavdevice-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134960" comment="libavdevice56-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153144" comment="libavdevice56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134961" comment="libavdevice56-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153145" comment="libavdevice56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134962" comment="libavfilter-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134963" comment="libavfilter5-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153147" comment="libavfilter5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134964" comment="libavfilter5-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153148" comment="libavfilter5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134965" comment="libavformat-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134966" comment="libavformat56-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153150" comment="libavformat56 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134967" comment="libavformat56-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153151" comment="libavformat56-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134968" comment="libavresample-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134969" comment="libavresample2-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153153" comment="libavresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134970" comment="libavresample2-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153154" comment="libavresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134971" comment="libavutil-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134972" comment="libavutil54-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153156" comment="libavutil54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134973" comment="libavutil54-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153157" comment="libavutil54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134974" comment="libpostproc-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134975" comment="libpostproc53-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153159" comment="libpostproc53 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134976" comment="libpostproc53-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153160" comment="libpostproc53-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134977" comment="libswresample-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134978" comment="libswresample1-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153162" comment="libswresample1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134979" comment="libswresample1-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153163" comment="libswresample1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134980" comment="libswscale-devel-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134981" comment="libswscale3-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153165" comment="libswscale3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134982" comment="libswscale3-32bit-2.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153166" comment="libswscale3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7908</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7908" source="CVE"/>
    <description>
    The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7908.html">CVE-2016-7908</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7908">SUSE bug 1002550</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7908">SUSE bug 1002550</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7908">SUSE bug 1003030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7908">SUSE bug 1002550</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7908">SUSE bug 1003030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7908">SUSE bug 1003030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7908">SUSE bug 1002550</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7908">SUSE bug 1002550</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7908">SUSE bug 1002550</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7908">SUSE bug 1002550</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142522" comment="qemu-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142523" comment="qemu-arm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142524" comment="qemu-block-curl-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142525" comment="qemu-block-rbd-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142526" comment="qemu-extra-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142527" comment="qemu-guest-agent-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142528" comment="qemu-ipxe-1.0.0-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142529" comment="qemu-kvm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142530" comment="qemu-lang-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142531" comment="qemu-linux-user-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142532" comment="qemu-ppc-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142533" comment="qemu-s390-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142534" comment="qemu-seabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142535" comment="qemu-sgabios-8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142536" comment="qemu-testsuite-2.3.1-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142537" comment="qemu-tools-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142538" comment="qemu-vgabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142539" comment="qemu-x86-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7909</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7909" source="CVE"/>
    <description>
    The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7909.html">CVE-2016-7909</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7909">SUSE bug 1002557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7909">SUSE bug 1002557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7909">SUSE bug 1003032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7909">SUSE bug 1002557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7909">SUSE bug 1003032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7909">SUSE bug 1003032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7909">SUSE bug 1002557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7909">SUSE bug 1002557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7909">SUSE bug 1002557</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7909">SUSE bug 1002557</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142522" comment="qemu-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142523" comment="qemu-arm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142524" comment="qemu-block-curl-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142525" comment="qemu-block-rbd-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142526" comment="qemu-extra-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142527" comment="qemu-guest-agent-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142528" comment="qemu-ipxe-1.0.0-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142529" comment="qemu-kvm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142530" comment="qemu-lang-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142531" comment="qemu-linux-user-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142532" comment="qemu-ppc-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142533" comment="qemu-s390-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142534" comment="qemu-seabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142535" comment="qemu-sgabios-8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142536" comment="qemu-testsuite-2.3.1-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142537" comment="qemu-tools-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142538" comment="qemu-vgabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142539" comment="qemu-x86-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7913</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7913" source="CVE"/>
    <description>
    The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7913.html">CVE-2016-7913</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7913">SUSE bug 1010478</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7913">SUSE bug 1010478</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7913">SUSE bug 1010478</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7913">SUSE bug 1010478</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7913">SUSE bug 1010478</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7913">SUSE bug 1010478</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7913">SUSE bug 1010478</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7913">SUSE bug 1010478</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7913">SUSE bug 1010478</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7913">SUSE bug 1010478</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7913">SUSE bug 1010478</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7913">SUSE bug 1010478</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7913">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7913">SUSE bug 1010478</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7913">SUSE bug 1010478</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7913">SUSE bug 1010478</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136831" comment="drbd-8.4.6-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136832" comment="drbd-kmp-default-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136833" comment="drbd-kmp-pv-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136834" comment="drbd-kmp-xen-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136835" comment="hdjmod-1.28-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136836" comment="hdjmod-kmp-default-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136837" comment="hdjmod-kmp-pae-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136838" comment="hdjmod-kmp-pv-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136839" comment="hdjmod-kmp-xen-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136840" comment="ipset-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136841" comment="ipset-devel-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136842" comment="ipset-kmp-default-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136843" comment="ipset-kmp-pae-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136844" comment="ipset-kmp-pv-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136845" comment="ipset-kmp-xen-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136846" comment="kernel-debug-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136847" comment="kernel-debug-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136848" comment="kernel-debug-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136849" comment="kernel-default-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136850" comment="kernel-default-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136851" comment="kernel-default-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136852" comment="kernel-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136853" comment="kernel-docs-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136854" comment="kernel-docs-html-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136855" comment="kernel-docs-pdf-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136856" comment="kernel-ec2-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136857" comment="kernel-ec2-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136858" comment="kernel-ec2-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136859" comment="kernel-macros-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136860" comment="kernel-obs-build-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136861" comment="kernel-obs-qa-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136862" comment="kernel-pae-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136863" comment="kernel-pae-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136864" comment="kernel-pae-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136865" comment="kernel-pv-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136866" comment="kernel-pv-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136867" comment="kernel-pv-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136868" comment="kernel-source-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136869" comment="kernel-source-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136870" comment="kernel-syms-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136871" comment="kernel-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136872" comment="kernel-vanilla-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136873" comment="kernel-xen-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136874" comment="kernel-xen-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136875" comment="kernel-xen-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136876" comment="libipset3-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136877" comment="lttng-modules-2.7.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136878" comment="lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136879" comment="lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136880" comment="pcfclock-0.44-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136881" comment="pcfclock-kmp-default-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136882" comment="pcfclock-kmp-pae-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136883" comment="pcfclock-kmp-pv-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136884" comment="vhba-kmp-20140928-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136885" comment="vhba-kmp-default-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136886" comment="vhba-kmp-pae-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136887" comment="vhba-kmp-pv-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136888" comment="vhba-kmp-xen-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7917</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7917" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7917" source="CVE"/>
    <description>
    The nfnetlink_rcv_batch function in net/netfilter/nfnetlink.c in the Linux kernel before 4.5 does not check whether a batch message's length field is large enough, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (infinite loop or out-of-bounds read) by leveraging the CAP_NET_ADMIN capability.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7917.html">CVE-2016-7917</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7917">SUSE bug 1010444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7917">SUSE bug 1010444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7917">SUSE bug 1010444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7917">SUSE bug 1010444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7917">SUSE bug 1010444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7917">SUSE bug 1010444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7917">SUSE bug 1010444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7917">SUSE bug 1010444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7917">SUSE bug 1010444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7917">SUSE bug 1010444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7917">SUSE bug 1010444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7917">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7917">SUSE bug 1010444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7917">SUSE bug 1010444</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7917">SUSE bug 1010444</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148345" comment="kernel-debug-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148346" comment="kernel-debug-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148347" comment="kernel-debug-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148348" comment="kernel-default-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148349" comment="kernel-default-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148350" comment="kernel-default-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148351" comment="kernel-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148352" comment="kernel-docs-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148353" comment="kernel-docs-html-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148354" comment="kernel-docs-pdf-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148355" comment="kernel-ec2-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148356" comment="kernel-ec2-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148357" comment="kernel-ec2-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148358" comment="kernel-macros-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148359" comment="kernel-obs-build-4.1.38-47.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148360" comment="kernel-obs-qa-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148361" comment="kernel-pae-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148362" comment="kernel-pae-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148363" comment="kernel-pae-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148364" comment="kernel-pv-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148365" comment="kernel-pv-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148366" comment="kernel-pv-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148367" comment="kernel-source-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148368" comment="kernel-source-vanilla-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148369" comment="kernel-syms-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148370" comment="kernel-vanilla-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148371" comment="kernel-vanilla-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148372" comment="kernel-xen-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148373" comment="kernel-xen-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148374" comment="kernel-xen-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7922</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7922" source="CVE"/>
    <description>
    The AH parser in tcpdump before 4.9.0 has a buffer overflow in print-ah.c:ah_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7922.html">CVE-2016-7922</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7922">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7922">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7922">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7922">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7922">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7922">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7922">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7923</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7923" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7923" source="CVE"/>
    <description>
    The ARP parser in tcpdump before 4.9.0 has a buffer overflow in print-arp.c:arp_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7923.html">CVE-2016-7923</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7923">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7923">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7923">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7923">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7923">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7923">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7923">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7924</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7924" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7924" source="CVE"/>
    <description>
    The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:oam_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7924.html">CVE-2016-7924</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7924">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7924">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7924">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7924">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7924">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7924">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7924">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7925</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7925" source="CVE"/>
    <description>
    The compressed SLIP parser in tcpdump before 4.9.0 has a buffer overflow in print-sl.c:sl_if_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7925.html">CVE-2016-7925</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7925">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7925">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7925">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7925">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7925">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7925">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7925">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7926</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7926" source="CVE"/>
    <description>
    The Ethernet parser in tcpdump before 4.9.0 has a buffer overflow in print-ether.c:ethertype_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7926.html">CVE-2016-7926</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7926">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7926">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7926">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7926">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7926">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7926">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7926">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7927</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7927" source="CVE"/>
    <description>
    The IEEE 802.11 parser in tcpdump before 4.9.0 has a buffer overflow in print-802_11.c:ieee802_11_radio_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7927.html">CVE-2016-7927</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7927">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7927">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7927">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7927">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7927">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7927">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7927">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7928</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7928" source="CVE"/>
    <description>
    The IPComp parser in tcpdump before 4.9.0 has a buffer overflow in print-ipcomp.c:ipcomp_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7928.html">CVE-2016-7928</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7928">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7928">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7928">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7928">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7928">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7928">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7928">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7929</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7929" source="CVE"/>
    <description>
    The Juniper PPPoE ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-juniper.c:juniper_parse_header().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7929.html">CVE-2016-7929</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7929">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7929">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7929">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7929">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7929">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7929">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7929">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7930</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7930" source="CVE"/>
    <description>
    The LLC/SNAP parser in tcpdump before 4.9.0 has a buffer overflow in print-llc.c:llc_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7930.html">CVE-2016-7930</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7930">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7930">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7930">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7930">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7930">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7930">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7930">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7931</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7931" source="CVE"/>
    <description>
    The MPLS parser in tcpdump before 4.9.0 has a buffer overflow in print-mpls.c:mpls_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7931.html">CVE-2016-7931</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7931">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7931">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7931">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7931">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7931">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7931">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7931">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7932</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7932" source="CVE"/>
    <description>
    The PIM parser in tcpdump before 4.9.0 has a buffer overflow in print-pim.c:pimv2_check_checksum().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7932.html">CVE-2016-7932</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7932">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7932">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7932">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7932">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7932">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7932">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7932">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7933</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7933" source="CVE"/>
    <description>
    The PPP parser in tcpdump before 4.9.0 has a buffer overflow in print-ppp.c:ppp_hdlc_if_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7933.html">CVE-2016-7933</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7933">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7933">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7933">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7933">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7933">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7933">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7933">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7934</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7934" source="CVE"/>
    <description>
    The RTCP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtcp_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7934.html">CVE-2016-7934</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7934">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7934">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7934">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7934">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7934">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7934">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7934">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7934">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7935</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7935" source="CVE"/>
    <description>
    The RTP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtp_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7935.html">CVE-2016-7935</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7935">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7935">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7935">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7935">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7935">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7935">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7935">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7935">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7936</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7936" source="CVE"/>
    <description>
    The UDP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:udp_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7936.html">CVE-2016-7936</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7936">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7936">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7936">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7936">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7936">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7936">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7936">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7937</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7937" source="CVE"/>
    <description>
    The VAT parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:vat_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7937.html">CVE-2016-7937</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7937">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7937">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7937">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7937">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7937">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7937">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7937">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7937">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7938</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7938" source="CVE"/>
    <description>
    The ZeroMQ parser in tcpdump before 4.9.0 has an integer overflow in print-zeromq.c:zmtp1_print_frame().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7938.html">CVE-2016-7938</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7938">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7938">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7938">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7938">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7938">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7938">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7938">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7939</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7939" source="CVE"/>
    <description>
    The GRE parser in tcpdump before 4.9.0 has a buffer overflow in print-gre.c, multiple functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7939.html">CVE-2016-7939</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7939">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7939">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7939">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7939">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7939">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7939">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7939">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7940</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7940" source="CVE"/>
    <description>
    The STP parser in tcpdump before 4.9.0 has a buffer overflow in print-stp.c, multiple functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7940.html">CVE-2016-7940</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7940">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7940">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7940">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7940">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7940">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7940">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7940">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7942</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942" source="CVE"/>
    <description>
    The XGetImage function in X.org libX11 before 1.6.4 might allow remote X servers to gain privileges via vectors involving image type and geometry, which triggers out-of-bounds read operations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7942.html">CVE-2016-7942</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7942">SUSE bug 1002991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7942">SUSE bug 1002991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7942">SUSE bug 1002991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7942">SUSE bug 1002991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7942">SUSE bug 1002991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7942">SUSE bug 1002991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7942">SUSE bug 1002991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7942">SUSE bug 1002991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7942">SUSE bug 1002991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7942">SUSE bug 1002991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7942">SUSE bug 1002991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7942">SUSE bug 1002991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7942">SUSE bug 1002991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7942">SUSE bug 1002991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7942">SUSE bug 1002991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7942">SUSE bug 1002991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7942">SUSE bug 1002991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136715" comment="libX11-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153718" comment="libX11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136716" comment="libX11-6-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136717" comment="libX11-6-32bit-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151818" comment="libX11-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136718" comment="libX11-data-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136719" comment="libX11-devel-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151820" comment="libX11-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136720" comment="libX11-devel-32bit-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153719" comment="libX11-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136721" comment="libX11-xcb1-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136722" comment="libX11-xcb1-32bit-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151822" comment="libX11-xcb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135058" comment="libXfixes-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153720" comment="libXfixes is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135059" comment="libXfixes-devel-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151826" comment="libXfixes-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135060" comment="libXfixes-devel-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153721" comment="libXfixes-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135061" comment="libXfixes3-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151827" comment="libXfixes3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135062" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151828" comment="libXfixes3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136723" comment="libXi-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153722" comment="libXi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136724" comment="libXi-devel-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151829" comment="libXi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136725" comment="libXi-devel-32bit-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153723" comment="libXi-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136726" comment="libXi6-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151830" comment="libXi6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136727" comment="libXi6-32bit-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151831" comment="libXi6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135068" comment="libXrandr-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153724" comment="libXrandr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135069" comment="libXrandr-devel-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151835" comment="libXrandr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135070" comment="libXrandr-devel-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153725" comment="libXrandr-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135071" comment="libXrandr2-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151836" comment="libXrandr2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135072" comment="libXrandr2-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151837" comment="libXrandr2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135073" comment="libXrender-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153726" comment="libXrender is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135074" comment="libXrender-devel-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151838" comment="libXrender-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135075" comment="libXrender-devel-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153727" comment="libXrender-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135076" comment="libXrender1-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151839" comment="libXrender1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135077" comment="libXrender1-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151840" comment="libXrender1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135078" comment="libXtst-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153728" comment="libXtst is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135079" comment="libXtst-devel-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151864" comment="libXtst-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135080" comment="libXtst-devel-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153729" comment="libXtst-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135081" comment="libXtst6-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151865" comment="libXtst6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135082" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153730" comment="libXtst6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135083" comment="libXv-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153731" comment="libXv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135084" comment="libXv-devel-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151843" comment="libXv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135085" comment="libXv-devel-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153732" comment="libXv-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135086" comment="libXv1-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151844" comment="libXv1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135087" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151845" comment="libXv1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135088" comment="libXvMC-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153733" comment="libXvMC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135089" comment="libXvMC-devel-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151846" comment="libXvMC-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135090" comment="libXvMC-devel-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153734" comment="libXvMC-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135091" comment="libXvMC1-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151847" comment="libXvMC1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135092" comment="libXvMC1-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153735" comment="libXvMC1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7944</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944" source="CVE"/>
    <description>
    Integer overflow in X.org libXfixes before 5.0.3 on 32-bit platforms might allow remote X servers to gain privileges via a length value of INT_MAX, which triggers the client to stop reading data and get out of sync.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7944.html">CVE-2016-7944</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7944">SUSE bug 1002995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7944">SUSE bug 1002995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7944">SUSE bug 1002995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7944">SUSE bug 1002995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7944">SUSE bug 1002995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7944">SUSE bug 1002995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7944">SUSE bug 1002995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7944">SUSE bug 1002995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7944">SUSE bug 1002995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7944">SUSE bug 1002995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7944">SUSE bug 1002995</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7944">SUSE bug 1002995</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135050" comment="libX11-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153718" comment="libX11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135051" comment="libX11-6-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135052" comment="libX11-6-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151818" comment="libX11-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135053" comment="libX11-data-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135054" comment="libX11-devel-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151820" comment="libX11-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135055" comment="libX11-devel-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153719" comment="libX11-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135056" comment="libX11-xcb1-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135057" comment="libX11-xcb1-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151822" comment="libX11-xcb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135058" comment="libXfixes-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153720" comment="libXfixes is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135059" comment="libXfixes-devel-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151826" comment="libXfixes-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135060" comment="libXfixes-devel-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153721" comment="libXfixes-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135061" comment="libXfixes3-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151827" comment="libXfixes3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135062" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151828" comment="libXfixes3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135063" comment="libXi-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153722" comment="libXi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135064" comment="libXi-devel-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151829" comment="libXi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135065" comment="libXi-devel-32bit-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153723" comment="libXi-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135066" comment="libXi6-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151830" comment="libXi6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135067" comment="libXi6-32bit-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151831" comment="libXi6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135068" comment="libXrandr-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153724" comment="libXrandr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135069" comment="libXrandr-devel-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151835" comment="libXrandr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135070" comment="libXrandr-devel-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153725" comment="libXrandr-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135071" comment="libXrandr2-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151836" comment="libXrandr2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135072" comment="libXrandr2-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151837" comment="libXrandr2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135073" comment="libXrender-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153726" comment="libXrender is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135074" comment="libXrender-devel-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151838" comment="libXrender-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135075" comment="libXrender-devel-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153727" comment="libXrender-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135076" comment="libXrender1-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151839" comment="libXrender1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135077" comment="libXrender1-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151840" comment="libXrender1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135078" comment="libXtst-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153728" comment="libXtst is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135079" comment="libXtst-devel-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151864" comment="libXtst-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135080" comment="libXtst-devel-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153729" comment="libXtst-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135081" comment="libXtst6-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151865" comment="libXtst6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135082" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153730" comment="libXtst6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135083" comment="libXv-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153731" comment="libXv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135084" comment="libXv-devel-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151843" comment="libXv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135085" comment="libXv-devel-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153732" comment="libXv-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135086" comment="libXv1-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151844" comment="libXv1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135087" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151845" comment="libXv1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135088" comment="libXvMC-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153733" comment="libXvMC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135089" comment="libXvMC-devel-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151846" comment="libXvMC-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135090" comment="libXvMC-devel-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153734" comment="libXvMC-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135091" comment="libXvMC1-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151847" comment="libXvMC1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135092" comment="libXvMC1-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153735" comment="libXvMC1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7945</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7945" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXi before 1.7.7 allow remote X servers to cause a denial of service (out-of-bounds memory access or infinite loop) via vectors involving length fields.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7945.html">CVE-2016-7945</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7945">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7945">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7945">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7945">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7945">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7945">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7945">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7945">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7945">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7945">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7945">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7945">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7945">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7945">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7945">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7945">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7945">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7945">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7945">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7945">SUSE bug 1002998</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136715" comment="libX11-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153718" comment="libX11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136716" comment="libX11-6-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136717" comment="libX11-6-32bit-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151818" comment="libX11-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136718" comment="libX11-data-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136719" comment="libX11-devel-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151820" comment="libX11-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136720" comment="libX11-devel-32bit-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153719" comment="libX11-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136721" comment="libX11-xcb1-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136722" comment="libX11-xcb1-32bit-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151822" comment="libX11-xcb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135058" comment="libXfixes-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153720" comment="libXfixes is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135059" comment="libXfixes-devel-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151826" comment="libXfixes-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135060" comment="libXfixes-devel-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153721" comment="libXfixes-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135061" comment="libXfixes3-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151827" comment="libXfixes3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135062" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151828" comment="libXfixes3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136723" comment="libXi-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153722" comment="libXi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136724" comment="libXi-devel-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151829" comment="libXi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136725" comment="libXi-devel-32bit-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153723" comment="libXi-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136726" comment="libXi6-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151830" comment="libXi6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136727" comment="libXi6-32bit-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151831" comment="libXi6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135068" comment="libXrandr-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153724" comment="libXrandr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135069" comment="libXrandr-devel-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151835" comment="libXrandr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135070" comment="libXrandr-devel-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153725" comment="libXrandr-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135071" comment="libXrandr2-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151836" comment="libXrandr2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135072" comment="libXrandr2-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151837" comment="libXrandr2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135073" comment="libXrender-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153726" comment="libXrender is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135074" comment="libXrender-devel-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151838" comment="libXrender-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135075" comment="libXrender-devel-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153727" comment="libXrender-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135076" comment="libXrender1-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151839" comment="libXrender1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135077" comment="libXrender1-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151840" comment="libXrender1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135078" comment="libXtst-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153728" comment="libXtst is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135079" comment="libXtst-devel-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151864" comment="libXtst-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135080" comment="libXtst-devel-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153729" comment="libXtst-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135081" comment="libXtst6-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151865" comment="libXtst6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135082" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153730" comment="libXtst6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135083" comment="libXv-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153731" comment="libXv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135084" comment="libXv-devel-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151843" comment="libXv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135085" comment="libXv-devel-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153732" comment="libXv-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135086" comment="libXv1-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151844" comment="libXv1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135087" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151845" comment="libXv1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135088" comment="libXvMC-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153733" comment="libXvMC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135089" comment="libXvMC-devel-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151846" comment="libXvMC-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135090" comment="libXvMC-devel-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153734" comment="libXvMC-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135091" comment="libXvMC1-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151847" comment="libXvMC1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135092" comment="libXvMC1-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153735" comment="libXvMC1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7946</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7946" source="CVE"/>
    <description>
    X.org libXi before 1.7.7 allows remote X servers to cause a denial of service (infinite loop) via vectors involving length fields.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7946.html">CVE-2016-7946</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7946">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7946">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7946">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7946">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7946">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7946">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7946">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7946">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7946">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7946">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7946">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7946">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7946">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7946">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7946">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7946">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7946">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7946">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7946">SUSE bug 1002998</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7946">SUSE bug 1002998</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136715" comment="libX11-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153718" comment="libX11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136716" comment="libX11-6-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136717" comment="libX11-6-32bit-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151818" comment="libX11-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136718" comment="libX11-data-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136719" comment="libX11-devel-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151820" comment="libX11-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136720" comment="libX11-devel-32bit-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153719" comment="libX11-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136721" comment="libX11-xcb1-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136722" comment="libX11-xcb1-32bit-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151822" comment="libX11-xcb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135058" comment="libXfixes-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153720" comment="libXfixes is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135059" comment="libXfixes-devel-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151826" comment="libXfixes-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135060" comment="libXfixes-devel-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153721" comment="libXfixes-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135061" comment="libXfixes3-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151827" comment="libXfixes3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135062" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151828" comment="libXfixes3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136723" comment="libXi-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153722" comment="libXi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136724" comment="libXi-devel-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151829" comment="libXi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136725" comment="libXi-devel-32bit-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153723" comment="libXi-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136726" comment="libXi6-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151830" comment="libXi6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136727" comment="libXi6-32bit-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151831" comment="libXi6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135068" comment="libXrandr-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153724" comment="libXrandr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135069" comment="libXrandr-devel-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151835" comment="libXrandr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135070" comment="libXrandr-devel-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153725" comment="libXrandr-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135071" comment="libXrandr2-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151836" comment="libXrandr2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135072" comment="libXrandr2-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151837" comment="libXrandr2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135073" comment="libXrender-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153726" comment="libXrender is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135074" comment="libXrender-devel-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151838" comment="libXrender-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135075" comment="libXrender-devel-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153727" comment="libXrender-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135076" comment="libXrender1-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151839" comment="libXrender1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135077" comment="libXrender1-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151840" comment="libXrender1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135078" comment="libXtst-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153728" comment="libXtst is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135079" comment="libXtst-devel-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151864" comment="libXtst-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135080" comment="libXtst-devel-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153729" comment="libXtst-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135081" comment="libXtst6-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151865" comment="libXtst6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135082" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153730" comment="libXtst6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135083" comment="libXv-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153731" comment="libXv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135084" comment="libXv-devel-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151843" comment="libXv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135085" comment="libXv-devel-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153732" comment="libXv-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135086" comment="libXv1-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151844" comment="libXv1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135087" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151845" comment="libXv1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135088" comment="libXvMC-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153733" comment="libXvMC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135089" comment="libXvMC-devel-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151846" comment="libXvMC-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135090" comment="libXvMC-devel-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153734" comment="libXvMC-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135091" comment="libXvMC1-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151847" comment="libXvMC1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135092" comment="libXvMC1-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153735" comment="libXvMC1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7947</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7947" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXrandr before 1.5.1 allow remote X servers to trigger out-of-bounds write operations via a crafted response.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7947.html">CVE-2016-7947</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7947">SUSE bug 1003000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7947">SUSE bug 1003000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7947">SUSE bug 1003000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7947">SUSE bug 1003000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7947">SUSE bug 1003000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7947">SUSE bug 1003000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7947">SUSE bug 1003000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7947">SUSE bug 1003000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7947">SUSE bug 1003000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7947">SUSE bug 1003000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7947">SUSE bug 1003000</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136715" comment="libX11-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153718" comment="libX11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136716" comment="libX11-6-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136717" comment="libX11-6-32bit-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151818" comment="libX11-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136718" comment="libX11-data-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136719" comment="libX11-devel-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151820" comment="libX11-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136720" comment="libX11-devel-32bit-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153719" comment="libX11-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136721" comment="libX11-xcb1-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136722" comment="libX11-xcb1-32bit-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151822" comment="libX11-xcb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135058" comment="libXfixes-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153720" comment="libXfixes is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135059" comment="libXfixes-devel-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151826" comment="libXfixes-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135060" comment="libXfixes-devel-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153721" comment="libXfixes-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135061" comment="libXfixes3-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151827" comment="libXfixes3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135062" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151828" comment="libXfixes3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136723" comment="libXi-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153722" comment="libXi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136724" comment="libXi-devel-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151829" comment="libXi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136725" comment="libXi-devel-32bit-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153723" comment="libXi-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136726" comment="libXi6-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151830" comment="libXi6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136727" comment="libXi6-32bit-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151831" comment="libXi6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135068" comment="libXrandr-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153724" comment="libXrandr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135069" comment="libXrandr-devel-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151835" comment="libXrandr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135070" comment="libXrandr-devel-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153725" comment="libXrandr-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135071" comment="libXrandr2-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151836" comment="libXrandr2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135072" comment="libXrandr2-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151837" comment="libXrandr2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135073" comment="libXrender-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153726" comment="libXrender is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135074" comment="libXrender-devel-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151838" comment="libXrender-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135075" comment="libXrender-devel-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153727" comment="libXrender-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135076" comment="libXrender1-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151839" comment="libXrender1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135077" comment="libXrender1-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151840" comment="libXrender1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135078" comment="libXtst-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153728" comment="libXtst is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135079" comment="libXtst-devel-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151864" comment="libXtst-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135080" comment="libXtst-devel-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153729" comment="libXtst-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135081" comment="libXtst6-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151865" comment="libXtst6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135082" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153730" comment="libXtst6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135083" comment="libXv-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153731" comment="libXv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135084" comment="libXv-devel-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151843" comment="libXv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135085" comment="libXv-devel-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153732" comment="libXv-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135086" comment="libXv1-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151844" comment="libXv1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135087" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151845" comment="libXv1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135088" comment="libXvMC-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153733" comment="libXvMC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135089" comment="libXvMC-devel-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151846" comment="libXvMC-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135090" comment="libXvMC-devel-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153734" comment="libXvMC-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135091" comment="libXvMC1-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151847" comment="libXvMC1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135092" comment="libXvMC1-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153735" comment="libXvMC1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7948</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7948" source="CVE"/>
    <description>
    X.org libXrandr before 1.5.1 allows remote X servers to trigger out-of-bounds write operations by leveraging mishandling of reply data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7948.html">CVE-2016-7948</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7948">SUSE bug 1003000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7948">SUSE bug 1003000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7948">SUSE bug 1003000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7948">SUSE bug 1003000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7948">SUSE bug 1003000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7948">SUSE bug 1003000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7948">SUSE bug 1003000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7948">SUSE bug 1003000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7948">SUSE bug 1003000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7948">SUSE bug 1003000</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7948">SUSE bug 1003000</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136715" comment="libX11-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153718" comment="libX11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136716" comment="libX11-6-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136717" comment="libX11-6-32bit-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151818" comment="libX11-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136718" comment="libX11-data-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136719" comment="libX11-devel-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151820" comment="libX11-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136720" comment="libX11-devel-32bit-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153719" comment="libX11-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136721" comment="libX11-xcb1-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136722" comment="libX11-xcb1-32bit-1.6.3-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151822" comment="libX11-xcb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135058" comment="libXfixes-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153720" comment="libXfixes is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135059" comment="libXfixes-devel-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151826" comment="libXfixes-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135060" comment="libXfixes-devel-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153721" comment="libXfixes-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135061" comment="libXfixes3-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151827" comment="libXfixes3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135062" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151828" comment="libXfixes3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136723" comment="libXi-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153722" comment="libXi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136724" comment="libXi-devel-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151829" comment="libXi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136725" comment="libXi-devel-32bit-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153723" comment="libXi-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136726" comment="libXi6-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151830" comment="libXi6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136727" comment="libXi6-32bit-1.7.5-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151831" comment="libXi6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135068" comment="libXrandr-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153724" comment="libXrandr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135069" comment="libXrandr-devel-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151835" comment="libXrandr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135070" comment="libXrandr-devel-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153725" comment="libXrandr-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135071" comment="libXrandr2-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151836" comment="libXrandr2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135072" comment="libXrandr2-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151837" comment="libXrandr2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135073" comment="libXrender-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153726" comment="libXrender is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135074" comment="libXrender-devel-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151838" comment="libXrender-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135075" comment="libXrender-devel-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153727" comment="libXrender-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135076" comment="libXrender1-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151839" comment="libXrender1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135077" comment="libXrender1-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151840" comment="libXrender1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135078" comment="libXtst-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153728" comment="libXtst is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135079" comment="libXtst-devel-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151864" comment="libXtst-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135080" comment="libXtst-devel-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153729" comment="libXtst-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135081" comment="libXtst6-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151865" comment="libXtst6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135082" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153730" comment="libXtst6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135083" comment="libXv-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153731" comment="libXv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135084" comment="libXv-devel-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151843" comment="libXv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135085" comment="libXv-devel-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153732" comment="libXv-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135086" comment="libXv1-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151844" comment="libXv1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135087" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151845" comment="libXv1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135088" comment="libXvMC-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153733" comment="libXvMC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135089" comment="libXvMC-devel-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151846" comment="libXvMC-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135090" comment="libXvMC-devel-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153734" comment="libXvMC-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135091" comment="libXvMC1-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151847" comment="libXvMC1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135092" comment="libXvMC1-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153735" comment="libXvMC1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7949</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7949" source="CVE"/>
    <description>
    Multiple buffer overflows in the (1) XvQueryAdaptors and (2) XvQueryEncodings functions in X.org libXrender before 0.9.10 allow remote X servers to trigger out-of-bounds write operations via vectors involving length fields.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7949.html">CVE-2016-7949</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7949">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7949">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7949">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7949">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7949">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7949">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7949">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7949">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7949">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7949">SUSE bug 1015442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7949">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7949">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7949">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7949">SUSE bug 1003002</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135050" comment="libX11-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153718" comment="libX11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135051" comment="libX11-6-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135052" comment="libX11-6-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151818" comment="libX11-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135053" comment="libX11-data-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135054" comment="libX11-devel-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151820" comment="libX11-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135055" comment="libX11-devel-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153719" comment="libX11-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135056" comment="libX11-xcb1-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135057" comment="libX11-xcb1-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151822" comment="libX11-xcb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135058" comment="libXfixes-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153720" comment="libXfixes is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135059" comment="libXfixes-devel-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151826" comment="libXfixes-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135060" comment="libXfixes-devel-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153721" comment="libXfixes-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135061" comment="libXfixes3-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151827" comment="libXfixes3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135062" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151828" comment="libXfixes3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135063" comment="libXi-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153722" comment="libXi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135064" comment="libXi-devel-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151829" comment="libXi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135065" comment="libXi-devel-32bit-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153723" comment="libXi-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135066" comment="libXi6-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151830" comment="libXi6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135067" comment="libXi6-32bit-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151831" comment="libXi6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135068" comment="libXrandr-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153724" comment="libXrandr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135069" comment="libXrandr-devel-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151835" comment="libXrandr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135070" comment="libXrandr-devel-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153725" comment="libXrandr-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135071" comment="libXrandr2-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151836" comment="libXrandr2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135072" comment="libXrandr2-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151837" comment="libXrandr2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135073" comment="libXrender-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153726" comment="libXrender is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135074" comment="libXrender-devel-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151838" comment="libXrender-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135075" comment="libXrender-devel-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153727" comment="libXrender-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135076" comment="libXrender1-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151839" comment="libXrender1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135077" comment="libXrender1-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151840" comment="libXrender1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135078" comment="libXtst-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153728" comment="libXtst is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135079" comment="libXtst-devel-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151864" comment="libXtst-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135080" comment="libXtst-devel-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153729" comment="libXtst-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135081" comment="libXtst6-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151865" comment="libXtst6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135082" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153730" comment="libXtst6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135083" comment="libXv-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153731" comment="libXv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135084" comment="libXv-devel-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151843" comment="libXv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135085" comment="libXv-devel-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153732" comment="libXv-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135086" comment="libXv1-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151844" comment="libXv1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135087" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151845" comment="libXv1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135088" comment="libXvMC-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153733" comment="libXvMC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135089" comment="libXvMC-devel-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151846" comment="libXvMC-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135090" comment="libXvMC-devel-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153734" comment="libXvMC-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135091" comment="libXvMC1-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151847" comment="libXvMC1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135092" comment="libXvMC1-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153735" comment="libXvMC1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7950</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7950" source="CVE"/>
    <description>
    The XRenderQueryFilters function in X.org libXrender before 0.9.10 allows remote X servers to trigger out-of-bounds write operations via vectors involving filter name lengths.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7950.html">CVE-2016-7950</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7950">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7950">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7950">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7950">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7950">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7950">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7950">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7950">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7950">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7950">SUSE bug 1015442</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7950">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7950">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7950">SUSE bug 1003002</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7950">SUSE bug 1003002</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135050" comment="libX11-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153718" comment="libX11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135051" comment="libX11-6-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135052" comment="libX11-6-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151818" comment="libX11-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135053" comment="libX11-data-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135054" comment="libX11-devel-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151820" comment="libX11-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135055" comment="libX11-devel-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153719" comment="libX11-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135056" comment="libX11-xcb1-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135057" comment="libX11-xcb1-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151822" comment="libX11-xcb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135058" comment="libXfixes-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153720" comment="libXfixes is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135059" comment="libXfixes-devel-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151826" comment="libXfixes-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135060" comment="libXfixes-devel-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153721" comment="libXfixes-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135061" comment="libXfixes3-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151827" comment="libXfixes3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135062" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151828" comment="libXfixes3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135063" comment="libXi-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153722" comment="libXi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135064" comment="libXi-devel-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151829" comment="libXi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135065" comment="libXi-devel-32bit-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153723" comment="libXi-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135066" comment="libXi6-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151830" comment="libXi6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135067" comment="libXi6-32bit-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151831" comment="libXi6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135068" comment="libXrandr-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153724" comment="libXrandr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135069" comment="libXrandr-devel-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151835" comment="libXrandr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135070" comment="libXrandr-devel-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153725" comment="libXrandr-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135071" comment="libXrandr2-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151836" comment="libXrandr2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135072" comment="libXrandr2-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151837" comment="libXrandr2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135073" comment="libXrender-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153726" comment="libXrender is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135074" comment="libXrender-devel-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151838" comment="libXrender-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135075" comment="libXrender-devel-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153727" comment="libXrender-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135076" comment="libXrender1-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151839" comment="libXrender1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135077" comment="libXrender1-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151840" comment="libXrender1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135078" comment="libXtst-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153728" comment="libXtst is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135079" comment="libXtst-devel-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151864" comment="libXtst-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135080" comment="libXtst-devel-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153729" comment="libXtst-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135081" comment="libXtst6-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151865" comment="libXtst6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135082" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153730" comment="libXtst6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135083" comment="libXv-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153731" comment="libXv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135084" comment="libXv-devel-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151843" comment="libXv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135085" comment="libXv-devel-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153732" comment="libXv-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135086" comment="libXv1-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151844" comment="libXv1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135087" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151845" comment="libXv1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135088" comment="libXvMC-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153733" comment="libXvMC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135089" comment="libXvMC-devel-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151846" comment="libXvMC-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135090" comment="libXvMC-devel-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153734" comment="libXvMC-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135091" comment="libXvMC1-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151847" comment="libXvMC1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135092" comment="libXvMC1-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153735" comment="libXvMC1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7951</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7951" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7951" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXtst before 1.2.3 allow remote X servers to trigger out-of-bounds memory access operations by leveraging the lack of range checks.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7951.html">CVE-2016-7951</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7951">SUSE bug 1003012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7951">SUSE bug 1003012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7951">SUSE bug 1003012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7951">SUSE bug 1003012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7951">SUSE bug 1003012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7951">SUSE bug 1003012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7951">SUSE bug 1003012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7951">SUSE bug 1003012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7951">SUSE bug 1003012</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135050" comment="libX11-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153718" comment="libX11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135051" comment="libX11-6-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135052" comment="libX11-6-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151818" comment="libX11-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135053" comment="libX11-data-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135054" comment="libX11-devel-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151820" comment="libX11-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135055" comment="libX11-devel-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153719" comment="libX11-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135056" comment="libX11-xcb1-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135057" comment="libX11-xcb1-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151822" comment="libX11-xcb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135058" comment="libXfixes-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153720" comment="libXfixes is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135059" comment="libXfixes-devel-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151826" comment="libXfixes-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135060" comment="libXfixes-devel-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153721" comment="libXfixes-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135061" comment="libXfixes3-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151827" comment="libXfixes3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135062" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151828" comment="libXfixes3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135063" comment="libXi-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153722" comment="libXi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135064" comment="libXi-devel-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151829" comment="libXi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135065" comment="libXi-devel-32bit-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153723" comment="libXi-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135066" comment="libXi6-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151830" comment="libXi6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135067" comment="libXi6-32bit-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151831" comment="libXi6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135068" comment="libXrandr-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153724" comment="libXrandr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135069" comment="libXrandr-devel-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151835" comment="libXrandr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135070" comment="libXrandr-devel-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153725" comment="libXrandr-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135071" comment="libXrandr2-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151836" comment="libXrandr2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135072" comment="libXrandr2-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151837" comment="libXrandr2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135073" comment="libXrender-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153726" comment="libXrender is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135074" comment="libXrender-devel-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151838" comment="libXrender-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135075" comment="libXrender-devel-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153727" comment="libXrender-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135076" comment="libXrender1-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151839" comment="libXrender1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135077" comment="libXrender1-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151840" comment="libXrender1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135078" comment="libXtst-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153728" comment="libXtst is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135079" comment="libXtst-devel-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151864" comment="libXtst-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135080" comment="libXtst-devel-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153729" comment="libXtst-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135081" comment="libXtst6-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151865" comment="libXtst6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135082" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153730" comment="libXtst6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135083" comment="libXv-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153731" comment="libXv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135084" comment="libXv-devel-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151843" comment="libXv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135085" comment="libXv-devel-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153732" comment="libXv-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135086" comment="libXv1-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151844" comment="libXv1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135087" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151845" comment="libXv1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135088" comment="libXvMC-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153733" comment="libXvMC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135089" comment="libXvMC-devel-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151846" comment="libXvMC-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135090" comment="libXvMC-devel-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153734" comment="libXvMC-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135091" comment="libXvMC1-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151847" comment="libXvMC1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135092" comment="libXvMC1-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153735" comment="libXvMC1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7952</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7952" source="CVE"/>
    <description>
    X.org libXtst before 1.2.3 allows remote X servers to cause a denial of service (infinite loop) via a reply in the (1) XRecordStartOfData, (2) XRecordEndOfData, or (3) XRecordClientDied category without a client sequence and with attached data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7952.html">CVE-2016-7952</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7952">SUSE bug 1003012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7952">SUSE bug 1003012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7952">SUSE bug 1003012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7952">SUSE bug 1003012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7952">SUSE bug 1003012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7952">SUSE bug 1003012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7952">SUSE bug 1003012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7952">SUSE bug 1003012</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7952">SUSE bug 1003012</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135050" comment="libX11-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153718" comment="libX11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135051" comment="libX11-6-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135052" comment="libX11-6-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151818" comment="libX11-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135053" comment="libX11-data-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135054" comment="libX11-devel-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151820" comment="libX11-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135055" comment="libX11-devel-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153719" comment="libX11-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135056" comment="libX11-xcb1-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135057" comment="libX11-xcb1-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151822" comment="libX11-xcb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135058" comment="libXfixes-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153720" comment="libXfixes is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135059" comment="libXfixes-devel-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151826" comment="libXfixes-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135060" comment="libXfixes-devel-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153721" comment="libXfixes-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135061" comment="libXfixes3-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151827" comment="libXfixes3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135062" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151828" comment="libXfixes3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135063" comment="libXi-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153722" comment="libXi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135064" comment="libXi-devel-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151829" comment="libXi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135065" comment="libXi-devel-32bit-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153723" comment="libXi-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135066" comment="libXi6-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151830" comment="libXi6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135067" comment="libXi6-32bit-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151831" comment="libXi6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135068" comment="libXrandr-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153724" comment="libXrandr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135069" comment="libXrandr-devel-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151835" comment="libXrandr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135070" comment="libXrandr-devel-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153725" comment="libXrandr-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135071" comment="libXrandr2-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151836" comment="libXrandr2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135072" comment="libXrandr2-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151837" comment="libXrandr2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135073" comment="libXrender-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153726" comment="libXrender is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135074" comment="libXrender-devel-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151838" comment="libXrender-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135075" comment="libXrender-devel-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153727" comment="libXrender-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135076" comment="libXrender1-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151839" comment="libXrender1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135077" comment="libXrender1-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151840" comment="libXrender1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135078" comment="libXtst-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153728" comment="libXtst is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135079" comment="libXtst-devel-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151864" comment="libXtst-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135080" comment="libXtst-devel-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153729" comment="libXtst-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135081" comment="libXtst6-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151865" comment="libXtst6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135082" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153730" comment="libXtst6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135083" comment="libXv-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153731" comment="libXv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135084" comment="libXv-devel-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151843" comment="libXv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135085" comment="libXv-devel-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153732" comment="libXv-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135086" comment="libXv1-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151844" comment="libXv1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135087" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151845" comment="libXv1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135088" comment="libXvMC-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153733" comment="libXvMC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135089" comment="libXvMC-devel-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151846" comment="libXvMC-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135090" comment="libXvMC-devel-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153734" comment="libXvMC-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135091" comment="libXvMC1-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151847" comment="libXvMC1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135092" comment="libXvMC1-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153735" comment="libXvMC1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7953</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7953" source="CVE"/>
    <description>
    Buffer underflow in X.org libXvMC before 1.0.10 allows remote X servers to have unspecified impact via an empty string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7953.html">CVE-2016-7953</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7953">SUSE bug 1003023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7953">SUSE bug 1003023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7953">SUSE bug 1003023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7953">SUSE bug 1003023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7953">SUSE bug 1003023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7953">SUSE bug 1003023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7953">SUSE bug 1003023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7953">SUSE bug 1003023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7953">SUSE bug 1003023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7953">SUSE bug 1003023</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135050" comment="libX11-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153718" comment="libX11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135051" comment="libX11-6-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135052" comment="libX11-6-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151818" comment="libX11-6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135053" comment="libX11-data-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135054" comment="libX11-devel-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151820" comment="libX11-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135055" comment="libX11-devel-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153719" comment="libX11-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135056" comment="libX11-xcb1-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135057" comment="libX11-xcb1-32bit-1.6.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151822" comment="libX11-xcb1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135058" comment="libXfixes-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153720" comment="libXfixes is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135059" comment="libXfixes-devel-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151826" comment="libXfixes-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135060" comment="libXfixes-devel-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153721" comment="libXfixes-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135061" comment="libXfixes3-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151827" comment="libXfixes3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135062" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151828" comment="libXfixes3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135063" comment="libXi-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153722" comment="libXi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135064" comment="libXi-devel-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151829" comment="libXi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135065" comment="libXi-devel-32bit-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153723" comment="libXi-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135066" comment="libXi6-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151830" comment="libXi6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135067" comment="libXi6-32bit-1.7.5-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151831" comment="libXi6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135068" comment="libXrandr-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153724" comment="libXrandr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135069" comment="libXrandr-devel-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151835" comment="libXrandr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135070" comment="libXrandr-devel-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153725" comment="libXrandr-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135071" comment="libXrandr2-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151836" comment="libXrandr2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135072" comment="libXrandr2-32bit-1.5.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151837" comment="libXrandr2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135073" comment="libXrender-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153726" comment="libXrender is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135074" comment="libXrender-devel-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151838" comment="libXrender-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135075" comment="libXrender-devel-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153727" comment="libXrender-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135076" comment="libXrender1-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151839" comment="libXrender1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135077" comment="libXrender1-32bit-0.9.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151840" comment="libXrender1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135078" comment="libXtst-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153728" comment="libXtst is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135079" comment="libXtst-devel-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151864" comment="libXtst-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135080" comment="libXtst-devel-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153729" comment="libXtst-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135081" comment="libXtst6-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151865" comment="libXtst6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135082" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153730" comment="libXtst6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135083" comment="libXv-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153731" comment="libXv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135084" comment="libXv-devel-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151843" comment="libXv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135085" comment="libXv-devel-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153732" comment="libXv-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135086" comment="libXv1-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151844" comment="libXv1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135087" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151845" comment="libXv1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135088" comment="libXvMC-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153733" comment="libXvMC is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135089" comment="libXvMC-devel-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151846" comment="libXvMC-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135090" comment="libXvMC-devel-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153734" comment="libXvMC-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135091" comment="libXvMC1-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151847" comment="libXvMC1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135092" comment="libXvMC1-32bit-1.0.9-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153735" comment="libXvMC1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7966</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7966" source="CVE"/>
    <description>
    Through a malicious URL that contained a quote character it was possible to inject HTML code in KMail's plaintext viewer. Due to the parser used on the URL it was not possible to include the equal sign (=) or a space into the injected HTML, which greatly reduces the available HTML functionality. Although it is possible to include an HTML comment indicator to hide content.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7966.html">CVE-2016-7966</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7966">SUSE bug 1002977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7966">SUSE bug 1002977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7966">SUSE bug 1002977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7966">SUSE bug 1002977</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133772" comment="kcoreaddons-5.21.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153836" comment="kcoreaddons is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133773" comment="kcoreaddons-devel-5.21.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153837" comment="kcoreaddons-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133774" comment="kcoreaddons-devel-32bit-5.21.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153838" comment="kcoreaddons-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133775" comment="kcoreaddons-lang-5.21.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153839" comment="kcoreaddons-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133776" comment="libKF5CoreAddons5-5.21.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153840" comment="libKF5CoreAddons5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009133777" comment="libKF5CoreAddons5-32bit-5.21.0-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153841" comment="libKF5CoreAddons5-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7969</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7969" source="CVE"/>
    <description>
    The wrap_lines_smart function in ass_render.c in libass before 0.13.4 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors, related to "0/3 line wrapping equalization."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7969.html">CVE-2016-7969</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7969">SUSE bug 1002982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7969">SUSE bug 1002982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7969">SUSE bug 1002982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7969">SUSE bug 1002982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7969">SUSE bug 1002982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7969">SUSE bug 1002982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7969">SUSE bug 1002982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7969">SUSE bug 1002982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7969">SUSE bug 1002982</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142383" comment="libass-0.12.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153842" comment="libass is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142384" comment="libass-devel-0.12.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153843" comment="libass-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142385" comment="libass5-0.12.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153844" comment="libass5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142386" comment="libass5-32bit-0.12.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153845" comment="libass5-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7972</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7972" source="CVE"/>
    <description>
    The check_allocations function in libass/ass_shaper.c in libass before 0.13.4 allows remote attackers to cause a denial of service (memory allocation failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7972.html">CVE-2016-7972</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7972">SUSE bug 1002982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7972">SUSE bug 1002982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7972">SUSE bug 1002982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7972">SUSE bug 1002982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7972">SUSE bug 1002982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7972">SUSE bug 1002982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7972">SUSE bug 1002982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7972">SUSE bug 1002982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7972">SUSE bug 1002982</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142383" comment="libass-0.12.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153842" comment="libass is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142384" comment="libass-devel-0.12.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153843" comment="libass-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142385" comment="libass5-0.12.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153844" comment="libass5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142386" comment="libass5-32bit-0.12.3-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153845" comment="libass5-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7973</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7973" source="CVE"/>
    <description>
    The AppleTalk parser in tcpdump before 4.9.0 has a buffer overflow in print-atalk.c, multiple functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7973.html">CVE-2016-7973</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7973">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7973">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7973">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7973">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7973">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7973">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7973">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7974</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7974" source="CVE"/>
    <description>
    The IP parser in tcpdump before 4.9.0 has a buffer overflow in print-ip.c, multiple functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7974.html">CVE-2016-7974</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7974">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7974">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7974">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7974">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7974">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7974">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7974">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7975</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7975" source="CVE"/>
    <description>
    The TCP parser in tcpdump before 4.9.0 has a buffer overflow in print-tcp.c:tcp_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7975.html">CVE-2016-7975</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7975">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7975">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7975">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7975">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7975">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7975">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7975">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7978</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7978" source="CVE"/>
    <description>
    Use-after-free vulnerability in Ghostscript 9.20 might allow remote attackers to execute arbitrary code via vectors related to a reference leak in .setdevice.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7978.html">CVE-2016-7978</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7978">SUSE bug 1001951</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134984" comment="ghostscript-9.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134985" comment="ghostscript-devel-9.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134986" comment="ghostscript-mini-9.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134987" comment="ghostscript-mini-devel-9.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134988" comment="ghostscript-x11-9.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7979</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979" source="CVE"/>
    <description>
    Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently execute arbitrary code by leveraging type confusion in .initialize_dsc_parser.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7979.html">CVE-2016-7979</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7979">SUSE bug 1001951</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134984" comment="ghostscript-9.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134985" comment="ghostscript-devel-9.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134986" comment="ghostscript-mini-9.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134987" comment="ghostscript-mini-devel-9.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134988" comment="ghostscript-x11-9.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7983</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7983" source="CVE"/>
    <description>
    The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7983.html">CVE-2016-7983</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7983">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7983">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7983">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7983">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7983">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7983">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7983">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7984</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7984" source="CVE"/>
    <description>
    The TFTP parser in tcpdump before 4.9.0 has a buffer overflow in print-tftp.c:tftp_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7984.html">CVE-2016-7984</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7984">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7984">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7984">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7984">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7984">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7984">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7984">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7984">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7985</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7985" source="CVE"/>
    <description>
    The CALM FAST parser in tcpdump before 4.9.0 has a buffer overflow in print-calm-fast.c:calm_fast_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7985.html">CVE-2016-7985</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7985">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7985">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7985">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7985">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7985">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7985">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7985">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7985">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7986</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7986" source="CVE"/>
    <description>
    The GeoNetworking parser in tcpdump before 4.9.0 has a buffer overflow in print-geonet.c, multiple functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7986.html">CVE-2016-7986</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7986">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7986">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7986">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7986">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7986">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7986">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7986">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7992</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7992" source="CVE"/>
    <description>
    The Classical IP over ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-cip.c:cip_if_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7992.html">CVE-2016-7992</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7992">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7992">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7992">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7992">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7992">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7992">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7992">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7993</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7993" source="CVE"/>
    <description>
    A bug in util-print.c:relts_print() in tcpdump before 4.9.0 could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7993.html">CVE-2016-7993</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7993">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7993">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7993">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7993">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7993">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7993">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7993">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7995</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7995" source="CVE"/>
    <description>
    Memory leak in the ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of crafted buffer page select (PG) indexes.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7995.html">CVE-2016-7995</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7995">SUSE bug 1003612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7995">SUSE bug 1003612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7995">SUSE bug 1003870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7995">SUSE bug 1003870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7995">SUSE bug 1003870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7995">SUSE bug 1003870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7995">SUSE bug 1003612</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7995">SUSE bug 1003612</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7996</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996" source="CVE"/>
    <description>
    Heap-based buffer overflow in the WPG format reader in GraphicsMagick 1.3.25 and earlier allows remote attackers to have unspecified impact via a colormap with a large number of entries.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7996.html">CVE-2016-7996</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7996">SUSE bug 1003629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7996">SUSE bug 1003629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7996">SUSE bug 1003629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7996">SUSE bug 1003629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7996">SUSE bug 1003629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7996">SUSE bug 1003629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7996">SUSE bug 1067184</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7997</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-7997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997" source="CVE"/>
    <description>
    The WPG format reader in GraphicsMagick 1.3.25 and earlier allows remote attackers to cause a denial of service (assertion failure and crash) via vectors related to a ReferenceBlob and a NULL pointer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-7997.html">CVE-2016-7997</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7997">SUSE bug 1003629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7997">SUSE bug 1003629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7997">SUSE bug 1003629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7997">SUSE bug 1003629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7997">SUSE bug 1003629</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-7997">SUSE bug 1003629</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8283</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Types.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8283.html">CVE-2016-8283</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8283">SUSE bug 1005582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8283">SUSE bug 1005582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8283">SUSE bug 1005582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8283">SUSE bug 1008318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8283">SUSE bug 1005582</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8283">SUSE bug 1005582</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136615" comment="libmysqlclient-devel-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136616" comment="libmysqlclient18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136617" comment="libmysqlclient18-32bit-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136618" comment="libmysqlclient_r18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136619" comment="libmysqlclient_r18-32bit-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136620" comment="libmysqld-devel-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136621" comment="libmysqld18-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136622" comment="mariadb-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136623" comment="mariadb-bench-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136624" comment="mariadb-client-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136625" comment="mariadb-errormessages-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136626" comment="mariadb-test-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136627" comment="mariadb-tools-10.0.28-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8284</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8284" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.31 and earlier and 5.7.13 and earlier allows local users to affect availability via vectors related to Server: Replication.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8284.html">CVE-2016-8284</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8284">SUSE bug 1005583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8284">SUSE bug 1005583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8284">SUSE bug 1008117</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8284">SUSE bug 1008133</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8284">SUSE bug 1008141</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8284">SUSE bug 1008150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8284">SUSE bug 1008151</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8284">SUSE bug 1008152</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8284">SUSE bug 1005583</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8284">SUSE bug 1011266</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8284">SUSE bug 1011267</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8288</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8288" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote authenticated users to affect integrity via vectors related to Server: InnoDB Plugin.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8288.html">CVE-2016-8288</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8288">SUSE bug 1005586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8288">SUSE bug 1005586</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8288">SUSE bug 1005586</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135440" comment="libmysql56client18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135441" comment="libmysql56client18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135442" comment="libmysql56client_r18-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135443" comment="libmysql56client_r18-32bit-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135444" comment="mysql-community-server-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135445" comment="mysql-community-server-bench-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135446" comment="mysql-community-server-client-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135447" comment="mysql-community-server-errormessages-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135448" comment="mysql-community-server-test-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135449" comment="mysql-community-server-tools-5.6.34-19.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8318</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8318" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8318" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.8 (Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8318.html">CVE-2016-8318</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8318">SUSE bug 1020872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8318">SUSE bug 1020872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8318">SUSE bug 1020872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8318">SUSE bug 1020872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8318">SUSE bug 1020872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8318">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8318">SUSE bug 1020872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8318">SUSE bug 1020872</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8318">SUSE bug 1020872</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148497" comment="libmysql56client18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148498" comment="libmysql56client18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148499" comment="libmysql56client_r18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148500" comment="libmysql56client_r18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148501" comment="mysql-community-server-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148502" comment="mysql-community-server-bench-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148503" comment="mysql-community-server-client-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148504" comment="mysql-community-server-errormessages-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148505" comment="mysql-community-server-test-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148506" comment="mysql-community-server-tools-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8327</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8327" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8327.html">CVE-2016-8327</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8327">SUSE bug 1020893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8327">SUSE bug 1020893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8327">SUSE bug 1020893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8327">SUSE bug 1020893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8327">SUSE bug 1020893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8327">SUSE bug 1020893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8327">SUSE bug 1020893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8327">SUSE bug 1020893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8327">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8327">SUSE bug 1020893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8327">SUSE bug 1053919</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148497" comment="libmysql56client18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148498" comment="libmysql56client18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148499" comment="libmysql56client_r18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148500" comment="libmysql56client_r18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148501" comment="mysql-community-server-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148502" comment="mysql-community-server-bench-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148503" comment="mysql-community-server-client-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148504" comment="mysql-community-server-errormessages-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148505" comment="mysql-community-server-test-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148506" comment="mysql-community-server-tools-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8332</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8332" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332" source="CVE"/>
    <description>
    A buffer overflow in OpenJPEG 2.1.1 causes arbitrary code execution when parsing a crafted image. An exploitable code execution vulnerability exists in the jpeg2000 image file format parser as implemented in the OpenJpeg library. A specially crafted jpeg2000 file can cause an out of bound heap write resulting in heap corruption leading to arbitrary code execution. For a successful attack, the target user needs to open a malicious jpeg2000 file. The jpeg2000 image file format is mostly used for embedding images inside PDF documents and the OpenJpeg library is used by a number of popular PDF renderers making PDF documents a likely attack vector.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8332.html">CVE-2016-8332</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8332">SUSE bug 1002414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8332">SUSE bug 1002414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8332">SUSE bug 1002414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8332">SUSE bug 1002414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8332">SUSE bug 1002414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8332">SUSE bug 1002414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8332">SUSE bug 1002414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8332">SUSE bug 1002414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8332">SUSE bug 1002414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8332">SUSE bug 1002414</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8332">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8332">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8332">SUSE bug 1015662</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147387" comment="libopenjp2-7-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153807" comment="libopenjp2-7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147388" comment="libopenjp2-7-32bit-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153808" comment="libopenjp2-7-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147389" comment="openjpeg2-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153813" comment="openjpeg2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147390" comment="openjpeg2-devel-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153814" comment="openjpeg2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8568</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8568" source="CVE"/>
    <description>
    The git_commit_message function in oid.c in libgit2 before 0.24.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a cat-file command with a crafted object file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8568.html">CVE-2016-8568</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8568">SUSE bug 1003810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8568">SUSE bug 1003810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8568">SUSE bug 1003810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8568">SUSE bug 1003810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8568">SUSE bug 1003810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8568">SUSE bug 1003810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8568">SUSE bug 1003810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8568">SUSE bug 1019036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8568">SUSE bug 1019037</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8568">SUSE bug 1003810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8568">SUSE bug 1003810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8568">SUSE bug 1003810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147391" comment="libgit2-0.22.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153557" comment="libgit2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147392" comment="libgit2-22-0.22.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153558" comment="libgit2-22 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147393" comment="libgit2-22-32bit-0.22.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153559" comment="libgit2-22-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147394" comment="libgit2-devel-0.22.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153560" comment="libgit2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8569</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8569" source="CVE"/>
    <description>
    The git_oid_nfmt function in commit.c in libgit2 before 0.24.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a cat-file command with a crafted object file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8569.html">CVE-2016-8569</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8569">SUSE bug 1003810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8569">SUSE bug 1003810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8569">SUSE bug 1003810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8569">SUSE bug 1003810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8569">SUSE bug 1003810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8569">SUSE bug 1003810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8569">SUSE bug 1003810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8569">SUSE bug 1019036</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8569">SUSE bug 1019037</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8569">SUSE bug 1003810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8569">SUSE bug 1003810</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8569">SUSE bug 1003810</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147391" comment="libgit2-0.22.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153557" comment="libgit2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147392" comment="libgit2-22-0.22.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153558" comment="libgit2-22 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147393" comment="libgit2-22-32bit-0.22.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153559" comment="libgit2-22-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147394" comment="libgit2-devel-0.22.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153560" comment="libgit2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8574</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8574" source="CVE"/>
    <description>
    The FRF.15 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:frf15_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8574.html">CVE-2016-8574</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8574">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8574">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8574">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8574">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8574">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8574">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8574">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8575</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8575" source="CVE"/>
    <description>
    The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2017-5482.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8575.html">CVE-2016-8575</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8575">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8575">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8575">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8575">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8575">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8575">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8575">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8576</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8576" source="CVE"/>
    <description>
    The xhci_ring_fetch function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8576.html">CVE-2016-8576</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8576">SUSE bug 1003878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8576">SUSE bug 1003878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8576">SUSE bug 1004016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8576">SUSE bug 1003878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8576">SUSE bug 1004016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8576">SUSE bug 1004016</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8576">SUSE bug 1003878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8576">SUSE bug 1003878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8576">SUSE bug 1003878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8576">SUSE bug 1003878</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142522" comment="qemu-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142523" comment="qemu-arm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142524" comment="qemu-block-curl-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142525" comment="qemu-block-rbd-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142526" comment="qemu-extra-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142527" comment="qemu-guest-agent-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142528" comment="qemu-ipxe-1.0.0-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142529" comment="qemu-kvm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142530" comment="qemu-lang-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142531" comment="qemu-linux-user-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142532" comment="qemu-ppc-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142533" comment="qemu-s390-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142534" comment="qemu-seabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142535" comment="qemu-sgabios-8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142536" comment="qemu-testsuite-2.3.1-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142537" comment="qemu-tools-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142538" comment="qemu-vgabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142539" comment="qemu-x86-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8577</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8577" source="CVE"/>
    <description>
    Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8577.html">CVE-2016-8577</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8577">SUSE bug 1003893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8577">SUSE bug 1003893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8577">SUSE bug 1004021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8577">SUSE bug 1004021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8577">SUSE bug 1003893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8577">SUSE bug 1003893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8577">SUSE bug 1003893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8577">SUSE bug 1003893</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8577">SUSE bug 1003893</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142522" comment="qemu-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142523" comment="qemu-arm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142524" comment="qemu-block-curl-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142525" comment="qemu-block-rbd-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142526" comment="qemu-extra-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142527" comment="qemu-guest-agent-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142528" comment="qemu-ipxe-1.0.0-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142529" comment="qemu-kvm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142530" comment="qemu-lang-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142531" comment="qemu-linux-user-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142532" comment="qemu-ppc-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142533" comment="qemu-s390-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142534" comment="qemu-seabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142535" comment="qemu-sgabios-8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142536" comment="qemu-testsuite-2.3.1-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142537" comment="qemu-tools-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142538" comment="qemu-vgabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142539" comment="qemu-x86-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8578</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8578" source="CVE"/>
    <description>
    The v9fs_iov_vunmarshal function in fsdev/9p-iov-marshal.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) by sending an empty string parameter to a 9P operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8578.html">CVE-2016-8578</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8578">SUSE bug 1003894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8578">SUSE bug 1003894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8578">SUSE bug 1004023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8578">SUSE bug 1004023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8578">SUSE bug 1003894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8578">SUSE bug 1003894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8578">SUSE bug 1003894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8578">SUSE bug 1003894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8578">SUSE bug 1003894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142522" comment="qemu-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142523" comment="qemu-arm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142524" comment="qemu-block-curl-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142525" comment="qemu-block-rbd-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142526" comment="qemu-extra-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142527" comment="qemu-guest-agent-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142528" comment="qemu-ipxe-1.0.0-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142529" comment="qemu-kvm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142530" comment="qemu-lang-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142531" comment="qemu-linux-user-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142532" comment="qemu-ppc-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142533" comment="qemu-s390-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142534" comment="qemu-seabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142535" comment="qemu-sgabios-8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142536" comment="qemu-testsuite-2.3.1-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142537" comment="qemu-tools-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142538" comment="qemu-vgabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142539" comment="qemu-x86-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8602</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602" source="CVE"/>
    <description>
    The .sethalftone5 function in psi/zht2.c in Ghostscript before 9.21 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Postscript document that calls .sethalftone5 with an empty operand stack.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8602.html">CVE-2016-8602</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8602">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8602">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8602">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8602">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8602">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8602">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8602">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8602">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8602">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8602">SUSE bug 1001951</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8602">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8602">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8602">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8602">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8602">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8602">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8602">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8602">SUSE bug 1004237</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8602">SUSE bug 1004237</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131209" comment="ghostscript-9.15-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131818" comment="ghostscript-devel-9.15-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130955" comment="ghostscript-mini-9.15-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009130956" comment="ghostscript-mini-devel-9.15-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009131210" comment="ghostscript-x11-9.15-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8605</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8605" source="CVE"/>
    <description>
    The mkdir procedure of GNU Guile temporarily changed the process' umask to zero. During that time window, in a multithreaded application, other threads could end up creating files with insecure permissions. For example, mkdir without the optional mode argument would create directories as 0777. This is fixed in Guile 2.0.13. Prior versions are affected.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8605.html">CVE-2016-8605</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8605">SUSE bug 1004221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8605">SUSE bug 1004221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8605">SUSE bug 1004221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8605">SUSE bug 1004221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8605">SUSE bug 1004221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8605">SUSE bug 1004221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8605">SUSE bug 1004221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8605">SUSE bug 1004221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8605">SUSE bug 1004221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8605">SUSE bug 1004221</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8605">SUSE bug 1004221</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148523" comment="guile-2.0.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153846" comment="guile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148524" comment="guile-devel-2.0.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153847" comment="guile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148525" comment="guile-modules-2_0-2.0.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153848" comment="guile-modules-2_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135109" comment="guile1-1.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153849" comment="guile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148526" comment="libguile-2_0-22-2.0.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153850" comment="libguile-2_0-22 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135110" comment="libguile-srfi-srfi-1-v-3-3-1.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153851" comment="libguile-srfi-srfi-1-v-3-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135111" comment="libguile-srfi-srfi-13-14-v-3-3-1.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153852" comment="libguile-srfi-srfi-13-14-v-3-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135112" comment="libguile-srfi-srfi-4-v-3-3-1.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153853" comment="libguile-srfi-srfi-4-v-3-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135113" comment="libguile-srfi-srfi-60-v-2-2-1.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153854" comment="libguile-srfi-srfi-60-v-2-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135114" comment="libguile1-devel-1.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153855" comment="libguile1-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135115" comment="libguile17-1.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153856" comment="libguile17 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135116" comment="libguilereadline-v-17-17-1.8.8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153857" comment="libguilereadline-v-17-17 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148527" comment="libguilereadline-v-18-18-2.0.9-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153858" comment="libguilereadline-v-18-18 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8610</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8610" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610" source="CVE"/>
    <description>
    A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8610.html">CVE-2016-8610</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1025347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1025347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8610">SUSE bug 1005878</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148108" comment="gnutls-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148109" comment="libgnutls-devel-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148110" comment="libgnutls-devel-32bit-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153803" comment="libgnutls-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148111" comment="libgnutls-openssl-devel-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153804" comment="libgnutls-openssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148112" comment="libgnutls-openssl27-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151158" comment="libgnutls-openssl27 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148113" comment="libgnutls28-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151159" comment="libgnutls28 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148114" comment="libgnutls28-32bit-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151160" comment="libgnutls28-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148115" comment="libgnutlsxx-devel-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153805" comment="libgnutlsxx-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148116" comment="libgnutlsxx28-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153806" comment="libgnutlsxx28 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148476" comment="libopenssl-devel-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148477" comment="libopenssl-devel-32bit-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148478" comment="libopenssl1_0_0-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148479" comment="libopenssl1_0_0-32bit-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148480" comment="libopenssl1_0_0-hmac-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148481" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148482" comment="openssl-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148483" comment="openssl-doc-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8615</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8615.html">CVE-2016-8615</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8615">SUSE bug 1005633</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8615">SUSE bug 1005633</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8615">SUSE bug 1005633</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8615">SUSE bug 1005633</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8615">SUSE bug 1005633</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8615">SUSE bug 1005633</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8615">SUSE bug 1005633</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8615">SUSE bug 1005633</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135465" comment="curl-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135466" comment="libcurl-devel-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135467" comment="libcurl-devel-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135468" comment="libcurl4-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135469" comment="libcurl4-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8616</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8616.html">CVE-2016-8616</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8616">SUSE bug 1005634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8616">SUSE bug 1005634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8616">SUSE bug 1005634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8616">SUSE bug 1005634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8616">SUSE bug 1005634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8616">SUSE bug 1005634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8616">SUSE bug 1005634</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8616">SUSE bug 1005634</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135465" comment="curl-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135466" comment="libcurl-devel-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135467" comment="libcurl-devel-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135468" comment="libcurl4-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135469" comment="libcurl4-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8617</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8617.html">CVE-2016-8617</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8617">SUSE bug 1005635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8617">SUSE bug 1005635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8617">SUSE bug 1005635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8617">SUSE bug 1005635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8617">SUSE bug 1005635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8617">SUSE bug 1005635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8617">SUSE bug 1005635</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8617">SUSE bug 1005635</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135465" comment="curl-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135466" comment="libcurl-devel-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135467" comment="libcurl-devel-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135468" comment="libcurl4-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135469" comment="libcurl4-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8618</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8618.html">CVE-2016-8618</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8618">SUSE bug 1005637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8618">SUSE bug 1005637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8618">SUSE bug 1005637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8618">SUSE bug 1005637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8618">SUSE bug 1005637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8618">SUSE bug 1005637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8618">SUSE bug 1005637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8618">SUSE bug 1005637</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135465" comment="curl-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135466" comment="libcurl-devel-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135467" comment="libcurl-devel-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135468" comment="libcurl4-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135469" comment="libcurl4-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8619</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8619.html">CVE-2016-8619</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8619">SUSE bug 1005638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8619">SUSE bug 1005638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8619">SUSE bug 1005638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8619">SUSE bug 1005638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8619">SUSE bug 1005638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8619">SUSE bug 1005638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8619">SUSE bug 1005638</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8619">SUSE bug 1005638</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135465" comment="curl-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135466" comment="libcurl-devel-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135467" comment="libcurl-devel-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135468" comment="libcurl4-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135469" comment="libcurl4-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8620</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8620.html">CVE-2016-8620</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8620">SUSE bug 1005640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8620">SUSE bug 1005640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8620">SUSE bug 1005640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8620">SUSE bug 1005640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8620">SUSE bug 1005640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8620">SUSE bug 1005640</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135465" comment="curl-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135466" comment="libcurl-devel-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135467" comment="libcurl-devel-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135468" comment="libcurl4-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135469" comment="libcurl4-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8621</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8621.html">CVE-2016-8621</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8621">SUSE bug 1005642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8621">SUSE bug 1005642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8621">SUSE bug 1005642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8621">SUSE bug 1005642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8621">SUSE bug 1005642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8621">SUSE bug 1005642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8621">SUSE bug 1005642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8621">SUSE bug 1005642</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135465" comment="curl-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135466" comment="libcurl-devel-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135467" comment="libcurl-devel-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135468" comment="libcurl4-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135469" comment="libcurl4-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8622</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8622.html">CVE-2016-8622</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8622">SUSE bug 1005643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8622">SUSE bug 1005643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8622">SUSE bug 1005643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8622">SUSE bug 1005643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8622">SUSE bug 1005643</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8622">SUSE bug 1005643</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135465" comment="curl-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135466" comment="libcurl-devel-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135467" comment="libcurl-devel-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135468" comment="libcurl4-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135469" comment="libcurl4-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8623</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8623.html">CVE-2016-8623</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8623">SUSE bug 1005645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8623">SUSE bug 1005645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8623">SUSE bug 1005645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8623">SUSE bug 1005645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8623">SUSE bug 1005645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8623">SUSE bug 1005645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8623">SUSE bug 1005645</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8623">SUSE bug 1005645</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135465" comment="curl-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135466" comment="libcurl-devel-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135467" comment="libcurl-devel-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135468" comment="libcurl4-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135469" comment="libcurl4-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8624</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8624.html">CVE-2016-8624</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8624">SUSE bug 1005646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8624">SUSE bug 1005646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8624">SUSE bug 1005646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8624">SUSE bug 1005646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8624">SUSE bug 1005646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8624">SUSE bug 1005646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8624">SUSE bug 1005646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8624">SUSE bug 1005646</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8624">SUSE bug 1005646</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135465" comment="curl-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135466" comment="libcurl-devel-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135467" comment="libcurl-devel-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135468" comment="libcurl4-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135469" comment="libcurl4-32bit-7.37.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8630</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8630" source="CVE"/>
    <description>
    The x86_decode_insn function in arch/x86/kvm/emulate.c in the Linux kernel before 4.8.7, when KVM is enabled, allows local users to cause a denial of service (host OS crash) via a certain use of a ModR/M byte in an undefined instruction.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8630.html">CVE-2016-8630</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8630">SUSE bug 1009222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8630">SUSE bug 1009222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8630">SUSE bug 1009222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8630">SUSE bug 1009222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8630">SUSE bug 1009222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8630">SUSE bug 1009222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8630">SUSE bug 1009222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8630">SUSE bug 1009222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8630">SUSE bug 1009222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8630">SUSE bug 1009222</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8630">SUSE bug 1009222</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136831" comment="drbd-8.4.6-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136832" comment="drbd-kmp-default-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136833" comment="drbd-kmp-pv-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136834" comment="drbd-kmp-xen-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136835" comment="hdjmod-1.28-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136836" comment="hdjmod-kmp-default-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136837" comment="hdjmod-kmp-pae-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136838" comment="hdjmod-kmp-pv-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136839" comment="hdjmod-kmp-xen-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136840" comment="ipset-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136841" comment="ipset-devel-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136842" comment="ipset-kmp-default-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136843" comment="ipset-kmp-pae-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136844" comment="ipset-kmp-pv-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136845" comment="ipset-kmp-xen-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136846" comment="kernel-debug-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136847" comment="kernel-debug-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136848" comment="kernel-debug-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136849" comment="kernel-default-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136850" comment="kernel-default-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136851" comment="kernel-default-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136852" comment="kernel-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136853" comment="kernel-docs-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136854" comment="kernel-docs-html-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136855" comment="kernel-docs-pdf-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136856" comment="kernel-ec2-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136857" comment="kernel-ec2-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136858" comment="kernel-ec2-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136859" comment="kernel-macros-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136860" comment="kernel-obs-build-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136861" comment="kernel-obs-qa-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136862" comment="kernel-pae-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136863" comment="kernel-pae-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136864" comment="kernel-pae-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136865" comment="kernel-pv-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136866" comment="kernel-pv-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136867" comment="kernel-pv-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136868" comment="kernel-source-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136869" comment="kernel-source-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136870" comment="kernel-syms-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136871" comment="kernel-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136872" comment="kernel-vanilla-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136873" comment="kernel-xen-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136874" comment="kernel-xen-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136875" comment="kernel-xen-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136876" comment="libipset3-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136877" comment="lttng-modules-2.7.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136878" comment="lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136879" comment="lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136880" comment="pcfclock-0.44-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136881" comment="pcfclock-kmp-default-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136882" comment="pcfclock-kmp-pae-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136883" comment="pcfclock-kmp-pv-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136884" comment="vhba-kmp-20140928-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136885" comment="vhba-kmp-default-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136886" comment="vhba-kmp-pae-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136887" comment="vhba-kmp-pv-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136888" comment="vhba-kmp-xen-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8633</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8633" source="CVE"/>
    <description>
    drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8633.html">CVE-2016-8633</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8633">SUSE bug 1008833</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136831" comment="drbd-8.4.6-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136832" comment="drbd-kmp-default-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136833" comment="drbd-kmp-pv-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136834" comment="drbd-kmp-xen-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136835" comment="hdjmod-1.28-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136836" comment="hdjmod-kmp-default-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136837" comment="hdjmod-kmp-pae-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136838" comment="hdjmod-kmp-pv-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136839" comment="hdjmod-kmp-xen-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136840" comment="ipset-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136841" comment="ipset-devel-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136842" comment="ipset-kmp-default-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136843" comment="ipset-kmp-pae-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136844" comment="ipset-kmp-pv-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136845" comment="ipset-kmp-xen-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136846" comment="kernel-debug-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136847" comment="kernel-debug-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136848" comment="kernel-debug-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136849" comment="kernel-default-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136850" comment="kernel-default-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136851" comment="kernel-default-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136852" comment="kernel-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136853" comment="kernel-docs-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136854" comment="kernel-docs-html-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136855" comment="kernel-docs-pdf-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136856" comment="kernel-ec2-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136857" comment="kernel-ec2-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136858" comment="kernel-ec2-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136859" comment="kernel-macros-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136860" comment="kernel-obs-build-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136861" comment="kernel-obs-qa-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136862" comment="kernel-pae-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136863" comment="kernel-pae-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136864" comment="kernel-pae-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136865" comment="kernel-pv-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136866" comment="kernel-pv-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136867" comment="kernel-pv-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136868" comment="kernel-source-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136869" comment="kernel-source-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136870" comment="kernel-syms-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136871" comment="kernel-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136872" comment="kernel-vanilla-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136873" comment="kernel-xen-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136874" comment="kernel-xen-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136875" comment="kernel-xen-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136876" comment="libipset3-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136877" comment="lttng-modules-2.7.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136878" comment="lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136879" comment="lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136880" comment="pcfclock-0.44-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136881" comment="pcfclock-kmp-default-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136882" comment="pcfclock-kmp-pae-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136883" comment="pcfclock-kmp-pv-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136884" comment="vhba-kmp-20140928-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136885" comment="vhba-kmp-default-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136886" comment="vhba-kmp-pae-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136887" comment="vhba-kmp-pv-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136888" comment="vhba-kmp-xen-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8637</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8637" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8637.html">CVE-2016-8637</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8637">SUSE bug 1008340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8637">SUSE bug 1008340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8637">SUSE bug 1008340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8637">SUSE bug 1008340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8637">SUSE bug 1008340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8637">SUSE bug 1008340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8637">SUSE bug 1008340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8637">SUSE bug 1008340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8637">SUSE bug 1008340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8637">SUSE bug 1008340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8637">SUSE bug 1008340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8637">SUSE bug 1008340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8637">SUSE bug 1008340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8637">SUSE bug 1008340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8637">SUSE bug 1008340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8637">SUSE bug 1008340</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149589" comment="dracut-037-80.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151760" comment="dracut is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149590" comment="dracut-fips-037-80.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153859" comment="dracut-fips is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8645</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8645" source="CVE"/>
    <description>
    The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8645.html">CVE-2016-8645</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8645">SUSE bug 1009969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8645">SUSE bug 1009969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8645">SUSE bug 1009969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8645">SUSE bug 1009969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8645">SUSE bug 1009969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8645">SUSE bug 1009969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8645">SUSE bug 1009969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8645">SUSE bug 1009969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8645">SUSE bug 1009969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8645">SUSE bug 1009969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8645">SUSE bug 1009969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8645">SUSE bug 1009969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8645">SUSE bug 1009969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8645">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8645">SUSE bug 1009969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8645">SUSE bug 1009969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8645">SUSE bug 1009969</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8645">SUSE bug 1009969</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148345" comment="kernel-debug-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148346" comment="kernel-debug-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148347" comment="kernel-debug-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148348" comment="kernel-default-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148349" comment="kernel-default-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148350" comment="kernel-default-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148351" comment="kernel-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148352" comment="kernel-docs-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148353" comment="kernel-docs-html-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148354" comment="kernel-docs-pdf-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148355" comment="kernel-ec2-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148356" comment="kernel-ec2-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148357" comment="kernel-ec2-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148358" comment="kernel-macros-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148359" comment="kernel-obs-build-4.1.38-47.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148360" comment="kernel-obs-qa-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148361" comment="kernel-pae-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148362" comment="kernel-pae-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148363" comment="kernel-pae-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148364" comment="kernel-pv-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148365" comment="kernel-pv-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148366" comment="kernel-pv-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148367" comment="kernel-source-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148368" comment="kernel-source-vanilla-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148369" comment="kernel-syms-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148370" comment="kernel-vanilla-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148371" comment="kernel-vanilla-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148372" comment="kernel-xen-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148373" comment="kernel-xen-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148374" comment="kernel-xen-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8646</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8646" source="CVE"/>
    <description>
    The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8646.html">CVE-2016-8646</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8646">SUSE bug 1010150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8646">SUSE bug 1010150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8646">SUSE bug 1010150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8646">SUSE bug 1010150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8646">SUSE bug 1010150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8646">SUSE bug 1010150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8646">SUSE bug 1010150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8646">SUSE bug 1010150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8646">SUSE bug 1010150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8646">SUSE bug 1010150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8646">SUSE bug 1010150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8646">SUSE bug 1010150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8646">SUSE bug 1010150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8646">SUSE bug 1010150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8646">SUSE bug 1010150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8646">SUSE bug 1010150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8646">SUSE bug 1010150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8646">SUSE bug 1010150</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8646">SUSE bug 1010150</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136831" comment="drbd-8.4.6-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136832" comment="drbd-kmp-default-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136833" comment="drbd-kmp-pv-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136834" comment="drbd-kmp-xen-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136835" comment="hdjmod-1.28-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136836" comment="hdjmod-kmp-default-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136837" comment="hdjmod-kmp-pae-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136838" comment="hdjmod-kmp-pv-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136839" comment="hdjmod-kmp-xen-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136840" comment="ipset-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136841" comment="ipset-devel-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136842" comment="ipset-kmp-default-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136843" comment="ipset-kmp-pae-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136844" comment="ipset-kmp-pv-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136845" comment="ipset-kmp-xen-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136846" comment="kernel-debug-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136847" comment="kernel-debug-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136848" comment="kernel-debug-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136849" comment="kernel-default-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136850" comment="kernel-default-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136851" comment="kernel-default-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136852" comment="kernel-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136853" comment="kernel-docs-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136854" comment="kernel-docs-html-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136855" comment="kernel-docs-pdf-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136856" comment="kernel-ec2-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136857" comment="kernel-ec2-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136858" comment="kernel-ec2-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136859" comment="kernel-macros-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136860" comment="kernel-obs-build-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136861" comment="kernel-obs-qa-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136862" comment="kernel-pae-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136863" comment="kernel-pae-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136864" comment="kernel-pae-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136865" comment="kernel-pv-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136866" comment="kernel-pv-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136867" comment="kernel-pv-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136868" comment="kernel-source-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136869" comment="kernel-source-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136870" comment="kernel-syms-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136871" comment="kernel-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136872" comment="kernel-vanilla-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136873" comment="kernel-xen-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136874" comment="kernel-xen-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136875" comment="kernel-xen-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136876" comment="libipset3-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136877" comment="lttng-modules-2.7.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136878" comment="lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136879" comment="lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136880" comment="pcfclock-0.44-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136881" comment="pcfclock-kmp-default-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136882" comment="pcfclock-kmp-pae-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136883" comment="pcfclock-kmp-pv-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136884" comment="vhba-kmp-20140928-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136885" comment="vhba-kmp-default-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136886" comment="vhba-kmp-pae-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136887" comment="vhba-kmp-pv-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136888" comment="vhba-kmp-xen-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8649</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8649" source="CVE"/>
    <description>
    lxc-attach in LXC before 1.0.9 and 2.x before 2.0.6 allows an attacker inside of an unprivileged container to use an inherited file descriptor, of the host's /proc, to access the rest of the host's filesystem via the openat() family of syscalls.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8649.html">CVE-2016-8649</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8649">SUSE bug 1010933</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8649">SUSE bug 1010933</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8649">SUSE bug 1010933</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8649">SUSE bug 1010933</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8649">SUSE bug 1010933</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8649">SUSE bug 1010933</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8649">SUSE bug 1010933</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8649">SUSE bug 1010933</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8649">SUSE bug 1010933</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143116" comment="lxc-1.1.2-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153860" comment="lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143117" comment="lxc-devel-1.1.2-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153861" comment="lxc-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8654</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8654" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8654.html">CVE-2016-8654</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8654">SUSE bug 1012530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8654">SUSE bug 1012530</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146872" comment="jasper-1.900.14-170.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146873" comment="libjasper-devel-1.900.14-170.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146874" comment="libjasper1-1.900.14-170.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146875" comment="libjasper1-32bit-1.900.14-170.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8655</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655" source="CVE"/>
    <description>
    Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8655.html">CVE-2016-8655</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1013822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1013822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012754</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1012759</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8655">SUSE bug 1052365</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136831" comment="drbd-8.4.6-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136832" comment="drbd-kmp-default-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136833" comment="drbd-kmp-pv-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136834" comment="drbd-kmp-xen-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136835" comment="hdjmod-1.28-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136836" comment="hdjmod-kmp-default-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136837" comment="hdjmod-kmp-pae-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136838" comment="hdjmod-kmp-pv-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136839" comment="hdjmod-kmp-xen-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136840" comment="ipset-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136841" comment="ipset-devel-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136842" comment="ipset-kmp-default-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136843" comment="ipset-kmp-pae-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136844" comment="ipset-kmp-pv-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136845" comment="ipset-kmp-xen-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136846" comment="kernel-debug-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136847" comment="kernel-debug-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136848" comment="kernel-debug-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136849" comment="kernel-default-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136850" comment="kernel-default-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136851" comment="kernel-default-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136852" comment="kernel-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136853" comment="kernel-docs-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136854" comment="kernel-docs-html-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136855" comment="kernel-docs-pdf-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136856" comment="kernel-ec2-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136857" comment="kernel-ec2-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136858" comment="kernel-ec2-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136859" comment="kernel-macros-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136860" comment="kernel-obs-build-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136861" comment="kernel-obs-qa-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136862" comment="kernel-pae-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136863" comment="kernel-pae-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136864" comment="kernel-pae-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136865" comment="kernel-pv-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136866" comment="kernel-pv-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136867" comment="kernel-pv-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136868" comment="kernel-source-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136869" comment="kernel-source-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136870" comment="kernel-syms-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136871" comment="kernel-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136872" comment="kernel-vanilla-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136873" comment="kernel-xen-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136874" comment="kernel-xen-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136875" comment="kernel-xen-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136876" comment="libipset3-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136877" comment="lttng-modules-2.7.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136878" comment="lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136879" comment="lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136880" comment="pcfclock-0.44-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136881" comment="pcfclock-kmp-default-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136882" comment="pcfclock-kmp-pae-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136883" comment="pcfclock-kmp-pv-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136884" comment="vhba-kmp-20140928-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136885" comment="vhba-kmp-default-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136886" comment="vhba-kmp-pae-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136887" comment="vhba-kmp-pv-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136888" comment="vhba-kmp-xen-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8658</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8658" source="CVE"/>
    <description>
    Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8658.html">CVE-2016-8658</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8658">SUSE bug 1004462</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134991" comment="drbd-8.4.6-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134992" comment="drbd-kmp-default-8.4.6_k4.1.34_33-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134993" comment="drbd-kmp-pv-8.4.6_k4.1.34_33-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134994" comment="drbd-kmp-xen-8.4.6_k4.1.34_33-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134995" comment="hdjmod-1.28-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134996" comment="hdjmod-kmp-default-1.28_k4.1.34_33-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134997" comment="hdjmod-kmp-pae-1.28_k4.1.34_33-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134998" comment="hdjmod-kmp-pv-1.28_k4.1.34_33-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009134999" comment="hdjmod-kmp-xen-1.28_k4.1.34_33-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135000" comment="ipset-6.25.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135001" comment="ipset-devel-6.25.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135002" comment="ipset-kmp-default-6.25.1_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135003" comment="ipset-kmp-pae-6.25.1_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135004" comment="ipset-kmp-pv-6.25.1_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135005" comment="ipset-kmp-xen-6.25.1_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135006" comment="kernel-debug-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135007" comment="kernel-debug-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135008" comment="kernel-debug-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135009" comment="kernel-default-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135010" comment="kernel-default-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135011" comment="kernel-default-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135012" comment="kernel-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135013" comment="kernel-docs-4.1.34-33.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135014" comment="kernel-docs-html-4.1.34-33.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135015" comment="kernel-docs-pdf-4.1.34-33.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135016" comment="kernel-ec2-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135017" comment="kernel-ec2-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135018" comment="kernel-ec2-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135019" comment="kernel-macros-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135020" comment="kernel-obs-build-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135021" comment="kernel-obs-qa-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135022" comment="kernel-obs-qa-xen-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151968" comment="kernel-obs-qa-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135023" comment="kernel-pae-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135024" comment="kernel-pae-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135025" comment="kernel-pae-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135026" comment="kernel-pv-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135027" comment="kernel-pv-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135028" comment="kernel-pv-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135029" comment="kernel-source-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135030" comment="kernel-source-vanilla-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135031" comment="kernel-syms-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135032" comment="kernel-vanilla-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135033" comment="kernel-vanilla-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135034" comment="kernel-xen-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135035" comment="kernel-xen-base-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135036" comment="kernel-xen-devel-4.1.34-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135037" comment="libipset3-6.25.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135038" comment="lttng-modules-2.7.0-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135039" comment="lttng-modules-kmp-default-2.7.0_k4.1.34_33-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135040" comment="lttng-modules-kmp-pv-2.7.0_k4.1.34_33-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135041" comment="pcfclock-0.44-268.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135042" comment="pcfclock-kmp-default-0.44_k4.1.34_33-268.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135043" comment="pcfclock-kmp-pae-0.44_k4.1.34_33-268.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135044" comment="pcfclock-kmp-pv-0.44_k4.1.34_33-268.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135045" comment="vhba-kmp-20140928-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135046" comment="vhba-kmp-default-20140928_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135047" comment="vhba-kmp-pae-20140928_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135048" comment="vhba-kmp-pv-20140928_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135049" comment="vhba-kmp-xen-20140928_k4.1.34_33-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8667</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8667" source="CVE"/>
    <description>
    The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8667.html">CVE-2016-8667</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8667">SUSE bug 1004702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8667">SUSE bug 1004702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8667">SUSE bug 1005004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8667">SUSE bug 1004702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8667">SUSE bug 1005004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8667">SUSE bug 1005004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8667">SUSE bug 1004702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8667">SUSE bug 1005004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8667">SUSE bug 1004702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8667">SUSE bug 1004702</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142522" comment="qemu-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142523" comment="qemu-arm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142524" comment="qemu-block-curl-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142525" comment="qemu-block-rbd-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142526" comment="qemu-extra-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142527" comment="qemu-guest-agent-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142528" comment="qemu-ipxe-1.0.0-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142529" comment="qemu-kvm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142530" comment="qemu-lang-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142531" comment="qemu-linux-user-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142532" comment="qemu-ppc-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142533" comment="qemu-s390-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142534" comment="qemu-seabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142535" comment="qemu-sgabios-8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142536" comment="qemu-testsuite-2.3.1-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142537" comment="qemu-tools-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142538" comment="qemu-vgabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142539" comment="qemu-x86-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8669</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8669" source="CVE"/>
    <description>
    The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8669.html">CVE-2016-8669</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8669">SUSE bug 1004707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8669">SUSE bug 1004707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8669">SUSE bug 1005005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8669">SUSE bug 1004707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8669">SUSE bug 1005005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8669">SUSE bug 1005005</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8669">SUSE bug 1004707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8669">SUSE bug 1004707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8669">SUSE bug 1004707</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8669">SUSE bug 1004707</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142522" comment="qemu-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142523" comment="qemu-arm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142524" comment="qemu-block-curl-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142525" comment="qemu-block-rbd-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142526" comment="qemu-extra-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142527" comment="qemu-guest-agent-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142528" comment="qemu-ipxe-1.0.0-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142529" comment="qemu-kvm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142530" comment="qemu-lang-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142531" comment="qemu-linux-user-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142532" comment="qemu-ppc-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142533" comment="qemu-s390-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142534" comment="qemu-seabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142535" comment="qemu-sgabios-8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142536" comment="qemu-testsuite-2.3.1-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142537" comment="qemu-tools-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142538" comment="qemu-vgabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142539" comment="qemu-x86-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8670</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670" source="CVE"/>
    <description>
    Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagecreatefromstring call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8670.html">CVE-2016-8670</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8670">SUSE bug 1004924</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135621" comment="apache2-mod_php5-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135470" comment="gd-2.1.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135471" comment="gd-32bit-2.1.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152101" comment="gd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135472" comment="gd-devel-2.1.0-13.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153569" comment="gd-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135622" comment="php5-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135623" comment="php5-bcmath-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135624" comment="php5-bz2-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135625" comment="php5-calendar-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135626" comment="php5-ctype-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135627" comment="php5-curl-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135628" comment="php5-dba-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135629" comment="php5-devel-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135630" comment="php5-dom-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135631" comment="php5-enchant-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135632" comment="php5-exif-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135633" comment="php5-fastcgi-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135634" comment="php5-fileinfo-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135635" comment="php5-firebird-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135636" comment="php5-fpm-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135637" comment="php5-ftp-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135638" comment="php5-gd-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135639" comment="php5-gettext-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135640" comment="php5-gmp-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135641" comment="php5-iconv-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135642" comment="php5-imap-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135643" comment="php5-intl-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135644" comment="php5-json-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135645" comment="php5-ldap-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135646" comment="php5-mbstring-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135647" comment="php5-mcrypt-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135648" comment="php5-mssql-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135649" comment="php5-mysql-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135650" comment="php5-odbc-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135651" comment="php5-opcache-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135652" comment="php5-openssl-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135653" comment="php5-pcntl-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135654" comment="php5-pdo-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135655" comment="php5-pear-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135656" comment="php5-pgsql-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135657" comment="php5-phar-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135658" comment="php5-posix-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135659" comment="php5-pspell-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135660" comment="php5-readline-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135661" comment="php5-shmop-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135662" comment="php5-snmp-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135663" comment="php5-soap-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135664" comment="php5-sockets-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135665" comment="php5-sqlite-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135666" comment="php5-suhosin-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135667" comment="php5-sysvmsg-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135668" comment="php5-sysvsem-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135669" comment="php5-sysvshm-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135670" comment="php5-tidy-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135671" comment="php5-tokenizer-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135672" comment="php5-wddx-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135673" comment="php5-xmlreader-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135674" comment="php5-xmlrpc-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135675" comment="php5-xmlwriter-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135676" comment="php5-xsl-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135677" comment="php5-zip-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135678" comment="php5-zlib-5.5.14-65.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8677</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8677" source="CVE"/>
    <description>
    The AcquireQuantumPixels function in MagickCore/quantum.c in ImageMagick before 7.0.3-1 allows remote attackers to have unspecified impact via a crafted image file, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8677.html">CVE-2016-8677</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8677">SUSE bug 1005328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8677">SUSE bug 1005328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8677">SUSE bug 1005328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8677">SUSE bug 1005328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8677">SUSE bug 1005328</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8682</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682" source="CVE"/>
    <description>
    The ReadSCTImage function in coders/sct.c in GraphicsMagick 1.3.25 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted SCT header.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8682.html">CVE-2016-8682</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8682">SUSE bug 1005125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8682">SUSE bug 1005125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8682">SUSE bug 1005125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8682">SUSE bug 1005125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8682">SUSE bug 1005125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8682">SUSE bug 1005125</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8682">SUSE bug 1005125</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8683</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683" source="CVE"/>
    <description>
    The ReadPCXImage function in coders/pcx.c in GraphicsMagick 1.3.25 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure and a "file truncation error for corrupt file."
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8683.html">CVE-2016-8683</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8683">SUSE bug 1005127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8683">SUSE bug 1005127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8683">SUSE bug 1005127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8683">SUSE bug 1005127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8683">SUSE bug 1005127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8683">SUSE bug 1005127</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8683">SUSE bug 1005127</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8684</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684" source="CVE"/>
    <description>
    The MagickMalloc function in magick/memory.c in GraphicsMagick 1.3.25 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure and a "file truncation error for corrupt file."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8684.html">CVE-2016-8684</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8684">SUSE bug 1005123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8684">SUSE bug 1005123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8684">SUSE bug 1005123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8684">SUSE bug 1005123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8684">SUSE bug 1005123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8684">SUSE bug 1005123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8684">SUSE bug 1005123</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8684">SUSE bug 1005123</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135101" comment="GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135102" comment="GraphicsMagick-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135473" comment="ImageMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135474" comment="ImageMagick-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135475" comment="ImageMagick-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135476" comment="ImageMagick-doc-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135477" comment="ImageMagick-extra-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135103" comment="libGraphicsMagick++-Q16-11-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135104" comment="libGraphicsMagick++-devel-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135105" comment="libGraphicsMagick-Q16-3-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135106" comment="libGraphicsMagick3-config-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135107" comment="libGraphicsMagickWand-Q16-2-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135478" comment="libMagick++-6_Q16-3-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135479" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135480" comment="libMagick++-devel-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135481" comment="libMagick++-devel-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135482" comment="libMagickCore-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135483" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135484" comment="libMagickWand-6_Q16-1-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135485" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135108" comment="perl-GraphicsMagick-1.3.21-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135486" comment="perl-PerlMagick-6.8.8.1-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8685</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8685" source="CVE"/>
    <description>
    The findnext function in decompose.c in potrace 1.13 allows remote attackers to cause a denial of service (invalid memory access and crash) via a crafted BMP image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8685.html">CVE-2016-8685</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8685">SUSE bug 1005026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8685">SUSE bug 1005026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8685">SUSE bug 1005026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8685">SUSE bug 1005026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8685">SUSE bug 1005026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8685">SUSE bug 1005026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8685">SUSE bug 1005026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8685">SUSE bug 1005027</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8685">SUSE bug 1005026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8685">SUSE bug 1005026</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149444" comment="libpotrace0-1.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151954" comment="libpotrace0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149445" comment="potrace-1.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151955" comment="potrace is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149446" comment="potrace-devel-1.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151956" comment="potrace-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8686</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8686" source="CVE"/>
    <description>
    The bm_new function in bitmap.h in potrace 1.13 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8686.html">CVE-2016-8686</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8686">SUSE bug 1005027</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8686">SUSE bug 1005027</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8686">SUSE bug 1005026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8686">SUSE bug 1005026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8686">SUSE bug 1005026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8686">SUSE bug 1005027</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149444" comment="libpotrace0-1.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151954" comment="libpotrace0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149445" comment="potrace-1.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151955" comment="potrace is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149446" comment="potrace-devel-1.14-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151956" comment="potrace-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8687</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8687" source="CVE"/>
    <description>
    Stack-based buffer overflow in the safe_fprintf function in tar/util.c in libarchive 3.2.1 allows remote attackers to cause a denial of service via a crafted non-printable multibyte character in a filename.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8687.html">CVE-2016-8687</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8687">SUSE bug 1005070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8687">SUSE bug 1005070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8687">SUSE bug 1005070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8687">SUSE bug 1005070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8687">SUSE bug 1005070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8687">SUSE bug 1005070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8687">SUSE bug 1005070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8687">SUSE bug 1005070</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136448" comment="bsdtar-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136449" comment="libarchive-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136450" comment="libarchive-devel-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136451" comment="libarchive13-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136452" comment="libarchive13-32bit-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8688</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8688" source="CVE"/>
    <description>
    The mtree bidder in libarchive 3.2.1 does not keep track of line sizes when extending the read-ahead, which allows remote attackers to cause a denial of service (crash) via a crafted file, which triggers an invalid read in the (1) detect_form or (2) bid_entry function in libarchive/archive_read_support_format_mtree.c.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8688.html">CVE-2016-8688</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8688">SUSE bug 1005076</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136448" comment="bsdtar-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136449" comment="libarchive-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136450" comment="libarchive-devel-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136451" comment="libarchive13-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136452" comment="libarchive13-32bit-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8689</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8689" source="CVE"/>
    <description>
    The read_Header function in archive_read_support_format_7zip.c in libarchive 3.2.1 allows remote attackers to cause a denial of service (out-of-bounds read) via multiple EmptyStream attributes in a header in a 7zip archive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8689.html">CVE-2016-8689</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8689">SUSE bug 1005072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8689">SUSE bug 1005072</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136448" comment="bsdtar-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136449" comment="libarchive-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152671" comment="libarchive is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136450" comment="libarchive-devel-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136451" comment="libarchive13-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136452" comment="libarchive13-32bit-3.1.2-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8690</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8690" source="CVE"/>
    <description>
    The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted BMP image in an imginfo command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8690.html">CVE-2016-8690</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8690">SUSE bug 1005084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8690">SUSE bug 1005084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8690">SUSE bug 1007009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8690">SUSE bug 1005084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8690">SUSE bug 1007009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8690">SUSE bug 1007009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8690">SUSE bug 1007009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8690">SUSE bug 1005084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8690">SUSE bug 1007009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8690">SUSE bug 1005084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8690">SUSE bug 1005084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8690">SUSE bug 1007009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8690">SUSE bug 1005084</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135598" comment="jasper-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135599" comment="libjasper-devel-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135600" comment="libjasper1-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135601" comment="libjasper1-32bit-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8691</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8691" source="CVE"/>
    <description>
    The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted XRsiz value in a BMP image to the imginfo command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8691.html">CVE-2016-8691</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8691">SUSE bug 1005090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8691">SUSE bug 1005090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8691">SUSE bug 1005090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8691">SUSE bug 1005090</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135598" comment="jasper-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135599" comment="libjasper-devel-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135600" comment="libjasper1-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135601" comment="libjasper1-32bit-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8692</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8692" source="CVE"/>
    <description>
    The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted YRsiz value in a BMP image to the imginfo command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8692.html">CVE-2016-8692</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8692">SUSE bug 1005090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8692">SUSE bug 1005090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8692">SUSE bug 1005090</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8692">SUSE bug 1005090</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135598" comment="jasper-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135599" comment="libjasper-devel-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135600" comment="libjasper1-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135601" comment="libjasper1-32bit-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8693</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8693" source="CVE"/>
    <description>
    Double free vulnerability in the mem_close function in jas_stream.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image to the imginfo command.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8693.html">CVE-2016-8693</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8693">SUSE bug 1005242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8693">SUSE bug 1005242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8693">SUSE bug 1005242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8693">SUSE bug 1005242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8693">SUSE bug 1005242</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135598" comment="jasper-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135599" comment="libjasper-devel-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135600" comment="libjasper1-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135601" comment="libjasper1-32bit-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8704</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8704" source="CVE"/>
    <description>
    An integer overflow in the process_bin_append_prepend function in Memcached, which is responsible for processing multiple commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8704.html">CVE-2016-8704</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8704">SUSE bug 1007719</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8704">SUSE bug 1007866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8704">SUSE bug 1007871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8704">SUSE bug 1007871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8704">SUSE bug 1007871</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8704">SUSE bug 1007871</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135585" comment="memcached-1.4.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153862" comment="memcached is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135586" comment="memcached-devel-1.4.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153863" comment="memcached-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8705</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8705" source="CVE"/>
    <description>
    Multiple integer overflows in process_bin_update function in Memcached, which is responsible for processing multiple commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8705.html">CVE-2016-8705</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007870</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1056865</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8705">SUSE bug 1007870</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135585" comment="memcached-1.4.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153862" comment="memcached is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135586" comment="memcached-devel-1.4.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153863" comment="memcached-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8706</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8706" source="CVE"/>
    <description>
    An integer overflow in process_bin_sasl_auth function in Memcached, which is responsible for authentication commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8706.html">CVE-2016-8706</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8706">SUSE bug 1007866</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8706">SUSE bug 1007869</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8706">SUSE bug 1007869</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8706">SUSE bug 1007869</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8706">SUSE bug 1007869</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8706">SUSE bug 1007869</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8706">SUSE bug 1007869</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8706">SUSE bug 1007869</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135585" comment="memcached-1.4.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153862" comment="memcached is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135586" comment="memcached-devel-1.4.22-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153863" comment="memcached-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8707</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8707" source="CVE"/>
    <description>
    An exploitable out of bounds write exists in the handling of compressed TIFF images in ImageMagicks's convert utility. A crafted TIFF document can lead to an out of bounds write which in particular circumstances could be leveraged into remote code execution. The vulnerability can be triggered through any user controlled TIFF that is handled by this functionality.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8707.html">CVE-2016-8707</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8707">SUSE bug 1014159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8707">SUSE bug 1014159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8707">SUSE bug 1014159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8707">SUSE bug 1014159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8707">SUSE bug 1014159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8707">SUSE bug 1014159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8707">SUSE bug 1014159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8707">SUSE bug 1014159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8707">SUSE bug 1014159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8707">SUSE bug 1014159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8707">SUSE bug 1014159</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8707">SUSE bug 1014159</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146415" comment="ImageMagick-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146416" comment="ImageMagick-devel-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146417" comment="ImageMagick-devel-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146418" comment="ImageMagick-doc-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146419" comment="ImageMagick-extra-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146420" comment="libMagick++-6_Q16-3-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146421" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146422" comment="libMagick++-devel-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146423" comment="libMagick++-devel-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146424" comment="libMagickCore-6_Q16-1-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146425" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146426" comment="libMagickWand-6_Q16-1-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146427" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146428" comment="perl-PerlMagick-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8735</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8735" source="CVE"/>
    <description>
    Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8735.html">CVE-2016-8735</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8735">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8735">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8735">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8735">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8735">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8735">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8735">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8735">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8735">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8735">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8735">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8735">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8735">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8735">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8735">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8735">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8735">SUSE bug 1011805</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8735">SUSE bug 1011805</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142899" comment="apache-commons-dbcp-2.1.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153286" comment="apache-commons-dbcp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142900" comment="apache-commons-dbcp-javadoc-2.1.1-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153287" comment="apache-commons-dbcp-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142901" comment="apache-commons-pool2-2.4.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153288" comment="apache-commons-pool2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142902" comment="apache-commons-pool2-javadoc-2.4.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153289" comment="apache-commons-pool2-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142903" comment="tomcat-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142904" comment="tomcat-admin-webapps-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142905" comment="tomcat-docs-webapp-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142906" comment="tomcat-el-3_0-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142907" comment="tomcat-embed-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142908" comment="tomcat-javadoc-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142909" comment="tomcat-jsp-2_3-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142910" comment="tomcat-jsvc-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142911" comment="tomcat-lib-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142912" comment="tomcat-servlet-3_1-api-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152853" comment="tomcat-servlet-3_1-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142913" comment="tomcat-webapps-8.0.32-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8743</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743" source="CVE"/>
    <description>
    Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8743.html">CVE-2016-8743</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1033513</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 930944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 930944</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1016715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1086774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1086774</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8743">SUSE bug 1086774</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150390" comment="apache2-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150391" comment="apache2-devel-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150392" comment="apache2-doc-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150393" comment="apache2-event-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150394" comment="apache2-example-pages-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150395" comment="apache2-prefork-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150396" comment="apache2-utils-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150397" comment="apache2-worker-2.4.16-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8745</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8745" source="CVE"/>
    <description>
    A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8745.html">CVE-2016-8745</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8745">SUSE bug 1015119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8745">SUSE bug 1015119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8745">SUSE bug 1015119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8745">SUSE bug 1015119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8745">SUSE bug 1015119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8745">SUSE bug 1015119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8745">SUSE bug 1015119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8745">SUSE bug 1015119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8745">SUSE bug 1015119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8745">SUSE bug 1015119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8745">SUSE bug 1015119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8745">SUSE bug 1015119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8745">SUSE bug 1015119</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155492" comment="tomcat-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155493" comment="tomcat-admin-webapps-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155494" comment="tomcat-docs-webapp-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155495" comment="tomcat-el-3_0-api-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155496" comment="tomcat-embed-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155497" comment="tomcat-javadoc-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155498" comment="tomcat-jsp-2_3-api-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155499" comment="tomcat-jsvc-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155500" comment="tomcat-lib-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155501" comment="tomcat-servlet-3_1-api-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152853" comment="tomcat-servlet-3_1-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155502" comment="tomcat-webapps-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8858</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8858" source="CVE"/>
    <description>
    ** DISPUTED ** The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests.  NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8858.html">CVE-2016-8858</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1039572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1039572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1039572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1039572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1039572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1039572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1039572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1039572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1039572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1005480</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1039572</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1087412</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8858">SUSE bug 1087412</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149506" comment="openssh-6.6p1-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149507" comment="openssh-askpass-gnome-6.6p1-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153167" comment="openssh-askpass-gnome is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149508" comment="openssh-cavs-6.6p1-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153168" comment="openssh-cavs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149509" comment="openssh-fips-6.6p1-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153169" comment="openssh-fips is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149510" comment="openssh-helpers-6.6p1-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152111" comment="openssh-helpers is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8862</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8862" source="CVE"/>
    <description>
    The AcquireMagickMemory function in MagickCore/memory.c in ImageMagick before 7.0.3.3 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8862.html">CVE-2016-8862</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8862">SUSE bug 1007245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8862">SUSE bug 1007245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8862">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8862">SUSE bug 1007245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8862">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8862">SUSE bug 1007245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8862">SUSE bug 1007245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8862">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8862">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8862">SUSE bug 1007245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8862">SUSE bug 1007245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8862">SUSE bug 1007245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8862">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8862">SUSE bug 1031267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8862">SUSE bug 1009318</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135562" comment="GraphicsMagick-1.3.21-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135563" comment="GraphicsMagick-devel-1.3.21-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142421" comment="ImageMagick-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142422" comment="ImageMagick-devel-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142423" comment="ImageMagick-devel-32bit-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142424" comment="ImageMagick-doc-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142425" comment="ImageMagick-extra-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135564" comment="libGraphicsMagick++-Q16-11-1.3.21-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135566" comment="libGraphicsMagick++-devel-1.3.21-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135567" comment="libGraphicsMagick-Q16-3-1.3.21-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135568" comment="libGraphicsMagick3-config-1.3.21-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135569" comment="libGraphicsMagickWand-Q16-2-1.3.21-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142426" comment="libMagick++-6_Q16-3-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142427" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142428" comment="libMagick++-devel-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142429" comment="libMagick++-devel-32bit-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142430" comment="libMagickCore-6_Q16-1-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142431" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142432" comment="libMagickWand-6_Q16-1-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142433" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135570" comment="perl-GraphicsMagick-1.3.21-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142434" comment="perl-PerlMagick-6.8.8.1-24.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8864</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864" source="CVE"/>
    <description>
    named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8864.html">CVE-2016-8864</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8864">SUSE bug 1007829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8864">SUSE bug 1007829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8864">SUSE bug 1007829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8864">SUSE bug 1007829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8864">SUSE bug 1007829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8864">SUSE bug 1007829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8864">SUSE bug 1020526</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8864">SUSE bug 1024130</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135335" comment="bind-9.9.9P1-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135336" comment="bind-chrootenv-9.9.9P1-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135337" comment="bind-devel-9.9.9P1-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135338" comment="bind-doc-9.9.9P1-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135339" comment="bind-libs-9.9.9P1-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135340" comment="bind-libs-32bit-9.9.9P1-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153103" comment="bind-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135341" comment="bind-lwresd-9.9.9P1-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153104" comment="bind-lwresd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135342" comment="bind-utils-9.9.9P1-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8866</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8866" source="CVE"/>
    <description>
    The AcquireMagickMemory function in MagickCore/memory.c in ImageMagick 7.0.3.3 before 7.0.3.8 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8866.html">CVE-2016-8866</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1007245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1007245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1007245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1007245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1007245</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1031267</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1009318</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8866">SUSE bug 1009318</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145809" comment="GraphicsMagick-1.3.21-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145810" comment="GraphicsMagick-devel-1.3.21-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146415" comment="ImageMagick-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146416" comment="ImageMagick-devel-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146417" comment="ImageMagick-devel-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146418" comment="ImageMagick-doc-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146419" comment="ImageMagick-extra-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145780" comment="libGraphicsMagick++-Q16-11-1.3.21-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145811" comment="libGraphicsMagick++-devel-1.3.21-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145812" comment="libGraphicsMagick-Q16-3-1.3.21-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145813" comment="libGraphicsMagick3-config-1.3.21-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145814" comment="libGraphicsMagickWand-Q16-2-1.3.21-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146420" comment="libMagick++-6_Q16-3-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146421" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146422" comment="libMagick++-devel-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146423" comment="libMagick++-devel-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146424" comment="libMagickCore-6_Q16-1-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146425" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146426" comment="libMagickWand-6_Q16-1-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146427" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145815" comment="perl-GraphicsMagick-1.3.21-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146428" comment="perl-PerlMagick-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8867</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8867" source="CVE"/>
    <description>
    Docker Engine 1.12.2 enabled ambient capabilities with misconfigured capability policies. This allowed malicious images to bypass user permissions to access files within the container filesystem or mounted volumes.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8867.html">CVE-2016-8867</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8867">SUSE bug 1007249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8867">SUSE bug 1007249</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8867">SUSE bug 1007249</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136457" comment="containerd-0.2.4+gitr565_0366d7e-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136458" comment="containerd-ctr-0.2.4+gitr565_0366d7e-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136459" comment="containerd-test-0.2.4+gitr565_0366d7e-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153866" comment="containerd-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136460" comment="docker-1.12.3-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136461" comment="docker-bash-completion-1.12.3-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136462" comment="docker-test-1.12.3-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152507" comment="docker-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136463" comment="docker-zsh-completion-1.12.3-24.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136464" comment="runc-0.1.1+gitr2816_02f8fa7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136465" comment="runc-test-0.1.1+gitr2816_02f8fa7-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153868" comment="runc-test is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8880</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8880" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8880" source="CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-4516. Reason: This candidate is a duplicate of CVE-2011-4516. Notes: All CVE users should reference CVE-2011-4516 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8880.html">CVE-2016-8880</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8880">SUSE bug 1006591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8880">SUSE bug 1006591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8880">SUSE bug 1006591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8880">SUSE bug 1006591</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8880">SUSE bug 1006591</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135598" comment="jasper-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135599" comment="libjasper-devel-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135600" comment="libjasper1-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135601" comment="libjasper1-32bit-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8881</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8881" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8881" source="CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-4517. Reason: This candidate is a duplicate of CVE-2011-4517. Notes: All CVE users should reference CVE-2011-4517 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8881.html">CVE-2016-8881</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8881">SUSE bug 1006593</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8881">SUSE bug 1006593</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8881">SUSE bug 1006593</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8881">SUSE bug 1006593</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8881">SUSE bug 1006593</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135598" comment="jasper-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135599" comment="libjasper-devel-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135600" comment="libjasper1-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135601" comment="libjasper1-32bit-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8882</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8882" source="CVE"/>
    <description>
    The jpc_dec_tilefini function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8882.html">CVE-2016-8882</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8882">SUSE bug 1006597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8882">SUSE bug 1006597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8882">SUSE bug 1006597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8882">SUSE bug 1006597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8882">SUSE bug 1006597</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8882">SUSE bug 1006597</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135598" comment="jasper-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135599" comment="libjasper-devel-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135600" comment="libjasper1-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135601" comment="libjasper1-32bit-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8883</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8883" source="CVE"/>
    <description>
    The jpc_dec_tiledecode function in jpc_dec.c in JasPer before 1.900.8 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8883.html">CVE-2016-8883</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8883">SUSE bug 1006598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8883">SUSE bug 1006598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8883">SUSE bug 1006598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8883">SUSE bug 1006598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8883">SUSE bug 1006598</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8883">SUSE bug 1006598</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135598" comment="jasper-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135599" comment="libjasper-devel-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135600" comment="libjasper1-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135601" comment="libjasper1-32bit-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8884</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8884" source="CVE"/>
    <description>
    The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) by calling the imginfo command with a crafted BMP image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8690.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8884.html">CVE-2016-8884</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8884">SUSE bug 1005084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8884">SUSE bug 1007009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8884">SUSE bug 1005084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8884">SUSE bug 1007009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8884">SUSE bug 1007009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8884">SUSE bug 1007009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8884">SUSE bug 1005084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8884">SUSE bug 1007009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8884">SUSE bug 1005084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8884">SUSE bug 1007009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8884">SUSE bug 1005084</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135598" comment="jasper-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135599" comment="libjasper-devel-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135600" comment="libjasper1-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135601" comment="libjasper1-32bit-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8885</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8885" source="CVE"/>
    <description>
    The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.9 allows remote attackers to cause a denial of service (NULL pointer dereference) by calling the imginfo command with a crafted BMP image.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8885.html">CVE-2016-8885</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8885">SUSE bug 1005084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8885">SUSE bug 1007009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8885">SUSE bug 1005084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8885">SUSE bug 1007009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8885">SUSE bug 1007009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8885">SUSE bug 1007009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8885">SUSE bug 1005084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8885">SUSE bug 1007009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8885">SUSE bug 1005084</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8885">SUSE bug 1007009</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8885">SUSE bug 1005084</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135598" comment="jasper-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135599" comment="libjasper-devel-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135600" comment="libjasper1-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135601" comment="libjasper1-32bit-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8886</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8886" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8886" source="CVE"/>
    <description>
    The jas_malloc function in libjasper/base/jas_malloc.c in JasPer before 1.900.11 allows remote attackers to have unspecified impact via a crafted file, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8886.html">CVE-2016-8886</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8886">SUSE bug 1006599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8886">SUSE bug 1006599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8886">SUSE bug 1006599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8886">SUSE bug 1006599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8886">SUSE bug 1006599</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8886">SUSE bug 1006599</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135598" comment="jasper-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135599" comment="libjasper-devel-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135600" comment="libjasper1-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135601" comment="libjasper1-32bit-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8887</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8887" source="CVE"/>
    <description>
    The jp2_colr_destroy function in libjasper/jp2/jp2_cod.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (NULL pointer dereference).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8887.html">CVE-2016-8887</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8887">SUSE bug 1006836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8887">SUSE bug 1006839</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8887">SUSE bug 1006836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8887">SUSE bug 1006836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8887">SUSE bug 1006836</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8887">SUSE bug 1006836</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135598" comment="jasper-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135599" comment="libjasper-devel-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135600" comment="libjasper1-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135601" comment="libjasper1-32bit-1.900.14-166.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8909</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8909" source="CVE"/>
    <description>
    The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8909.html">CVE-2016-8909</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8909">SUSE bug 1006536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8909">SUSE bug 1006536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8909">SUSE bug 1006536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8909">SUSE bug 1007160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8909">SUSE bug 1006536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8909">SUSE bug 1007160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8909">SUSE bug 1007160</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8909">SUSE bug 1006536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8909">SUSE bug 1006536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8909">SUSE bug 1006536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8909">SUSE bug 1006536</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142522" comment="qemu-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142523" comment="qemu-arm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142524" comment="qemu-block-curl-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142525" comment="qemu-block-rbd-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142526" comment="qemu-extra-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142527" comment="qemu-guest-agent-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142528" comment="qemu-ipxe-1.0.0-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142529" comment="qemu-kvm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142530" comment="qemu-lang-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142531" comment="qemu-linux-user-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142532" comment="qemu-ppc-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142533" comment="qemu-s390-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142534" comment="qemu-seabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142535" comment="qemu-sgabios-8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142536" comment="qemu-testsuite-2.3.1-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142537" comment="qemu-tools-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142538" comment="qemu-vgabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142539" comment="qemu-x86-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8910</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-8910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8910" source="CVE"/>
    <description>
    The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-8910.html">CVE-2016-8910</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8910">SUSE bug 1006538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8910">SUSE bug 1006538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8910">SUSE bug 1006538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8910">SUSE bug 1007157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8910">SUSE bug 1006538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8910">SUSE bug 1007157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8910">SUSE bug 1007157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8910">SUSE bug 1007157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8910">SUSE bug 1024178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8910">SUSE bug 1006538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8910">SUSE bug 1006538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8910">SUSE bug 1006538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8910">SUSE bug 1007157</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8910">SUSE bug 1006538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-8910">SUSE bug 1007157</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142522" comment="qemu-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142523" comment="qemu-arm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142524" comment="qemu-block-curl-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142525" comment="qemu-block-rbd-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142526" comment="qemu-extra-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142527" comment="qemu-guest-agent-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142528" comment="qemu-ipxe-1.0.0-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142529" comment="qemu-kvm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142530" comment="qemu-lang-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142531" comment="qemu-linux-user-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142532" comment="qemu-ppc-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142533" comment="qemu-s390-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142534" comment="qemu-seabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142535" comment="qemu-sgabios-8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142536" comment="qemu-testsuite-2.3.1-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142537" comment="qemu-tools-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142538" comment="qemu-vgabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142539" comment="qemu-x86-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9042</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9042" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9042.html">CVE-2016-9042</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9042">SUSE bug 1030050</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154755" comment="ntp-4.2.8p10-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154756" comment="ntp-doc-4.2.8p10-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9063</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9063" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9063.html">CVE-2016-9063</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1010424</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1010424</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1010424</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1010424</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1047240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1047240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1047240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1047240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1047240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1047240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1047240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1047240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1047240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1047240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1047240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1047240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1047240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1047240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1047240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1047240</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9063">SUSE bug 1047240</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135684" comment="MozillaFirefox-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135685" comment="MozillaFirefox-branding-upstream-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135686" comment="MozillaFirefox-buildsymbols-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135687" comment="MozillaFirefox-devel-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135688" comment="MozillaFirefox-translations-common-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135689" comment="MozillaFirefox-translations-other-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135690" comment="libfreebl3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135691" comment="libfreebl3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135692" comment="libsoftokn3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135693" comment="libsoftokn3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135694" comment="mozilla-nss-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135695" comment="mozilla-nss-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135696" comment="mozilla-nss-certs-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135697" comment="mozilla-nss-certs-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135698" comment="mozilla-nss-devel-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135699" comment="mozilla-nss-sysinit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135700" comment="mozilla-nss-sysinit-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135701" comment="mozilla-nss-tools-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9064</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9064" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9064.html">CVE-2016-9064</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9064">SUSE bug 1010402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9064">SUSE bug 1010402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9064">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9064">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9064">SUSE bug 1010402</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9064">SUSE bug 1010402</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135684" comment="MozillaFirefox-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135685" comment="MozillaFirefox-branding-upstream-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135686" comment="MozillaFirefox-buildsymbols-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135687" comment="MozillaFirefox-devel-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135688" comment="MozillaFirefox-translations-common-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135689" comment="MozillaFirefox-translations-other-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135690" comment="libfreebl3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135691" comment="libfreebl3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135692" comment="libsoftokn3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135693" comment="libsoftokn3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135694" comment="mozilla-nss-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135695" comment="mozilla-nss-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135696" comment="mozilla-nss-certs-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135697" comment="mozilla-nss-certs-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135698" comment="mozilla-nss-devel-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135699" comment="mozilla-nss-sysinit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135700" comment="mozilla-nss-sysinit-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135701" comment="mozilla-nss-tools-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9066</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9066" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9066.html">CVE-2016-9066</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9066">SUSE bug 1010404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9066">SUSE bug 1010404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9066">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9066">SUSE bug 1010404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9066">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9066">SUSE bug 1010404</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9066">SUSE bug 1010404</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135684" comment="MozillaFirefox-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135685" comment="MozillaFirefox-branding-upstream-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135686" comment="MozillaFirefox-buildsymbols-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135687" comment="MozillaFirefox-devel-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135688" comment="MozillaFirefox-translations-common-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135689" comment="MozillaFirefox-translations-other-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135690" comment="libfreebl3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135691" comment="libfreebl3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135692" comment="libsoftokn3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135693" comment="libsoftokn3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135694" comment="mozilla-nss-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135695" comment="mozilla-nss-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135696" comment="mozilla-nss-certs-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135697" comment="mozilla-nss-certs-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135698" comment="mozilla-nss-devel-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135699" comment="mozilla-nss-sysinit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135700" comment="mozilla-nss-sysinit-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135701" comment="mozilla-nss-tools-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9067</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9067" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9067.html">CVE-2016-9067</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9067">SUSE bug 1010405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9067">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9067">SUSE bug 1010405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9067">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9067">SUSE bug 1010405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9067">SUSE bug 1010405</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135684" comment="MozillaFirefox-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135685" comment="MozillaFirefox-branding-upstream-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135686" comment="MozillaFirefox-buildsymbols-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135687" comment="MozillaFirefox-devel-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135688" comment="MozillaFirefox-translations-common-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135689" comment="MozillaFirefox-translations-other-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135690" comment="libfreebl3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135691" comment="libfreebl3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135692" comment="libsoftokn3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135693" comment="libsoftokn3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135694" comment="mozilla-nss-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135695" comment="mozilla-nss-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135696" comment="mozilla-nss-certs-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135697" comment="mozilla-nss-certs-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135698" comment="mozilla-nss-devel-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135699" comment="mozilla-nss-sysinit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135700" comment="mozilla-nss-sysinit-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135701" comment="mozilla-nss-tools-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9068</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9068" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9068.html">CVE-2016-9068</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9068">SUSE bug 1010406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9068">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9068">SUSE bug 1010406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9068">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9068">SUSE bug 1010406</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9068">SUSE bug 1010406</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135684" comment="MozillaFirefox-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135685" comment="MozillaFirefox-branding-upstream-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135686" comment="MozillaFirefox-buildsymbols-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135687" comment="MozillaFirefox-devel-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135688" comment="MozillaFirefox-translations-common-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135689" comment="MozillaFirefox-translations-other-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135690" comment="libfreebl3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135691" comment="libfreebl3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135692" comment="libsoftokn3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135693" comment="libsoftokn3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135694" comment="mozilla-nss-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135695" comment="mozilla-nss-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135696" comment="mozilla-nss-certs-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135697" comment="mozilla-nss-certs-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135698" comment="mozilla-nss-devel-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135699" comment="mozilla-nss-sysinit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135700" comment="mozilla-nss-sysinit-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135701" comment="mozilla-nss-tools-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9069</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9069" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9069.html">CVE-2016-9069</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9069">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9069">SUSE bug 1010405</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9069">SUSE bug 1010405</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135684" comment="MozillaFirefox-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135685" comment="MozillaFirefox-branding-upstream-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135686" comment="MozillaFirefox-buildsymbols-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135687" comment="MozillaFirefox-devel-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135688" comment="MozillaFirefox-translations-common-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135689" comment="MozillaFirefox-translations-other-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135690" comment="libfreebl3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135691" comment="libfreebl3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135692" comment="libsoftokn3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135693" comment="libsoftokn3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135694" comment="mozilla-nss-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135695" comment="mozilla-nss-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135696" comment="mozilla-nss-certs-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135697" comment="mozilla-nss-certs-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135698" comment="mozilla-nss-devel-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135699" comment="mozilla-nss-sysinit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135700" comment="mozilla-nss-sysinit-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135701" comment="mozilla-nss-tools-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9070</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9070" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9070.html">CVE-2016-9070</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9070">SUSE bug 1010420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9070">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9070">SUSE bug 1010420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9070">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9070">SUSE bug 1010420</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9070">SUSE bug 1010420</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135684" comment="MozillaFirefox-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135685" comment="MozillaFirefox-branding-upstream-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135686" comment="MozillaFirefox-buildsymbols-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135687" comment="MozillaFirefox-devel-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135688" comment="MozillaFirefox-translations-common-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135689" comment="MozillaFirefox-translations-other-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135690" comment="libfreebl3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135691" comment="libfreebl3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135692" comment="libsoftokn3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135693" comment="libsoftokn3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135694" comment="mozilla-nss-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135695" comment="mozilla-nss-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135696" comment="mozilla-nss-certs-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135697" comment="mozilla-nss-certs-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135698" comment="mozilla-nss-devel-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135699" comment="mozilla-nss-sysinit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135700" comment="mozilla-nss-sysinit-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135701" comment="mozilla-nss-tools-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9071</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9071" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9071.html">CVE-2016-9071</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9071">SUSE bug 1010425</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9071">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9071">SUSE bug 1010425</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9071">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9071">SUSE bug 1010425</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9071">SUSE bug 1010425</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135684" comment="MozillaFirefox-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135685" comment="MozillaFirefox-branding-upstream-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135686" comment="MozillaFirefox-buildsymbols-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135687" comment="MozillaFirefox-devel-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135688" comment="MozillaFirefox-translations-common-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135689" comment="MozillaFirefox-translations-other-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135690" comment="libfreebl3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135691" comment="libfreebl3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135692" comment="libsoftokn3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135693" comment="libsoftokn3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135694" comment="mozilla-nss-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135695" comment="mozilla-nss-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135696" comment="mozilla-nss-certs-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135697" comment="mozilla-nss-certs-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135698" comment="mozilla-nss-devel-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135699" comment="mozilla-nss-sysinit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135700" comment="mozilla-nss-sysinit-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135701" comment="mozilla-nss-tools-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9073</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9073" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9073.html">CVE-2016-9073</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9073">SUSE bug 1010421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9073">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9073">SUSE bug 1010421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9073">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9073">SUSE bug 1010421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9073">SUSE bug 1010421</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135684" comment="MozillaFirefox-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135685" comment="MozillaFirefox-branding-upstream-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135686" comment="MozillaFirefox-buildsymbols-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135687" comment="MozillaFirefox-devel-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135688" comment="MozillaFirefox-translations-common-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135689" comment="MozillaFirefox-translations-other-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135690" comment="libfreebl3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135691" comment="libfreebl3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135692" comment="libsoftokn3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135693" comment="libsoftokn3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135694" comment="mozilla-nss-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135695" comment="mozilla-nss-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135696" comment="mozilla-nss-certs-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135697" comment="mozilla-nss-certs-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135698" comment="mozilla-nss-devel-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135699" comment="mozilla-nss-sysinit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135700" comment="mozilla-nss-sysinit-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135701" comment="mozilla-nss-tools-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9074</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9074.html">CVE-2016-9074</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9074">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9074">SUSE bug 1010422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9074">SUSE bug 1010422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9074">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9074">SUSE bug 1010422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9074">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9074">SUSE bug 1010422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9074">SUSE bug 1010422</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135684" comment="MozillaFirefox-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135685" comment="MozillaFirefox-branding-upstream-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135686" comment="MozillaFirefox-buildsymbols-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135687" comment="MozillaFirefox-devel-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135688" comment="MozillaFirefox-translations-common-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135689" comment="MozillaFirefox-translations-other-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135690" comment="libfreebl3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135691" comment="libfreebl3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135692" comment="libsoftokn3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135693" comment="libsoftokn3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135694" comment="mozilla-nss-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135695" comment="mozilla-nss-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135696" comment="mozilla-nss-certs-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135697" comment="mozilla-nss-certs-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135698" comment="mozilla-nss-devel-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135699" comment="mozilla-nss-sysinit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135700" comment="mozilla-nss-sysinit-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135701" comment="mozilla-nss-tools-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9075</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9075" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9075.html">CVE-2016-9075</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9075">SUSE bug 1010408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9075">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9075">SUSE bug 1010408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9075">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9075">SUSE bug 1010408</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9075">SUSE bug 1010408</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135684" comment="MozillaFirefox-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135685" comment="MozillaFirefox-branding-upstream-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135686" comment="MozillaFirefox-buildsymbols-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135687" comment="MozillaFirefox-devel-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135688" comment="MozillaFirefox-translations-common-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135689" comment="MozillaFirefox-translations-other-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135690" comment="libfreebl3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135691" comment="libfreebl3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135692" comment="libsoftokn3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135693" comment="libsoftokn3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135694" comment="mozilla-nss-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135695" comment="mozilla-nss-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135696" comment="mozilla-nss-certs-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135697" comment="mozilla-nss-certs-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135698" comment="mozilla-nss-devel-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135699" comment="mozilla-nss-sysinit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135700" comment="mozilla-nss-sysinit-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135701" comment="mozilla-nss-tools-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9076</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9076" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9076.html">CVE-2016-9076</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9076">SUSE bug 1010423</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9076">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9076">SUSE bug 1010423</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9076">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9076">SUSE bug 1010423</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9076">SUSE bug 1010423</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135684" comment="MozillaFirefox-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135685" comment="MozillaFirefox-branding-upstream-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135686" comment="MozillaFirefox-buildsymbols-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135687" comment="MozillaFirefox-devel-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135688" comment="MozillaFirefox-translations-common-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135689" comment="MozillaFirefox-translations-other-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135690" comment="libfreebl3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135691" comment="libfreebl3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135692" comment="libsoftokn3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135693" comment="libsoftokn3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135694" comment="mozilla-nss-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135695" comment="mozilla-nss-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135696" comment="mozilla-nss-certs-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135697" comment="mozilla-nss-certs-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135698" comment="mozilla-nss-devel-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135699" comment="mozilla-nss-sysinit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135700" comment="mozilla-nss-sysinit-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135701" comment="mozilla-nss-tools-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9077</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9077" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9077.html">CVE-2016-9077</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9077">SUSE bug 1010409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9077">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9077">SUSE bug 1010409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9077">SUSE bug 1009026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9077">SUSE bug 1010409</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9077">SUSE bug 1010409</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135684" comment="MozillaFirefox-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135685" comment="MozillaFirefox-branding-upstream-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135686" comment="MozillaFirefox-buildsymbols-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135687" comment="MozillaFirefox-devel-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135688" comment="MozillaFirefox-translations-common-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135689" comment="MozillaFirefox-translations-other-50.0-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135690" comment="libfreebl3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135691" comment="libfreebl3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135692" comment="libsoftokn3-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135693" comment="libsoftokn3-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135694" comment="mozilla-nss-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135695" comment="mozilla-nss-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135696" comment="mozilla-nss-certs-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135697" comment="mozilla-nss-certs-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135698" comment="mozilla-nss-devel-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135699" comment="mozilla-nss-sysinit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135700" comment="mozilla-nss-sysinit-32bit-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135701" comment="mozilla-nss-tools-3.26.2-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9078</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9078" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9078.html">CVE-2016-9078</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9078">SUSE bug 1012807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9078">SUSE bug 1012807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9078">SUSE bug 1012807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9078">SUSE bug 1012807</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136368" comment="MozillaFirefox-50.0.2-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136369" comment="MozillaFirefox-branding-upstream-50.0.2-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136370" comment="MozillaFirefox-buildsymbols-50.0.2-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136371" comment="MozillaFirefox-devel-50.0.2-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136372" comment="MozillaFirefox-translations-common-50.0.2-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136373" comment="MozillaFirefox-translations-other-50.0.2-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9079</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9079.html">CVE-2016-9079</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9079">SUSE bug 1012964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9079">SUSE bug 1012964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9079">SUSE bug 1012964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9079">SUSE bug 1012964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9079">SUSE bug 1012964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9079">SUSE bug 1012964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9079">SUSE bug 1012964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9079">SUSE bug 1012964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9079">SUSE bug 1012964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9079">SUSE bug 1012964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9079">SUSE bug 1012964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9079">SUSE bug 1012964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9079">SUSE bug 1012964</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9079">SUSE bug 1012964</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136368" comment="MozillaFirefox-50.0.2-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136369" comment="MozillaFirefox-branding-upstream-50.0.2-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136370" comment="MozillaFirefox-buildsymbols-50.0.2-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136371" comment="MozillaFirefox-devel-50.0.2-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136372" comment="MozillaFirefox-translations-common-50.0.2-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136373" comment="MozillaFirefox-translations-other-50.0.2-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136335" comment="MozillaThunderbird-45.5.1-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136336" comment="MozillaThunderbird-buildsymbols-45.5.1-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136337" comment="MozillaThunderbird-devel-45.5.1-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136338" comment="MozillaThunderbird-translations-common-45.5.1-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136339" comment="MozillaThunderbird-translations-other-45.5.1-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9080</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9080" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9080.html">CVE-2016-9080</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9080">SUSE bug 1015542</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143102" comment="MozillaFirefox-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143103" comment="MozillaFirefox-branding-upstream-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143104" comment="MozillaFirefox-buildsymbols-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143105" comment="MozillaFirefox-devel-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143106" comment="MozillaFirefox-translations-common-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143107" comment="MozillaFirefox-translations-other-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9083</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9083" source="CVE"/>
    <description>
    drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a "state machine confusion bug."
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9083.html">CVE-2016-9083</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9083">SUSE bug 1007197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9083">SUSE bug 1007197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9083">SUSE bug 1007197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9083">SUSE bug 1007197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9083">SUSE bug 1007197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9083">SUSE bug 1007197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9083">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9083">SUSE bug 1007197</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136831" comment="drbd-8.4.6-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136832" comment="drbd-kmp-default-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136833" comment="drbd-kmp-pv-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136834" comment="drbd-kmp-xen-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136835" comment="hdjmod-1.28-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136836" comment="hdjmod-kmp-default-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136837" comment="hdjmod-kmp-pae-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136838" comment="hdjmod-kmp-pv-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136839" comment="hdjmod-kmp-xen-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136840" comment="ipset-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136841" comment="ipset-devel-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136842" comment="ipset-kmp-default-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136843" comment="ipset-kmp-pae-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136844" comment="ipset-kmp-pv-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136845" comment="ipset-kmp-xen-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136846" comment="kernel-debug-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136847" comment="kernel-debug-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136848" comment="kernel-debug-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136849" comment="kernel-default-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136850" comment="kernel-default-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136851" comment="kernel-default-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136852" comment="kernel-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136853" comment="kernel-docs-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136854" comment="kernel-docs-html-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136855" comment="kernel-docs-pdf-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136856" comment="kernel-ec2-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136857" comment="kernel-ec2-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136858" comment="kernel-ec2-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136859" comment="kernel-macros-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136860" comment="kernel-obs-build-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136861" comment="kernel-obs-qa-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136862" comment="kernel-pae-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136863" comment="kernel-pae-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136864" comment="kernel-pae-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136865" comment="kernel-pv-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136866" comment="kernel-pv-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136867" comment="kernel-pv-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136868" comment="kernel-source-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136869" comment="kernel-source-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136870" comment="kernel-syms-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136871" comment="kernel-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136872" comment="kernel-vanilla-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136873" comment="kernel-xen-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136874" comment="kernel-xen-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136875" comment="kernel-xen-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136876" comment="libipset3-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136877" comment="lttng-modules-2.7.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136878" comment="lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136879" comment="lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136880" comment="pcfclock-0.44-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136881" comment="pcfclock-kmp-default-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136882" comment="pcfclock-kmp-pae-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136883" comment="pcfclock-kmp-pv-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136884" comment="vhba-kmp-20140928-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136885" comment="vhba-kmp-default-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136886" comment="vhba-kmp-pae-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136887" comment="vhba-kmp-pv-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136888" comment="vhba-kmp-xen-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9084</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9084" source="CVE"/>
    <description>
    drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel through 4.8.11 misuses the kzalloc function, which allows local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9084.html">CVE-2016-9084</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9084">SUSE bug 1007197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9084">SUSE bug 1007197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9084">SUSE bug 1007197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9084">SUSE bug 1007197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9084">SUSE bug 1007197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9084">SUSE bug 1007197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9084">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9084">SUSE bug 1007197</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136831" comment="drbd-8.4.6-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136832" comment="drbd-kmp-default-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136833" comment="drbd-kmp-pv-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136834" comment="drbd-kmp-xen-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136835" comment="hdjmod-1.28-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136836" comment="hdjmod-kmp-default-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136837" comment="hdjmod-kmp-pae-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136838" comment="hdjmod-kmp-pv-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136839" comment="hdjmod-kmp-xen-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136840" comment="ipset-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136841" comment="ipset-devel-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136842" comment="ipset-kmp-default-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136843" comment="ipset-kmp-pae-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136844" comment="ipset-kmp-pv-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136845" comment="ipset-kmp-xen-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136846" comment="kernel-debug-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136847" comment="kernel-debug-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136848" comment="kernel-debug-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136849" comment="kernel-default-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136850" comment="kernel-default-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136851" comment="kernel-default-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136852" comment="kernel-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136853" comment="kernel-docs-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136854" comment="kernel-docs-html-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136855" comment="kernel-docs-pdf-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136856" comment="kernel-ec2-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136857" comment="kernel-ec2-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136858" comment="kernel-ec2-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136859" comment="kernel-macros-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136860" comment="kernel-obs-build-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136861" comment="kernel-obs-qa-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136862" comment="kernel-pae-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136863" comment="kernel-pae-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136864" comment="kernel-pae-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136865" comment="kernel-pv-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136866" comment="kernel-pv-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136867" comment="kernel-pv-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136868" comment="kernel-source-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136869" comment="kernel-source-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136870" comment="kernel-syms-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136871" comment="kernel-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136872" comment="kernel-vanilla-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136873" comment="kernel-xen-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136874" comment="kernel-xen-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136875" comment="kernel-xen-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136876" comment="libipset3-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136877" comment="lttng-modules-2.7.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136878" comment="lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136879" comment="lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136880" comment="pcfclock-0.44-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136881" comment="pcfclock-kmp-default-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136882" comment="pcfclock-kmp-pae-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136883" comment="pcfclock-kmp-pv-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136884" comment="vhba-kmp-20140928-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136885" comment="vhba-kmp-default-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136886" comment="vhba-kmp-pae-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136887" comment="vhba-kmp-pv-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136888" comment="vhba-kmp-xen-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9101</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9101" source="CVE"/>
    <description>
    Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9101.html">CVE-2016-9101</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1007391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1007391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1013668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1013668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1007391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1007391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1013668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1007391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1007391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1007391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1013668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1013668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1007391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1013668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1024181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1024181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1013668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1013668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1013668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1013668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1013668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1007391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1007391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1024181</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1013668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1013668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1013668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1013668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1007391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1013668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1007391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1013668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1007391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9101">SUSE bug 1013668</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142522" comment="qemu-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142523" comment="qemu-arm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142524" comment="qemu-block-curl-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142525" comment="qemu-block-rbd-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142526" comment="qemu-extra-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142527" comment="qemu-guest-agent-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142528" comment="qemu-ipxe-1.0.0-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142529" comment="qemu-kvm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142530" comment="qemu-lang-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142531" comment="qemu-linux-user-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142532" comment="qemu-ppc-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142533" comment="qemu-s390-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142534" comment="qemu-seabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142535" comment="qemu-sgabios-8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142536" comment="qemu-testsuite-2.3.1-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142537" comment="qemu-tools-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142538" comment="qemu-vgabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142539" comment="qemu-x86-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9102</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9102" source="CVE"/>
    <description>
    Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9102.html">CVE-2016-9102</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9102">SUSE bug 1007450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9102">SUSE bug 1007450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9102">SUSE bug 1014256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9102">SUSE bug 1007450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9102">SUSE bug 1014256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9102">SUSE bug 1014256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9102">SUSE bug 1007450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9102">SUSE bug 1007450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9102">SUSE bug 1007450</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9102">SUSE bug 1007450</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142522" comment="qemu-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142523" comment="qemu-arm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142524" comment="qemu-block-curl-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142525" comment="qemu-block-rbd-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142526" comment="qemu-extra-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142527" comment="qemu-guest-agent-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142528" comment="qemu-ipxe-1.0.0-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142529" comment="qemu-kvm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142530" comment="qemu-lang-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142531" comment="qemu-linux-user-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142532" comment="qemu-ppc-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142533" comment="qemu-s390-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142534" comment="qemu-seabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142535" comment="qemu-sgabios-8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142536" comment="qemu-testsuite-2.3.1-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142537" comment="qemu-tools-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142538" comment="qemu-vgabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142539" comment="qemu-x86-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9103</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9103" source="CVE"/>
    <description>
    The v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values before writing to them.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9103.html">CVE-2016-9103</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9103">SUSE bug 1007454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9103">SUSE bug 1007454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9103">SUSE bug 1014259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9103">SUSE bug 1007454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9103">SUSE bug 1014259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9103">SUSE bug 1014259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9103">SUSE bug 1007454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9103">SUSE bug 1007454</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9103">SUSE bug 1007454</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142522" comment="qemu-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142523" comment="qemu-arm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142524" comment="qemu-block-curl-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142525" comment="qemu-block-rbd-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142526" comment="qemu-extra-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142527" comment="qemu-guest-agent-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142528" comment="qemu-ipxe-1.0.0-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142529" comment="qemu-kvm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142530" comment="qemu-lang-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142531" comment="qemu-linux-user-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142532" comment="qemu-ppc-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142533" comment="qemu-s390-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142534" comment="qemu-seabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142535" comment="qemu-sgabios-8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142536" comment="qemu-testsuite-2.3.1-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142537" comment="qemu-tools-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142538" comment="qemu-vgabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142539" comment="qemu-x86-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9104</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9104" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) v9fs_xattr_read and (2) v9fs_xattr_write functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via a crafted offset, which triggers an out-of-bounds access.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9104.html">CVE-2016-9104</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9104">SUSE bug 1007493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9104">SUSE bug 1007493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9104">SUSE bug 1014297</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9104">SUSE bug 1007493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9104">SUSE bug 1014297</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9104">SUSE bug 1014297</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9104">SUSE bug 1007493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9104">SUSE bug 1007493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9104">SUSE bug 1034990</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9104">SUSE bug 1007493</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9104">SUSE bug 1007493</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142522" comment="qemu-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142523" comment="qemu-arm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142524" comment="qemu-block-curl-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142525" comment="qemu-block-rbd-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142526" comment="qemu-extra-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142527" comment="qemu-guest-agent-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142528" comment="qemu-ipxe-1.0.0-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142529" comment="qemu-kvm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142530" comment="qemu-lang-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142531" comment="qemu-linux-user-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142532" comment="qemu-ppc-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142533" comment="qemu-s390-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142534" comment="qemu-seabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142535" comment="qemu-sgabios-8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142536" comment="qemu-testsuite-2.3.1-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142537" comment="qemu-tools-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142538" comment="qemu-vgabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142539" comment="qemu-x86-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9105</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9105" source="CVE"/>
    <description>
    Memory leak in the v9fs_link function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors involving a reference to the source fid object.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9105.html">CVE-2016-9105</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9105">SUSE bug 1007494</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9105">SUSE bug 1007494</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9105">SUSE bug 1014279</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9105">SUSE bug 1007494</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9105">SUSE bug 1014279</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9105">SUSE bug 1014279</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9105">SUSE bug 1007494</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9105">SUSE bug 1007494</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9105">SUSE bug 1007494</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9105">SUSE bug 1007494</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142522" comment="qemu-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142523" comment="qemu-arm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142524" comment="qemu-block-curl-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142525" comment="qemu-block-rbd-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142526" comment="qemu-extra-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142527" comment="qemu-guest-agent-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142528" comment="qemu-ipxe-1.0.0-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142529" comment="qemu-kvm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142530" comment="qemu-lang-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142531" comment="qemu-linux-user-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142532" comment="qemu-ppc-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142533" comment="qemu-s390-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142534" comment="qemu-seabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142535" comment="qemu-sgabios-8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142536" comment="qemu-testsuite-2.3.1-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142537" comment="qemu-tools-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142538" comment="qemu-vgabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142539" comment="qemu-x86-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9106</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9106" source="CVE"/>
    <description>
    Memory leak in the v9fs_write function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) by leveraging failure to free an IO vector.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9106.html">CVE-2016-9106</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9106">SUSE bug 1007495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9106">SUSE bug 1007495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9106">SUSE bug 1014299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9106">SUSE bug 1007495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9106">SUSE bug 1007495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9106">SUSE bug 1014299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9106">SUSE bug 1014299</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9106">SUSE bug 1007495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9106">SUSE bug 1007495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9106">SUSE bug 1007495</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9106">SUSE bug 1007495</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142522" comment="qemu-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142523" comment="qemu-arm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142524" comment="qemu-block-curl-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142525" comment="qemu-block-rbd-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142526" comment="qemu-extra-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142527" comment="qemu-guest-agent-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142528" comment="qemu-ipxe-1.0.0-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142529" comment="qemu-kvm-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142530" comment="qemu-lang-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142531" comment="qemu-linux-user-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142532" comment="qemu-ppc-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142533" comment="qemu-s390-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142534" comment="qemu-seabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142535" comment="qemu-sgabios-8-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142536" comment="qemu-testsuite-2.3.1-22.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142537" comment="qemu-tools-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142538" comment="qemu-vgabios-1.8.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142539" comment="qemu-x86-2.3.1-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9112</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9112" source="CVE"/>
    <description>
    Floating Point Exception (aka FPE or divide by zero) in opj_pi_next_cprl function in openjp2/pi.c:523 in OpenJPEG 2.1.2.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9112.html">CVE-2016-9112</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9112">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9112">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9112">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9112">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9112">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9112">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9112">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9112">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9112">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9112">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9112">SUSE bug 1056396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9112">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9112">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9112">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9112">SUSE bug 1015662</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147387" comment="libopenjp2-7-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153807" comment="libopenjp2-7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147388" comment="libopenjp2-7-32bit-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153808" comment="libopenjp2-7-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147389" comment="openjpeg2-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153813" comment="openjpeg2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147390" comment="openjpeg2-devel-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153814" comment="openjpeg2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9113</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9113" source="CVE"/>
    <description>
    There is a NULL pointer dereference in function imagetobmp of convertbmp.c:980 of OpenJPEG 2.1.2. image-&gt;comps[0].data is not assigned a value after initialization(NULL). Impact is Denial of Service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9113.html">CVE-2016-9113</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9113">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9113">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9113">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9113">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9113">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9113">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9113">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9113">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9113">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9113">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9113">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9113">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9113">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9113">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9113">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9113">SUSE bug 1015662</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147387" comment="libopenjp2-7-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153807" comment="libopenjp2-7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147388" comment="libopenjp2-7-32bit-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153808" comment="libopenjp2-7-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147389" comment="openjpeg2-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153813" comment="openjpeg2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147390" comment="openjpeg2-devel-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153814" comment="openjpeg2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9114</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9114" source="CVE"/>
    <description>
    There is a NULL Pointer Access in function imagetopnm of convert.c:1943(jp2) of OpenJPEG 2.1.2. image-&gt;comps[compno].data is not assigned a value after initialization(NULL). Impact is Denial of Service.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9114.html">CVE-2016-9114</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9114">SUSE bug 1007740</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9114">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9114">SUSE bug 1007740</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9114">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9114">SUSE bug 1007740</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9114">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9114">SUSE bug 1007740</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9114">SUSE bug 1007740</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9114">SUSE bug 1007740</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9114">SUSE bug 1007740</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9114">SUSE bug 1007740</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9114">SUSE bug 1007740</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9114">SUSE bug 1007740</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9114">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9114">SUSE bug 1007740</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9114">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9114">SUSE bug 1015662</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147387" comment="libopenjp2-7-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153807" comment="libopenjp2-7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147388" comment="libopenjp2-7-32bit-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153808" comment="libopenjp2-7-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147389" comment="openjpeg2-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153813" comment="openjpeg2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147390" comment="openjpeg2-devel-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153814" comment="openjpeg2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9115</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9115" source="CVE"/>
    <description>
    Heap Buffer Over-read in function imagetotga of convert.c(jp2):942 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9115.html">CVE-2016-9115</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9115">SUSE bug 1007741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9115">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9115">SUSE bug 1007741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9115">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9115">SUSE bug 1007741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9115">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9115">SUSE bug 1007741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9115">SUSE bug 1007741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9115">SUSE bug 1007741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9115">SUSE bug 1007741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9115">SUSE bug 1007741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9115">SUSE bug 1007741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9115">SUSE bug 1007741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9115">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9115">SUSE bug 1007741</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9115">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9115">SUSE bug 1015662</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147387" comment="libopenjp2-7-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153807" comment="libopenjp2-7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147388" comment="libopenjp2-7-32bit-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153808" comment="libopenjp2-7-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147389" comment="openjpeg2-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153813" comment="openjpeg2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147390" comment="openjpeg2-devel-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153814" comment="openjpeg2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9116</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9116" source="CVE"/>
    <description>
    NULL Pointer Access in function imagetopnm of convert.c:2226(jp2) in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9116.html">CVE-2016-9116</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9116">SUSE bug 1007742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9116">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9116">SUSE bug 1007742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9116">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9116">SUSE bug 1007742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9116">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9116">SUSE bug 1007742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9116">SUSE bug 1007742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9116">SUSE bug 1007742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9116">SUSE bug 1007742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9116">SUSE bug 1007742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9116">SUSE bug 1007742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9116">SUSE bug 1007742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9116">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9116">SUSE bug 1007742</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9116">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9116">SUSE bug 1015662</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147387" comment="libopenjp2-7-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153807" comment="libopenjp2-7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147388" comment="libopenjp2-7-32bit-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153808" comment="libopenjp2-7-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147389" comment="openjpeg2-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153813" comment="openjpeg2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147390" comment="openjpeg2-devel-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153814" comment="openjpeg2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9117</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9117" source="CVE"/>
    <description>
    NULL Pointer Access in function imagetopnm of convert.c(jp2):1289 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9117.html">CVE-2016-9117</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007743</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9117">SUSE bug 1015662</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147387" comment="libopenjp2-7-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153807" comment="libopenjp2-7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147388" comment="libopenjp2-7-32bit-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153808" comment="libopenjp2-7-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147389" comment="openjpeg2-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153813" comment="openjpeg2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147390" comment="openjpeg2-devel-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153814" comment="openjpeg2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9118</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" source="CVE"/>
    <description>
    Heap Buffer Overflow (WRITE of size 4) in function pnmtoimage of convert.c:1719 in OpenJPEG 2.1.2.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9118.html">CVE-2016-9118</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1007747</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9118">SUSE bug 1015662</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147387" comment="libopenjp2-7-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153807" comment="libopenjp2-7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147388" comment="libopenjp2-7-32bit-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153808" comment="libopenjp2-7-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147389" comment="openjpeg2-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153813" comment="openjpeg2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147390" comment="openjpeg2-devel-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153814" comment="openjpeg2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9131</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131" source="CVE"/>
    <description>
    named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed response to an RTYPE ANY query.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9131.html">CVE-2016-9131</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9131">SUSE bug 1018699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9131">SUSE bug 1018700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9131">SUSE bug 1018700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9131">SUSE bug 1018700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9131">SUSE bug 1018699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9131">SUSE bug 1018700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9131">SUSE bug 1018700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9131">SUSE bug 1018699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9131">SUSE bug 1018700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9131">SUSE bug 1018700</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9131">SUSE bug 1018700</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147314" comment="bind-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147315" comment="bind-chrootenv-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147316" comment="bind-devel-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147317" comment="bind-doc-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147318" comment="bind-libs-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147319" comment="bind-libs-32bit-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153103" comment="bind-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147320" comment="bind-lwresd-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153104" comment="bind-lwresd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147321" comment="bind-utils-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9137</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9137" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CURLFile implementation in ext/curl/curl_file.c in PHP before 5.6.27 and 7.x before 7.0.12 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that is mishandled during __wakeup processing.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9137.html">CVE-2016-9137</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9137">SUSE bug 1008026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9137">SUSE bug 1008029</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9137">SUSE bug 1008026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9137">SUSE bug 1008029</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9137">SUSE bug 1008026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9137">SUSE bug 1008029</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9137">SUSE bug 1008029</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9137">SUSE bug 1008029</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9137">SUSE bug 1008029</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9137">SUSE bug 1008029</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9137">SUSE bug 1008029</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9137">SUSE bug 1008029</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9137">SUSE bug 1008029</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9137">SUSE bug 1008029</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9137">SUSE bug 1008029</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142543" comment="apache2-mod_php5-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142544" comment="php5-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142545" comment="php5-bcmath-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142546" comment="php5-bz2-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142547" comment="php5-calendar-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142548" comment="php5-ctype-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142549" comment="php5-curl-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142550" comment="php5-dba-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142551" comment="php5-devel-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142552" comment="php5-dom-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142553" comment="php5-enchant-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142554" comment="php5-exif-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142555" comment="php5-fastcgi-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142556" comment="php5-fileinfo-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142557" comment="php5-firebird-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142558" comment="php5-fpm-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142559" comment="php5-ftp-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142560" comment="php5-gd-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142561" comment="php5-gettext-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142562" comment="php5-gmp-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142563" comment="php5-iconv-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142564" comment="php5-imap-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142565" comment="php5-intl-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142566" comment="php5-json-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142567" comment="php5-ldap-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142568" comment="php5-mbstring-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142569" comment="php5-mcrypt-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142570" comment="php5-mssql-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142571" comment="php5-mysql-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142572" comment="php5-odbc-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142573" comment="php5-opcache-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142574" comment="php5-openssl-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142575" comment="php5-pcntl-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142576" comment="php5-pdo-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142577" comment="php5-pear-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142578" comment="php5-pgsql-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142579" comment="php5-phar-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142580" comment="php5-posix-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142581" comment="php5-pspell-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142582" comment="php5-readline-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142583" comment="php5-shmop-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142584" comment="php5-snmp-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142585" comment="php5-soap-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142586" comment="php5-sockets-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142587" comment="php5-sqlite-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142588" comment="php5-suhosin-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142589" comment="php5-sysvmsg-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142590" comment="php5-sysvsem-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142591" comment="php5-sysvshm-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142592" comment="php5-tidy-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142593" comment="php5-tokenizer-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142594" comment="php5-wddx-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142595" comment="php5-xmlreader-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142596" comment="php5-xmlrpc-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142597" comment="php5-xmlwriter-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142598" comment="php5-xsl-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142599" comment="php5-zip-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142600" comment="php5-zlib-5.5.14-68.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9147</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147" source="CVE"/>
    <description>
    named in ISC BIND 9.9.9-P4, 9.9.9-S6, 9.10.4-P4, and 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a response containing an inconsistency among the DNSSEC-related RRsets.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9147.html">CVE-2016-9147</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9147">SUSE bug 1018699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9147">SUSE bug 1018701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9147">SUSE bug 1018701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9147">SUSE bug 1018701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9147">SUSE bug 1018699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9147">SUSE bug 1018701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9147">SUSE bug 1018701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9147">SUSE bug 1018701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9147">SUSE bug 1018699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9147">SUSE bug 1018701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9147">SUSE bug 1018701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9147">SUSE bug 1018701</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9147">SUSE bug 1018701</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147314" comment="bind-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147315" comment="bind-chrootenv-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147316" comment="bind-devel-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147317" comment="bind-doc-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147318" comment="bind-libs-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147319" comment="bind-libs-32bit-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153103" comment="bind-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147320" comment="bind-lwresd-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153104" comment="bind-lwresd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147321" comment="bind-utils-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9178</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9178" source="CVE"/>
    <description>
    The __get_user_asm_ex macro in arch/x86/include/asm/uaccess.h in the Linux kernel before 4.7.5 does not initialize a certain integer variable, which allows local users to obtain sensitive information from kernel stack memory by triggering failure of a get_user_ex call.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9178.html">CVE-2016-9178</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1008650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1008650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1008650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1008650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1008650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1008650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1008650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1012353</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1008650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1012353</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1012353</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1008650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1008650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1008650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1008650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1008650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1008650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1008650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1012353</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1008650</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9178">SUSE bug 1012353</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136831" comment="drbd-8.4.6-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136832" comment="drbd-kmp-default-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136833" comment="drbd-kmp-pv-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136834" comment="drbd-kmp-xen-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136835" comment="hdjmod-1.28-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136836" comment="hdjmod-kmp-default-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136837" comment="hdjmod-kmp-pae-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136838" comment="hdjmod-kmp-pv-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136839" comment="hdjmod-kmp-xen-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136840" comment="ipset-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136841" comment="ipset-devel-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136842" comment="ipset-kmp-default-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136843" comment="ipset-kmp-pae-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136844" comment="ipset-kmp-pv-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136845" comment="ipset-kmp-xen-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136846" comment="kernel-debug-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136847" comment="kernel-debug-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136848" comment="kernel-debug-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136849" comment="kernel-default-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136850" comment="kernel-default-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136851" comment="kernel-default-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136852" comment="kernel-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136853" comment="kernel-docs-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136854" comment="kernel-docs-html-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136855" comment="kernel-docs-pdf-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136856" comment="kernel-ec2-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136857" comment="kernel-ec2-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136858" comment="kernel-ec2-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136859" comment="kernel-macros-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136860" comment="kernel-obs-build-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136861" comment="kernel-obs-qa-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136862" comment="kernel-pae-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136863" comment="kernel-pae-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136864" comment="kernel-pae-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136865" comment="kernel-pv-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136866" comment="kernel-pv-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136867" comment="kernel-pv-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136868" comment="kernel-source-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136869" comment="kernel-source-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136870" comment="kernel-syms-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136871" comment="kernel-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136872" comment="kernel-vanilla-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136873" comment="kernel-xen-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136874" comment="kernel-xen-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136875" comment="kernel-xen-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136876" comment="libipset3-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136877" comment="lttng-modules-2.7.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136878" comment="lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136879" comment="lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136880" comment="pcfclock-0.44-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136881" comment="pcfclock-kmp-default-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136882" comment="pcfclock-kmp-pae-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136883" comment="pcfclock-kmp-pv-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136884" comment="vhba-kmp-20140928-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136885" comment="vhba-kmp-default-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136886" comment="vhba-kmp-pae-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136887" comment="vhba-kmp-pv-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136888" comment="vhba-kmp-xen-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9179</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9179" source="CVE"/>
    <description>
    lynx: It was found that Lynx doesn't parse the authority component of the URL correctly when the host name part ends with '?', and could instead be tricked into connecting to a different host.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9179.html">CVE-2016-9179</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9179">SUSE bug 1008642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9179">SUSE bug 1008642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9179">SUSE bug 1008642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9179">SUSE bug 1008642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9179">SUSE bug 1008642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9179">SUSE bug 1008642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9179">SUSE bug 1008642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9179">SUSE bug 1008642</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149471" comment="lynx-2.8.7-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151020" comment="lynx is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9181</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9181" source="CVE"/>
    <description>
    perl-Image-Info: When parsing an SVG file, external entity expansion (XXE) was not disabled. An attacker could craft an SVG file which, when processed by an application using perl-Image-Info, could cause denial of service or, potentially, information disclosure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9181.html">CVE-2016-9181</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9181">SUSE bug 1008647</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149472" comment="perl-Image-Info-1.39-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153869" comment="perl-Image-Info is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9273</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" source="CVE"/>
    <description>
    tiffsplit in libtiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file, related to changing td_nstrips in TIFF_STRIPCHOP mode.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9273.html">CVE-2016-9273</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9273">SUSE bug 1010163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9273">SUSE bug 1010163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9273">SUSE bug 1010163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9273">SUSE bug 1010163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9273">SUSE bug 1010163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9273">SUSE bug 1010163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9273">SUSE bug 1010163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9273">SUSE bug 1010163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9273">SUSE bug 1010163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9273">SUSE bug 1010163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9273">SUSE bug 1010163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9273">SUSE bug 1010163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9273">SUSE bug 1010163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9273">SUSE bug 1010163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9273">SUSE bug 1010163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9273">SUSE bug 1010163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9273">SUSE bug 1010163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9273">SUSE bug 1010163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9273">SUSE bug 1010163</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9273">SUSE bug 1010163</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146600" comment="libtiff-devel-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146601" comment="libtiff-devel-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146602" comment="libtiff5-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146603" comment="libtiff5-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146604" comment="tiff-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9297</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" source="CVE"/>
    <description>
    The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via crafted TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII tag values.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9297.html">CVE-2016-9297</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1010161</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1010161</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1010161</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1010161</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1010161</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1010161</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1010161</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1010161</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1010161</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1010161</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1010161</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1010161</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9297">SUSE bug 1011103</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146600" comment="libtiff-devel-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146601" comment="libtiff-devel-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146602" comment="libtiff5-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146603" comment="libtiff5-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146604" comment="tiff-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9310</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310" source="CVE"/>
    <description>
    The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9310.html">CVE-2016-9310</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9310">SUSE bug 1011377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9310">SUSE bug 1011421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9310">SUSE bug 1011377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9310">SUSE bug 1011377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9310">SUSE bug 1011377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9310">SUSE bug 1011377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9310">SUSE bug 1011377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9310">SUSE bug 1011421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9310">SUSE bug 1011377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9310">SUSE bug 1011377</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145996" comment="ntp-4.2.8p9-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145997" comment="ntp-doc-4.2.8p9-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9311</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311" source="CVE"/>
    <description>
    ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9311.html">CVE-2016-9311</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9311">SUSE bug 1011377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9311">SUSE bug 1011421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9311">SUSE bug 1011377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9311">SUSE bug 1011377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9311">SUSE bug 1011377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9311">SUSE bug 1011377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9311">SUSE bug 1011377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9311">SUSE bug 1011421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9311">SUSE bug 1011377</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9311">SUSE bug 1011377</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145996" comment="ntp-4.2.8p9-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145997" comment="ntp-doc-4.2.8p9-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9317</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317" source="CVE"/>
    <description>
    The gdImageCreate function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (system hang) via an oversized image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9317.html">CVE-2016-9317</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9317">SUSE bug 1022283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9317">SUSE bug 1022283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9317">SUSE bug 1022283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9317">SUSE bug 1022283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9317">SUSE bug 1022283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9317">SUSE bug 1022283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9317">SUSE bug 1022283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9317">SUSE bug 1022283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9317">SUSE bug 1022283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9317">SUSE bug 1022283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9317">SUSE bug 1022283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9317">SUSE bug 1022283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9317">SUSE bug 1022283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9317">SUSE bug 1022283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9317">SUSE bug 1022283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9317">SUSE bug 1022283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9317">SUSE bug 1022283</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148800" comment="gd-2.1.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148801" comment="gd-32bit-2.1.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152101" comment="gd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148802" comment="gd-devel-2.1.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153569" comment="gd-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9377</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9377" source="CVE"/>
    <description>
    Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging IDT entry miscalculation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9377.html">CVE-2016-9377</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9377">SUSE bug 1009108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9377">SUSE bug 1009108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9377">SUSE bug 1009108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9377">SUSE bug 1009108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9377">SUSE bug 1009108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9377">SUSE bug 1009108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9377">SUSE bug 1009108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9377">SUSE bug 1009108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9377">SUSE bug 1009108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9377">SUSE bug 1009108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9377">SUSE bug 1009108</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9378</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9378" source="CVE"/>
    <description>
    Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging an incorrect choice for software interrupt delivery.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9378.html">CVE-2016-9378</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9378">SUSE bug 1009108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9378">SUSE bug 1009108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9378">SUSE bug 1009108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9378">SUSE bug 1009108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9378">SUSE bug 1009108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9378">SUSE bug 1009108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9378">SUSE bug 1009108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9378">SUSE bug 1009108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9378">SUSE bug 1009108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9378">SUSE bug 1009108</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9378">SUSE bug 1009108</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9379</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9379" source="CVE"/>
    <description>
    The pygrub boot loader emulator in Xen, when S-expression output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via string quotes and S-expressions in the bootloader configuration file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9379.html">CVE-2016-9379</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9379">SUSE bug 1009111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9379">SUSE bug 1009111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9379">SUSE bug 1009111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9379">SUSE bug 1009111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9379">SUSE bug 1009111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9379">SUSE bug 1009111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9379">SUSE bug 1009111</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9380</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9380" source="CVE"/>
    <description>
    The pygrub boot loader emulator in Xen, when nul-delimited output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via NUL bytes in the bootloader configuration file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9380.html">CVE-2016-9380</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9380">SUSE bug 1009111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9380">SUSE bug 1009111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9380">SUSE bug 1009111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9380">SUSE bug 1009111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9380">SUSE bug 1009111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9380">SUSE bug 1009111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9380">SUSE bug 1009111</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9381</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9381" source="CVE"/>
    <description>
    Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9381.html">CVE-2016-9381</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9381">SUSE bug 1009109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9382</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9382" source="CVE"/>
    <description>
    Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9382.html">CVE-2016-9382</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9382">SUSE bug 1009103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9382">SUSE bug 1009103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9382">SUSE bug 1009103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9382">SUSE bug 1009103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9382">SUSE bug 1009103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9382">SUSE bug 1009103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9382">SUSE bug 1009103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9382">SUSE bug 1009103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9382">SUSE bug 1009103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9382">SUSE bug 1009103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9382">SUSE bug 1009103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9382">SUSE bug 1009103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9382">SUSE bug 1009103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9382">SUSE bug 1009103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9382">SUSE bug 1009103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9382">SUSE bug 1009103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9382">SUSE bug 1009103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9382">SUSE bug 1009103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9382">SUSE bug 1009103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9382">SUSE bug 1009103</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9383</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9383" source="CVE"/>
    <description>
    Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9383.html">CVE-2016-9383</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9383">SUSE bug 1009107</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9385</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9385" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9385" source="CVE"/>
    <description>
    The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9385.html">CVE-2016-9385</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9385">SUSE bug 1009104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9385">SUSE bug 1009104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9385">SUSE bug 1009104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9385">SUSE bug 1009104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9385">SUSE bug 1009104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9385">SUSE bug 1009104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9385">SUSE bug 1009104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9385">SUSE bug 1009104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9385">SUSE bug 1009104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9385">SUSE bug 1009104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9385">SUSE bug 1009104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9385">SUSE bug 1009104</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9386</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9386" source="CVE"/>
    <description>
    The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving "unexpected" base/limit values.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9386.html">CVE-2016-9386</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9386">SUSE bug 1009100</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9395</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9395" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9395" source="CVE"/>
    <description>
    The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.25 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9395.html">CVE-2016-9395</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9395">SUSE bug 1010977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9395">SUSE bug 1010977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9395">SUSE bug 1010977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9395">SUSE bug 1010977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9395">SUSE bug 1010977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9395">SUSE bug 1010977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9395">SUSE bug 1010977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9395">SUSE bug 1010977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9395">SUSE bug 1010977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9395">SUSE bug 1010977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9395">SUSE bug 1010977</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9395">SUSE bug 1010977</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146872" comment="jasper-1.900.14-170.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146873" comment="libjasper-devel-1.900.14-170.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146874" comment="libjasper1-1.900.14-170.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146875" comment="libjasper1-32bit-1.900.14-170.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9398</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9398" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9398" source="CVE"/>
    <description>
    The jpc_floorlog2 function in jpc_math.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9398.html">CVE-2016-9398</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9398">SUSE bug 1010979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9398">SUSE bug 1010979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9398">SUSE bug 1010979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9398">SUSE bug 1010979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9398">SUSE bug 1010979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9398">SUSE bug 1010979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9398">SUSE bug 1010979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146872" comment="jasper-1.900.14-170.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146873" comment="libjasper-devel-1.900.14-170.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146874" comment="libjasper1-1.900.14-170.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146875" comment="libjasper1-32bit-1.900.14-170.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9427</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9427" source="CVE"/>
    <description>
    Integer overflow vulnerability in bdwgc before 2016-09-27 allows attackers to cause client of bdwgc denial of service (heap buffer overflow crash) and possibly execute arbitrary code via huge allocation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9427.html">CVE-2016-9427</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9427">SUSE bug 1011276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9427">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9427">SUSE bug 1011276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9427">SUSE bug 1011276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9427">SUSE bug 1011276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9427">SUSE bug 1011276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9427">SUSE bug 1011276</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9427">SUSE bug 1011293</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142918" comment="gc-7.2d-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153870" comment="gc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142919" comment="gc-devel-7.2d-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153871" comment="gc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142920" comment="libgc1-7.2d-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151722" comment="libgc1 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9434</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9434" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9434.html">CVE-2016-9434</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9434">SUSE bug 1011283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9434">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9434">SUSE bug 1011283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9434">SUSE bug 1011283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9434">SUSE bug 1011283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9434">SUSE bug 1011283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9434">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9434">SUSE bug 1011283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9434">SUSE bug 1011283</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9435</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9435" source="CVE"/>
    <description>
    The HTMLtagproc1 function in file.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to &lt;dd&gt; tags.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9435.html">CVE-2016-9435</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9435">SUSE bug 1011284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9435">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9435">SUSE bug 1011284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9435">SUSE bug 1011284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9435">SUSE bug 1011284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9435">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9435">SUSE bug 1011284</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9435">SUSE bug 1011284</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9436</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9436" source="CVE"/>
    <description>
    parsetagx.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to a &lt;i&gt; tag.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9436.html">CVE-2016-9436</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9436">SUSE bug 1011285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9436">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9436">SUSE bug 1011285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9436">SUSE bug 1011285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9436">SUSE bug 1011285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9436">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9436">SUSE bug 1011285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9436">SUSE bug 1011285</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9437</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9437" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) and possibly memory corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9437.html">CVE-2016-9437</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9437">SUSE bug 1011286</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9437">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9437">SUSE bug 1011286</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9437">SUSE bug 1011286</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9437">SUSE bug 1011286</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9437">SUSE bug 1011286</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9437">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9437">SUSE bug 1011286</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9437">SUSE bug 1011286</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9438</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9438" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9438.html">CVE-2016-9438</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9438">SUSE bug 1011287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9438">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9438">SUSE bug 1011287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9438">SUSE bug 1011287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9438">SUSE bug 1011287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9438">SUSE bug 1011293</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9439</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9439" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9439.html">CVE-2016-9439</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9439">SUSE bug 1011288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9439">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9439">SUSE bug 1011288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9439">SUSE bug 1011288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9439">SUSE bug 1011288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9439">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9439">SUSE bug 1011288</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9439">SUSE bug 1011288</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9440</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9440" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9440.html">CVE-2016-9440</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9440">SUSE bug 1011289</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9440">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9440">SUSE bug 1011289</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9440">SUSE bug 1011289</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9440">SUSE bug 1011289</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9440">SUSE bug 1011289</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9440">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9440">SUSE bug 1011289</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9440">SUSE bug 1011289</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9441</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9441" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9441.html">CVE-2016-9441</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9441">SUSE bug 1011290</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9441">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9441">SUSE bug 1011290</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9441">SUSE bug 1011290</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9441">SUSE bug 1011290</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9441">SUSE bug 1011290</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9441">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9441">SUSE bug 1011290</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9441">SUSE bug 1011290</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9442</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9442" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause memory corruption in certain conditions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9442.html">CVE-2016-9442</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9442">SUSE bug 1011291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9442">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9442">SUSE bug 1011291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9442">SUSE bug 1011291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9442">SUSE bug 1011291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9442">SUSE bug 1011291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9442">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9442">SUSE bug 1011291</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9442">SUSE bug 1011291</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9443</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9443" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9443.html">CVE-2016-9443</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9443">SUSE bug 1011292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9443">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9443">SUSE bug 1011292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9443">SUSE bug 1011292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9443">SUSE bug 1011292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9443">SUSE bug 1011292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9443">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9443">SUSE bug 1011292</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9443">SUSE bug 1011292</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9444</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444" source="CVE"/>
    <description>
    named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DS resource record in an answer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9444.html">CVE-2016-9444</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9444">SUSE bug 1018699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9444">SUSE bug 1018702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9444">SUSE bug 1018702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9444">SUSE bug 1018702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9444">SUSE bug 1018699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9444">SUSE bug 1018702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9444">SUSE bug 1018702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9444">SUSE bug 1018699</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9444">SUSE bug 1018702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9444">SUSE bug 1018702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9444">SUSE bug 1018702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9444">SUSE bug 1018702</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147314" comment="bind-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147315" comment="bind-chrootenv-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147316" comment="bind-devel-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147317" comment="bind-doc-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147318" comment="bind-libs-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147319" comment="bind-libs-32bit-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153103" comment="bind-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147320" comment="bind-lwresd-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153104" comment="bind-lwresd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147321" comment="bind-utils-9.9.9P1-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9445</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9445" source="CVE"/>
    <description>
    Integer overflow in the vmnc decoder in the gstreamer allows remote attackers to cause a denial of service (crash) via large width and height values, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9445.html">CVE-2016-9445</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9445">SUSE bug 1010829</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142950" comment="gstreamer-0_10-plugins-bad-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152622" comment="gstreamer-0_10-plugins-bad is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142951" comment="gstreamer-0_10-plugins-bad-32bit-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153873" comment="gstreamer-0_10-plugins-bad-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142952" comment="gstreamer-0_10-plugins-bad-devel-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153874" comment="gstreamer-0_10-plugins-bad-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142953" comment="gstreamer-0_10-plugins-bad-doc-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153875" comment="gstreamer-0_10-plugins-bad-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142954" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152623" comment="gstreamer-0_10-plugins-bad-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142967" comment="gstreamer-plugins-bad-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153876" comment="gstreamer-plugins-bad is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142968" comment="gstreamer-plugins-bad-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153877" comment="gstreamer-plugins-bad-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142969" comment="gstreamer-plugins-bad-devel-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153878" comment="gstreamer-plugins-bad-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142970" comment="gstreamer-plugins-bad-doc-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153879" comment="gstreamer-plugins-bad-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142971" comment="gstreamer-plugins-bad-lang-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153880" comment="gstreamer-plugins-bad-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142972" comment="libgstbadbase-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153881" comment="libgstbadbase-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142973" comment="libgstbadbase-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153882" comment="libgstbadbase-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142974" comment="libgstbadvideo-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153883" comment="libgstbadvideo-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142975" comment="libgstbadvideo-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153884" comment="libgstbadvideo-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142955" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152624" comment="libgstbasecamerabinsrc-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142956" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153885" comment="libgstbasecamerabinsrc-0_10-23-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142976" comment="libgstbasecamerabinsrc-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153886" comment="libgstbasecamerabinsrc-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142977" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153887" comment="libgstbasecamerabinsrc-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142957" comment="libgstbasevideo-0_10-23-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152625" comment="libgstbasevideo-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142958" comment="libgstbasevideo-0_10-23-32bit-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153888" comment="libgstbasevideo-0_10-23-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142959" comment="libgstcodecparsers-0_10-23-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152626" comment="libgstcodecparsers-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142960" comment="libgstcodecparsers-0_10-23-32bit-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153889" comment="libgstcodecparsers-0_10-23-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142978" comment="libgstcodecparsers-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153890" comment="libgstcodecparsers-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142979" comment="libgstcodecparsers-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153891" comment="libgstcodecparsers-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142980" comment="libgstgl-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153892" comment="libgstgl-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142981" comment="libgstgl-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153893" comment="libgstgl-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142982" comment="libgstinsertbin-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153894" comment="libgstinsertbin-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142983" comment="libgstinsertbin-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153895" comment="libgstinsertbin-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142984" comment="libgstmpegts-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153896" comment="libgstmpegts-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142985" comment="libgstmpegts-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153897" comment="libgstmpegts-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142961" comment="libgstphotography-0_10-23-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152627" comment="libgstphotography-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142962" comment="libgstphotography-0_10-23-32bit-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153898" comment="libgstphotography-0_10-23-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142986" comment="libgstphotography-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153899" comment="libgstphotography-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142987" comment="libgstphotography-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153900" comment="libgstphotography-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142963" comment="libgstsignalprocessor-0_10-23-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152628" comment="libgstsignalprocessor-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142964" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153901" comment="libgstsignalprocessor-0_10-23-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142988" comment="libgsturidownloader-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153902" comment="libgsturidownloader-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142989" comment="libgsturidownloader-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153903" comment="libgsturidownloader-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142965" comment="libgstvdp-0_10-23-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152629" comment="libgstvdp-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142966" comment="libgstvdp-0_10-23-32bit-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153904" comment="libgstvdp-0_10-23-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142990" comment="libgstwayland-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153905" comment="libgstwayland-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142991" comment="libgstwayland-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153906" comment="libgstwayland-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9446</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9446" source="CVE"/>
    <description>
    The vmnc decoder in the gstreamer does not initialize the render canvas, which allows remote attackers to obtain sensitive information as demonstrated by thumbnailing a simple 1 frame vmnc movie that does not draw to the allocated render canvas.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9446.html">CVE-2016-9446</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9446">SUSE bug 1010829</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142950" comment="gstreamer-0_10-plugins-bad-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152622" comment="gstreamer-0_10-plugins-bad is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142951" comment="gstreamer-0_10-plugins-bad-32bit-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153873" comment="gstreamer-0_10-plugins-bad-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142952" comment="gstreamer-0_10-plugins-bad-devel-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153874" comment="gstreamer-0_10-plugins-bad-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142953" comment="gstreamer-0_10-plugins-bad-doc-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153875" comment="gstreamer-0_10-plugins-bad-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142954" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152623" comment="gstreamer-0_10-plugins-bad-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142967" comment="gstreamer-plugins-bad-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153876" comment="gstreamer-plugins-bad is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142968" comment="gstreamer-plugins-bad-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153877" comment="gstreamer-plugins-bad-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142969" comment="gstreamer-plugins-bad-devel-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153878" comment="gstreamer-plugins-bad-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142970" comment="gstreamer-plugins-bad-doc-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153879" comment="gstreamer-plugins-bad-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142971" comment="gstreamer-plugins-bad-lang-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153880" comment="gstreamer-plugins-bad-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142972" comment="libgstbadbase-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153881" comment="libgstbadbase-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142973" comment="libgstbadbase-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153882" comment="libgstbadbase-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142974" comment="libgstbadvideo-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153883" comment="libgstbadvideo-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142975" comment="libgstbadvideo-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153884" comment="libgstbadvideo-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142955" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152624" comment="libgstbasecamerabinsrc-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142956" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153885" comment="libgstbasecamerabinsrc-0_10-23-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142976" comment="libgstbasecamerabinsrc-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153886" comment="libgstbasecamerabinsrc-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142977" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153887" comment="libgstbasecamerabinsrc-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142957" comment="libgstbasevideo-0_10-23-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152625" comment="libgstbasevideo-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142958" comment="libgstbasevideo-0_10-23-32bit-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153888" comment="libgstbasevideo-0_10-23-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142959" comment="libgstcodecparsers-0_10-23-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152626" comment="libgstcodecparsers-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142960" comment="libgstcodecparsers-0_10-23-32bit-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153889" comment="libgstcodecparsers-0_10-23-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142978" comment="libgstcodecparsers-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153890" comment="libgstcodecparsers-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142979" comment="libgstcodecparsers-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153891" comment="libgstcodecparsers-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142980" comment="libgstgl-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153892" comment="libgstgl-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142981" comment="libgstgl-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153893" comment="libgstgl-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142982" comment="libgstinsertbin-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153894" comment="libgstinsertbin-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142983" comment="libgstinsertbin-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153895" comment="libgstinsertbin-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142984" comment="libgstmpegts-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153896" comment="libgstmpegts-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142985" comment="libgstmpegts-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153897" comment="libgstmpegts-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142961" comment="libgstphotography-0_10-23-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152627" comment="libgstphotography-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142962" comment="libgstphotography-0_10-23-32bit-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153898" comment="libgstphotography-0_10-23-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142986" comment="libgstphotography-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153899" comment="libgstphotography-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142987" comment="libgstphotography-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153900" comment="libgstphotography-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142963" comment="libgstsignalprocessor-0_10-23-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152628" comment="libgstsignalprocessor-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142964" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153901" comment="libgstsignalprocessor-0_10-23-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142988" comment="libgsturidownloader-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153902" comment="libgsturidownloader-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142989" comment="libgsturidownloader-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153903" comment="libgsturidownloader-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142965" comment="libgstvdp-0_10-23-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152629" comment="libgstvdp-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142966" comment="libgstvdp-0_10-23-32bit-0.10.23-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153904" comment="libgstvdp-0_10-23-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142990" comment="libgstwayland-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153905" comment="libgstwayland-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142991" comment="libgstwayland-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153906" comment="libgstwayland-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9448</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9448" source="CVE"/>
    <description>
    The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by setting the tags TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII to values that access 0-byte arrays.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9297.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9448.html">CVE-2016-9448</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9448">SUSE bug 1010161</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9448">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9448">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9448">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9448">SUSE bug 1010161</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9448">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9448">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9448">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9448">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9448">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9448">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9448">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9448">SUSE bug 1011103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9448">SUSE bug 1011103</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146600" comment="libtiff-devel-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146601" comment="libtiff-devel-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146602" comment="libtiff5-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146603" comment="libtiff5-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146604" comment="tiff-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9453</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" source="CVE"/>
    <description>
    The t2p_readwrite_pdf_image_tile function in LibTIFF allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9453.html">CVE-2016-9453</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1007280</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9453">SUSE bug 1011107</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146600" comment="libtiff-devel-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146601" comment="libtiff-devel-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146602" comment="libtiff5-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146603" comment="libtiff5-32bit-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146604" comment="tiff-4.0.7-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9555</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9555" source="CVE"/>
    <description>
    The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9555.html">CVE-2016-9555</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1012183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1012183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1012183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1012183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1012183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1012183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1012183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1012183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1012183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1012183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1012183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1012183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1012183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1012183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1012183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1012183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1012183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1011685</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1012183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1012183</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9555">SUSE bug 1012183</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136831" comment="drbd-8.4.6-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136832" comment="drbd-kmp-default-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136833" comment="drbd-kmp-pv-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136834" comment="drbd-kmp-xen-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136835" comment="hdjmod-1.28-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136836" comment="hdjmod-kmp-default-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136837" comment="hdjmod-kmp-pae-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136838" comment="hdjmod-kmp-pv-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136839" comment="hdjmod-kmp-xen-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136840" comment="ipset-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136841" comment="ipset-devel-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136842" comment="ipset-kmp-default-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136843" comment="ipset-kmp-pae-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136844" comment="ipset-kmp-pv-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136845" comment="ipset-kmp-xen-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136846" comment="kernel-debug-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136847" comment="kernel-debug-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136848" comment="kernel-debug-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136849" comment="kernel-default-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136850" comment="kernel-default-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136851" comment="kernel-default-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136852" comment="kernel-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136853" comment="kernel-docs-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136854" comment="kernel-docs-html-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136855" comment="kernel-docs-pdf-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136856" comment="kernel-ec2-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136857" comment="kernel-ec2-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136858" comment="kernel-ec2-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136859" comment="kernel-macros-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136860" comment="kernel-obs-build-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136861" comment="kernel-obs-qa-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136862" comment="kernel-pae-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136863" comment="kernel-pae-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136864" comment="kernel-pae-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136865" comment="kernel-pv-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136866" comment="kernel-pv-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136867" comment="kernel-pv-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136868" comment="kernel-source-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136869" comment="kernel-source-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136870" comment="kernel-syms-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136871" comment="kernel-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136872" comment="kernel-vanilla-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136873" comment="kernel-xen-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136874" comment="kernel-xen-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136875" comment="kernel-xen-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136876" comment="libipset3-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136877" comment="lttng-modules-2.7.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136878" comment="lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136879" comment="lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136880" comment="pcfclock-0.44-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136881" comment="pcfclock-kmp-default-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136882" comment="pcfclock-kmp-pae-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136883" comment="pcfclock-kmp-pv-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136884" comment="vhba-kmp-20140928-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136885" comment="vhba-kmp-default-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136886" comment="vhba-kmp-pae-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136887" comment="vhba-kmp-pv-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136888" comment="vhba-kmp-xen-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9556</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9556" source="CVE"/>
    <description>
    The IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3-8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9556.html">CVE-2016-9556</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1011130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1011130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1011130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1011130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1011130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1011130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1011130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1011130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1011130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1011130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1011130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1011130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9556">SUSE bug 1011130</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136607" comment="GraphicsMagick-1.3.21-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136608" comment="GraphicsMagick-devel-1.3.21-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146415" comment="ImageMagick-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146416" comment="ImageMagick-devel-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146417" comment="ImageMagick-devel-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146418" comment="ImageMagick-doc-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146419" comment="ImageMagick-extra-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136609" comment="libGraphicsMagick++-Q16-11-1.3.21-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136610" comment="libGraphicsMagick++-devel-1.3.21-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136611" comment="libGraphicsMagick-Q16-3-1.3.21-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136612" comment="libGraphicsMagick3-config-1.3.21-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136613" comment="libGraphicsMagickWand-Q16-2-1.3.21-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146420" comment="libMagick++-6_Q16-3-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146421" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146422" comment="libMagick++-devel-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146423" comment="libMagick++-devel-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146424" comment="libMagickCore-6_Q16-1-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146425" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146426" comment="libMagickWand-6_Q16-1-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146427" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136614" comment="perl-GraphicsMagick-1.3.21-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146428" comment="perl-PerlMagick-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9559</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9559" source="CVE"/>
    <description>
    coders/tiff.c in ImageMagick before 7.0.3.7 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9559.html">CVE-2016-9559</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9559">SUSE bug 1011136</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9559">SUSE bug 1011136</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9559">SUSE bug 1011136</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9559">SUSE bug 1011136</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9559">SUSE bug 1011136</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9559">SUSE bug 1011136</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9559">SUSE bug 1011136</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9559">SUSE bug 1011136</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9559">SUSE bug 1011136</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136607" comment="GraphicsMagick-1.3.21-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136608" comment="GraphicsMagick-devel-1.3.21-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146415" comment="ImageMagick-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146416" comment="ImageMagick-devel-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146417" comment="ImageMagick-devel-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146418" comment="ImageMagick-doc-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146419" comment="ImageMagick-extra-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136609" comment="libGraphicsMagick++-Q16-11-1.3.21-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136610" comment="libGraphicsMagick++-devel-1.3.21-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136611" comment="libGraphicsMagick-Q16-3-1.3.21-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136612" comment="libGraphicsMagick3-config-1.3.21-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136613" comment="libGraphicsMagickWand-Q16-2-1.3.21-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146420" comment="libMagick++-6_Q16-3-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146421" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146422" comment="libMagick++-devel-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146423" comment="libMagick++-devel-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146424" comment="libMagickCore-6_Q16-1-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146425" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146426" comment="libMagickWand-6_Q16-1-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146427" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136614" comment="perl-GraphicsMagick-1.3.21-20.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146428" comment="perl-PerlMagick-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9560</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9560" source="CVE"/>
    <description>
    Stack-based buffer overflow in the jpc_tsfb_getbands2 function in jpc_tsfb.c in JasPer before 1.900.30 allows remote attackers to have unspecified impact via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9560.html">CVE-2016-9560</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9560">SUSE bug 1011830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9560">SUSE bug 1011830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9560">SUSE bug 1011830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9560">SUSE bug 1011830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9560">SUSE bug 1011830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9560">SUSE bug 1011830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9560">SUSE bug 1011830</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146872" comment="jasper-1.900.14-170.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146873" comment="libjasper-devel-1.900.14-170.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146874" comment="libjasper1-1.900.14-170.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146875" comment="libjasper1-32bit-1.900.14-170.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9566</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9566" source="CVE"/>
    <description>
    base/logging.c in Nagios Core before 4.2.4 allows local users with access to an account in the nagios group to gain root privileges via a symlink attack on the log file.  NOTE: this can be leveraged by remote attackers using CVE-2016-9565.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9566.html">CVE-2016-9566</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9566">SUSE bug 1014637</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147185" comment="icinga-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153105" comment="icinga is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147186" comment="icinga-devel-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153106" comment="icinga-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147187" comment="icinga-doc-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153107" comment="icinga-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147188" comment="icinga-idoutils-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153108" comment="icinga-idoutils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147189" comment="icinga-idoutils-mysql-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153109" comment="icinga-idoutils-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147190" comment="icinga-idoutils-oracle-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153110" comment="icinga-idoutils-oracle is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147191" comment="icinga-idoutils-pgsql-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153111" comment="icinga-idoutils-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147192" comment="icinga-plugins-downtimes-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153112" comment="icinga-plugins-downtimes is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147193" comment="icinga-plugins-eventhandlers-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153113" comment="icinga-plugins-eventhandlers is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147194" comment="icinga-www-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153114" comment="icinga-www is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147195" comment="icinga-www-config-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153115" comment="icinga-www-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147196" comment="monitoring-tools-1.14.0-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151784" comment="monitoring-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9572</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9572.html">CVE-2016-9572</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9572">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9572">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9572">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9572">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9572">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9572">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9572">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9572">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9572">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9572">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9572">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9572">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9572">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9572">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9572">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9572">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9572">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9572">SUSE bug 1015662</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147387" comment="libopenjp2-7-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153807" comment="libopenjp2-7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147388" comment="libopenjp2-7-32bit-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153808" comment="libopenjp2-7-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147389" comment="openjpeg2-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153813" comment="openjpeg2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147390" comment="openjpeg2-devel-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153814" comment="openjpeg2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9573</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9573.html">CVE-2016-9573</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9573">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9573">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9573">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9573">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9573">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9573">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9573">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9573">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9573">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9573">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9573">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9573">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9573">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9573">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9573">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9573">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9573">SUSE bug 1014543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9573">SUSE bug 1015662</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147387" comment="libopenjp2-7-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153807" comment="libopenjp2-7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147388" comment="libopenjp2-7-32bit-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153808" comment="libopenjp2-7-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147389" comment="openjpeg2-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153813" comment="openjpeg2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147390" comment="openjpeg2-devel-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153814" comment="openjpeg2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9574</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9574" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9574.html">CVE-2016-9574</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9574">SUSE bug 1015499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9574">SUSE bug 1015499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9574">SUSE bug 1015499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9574">SUSE bug 1015499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9574">SUSE bug 1015499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9574">SUSE bug 1015499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9574">SUSE bug 1015499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9574">SUSE bug 1015499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9574">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9574">SUSE bug 1015499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9574">SUSE bug 1015499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9574">SUSE bug 1015499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9574">SUSE bug 1015499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9574">SUSE bug 1015499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9574">SUSE bug 1015499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9574">SUSE bug 1015499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9574">SUSE bug 1015499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9574">SUSE bug 1015499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9574">SUSE bug 1015499</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9574">SUSE bug 1015499</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154664" comment="java-1_8_0-openjdk-1.8.0.121-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154665" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154666" comment="java-1_8_0-openjdk-demo-1.8.0.121-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154667" comment="java-1_8_0-openjdk-devel-1.8.0.121-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154668" comment="java-1_8_0-openjdk-headless-1.8.0.121-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154669" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154670" comment="java-1_8_0-openjdk-src-1.8.0.121-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154671" comment="libfreebl3-3.28.4-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154672" comment="libfreebl3-32bit-3.28.4-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154673" comment="libsoftokn3-3.28.4-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154674" comment="libsoftokn3-32bit-3.28.4-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154675" comment="mozilla-nss-3.28.4-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154676" comment="mozilla-nss-32bit-3.28.4-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154677" comment="mozilla-nss-certs-3.28.4-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154678" comment="mozilla-nss-certs-32bit-3.28.4-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154679" comment="mozilla-nss-devel-3.28.4-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154680" comment="mozilla-nss-sysinit-3.28.4-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154681" comment="mozilla-nss-sysinit-32bit-3.28.4-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154682" comment="mozilla-nss-tools-3.28.4-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9576</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9576" source="CVE"/>
    <description>
    The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9576.html">CVE-2016-9576</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1019668</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1017710</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1019079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1014271</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9576">SUSE bug 1013604</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142391" comment="kernel-debug-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142392" comment="kernel-debug-base-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142393" comment="kernel-debug-devel-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142394" comment="kernel-default-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142395" comment="kernel-default-base-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142396" comment="kernel-default-devel-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142397" comment="kernel-devel-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142398" comment="kernel-docs-4.1.36-41.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142399" comment="kernel-docs-html-4.1.36-41.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142400" comment="kernel-docs-pdf-4.1.36-41.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142401" comment="kernel-ec2-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142402" comment="kernel-ec2-base-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142403" comment="kernel-ec2-devel-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142404" comment="kernel-macros-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142405" comment="kernel-obs-build-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142406" comment="kernel-obs-qa-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142407" comment="kernel-pae-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142408" comment="kernel-pae-base-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142409" comment="kernel-pae-devel-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142410" comment="kernel-pv-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142411" comment="kernel-pv-base-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142412" comment="kernel-pv-devel-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142413" comment="kernel-source-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142414" comment="kernel-source-vanilla-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142415" comment="kernel-syms-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142416" comment="kernel-vanilla-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142417" comment="kernel-vanilla-devel-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142418" comment="kernel-xen-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142419" comment="kernel-xen-base-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142420" comment="kernel-xen-devel-4.1.36-41.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9577</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9577" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9577.html">CVE-2016-9577</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9577">SUSE bug 1023078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9577">SUSE bug 1023078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9577">SUSE bug 1023078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9577">SUSE bug 1023078</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148253" comment="libspice-server-devel-0.12.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153281" comment="libspice-server-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148254" comment="libspice-server1-0.12.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151923" comment="libspice-server1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148255" comment="spice-0.12.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153282" comment="spice is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148256" comment="spice-client-0.12.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153283" comment="spice-client is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9578</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9578" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9578.html">CVE-2016-9578</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9578">SUSE bug 1023079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9578">SUSE bug 1023078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9578">SUSE bug 1023079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9578">SUSE bug 1023078</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9578">SUSE bug 1023079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9578">SUSE bug 1023079</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148253" comment="libspice-server-devel-0.12.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153281" comment="libspice-server-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148254" comment="libspice-server1-0.12.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151923" comment="libspice-server1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148255" comment="spice-0.12.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153282" comment="spice is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148256" comment="spice-client-0.12.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153283" comment="spice-client is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9580</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9580" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9580.html">CVE-2016-9580</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9580">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9580">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9580">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9580">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9580">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9580">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9580">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9580">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9580">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9580">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9580">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9580">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9580">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9580">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9580">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9580">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9580">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9580">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9580">SUSE bug 1015662</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147387" comment="libopenjp2-7-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153807" comment="libopenjp2-7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147388" comment="libopenjp2-7-32bit-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153808" comment="libopenjp2-7-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147389" comment="openjpeg2-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153813" comment="openjpeg2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147390" comment="openjpeg2-devel-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153814" comment="openjpeg2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9581</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9581" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9581.html">CVE-2016-9581</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9581">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9581">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9581">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9581">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9581">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9581">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9581">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9581">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9581">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9581">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9581">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9581">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9581">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9581">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9581">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9581">SUSE bug 1007739</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9581">SUSE bug 1007744</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9581">SUSE bug 1014975</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9581">SUSE bug 1015662</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147387" comment="libopenjp2-7-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153807" comment="libopenjp2-7 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147388" comment="libopenjp2-7-32bit-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153808" comment="libopenjp2-7-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147389" comment="openjpeg2-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153813" comment="openjpeg2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147390" comment="openjpeg2-devel-2.1.0-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153814" comment="openjpeg2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9583</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9583" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9583.html">CVE-2016-9583</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9583">SUSE bug 1015400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9583">SUSE bug 1015400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9583">SUSE bug 1015400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9583">SUSE bug 1015400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9583">SUSE bug 1015400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9583">SUSE bug 1015400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9583">SUSE bug 1015400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9583">SUSE bug 1015400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9583">SUSE bug 1015400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9583">SUSE bug 1015400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9583">SUSE bug 1015400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9583">SUSE bug 1015400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9583">SUSE bug 1015400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9583">SUSE bug 1015400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9583">SUSE bug 1015400</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9583">SUSE bug 1015400</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154526" comment="jasper-1.900.14-176.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154527" comment="libjasper-devel-1.900.14-176.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154528" comment="libjasper1-1.900.14-176.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154529" comment="libjasper1-32bit-1.900.14-176.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9586</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586" source="CVE"/>
    <description>
    curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9586.html">CVE-2016-9586</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1016653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1016653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9586">SUSE bug 1015332</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154757" comment="curl-7.37.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154758" comment="libcurl-devel-7.37.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154759" comment="libcurl-devel-32bit-7.37.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154760" comment="libcurl4-7.37.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154761" comment="libcurl4-32bit-7.37.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9591</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9591" source="CVE"/>
    <description>
    JasPer before version 2.0.12 is vulnerable to a use-after-free in the way it decodes certain JPEG 2000 image files resulting in a crash on the application using JasPer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9591.html">CVE-2016-9591</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9591">SUSE bug 1015993</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146872" comment="jasper-1.900.14-170.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146873" comment="libjasper-devel-1.900.14-170.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146874" comment="libjasper1-1.900.14-170.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146875" comment="libjasper1-32bit-1.900.14-170.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9600</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9600" source="CVE"/>
    <description>
    JasPer before version 2.0.10 is vulnerable to a null pointer dereference was found in the decoded creation of JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9600.html">CVE-2016-9600</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9600">SUSE bug 1018088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9600">SUSE bug 1018088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9600">SUSE bug 1018088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9600">SUSE bug 1018088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9600">SUSE bug 1018088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9600">SUSE bug 1018088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9600">SUSE bug 1018088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9600">SUSE bug 1018088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9600">SUSE bug 1018088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9600">SUSE bug 1018088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9600">SUSE bug 1018088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9600">SUSE bug 1018088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9600">SUSE bug 1018088</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9600">SUSE bug 1018088</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154526" comment="jasper-1.900.14-176.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154527" comment="libjasper-devel-1.900.14-176.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154528" comment="libjasper1-1.900.14-176.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154529" comment="libjasper1-32bit-1.900.14-176.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9601</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9601" source="CVE"/>
    <description>
    ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9601.html">CVE-2016-9601</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9601">SUSE bug 1018128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9601">SUSE bug 1018128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9601">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9601">SUSE bug 1018128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9601">SUSE bug 1018128</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9601">SUSE bug 1018128</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155225" comment="ghostscript-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155226" comment="ghostscript-devel-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135535" comment="ghostscript-mini-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135536" comment="ghostscript-mini-devel-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155227" comment="ghostscript-x11-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9621</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9621" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-9429.  Reason: This candidate is a reservation duplicate of CVE-2016-9429.  Notes: All CVE users should reference CVE-2016-9429 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9621.html">CVE-2016-9621</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9621">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9621">SUSE bug 1012020</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9621">SUSE bug 1011278</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9621">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9621">SUSE bug 1012020</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9622</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9622" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9622.html">CVE-2016-9622</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9622">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9622">SUSE bug 1012021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9622">SUSE bug 1012021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9622">SUSE bug 1012021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9622">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9622">SUSE bug 1012021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9622">SUSE bug 1012021</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9622">SUSE bug 1012021</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9623</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9623" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9623.html">CVE-2016-9623</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9623">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9623">SUSE bug 1012022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9623">SUSE bug 1012022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9623">SUSE bug 1012022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9623">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9623">SUSE bug 1012022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9623">SUSE bug 1012022</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9623">SUSE bug 1012022</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9624</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9624" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9624.html">CVE-2016-9624</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9624">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9624">SUSE bug 1012023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9624">SUSE bug 1012023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9624">SUSE bug 1012023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9624">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9624">SUSE bug 1012023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9624">SUSE bug 1012023</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9624">SUSE bug 1012023</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9625</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9625" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9625.html">CVE-2016-9625</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9625">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9625">SUSE bug 1012024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9625">SUSE bug 1012024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9625">SUSE bug 1012024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9625">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9625">SUSE bug 1012024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9625">SUSE bug 1012024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9625">SUSE bug 1012024</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9626</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9626" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9626.html">CVE-2016-9626</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9626">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9626">SUSE bug 1012025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9626">SUSE bug 1012025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9626">SUSE bug 1012025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9626">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9626">SUSE bug 1012025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9626">SUSE bug 1012025</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9626">SUSE bug 1012025</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9627</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9627" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (heap buffer overflow and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9627.html">CVE-2016-9627</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9627">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9627">SUSE bug 1012026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9627">SUSE bug 1012026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9627">SUSE bug 1012026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9627">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9627">SUSE bug 1012026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9627">SUSE bug 1012026</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9627">SUSE bug 1012026</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9628</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9628" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9628.html">CVE-2016-9628</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9628">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9628">SUSE bug 1012027</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9628">SUSE bug 1012027</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9628">SUSE bug 1012027</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9628">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9628">SUSE bug 1012027</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9628">SUSE bug 1012027</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9628">SUSE bug 1012027</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9629</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9629" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9629.html">CVE-2016-9629</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9629">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9629">SUSE bug 1012028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9629">SUSE bug 1012028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9629">SUSE bug 1012028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9629">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9629">SUSE bug 1012028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9629">SUSE bug 1012028</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9629">SUSE bug 1012028</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9630</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9630" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (global buffer overflow and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9630.html">CVE-2016-9630</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9630">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9630">SUSE bug 1012029</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9630">SUSE bug 1012029</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9630">SUSE bug 1012029</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9630">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9630">SUSE bug 1012029</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9630">SUSE bug 1012029</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9630">SUSE bug 1012029</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9631</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9631" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9631.html">CVE-2016-9631</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9631">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9631">SUSE bug 1012030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9631">SUSE bug 1012030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9631">SUSE bug 1012030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9631">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9631">SUSE bug 1012030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9631">SUSE bug 1012030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9631">SUSE bug 1012030</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9632</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9632" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (global buffer overflow and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9632.html">CVE-2016-9632</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9632">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9632">SUSE bug 1012031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9632">SUSE bug 1012031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9632">SUSE bug 1012031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9632">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9632">SUSE bug 1012031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9632">SUSE bug 1012031</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9632">SUSE bug 1012031</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9633</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9633" source="CVE"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (infinite loop and resource consumption) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9633.html">CVE-2016-9633</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9633">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9633">SUSE bug 1012032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9633">SUSE bug 1012032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9633">SUSE bug 1012032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9633">SUSE bug 1011293</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9633">SUSE bug 1012032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9633">SUSE bug 1012032</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9633">SUSE bug 1012032</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142921" comment="w3m-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151419" comment="w3m is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142922" comment="w3m-inline-image-0.5.3.git20161120-161.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153872" comment="w3m-inline-image is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9634</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634" source="CVE"/>
    <description>
    Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via the start_line parameter.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9634.html">CVE-2016-9634</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9634">SUSE bug 1012104</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147866" comment="gstreamer-0_10-plugin-esd-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153907" comment="gstreamer-0_10-plugin-esd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147867" comment="gstreamer-0_10-plugin-esd-32bit-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153908" comment="gstreamer-0_10-plugin-esd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147371" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153909" comment="gstreamer-0_10-plugins-good is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147868" comment="gstreamer-0_10-plugins-good-32bit-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153910" comment="gstreamer-0_10-plugins-good-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147869" comment="gstreamer-0_10-plugins-good-doc-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153911" comment="gstreamer-0_10-plugins-good-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147870" comment="gstreamer-0_10-plugins-good-extra-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153912" comment="gstreamer-0_10-plugins-good-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147871" comment="gstreamer-0_10-plugins-good-extra-32bit-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153913" comment="gstreamer-0_10-plugins-good-extra-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147372" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153914" comment="gstreamer-0_10-plugins-good-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147113" comment="gstreamer-plugins-good-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153915" comment="gstreamer-plugins-good is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147114" comment="gstreamer-plugins-good-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153916" comment="gstreamer-plugins-good-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147115" comment="gstreamer-plugins-good-doc-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153917" comment="gstreamer-plugins-good-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147116" comment="gstreamer-plugins-good-extra-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153918" comment="gstreamer-plugins-good-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147117" comment="gstreamer-plugins-good-extra-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153919" comment="gstreamer-plugins-good-extra-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147118" comment="gstreamer-plugins-good-lang-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153920" comment="gstreamer-plugins-good-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9635</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635" source="CVE"/>
    <description>
    Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by providing a 'skip count' that goes beyond initialized buffer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9635.html">CVE-2016-9635</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1013653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9635">SUSE bug 1012104</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147866" comment="gstreamer-0_10-plugin-esd-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153907" comment="gstreamer-0_10-plugin-esd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147867" comment="gstreamer-0_10-plugin-esd-32bit-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153908" comment="gstreamer-0_10-plugin-esd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147371" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153909" comment="gstreamer-0_10-plugins-good is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147868" comment="gstreamer-0_10-plugins-good-32bit-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153910" comment="gstreamer-0_10-plugins-good-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147869" comment="gstreamer-0_10-plugins-good-doc-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153911" comment="gstreamer-0_10-plugins-good-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147870" comment="gstreamer-0_10-plugins-good-extra-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153912" comment="gstreamer-0_10-plugins-good-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147871" comment="gstreamer-0_10-plugins-good-extra-32bit-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153913" comment="gstreamer-0_10-plugins-good-extra-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147372" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153914" comment="gstreamer-0_10-plugins-good-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147113" comment="gstreamer-plugins-good-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153915" comment="gstreamer-plugins-good is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147114" comment="gstreamer-plugins-good-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153916" comment="gstreamer-plugins-good-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147115" comment="gstreamer-plugins-good-doc-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153917" comment="gstreamer-plugins-good-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147116" comment="gstreamer-plugins-good-extra-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153918" comment="gstreamer-plugins-good-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147117" comment="gstreamer-plugins-good-extra-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153919" comment="gstreamer-plugins-good-extra-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147118" comment="gstreamer-plugins-good-lang-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153920" comment="gstreamer-plugins-good-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9636</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636" source="CVE"/>
    <description>
    Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by providing a 'write count' that goes beyond the initialized buffer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9636.html">CVE-2016-9636</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9636">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9636">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9636">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9636">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9636">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9636">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9636">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9636">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9636">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9636">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9636">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9636">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9636">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9636">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9636">SUSE bug 1012104</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147866" comment="gstreamer-0_10-plugin-esd-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153907" comment="gstreamer-0_10-plugin-esd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147867" comment="gstreamer-0_10-plugin-esd-32bit-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153908" comment="gstreamer-0_10-plugin-esd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147371" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153909" comment="gstreamer-0_10-plugins-good is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147868" comment="gstreamer-0_10-plugins-good-32bit-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153910" comment="gstreamer-0_10-plugins-good-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147869" comment="gstreamer-0_10-plugins-good-doc-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153911" comment="gstreamer-0_10-plugins-good-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147870" comment="gstreamer-0_10-plugins-good-extra-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153912" comment="gstreamer-0_10-plugins-good-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147871" comment="gstreamer-0_10-plugins-good-extra-32bit-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153913" comment="gstreamer-0_10-plugins-good-extra-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147372" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153914" comment="gstreamer-0_10-plugins-good-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147113" comment="gstreamer-plugins-good-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153915" comment="gstreamer-plugins-good is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147114" comment="gstreamer-plugins-good-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153916" comment="gstreamer-plugins-good-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147115" comment="gstreamer-plugins-good-doc-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153917" comment="gstreamer-plugins-good-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147116" comment="gstreamer-plugins-good-extra-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153918" comment="gstreamer-plugins-good-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147117" comment="gstreamer-plugins-good-extra-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153919" comment="gstreamer-plugins-good-extra-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147118" comment="gstreamer-plugins-good-lang-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153920" comment="gstreamer-plugins-good-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9637</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9637" source="CVE"/>
    <description>
    The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9637.html">CVE-2016-9637</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9637">SUSE bug 1011652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9637">SUSE bug 1011652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9637">SUSE bug 1011652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9637">SUSE bug 1011652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9637">SUSE bug 1011652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9637">SUSE bug 1011652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9637">SUSE bug 1011652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9637">SUSE bug 1011652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9637">SUSE bug 1011652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9637">SUSE bug 1011652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9637">SUSE bug 1011652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9637">SUSE bug 1011652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9637">SUSE bug 1011652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9637">SUSE bug 1011652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9637">SUSE bug 1011652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9637">SUSE bug 1011652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9637">SUSE bug 1011652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9637">SUSE bug 1011652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9637">SUSE bug 1011652</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9637">SUSE bug 1011652</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9650</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9650" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled iframes, which allowed a remote attacker to bypass a no-referrer policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9650.html">CVE-2016-9650</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9650">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9651</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9651" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9651.html">CVE-2016-9651</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9651">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9652</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9652" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9652.html">CVE-2016-9652</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9652">SUSE bug 1013236</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142894" comment="chromedriver-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009142895" comment="chromium-55.0.2883.75-99.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9756</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9756" source="CVE"/>
    <description>
    arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9756.html">CVE-2016-9756</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9756">SUSE bug 1013038</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146198" comment="kernel-debug-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146199" comment="kernel-debug-base-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146200" comment="kernel-debug-devel-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146201" comment="kernel-default-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146202" comment="kernel-default-base-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146203" comment="kernel-default-devel-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146204" comment="kernel-devel-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146205" comment="kernel-docs-4.1.36-44.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146206" comment="kernel-docs-html-4.1.36-44.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146207" comment="kernel-docs-pdf-4.1.36-44.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146208" comment="kernel-ec2-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146209" comment="kernel-ec2-base-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146210" comment="kernel-ec2-devel-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146211" comment="kernel-macros-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146212" comment="kernel-obs-build-4.1.36-44.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146213" comment="kernel-obs-qa-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146214" comment="kernel-pae-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146215" comment="kernel-pae-base-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146216" comment="kernel-pae-devel-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146217" comment="kernel-pv-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146218" comment="kernel-pv-base-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146219" comment="kernel-pv-devel-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146220" comment="kernel-source-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146221" comment="kernel-source-vanilla-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146222" comment="kernel-syms-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146223" comment="kernel-vanilla-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146224" comment="kernel-vanilla-devel-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146225" comment="kernel-xen-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146226" comment="kernel-xen-base-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146227" comment="kernel-xen-devel-4.1.36-44.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9773</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9773" source="CVE"/>
    <description>
    Heap-based buffer overflow in the IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9556.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9773.html">CVE-2016-9773</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9773">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9773">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9773">SUSE bug 1011130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9773">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9773">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9773">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9773">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9773">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9773">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9773">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9773">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9773">SUSE bug 1017421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9773">SUSE bug 1013376</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9773">SUSE bug 1011130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9773">SUSE bug 1011130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9773">SUSE bug 1013376</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146415" comment="ImageMagick-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146416" comment="ImageMagick-devel-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146417" comment="ImageMagick-devel-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146418" comment="ImageMagick-doc-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146419" comment="ImageMagick-extra-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146420" comment="libMagick++-6_Q16-3-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146421" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146422" comment="libMagick++-devel-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146423" comment="libMagick++-devel-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146424" comment="libMagickCore-6_Q16-1-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146425" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146426" comment="libMagickWand-6_Q16-1-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146427" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146428" comment="perl-PerlMagick-6.8.8.1-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9776</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9776" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9776.html">CVE-2016-9776</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1024182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1024182</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013657</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013285</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9776">SUSE bug 1013285</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155579" comment="qemu-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155580" comment="qemu-arm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155581" comment="qemu-block-curl-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155582" comment="qemu-block-rbd-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155583" comment="qemu-extra-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155584" comment="qemu-guest-agent-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155585" comment="qemu-ipxe-1.0.0-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155586" comment="qemu-kvm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155587" comment="qemu-lang-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155588" comment="qemu-linux-user-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155589" comment="qemu-ppc-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155590" comment="qemu-s390-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155591" comment="qemu-seabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155592" comment="qemu-sgabios-8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155593" comment="qemu-testsuite-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155594" comment="qemu-tools-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155595" comment="qemu-vgabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155596" comment="qemu-x86-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9793</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9793" source="CVE"/>
    <description>
    The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9793.html">CVE-2016-9793</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9793">SUSE bug 1013531</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148345" comment="kernel-debug-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148346" comment="kernel-debug-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148347" comment="kernel-debug-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148348" comment="kernel-default-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148349" comment="kernel-default-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148350" comment="kernel-default-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148351" comment="kernel-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148352" comment="kernel-docs-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148353" comment="kernel-docs-html-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148354" comment="kernel-docs-pdf-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148355" comment="kernel-ec2-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148356" comment="kernel-ec2-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148357" comment="kernel-ec2-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148358" comment="kernel-macros-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148359" comment="kernel-obs-build-4.1.38-47.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148360" comment="kernel-obs-qa-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148361" comment="kernel-pae-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148362" comment="kernel-pae-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148363" comment="kernel-pae-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148364" comment="kernel-pv-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148365" comment="kernel-pv-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148366" comment="kernel-pv-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148367" comment="kernel-source-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148368" comment="kernel-source-vanilla-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148369" comment="kernel-syms-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148370" comment="kernel-vanilla-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148371" comment="kernel-vanilla-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148372" comment="kernel-xen-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148373" comment="kernel-xen-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148374" comment="kernel-xen-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9794</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9794" source="CVE"/>
    <description>
    Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START command.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9794.html">CVE-2016-9794</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013604</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013543</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9794">SUSE bug 1013543</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136831" comment="drbd-8.4.6-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153194" comment="drbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136832" comment="drbd-kmp-default-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153195" comment="drbd-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136833" comment="drbd-kmp-pv-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153196" comment="drbd-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136834" comment="drbd-kmp-xen-8.4.6_k4.1.36_38-12.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153197" comment="drbd-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136835" comment="hdjmod-1.28-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153198" comment="hdjmod is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136836" comment="hdjmod-kmp-default-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153199" comment="hdjmod-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136837" comment="hdjmod-kmp-pae-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153200" comment="hdjmod-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136838" comment="hdjmod-kmp-pv-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153201" comment="hdjmod-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136839" comment="hdjmod-kmp-xen-1.28_k4.1.36_38-28.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153202" comment="hdjmod-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136840" comment="ipset-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153203" comment="ipset is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136841" comment="ipset-devel-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153204" comment="ipset-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136842" comment="ipset-kmp-default-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153205" comment="ipset-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136843" comment="ipset-kmp-pae-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153206" comment="ipset-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136844" comment="ipset-kmp-pv-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153207" comment="ipset-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136845" comment="ipset-kmp-xen-6.25.1_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153208" comment="ipset-kmp-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136846" comment="kernel-debug-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136847" comment="kernel-debug-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136848" comment="kernel-debug-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136849" comment="kernel-default-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136850" comment="kernel-default-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136851" comment="kernel-default-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136852" comment="kernel-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136853" comment="kernel-docs-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136854" comment="kernel-docs-html-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136855" comment="kernel-docs-pdf-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136856" comment="kernel-ec2-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136857" comment="kernel-ec2-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136858" comment="kernel-ec2-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136859" comment="kernel-macros-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136860" comment="kernel-obs-build-4.1.36-38.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136861" comment="kernel-obs-qa-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136862" comment="kernel-pae-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136863" comment="kernel-pae-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136864" comment="kernel-pae-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136865" comment="kernel-pv-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136866" comment="kernel-pv-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136867" comment="kernel-pv-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136868" comment="kernel-source-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136869" comment="kernel-source-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136870" comment="kernel-syms-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136871" comment="kernel-vanilla-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136872" comment="kernel-vanilla-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136873" comment="kernel-xen-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136874" comment="kernel-xen-base-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136875" comment="kernel-xen-devel-4.1.36-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136876" comment="libipset3-6.25.1-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153209" comment="libipset3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136877" comment="lttng-modules-2.7.0-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153210" comment="lttng-modules is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136878" comment="lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153211" comment="lttng-modules-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136879" comment="lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153212" comment="lttng-modules-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136880" comment="pcfclock-0.44-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153213" comment="pcfclock is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136881" comment="pcfclock-kmp-default-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153214" comment="pcfclock-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136882" comment="pcfclock-kmp-pae-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153215" comment="pcfclock-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136883" comment="pcfclock-kmp-pv-0.44_k4.1.36_38-270.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153216" comment="pcfclock-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136884" comment="vhba-kmp-20140928-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153217" comment="vhba-kmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136885" comment="vhba-kmp-default-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153218" comment="vhba-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136886" comment="vhba-kmp-pae-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153219" comment="vhba-kmp-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136887" comment="vhba-kmp-pv-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153220" comment="vhba-kmp-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009136888" comment="vhba-kmp-xen-20140928_k4.1.36_38-9.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153221" comment="vhba-kmp-xen is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9806</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9806" source="CVE"/>
    <description>
    Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel before 4.6.3 allows local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that makes sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9806.html">CVE-2016-9806</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1013540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1013540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1013540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1013540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1013540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1013540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1017589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1017589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1013540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1017589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1013540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1017589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1017589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1017589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1017589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1013540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1017589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1017589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1013540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1017589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1013540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1013540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1017589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1013540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1017589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1013540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1017589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1013540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1017589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1013540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1017589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1013540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1013540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1017589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1017589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9806">SUSE bug 1017589</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148345" comment="kernel-debug-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148346" comment="kernel-debug-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148347" comment="kernel-debug-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148348" comment="kernel-default-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148349" comment="kernel-default-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148350" comment="kernel-default-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148351" comment="kernel-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148352" comment="kernel-docs-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148353" comment="kernel-docs-html-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148354" comment="kernel-docs-pdf-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148355" comment="kernel-ec2-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148356" comment="kernel-ec2-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148357" comment="kernel-ec2-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148358" comment="kernel-macros-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148359" comment="kernel-obs-build-4.1.38-47.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148360" comment="kernel-obs-qa-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148361" comment="kernel-pae-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148362" comment="kernel-pae-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148363" comment="kernel-pae-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148364" comment="kernel-pv-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148365" comment="kernel-pv-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148366" comment="kernel-pv-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148367" comment="kernel-source-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148368" comment="kernel-source-vanilla-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148369" comment="kernel-syms-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148370" comment="kernel-vanilla-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148371" comment="kernel-vanilla-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148372" comment="kernel-xen-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148373" comment="kernel-xen-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148374" comment="kernel-xen-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9807</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9807" source="CVE"/>
    <description>
    The flx_decode_chunks function in gst/flx/gstflxdec.c in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted FLIC file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9807.html">CVE-2016-9807</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9807">SUSE bug 1013655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9807">SUSE bug 1013655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9807">SUSE bug 1013655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9807">SUSE bug 1013655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9807">SUSE bug 1013655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9807">SUSE bug 1013655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9807">SUSE bug 1013655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9807">SUSE bug 1013655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9807">SUSE bug 1013655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9807">SUSE bug 1013655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9807">SUSE bug 1013655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9807">SUSE bug 1013655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9807">SUSE bug 1013655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9807">SUSE bug 1013655</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9807">SUSE bug 1013655</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147866" comment="gstreamer-0_10-plugin-esd-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153907" comment="gstreamer-0_10-plugin-esd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147867" comment="gstreamer-0_10-plugin-esd-32bit-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153908" comment="gstreamer-0_10-plugin-esd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147371" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153909" comment="gstreamer-0_10-plugins-good is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147868" comment="gstreamer-0_10-plugins-good-32bit-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153910" comment="gstreamer-0_10-plugins-good-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147869" comment="gstreamer-0_10-plugins-good-doc-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153911" comment="gstreamer-0_10-plugins-good-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147870" comment="gstreamer-0_10-plugins-good-extra-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153912" comment="gstreamer-0_10-plugins-good-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147871" comment="gstreamer-0_10-plugins-good-extra-32bit-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153913" comment="gstreamer-0_10-plugins-good-extra-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147372" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153914" comment="gstreamer-0_10-plugins-good-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147113" comment="gstreamer-plugins-good-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153915" comment="gstreamer-plugins-good is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147114" comment="gstreamer-plugins-good-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153916" comment="gstreamer-plugins-good-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147115" comment="gstreamer-plugins-good-doc-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153917" comment="gstreamer-plugins-good-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147116" comment="gstreamer-plugins-good-extra-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153918" comment="gstreamer-plugins-good-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147117" comment="gstreamer-plugins-good-extra-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153919" comment="gstreamer-plugins-good-extra-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147118" comment="gstreamer-plugins-good-lang-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153920" comment="gstreamer-plugins-good-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9808</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9808" source="CVE"/>
    <description>
    The FLIC decoder in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (out-of-bounds write and crash) via a crafted series of skip and count pairs.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9808.html">CVE-2016-9808</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1013653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1013653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1013653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1013653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1013653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1013653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1013653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1013653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1013653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1013653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1013653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1013653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1013653</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1012102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1012103</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1012104</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9808">SUSE bug 1013653</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147866" comment="gstreamer-0_10-plugin-esd-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153907" comment="gstreamer-0_10-plugin-esd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147867" comment="gstreamer-0_10-plugin-esd-32bit-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153908" comment="gstreamer-0_10-plugin-esd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147371" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153909" comment="gstreamer-0_10-plugins-good is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147868" comment="gstreamer-0_10-plugins-good-32bit-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153910" comment="gstreamer-0_10-plugins-good-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147869" comment="gstreamer-0_10-plugins-good-doc-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153911" comment="gstreamer-0_10-plugins-good-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147870" comment="gstreamer-0_10-plugins-good-extra-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153912" comment="gstreamer-0_10-plugins-good-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147871" comment="gstreamer-0_10-plugins-good-extra-32bit-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153913" comment="gstreamer-0_10-plugins-good-extra-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147372" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153914" comment="gstreamer-0_10-plugins-good-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147113" comment="gstreamer-plugins-good-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153915" comment="gstreamer-plugins-good is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147114" comment="gstreamer-plugins-good-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153916" comment="gstreamer-plugins-good-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147115" comment="gstreamer-plugins-good-doc-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153917" comment="gstreamer-plugins-good-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147116" comment="gstreamer-plugins-good-extra-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153918" comment="gstreamer-plugins-good-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147117" comment="gstreamer-plugins-good-extra-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153919" comment="gstreamer-plugins-good-extra-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147118" comment="gstreamer-plugins-good-lang-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153920" comment="gstreamer-plugins-good-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9809</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9809" source="CVE"/>
    <description>
    Off-by-one error in the gst_h264_parse_set_caps function in GStreamer before 1.10.2 allows remote attackers to have unspecified impact via a crafted file, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9809.html">CVE-2016-9809</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9809">SUSE bug 1013659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9809">SUSE bug 1013659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9809">SUSE bug 1013659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9809">SUSE bug 1013659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9809">SUSE bug 1013659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9809">SUSE bug 1013659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9809">SUSE bug 1013659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9809">SUSE bug 1013659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9809">SUSE bug 1013659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9809">SUSE bug 1013659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9809">SUSE bug 1013659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9809">SUSE bug 1013659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9809">SUSE bug 1013659</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9809">SUSE bug 1013659</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147825" comment="gstreamer-0_10-plugins-bad-0.10.23-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152622" comment="gstreamer-0_10-plugins-bad is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147826" comment="gstreamer-0_10-plugins-bad-32bit-0.10.23-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153873" comment="gstreamer-0_10-plugins-bad-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147827" comment="gstreamer-0_10-plugins-bad-devel-0.10.23-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153874" comment="gstreamer-0_10-plugins-bad-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147828" comment="gstreamer-0_10-plugins-bad-doc-0.10.23-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153875" comment="gstreamer-0_10-plugins-bad-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147829" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152623" comment="gstreamer-0_10-plugins-bad-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147119" comment="gstreamer-plugins-bad-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153876" comment="gstreamer-plugins-bad is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147120" comment="gstreamer-plugins-bad-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153877" comment="gstreamer-plugins-bad-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147121" comment="gstreamer-plugins-bad-devel-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153878" comment="gstreamer-plugins-bad-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147122" comment="gstreamer-plugins-bad-doc-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153879" comment="gstreamer-plugins-bad-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147123" comment="gstreamer-plugins-bad-lang-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153880" comment="gstreamer-plugins-bad-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147124" comment="libgstbadbase-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153881" comment="libgstbadbase-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147125" comment="libgstbadbase-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153882" comment="libgstbadbase-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147126" comment="libgstbadvideo-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153883" comment="libgstbadvideo-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147127" comment="libgstbadvideo-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153884" comment="libgstbadvideo-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147830" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152624" comment="libgstbasecamerabinsrc-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147831" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153885" comment="libgstbasecamerabinsrc-0_10-23-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147128" comment="libgstbasecamerabinsrc-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153886" comment="libgstbasecamerabinsrc-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147129" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153887" comment="libgstbasecamerabinsrc-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147832" comment="libgstbasevideo-0_10-23-0.10.23-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152625" comment="libgstbasevideo-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147833" comment="libgstbasevideo-0_10-23-32bit-0.10.23-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153888" comment="libgstbasevideo-0_10-23-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147834" comment="libgstcodecparsers-0_10-23-0.10.23-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152626" comment="libgstcodecparsers-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147835" comment="libgstcodecparsers-0_10-23-32bit-0.10.23-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153889" comment="libgstcodecparsers-0_10-23-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147130" comment="libgstcodecparsers-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153890" comment="libgstcodecparsers-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147131" comment="libgstcodecparsers-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153891" comment="libgstcodecparsers-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147132" comment="libgstgl-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153892" comment="libgstgl-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147133" comment="libgstgl-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153893" comment="libgstgl-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147134" comment="libgstinsertbin-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153894" comment="libgstinsertbin-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147135" comment="libgstinsertbin-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153895" comment="libgstinsertbin-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147136" comment="libgstmpegts-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153896" comment="libgstmpegts-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147137" comment="libgstmpegts-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153897" comment="libgstmpegts-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147836" comment="libgstphotography-0_10-23-0.10.23-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152627" comment="libgstphotography-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147837" comment="libgstphotography-0_10-23-32bit-0.10.23-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153898" comment="libgstphotography-0_10-23-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147138" comment="libgstphotography-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153899" comment="libgstphotography-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147139" comment="libgstphotography-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153900" comment="libgstphotography-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147838" comment="libgstsignalprocessor-0_10-23-0.10.23-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152628" comment="libgstsignalprocessor-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147839" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153901" comment="libgstsignalprocessor-0_10-23-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147140" comment="libgsturidownloader-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153902" comment="libgsturidownloader-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147141" comment="libgsturidownloader-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153903" comment="libgsturidownloader-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147840" comment="libgstvdp-0_10-23-0.10.23-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152629" comment="libgstvdp-0_10-23 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147841" comment="libgstvdp-0_10-23-32bit-0.10.23-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153904" comment="libgstvdp-0_10-23-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147142" comment="libgstwayland-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153905" comment="libgstwayland-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147143" comment="libgstwayland-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153906" comment="libgstwayland-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9810</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9810" source="CVE"/>
    <description>
    The gst_decode_chain_free_internal function in the flxdex decoder in gst-plugins-good in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (invalid memory read and crash) via an invalid file, which triggers an incorrect unref call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9810.html">CVE-2016-9810</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9810">SUSE bug 1013663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9810">SUSE bug 1013663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9810">SUSE bug 1013663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9810">SUSE bug 1013663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9810">SUSE bug 1013663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9810">SUSE bug 1013663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9810">SUSE bug 1013663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9810">SUSE bug 1013663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9810">SUSE bug 1013663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9810">SUSE bug 1013663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9810">SUSE bug 1013663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9810">SUSE bug 1013663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9810">SUSE bug 1013663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9810">SUSE bug 1013663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9810">SUSE bug 1013663</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147866" comment="gstreamer-0_10-plugin-esd-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153907" comment="gstreamer-0_10-plugin-esd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147867" comment="gstreamer-0_10-plugin-esd-32bit-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153908" comment="gstreamer-0_10-plugin-esd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147371" comment="gstreamer-0_10-plugins-good-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153909" comment="gstreamer-0_10-plugins-good is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147868" comment="gstreamer-0_10-plugins-good-32bit-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153910" comment="gstreamer-0_10-plugins-good-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147869" comment="gstreamer-0_10-plugins-good-doc-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153911" comment="gstreamer-0_10-plugins-good-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147870" comment="gstreamer-0_10-plugins-good-extra-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153912" comment="gstreamer-0_10-plugins-good-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147871" comment="gstreamer-0_10-plugins-good-extra-32bit-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153913" comment="gstreamer-0_10-plugins-good-extra-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147372" comment="gstreamer-0_10-plugins-good-lang-0.10.31-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153914" comment="gstreamer-0_10-plugins-good-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147113" comment="gstreamer-plugins-good-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153915" comment="gstreamer-plugins-good is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147114" comment="gstreamer-plugins-good-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153916" comment="gstreamer-plugins-good-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147115" comment="gstreamer-plugins-good-doc-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153917" comment="gstreamer-plugins-good-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147116" comment="gstreamer-plugins-good-extra-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153918" comment="gstreamer-plugins-good-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147117" comment="gstreamer-plugins-good-extra-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153919" comment="gstreamer-plugins-good-extra-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147118" comment="gstreamer-plugins-good-lang-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153920" comment="gstreamer-plugins-good-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9811</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811" source="CVE"/>
    <description>
    The windows_icon_typefind function in gst-plugins-base in GStreamer before 1.10.2, when G_SLICE is set to always-malloc, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted ico file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9811.html">CVE-2016-9811</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9811">SUSE bug 1013669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9811">SUSE bug 1013669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9811">SUSE bug 1013669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9811">SUSE bug 1013669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9811">SUSE bug 1013669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9811">SUSE bug 1013669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9811">SUSE bug 1013669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9811">SUSE bug 1013669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9811">SUSE bug 1013669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9811">SUSE bug 1013669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9811">SUSE bug 1013669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9811">SUSE bug 1013669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9811">SUSE bug 1013669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9811">SUSE bug 1013669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9811">SUSE bug 1013669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9811">SUSE bug 1013669</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147883" comment="gstreamer-0_10-plugin-gnomevfs-0.10.36-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153921" comment="gstreamer-0_10-plugin-gnomevfs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147400" comment="gstreamer-0_10-plugins-base-0.10.36-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153922" comment="gstreamer-0_10-plugins-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147401" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153923" comment="gstreamer-0_10-plugins-base-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147434" comment="gstreamer-0_10-plugins-base-devel-0.10.36-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153924" comment="gstreamer-0_10-plugins-base-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147884" comment="gstreamer-0_10-plugins-base-doc-0.10.36-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153925" comment="gstreamer-0_10-plugins-base-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147402" comment="gstreamer-0_10-plugins-base-lang-0.10.36-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153926" comment="gstreamer-0_10-plugins-base-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147144" comment="gstreamer-plugins-base-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153927" comment="gstreamer-plugins-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147145" comment="gstreamer-plugins-base-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153928" comment="gstreamer-plugins-base-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147146" comment="gstreamer-plugins-base-devel-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153929" comment="gstreamer-plugins-base-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147147" comment="gstreamer-plugins-base-doc-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153930" comment="gstreamer-plugins-base-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147148" comment="gstreamer-plugins-base-lang-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153931" comment="gstreamer-plugins-base-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147149" comment="libgstallocators-1_0-0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153932" comment="libgstallocators-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147150" comment="libgstallocators-1_0-0-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153933" comment="libgstallocators-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147403" comment="libgstapp-0_10-0-0.10.36-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153934" comment="libgstapp-0_10-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147404" comment="libgstapp-0_10-0-32bit-0.10.36-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153935" comment="libgstapp-0_10-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147151" comment="libgstapp-1_0-0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153936" comment="libgstapp-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147152" comment="libgstapp-1_0-0-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153937" comment="libgstapp-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147153" comment="libgstaudio-1_0-0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153938" comment="libgstaudio-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147154" comment="libgstaudio-1_0-0-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153939" comment="libgstaudio-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147155" comment="libgstfft-1_0-0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153940" comment="libgstfft-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147156" comment="libgstfft-1_0-0-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153941" comment="libgstfft-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147405" comment="libgstinterfaces-0_10-0-0.10.36-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153942" comment="libgstinterfaces-0_10-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147406" comment="libgstinterfaces-0_10-0-32bit-0.10.36-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153943" comment="libgstinterfaces-0_10-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147157" comment="libgstpbutils-1_0-0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153944" comment="libgstpbutils-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147158" comment="libgstpbutils-1_0-0-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153945" comment="libgstpbutils-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147159" comment="libgstriff-1_0-0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153946" comment="libgstriff-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147160" comment="libgstriff-1_0-0-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153947" comment="libgstriff-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147161" comment="libgstrtp-1_0-0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153948" comment="libgstrtp-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147162" comment="libgstrtp-1_0-0-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153949" comment="libgstrtp-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147163" comment="libgstrtsp-1_0-0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153950" comment="libgstrtsp-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147164" comment="libgstrtsp-1_0-0-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153951" comment="libgstrtsp-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147165" comment="libgstsdp-1_0-0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153952" comment="libgstsdp-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147166" comment="libgstsdp-1_0-0-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153953" comment="libgstsdp-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147167" comment="libgsttag-1_0-0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153954" comment="libgsttag-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147168" comment="libgsttag-1_0-0-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153955" comment="libgsttag-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147169" comment="libgstvideo-1_0-0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153956" comment="libgstvideo-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147170" comment="libgstvideo-1_0-0-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153957" comment="libgstvideo-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147171" comment="typelib-1_0-GstAllocators-1_0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153958" comment="typelib-1_0-GstAllocators-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147435" comment="typelib-1_0-GstApp-0_10-0.10.36-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153959" comment="typelib-1_0-GstApp-0_10 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147172" comment="typelib-1_0-GstApp-1_0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153960" comment="typelib-1_0-GstApp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147173" comment="typelib-1_0-GstAudio-1_0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153961" comment="typelib-1_0-GstAudio-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147174" comment="typelib-1_0-GstFft-1_0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153962" comment="typelib-1_0-GstFft-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147436" comment="typelib-1_0-GstInterfaces-0_10-0.10.36-14.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153963" comment="typelib-1_0-GstInterfaces-0_10 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147175" comment="typelib-1_0-GstPbutils-1_0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153964" comment="typelib-1_0-GstPbutils-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147176" comment="typelib-1_0-GstRiff-1_0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153965" comment="typelib-1_0-GstRiff-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147177" comment="typelib-1_0-GstRtp-1_0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153966" comment="typelib-1_0-GstRtp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147178" comment="typelib-1_0-GstRtsp-1_0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153967" comment="typelib-1_0-GstRtsp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147179" comment="typelib-1_0-GstSdp-1_0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153968" comment="typelib-1_0-GstSdp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147180" comment="typelib-1_0-GstTag-1_0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153969" comment="typelib-1_0-GstTag-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147181" comment="typelib-1_0-GstVideo-1_0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153970" comment="typelib-1_0-GstVideo-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9812</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9812" source="CVE"/>
    <description>
    The gst_mpegts_section_new function in the mpegts decoder in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a too small section.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9812.html">CVE-2016-9812</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9812">SUSE bug 1013678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9812">SUSE bug 1013678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9812">SUSE bug 1013678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9812">SUSE bug 1013678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9812">SUSE bug 1013678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9812">SUSE bug 1013678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9812">SUSE bug 1013678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9812">SUSE bug 1013678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9812">SUSE bug 1013678</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9812">SUSE bug 1013678</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147119" comment="gstreamer-plugins-bad-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153876" comment="gstreamer-plugins-bad is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147120" comment="gstreamer-plugins-bad-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153877" comment="gstreamer-plugins-bad-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147121" comment="gstreamer-plugins-bad-devel-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153878" comment="gstreamer-plugins-bad-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147122" comment="gstreamer-plugins-bad-doc-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153879" comment="gstreamer-plugins-bad-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147123" comment="gstreamer-plugins-bad-lang-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153880" comment="gstreamer-plugins-bad-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147124" comment="libgstbadbase-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153881" comment="libgstbadbase-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147125" comment="libgstbadbase-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153882" comment="libgstbadbase-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147126" comment="libgstbadvideo-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153883" comment="libgstbadvideo-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147127" comment="libgstbadvideo-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153884" comment="libgstbadvideo-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147128" comment="libgstbasecamerabinsrc-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153886" comment="libgstbasecamerabinsrc-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147129" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153887" comment="libgstbasecamerabinsrc-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147130" comment="libgstcodecparsers-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153890" comment="libgstcodecparsers-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147131" comment="libgstcodecparsers-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153891" comment="libgstcodecparsers-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147132" comment="libgstgl-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153892" comment="libgstgl-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147133" comment="libgstgl-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153893" comment="libgstgl-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147134" comment="libgstinsertbin-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153894" comment="libgstinsertbin-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147135" comment="libgstinsertbin-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153895" comment="libgstinsertbin-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147136" comment="libgstmpegts-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153896" comment="libgstmpegts-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147137" comment="libgstmpegts-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153897" comment="libgstmpegts-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147138" comment="libgstphotography-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153899" comment="libgstphotography-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147139" comment="libgstphotography-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153900" comment="libgstphotography-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147140" comment="libgsturidownloader-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153902" comment="libgsturidownloader-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147141" comment="libgsturidownloader-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153903" comment="libgsturidownloader-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147142" comment="libgstwayland-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153905" comment="libgstwayland-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147143" comment="libgstwayland-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153906" comment="libgstwayland-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9813</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9813" source="CVE"/>
    <description>
    The _parse_pat function in the mpegts parser in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9813.html">CVE-2016-9813</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9813">SUSE bug 1013680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9813">SUSE bug 1013680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9813">SUSE bug 1013680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9813">SUSE bug 1013680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9813">SUSE bug 1013680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9813">SUSE bug 1013680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9813">SUSE bug 1013680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9813">SUSE bug 1013680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9813">SUSE bug 1013680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9813">SUSE bug 1013680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9813">SUSE bug 1013680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9813">SUSE bug 1013680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9813">SUSE bug 1013680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9813">SUSE bug 1013680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9813">SUSE bug 1013680</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9813">SUSE bug 1013680</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147119" comment="gstreamer-plugins-bad-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153876" comment="gstreamer-plugins-bad is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147120" comment="gstreamer-plugins-bad-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153877" comment="gstreamer-plugins-bad-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147121" comment="gstreamer-plugins-bad-devel-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153878" comment="gstreamer-plugins-bad-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147122" comment="gstreamer-plugins-bad-doc-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153879" comment="gstreamer-plugins-bad-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147123" comment="gstreamer-plugins-bad-lang-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153880" comment="gstreamer-plugins-bad-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147124" comment="libgstbadbase-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153881" comment="libgstbadbase-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147125" comment="libgstbadbase-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153882" comment="libgstbadbase-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147126" comment="libgstbadvideo-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153883" comment="libgstbadvideo-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147127" comment="libgstbadvideo-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153884" comment="libgstbadvideo-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147128" comment="libgstbasecamerabinsrc-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153886" comment="libgstbasecamerabinsrc-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147129" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153887" comment="libgstbasecamerabinsrc-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147130" comment="libgstcodecparsers-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153890" comment="libgstcodecparsers-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147131" comment="libgstcodecparsers-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153891" comment="libgstcodecparsers-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147132" comment="libgstgl-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153892" comment="libgstgl-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147133" comment="libgstgl-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153893" comment="libgstgl-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147134" comment="libgstinsertbin-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153894" comment="libgstinsertbin-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147135" comment="libgstinsertbin-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153895" comment="libgstinsertbin-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147136" comment="libgstmpegts-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153896" comment="libgstmpegts-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147137" comment="libgstmpegts-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153897" comment="libgstmpegts-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147138" comment="libgstphotography-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153899" comment="libgstphotography-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147139" comment="libgstphotography-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153900" comment="libgstphotography-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147140" comment="libgsturidownloader-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153902" comment="libgsturidownloader-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147141" comment="libgsturidownloader-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153903" comment="libgsturidownloader-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147142" comment="libgstwayland-1_0-0-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153905" comment="libgstwayland-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147143" comment="libgstwayland-1_0-0-32bit-1.4.5-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153906" comment="libgstwayland-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9830</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830" source="CVE"/>
    <description>
    The MagickRealloc function in memory.c in Graphicsmagick 1.3.25 allows remote attackers to cause a denial of service (crash) via large dimensions in a jpeg image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9830.html">CVE-2016-9830</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9830">SUSE bug 1013640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9830">SUSE bug 1013640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9830">SUSE bug 1013640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9830">SUSE bug 1013640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9830">SUSE bug 1013640</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9830">SUSE bug 1013640</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145809" comment="GraphicsMagick-1.3.21-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145810" comment="GraphicsMagick-devel-1.3.21-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145780" comment="libGraphicsMagick++-Q16-11-1.3.21-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145811" comment="libGraphicsMagick++-devel-1.3.21-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145812" comment="libGraphicsMagick-Q16-3-1.3.21-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145813" comment="libGraphicsMagick3-config-1.3.21-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145814" comment="libGraphicsMagickWand-Q16-2-1.3.21-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009145815" comment="perl-GraphicsMagick-1.3.21-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9840</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9840" source="CVE"/>
    <description>
    inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9840.html">CVE-2016-9840</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1023215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1023215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1023215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1023215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1023215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1023215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1038505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9840">SUSE bug 1003579</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146593" comment="libz1-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153971" comment="libz1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146594" comment="libz1-32bit-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153972" comment="libz1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146595" comment="zlib-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153973" comment="zlib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146596" comment="zlib-devel-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153974" comment="zlib-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146597" comment="zlib-devel-32bit-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153975" comment="zlib-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146598" comment="zlib-devel-static-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153976" comment="zlib-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146599" comment="zlib-devel-static-32bit-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153977" comment="zlib-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9841</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9841" source="CVE"/>
    <description>
    inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9841.html">CVE-2016-9841</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1038505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1064070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1064070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1003579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1064070</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9841">SUSE bug 1070162</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146593" comment="libz1-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153971" comment="libz1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146594" comment="libz1-32bit-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153972" comment="libz1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146595" comment="zlib-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153973" comment="zlib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146596" comment="zlib-devel-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153974" comment="zlib-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146597" comment="zlib-devel-32bit-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153975" comment="zlib-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146598" comment="zlib-devel-static-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153976" comment="zlib-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146599" comment="zlib-devel-static-32bit-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153977" comment="zlib-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9842</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9842" source="CVE"/>
    <description>
    The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9842.html">CVE-2016-9842</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9842">SUSE bug 1003580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9842">SUSE bug 1003580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9842">SUSE bug 1003580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9842">SUSE bug 1023215</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9842">SUSE bug 1003580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9842">SUSE bug 1038505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9842">SUSE bug 1003580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9842">SUSE bug 1003580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9842">SUSE bug 1003580</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146593" comment="libz1-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153971" comment="libz1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146594" comment="libz1-32bit-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153972" comment="libz1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146595" comment="zlib-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153973" comment="zlib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146596" comment="zlib-devel-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153974" comment="zlib-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146597" comment="zlib-devel-32bit-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153975" comment="zlib-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146598" comment="zlib-devel-static-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153976" comment="zlib-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146599" comment="zlib-devel-static-32bit-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153977" comment="zlib-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9843</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9843" source="CVE"/>
    <description>
    The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9843.html">CVE-2016-9843</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1003580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1013882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1003580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1013882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1013882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1013882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1013882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1013882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1013882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1013882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1013882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1013882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1013882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1013882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1013882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1003580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1013882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1038505</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1003580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1003580</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1013882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1013882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9843">SUSE bug 1013882</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146593" comment="libz1-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153971" comment="libz1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146594" comment="libz1-32bit-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153972" comment="libz1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146595" comment="zlib-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153973" comment="zlib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146596" comment="zlib-devel-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153974" comment="zlib-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146597" comment="zlib-devel-32bit-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153975" comment="zlib-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146598" comment="zlib-devel-static-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153976" comment="zlib-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146599" comment="zlib-devel-static-32bit-1.2.8-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153977" comment="zlib-devel-static-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9893</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9893" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9893" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9893.html">CVE-2016-9893</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9893">SUSE bug 1015541</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143102" comment="MozillaFirefox-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143103" comment="MozillaFirefox-branding-upstream-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143104" comment="MozillaFirefox-buildsymbols-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143105" comment="MozillaFirefox-devel-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143106" comment="MozillaFirefox-translations-common-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143107" comment="MozillaFirefox-translations-other-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146167" comment="MozillaThunderbird-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146168" comment="MozillaThunderbird-buildsymbols-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146169" comment="MozillaThunderbird-devel-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146170" comment="MozillaThunderbird-translations-common-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146171" comment="MozillaThunderbird-translations-other-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9894</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9894" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9894" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9894.html">CVE-2016-9894</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9894">SUSE bug 1015542</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143102" comment="MozillaFirefox-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143103" comment="MozillaFirefox-branding-upstream-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143104" comment="MozillaFirefox-buildsymbols-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143105" comment="MozillaFirefox-devel-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143106" comment="MozillaFirefox-translations-common-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143107" comment="MozillaFirefox-translations-other-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9895</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9895" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9895" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9895.html">CVE-2016-9895</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9895">SUSE bug 1015529</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143102" comment="MozillaFirefox-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143103" comment="MozillaFirefox-branding-upstream-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143104" comment="MozillaFirefox-buildsymbols-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143105" comment="MozillaFirefox-devel-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143106" comment="MozillaFirefox-translations-common-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143107" comment="MozillaFirefox-translations-other-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146167" comment="MozillaThunderbird-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146168" comment="MozillaThunderbird-buildsymbols-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146169" comment="MozillaThunderbird-devel-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146170" comment="MozillaThunderbird-translations-common-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146171" comment="MozillaThunderbird-translations-other-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9896</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9896" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9896.html">CVE-2016-9896</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9896">SUSE bug 1015542</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143102" comment="MozillaFirefox-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143103" comment="MozillaFirefox-branding-upstream-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143104" comment="MozillaFirefox-buildsymbols-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143105" comment="MozillaFirefox-devel-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143106" comment="MozillaFirefox-translations-common-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143107" comment="MozillaFirefox-translations-other-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9897</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9897" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9897" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9897.html">CVE-2016-9897</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9897">SUSE bug 1015531</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143102" comment="MozillaFirefox-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143103" comment="MozillaFirefox-branding-upstream-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143104" comment="MozillaFirefox-buildsymbols-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143105" comment="MozillaFirefox-devel-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143106" comment="MozillaFirefox-translations-common-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143107" comment="MozillaFirefox-translations-other-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146167" comment="MozillaThunderbird-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146168" comment="MozillaThunderbird-buildsymbols-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146169" comment="MozillaThunderbird-devel-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146170" comment="MozillaThunderbird-translations-common-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146171" comment="MozillaThunderbird-translations-other-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9898</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9898" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9898.html">CVE-2016-9898</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9898">SUSE bug 1015533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143102" comment="MozillaFirefox-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143103" comment="MozillaFirefox-branding-upstream-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143104" comment="MozillaFirefox-buildsymbols-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143105" comment="MozillaFirefox-devel-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143106" comment="MozillaFirefox-translations-common-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143107" comment="MozillaFirefox-translations-other-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146167" comment="MozillaThunderbird-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146168" comment="MozillaThunderbird-buildsymbols-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146169" comment="MozillaThunderbird-devel-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146170" comment="MozillaThunderbird-translations-common-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146171" comment="MozillaThunderbird-translations-other-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9899</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9899" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9899" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9899.html">CVE-2016-9899</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9899">SUSE bug 1015528</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143102" comment="MozillaFirefox-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143103" comment="MozillaFirefox-branding-upstream-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143104" comment="MozillaFirefox-buildsymbols-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143105" comment="MozillaFirefox-devel-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143106" comment="MozillaFirefox-translations-common-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143107" comment="MozillaFirefox-translations-other-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146167" comment="MozillaThunderbird-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146168" comment="MozillaThunderbird-buildsymbols-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146169" comment="MozillaThunderbird-devel-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146170" comment="MozillaThunderbird-translations-common-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146171" comment="MozillaThunderbird-translations-other-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9900</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9900" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9900" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9900.html">CVE-2016-9900</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9900">SUSE bug 1015534</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143102" comment="MozillaFirefox-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143103" comment="MozillaFirefox-branding-upstream-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143104" comment="MozillaFirefox-buildsymbols-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143105" comment="MozillaFirefox-devel-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143106" comment="MozillaFirefox-translations-common-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143107" comment="MozillaFirefox-translations-other-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146167" comment="MozillaThunderbird-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146168" comment="MozillaThunderbird-buildsymbols-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146169" comment="MozillaThunderbird-devel-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146170" comment="MozillaThunderbird-translations-common-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146171" comment="MozillaThunderbird-translations-other-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9901</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9901" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9901.html">CVE-2016-9901</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9901">SUSE bug 1015536</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143102" comment="MozillaFirefox-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143103" comment="MozillaFirefox-branding-upstream-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143104" comment="MozillaFirefox-buildsymbols-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143105" comment="MozillaFirefox-devel-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143106" comment="MozillaFirefox-translations-common-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143107" comment="MozillaFirefox-translations-other-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9902</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9902" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9902.html">CVE-2016-9902</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9902">SUSE bug 1015537</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143102" comment="MozillaFirefox-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143103" comment="MozillaFirefox-branding-upstream-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143104" comment="MozillaFirefox-buildsymbols-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143105" comment="MozillaFirefox-devel-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143106" comment="MozillaFirefox-translations-common-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143107" comment="MozillaFirefox-translations-other-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9903</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9903" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9903" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9903.html">CVE-2016-9903</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9903">SUSE bug 1015542</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143102" comment="MozillaFirefox-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143103" comment="MozillaFirefox-branding-upstream-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143104" comment="MozillaFirefox-buildsymbols-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143105" comment="MozillaFirefox-devel-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143106" comment="MozillaFirefox-translations-common-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143107" comment="MozillaFirefox-translations-other-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9904</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9904" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9904.html">CVE-2016-9904</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9904">SUSE bug 1015535</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143102" comment="MozillaFirefox-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143103" comment="MozillaFirefox-branding-upstream-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143104" comment="MozillaFirefox-buildsymbols-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143105" comment="MozillaFirefox-devel-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143106" comment="MozillaFirefox-translations-common-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009143107" comment="MozillaFirefox-translations-other-50.1.0-45.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146167" comment="MozillaThunderbird-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146168" comment="MozillaThunderbird-buildsymbols-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146169" comment="MozillaThunderbird-devel-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146170" comment="MozillaThunderbird-translations-common-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146171" comment="MozillaThunderbird-translations-other-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9905</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9905" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9905.html">CVE-2016-9905</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015527</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015529</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015530</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015537</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015538</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015540</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015542</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9905">SUSE bug 1015542</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146167" comment="MozillaThunderbird-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146168" comment="MozillaThunderbird-buildsymbols-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146169" comment="MozillaThunderbird-devel-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146170" comment="MozillaThunderbird-translations-common-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146171" comment="MozillaThunderbird-translations-other-45.6.0-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9907</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9907" source="CVE"/>
    <description>
    Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9907.html">CVE-2016-9907</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014109</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014490</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9907">SUSE bug 1014109</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155579" comment="qemu-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155580" comment="qemu-arm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155581" comment="qemu-block-curl-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155582" comment="qemu-block-rbd-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155583" comment="qemu-extra-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155584" comment="qemu-guest-agent-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155585" comment="qemu-ipxe-1.0.0-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155586" comment="qemu-kvm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155587" comment="qemu-lang-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155588" comment="qemu-linux-user-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155589" comment="qemu-ppc-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155590" comment="qemu-s390-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155591" comment="qemu-seabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155592" comment="qemu-sgabios-8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155593" comment="qemu-testsuite-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155594" comment="qemu-tools-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155595" comment="qemu-vgabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155596" comment="qemu-x86-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9911</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9911" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9911" source="CVE"/>
    <description>
    Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in 'ehci_init_transfer'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9911.html">CVE-2016-9911</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014111</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014507</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9911">SUSE bug 1014111</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155579" comment="qemu-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155580" comment="qemu-arm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155581" comment="qemu-block-curl-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155582" comment="qemu-block-rbd-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155583" comment="qemu-extra-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155584" comment="qemu-guest-agent-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155585" comment="qemu-ipxe-1.0.0-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155586" comment="qemu-kvm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155587" comment="qemu-lang-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155588" comment="qemu-linux-user-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155589" comment="qemu-ppc-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155590" comment="qemu-s390-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155591" comment="qemu-seabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155592" comment="qemu-sgabios-8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155593" comment="qemu-testsuite-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155594" comment="qemu-tools-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155595" comment="qemu-vgabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155596" comment="qemu-x86-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9921</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9921" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9921" source="CVE"/>
    <description>
    Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9921.html">CVE-2016-9921</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1014702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1014702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1014702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1014702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1014702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1014702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1014702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1014702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9921">SUSE bug 1015169</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155579" comment="qemu-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155580" comment="qemu-arm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155581" comment="qemu-block-curl-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155582" comment="qemu-block-rbd-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155583" comment="qemu-extra-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155584" comment="qemu-guest-agent-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155585" comment="qemu-ipxe-1.0.0-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155586" comment="qemu-kvm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155587" comment="qemu-lang-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155588" comment="qemu-linux-user-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155589" comment="qemu-ppc-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155590" comment="qemu-s390-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155591" comment="qemu-seabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155592" comment="qemu-sgabios-8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155593" comment="qemu-testsuite-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155594" comment="qemu-tools-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155595" comment="qemu-vgabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155596" comment="qemu-x86-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9922</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9922" source="CVE"/>
    <description>
    The cirrus_do_copy function in hw/display/cirrus_vga.c in QEMU (aka Quick Emulator), when cirrus graphics mode is VGA, allows local guest OS privileged users to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving blit pitch values.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9922.html">CVE-2016-9922</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1014702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1014702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1014702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1014702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1014702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1014702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1014702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1014702</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9922">SUSE bug 1015169</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155579" comment="qemu-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155580" comment="qemu-arm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155581" comment="qemu-block-curl-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155582" comment="qemu-block-rbd-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155583" comment="qemu-extra-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155584" comment="qemu-guest-agent-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155585" comment="qemu-ipxe-1.0.0-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155586" comment="qemu-kvm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155587" comment="qemu-lang-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155588" comment="qemu-linux-user-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155589" comment="qemu-ppc-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155590" comment="qemu-s390-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155591" comment="qemu-seabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155592" comment="qemu-sgabios-8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155593" comment="qemu-testsuite-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155594" comment="qemu-tools-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155595" comment="qemu-vgabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155596" comment="qemu-x86-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9932</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9932" source="CVE"/>
    <description>
    CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9932.html">CVE-2016-9932</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9932">SUSE bug 1012651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9932">SUSE bug 1016340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9932">SUSE bug 1012651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9932">SUSE bug 1012651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9932">SUSE bug 1012651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9932">SUSE bug 1012651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9932">SUSE bug 1012651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9932">SUSE bug 1012651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9932">SUSE bug 1012651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9932">SUSE bug 1012651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9932">SUSE bug 1012651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9932">SUSE bug 1012651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9932">SUSE bug 1012651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9932">SUSE bug 1012651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9932">SUSE bug 1012651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9932">SUSE bug 1012651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9932">SUSE bug 1012651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9932">SUSE bug 1012651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9932">SUSE bug 1012651</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9932">SUSE bug 1012651</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146228" comment="xen-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146229" comment="xen-devel-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146230" comment="xen-doc-html-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146231" comment="xen-kmp-default-4.5.5_06_k4.1.36_41-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151589" comment="xen-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146232" comment="xen-libs-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146233" comment="xen-libs-32bit-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146234" comment="xen-tools-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146235" comment="xen-tools-domU-4.5.5_06-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9933</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933" source="CVE"/>
    <description>
    Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a negative color value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9933.html">CVE-2016-9933</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9933">SUSE bug 1015187</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149252" comment="apache2-mod_php5-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146236" comment="gd-2.1.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146237" comment="gd-32bit-2.1.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152101" comment="gd-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146238" comment="gd-devel-2.1.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153569" comment="gd-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149253" comment="php5-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149254" comment="php5-bcmath-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149255" comment="php5-bz2-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149256" comment="php5-calendar-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149257" comment="php5-ctype-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149258" comment="php5-curl-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149259" comment="php5-dba-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149260" comment="php5-devel-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149261" comment="php5-dom-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149262" comment="php5-enchant-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149263" comment="php5-exif-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149264" comment="php5-fastcgi-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149265" comment="php5-fileinfo-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149266" comment="php5-firebird-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149267" comment="php5-fpm-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149268" comment="php5-ftp-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149269" comment="php5-gd-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149270" comment="php5-gettext-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149271" comment="php5-gmp-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149272" comment="php5-iconv-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149273" comment="php5-imap-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149274" comment="php5-intl-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149275" comment="php5-json-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149276" comment="php5-ldap-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149277" comment="php5-mbstring-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149278" comment="php5-mcrypt-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149279" comment="php5-mssql-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149280" comment="php5-mysql-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149281" comment="php5-odbc-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149282" comment="php5-opcache-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149283" comment="php5-openssl-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149284" comment="php5-pcntl-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149285" comment="php5-pdo-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149286" comment="php5-pear-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149287" comment="php5-pgsql-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149288" comment="php5-phar-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149289" comment="php5-posix-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149290" comment="php5-pspell-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149291" comment="php5-readline-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149292" comment="php5-shmop-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149293" comment="php5-snmp-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149294" comment="php5-soap-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149295" comment="php5-sockets-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149296" comment="php5-sqlite-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149297" comment="php5-suhosin-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149298" comment="php5-sysvmsg-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149299" comment="php5-sysvsem-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149300" comment="php5-sysvshm-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149301" comment="php5-tidy-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149302" comment="php5-tokenizer-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149303" comment="php5-wddx-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149304" comment="php5-xmlreader-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149305" comment="php5-xmlrpc-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149306" comment="php5-xmlwriter-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149307" comment="php5-xsl-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149308" comment="php5-zip-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149309" comment="php5-zlib-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9934</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934" source="CVE"/>
    <description>
    ext/wddx/wddx.c in PHP before 5.6.28 and 7.x before 7.0.13 allows remote attackers to cause a denial of service (NULL pointer dereference) via crafted serialized data in a wddxPacket XML document, as demonstrated by a PDORow string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9934.html">CVE-2016-9934</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9934">SUSE bug 1015188</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149252" comment="apache2-mod_php5-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149253" comment="php5-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149254" comment="php5-bcmath-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149255" comment="php5-bz2-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149256" comment="php5-calendar-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149257" comment="php5-ctype-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149258" comment="php5-curl-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149259" comment="php5-dba-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149260" comment="php5-devel-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149261" comment="php5-dom-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149262" comment="php5-enchant-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149263" comment="php5-exif-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149264" comment="php5-fastcgi-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149265" comment="php5-fileinfo-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149266" comment="php5-firebird-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149267" comment="php5-fpm-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149268" comment="php5-ftp-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149269" comment="php5-gd-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149270" comment="php5-gettext-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149271" comment="php5-gmp-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149272" comment="php5-iconv-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149273" comment="php5-imap-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149274" comment="php5-intl-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149275" comment="php5-json-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149276" comment="php5-ldap-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149277" comment="php5-mbstring-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149278" comment="php5-mcrypt-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149279" comment="php5-mssql-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149280" comment="php5-mysql-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149281" comment="php5-odbc-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149282" comment="php5-opcache-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149283" comment="php5-openssl-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149284" comment="php5-pcntl-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149285" comment="php5-pdo-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149286" comment="php5-pear-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149287" comment="php5-pgsql-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149288" comment="php5-phar-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149289" comment="php5-posix-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149290" comment="php5-pspell-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149291" comment="php5-readline-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149292" comment="php5-shmop-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149293" comment="php5-snmp-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149294" comment="php5-soap-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149295" comment="php5-sockets-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149296" comment="php5-sqlite-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149297" comment="php5-suhosin-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149298" comment="php5-sysvmsg-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149299" comment="php5-sysvsem-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149300" comment="php5-sysvshm-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149301" comment="php5-tidy-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149302" comment="php5-tokenizer-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149303" comment="php5-wddx-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149304" comment="php5-xmlreader-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149305" comment="php5-xmlrpc-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149306" comment="php5-xmlwriter-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149307" comment="php5-xsl-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149308" comment="php5-zip-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149309" comment="php5-zlib-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9935</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935" source="CVE"/>
    <description>
    The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9935.html">CVE-2016-9935</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1048097</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9935">SUSE bug 1015189</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149252" comment="apache2-mod_php5-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151021" comment="apache2-mod_php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149253" comment="php5-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151022" comment="php5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149254" comment="php5-bcmath-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151023" comment="php5-bcmath is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149255" comment="php5-bz2-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151024" comment="php5-bz2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149256" comment="php5-calendar-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151025" comment="php5-calendar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149257" comment="php5-ctype-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151026" comment="php5-ctype is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149258" comment="php5-curl-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151027" comment="php5-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149259" comment="php5-dba-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151028" comment="php5-dba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149260" comment="php5-devel-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151029" comment="php5-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149261" comment="php5-dom-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151030" comment="php5-dom is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149262" comment="php5-enchant-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152034" comment="php5-enchant is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149263" comment="php5-exif-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151031" comment="php5-exif is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149264" comment="php5-fastcgi-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151032" comment="php5-fastcgi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149265" comment="php5-fileinfo-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152035" comment="php5-fileinfo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149266" comment="php5-firebird-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152036" comment="php5-firebird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149267" comment="php5-fpm-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152037" comment="php5-fpm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149268" comment="php5-ftp-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151033" comment="php5-ftp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149269" comment="php5-gd-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151034" comment="php5-gd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149270" comment="php5-gettext-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151035" comment="php5-gettext is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149271" comment="php5-gmp-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151036" comment="php5-gmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149272" comment="php5-iconv-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151037" comment="php5-iconv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149273" comment="php5-imap-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151038" comment="php5-imap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149274" comment="php5-intl-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152038" comment="php5-intl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149275" comment="php5-json-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151039" comment="php5-json is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149276" comment="php5-ldap-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151040" comment="php5-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149277" comment="php5-mbstring-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151041" comment="php5-mbstring is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149278" comment="php5-mcrypt-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151042" comment="php5-mcrypt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149279" comment="php5-mssql-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152039" comment="php5-mssql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149280" comment="php5-mysql-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151043" comment="php5-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149281" comment="php5-odbc-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151044" comment="php5-odbc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149282" comment="php5-opcache-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152040" comment="php5-opcache is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149283" comment="php5-openssl-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151045" comment="php5-openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149284" comment="php5-pcntl-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152041" comment="php5-pcntl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149285" comment="php5-pdo-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151046" comment="php5-pdo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149286" comment="php5-pear-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151047" comment="php5-pear is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149287" comment="php5-pgsql-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151048" comment="php5-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149288" comment="php5-phar-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152042" comment="php5-phar is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149289" comment="php5-posix-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152043" comment="php5-posix is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149290" comment="php5-pspell-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152044" comment="php5-pspell is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149291" comment="php5-readline-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152045" comment="php5-readline is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149292" comment="php5-shmop-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151049" comment="php5-shmop is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149293" comment="php5-snmp-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151050" comment="php5-snmp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149294" comment="php5-soap-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152046" comment="php5-soap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149295" comment="php5-sockets-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151051" comment="php5-sockets is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149296" comment="php5-sqlite-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151052" comment="php5-sqlite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149297" comment="php5-suhosin-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151053" comment="php5-suhosin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149298" comment="php5-sysvmsg-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152047" comment="php5-sysvmsg is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149299" comment="php5-sysvsem-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151054" comment="php5-sysvsem is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149300" comment="php5-sysvshm-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151055" comment="php5-sysvshm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149301" comment="php5-tidy-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151056" comment="php5-tidy is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149302" comment="php5-tokenizer-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151057" comment="php5-tokenizer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149303" comment="php5-wddx-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151058" comment="php5-wddx is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149304" comment="php5-xmlreader-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151059" comment="php5-xmlreader is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149305" comment="php5-xmlrpc-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152048" comment="php5-xmlrpc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149306" comment="php5-xmlwriter-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151060" comment="php5-xmlwriter is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149307" comment="php5-xsl-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151061" comment="php5-xsl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149308" comment="php5-zip-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151062" comment="php5-zip is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149309" comment="php5-zlib-5.5.14-75.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151063" comment="php5-zlib is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9957</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9957" source="CVE"/>
    <description>
    Stack-based buffer overflow in game-music-emu before 0.6.1.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9957.html">CVE-2016-9957</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9957">SUSE bug 1015941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9957">SUSE bug 1015941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9957">SUSE bug 1015941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9957">SUSE bug 1015941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146429" comment="libgme-0.6.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153978" comment="libgme is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146430" comment="libgme-devel-0.6.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153979" comment="libgme-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146431" comment="libgme0-0.6.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153980" comment="libgme0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146432" comment="libgme0-32bit-0.6.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153981" comment="libgme0-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9958</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9958" source="CVE"/>
    <description>
    game-music-emu before 0.6.1 allows remote attackers to write to arbitrary memory locations.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9958.html">CVE-2016-9958</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9958">SUSE bug 1015941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9958">SUSE bug 1015941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9958">SUSE bug 1015941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9958">SUSE bug 1015941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146429" comment="libgme-0.6.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153978" comment="libgme is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146430" comment="libgme-devel-0.6.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153979" comment="libgme-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146431" comment="libgme0-0.6.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153980" comment="libgme0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146432" comment="libgme0-32bit-0.6.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153981" comment="libgme0-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9959</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9959" source="CVE"/>
    <description>
    game-music-emu before 0.6.1 allows remote attackers to generate out of bounds 8-bit values.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9959.html">CVE-2016-9959</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9959">SUSE bug 1015941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9959">SUSE bug 1015941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9959">SUSE bug 1015941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9959">SUSE bug 1015941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146429" comment="libgme-0.6.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153978" comment="libgme is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146430" comment="libgme-devel-0.6.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153979" comment="libgme-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146431" comment="libgme0-0.6.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153980" comment="libgme0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146432" comment="libgme0-32bit-0.6.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153981" comment="libgme0-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9960</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9960" source="CVE"/>
    <description>
    game-music-emu before 0.6.1 allows local users to cause a denial of service (divide by zero and process crash).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9960.html">CVE-2016-9960</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9960">SUSE bug 1015941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9960">SUSE bug 1015941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9960">SUSE bug 1015941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9960">SUSE bug 1015941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146429" comment="libgme-0.6.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153978" comment="libgme is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146430" comment="libgme-devel-0.6.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153979" comment="libgme-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146431" comment="libgme0-0.6.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153980" comment="libgme0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146432" comment="libgme0-32bit-0.6.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153981" comment="libgme0-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9961</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9961" source="CVE"/>
    <description>
    game-music-emu before 0.6.1 mishandles unspecified integer values.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9961.html">CVE-2016-9961</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9961">SUSE bug 1015941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9961">SUSE bug 1015941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9961">SUSE bug 1015941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9961">SUSE bug 1015941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146429" comment="libgme-0.6.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153978" comment="libgme is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146430" comment="libgme-devel-0.6.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153979" comment="libgme-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146431" comment="libgme0-0.6.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153980" comment="libgme0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146432" comment="libgme0-32bit-0.6.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153981" comment="libgme0-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9962</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2016-9962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9962" source="CVE"/>
    <description>
    RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container.  This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2016-9962.html">CVE-2016-9962</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9962">SUSE bug 1012568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9962">SUSE bug 1012568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9962">SUSE bug 1012568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9962">SUSE bug 1012568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9962">SUSE bug 1012568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9962">SUSE bug 1012568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9962">SUSE bug 1012568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9962">SUSE bug 1012568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9962">SUSE bug 1012568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9962">SUSE bug 1012568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9962">SUSE bug 1012568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9962">SUSE bug 1012568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9962">SUSE bug 1012568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9962">SUSE bug 1012568</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2016-9962">SUSE bug 1012568</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147990" comment="containerd-0.2.5+gitr569_2a5e70c-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147991" comment="containerd-ctr-0.2.5+gitr569_2a5e70c-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147992" comment="containerd-test-0.2.5+gitr569_2a5e70c-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153866" comment="containerd-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147993" comment="docker-1.12.6-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147994" comment="docker-bash-completion-1.12.6-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147995" comment="docker-test-1.12.6-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152507" comment="docker-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147996" comment="docker-zsh-completion-1.12.6-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147997" comment="runc-0.1.1+gitr2819_50a19c6-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147998" comment="runc-test-0.1.1+gitr2819_50a19c6-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153868" comment="runc-test is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0381</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-0381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0381" source="CVE"/>
    <description>
    An information disclosure vulnerability in silk/NLSF_stabilize.c in libopus in Mediaserver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-31607432.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-0381.html">CVE-2017-0381</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-0381">SUSE bug 1020102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-0381">SUSE bug 1020102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-0381">SUSE bug 1020102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-0381">SUSE bug 1020102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-0381">SUSE bug 1020102</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-0381">SUSE bug 1020102</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148619" comment="libopus-devel-1.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153982" comment="libopus-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148620" comment="libopus-devel-static-1.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153983" comment="libopus-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148621" comment="libopus0-1.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153984" comment="libopus0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148622" comment="libopus0-32bit-1.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153985" comment="libopus0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148623" comment="opus-1.1-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153986" comment="opus is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2583</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-2583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583" source="CVE"/>
    <description>
    The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel before 4.9.5 improperly emulates a "MOV SS, NULL selector" instruction, which allows guest OS users to cause a denial of service (guest OS crash) or gain guest OS privileges via a crafted application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2583.html">CVE-2017-2583</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2583">SUSE bug 1020602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2583">SUSE bug 1020602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2583">SUSE bug 1020602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2583">SUSE bug 1020602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2583">SUSE bug 1020602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2583">SUSE bug 1020602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2583">SUSE bug 1020602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2583">SUSE bug 1020602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2583">SUSE bug 1020602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2583">SUSE bug 1020602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2583">SUSE bug 1020602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2583">SUSE bug 1020602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2583">SUSE bug 1020602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2583">SUSE bug 1020602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2583">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2583">SUSE bug 1020602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2583">SUSE bug 1020602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2583">SUSE bug 1020602</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2583">SUSE bug 1020602</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150436" comment="kernel-debug-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150437" comment="kernel-debug-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150438" comment="kernel-debug-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150439" comment="kernel-default-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150440" comment="kernel-default-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150441" comment="kernel-default-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150442" comment="kernel-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150443" comment="kernel-docs-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150444" comment="kernel-docs-html-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150445" comment="kernel-docs-pdf-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150446" comment="kernel-ec2-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150447" comment="kernel-ec2-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150448" comment="kernel-ec2-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150449" comment="kernel-macros-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150450" comment="kernel-obs-build-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150451" comment="kernel-obs-qa-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150452" comment="kernel-pae-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150453" comment="kernel-pae-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150454" comment="kernel-pae-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150455" comment="kernel-pv-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150456" comment="kernel-pv-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150457" comment="kernel-pv-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150458" comment="kernel-source-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150459" comment="kernel-source-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150460" comment="kernel-syms-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150461" comment="kernel-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150462" comment="kernel-vanilla-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150463" comment="kernel-xen-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150464" comment="kernel-xen-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150465" comment="kernel-xen-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2584</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-2584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584" source="CVE"/>
    <description>
    arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2584.html">CVE-2017-2584</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2584">SUSE bug 1019851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2584">SUSE bug 1019851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2584">SUSE bug 1019851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2584">SUSE bug 1019851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2584">SUSE bug 1019851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2584">SUSE bug 1019851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2584">SUSE bug 1019851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2584">SUSE bug 1019851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2584">SUSE bug 1019851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2584">SUSE bug 1019851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2584">SUSE bug 1019851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2584">SUSE bug 1019851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2584">SUSE bug 1019851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2584">SUSE bug 1019851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2584">SUSE bug 1019851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2584">SUSE bug 1019851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2584">SUSE bug 1019851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2584">SUSE bug 1019851</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2584">SUSE bug 1019851</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150436" comment="kernel-debug-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150437" comment="kernel-debug-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150438" comment="kernel-debug-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150439" comment="kernel-default-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150440" comment="kernel-default-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150441" comment="kernel-default-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150442" comment="kernel-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150443" comment="kernel-docs-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150444" comment="kernel-docs-html-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150445" comment="kernel-docs-pdf-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150446" comment="kernel-ec2-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150447" comment="kernel-ec2-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150448" comment="kernel-ec2-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150449" comment="kernel-macros-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150450" comment="kernel-obs-build-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150451" comment="kernel-obs-qa-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150452" comment="kernel-pae-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150453" comment="kernel-pae-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150454" comment="kernel-pae-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150455" comment="kernel-pv-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150456" comment="kernel-pv-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150457" comment="kernel-pv-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150458" comment="kernel-source-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150459" comment="kernel-source-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150460" comment="kernel-syms-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150461" comment="kernel-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150462" comment="kernel-vanilla-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150463" comment="kernel-xen-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150464" comment="kernel-xen-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150465" comment="kernel-xen-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2596</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-2596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596" source="CVE"/>
    <description>
    The nested_vmx_check_vmptr function in arch/x86/kvm/vmx.c in the Linux kernel through 4.9.8 improperly emulates the VMXON instruction, which allows KVM L1 guest OS users to cause a denial of service (host OS memory consumption) by leveraging the mishandling of page references.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2596.html">CVE-2017-2596</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2596">SUSE bug 1022785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2596">SUSE bug 1022785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2596">SUSE bug 1022785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2596">SUSE bug 1022785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2596">SUSE bug 1022785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2596">SUSE bug 1022785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2596">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2596">SUSE bug 1022785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2596">SUSE bug 1022785</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2596">SUSE bug 1022785</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150436" comment="kernel-debug-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150437" comment="kernel-debug-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150438" comment="kernel-debug-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150439" comment="kernel-default-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150440" comment="kernel-default-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150441" comment="kernel-default-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150442" comment="kernel-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150443" comment="kernel-docs-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150444" comment="kernel-docs-html-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150445" comment="kernel-docs-pdf-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150446" comment="kernel-ec2-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150447" comment="kernel-ec2-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150448" comment="kernel-ec2-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150449" comment="kernel-macros-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150450" comment="kernel-obs-build-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150451" comment="kernel-obs-qa-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150452" comment="kernel-pae-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150453" comment="kernel-pae-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150454" comment="kernel-pae-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150455" comment="kernel-pv-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150456" comment="kernel-pv-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150457" comment="kernel-pv-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150458" comment="kernel-source-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150459" comment="kernel-source-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150460" comment="kernel-syms-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150461" comment="kernel-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150462" comment="kernel-vanilla-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150463" comment="kernel-xen-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150464" comment="kernel-xen-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150465" comment="kernel-xen-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2615</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-2615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2615" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2615.html">CVE-2017-2615</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2615">SUSE bug 1023004</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155579" comment="qemu-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155580" comment="qemu-arm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155581" comment="qemu-block-curl-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155582" comment="qemu-block-rbd-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155583" comment="qemu-extra-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155584" comment="qemu-guest-agent-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155585" comment="qemu-ipxe-1.0.0-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155586" comment="qemu-kvm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155587" comment="qemu-lang-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155588" comment="qemu-linux-user-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155589" comment="qemu-ppc-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155590" comment="qemu-s390-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155591" comment="qemu-seabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155592" comment="qemu-sgabios-8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155593" comment="qemu-testsuite-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155594" comment="qemu-tools-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155595" comment="qemu-vgabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155596" comment="qemu-x86-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2616</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-2616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2616.html">CVE-2017-2616</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2616">SUSE bug 1023041</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149158" comment="libblkid-devel-2.25-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151786" comment="libblkid-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149159" comment="libblkid-devel-32bit-2.25-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152861" comment="libblkid-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149160" comment="libblkid1-2.25-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151787" comment="libblkid1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149161" comment="libblkid1-32bit-2.25-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151788" comment="libblkid1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149162" comment="libmount-devel-2.25-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152863" comment="libmount-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149163" comment="libmount-devel-32bit-2.25-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152864" comment="libmount-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149164" comment="libmount1-2.25-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151789" comment="libmount1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149165" comment="libmount1-32bit-2.25-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151790" comment="libmount1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149166" comment="libsmartcols-devel-2.25-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152866" comment="libsmartcols-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149167" comment="libsmartcols1-2.25-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151791" comment="libsmartcols1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149168" comment="libuuid-devel-2.25-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151792" comment="libuuid-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149169" comment="libuuid-devel-32bit-2.25-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152868" comment="libuuid-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149170" comment="libuuid1-2.25-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151793" comment="libuuid1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149171" comment="libuuid1-32bit-2.25-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151794" comment="libuuid1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149172" comment="python-libmount-2.25-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152870" comment="python-libmount is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149173" comment="util-linux-2.25-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151795" comment="util-linux is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149174" comment="util-linux-lang-2.25-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151796" comment="util-linux-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149175" comment="util-linux-systemd-2.25-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151797" comment="util-linux-systemd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149176" comment="uuidd-2.25-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152871" comment="uuidd is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2619</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-2619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619" source="CVE"/>
    <description>
    Samba before versions 4.6.1, 4.5.7 and 4.4.11 are vulnerable to a malicious client using a symlink race to allow access to areas of the server file system not exported under the share definition.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2619.html">CVE-2017-2619</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1036283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1036283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1036283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1036283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1036283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1036283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1036283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1036283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1036283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1036283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1036283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1036283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1036283</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2619">SUSE bug 1027147</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150603" comment="ctdb-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150604" comment="ctdb-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152997" comment="ctdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150605" comment="ctdb-tests-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150606" comment="libdcerpc-atsvc-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152724" comment="libdcerpc-atsvc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150607" comment="libdcerpc-atsvc0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152725" comment="libdcerpc-atsvc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150608" comment="libdcerpc-atsvc0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152726" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150609" comment="libdcerpc-binding0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150610" comment="libdcerpc-binding0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150611" comment="libdcerpc-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150612" comment="libdcerpc-samr-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150613" comment="libdcerpc-samr0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150614" comment="libdcerpc-samr0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150615" comment="libdcerpc0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150616" comment="libdcerpc0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150617" comment="libgensec-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152731" comment="libgensec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150618" comment="libgensec0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150619" comment="libgensec0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150620" comment="libndr-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150621" comment="libndr-krb5pac-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150622" comment="libndr-krb5pac0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150623" comment="libndr-krb5pac0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150624" comment="libndr-nbt-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150625" comment="libndr-nbt0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150626" comment="libndr-nbt0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150627" comment="libndr-standard-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150628" comment="libndr-standard0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150629" comment="libndr-standard0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150630" comment="libndr0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150631" comment="libndr0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150632" comment="libnetapi-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150633" comment="libnetapi0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150634" comment="libnetapi0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150635" comment="libregistry-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152740" comment="libregistry-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150636" comment="libregistry0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150637" comment="libregistry0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152741" comment="libregistry0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150638" comment="libsamba-credentials-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150639" comment="libsamba-credentials0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150640" comment="libsamba-credentials0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150641" comment="libsamba-hostconfig-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150642" comment="libsamba-hostconfig0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150643" comment="libsamba-hostconfig0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150644" comment="libsamba-passdb-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150645" comment="libsamba-passdb0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150646" comment="libsamba-passdb0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150647" comment="libsamba-policy-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150648" comment="libsamba-policy0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150649" comment="libsamba-policy0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150650" comment="libsamba-util-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150651" comment="libsamba-util0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150652" comment="libsamba-util0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150653" comment="libsamdb-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150654" comment="libsamdb0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150655" comment="libsamdb0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150656" comment="libsmbclient-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150657" comment="libsmbclient-raw-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152750" comment="libsmbclient-raw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150658" comment="libsmbclient-raw0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150659" comment="libsmbclient-raw0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150660" comment="libsmbclient0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150661" comment="libsmbclient0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150662" comment="libsmbconf-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150663" comment="libsmbconf0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150664" comment="libsmbconf0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150665" comment="libsmbldap-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150666" comment="libsmbldap0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150667" comment="libsmbldap0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150668" comment="libtevent-util-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150669" comment="libtevent-util0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150670" comment="libtevent-util0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150671" comment="libwbclient-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150672" comment="libwbclient0-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150673" comment="libwbclient0-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150674" comment="samba-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150675" comment="samba-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150676" comment="samba-client-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150677" comment="samba-client-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150678" comment="samba-core-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150679" comment="samba-doc-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150680" comment="samba-libs-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150681" comment="samba-libs-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150682" comment="samba-pidl-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150683" comment="samba-python-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150684" comment="samba-test-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150685" comment="samba-test-devel-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152779" comment="samba-test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150686" comment="samba-winbind-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150687" comment="samba-winbind-32bit-4.2.4-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2620</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-2620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2620" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2620.html">CVE-2017-2620</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024972</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024834</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2620">SUSE bug 1024972</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155579" comment="qemu-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155580" comment="qemu-arm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155581" comment="qemu-block-curl-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155582" comment="qemu-block-rbd-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155583" comment="qemu-extra-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155584" comment="qemu-guest-agent-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155585" comment="qemu-ipxe-1.0.0-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155586" comment="qemu-kvm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155587" comment="qemu-lang-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155588" comment="qemu-linux-user-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155589" comment="qemu-ppc-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155590" comment="qemu-s390-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155591" comment="qemu-seabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155592" comment="qemu-sgabios-8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155593" comment="qemu-testsuite-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155594" comment="qemu-tools-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155595" comment="qemu-vgabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155596" comment="qemu-x86-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2636</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-2636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636" source="CVE"/>
    <description>
    Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2636.html">CVE-2017-2636</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1028372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1028372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1028372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1028372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1028372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1028372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1028372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1028372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1028372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1028372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1028372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1028372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1028372</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2636">SUSE bug 1027565</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150436" comment="kernel-debug-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150437" comment="kernel-debug-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150438" comment="kernel-debug-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150439" comment="kernel-default-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150440" comment="kernel-default-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150441" comment="kernel-default-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150442" comment="kernel-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150443" comment="kernel-docs-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150444" comment="kernel-docs-html-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150445" comment="kernel-docs-pdf-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150446" comment="kernel-ec2-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150447" comment="kernel-ec2-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150448" comment="kernel-ec2-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150449" comment="kernel-macros-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150450" comment="kernel-obs-build-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150451" comment="kernel-obs-qa-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150452" comment="kernel-pae-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150453" comment="kernel-pae-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150454" comment="kernel-pae-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150455" comment="kernel-pv-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150456" comment="kernel-pv-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150457" comment="kernel-pv-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150458" comment="kernel-source-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150459" comment="kernel-source-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150460" comment="kernel-syms-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150461" comment="kernel-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150462" comment="kernel-vanilla-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150463" comment="kernel-xen-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150464" comment="kernel-xen-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150465" comment="kernel-xen-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2640</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-2640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2640" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2640.html">CVE-2017-2640</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2640">SUSE bug 1028835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2640">SUSE bug 1028835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2640">SUSE bug 1028835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2640">SUSE bug 1028835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2640">SUSE bug 1028835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2640">SUSE bug 1028835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2640">SUSE bug 1028835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2640">SUSE bug 1028835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2640">SUSE bug 1028835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2640">SUSE bug 1028835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2640">SUSE bug 1028835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2640">SUSE bug 1028835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2640">SUSE bug 1028835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2640">SUSE bug 1028835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2640">SUSE bug 1028835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2640">SUSE bug 1028835</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150541" comment="finch-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152147" comment="finch is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150542" comment="finch-devel-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152148" comment="finch-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150543" comment="libpurple-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151335" comment="libpurple is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150544" comment="libpurple-branding-upstream-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152149" comment="libpurple-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150545" comment="libpurple-devel-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152150" comment="libpurple-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150546" comment="libpurple-lang-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151336" comment="libpurple-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150547" comment="libpurple-meanwhile-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151337" comment="libpurple-meanwhile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150548" comment="libpurple-tcl-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151338" comment="libpurple-tcl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150549" comment="pidgin-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151339" comment="pidgin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150550" comment="pidgin-devel-2.10.11-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152151" comment="pidgin-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2671</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-2671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2671" source="CVE"/>
    <description>
    The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2671.html">CVE-2017-2671</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2671">SUSE bug 1031003</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155173" comment="kernel-debug-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155174" comment="kernel-debug-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155175" comment="kernel-debug-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155176" comment="kernel-default-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155177" comment="kernel-default-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155178" comment="kernel-default-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155179" comment="kernel-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155180" comment="kernel-docs-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155181" comment="kernel-docs-html-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155182" comment="kernel-docs-pdf-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155183" comment="kernel-ec2-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155184" comment="kernel-ec2-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155185" comment="kernel-ec2-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155186" comment="kernel-macros-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155187" comment="kernel-obs-build-4.1.39-56.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155188" comment="kernel-obs-qa-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155189" comment="kernel-pae-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155190" comment="kernel-pae-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155191" comment="kernel-pae-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155192" comment="kernel-pv-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155193" comment="kernel-pv-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155194" comment="kernel-pv-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155195" comment="kernel-source-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155196" comment="kernel-source-vanilla-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155197" comment="kernel-syms-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155198" comment="kernel-vanilla-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155199" comment="kernel-vanilla-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155200" comment="kernel-xen-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155201" comment="kernel-xen-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155202" comment="kernel-xen-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2784</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-2784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2784" source="CVE"/>
    <description>
    An exploitable free of a stack pointer vulnerability exists in the x509 certificate parsing code of ARM mbed TLS before 1.3.19, 2.x before 2.1.7, and 2.4.x before 2.4.2. A specially crafted x509 certificate, when parsed by mbed TLS library, can cause an invalid free of a stack pointer leading to a potential remote code execution. In order to exploit this vulnerability, an attacker can act as either a client or a server on a network to deliver malicious x509 certificates to vulnerable applications.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-2784.html">CVE-2017-2784</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2784">SUSE bug 1029017</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-2784">SUSE bug 1029017</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149835" comment="libmbedtls9-1.3.19-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152973" comment="libmbedtls9 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149836" comment="libmbedtls9-32bit-1.3.19-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152974" comment="libmbedtls9-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149837" comment="mbedtls-1.3.19-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152975" comment="mbedtls is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149838" comment="mbedtls-devel-1.3.19-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152976" comment="mbedtls-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3135</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3135.html">CVE-2017-3135</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3135">SUSE bug 1024130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3135">SUSE bug 1024130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3135">SUSE bug 1024130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3135">SUSE bug 1024130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3135">SUSE bug 1024130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3135">SUSE bug 1024130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3135">SUSE bug 1024130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3135">SUSE bug 1024130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3135">SUSE bug 1024130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3135">SUSE bug 1024130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3135">SUSE bug 1024130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3135">SUSE bug 1024130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3135">SUSE bug 1024130</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3135">SUSE bug 1024130</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149310" comment="bind-9.9.9P1-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149311" comment="bind-chrootenv-9.9.9P1-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149312" comment="bind-devel-9.9.9P1-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149313" comment="bind-doc-9.9.9P1-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149314" comment="bind-libs-9.9.9P1-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149315" comment="bind-libs-32bit-9.9.9P1-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153103" comment="bind-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149316" comment="bind-lwresd-9.9.9P1-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153104" comment="bind-lwresd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149317" comment="bind-utils-9.9.9P1-48.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3136</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3136.html">CVE-2017-3136</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3136">SUSE bug 1033461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3136">SUSE bug 1033466</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3136">SUSE bug 1033466</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3136">SUSE bug 1033466</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3136">SUSE bug 1033466</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3136">SUSE bug 1033466</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3136">SUSE bug 1033466</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3136">SUSE bug 1033466</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3136">SUSE bug 1033461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3136">SUSE bug 1033466</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3136">SUSE bug 1033466</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154530" comment="bind-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154531" comment="bind-chrootenv-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154532" comment="bind-devel-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154533" comment="bind-doc-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154534" comment="bind-libs-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154535" comment="bind-libs-32bit-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153103" comment="bind-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154536" comment="bind-lwresd-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153104" comment="bind-lwresd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154537" comment="bind-utils-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3137</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3137" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3137.html">CVE-2017-3137</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3137">SUSE bug 1033461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3137">SUSE bug 1033467</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3137">SUSE bug 1033467</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3137">SUSE bug 1033467</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3137">SUSE bug 1033467</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3137">SUSE bug 1034162</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3137">SUSE bug 1033467</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3137">SUSE bug 1033467</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3137">SUSE bug 1033467</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3137">SUSE bug 1033467</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3137">SUSE bug 1033467</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3137">SUSE bug 1033461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3137">SUSE bug 1033467</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3137">SUSE bug 1076118</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154530" comment="bind-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154531" comment="bind-chrootenv-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154532" comment="bind-devel-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154533" comment="bind-doc-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154534" comment="bind-libs-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154535" comment="bind-libs-32bit-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153103" comment="bind-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154536" comment="bind-lwresd-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153104" comment="bind-lwresd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154537" comment="bind-utils-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3138</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3138" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3138.html">CVE-2017-3138</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3138">SUSE bug 1033461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3138">SUSE bug 1033468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3138">SUSE bug 1033468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3138">SUSE bug 1033468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3138">SUSE bug 1033468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3138">SUSE bug 1033468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3138">SUSE bug 1033468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3138">SUSE bug 1033468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3138">SUSE bug 1033468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3138">SUSE bug 1033461</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3138">SUSE bug 1033468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3138">SUSE bug 1033468</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3138">SUSE bug 1033468</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154530" comment="bind-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154531" comment="bind-chrootenv-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154532" comment="bind-devel-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154533" comment="bind-doc-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154534" comment="bind-libs-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151206" comment="bind-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154535" comment="bind-libs-32bit-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153103" comment="bind-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154536" comment="bind-lwresd-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153104" comment="bind-lwresd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154537" comment="bind-utils-9.9.9P1-51.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3231</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3231.html">CVE-2017-3231</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3231">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3231">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3231">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3231">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3231">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3231">SUSE bug 1024218</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148627" comment="java-1_7_0-openjdk-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148628" comment="java-1_7_0-openjdk-accessibility-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148629" comment="java-1_7_0-openjdk-bootstrap-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148630" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148631" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148632" comment="java-1_7_0-openjdk-demo-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148633" comment="java-1_7_0-openjdk-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148634" comment="java-1_7_0-openjdk-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148635" comment="java-1_7_0-openjdk-javadoc-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148636" comment="java-1_7_0-openjdk-src-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148079" comment="java-1_8_0-openjdk-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148080" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148081" comment="java-1_8_0-openjdk-demo-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148082" comment="java-1_8_0-openjdk-devel-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148083" comment="java-1_8_0-openjdk-headless-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148084" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148085" comment="java-1_8_0-openjdk-src-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3238</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3238.html">CVE-2017-3238</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3238">SUSE bug 1020882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3238">SUSE bug 1020882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3238">SUSE bug 1020882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3238">SUSE bug 1020882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3238">SUSE bug 1020882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3238">SUSE bug 1020882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3238">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3238">SUSE bug 1020882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3238">SUSE bug 1020882</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3238">SUSE bug 1020882</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148497" comment="libmysql56client18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148498" comment="libmysql56client18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148499" comment="libmysql56client_r18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148500" comment="libmysql56client_r18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148484" comment="libmysqlclient-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148485" comment="libmysqlclient18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148486" comment="libmysqlclient18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148487" comment="libmysqlclient_r18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148488" comment="libmysqlclient_r18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148489" comment="libmysqld-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148490" comment="libmysqld18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148491" comment="mariadb-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148492" comment="mariadb-bench-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148493" comment="mariadb-client-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148494" comment="mariadb-errormessages-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148495" comment="mariadb-test-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148496" comment="mariadb-tools-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148501" comment="mysql-community-server-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148502" comment="mysql-community-server-bench-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148503" comment="mysql-community-server-client-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148504" comment="mysql-community-server-errormessages-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148505" comment="mysql-community-server-test-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148506" comment="mysql-community-server-tools-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3241</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3241.html">CVE-2017-3241</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3241">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3241">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3241">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3241">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3241">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3241">SUSE bug 1024218</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148627" comment="java-1_7_0-openjdk-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148628" comment="java-1_7_0-openjdk-accessibility-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148629" comment="java-1_7_0-openjdk-bootstrap-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148630" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148631" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148632" comment="java-1_7_0-openjdk-demo-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148633" comment="java-1_7_0-openjdk-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148634" comment="java-1_7_0-openjdk-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148635" comment="java-1_7_0-openjdk-javadoc-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148636" comment="java-1_7_0-openjdk-src-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148079" comment="java-1_8_0-openjdk-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148080" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148081" comment="java-1_8_0-openjdk-demo-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148082" comment="java-1_8_0-openjdk-devel-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148083" comment="java-1_8_0-openjdk-headless-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148084" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148085" comment="java-1_8_0-openjdk-src-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3243</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Charsets). Supported versions that are affected are 5.5.53 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3243.html">CVE-2017-3243</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3243">SUSE bug 1020891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3243">SUSE bug 1020891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3243">SUSE bug 1020891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3243">SUSE bug 1020891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3243">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3243">SUSE bug 1020891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3243">SUSE bug 1020891</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3243">SUSE bug 1020891</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148484" comment="libmysqlclient-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148485" comment="libmysqlclient18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148486" comment="libmysqlclient18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148487" comment="libmysqlclient_r18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148488" comment="libmysqlclient_r18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148489" comment="libmysqld-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148490" comment="libmysqld18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148491" comment="mariadb-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148492" comment="mariadb-bench-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148493" comment="mariadb-client-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148494" comment="mariadb-errormessages-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148495" comment="mariadb-test-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148496" comment="mariadb-tools-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3244</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3244.html">CVE-2017-3244</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3244">SUSE bug 1020877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3244">SUSE bug 1020877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3244">SUSE bug 1020877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3244">SUSE bug 1020877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3244">SUSE bug 1020877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3244">SUSE bug 1020877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3244">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3244">SUSE bug 1020877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3244">SUSE bug 1020877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3244">SUSE bug 1020877</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148497" comment="libmysql56client18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148498" comment="libmysql56client18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148499" comment="libmysql56client_r18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148500" comment="libmysql56client_r18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148484" comment="libmysqlclient-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148485" comment="libmysqlclient18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148486" comment="libmysqlclient18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148487" comment="libmysqlclient_r18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148488" comment="libmysqlclient_r18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148489" comment="libmysqld-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148490" comment="libmysqld18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148491" comment="mariadb-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148492" comment="mariadb-bench-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148493" comment="mariadb-client-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148494" comment="mariadb-errormessages-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148495" comment="mariadb-test-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148496" comment="mariadb-tools-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148501" comment="mysql-community-server-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148502" comment="mysql-community-server-bench-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148503" comment="mysql-community-server-client-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148504" comment="mysql-community-server-errormessages-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148505" comment="mysql-community-server-test-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148506" comment="mysql-community-server-tools-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3252</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAAS). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.8 (Integrity impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3252.html">CVE-2017-3252</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3252">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3252">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3252">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3252">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3252">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3252">SUSE bug 1024218</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148627" comment="java-1_7_0-openjdk-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148628" comment="java-1_7_0-openjdk-accessibility-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148629" comment="java-1_7_0-openjdk-bootstrap-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148630" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148631" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148632" comment="java-1_7_0-openjdk-demo-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148633" comment="java-1_7_0-openjdk-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148634" comment="java-1_7_0-openjdk-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148635" comment="java-1_7_0-openjdk-javadoc-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148636" comment="java-1_7_0-openjdk-src-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148079" comment="java-1_8_0-openjdk-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148080" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148081" comment="java-1_8_0-openjdk-demo-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148082" comment="java-1_8_0-openjdk-devel-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148083" comment="java-1_8_0-openjdk-headless-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148084" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148085" comment="java-1_8_0-openjdk-src-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3253</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3253" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3253.html">CVE-2017-3253</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3253">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3253">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3253">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3253">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3253">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3253">SUSE bug 1024218</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148627" comment="java-1_7_0-openjdk-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148628" comment="java-1_7_0-openjdk-accessibility-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148629" comment="java-1_7_0-openjdk-bootstrap-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148630" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148631" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148632" comment="java-1_7_0-openjdk-demo-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148633" comment="java-1_7_0-openjdk-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148634" comment="java-1_7_0-openjdk-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148635" comment="java-1_7_0-openjdk-javadoc-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148636" comment="java-1_7_0-openjdk-src-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148079" comment="java-1_8_0-openjdk-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148080" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148081" comment="java-1_8_0-openjdk-demo-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148082" comment="java-1_8_0-openjdk-devel-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148083" comment="java-1_8_0-openjdk-headless-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148084" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148085" comment="java-1_8_0-openjdk-src-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3257</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3257" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.6.34 and earlier5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3257.html">CVE-2017-3257</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3257">SUSE bug 1020878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3257">SUSE bug 1020878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3257">SUSE bug 1020878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3257">SUSE bug 1020878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3257">SUSE bug 1020878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3257">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3257">SUSE bug 1020878</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3257">SUSE bug 1020878</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148497" comment="libmysql56client18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148498" comment="libmysql56client18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148499" comment="libmysql56client_r18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148500" comment="libmysql56client_r18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148484" comment="libmysqlclient-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148485" comment="libmysqlclient18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148486" comment="libmysqlclient18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148487" comment="libmysqlclient_r18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148488" comment="libmysqlclient_r18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148489" comment="libmysqld-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148490" comment="libmysqld18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148491" comment="mariadb-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148492" comment="mariadb-bench-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148493" comment="mariadb-client-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148494" comment="mariadb-errormessages-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148495" comment="mariadb-test-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148496" comment="mariadb-tools-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148501" comment="mysql-community-server-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148502" comment="mysql-community-server-bench-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148503" comment="mysql-community-server-client-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148504" comment="mysql-community-server-errormessages-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148505" comment="mysql-community-server-test-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148506" comment="mysql-community-server-tools-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3258</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3258" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3258.html">CVE-2017-3258</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3258">SUSE bug 1020875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3258">SUSE bug 1020875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3258">SUSE bug 1020875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3258">SUSE bug 1020875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3258">SUSE bug 1020875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3258">SUSE bug 1020875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3258">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3258">SUSE bug 1020875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3258">SUSE bug 1020875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3258">SUSE bug 1020875</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148497" comment="libmysql56client18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148498" comment="libmysql56client18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148499" comment="libmysql56client_r18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148500" comment="libmysql56client_r18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148484" comment="libmysqlclient-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148485" comment="libmysqlclient18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148486" comment="libmysqlclient18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148487" comment="libmysqlclient_r18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148488" comment="libmysqlclient_r18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148489" comment="libmysqld-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148490" comment="libmysqld18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148491" comment="mariadb-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148492" comment="mariadb-bench-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148493" comment="mariadb-client-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148494" comment="mariadb-errormessages-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148495" comment="mariadb-test-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148496" comment="mariadb-tools-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148501" comment="mysql-community-server-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148502" comment="mysql-community-server-bench-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148503" comment="mysql-community-server-client-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148504" comment="mysql-community-server-errormessages-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148505" comment="mysql-community-server-test-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148506" comment="mysql-community-server-tools-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3259</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3259" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3259" source="CVE"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 3.7 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3259.html">CVE-2017-3259</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3259">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3259">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3259">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3259">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3259">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3259">SUSE bug 1024218</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148627" comment="java-1_7_0-openjdk-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148628" comment="java-1_7_0-openjdk-accessibility-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148629" comment="java-1_7_0-openjdk-bootstrap-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148630" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148631" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148632" comment="java-1_7_0-openjdk-demo-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148633" comment="java-1_7_0-openjdk-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148634" comment="java-1_7_0-openjdk-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148635" comment="java-1_7_0-openjdk-javadoc-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148636" comment="java-1_7_0-openjdk-src-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3260</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3260" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" source="CVE"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 7u121 and 8u112. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3260.html">CVE-2017-3260</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3260">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3260">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3260">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3260">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3260">SUSE bug 1020905</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148627" comment="java-1_7_0-openjdk-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148628" comment="java-1_7_0-openjdk-accessibility-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148629" comment="java-1_7_0-openjdk-bootstrap-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148630" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148631" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148632" comment="java-1_7_0-openjdk-demo-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148633" comment="java-1_7_0-openjdk-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148634" comment="java-1_7_0-openjdk-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148635" comment="java-1_7_0-openjdk-javadoc-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148636" comment="java-1_7_0-openjdk-src-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148079" comment="java-1_8_0-openjdk-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148080" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148081" comment="java-1_8_0-openjdk-demo-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148082" comment="java-1_8_0-openjdk-devel-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148083" comment="java-1_8_0-openjdk-headless-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148084" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148085" comment="java-1_8_0-openjdk-src-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3261</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3261.html">CVE-2017-3261</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3261">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3261">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3261">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3261">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3261">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3261">SUSE bug 1024218</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148627" comment="java-1_7_0-openjdk-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148628" comment="java-1_7_0-openjdk-accessibility-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148629" comment="java-1_7_0-openjdk-bootstrap-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148630" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148631" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148632" comment="java-1_7_0-openjdk-demo-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148633" comment="java-1_7_0-openjdk-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148634" comment="java-1_7_0-openjdk-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148635" comment="java-1_7_0-openjdk-javadoc-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148636" comment="java-1_7_0-openjdk-src-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148079" comment="java-1_8_0-openjdk-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148080" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148081" comment="java-1_8_0-openjdk-demo-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148082" comment="java-1_8_0-openjdk-devel-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148083" comment="java-1_8_0-openjdk-headless-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148084" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148085" comment="java-1_8_0-openjdk-src-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3265</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 5.6 (Confidentiality and Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3265.html">CVE-2017-3265</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3265">SUSE bug 1020885</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3265">SUSE bug 1020885</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3265">SUSE bug 1020885</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3265">SUSE bug 1020885</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3265">SUSE bug 1020885</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3265">SUSE bug 1020885</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3265">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3265">SUSE bug 1020885</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3265">SUSE bug 1020885</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3265">SUSE bug 1020885</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148497" comment="libmysql56client18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148498" comment="libmysql56client18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148499" comment="libmysql56client_r18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148500" comment="libmysql56client_r18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148484" comment="libmysqlclient-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148485" comment="libmysqlclient18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148486" comment="libmysqlclient18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148487" comment="libmysqlclient_r18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148488" comment="libmysqlclient_r18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148489" comment="libmysqld-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148490" comment="libmysqld18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148491" comment="mariadb-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148492" comment="mariadb-bench-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148493" comment="mariadb-client-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148494" comment="mariadb-errormessages-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148495" comment="mariadb-test-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148496" comment="mariadb-tools-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148501" comment="mysql-community-server-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148502" comment="mysql-community-server-bench-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148503" comment="mysql-community-server-client-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148504" comment="mysql-community-server-errormessages-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148505" comment="mysql-community-server-test-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148506" comment="mysql-community-server-tools-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3272</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3272.html">CVE-2017-3272</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3272">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3272">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3272">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3272">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3272">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3272">SUSE bug 1024218</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148627" comment="java-1_7_0-openjdk-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148628" comment="java-1_7_0-openjdk-accessibility-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148629" comment="java-1_7_0-openjdk-bootstrap-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148630" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148631" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148632" comment="java-1_7_0-openjdk-demo-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148633" comment="java-1_7_0-openjdk-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148634" comment="java-1_7_0-openjdk-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148635" comment="java-1_7_0-openjdk-javadoc-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148636" comment="java-1_7_0-openjdk-src-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148079" comment="java-1_8_0-openjdk-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148080" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148081" comment="java-1_8_0-openjdk-demo-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148082" comment="java-1_8_0-openjdk-devel-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148083" comment="java-1_8_0-openjdk-headless-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148084" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148085" comment="java-1_8_0-openjdk-src-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3273</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3273" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3273.html">CVE-2017-3273</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3273">SUSE bug 1020876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3273">SUSE bug 1020876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3273">SUSE bug 1020876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3273">SUSE bug 1020876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3273">SUSE bug 1020876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3273">SUSE bug 1020876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3273">SUSE bug 1020876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3273">SUSE bug 1020876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3273">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3273">SUSE bug 1020876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3273">SUSE bug 1053919</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148497" comment="libmysql56client18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148498" comment="libmysql56client18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148499" comment="libmysql56client_r18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148500" comment="libmysql56client_r18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148501" comment="mysql-community-server-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148502" comment="mysql-community-server-bench-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148503" comment="mysql-community-server-client-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148504" comment="mysql-community-server-errormessages-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148505" comment="mysql-community-server-test-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148506" comment="mysql-community-server-tools-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3289</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" source="CVE"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3289.html">CVE-2017-3289</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3289">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3289">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3289">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3289">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3289">SUSE bug 1020905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3289">SUSE bug 1024218</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148627" comment="java-1_7_0-openjdk-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152825" comment="java-1_7_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148628" comment="java-1_7_0-openjdk-accessibility-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152826" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148629" comment="java-1_7_0-openjdk-bootstrap-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152827" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148630" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152828" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148631" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152829" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148632" comment="java-1_7_0-openjdk-demo-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152830" comment="java-1_7_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148633" comment="java-1_7_0-openjdk-devel-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152831" comment="java-1_7_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148634" comment="java-1_7_0-openjdk-headless-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152832" comment="java-1_7_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148635" comment="java-1_7_0-openjdk-javadoc-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152833" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148636" comment="java-1_7_0-openjdk-src-1.7.0.131-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152834" comment="java-1_7_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148079" comment="java-1_8_0-openjdk-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148080" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148081" comment="java-1_8_0-openjdk-demo-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148082" comment="java-1_8_0-openjdk-devel-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148083" comment="java-1_8_0-openjdk-headless-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148084" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148085" comment="java-1_8_0-openjdk-src-1.8.0.121-21.4 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3290</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3290" source="CVE"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Shared Folder). Supported versions that are affected are VirtualBox prior to 5.0.32 and prior to 5.1.14. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS v3.0 Base Score 7.9 (Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3290.html">CVE-2017-3290</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3290">SUSE bug 1020856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3290">SUSE bug 1020856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3290">SUSE bug 1020856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3290">SUSE bug 1020856</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147955" comment="python-virtualbox-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153266" comment="python-virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147956" comment="virtualbox-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147957" comment="virtualbox-devel-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147958" comment="virtualbox-guest-desktop-icons-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147959" comment="virtualbox-guest-kmp-default-5.0.32_k4.1.36_44-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147960" comment="virtualbox-guest-tools-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147961" comment="virtualbox-guest-x11-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147962" comment="virtualbox-host-kmp-default-5.0.32_k4.1.36_44-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147963" comment="virtualbox-host-source-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147964" comment="virtualbox-qt-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147965" comment="virtualbox-websrv-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3291</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3291.html">CVE-2017-3291</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3291">SUSE bug 1020884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3291">SUSE bug 1020884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3291">SUSE bug 1020884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3291">SUSE bug 1020884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3291">SUSE bug 1020884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3291">SUSE bug 1020884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3291">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3291">SUSE bug 1020884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3291">SUSE bug 1020884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3291">SUSE bug 1020884</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3291">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3291">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3291">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3291">SUSE bug 998309</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148497" comment="libmysql56client18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148498" comment="libmysql56client18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148499" comment="libmysql56client_r18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148500" comment="libmysql56client_r18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148484" comment="libmysqlclient-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148485" comment="libmysqlclient18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148486" comment="libmysqlclient18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148487" comment="libmysqlclient_r18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148488" comment="libmysqlclient_r18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148489" comment="libmysqld-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148490" comment="libmysqld18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148491" comment="mariadb-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148492" comment="mariadb-bench-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148493" comment="mariadb-client-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148494" comment="mariadb-errormessages-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148495" comment="mariadb-test-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148496" comment="mariadb-tools-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148501" comment="mysql-community-server-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148502" comment="mysql-community-server-bench-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148503" comment="mysql-community-server-client-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148504" comment="mysql-community-server-errormessages-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148505" comment="mysql-community-server-test-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148506" comment="mysql-community-server-tools-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3302</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302" source="CVE"/>
    <description>
    Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3302.html">CVE-2017-3302</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1034911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1022428</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3302">SUSE bug 1034850</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155228" comment="libmysql56client18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155229" comment="libmysql56client18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155230" comment="libmysql56client_r18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155231" comment="libmysql56client_r18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155232" comment="mysql-community-server-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155233" comment="mysql-community-server-bench-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155234" comment="mysql-community-server-client-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155235" comment="mysql-community-server-errormessages-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155236" comment="mysql-community-server-test-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155237" comment="mysql-community-server-tools-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3305</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3305" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: C API). Supported versions that are affected are 5.5.55 and earlier and 5.6.35 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N). NOTE: the previous information is from the April 2017 CPU. Oracle has not commented on third-party claims that this issue allows man-in-the-middle attackers to hijack the authentication of users by leveraging incorrect ordering of security parameter verification in a client, aka, "The Riddle".
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3305.html">CVE-2017-3305</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 1029396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 1029396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 1029396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 1029396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 1029396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 1029396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 924663</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 1029396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 1029396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 1029396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 1029396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 1029396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 1029396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 1037590</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 1029396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 1029396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 1029396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 1029396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 1029396</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3305">SUSE bug 1034850</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155228" comment="libmysql56client18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155229" comment="libmysql56client18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155230" comment="libmysql56client_r18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155231" comment="libmysql56client_r18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155232" comment="mysql-community-server-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155233" comment="mysql-community-server-bench-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155234" comment="mysql-community-server-client-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155235" comment="mysql-community-server-errormessages-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155236" comment="mysql-community-server-test-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155237" comment="mysql-community-server-tools-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3308</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3308" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3308.html">CVE-2017-3308</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3308">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3308">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3308">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3308">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3308">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3308">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3308">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3308">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3308">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3308">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3308">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3308">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3308">SUSE bug 1034850</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155228" comment="libmysql56client18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155229" comment="libmysql56client18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155230" comment="libmysql56client_r18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155231" comment="libmysql56client_r18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155232" comment="mysql-community-server-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155233" comment="mysql-community-server-bench-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155234" comment="mysql-community-server-client-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155235" comment="mysql-community-server-errormessages-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155236" comment="mysql-community-server-test-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155237" comment="mysql-community-server-tools-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3309</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3309" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3309.html">CVE-2017-3309</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3309">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3309">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3309">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3309">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3309">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3309">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3309">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3309">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3309">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3309">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3309">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3309">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3309">SUSE bug 1034850</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155228" comment="libmysql56client18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155229" comment="libmysql56client18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155230" comment="libmysql56client_r18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155231" comment="libmysql56client_r18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155232" comment="mysql-community-server-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155233" comment="mysql-community-server-bench-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155234" comment="mysql-community-server-client-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155235" comment="mysql-community-server-errormessages-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155236" comment="mysql-community-server-test-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155237" comment="mysql-community-server-tools-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3312</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3312" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.7 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3312.html">CVE-2017-3312</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3312">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3312">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3312">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3312">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3312">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3312">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3312">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3312">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3312">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3312">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3312">SUSE bug 1020873</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3312">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3312">SUSE bug 998309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3312">SUSE bug 998309</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148497" comment="libmysql56client18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148498" comment="libmysql56client18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148499" comment="libmysql56client_r18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148500" comment="libmysql56client_r18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148484" comment="libmysqlclient-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148485" comment="libmysqlclient18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148486" comment="libmysqlclient18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148487" comment="libmysqlclient_r18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148488" comment="libmysqlclient_r18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148489" comment="libmysqld-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148490" comment="libmysqld18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148491" comment="mariadb-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148492" comment="mariadb-bench-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148493" comment="mariadb-client-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148494" comment="mariadb-errormessages-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148495" comment="mariadb-test-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148496" comment="mariadb-tools-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148501" comment="mysql-community-server-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148502" comment="mysql-community-server-bench-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148503" comment="mysql-community-server-client-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148504" comment="mysql-community-server-errormessages-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148505" comment="mysql-community-server-test-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148506" comment="mysql-community-server-tools-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3313</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: MyISAM). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.7 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3313.html">CVE-2017-3313</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3313">SUSE bug 1020890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3313">SUSE bug 1020890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3313">SUSE bug 1020890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3313">SUSE bug 1020890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3313">SUSE bug 1020890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3313">SUSE bug 1020890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3313">SUSE bug 1034911</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3313">SUSE bug 1020890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3313">SUSE bug 1020890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3313">SUSE bug 1020890</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3313">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3313">SUSE bug 1020890</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148497" comment="libmysql56client18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148498" comment="libmysql56client18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148499" comment="libmysql56client_r18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148500" comment="libmysql56client_r18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148501" comment="mysql-community-server-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148502" comment="mysql-community-server-bench-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148503" comment="mysql-community-server-client-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148504" comment="mysql-community-server-errormessages-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148505" comment="mysql-community-server-test-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148506" comment="mysql-community-server-tools-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3316</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3316" source="CVE"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: GUI). Supported versions that are affected are VirtualBox prior to 5.0.32 and prior to 5.1.14. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS v3.0 Base Score 8.4 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3316.html">CVE-2017-3316</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3316">SUSE bug 1020856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3316">SUSE bug 1020856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3316">SUSE bug 1020856</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3316">SUSE bug 1020856</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147955" comment="python-virtualbox-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153266" comment="python-virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147956" comment="virtualbox-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147957" comment="virtualbox-devel-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147958" comment="virtualbox-guest-desktop-icons-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147959" comment="virtualbox-guest-kmp-default-5.0.32_k4.1.36_44-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147960" comment="virtualbox-guest-tools-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147961" comment="virtualbox-guest-x11-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147962" comment="virtualbox-host-kmp-default-5.0.32_k4.1.36_44-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147963" comment="virtualbox-host-source-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147964" comment="virtualbox-qt-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147965" comment="virtualbox-websrv-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3317</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Logging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.0 (Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3317.html">CVE-2017-3317</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3317">SUSE bug 1020894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3317">SUSE bug 1020894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3317">SUSE bug 1020894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3317">SUSE bug 1020894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3317">SUSE bug 1020894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3317">SUSE bug 1020894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3317">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3317">SUSE bug 1020894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3317">SUSE bug 1020894</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3317">SUSE bug 1020894</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148497" comment="libmysql56client18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148498" comment="libmysql56client18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148499" comment="libmysql56client_r18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148500" comment="libmysql56client_r18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148484" comment="libmysqlclient-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148485" comment="libmysqlclient18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148486" comment="libmysqlclient18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148487" comment="libmysqlclient_r18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148488" comment="libmysqlclient_r18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148489" comment="libmysqld-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148490" comment="libmysqld18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148491" comment="mariadb-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148492" comment="mariadb-bench-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148493" comment="mariadb-client-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148494" comment="mariadb-errormessages-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148495" comment="mariadb-test-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148496" comment="mariadb-tools-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148501" comment="mysql-community-server-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148502" comment="mysql-community-server-bench-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148503" comment="mysql-community-server-client-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148504" comment="mysql-community-server-errormessages-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148505" comment="mysql-community-server-test-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148506" comment="mysql-community-server-tools-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3318</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3318" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Error Handling). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.0 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3318.html">CVE-2017-3318</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3318">SUSE bug 1020896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3318">SUSE bug 1020896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3318">SUSE bug 1020896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3318">SUSE bug 1020896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3318">SUSE bug 1020896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3318">SUSE bug 1020868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3318">SUSE bug 1020896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3318">SUSE bug 1020896</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3318">SUSE bug 1020896</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148497" comment="libmysql56client18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148498" comment="libmysql56client18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148499" comment="libmysql56client_r18-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148500" comment="libmysql56client_r18-32bit-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148484" comment="libmysqlclient-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151094" comment="libmysqlclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148485" comment="libmysqlclient18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151095" comment="libmysqlclient18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148486" comment="libmysqlclient18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151096" comment="libmysqlclient18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148487" comment="libmysqlclient_r18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151097" comment="libmysqlclient_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148488" comment="libmysqlclient_r18-32bit-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152839" comment="libmysqlclient_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148489" comment="libmysqld-devel-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148490" comment="libmysqld18-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151098" comment="libmysqld18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148491" comment="mariadb-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148492" comment="mariadb-bench-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148493" comment="mariadb-client-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148494" comment="mariadb-errormessages-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148495" comment="mariadb-test-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148496" comment="mariadb-tools-10.0.29-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148501" comment="mysql-community-server-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148502" comment="mysql-community-server-bench-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148503" comment="mysql-community-server-client-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148504" comment="mysql-community-server-errormessages-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148505" comment="mysql-community-server-test-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148506" comment="mysql-community-server-tools-5.6.35-22.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3329</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3329" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Thread Pooling). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3329.html">CVE-2017-3329</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3329">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3329">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3329">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3329">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3329">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3329">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3329">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3329">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3329">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3329">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3329">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3329">SUSE bug 1034850</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155228" comment="libmysql56client18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155229" comment="libmysql56client18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155230" comment="libmysql56client_r18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155231" comment="libmysql56client_r18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155232" comment="mysql-community-server-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155233" comment="mysql-community-server-bench-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155234" comment="mysql-community-server-client-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155235" comment="mysql-community-server-errormessages-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155236" comment="mysql-community-server-test-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155237" comment="mysql-community-server-tools-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3332</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3332" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3332" source="CVE"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: VirtualBox SVGA Emulation). Supported versions that are affected are VirtualBox prior to 5.0.32 and prior to 5.1.14. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS v3.0 Base Score 8.4 (Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3332.html">CVE-2017-3332</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3332">SUSE bug 1020856</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147955" comment="python-virtualbox-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153266" comment="python-virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147956" comment="virtualbox-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147957" comment="virtualbox-devel-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147958" comment="virtualbox-guest-desktop-icons-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147959" comment="virtualbox-guest-kmp-default-5.0.32_k4.1.36_44-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147960" comment="virtualbox-guest-tools-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147961" comment="virtualbox-guest-x11-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147962" comment="virtualbox-host-kmp-default-5.0.32_k4.1.36_44-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147963" comment="virtualbox-host-source-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147964" comment="virtualbox-qt-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147965" comment="virtualbox-websrv-5.0.32-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3450</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3450" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3450.html">CVE-2017-3450</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3450">SUSE bug 1034850</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155228" comment="libmysql56client18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155229" comment="libmysql56client18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155230" comment="libmysql56client_r18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155231" comment="libmysql56client_r18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155232" comment="mysql-community-server-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155233" comment="mysql-community-server-bench-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155234" comment="mysql-community-server-client-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155235" comment="mysql-community-server-errormessages-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155236" comment="mysql-community-server-test-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155237" comment="mysql-community-server-tools-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3452</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3452" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.35 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3452.html">CVE-2017-3452</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3452">SUSE bug 1034850</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155228" comment="libmysql56client18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155229" comment="libmysql56client18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155230" comment="libmysql56client_r18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155231" comment="libmysql56client_r18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155232" comment="mysql-community-server-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155233" comment="mysql-community-server-bench-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155234" comment="mysql-community-server-client-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155235" comment="mysql-community-server-errormessages-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155236" comment="mysql-community-server-test-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155237" comment="mysql-community-server-tools-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3453</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3453.html">CVE-2017-3453</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3453">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3453">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3453">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3453">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3453">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3453">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3453">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3453">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3453">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3453">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3453">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3453">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3453">SUSE bug 1034850</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155228" comment="libmysql56client18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155229" comment="libmysql56client18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155230" comment="libmysql56client_r18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155231" comment="libmysql56client_r18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155232" comment="mysql-community-server-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155233" comment="mysql-community-server-bench-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155234" comment="mysql-community-server-client-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155235" comment="mysql-community-server-errormessages-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155236" comment="mysql-community-server-test-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155237" comment="mysql-community-server-tools-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3456</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3456.html">CVE-2017-3456</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3456">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3456">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3456">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3456">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3456">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3456">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3456">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3456">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3456">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3456">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3456">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3456">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3456">SUSE bug 1034850</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155228" comment="libmysql56client18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155229" comment="libmysql56client18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155230" comment="libmysql56client_r18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155231" comment="libmysql56client_r18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155232" comment="mysql-community-server-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155233" comment="mysql-community-server-bench-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155234" comment="mysql-community-server-client-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155235" comment="mysql-community-server-errormessages-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155236" comment="mysql-community-server-test-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155237" comment="mysql-community-server-tools-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3461</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3461.html">CVE-2017-3461</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3461">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3461">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3461">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3461">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3461">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3461">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3461">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3461">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3461">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3461">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3461">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3461">SUSE bug 1034850</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155228" comment="libmysql56client18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155229" comment="libmysql56client18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155230" comment="libmysql56client_r18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155231" comment="libmysql56client_r18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155232" comment="mysql-community-server-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155233" comment="mysql-community-server-bench-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155234" comment="mysql-community-server-client-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155235" comment="mysql-community-server-errormessages-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155236" comment="mysql-community-server-test-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155237" comment="mysql-community-server-tools-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3462</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3462.html">CVE-2017-3462</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3462">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3462">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3462">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3462">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3462">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3462">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3462">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3462">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3462">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3462">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3462">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3462">SUSE bug 1034850</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155228" comment="libmysql56client18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155229" comment="libmysql56client18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155230" comment="libmysql56client_r18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155231" comment="libmysql56client_r18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155232" comment="mysql-community-server-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155233" comment="mysql-community-server-bench-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155234" comment="mysql-community-server-client-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155235" comment="mysql-community-server-errormessages-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155236" comment="mysql-community-server-test-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155237" comment="mysql-community-server-tools-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3463</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3463.html">CVE-2017-3463</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3463">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3463">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3463">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3463">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3463">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3463">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3463">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3463">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3463">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3463">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3463">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3463">SUSE bug 1034850</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155228" comment="libmysql56client18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155229" comment="libmysql56client18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155230" comment="libmysql56client_r18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155231" comment="libmysql56client_r18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155232" comment="mysql-community-server-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155233" comment="mysql-community-server-bench-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155234" comment="mysql-community-server-client-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155235" comment="mysql-community-server-errormessages-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155236" comment="mysql-community-server-test-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155237" comment="mysql-community-server-tools-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3464</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3464.html">CVE-2017-3464</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3464">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3464">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3464">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3464">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3464">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3464">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3464">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3464">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3464">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3464">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3464">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3464">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3464">SUSE bug 1034850</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155228" comment="libmysql56client18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155229" comment="libmysql56client18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155230" comment="libmysql56client_r18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155231" comment="libmysql56client_r18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155232" comment="mysql-community-server-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155233" comment="mysql-community-server-bench-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155234" comment="mysql-community-server-client-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155235" comment="mysql-community-server-errormessages-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155236" comment="mysql-community-server-test-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155237" comment="mysql-community-server-tools-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3513</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3513" source="CVE"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 2.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3513.html">CVE-2017-3513</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3513">SUSE bug 1034854</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154976" comment="python-virtualbox-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153266" comment="python-virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154977" comment="virtualbox-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154978" comment="virtualbox-devel-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154979" comment="virtualbox-guest-desktop-icons-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154980" comment="virtualbox-guest-kmp-default-5.0.40_k4.1.39_53-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154981" comment="virtualbox-guest-tools-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154982" comment="virtualbox-guest-x11-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154983" comment="virtualbox-host-kmp-default-5.0.40_k4.1.39_53-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154984" comment="virtualbox-host-source-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154985" comment="virtualbox-qt-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154986" comment="virtualbox-websrv-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3538</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3538" source="CVE"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Shared Folder). Supported versions that are affected are Prior to 5.0.34 and Prior to 5.1.16. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3538.html">CVE-2017-3538</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3538">SUSE bug 1034854</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154976" comment="python-virtualbox-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153266" comment="python-virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154977" comment="virtualbox-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154978" comment="virtualbox-devel-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154979" comment="virtualbox-guest-desktop-icons-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154980" comment="virtualbox-guest-kmp-default-5.0.40_k4.1.39_53-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154981" comment="virtualbox-guest-tools-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154982" comment="virtualbox-guest-x11-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154983" comment="virtualbox-host-kmp-default-5.0.40_k4.1.39_53-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154984" comment="virtualbox-host-source-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154985" comment="virtualbox-qt-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154986" comment="virtualbox-websrv-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3558</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3558" source="CVE"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Easily "exploitable" vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 8.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3558.html">CVE-2017-3558</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3558">SUSE bug 1034854</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154976" comment="python-virtualbox-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153266" comment="python-virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154977" comment="virtualbox-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154978" comment="virtualbox-devel-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154979" comment="virtualbox-guest-desktop-icons-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154980" comment="virtualbox-guest-kmp-default-5.0.40_k4.1.39_53-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154981" comment="virtualbox-guest-tools-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154982" comment="virtualbox-guest-x11-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154983" comment="virtualbox-host-kmp-default-5.0.40_k4.1.39_53-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154984" comment="virtualbox-host-source-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154985" comment="virtualbox-qt-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154986" comment="virtualbox-websrv-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3559</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3559" source="CVE"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3559.html">CVE-2017-3559</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3559">SUSE bug 1034854</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154976" comment="python-virtualbox-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153266" comment="python-virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154977" comment="virtualbox-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154978" comment="virtualbox-devel-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154979" comment="virtualbox-guest-desktop-icons-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154980" comment="virtualbox-guest-kmp-default-5.0.40_k4.1.39_53-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154981" comment="virtualbox-guest-tools-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154982" comment="virtualbox-guest-x11-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154983" comment="virtualbox-host-kmp-default-5.0.40_k4.1.39_53-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154984" comment="virtualbox-host-source-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154985" comment="virtualbox-qt-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154986" comment="virtualbox-websrv-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3561</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3561" source="CVE"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3561.html">CVE-2017-3561</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3561">SUSE bug 1034854</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154976" comment="python-virtualbox-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153266" comment="python-virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154977" comment="virtualbox-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154978" comment="virtualbox-devel-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154979" comment="virtualbox-guest-desktop-icons-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154980" comment="virtualbox-guest-kmp-default-5.0.40_k4.1.39_53-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154981" comment="virtualbox-guest-tools-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154982" comment="virtualbox-guest-x11-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154983" comment="virtualbox-host-kmp-default-5.0.40_k4.1.39_53-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154984" comment="virtualbox-host-source-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154985" comment="virtualbox-qt-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154986" comment="virtualbox-websrv-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3563</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3563" source="CVE"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3563.html">CVE-2017-3563</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3563">SUSE bug 1034854</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154976" comment="python-virtualbox-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153266" comment="python-virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154977" comment="virtualbox-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154978" comment="virtualbox-devel-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154979" comment="virtualbox-guest-desktop-icons-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154980" comment="virtualbox-guest-kmp-default-5.0.40_k4.1.39_53-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154981" comment="virtualbox-guest-tools-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154982" comment="virtualbox-guest-x11-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154983" comment="virtualbox-host-kmp-default-5.0.40_k4.1.39_53-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154984" comment="virtualbox-host-source-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154985" comment="virtualbox-qt-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154986" comment="virtualbox-websrv-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3575</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3575" source="CVE"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Easily "exploitable" vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.9 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3575.html">CVE-2017-3575</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3575">SUSE bug 1034854</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154976" comment="python-virtualbox-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153266" comment="python-virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154977" comment="virtualbox-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154978" comment="virtualbox-devel-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154979" comment="virtualbox-guest-desktop-icons-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154980" comment="virtualbox-guest-kmp-default-5.0.40_k4.1.39_53-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154981" comment="virtualbox-guest-tools-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154982" comment="virtualbox-guest-x11-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154983" comment="virtualbox-host-kmp-default-5.0.40_k4.1.39_53-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154984" comment="virtualbox-host-source-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154985" comment="virtualbox-qt-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154986" comment="virtualbox-websrv-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3576</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3576" source="CVE"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3576.html">CVE-2017-3576</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3576">SUSE bug 1034854</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154976" comment="python-virtualbox-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153266" comment="python-virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154977" comment="virtualbox-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154978" comment="virtualbox-devel-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154979" comment="virtualbox-guest-desktop-icons-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154980" comment="virtualbox-guest-kmp-default-5.0.40_k4.1.39_53-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154981" comment="virtualbox-guest-tools-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154982" comment="virtualbox-guest-x11-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154983" comment="virtualbox-host-kmp-default-5.0.40_k4.1.39_53-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154984" comment="virtualbox-host-source-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154985" comment="virtualbox-qt-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154986" comment="virtualbox-websrv-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3587</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3587" source="CVE"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Shared Folder). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.4 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3587.html">CVE-2017-3587</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3587">SUSE bug 1034854</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154976" comment="python-virtualbox-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153266" comment="python-virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154977" comment="virtualbox-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154978" comment="virtualbox-devel-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154979" comment="virtualbox-guest-desktop-icons-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154980" comment="virtualbox-guest-kmp-default-5.0.40_k4.1.39_53-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154981" comment="virtualbox-guest-tools-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154982" comment="virtualbox-guest-x11-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154983" comment="virtualbox-host-kmp-default-5.0.40_k4.1.39_53-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154984" comment="virtualbox-host-source-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154985" comment="virtualbox-qt-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154986" comment="virtualbox-websrv-5.0.40-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3599</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3599" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth). Supported versions that are affected are 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). NOTE: the previous information is from the April 2017 CPU. Oracle has not commented on third-party claims that this issue is an integer overflow in sql/auth/sql_authentication.cc which allows remote attackers to cause a denial of service via a crafted authentication packet.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3599.html">CVE-2017-3599</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3599">SUSE bug 1034850</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155228" comment="libmysql56client18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155229" comment="libmysql56client18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155230" comment="libmysql56client_r18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155231" comment="libmysql56client_r18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155232" comment="mysql-community-server-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155233" comment="mysql-community-server-bench-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155234" comment="mysql-community-server-client-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155235" comment="mysql-community-server-errormessages-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155236" comment="mysql-community-server-test-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155237" comment="mysql-community-server-tools-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3600</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600" source="CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. Note: CVE-2017-3600 is equivalent to CVE-2016-5483. CVSS 3.0 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3600.html">CVE-2017-3600</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3600">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3600">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3600">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3600">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3600">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3600">SUSE bug 1029014</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3600">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3600">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3600">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3600">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3600">SUSE bug 1034850</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3600">SUSE bug 1048715</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3600">SUSE bug 1034850</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155228" comment="libmysql56client18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152609" comment="libmysql56client18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155229" comment="libmysql56client18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152610" comment="libmysql56client18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155230" comment="libmysql56client_r18-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152611" comment="libmysql56client_r18 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155231" comment="libmysql56client_r18-32bit-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152612" comment="libmysql56client_r18-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155232" comment="mysql-community-server-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152613" comment="mysql-community-server is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155233" comment="mysql-community-server-bench-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152614" comment="mysql-community-server-bench is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155234" comment="mysql-community-server-client-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152615" comment="mysql-community-server-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155235" comment="mysql-community-server-errormessages-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152616" comment="mysql-community-server-errormessages is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155236" comment="mysql-community-server-test-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152617" comment="mysql-community-server-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155237" comment="mysql-community-server-tools-5.6.36-25.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152618" comment="mysql-community-server-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3731</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731" source="CVE"/>
    <description>
    If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3731.html">CVE-2017-3731</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1025347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1025347</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1021641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1064118</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1064119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1064118</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1064119</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1022085</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1064118</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3731">SUSE bug 1064119</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148476" comment="libopenssl-devel-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151064" comment="libopenssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148477" comment="libopenssl-devel-32bit-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152703" comment="libopenssl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148478" comment="libopenssl1_0_0-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148479" comment="libopenssl1_0_0-32bit-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148480" comment="libopenssl1_0_0-hmac-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148481" comment="libopenssl1_0_0-hmac-32bit-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148694" comment="nodejs-4.7.3-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148695" comment="nodejs-devel-4.7.3-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148696" comment="nodejs-docs-4.7.3-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148697" comment="npm-4.7.3-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148482" comment="openssl-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151067" comment="openssl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148483" comment="openssl-doc-1.0.1i-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152718" comment="openssl-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3732</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-3732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3732" source="CVE"/>
    <description>
    There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-3732.html">CVE-2017-3732</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1025354</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1021641</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1049418</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1049421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1049422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1049421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1049421</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1049422</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1066242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1066242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 957814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1066242</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1071906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1071906</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-3732">SUSE bug 1022086</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148694" comment="nodejs-4.7.3-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153040" comment="nodejs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148695" comment="nodejs-devel-4.7.3-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153041" comment="nodejs-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148696" comment="nodejs-docs-4.7.3-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153043" comment="nodejs-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148697" comment="npm-4.7.3-39.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153044" comment="npm is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5006</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5006" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5006" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, incorrectly handled object owner relationships, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5006.html">CVE-2017-5006</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5006">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5007</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5007" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, incorrectly handled the sequence of events when closing a page, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5007.html">CVE-2017-5007</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5007">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5008</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5008" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5008" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed attacker controlled JavaScript to be run during the invocation of a private script method, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5008.html">CVE-2017-5008</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5008">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5009</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5009" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5009" source="CVE"/>
    <description>
    WebRTC in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5009.html">CVE-2017-5009</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5009">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5010</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5010" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, resolved promises in an inappropriate context, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5010.html">CVE-2017-5010</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5010">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5011</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5011" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5011" source="CVE"/>
    <description>
    Google Chrome prior to 56.0.2924.76 for Windows insufficiently sanitized DevTools URLs, which allowed a remote attacker who convinced a user to install a malicious extension to read filesystem contents via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5011.html">CVE-2017-5011</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5011">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5012</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5012" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5012" source="CVE"/>
    <description>
    A heap buffer overflow in V8 in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5012.html">CVE-2017-5012</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5012">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5013</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5013" source="CVE"/>
    <description>
    Google Chrome prior to 56.0.2924.76 for Linux incorrectly handled new tab page navigations in non-selected tabs, which allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5013.html">CVE-2017-5013</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5013">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5014</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5014" source="CVE"/>
    <description>
    Heap buffer overflow during image processing in Skia in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5014.html">CVE-2017-5014</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5014">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5015</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5015" source="CVE"/>
    <description>
    Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, incorrectly handled Unicode glyphs, which allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5015.html">CVE-2017-5015</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5015">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5016</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5016" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to prevent certain UI elements from being displayed by non-visible pages, which allowed a remote attacker to show certain UI elements on a page they don't control via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5016.html">CVE-2017-5016</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5016">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5017</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5017" source="CVE"/>
    <description>
    Interactions with the OS in Google Chrome prior to 56.0.2924.76 for Mac insufficiently cleared video memory, which allowed a remote attacker to possibly extract image fragments on systems with GeForce 8600M graphics chips via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5017.html">CVE-2017-5017</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5017">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5018</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5018" source="CVE"/>
    <description>
    Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, had an insufficiently strict content security policy on the Chrome app launcher page, which allowed a remote attacker to inject scripts or HTML into a privileged page via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5018.html">CVE-2017-5018</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5018">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5019</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5019" source="CVE"/>
    <description>
    A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5019.html">CVE-2017-5019</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5019">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5020</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5020" source="CVE"/>
    <description>
    Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to require a user gesture for powerful download operations, which allowed a remote attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5020.html">CVE-2017-5020</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5020">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5021</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5021" source="CVE"/>
    <description>
    A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5021.html">CVE-2017-5021</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5021">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5022</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5022" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to properly enforce unsafe-inline content security policy, which allowed a remote attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5022.html">CVE-2017-5022</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5022">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5023</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5023" source="CVE"/>
    <description>
    Type confusion in Histogram in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit a near null dereference via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5023.html">CVE-2017-5023</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5023">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5024</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5024" source="CVE"/>
    <description>
    FFmpeg in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted video file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5024.html">CVE-2017-5024</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5024">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5025</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5025" source="CVE"/>
    <description>
    FFmpeg in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted video file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5025.html">CVE-2017-5025</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5025">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5026</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5026" source="CVE"/>
    <description>
    Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, failed to prevent alerts from being displayed by swapped out frames, which allowed a remote attacker to show alerts on a page they don't control via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5026.html">CVE-2017-5026</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5026">SUSE bug 1022049</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148572" comment="chromedriver-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148573" comment="chromium-56.0.2924.87-102.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148574" comment="ffmpeg3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153987" comment="ffmpeg3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148578" comment="libavcodec-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153140" comment="libavcodec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148579" comment="libavcodec57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153988" comment="libavcodec57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148580" comment="libavcodec57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153989" comment="libavcodec57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148581" comment="libavdevice-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153143" comment="libavdevice-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148582" comment="libavdevice57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153990" comment="libavdevice57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148583" comment="libavdevice57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153991" comment="libavdevice57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148584" comment="libavfilter-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153146" comment="libavfilter-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148585" comment="libavfilter6-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153992" comment="libavfilter6 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148586" comment="libavfilter6-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153993" comment="libavfilter6-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148587" comment="libavformat-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153149" comment="libavformat-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148588" comment="libavformat57-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153994" comment="libavformat57 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148589" comment="libavformat57-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153995" comment="libavformat57-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148590" comment="libavresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153152" comment="libavresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148591" comment="libavresample3-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153996" comment="libavresample3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148592" comment="libavresample3-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153997" comment="libavresample3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148593" comment="libavutil-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153155" comment="libavutil-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148594" comment="libavutil55-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153998" comment="libavutil55 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148595" comment="libavutil55-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153999" comment="libavutil55-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148600" comment="libpostproc-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153158" comment="libpostproc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148601" comment="libpostproc54-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154000" comment="libpostproc54 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148602" comment="libpostproc54-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154001" comment="libpostproc54-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148603" comment="libswresample-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153161" comment="libswresample-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148604" comment="libswresample2-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154002" comment="libswresample2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148605" comment="libswresample2-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154003" comment="libswresample2-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148606" comment="libswscale-devel-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153164" comment="libswscale-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148607" comment="libswscale4-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154004" comment="libswscale4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148608" comment="libswscale4-32bit-3.2.2-2.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154005" comment="libswscale4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5029</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5029" source="CVE"/>
    <description>
    The xsltAddTextString function in transform.c in libxslt 1.1.29, as used in Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android, lacked a check for integer overflow during a size calculation, which allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5029.html">CVE-2017-5029</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5029">SUSE bug 1028848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5029">SUSE bug 1028875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5029">SUSE bug 1035905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5029">SUSE bug 1035905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5029">SUSE bug 1035905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5029">SUSE bug 1035905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5029">SUSE bug 1035905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5029">SUSE bug 1035905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5029">SUSE bug 1035905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5029">SUSE bug 1035905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5029">SUSE bug 1035905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5029">SUSE bug 1035905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5029">SUSE bug 1035905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5029">SUSE bug 1035905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5029">SUSE bug 1035905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5029">SUSE bug 1035905</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5029">SUSE bug 1035905</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149684" comment="chromedriver-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149685" comment="chromium-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5030</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5030" source="CVE"/>
    <description>
    Incorrect handling of complex species in V8 in Google Chrome prior to 57.0.2987.98 for Linux, Windows, and Mac and 57.0.2987.108 for Android allowed a remote attacker to execute arbitrary code via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5030.html">CVE-2017-5030</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5030">SUSE bug 1028848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5030">SUSE bug 1028875</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149684" comment="chromedriver-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149685" comment="chromium-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5031</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5031" source="CVE"/>
    <description>
    A use after free in ANGLE in Google Chrome prior to 57.0.2987.98 for Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5031.html">CVE-2017-5031</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5031">SUSE bug 1028848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5031">SUSE bug 1028875</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149684" comment="chromedriver-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149685" comment="chromium-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5032</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5032" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5032" source="CVE"/>
    <description>
    PDFium in Google Chrome prior to 57.0.2987.98 for Windows could be made to increment off the end of a buffer, which allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5032.html">CVE-2017-5032</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5032">SUSE bug 1028848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5032">SUSE bug 1028875</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149684" comment="chromedriver-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149685" comment="chromium-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5033</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5033" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5033" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android failed to correctly propagate CSP restrictions to local scheme pages, which allowed a remote attacker to bypass content security policy via a crafted HTML page, related to the unsafe-inline keyword.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5033.html">CVE-2017-5033</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5033">SUSE bug 1028848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5033">SUSE bug 1028875</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149684" comment="chromedriver-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149685" comment="chromium-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5034</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5034" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5034" source="CVE"/>
    <description>
    A use after free in PDFium in Google Chrome prior to 57.0.2987.98 for Linux and Windows allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5034.html">CVE-2017-5034</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5034">SUSE bug 1028848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5034">SUSE bug 1028875</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149684" comment="chromedriver-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149685" comment="chromium-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5035</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5035" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5035" source="CVE"/>
    <description>
    Google Chrome prior to 57.0.2987.98 for Windows and Mac had a race condition, which could cause Chrome to display incorrect certificate information for a site.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5035.html">CVE-2017-5035</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5035">SUSE bug 1028848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5035">SUSE bug 1028875</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149684" comment="chromedriver-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149685" comment="chromium-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5036</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5036" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5036" source="CVE"/>
    <description>
    A use after free in PDFium in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to have an unspecified impact via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5036.html">CVE-2017-5036</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5036">SUSE bug 1028848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5036">SUSE bug 1028875</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149684" comment="chromedriver-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149685" comment="chromium-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5037</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5037" source="CVE"/>
    <description>
    An integer overflow in FFmpeg in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to perform an out of bounds memory write via a crafted video file, related to ChunkDemuxer.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5037.html">CVE-2017-5037</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5037">SUSE bug 1028848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5037">SUSE bug 1028875</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149684" comment="chromedriver-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149685" comment="chromium-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5038</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5038" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5038" source="CVE"/>
    <description>
    Chrome Apps in Google Chrome prior to 57.0.2987.98 for Linux, Windows, and Mac had a use after free bug in GuestView, which allowed a remote attacker to perform an out of bounds memory read via a crafted Chrome extension.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5038.html">CVE-2017-5038</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5038">SUSE bug 1028848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5038">SUSE bug 1028875</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149684" comment="chromedriver-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149685" comment="chromium-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5039</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5039" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5039" source="CVE"/>
    <description>
    A use after free in PDFium in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5039.html">CVE-2017-5039</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5039">SUSE bug 1028848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5039">SUSE bug 1028875</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149684" comment="chromedriver-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149685" comment="chromium-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5040</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5040" source="CVE"/>
    <description>
    V8 in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android was missing a neutering check, which allowed a remote attacker to read values in memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5040.html">CVE-2017-5040</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5040">SUSE bug 1028848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5040">SUSE bug 1028875</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149684" comment="chromedriver-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149685" comment="chromium-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5041</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5041" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5041" source="CVE"/>
    <description>
    Google Chrome prior to 57.0.2987.100 incorrectly handled back-forward navigation, which allowed a remote attacker to display incorrect information for a site via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5041.html">CVE-2017-5041</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5041">SUSE bug 1028848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5041">SUSE bug 1028875</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149684" comment="chromedriver-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149685" comment="chromium-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5042</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5042" source="CVE"/>
    <description>
    Cast in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android sent cookies to sites discovered via SSDP, which allowed an attacker on the local network segment to initiate connections to arbitrary URLs and observe any plaintext cookies sent.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5042.html">CVE-2017-5042</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5042">SUSE bug 1028848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5042">SUSE bug 1028875</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149684" comment="chromedriver-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149685" comment="chromium-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5043</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5043" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5043" source="CVE"/>
    <description>
    Chrome Apps in Google Chrome prior to 57.0.2987.98 for Linux, Windows, and Mac had a use after free bug in GuestView, which allowed a remote attacker to perform an out of bounds memory read via a crafted Chrome extension.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5043.html">CVE-2017-5043</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5043">SUSE bug 1028848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5043">SUSE bug 1028875</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149684" comment="chromedriver-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149685" comment="chromium-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5044</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5044" source="CVE"/>
    <description>
    Heap buffer overflow in filter processing in Skia in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5044.html">CVE-2017-5044</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5044">SUSE bug 1028848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5044">SUSE bug 1028875</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149684" comment="chromedriver-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149685" comment="chromium-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5045</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5045" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5045" source="CVE"/>
    <description>
    XSS Auditor in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed detection of a blocked iframe load, which allowed a remote attacker to brute force JavaScript variables via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5045.html">CVE-2017-5045</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5045">SUSE bug 1028848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5045">SUSE bug 1028875</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149684" comment="chromedriver-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149685" comment="chromium-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5046</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5046" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5046" source="CVE"/>
    <description>
    V8 in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android had insufficient policy enforcement, which allowed a remote attacker to spoof the location object via a crafted HTML page, related to Blink information disclosure.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5046.html">CVE-2017-5046</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5046">SUSE bug 1028848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5046">SUSE bug 1028875</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149684" comment="chromedriver-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149685" comment="chromium-57.0.2987.98-105.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5052</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5052" source="CVE"/>
    <description>
    An incorrect assumption about block structure in Blink in Google Chrome prior to 57.0.2987.133 for Mac, Windows, and Linux, and 57.0.2987.132 for Android, allowed a remote attacker to potentially exploit memory corruption via a crafted HTML page that triggers improper casting.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5052.html">CVE-2017-5052</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5052">SUSE bug 1031677</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150468" comment="chromedriver-57.0.2987.133-108.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150469" comment="chromium-57.0.2987.133-108.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5053</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5053" source="CVE"/>
    <description>
    An out-of-bounds read in V8 in Google Chrome prior to 57.0.2987.133 for Linux, Windows, and Mac, and 57.0.2987.132 for Android, allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page, related to Array.prototype.indexOf.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5053.html">CVE-2017-5053</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5053">SUSE bug 1031677</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150468" comment="chromedriver-57.0.2987.133-108.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150469" comment="chromium-57.0.2987.133-108.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5054</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5054" source="CVE"/>
    <description>
    An out-of-bounds read in V8 in Google Chrome prior to 57.0.2987.133 for Linux, Windows, and Mac, and 57.0.2987.132 for Android, allowed a remote attacker to obtain heap memory contents via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5054.html">CVE-2017-5054</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5054">SUSE bug 1031677</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150468" comment="chromedriver-57.0.2987.133-108.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150469" comment="chromium-57.0.2987.133-108.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5055</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5055" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5055" source="CVE"/>
    <description>
    A use after free in printing in Google Chrome prior to 57.0.2987.133 for Linux and Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5055.html">CVE-2017-5055</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5055">SUSE bug 1031677</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150468" comment="chromedriver-57.0.2987.133-108.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150469" comment="chromium-57.0.2987.133-108.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5056</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5056" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5056" source="CVE"/>
    <description>
    A use after free in Blink in Google Chrome prior to 57.0.2987.133 for Linux, Windows, and Mac, and 57.0.2987.132 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5056.html">CVE-2017-5056</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5056">SUSE bug 1031677</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150468" comment="chromedriver-57.0.2987.133-108.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150469" comment="chromium-57.0.2987.133-108.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5057</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5057" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5057" source="CVE"/>
    <description>
    Type confusion in PDFium in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5057.html">CVE-2017-5057</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5057">SUSE bug 1035103</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154720" comment="chromedriver-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154721" comment="chromium-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5058</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5058" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5058" source="CVE"/>
    <description>
    A use after free in PrintPreview in Google Chrome prior to 58.0.3029.81 for Windows allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5058.html">CVE-2017-5058</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5058">SUSE bug 1035103</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154720" comment="chromedriver-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154721" comment="chromium-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5059</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5059" source="CVE"/>
    <description>
    Type confusion in Blink in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac, and 58.0.3029.83 for Android, allowed a remote attacker to potentially obtain code execution via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5059.html">CVE-2017-5059</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5059">SUSE bug 1035103</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154720" comment="chromedriver-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154721" comment="chromium-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5060</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5060" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5060" source="CVE"/>
    <description>
    Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5060.html">CVE-2017-5060</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5060">SUSE bug 1035103</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154720" comment="chromedriver-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154721" comment="chromium-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5061</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5061" source="CVE"/>
    <description>
    A race condition in navigation in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5061.html">CVE-2017-5061</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5061">SUSE bug 1035103</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154720" comment="chromedriver-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154721" comment="chromium-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5062</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5062" source="CVE"/>
    <description>
    A use after free in Chrome Apps in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to potentially perform out of bounds memory access via a crafted Chrome extension.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5062.html">CVE-2017-5062</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5062">SUSE bug 1035103</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154720" comment="chromedriver-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154721" comment="chromium-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5063</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5063" source="CVE"/>
    <description>
    A numeric overflow in Skia in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac, and 58.0.3029.83 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5063.html">CVE-2017-5063</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5063">SUSE bug 1035103</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154720" comment="chromedriver-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154721" comment="chromium-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5064</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5064" source="CVE"/>
    <description>
    Incorrect handling of DOM changes in Blink in Google Chrome prior to 58.0.3029.81 for Windows allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5064.html">CVE-2017-5064</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5064">SUSE bug 1035103</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154720" comment="chromedriver-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154721" comment="chromium-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5065</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5065" source="CVE"/>
    <description>
    Lack of an appropriate action on page navigation in Blink in Google Chrome prior to 58.0.3029.81 for Windows and Mac allowed a remote attacker to potentially confuse a user into making an incorrect security decision via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5065.html">CVE-2017-5065</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5065">SUSE bug 1035103</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154720" comment="chromedriver-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154721" comment="chromium-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5066</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5066" source="CVE"/>
    <description>
    Insufficient consistency checks in signature handling in the networking stack in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to incorrectly accept a badly formed X.509 certificate via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5066.html">CVE-2017-5066</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5066">SUSE bug 1035103</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154720" comment="chromedriver-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154721" comment="chromium-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5067</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5067" source="CVE"/>
    <description>
    An insufficient watchdog timer in navigation in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5067.html">CVE-2017-5067</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5067">SUSE bug 1035103</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154720" comment="chromedriver-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154721" comment="chromium-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5068</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5068" source="CVE"/>
    <description>
    Incorrect handling of picture ID in WebRTC in Google Chrome prior to 58.0.3029.96 for Mac, Windows, and Linux allowed a remote attacker to trigger a race condition via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5068.html">CVE-2017-5068</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5068">SUSE bug 1037594</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5068">SUSE bug 1037594</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155083" comment="chromedriver-58.0.3029.96-114.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155084" comment="chromium-58.0.3029.96-114.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5069</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5069" source="CVE"/>
    <description>
    Incorrect MIME type of XSS-Protection reports in Blink in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac, and 58.0.3029.83 for Android, allowed a remote attacker to circumvent Cross-Origin Resource Sharing checks via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5069.html">CVE-2017-5069</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5069">SUSE bug 1035103</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154720" comment="chromedriver-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154721" comment="chromium-58.0.3029.81-111.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5193</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5193" source="CVE"/>
    <description>
    The nickcmp function in Irssi before 0.8.21 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a message without a nick.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5193.html">CVE-2017-5193</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5193">SUSE bug 1018357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5193">SUSE bug 1018357</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146853" comment="irssi-0.8.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151315" comment="irssi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146854" comment="irssi-devel-0.8.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153798" comment="irssi-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5194</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5194" source="CVE"/>
    <description>
    Use-after-free vulnerability in Irssi before 0.8.21 allows remote attackers to cause a denial of service (crash) via an invalid nick message.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5194.html">CVE-2017-5194</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5194">SUSE bug 1018357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5194">SUSE bug 1018357</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146853" comment="irssi-0.8.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151315" comment="irssi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146854" comment="irssi-devel-0.8.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153798" comment="irssi-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5195</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5195" source="CVE"/>
    <description>
    Irssi 0.8.17 before 0.8.21 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted ANSI x8 color code.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5195.html">CVE-2017-5195</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5195">SUSE bug 1018357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5195">SUSE bug 1018357</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146853" comment="irssi-0.8.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151315" comment="irssi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146854" comment="irssi-devel-0.8.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153798" comment="irssi-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5196</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5196" source="CVE"/>
    <description>
    Irssi 0.8.18 before 0.8.21 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via vectors involving strings that are not UTF8.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5196.html">CVE-2017-5196</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5196">SUSE bug 1018357</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5196">SUSE bug 1018357</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146853" comment="irssi-0.8.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151315" comment="irssi is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009146854" comment="irssi-devel-0.8.21-9.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153798" comment="irssi-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5202</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5202" source="CVE"/>
    <description>
    The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5202.html">CVE-2017-5202</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5202">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5202">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5202">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5202">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5202">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5202">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5202">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5203</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5203" source="CVE"/>
    <description>
    The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5203.html">CVE-2017-5203</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5203">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5203">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5203">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5203">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5203">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5203">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5203">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5204</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5204" source="CVE"/>
    <description>
    The IPv6 parser in tcpdump before 4.9.0 has a buffer overflow in print-ip6.c:ip6_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5204.html">CVE-2017-5204</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5204">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5204">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5204">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5204">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5204">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5204">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5204">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5205</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5205" source="CVE"/>
    <description>
    The ISAKMP parser in tcpdump before 4.9.0 has a buffer overflow in print-isakmp.c:ikev2_e_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5205.html">CVE-2017-5205</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5205">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5205">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5205">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5205">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5205">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5205">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5205">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5208</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5208" source="CVE"/>
    <description>
    Integer overflow in the wrestool program in icoutils before 0.31.1 allows remote attackers to cause a denial of service (memory corruption) via a crafted executable, which triggers a denial of service (application crash) or the possibility of execution of arbitrary code.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5208.html">CVE-2017-5208</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5208">SUSE bug 1018756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5208">SUSE bug 1018756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5208">SUSE bug 1018756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5208">SUSE bug 1019328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5208">SUSE bug 1018756</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147109" comment="icoutils-0.31.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154006" comment="icoutils is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5209</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5209" source="CVE"/>
    <description>
    The base64decode function in base64.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via split encoded Apple Property List data.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5209.html">CVE-2017-5209</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5209">SUSE bug 1019531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5209">SUSE bug 1019531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5209">SUSE bug 1019531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5209">SUSE bug 1019531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5209">SUSE bug 1021610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5209">SUSE bug 1019531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5209">SUSE bug 1019531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5209">SUSE bug 1019531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5209">SUSE bug 1019531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5209">SUSE bug 1019531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5209">SUSE bug 1019531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5209">SUSE bug 1019531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5209">SUSE bug 1019531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5209">SUSE bug 1019531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5209">SUSE bug 1019531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5209">SUSE bug 1019531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5209">SUSE bug 1019531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5209">SUSE bug 1019531</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148685" comment="libplist-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154007" comment="libplist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148686" comment="libplist++-devel-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154008" comment="libplist++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148687" comment="libplist++3-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154009" comment="libplist++3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148688" comment="libplist++3-32bit-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154010" comment="libplist++3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148689" comment="libplist-devel-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154011" comment="libplist-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148690" comment="libplist3-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154012" comment="libplist3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148691" comment="libplist3-32bit-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154013" comment="libplist3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148692" comment="plistutil-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154014" comment="plistutil is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148693" comment="python-plist-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154015" comment="python-plist is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5225</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225" source="CVE"/>
    <description>
    LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the tools/tiffcp resulting in DoS or code execution via a crafted BitsPerSample value.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5225.html">CVE-2017-5225</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5225">SUSE bug 1019611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5225">SUSE bug 1019611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5225">SUSE bug 1019611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5225">SUSE bug 1019611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5225">SUSE bug 1019611</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5225">SUSE bug 1019611</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148652" comment="libtiff-devel-4.0.7-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148653" comment="libtiff-devel-32bit-4.0.7-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148654" comment="libtiff5-4.0.7-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148655" comment="libtiff5-32bit-4.0.7-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148656" comment="tiff-4.0.7-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5330</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5330" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5330" source="CVE"/>
    <description>
    ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5330.html">CVE-2017-5330</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5330">SUSE bug 1018648</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5330">SUSE bug 1018648</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147197" comment="ark-15.12.3-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154016" comment="ark is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147111" comment="libkerfuffle15-15.12.3-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154017" comment="libkerfuffle15 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5331</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5331" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5331" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5331.html">CVE-2017-5331</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5331">SUSE bug 1018756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5331">SUSE bug 1019328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5331">SUSE bug 1018756</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147109" comment="icoutils-0.31.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154006" comment="icoutils is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5332</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5332" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5332" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5332.html">CVE-2017-5332</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5332">SUSE bug 1018756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5332">SUSE bug 1019328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5332">SUSE bug 1018756</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147109" comment="icoutils-0.31.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154006" comment="icoutils is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5333</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5333" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5333.html">CVE-2017-5333</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5333">SUSE bug 1018756</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5333">SUSE bug 1019328</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5333">SUSE bug 1018756</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009147109" comment="icoutils-0.31.1-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154006" comment="icoutils is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5335</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335" source="CVE"/>
    <description>
    The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5335.html">CVE-2017-5335</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5335">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5335">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5335">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5335">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5335">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5335">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5335">SUSE bug 1021057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5335">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5335">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5335">SUSE bug 1021057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5335">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5335">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5335">SUSE bug 1021057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5335">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5335">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5335">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5335">SUSE bug 1021057</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148108" comment="gnutls-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148109" comment="libgnutls-devel-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148110" comment="libgnutls-devel-32bit-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153803" comment="libgnutls-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148111" comment="libgnutls-openssl-devel-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153804" comment="libgnutls-openssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148112" comment="libgnutls-openssl27-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151158" comment="libgnutls-openssl27 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148113" comment="libgnutls28-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151159" comment="libgnutls28 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148114" comment="libgnutls28-32bit-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151160" comment="libgnutls28-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148115" comment="libgnutlsxx-devel-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153805" comment="libgnutlsxx-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148116" comment="libgnutlsxx28-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153806" comment="libgnutlsxx28 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5336</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5336" source="CVE"/>
    <description>
    Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5336.html">CVE-2017-5336</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5336">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5336">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5336">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5336">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5336">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5336">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5336">SUSE bug 1021057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5336">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5336">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5336">SUSE bug 1021057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5336">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5336">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5336">SUSE bug 1021057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5336">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5336">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5336">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5336">SUSE bug 1021057</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148108" comment="gnutls-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148109" comment="libgnutls-devel-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148110" comment="libgnutls-devel-32bit-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153803" comment="libgnutls-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148111" comment="libgnutls-openssl-devel-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153804" comment="libgnutls-openssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148112" comment="libgnutls-openssl27-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151158" comment="libgnutls-openssl27 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148113" comment="libgnutls28-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151159" comment="libgnutls28 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148114" comment="libgnutls28-32bit-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151160" comment="libgnutls28-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148115" comment="libgnutlsxx-devel-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153805" comment="libgnutlsxx-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148116" comment="libgnutlsxx28-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153806" comment="libgnutlsxx28 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5337</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5337" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5337.html">CVE-2017-5337</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5337">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5337">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5337">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5337">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5337">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5337">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5337">SUSE bug 1021057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5337">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5337">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5337">SUSE bug 1021057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5337">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5337">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5337">SUSE bug 1021057</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5337">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5337">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5337">SUSE bug 1018832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5337">SUSE bug 1021057</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148108" comment="gnutls-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148109" comment="libgnutls-devel-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148110" comment="libgnutls-devel-32bit-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153803" comment="libgnutls-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148111" comment="libgnutls-openssl-devel-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153804" comment="libgnutls-openssl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148112" comment="libgnutls-openssl27-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151158" comment="libgnutls-openssl27 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148113" comment="libgnutls28-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151159" comment="libgnutls28 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148114" comment="libgnutls28-32bit-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151160" comment="libgnutls28-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148115" comment="libgnutlsxx-devel-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153805" comment="libgnutlsxx-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148116" comment="libgnutlsxx28-3.2.15-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153806" comment="libgnutlsxx28 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5338</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5338" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5338.html">CVE-2017-5338</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5338">SUSE bug 1019037</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5338">SUSE bug 1019037</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5338">SUSE bug 1019037</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5338">SUSE bug 1019037</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5338">SUSE bug 1019037</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148177" comment="libgit2-0.22.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153557" comment="libgit2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148178" comment="libgit2-22-0.22.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153558" comment="libgit2-22 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148179" comment="libgit2-22-32bit-0.22.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153559" comment="libgit2-22-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148180" comment="libgit2-devel-0.22.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153560" comment="libgit2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5339</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5339" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5339.html">CVE-2017-5339</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5339">SUSE bug 1019037</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5339">SUSE bug 1019037</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5339">SUSE bug 1019037</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5339">SUSE bug 1019037</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5339">SUSE bug 1019037</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148177" comment="libgit2-0.22.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153557" comment="libgit2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148178" comment="libgit2-22-0.22.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153558" comment="libgit2-22 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148179" comment="libgit2-22-32bit-0.22.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153559" comment="libgit2-22-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148180" comment="libgit2-devel-0.22.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153560" comment="libgit2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5341</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5341" source="CVE"/>
    <description>
    The OTV parser in tcpdump before 4.9.0 has a buffer overflow in print-otv.c:otv_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5341.html">CVE-2017-5341</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5341">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5341">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5341">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5341">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5341">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5341">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5341">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5342</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5342" source="CVE"/>
    <description>
    In tcpdump before 4.9.0, a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5342.html">CVE-2017-5342</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5342">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5342">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5342">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5342">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5342">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5342">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5342">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5373</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5373" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5373.html">CVE-2017-5373</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5373">SUSE bug 1021824</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5373">SUSE bug 1021824</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5373">SUSE bug 1021824</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5373">SUSE bug 1021824</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5373">SUSE bug 1021824</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5373">SUSE bug 1021824</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5373">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148018" comment="MozillaThunderbird-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148019" comment="MozillaThunderbird-buildsymbols-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148020" comment="MozillaThunderbird-devel-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148021" comment="MozillaThunderbird-translations-common-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148022" comment="MozillaThunderbird-translations-other-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5374</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5374" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5374.html">CVE-2017-5374</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5374">SUSE bug 1021841</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5374">SUSE bug 1021841</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5374">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5375</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5375" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5375.html">CVE-2017-5375</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5375">SUSE bug 1021814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5375">SUSE bug 1021814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5375">SUSE bug 1021814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5375">SUSE bug 1021814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5375">SUSE bug 1021814</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5375">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148018" comment="MozillaThunderbird-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148019" comment="MozillaThunderbird-buildsymbols-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148020" comment="MozillaThunderbird-devel-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148021" comment="MozillaThunderbird-translations-common-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148022" comment="MozillaThunderbird-translations-other-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5376</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5376" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5376.html">CVE-2017-5376</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5376">SUSE bug 1021817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5376">SUSE bug 1021817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5376">SUSE bug 1021817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5376">SUSE bug 1021817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5376">SUSE bug 1021817</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5376">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148018" comment="MozillaThunderbird-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148019" comment="MozillaThunderbird-buildsymbols-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148020" comment="MozillaThunderbird-devel-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148021" comment="MozillaThunderbird-translations-common-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148022" comment="MozillaThunderbird-translations-other-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5377</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5377" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5377.html">CVE-2017-5377</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5377">SUSE bug 1021826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5377">SUSE bug 1021826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5377">SUSE bug 1021826</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5377">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5378</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5378" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5378.html">CVE-2017-5378</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5378">SUSE bug 1021818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5378">SUSE bug 1021818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5378">SUSE bug 1021818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5378">SUSE bug 1021818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5378">SUSE bug 1021818</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5378">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148018" comment="MozillaThunderbird-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148019" comment="MozillaThunderbird-buildsymbols-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148020" comment="MozillaThunderbird-devel-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148021" comment="MozillaThunderbird-translations-common-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148022" comment="MozillaThunderbird-translations-other-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5379</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5379" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5379.html">CVE-2017-5379</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5379">SUSE bug 1021827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5379">SUSE bug 1021827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5379">SUSE bug 1021827</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5379">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5380</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5380" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5380.html">CVE-2017-5380</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5380">SUSE bug 1021819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5380">SUSE bug 1021819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5380">SUSE bug 1021819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5380">SUSE bug 1021819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5380">SUSE bug 1021819</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5380">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148018" comment="MozillaThunderbird-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148019" comment="MozillaThunderbird-buildsymbols-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148020" comment="MozillaThunderbird-devel-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148021" comment="MozillaThunderbird-translations-common-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148022" comment="MozillaThunderbird-translations-other-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5381</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5381" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5381.html">CVE-2017-5381</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5381">SUSE bug 1021830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5381">SUSE bug 1021830</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5381">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5382</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5382" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5382.html">CVE-2017-5382</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5382">SUSE bug 1021831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5382">SUSE bug 1021831</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5382">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5383</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5383" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5383.html">CVE-2017-5383</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5383">SUSE bug 1021822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5383">SUSE bug 1021822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5383">SUSE bug 1021822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5383">SUSE bug 1021822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5383">SUSE bug 1021822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5383">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148018" comment="MozillaThunderbird-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148019" comment="MozillaThunderbird-buildsymbols-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148020" comment="MozillaThunderbird-devel-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148021" comment="MozillaThunderbird-translations-common-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148022" comment="MozillaThunderbird-translations-other-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5384</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5384" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5384.html">CVE-2017-5384</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5384">SUSE bug 1021832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5384">SUSE bug 1021832</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5384">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5385</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5385" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5385" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5385.html">CVE-2017-5385</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5385">SUSE bug 1021833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5385">SUSE bug 1021833</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5385">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5386</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5386" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5386.html">CVE-2017-5386</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5386">SUSE bug 1021823</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5386">SUSE bug 1021823</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5386">SUSE bug 1021991</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5386">SUSE bug 1021823</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5386">SUSE bug 1021823</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5386">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5387</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5387" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5387.html">CVE-2017-5387</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5387">SUSE bug 1021839</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5387">SUSE bug 1021839</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5387">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5388</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5388" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5388.html">CVE-2017-5388</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5388">SUSE bug 1021840</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5388">SUSE bug 1021840</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5388">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5389</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5389" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5389.html">CVE-2017-5389</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5389">SUSE bug 1021828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5389">SUSE bug 1021828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5389">SUSE bug 1021828</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5389">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5390</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5390" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5390" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5390.html">CVE-2017-5390</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5390">SUSE bug 1021820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5390">SUSE bug 1021820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5390">SUSE bug 1021820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5390">SUSE bug 1021820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5390">SUSE bug 1021820</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5390">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148018" comment="MozillaThunderbird-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148019" comment="MozillaThunderbird-buildsymbols-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148020" comment="MozillaThunderbird-devel-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148021" comment="MozillaThunderbird-translations-common-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148022" comment="MozillaThunderbird-translations-other-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5391</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5391" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5391.html">CVE-2017-5391</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5391">SUSE bug 1021835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5391">SUSE bug 1021835</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5391">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5392</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5392" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5392.html">CVE-2017-5392</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5392">SUSE bug 1021836</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5393</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5393" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5393.html">CVE-2017-5393</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5393">SUSE bug 1021837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5393">SUSE bug 1021837</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5393">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5394</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5394" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5394" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5394.html">CVE-2017-5394</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5394">SUSE bug 1021834</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5395</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5395" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5395" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5395.html">CVE-2017-5395</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5395">SUSE bug 1021838</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5396</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5396" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5396" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5396.html">CVE-2017-5396</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5396">SUSE bug 1021821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5396">SUSE bug 1021821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5396">SUSE bug 1021821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5396">SUSE bug 1021821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5396">SUSE bug 1021821</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5396">SUSE bug 1021991</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148012" comment="MozillaFirefox-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148013" comment="MozillaFirefox-branding-upstream-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148014" comment="MozillaFirefox-buildsymbols-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148015" comment="MozillaFirefox-devel-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148016" comment="MozillaFirefox-translations-common-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148017" comment="MozillaFirefox-translations-other-51.0.1-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148018" comment="MozillaThunderbird-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148019" comment="MozillaThunderbird-buildsymbols-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148020" comment="MozillaThunderbird-devel-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148021" comment="MozillaThunderbird-translations-common-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148022" comment="MozillaThunderbird-translations-other-45.7.0-34.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5398</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5398" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5398" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5398.html">CVE-2017-5398</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5398">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5398">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5398">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5398">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5398">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5398">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5398">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5399</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5399" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5399" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5399.html">CVE-2017-5399</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5399">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5399">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5399">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5399">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5399">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5400</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5400" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5400" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5400.html">CVE-2017-5400</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5400">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5400">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5400">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5400">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5400">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5400">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5400">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5401</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5401" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5401.html">CVE-2017-5401</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5401">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5401">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5401">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5401">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5401">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5401">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5401">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5402</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5402" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5402.html">CVE-2017-5402</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5402">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5402">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5402">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5402">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5402">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5402">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5402">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5403</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5403" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5403.html">CVE-2017-5403</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5403">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5403">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5403">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5403">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5403">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5404</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5404" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5404" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5404.html">CVE-2017-5404</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5404">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5404">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5404">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5404">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5404">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5404">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5404">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5405</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5405" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5405.html">CVE-2017-5405</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5405">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5405">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5405">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5405">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5405">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5405">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5405">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5406</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5406" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5406" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5406.html">CVE-2017-5406</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5406">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5406">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5406">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5406">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5406">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5407</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5407" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5407.html">CVE-2017-5407</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5407">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5407">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5407">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5407">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5407">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5407">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5407">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5408</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5408" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5408.html">CVE-2017-5408</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5408">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5408">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5408">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5408">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5408">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5408">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5408">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5410</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5410" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5410.html">CVE-2017-5410</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5410">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5410">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5410">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5410">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5410">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5410">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5410">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5412</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5412" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5412.html">CVE-2017-5412</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5412">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5412">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5412">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5412">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5412">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5413</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5413" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5413" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5413.html">CVE-2017-5413</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5413">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5413">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5413">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5414</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5414" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5414.html">CVE-2017-5414</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5414">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5414">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5414">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5414">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5414">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5415</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5415" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5415.html">CVE-2017-5415</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5415">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5415">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5415">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5415">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5415">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5416</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5416" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5416.html">CVE-2017-5416</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5416">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5416">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5416">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5416">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5416">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5417</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5417" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5417.html">CVE-2017-5417</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5417">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5417">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5417">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5418</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5418" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5418.html">CVE-2017-5418</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5418">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5418">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5418">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5418">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5418">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5419</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5419" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5419.html">CVE-2017-5419</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5419">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5419">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5419">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5419">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5419">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5420</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5420" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5420.html">CVE-2017-5420</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5420">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5420">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5420">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5420">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5420">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5421</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5421" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5421.html">CVE-2017-5421</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5421">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5421">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5421">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5421">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5421">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5422</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5422" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5422.html">CVE-2017-5422</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5422">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5422">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5422">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5422">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5422">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5426</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5426" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5426.html">CVE-2017-5426</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5426">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5426">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5426">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5426">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5426">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5426">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5426">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5427</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5427" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5427.html">CVE-2017-5427</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5427">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5427">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5427">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5427">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5427">SUSE bug 1028393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5427">SUSE bug 1028391</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5427">SUSE bug 1028393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149532" comment="MozillaFirefox-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149533" comment="MozillaFirefox-branding-upstream-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149534" comment="MozillaFirefox-buildsymbols-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149535" comment="MozillaFirefox-devel-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149536" comment="MozillaFirefox-translations-common-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149537" comment="MozillaFirefox-translations-other-52.0-55.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149591" comment="java-1_8_0-openjdk-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149592" comment="java-1_8_0-openjdk-accessibility-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149593" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149594" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149595" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149596" comment="java-1_8_0-openjdk-javadoc-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149597" comment="java-1_8_0-openjdk-src-1.8.0.121-23.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149545" comment="libfreebl3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149546" comment="libfreebl3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149547" comment="libsoftokn3-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149548" comment="libsoftokn3-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149549" comment="mozilla-nss-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149550" comment="mozilla-nss-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149551" comment="mozilla-nss-certs-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149552" comment="mozilla-nss-certs-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149553" comment="mozilla-nss-devel-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149554" comment="mozilla-nss-sysinit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149555" comment="mozilla-nss-sysinit-32bit-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149556" comment="mozilla-nss-tools-3.28.3-38.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5428</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5428" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5428.html">CVE-2017-5428</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5428">SUSE bug 1029822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5428">SUSE bug 1029822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5428">SUSE bug 1029822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5428">SUSE bug 1029822</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149806" comment="MozillaFirefox-52.0.1-58.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149807" comment="MozillaFirefox-branding-upstream-52.0.1-58.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149808" comment="MozillaFirefox-buildsymbols-52.0.1-58.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149809" comment="MozillaFirefox-devel-52.0.1-58.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149810" comment="MozillaFirefox-translations-common-52.0.1-58.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149811" comment="MozillaFirefox-translations-other-52.0.1-58.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5429</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5429.html">CVE-2017-5429</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5429">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154722" comment="MozillaFirefox-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154723" comment="MozillaFirefox-branding-upstream-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154724" comment="MozillaFirefox-buildsymbols-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154725" comment="MozillaFirefox-devel-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154726" comment="MozillaFirefox-translations-common-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154727" comment="MozillaFirefox-translations-other-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5430</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5430" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5430.html">CVE-2017-5430</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5430">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5432</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5432.html">CVE-2017-5432</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5432">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5433</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5433.html">CVE-2017-5433</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5433">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5434</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5434.html">CVE-2017-5434</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5434">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5435</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5435.html">CVE-2017-5435</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5435">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5436</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5436.html">CVE-2017-5436</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5436">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5436">SUSE bug 1035204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5436">SUSE bug 1035204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5436">SUSE bug 1035204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5436">SUSE bug 1035204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5436">SUSE bug 1035204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5436">SUSE bug 1035204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5436">SUSE bug 1035204</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5436">SUSE bug 1035204</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124728" comment="graphite2-1.3.1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153576" comment="graphite2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124736" comment="graphite2-devel-1.3.1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153577" comment="graphite2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124729" comment="libgraphite2-3-1.3.1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153578" comment="libgraphite2-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009124730" comment="libgraphite2-3-32bit-1.3.1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153579" comment="libgraphite2-3-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5437</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5437" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-10195, CVE-2016-10196, CVE-2016-10197.  Reason: This candidate is a duplicate of CVE-2016-10195, CVE-2016-10196, and CVE-2016-10197.  Notes: All CVE users should reference CVE-2016-10195, CVE-2016-10196, and/or CVE-2016-10197 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5437.html">CVE-2017-5437</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5437">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5438</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5438.html">CVE-2017-5438</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5438">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5439</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5439.html">CVE-2017-5439</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5439">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5440</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5440.html">CVE-2017-5440</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5440">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5441</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5441.html">CVE-2017-5441</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5441">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5442</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5442.html">CVE-2017-5442</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5442">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5443</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5443.html">CVE-2017-5443</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5443">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154722" comment="MozillaFirefox-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154723" comment="MozillaFirefox-branding-upstream-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154724" comment="MozillaFirefox-buildsymbols-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154725" comment="MozillaFirefox-devel-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154726" comment="MozillaFirefox-translations-common-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154727" comment="MozillaFirefox-translations-other-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5444</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5444.html">CVE-2017-5444</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5444">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154722" comment="MozillaFirefox-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154723" comment="MozillaFirefox-branding-upstream-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154724" comment="MozillaFirefox-buildsymbols-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154725" comment="MozillaFirefox-devel-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154726" comment="MozillaFirefox-translations-common-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154727" comment="MozillaFirefox-translations-other-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5445</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5445.html">CVE-2017-5445</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5445">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5446</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5446.html">CVE-2017-5446</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5446">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154722" comment="MozillaFirefox-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154723" comment="MozillaFirefox-branding-upstream-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154724" comment="MozillaFirefox-buildsymbols-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154725" comment="MozillaFirefox-devel-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154726" comment="MozillaFirefox-translations-common-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154727" comment="MozillaFirefox-translations-other-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5447</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5447.html">CVE-2017-5447</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5447">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154722" comment="MozillaFirefox-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154723" comment="MozillaFirefox-branding-upstream-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154724" comment="MozillaFirefox-buildsymbols-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154725" comment="MozillaFirefox-devel-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154726" comment="MozillaFirefox-translations-common-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154727" comment="MozillaFirefox-translations-other-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5448</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5448" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5448.html">CVE-2017-5448</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5448">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154722" comment="MozillaFirefox-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154723" comment="MozillaFirefox-branding-upstream-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154724" comment="MozillaFirefox-buildsymbols-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154725" comment="MozillaFirefox-devel-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154726" comment="MozillaFirefox-translations-common-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154727" comment="MozillaFirefox-translations-other-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5449</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5449" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5449.html">CVE-2017-5449</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5449">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154722" comment="MozillaFirefox-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154723" comment="MozillaFirefox-branding-upstream-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154724" comment="MozillaFirefox-buildsymbols-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154725" comment="MozillaFirefox-devel-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154726" comment="MozillaFirefox-translations-common-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154727" comment="MozillaFirefox-translations-other-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5451</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5451" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5451.html">CVE-2017-5451</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5451">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5454</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5454" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5454.html">CVE-2017-5454</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5454">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5459</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5459.html">CVE-2017-5459</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5459">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5460</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5460.html">CVE-2017-5460</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5460">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154722" comment="MozillaFirefox-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154723" comment="MozillaFirefox-branding-upstream-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154724" comment="MozillaFirefox-buildsymbols-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154725" comment="MozillaFirefox-devel-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154726" comment="MozillaFirefox-translations-common-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154727" comment="MozillaFirefox-translations-other-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5461</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.21.4, 3.22.x through 3.28.x before 3.28.4, 3.29.x before 3.29.5, and 3.30.x before 3.30.1 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by leveraging incorrect base64 operations.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5461.html">CVE-2017-5461</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5461">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154722" comment="MozillaFirefox-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154723" comment="MozillaFirefox-branding-upstream-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154724" comment="MozillaFirefox-buildsymbols-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154725" comment="MozillaFirefox-devel-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154726" comment="MozillaFirefox-translations-common-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154727" comment="MozillaFirefox-translations-other-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5462</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5462.html">CVE-2017-5462</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5462">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5464</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5464.html">CVE-2017-5464</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5464">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154722" comment="MozillaFirefox-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154723" comment="MozillaFirefox-branding-upstream-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154724" comment="MozillaFirefox-buildsymbols-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154725" comment="MozillaFirefox-devel-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154726" comment="MozillaFirefox-translations-common-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154727" comment="MozillaFirefox-translations-other-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5465</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5465.html">CVE-2017-5465</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5465">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154722" comment="MozillaFirefox-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154723" comment="MozillaFirefox-branding-upstream-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154724" comment="MozillaFirefox-buildsymbols-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154725" comment="MozillaFirefox-devel-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154726" comment="MozillaFirefox-translations-common-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154727" comment="MozillaFirefox-translations-other-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5466</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5466" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5466.html">CVE-2017-5466</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5466">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154722" comment="MozillaFirefox-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154723" comment="MozillaFirefox-branding-upstream-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154724" comment="MozillaFirefox-buildsymbols-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154725" comment="MozillaFirefox-devel-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154726" comment="MozillaFirefox-translations-common-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154727" comment="MozillaFirefox-translations-other-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5467</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5467" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5467.html">CVE-2017-5467</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5467">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154722" comment="MozillaFirefox-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154723" comment="MozillaFirefox-branding-upstream-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154724" comment="MozillaFirefox-buildsymbols-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154725" comment="MozillaFirefox-devel-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154726" comment="MozillaFirefox-translations-common-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154727" comment="MozillaFirefox-translations-other-52.1.0-61.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5469</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5469.html">CVE-2017-5469</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035209</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035082</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5469">SUSE bug 1035209</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155085" comment="MozillaThunderbird-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155086" comment="MozillaThunderbird-buildsymbols-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155087" comment="MozillaThunderbird-devel-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152804" comment="MozillaThunderbird-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155088" comment="MozillaThunderbird-translations-common-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155089" comment="MozillaThunderbird-translations-other-52.1.0-42.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5482</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5482" source="CVE"/>
    <description>
    The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2016-8575.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5482.html">CVE-2017-5482</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5482">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5482">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5482">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5482">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5482">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5482">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5482">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5483</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5483" source="CVE"/>
    <description>
    The SNMP parser in tcpdump before 4.9.0 has a buffer overflow in print-snmp.c:asn1_parse().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5483.html">CVE-2017-5483</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5483">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5483">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5483">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5483">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5483">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5483">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5483">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5484</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5484" source="CVE"/>
    <description>
    The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:sig_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5484.html">CVE-2017-5484</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5484">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5484">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5484">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5484">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5484">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5484">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5484">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5485</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5485" source="CVE"/>
    <description>
    The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in addrtoname.c:lookup_nsap().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5485.html">CVE-2017-5485</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5485">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5485">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5485">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5485">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5485">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5485">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5485">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5486</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5486" source="CVE"/>
    <description>
    The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5486.html">CVE-2017-5486</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5486">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5486">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5486">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5486">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5486">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5486">SUSE bug 1020940</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5486">SUSE bug 1020940</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155203" comment="libpcap-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155204" comment="libpcap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155205" comment="libpcap-devel-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155207" comment="libpcap-devel-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155209" comment="libpcap-devel-static-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155211" comment="libpcap1-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155213" comment="libpcap1-32bit-1.8.1-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155218" comment="tcpdump-4.9.0-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5495</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5495" source="CVE"/>
    <description>
    All versions of Quagga, 0.93 through 1.1.0, are vulnerable to an unbounded memory allocation in the telnet 'vty' CLI, leading to a Denial-of-Service of Quagga daemons, or even the entire host. When Quagga daemons are configured with their telnet CLI enabled, anyone who can connect to the TCP ports can trigger this vulnerability, prior to authentication. Most distributions restrict the Quagga telnet interface to local access only by default. The Quagga telnet interface 'vty' input buffer grows automatically, without bound, so long as a newline is not entered. This allows an attacker to cause the Quagga daemon to allocate unbounded memory by sending very long strings without a newline. Eventually the daemon is terminated by the system, or the system itself runs out of memory. This is fixed in Quagga 1.1.1 and Free Range Routing (FRR) Protocol Suite 2017-01-10.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5495.html">CVE-2017-5495</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5495">SUSE bug 1021669</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155130" comment="quagga-0.99.24.1-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151418" comment="quagga is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155131" comment="quagga-devel-0.99.24.1-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153572" comment="quagga-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5498</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5498" source="CVE"/>
    <description>
    libjasper/include/jasper/jas_math.h in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5498.html">CVE-2017-5498</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5498">SUSE bug 1020353</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5498">SUSE bug 1020451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5498">SUSE bug 1020353</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5498">SUSE bug 1020451</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5498">SUSE bug 1020353</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5498">SUSE bug 1020353</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5498">SUSE bug 1020353</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5498">SUSE bug 1020353</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5498">SUSE bug 1020353</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154526" comment="jasper-1.900.14-176.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154527" comment="libjasper-devel-1.900.14-176.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154528" comment="libjasper1-1.900.14-176.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154529" comment="libjasper1-32bit-1.900.14-176.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5506</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5506" source="CVE"/>
    <description>
    Double free vulnerability in magick/profile.c in ImageMagick allows remote attackers to have unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5506.html">CVE-2017-5506</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5506">SUSE bug 1020436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5506">SUSE bug 1020436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5506">SUSE bug 1020436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5506">SUSE bug 1020436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5506">SUSE bug 1020436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5506">SUSE bug 1020436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5506">SUSE bug 1020436</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5506">SUSE bug 1020436</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5507</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5507" source="CVE"/>
    <description>
    Memory leak in coders/mpc.c in ImageMagick before 6.9.7-4 and 7.x before 7.0.4-4 allows remote attackers to cause a denial of service (memory consumption) via vectors involving a pixel cache.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5507.html">CVE-2017-5507</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5507">SUSE bug 1020439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5507">SUSE bug 1020439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5507">SUSE bug 1020439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5507">SUSE bug 1020439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5507">SUSE bug 1020439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5507">SUSE bug 1020439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5507">SUSE bug 1020439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5507">SUSE bug 1020439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5507">SUSE bug 1020439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5507">SUSE bug 1020439</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5507">SUSE bug 1020439</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5508</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5508" source="CVE"/>
    <description>
    Heap-based buffer overflow in the PushQuantumPixel function in ImageMagick before 6.9.7-3 and 7.x before 7.0.4-3 allows remote attackers to cause a denial of service (application crash) via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5508.html">CVE-2017-5508</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5508">SUSE bug 1020441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5508">SUSE bug 1020441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5508">SUSE bug 1020441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5508">SUSE bug 1020441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5508">SUSE bug 1020441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5508">SUSE bug 1020441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5508">SUSE bug 1020441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5508">SUSE bug 1020441</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5508">SUSE bug 1086782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5508">SUSE bug 1086782</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5508">SUSE bug 1086782</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5510</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5510" source="CVE"/>
    <description>
    coders/psd.c in ImageMagick allows remote attackers to have unspecified impact via a crafted PSD file, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5510.html">CVE-2017-5510</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5510">SUSE bug 1020446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5510">SUSE bug 1020446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5510">SUSE bug 1020446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5510">SUSE bug 1020446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5510">SUSE bug 1020446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5510">SUSE bug 1020446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5510">SUSE bug 1020446</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5510">SUSE bug 1020446</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5511</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5511" source="CVE"/>
    <description>
    coders/psd.c in ImageMagick allows remote attackers to have unspecified impact by leveraging an improper cast, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5511.html">CVE-2017-5511</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5511">SUSE bug 1020448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5511">SUSE bug 1020448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5511">SUSE bug 1020448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5511">SUSE bug 1020448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5511">SUSE bug 1020448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5511">SUSE bug 1020448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5511">SUSE bug 1020448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5511">SUSE bug 1020448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5511">SUSE bug 1020448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5511">SUSE bug 1020448</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148181" comment="GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148182" comment="GraphicsMagick-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149238" comment="ImageMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149239" comment="ImageMagick-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149240" comment="ImageMagick-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149241" comment="ImageMagick-doc-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149242" comment="ImageMagick-extra-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148183" comment="libGraphicsMagick++-Q16-11-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148184" comment="libGraphicsMagick++-devel-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148185" comment="libGraphicsMagick-Q16-3-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148186" comment="libGraphicsMagick3-config-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148187" comment="libGraphicsMagickWand-Q16-2-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149243" comment="libMagick++-6_Q16-3-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151678" comment="libMagick++-6_Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149244" comment="libMagick++-6_Q16-3-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152595" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149245" comment="libMagick++-devel-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149246" comment="libMagick++-devel-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149247" comment="libMagickCore-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151679" comment="libMagickCore-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149248" comment="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152598" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149249" comment="libMagickWand-6_Q16-1-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151680" comment="libMagickWand-6_Q16-1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149250" comment="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152599" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148188" comment="perl-GraphicsMagick-1.3.21-26.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149251" comment="perl-PerlMagick-6.8.8.1-30.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5525</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5525" source="CVE"/>
    <description>
    Memory leak in hw/audio/ac97.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5525.html">CVE-2017-5525</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5525">SUSE bug 1020491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5525">SUSE bug 1020491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5525">SUSE bug 1020491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5525">SUSE bug 1020491</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5525">SUSE bug 1020491</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155579" comment="qemu-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155580" comment="qemu-arm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155581" comment="qemu-block-curl-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155582" comment="qemu-block-rbd-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155583" comment="qemu-extra-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155584" comment="qemu-guest-agent-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155585" comment="qemu-ipxe-1.0.0-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155586" comment="qemu-kvm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155587" comment="qemu-lang-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155588" comment="qemu-linux-user-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155589" comment="qemu-ppc-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155590" comment="qemu-s390-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155591" comment="qemu-seabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155592" comment="qemu-sgabios-8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155593" comment="qemu-testsuite-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155594" comment="qemu-tools-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155595" comment="qemu-vgabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155596" comment="qemu-x86-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5526</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5526" source="CVE"/>
    <description>
    Memory leak in hw/audio/es1370.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5526.html">CVE-2017-5526</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1020589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1020589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1020589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1020589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1020589</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1059777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1059777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1059777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1059777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1059777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1059777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1059777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1059777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1059777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1059777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1059777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1059777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1059777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1059777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1059777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1059777</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5526">SUSE bug 1059777</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155579" comment="qemu-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155580" comment="qemu-arm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155581" comment="qemu-block-curl-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155582" comment="qemu-block-rbd-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155583" comment="qemu-extra-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155584" comment="qemu-guest-agent-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155585" comment="qemu-ipxe-1.0.0-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155586" comment="qemu-kvm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155587" comment="qemu-lang-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155588" comment="qemu-linux-user-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155589" comment="qemu-ppc-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155590" comment="qemu-s390-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155591" comment="qemu-seabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155592" comment="qemu-sgabios-8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155593" comment="qemu-testsuite-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155594" comment="qemu-tools-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155595" comment="qemu-vgabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155596" comment="qemu-x86-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5545</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5545" source="CVE"/>
    <description>
    The main function in plistutil.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5545.html">CVE-2017-5545</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5545">SUSE bug 1021610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5545">SUSE bug 1021610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5545">SUSE bug 1021610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5545">SUSE bug 1021610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5545">SUSE bug 1021610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5545">SUSE bug 1021610</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5545">SUSE bug 1021610</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148306" comment="libplist-1.12-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154007" comment="libplist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148307" comment="libplist++-devel-1.12-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154008" comment="libplist++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148308" comment="libplist++3-1.12-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154009" comment="libplist++3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148309" comment="libplist++3-32bit-1.12-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154010" comment="libplist++3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148310" comment="libplist-devel-1.12-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154011" comment="libplist-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148311" comment="libplist3-1.12-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154012" comment="libplist3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148312" comment="libplist3-32bit-1.12-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154013" comment="libplist3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148313" comment="plistutil-1.12-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154014" comment="plistutil is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148314" comment="python-plist-1.12-4.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154015" comment="python-plist is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5551</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551" source="CVE"/>
    <description>
    The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5551.html">CVE-2017-5551</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 995968</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5551">SUSE bug 1021258</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148345" comment="kernel-debug-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148346" comment="kernel-debug-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148347" comment="kernel-debug-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148348" comment="kernel-default-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148349" comment="kernel-default-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148350" comment="kernel-default-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148351" comment="kernel-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148352" comment="kernel-docs-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148353" comment="kernel-docs-html-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148354" comment="kernel-docs-pdf-4.1.38-47.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148355" comment="kernel-ec2-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148356" comment="kernel-ec2-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148357" comment="kernel-ec2-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148358" comment="kernel-macros-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148359" comment="kernel-obs-build-4.1.38-47.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148360" comment="kernel-obs-qa-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148361" comment="kernel-pae-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148362" comment="kernel-pae-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148363" comment="kernel-pae-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148364" comment="kernel-pv-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148365" comment="kernel-pv-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148366" comment="kernel-pv-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148367" comment="kernel-source-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148368" comment="kernel-source-vanilla-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148369" comment="kernel-syms-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148370" comment="kernel-vanilla-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148371" comment="kernel-vanilla-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148372" comment="kernel-xen-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148373" comment="kernel-xen-base-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148374" comment="kernel-xen-devel-4.1.38-47.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5592</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5592" source="CVE"/>
    <description>
    An incorrect implementation of "XEP-0280: Message Carbons" in multiple XMPP clients allows a remote attacker to impersonate any user, including contacts, in the vulnerable application's display. This allows for various kinds of social engineering attacks. This CVE is for profanity (0.4.7 - 0.5.0).
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5592.html">CVE-2017-5592</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5592">SUSE bug 1024696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5592">SUSE bug 1024696</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148808" comment="profanity-0.4.7-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154018" comment="profanity is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5627</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5627" source="CVE"/>
    <description>
    An issue was discovered in Artifex Software, Inc. MuJS before 4006739a28367c708dea19aeb19b8a1a9326ce08. The jsR_setproperty function in jsrun.c lacks a check for a negative array length. This leads to an integer overflow in the js_pushstring function in jsrun.c when parsing a specially crafted JS file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5627.html">CVE-2017-5627</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5627">SUSE bug 1022503</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5627">SUSE bug 1022503</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5627">SUSE bug 1022503</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5627">SUSE bug 1022503</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148624" comment="mupdf-1.10a-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153561" comment="mupdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148625" comment="mupdf-devel-static-1.10a-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153562" comment="mupdf-devel-static is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5628</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5628" source="CVE"/>
    <description>
    An issue was discovered in Artifex Software, Inc. MuJS before 8f62ea10a0af68e56d5c00720523ebcba13c2e6a. The MakeDay function in jsdate.c does not validate the month, leading to an integer overflow when parsing a specially crafted JS file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5628.html">CVE-2017-5628</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5628">SUSE bug 1022504</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5628">SUSE bug 1022504</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5628">SUSE bug 1022504</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5628">SUSE bug 1022504</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148624" comment="mupdf-1.10a-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153561" comment="mupdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148625" comment="mupdf-devel-static-1.10a-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153562" comment="mupdf-devel-static is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5647</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5647" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5647" source="CVE"/>
    <description>
    A bug in the handling of the pipelined requests in Apache Tomcat 9.0.0.M1 to 9.0.0.M18, 8.5.0 to 8.5.12, 8.0.0.RC1 to 8.0.42, 7.0.0 to 7.0.76, and 6.0.0 to 6.0.52, when send file was used, results in the pipelined request being lost when send file processing of the previous request completed. This could result in responses appearing to be sent for the wrong request. For example, a user agent that sent requests A, B and C could see the correct response for request A, the response for request C for request B and no response for request C.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5647.html">CVE-2017-5647</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1033448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1033448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1033448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1033448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1033448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1033448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1033448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1033448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1033448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1033448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1033448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1033448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1033448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1036642</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1033448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1033448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1033448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1033448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1033448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1033448</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5647">SUSE bug 1036642</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155492" comment="tomcat-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155493" comment="tomcat-admin-webapps-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155494" comment="tomcat-docs-webapp-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155495" comment="tomcat-el-3_0-api-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155496" comment="tomcat-embed-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155497" comment="tomcat-javadoc-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155498" comment="tomcat-jsp-2_3-api-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155499" comment="tomcat-jsvc-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155500" comment="tomcat-lib-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155501" comment="tomcat-servlet-3_1-api-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152853" comment="tomcat-servlet-3_1-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155502" comment="tomcat-webapps-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5648</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5648" source="CVE"/>
    <description>
    While investigating bug 60718, it was noticed that some calls to application listeners in Apache Tomcat 9.0.0.M1 to 9.0.0.M17, 8.5.0 to 8.5.11, 8.0.0.RC1 to 8.0.41, and 7.0.0 to 7.0.75 did not use the appropriate facade object. When running an untrusted application under a SecurityManager, it was therefore possible for that untrusted application to retain a reference to the request or response object and thereby access and/or modify information associated with another web application.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5648.html">CVE-2017-5648</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5648">SUSE bug 1033447</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5648">SUSE bug 1033447</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5648">SUSE bug 1033447</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5648">SUSE bug 1033447</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5648">SUSE bug 1033447</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5648">SUSE bug 1033447</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5648">SUSE bug 1033447</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155492" comment="tomcat-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155493" comment="tomcat-admin-webapps-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155494" comment="tomcat-docs-webapp-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155495" comment="tomcat-el-3_0-api-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155496" comment="tomcat-embed-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155497" comment="tomcat-javadoc-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155498" comment="tomcat-jsp-2_3-api-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155499" comment="tomcat-jsvc-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155500" comment="tomcat-lib-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155501" comment="tomcat-servlet-3_1-api-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152853" comment="tomcat-servlet-3_1-api is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155502" comment="tomcat-webapps-8.0.43-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5667</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5667" source="CVE"/>
    <description>
    The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds heap access and crash) or execute arbitrary code on the QEMU host via vectors involving the data transfer length.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5667.html">CVE-2017-5667</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5667">SUSE bug 1022541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5667">SUSE bug 1022541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5667">SUSE bug 1022541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5667">SUSE bug 1022541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5667">SUSE bug 1022541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5667">SUSE bug 1022541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5667">SUSE bug 1022541</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5667">SUSE bug 1022541</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155579" comment="qemu-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155580" comment="qemu-arm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155581" comment="qemu-block-curl-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155582" comment="qemu-block-rbd-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155583" comment="qemu-extra-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155584" comment="qemu-guest-agent-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155585" comment="qemu-ipxe-1.0.0-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155586" comment="qemu-kvm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155587" comment="qemu-lang-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155588" comment="qemu-linux-user-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155589" comment="qemu-ppc-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155590" comment="qemu-s390-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155591" comment="qemu-seabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155592" comment="qemu-sgabios-8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155593" comment="qemu-testsuite-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155594" comment="qemu-tools-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155595" comment="qemu-vgabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155596" comment="qemu-x86-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5669</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669" source="CVE"/>
    <description>
    The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5669.html">CVE-2017-5669</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1026914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5669">SUSE bug 1090078</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150436" comment="kernel-debug-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150437" comment="kernel-debug-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150438" comment="kernel-debug-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150439" comment="kernel-default-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150440" comment="kernel-default-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150441" comment="kernel-default-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150442" comment="kernel-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150443" comment="kernel-docs-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150444" comment="kernel-docs-html-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150445" comment="kernel-docs-pdf-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150446" comment="kernel-ec2-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150447" comment="kernel-ec2-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150448" comment="kernel-ec2-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150449" comment="kernel-macros-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150450" comment="kernel-obs-build-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150451" comment="kernel-obs-qa-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150452" comment="kernel-pae-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150453" comment="kernel-pae-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150454" comment="kernel-pae-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150455" comment="kernel-pv-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150456" comment="kernel-pv-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150457" comment="kernel-pv-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150458" comment="kernel-source-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150459" comment="kernel-source-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150460" comment="kernel-syms-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150461" comment="kernel-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150462" comment="kernel-vanilla-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150463" comment="kernel-xen-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150464" comment="kernel-xen-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150465" comment="kernel-xen-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5834</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5834" source="CVE"/>
    <description>
    The parse_dict_node function in bplist.c in libplist allows attackers to cause a denial of service (out-of-bounds heap read and crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5834.html">CVE-2017-5834</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5834">SUSE bug 1023848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5834">SUSE bug 1023848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5834">SUSE bug 1023848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5834">SUSE bug 1023848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5834">SUSE bug 1023848</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148685" comment="libplist-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154007" comment="libplist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148686" comment="libplist++-devel-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154008" comment="libplist++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148687" comment="libplist++3-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154009" comment="libplist++3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148688" comment="libplist++3-32bit-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154010" comment="libplist++3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148689" comment="libplist-devel-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154011" comment="libplist-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148690" comment="libplist3-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154012" comment="libplist3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148691" comment="libplist3-32bit-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154013" comment="libplist3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148692" comment="plistutil-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154014" comment="plistutil is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148693" comment="python-plist-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154015" comment="python-plist is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5835</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5835" source="CVE"/>
    <description>
    libplist allows attackers to cause a denial of service (large memory allocation and crash) via vectors involving an offset size of zero.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5835.html">CVE-2017-5835</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5835">SUSE bug 1023822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5835">SUSE bug 1023822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5835">SUSE bug 1023822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5835">SUSE bug 1023822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5835">SUSE bug 1023822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5835">SUSE bug 1023822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5835">SUSE bug 1023822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5835">SUSE bug 1023822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5835">SUSE bug 1023822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5835">SUSE bug 1023822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5835">SUSE bug 1023822</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5835">SUSE bug 1023822</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148685" comment="libplist-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154007" comment="libplist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148686" comment="libplist++-devel-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154008" comment="libplist++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148687" comment="libplist++3-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154009" comment="libplist++3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148688" comment="libplist++3-32bit-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154010" comment="libplist++3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148689" comment="libplist-devel-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154011" comment="libplist-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148690" comment="libplist3-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154012" comment="libplist3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148691" comment="libplist3-32bit-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154013" comment="libplist3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148692" comment="plistutil-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154014" comment="plistutil is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148693" comment="python-plist-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154015" comment="python-plist is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5836</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5836" source="CVE"/>
    <description>
    The plist_free_data function in plist.c in libplist allows attackers to cause a denial of service (crash) via vectors involving an integer node that is treated as a PLIST_KEY and then triggers an invalid free.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5836.html">CVE-2017-5836</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5836">SUSE bug 1023807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5836">SUSE bug 1023848</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5836">SUSE bug 1023807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5836">SUSE bug 1023807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5836">SUSE bug 1023807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5836">SUSE bug 1023807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5836">SUSE bug 1023807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5836">SUSE bug 1023807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5836">SUSE bug 1023807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5836">SUSE bug 1023807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5836">SUSE bug 1023807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5836">SUSE bug 1023807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5836">SUSE bug 1023807</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5836">SUSE bug 1023807</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148685" comment="libplist-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154007" comment="libplist is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148686" comment="libplist++-devel-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154008" comment="libplist++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148687" comment="libplist++3-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154009" comment="libplist++3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148688" comment="libplist++3-32bit-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154010" comment="libplist++3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148689" comment="libplist-devel-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154011" comment="libplist-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148690" comment="libplist3-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154012" comment="libplist3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148691" comment="libplist3-32bit-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154013" comment="libplist3-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148692" comment="plistutil-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154014" comment="plistutil is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148693" comment="python-plist-1.12-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154015" comment="python-plist is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5837</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837" source="CVE"/>
    <description>
    The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-media.c in gst-plugins-base in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (floating point exception and crash) via a crafted video file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5837.html">CVE-2017-5837</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5837">SUSE bug 1023259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5837">SUSE bug 1024076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5837">SUSE bug 1024079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5837">SUSE bug 1024076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5837">SUSE bug 1024076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5837">SUSE bug 1024076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5837">SUSE bug 1024076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5837">SUSE bug 1024076</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5837">SUSE bug 1024076</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154633" comment="gstreamer-0_10-plugin-gnomevfs-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153921" comment="gstreamer-0_10-plugin-gnomevfs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154634" comment="gstreamer-0_10-plugins-base-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153922" comment="gstreamer-0_10-plugins-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154635" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153923" comment="gstreamer-0_10-plugins-base-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154636" comment="gstreamer-0_10-plugins-base-devel-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153924" comment="gstreamer-0_10-plugins-base-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154637" comment="gstreamer-0_10-plugins-base-doc-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153925" comment="gstreamer-0_10-plugins-base-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154638" comment="gstreamer-0_10-plugins-base-lang-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153926" comment="gstreamer-0_10-plugins-base-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149034" comment="gstreamer-plugins-base-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153927" comment="gstreamer-plugins-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149035" comment="gstreamer-plugins-base-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153928" comment="gstreamer-plugins-base-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149036" comment="gstreamer-plugins-base-devel-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153929" comment="gstreamer-plugins-base-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149037" comment="gstreamer-plugins-base-doc-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153930" comment="gstreamer-plugins-base-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149038" comment="gstreamer-plugins-base-lang-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153931" comment="gstreamer-plugins-base-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149039" comment="libgstallocators-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153932" comment="libgstallocators-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149040" comment="libgstallocators-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153933" comment="libgstallocators-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154639" comment="libgstapp-0_10-0-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153934" comment="libgstapp-0_10-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154640" comment="libgstapp-0_10-0-32bit-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153935" comment="libgstapp-0_10-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149041" comment="libgstapp-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153936" comment="libgstapp-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149042" comment="libgstapp-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153937" comment="libgstapp-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149043" comment="libgstaudio-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153938" comment="libgstaudio-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149044" comment="libgstaudio-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153939" comment="libgstaudio-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149045" comment="libgstfft-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153940" comment="libgstfft-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149046" comment="libgstfft-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153941" comment="libgstfft-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154641" comment="libgstinterfaces-0_10-0-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153942" comment="libgstinterfaces-0_10-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154642" comment="libgstinterfaces-0_10-0-32bit-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153943" comment="libgstinterfaces-0_10-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149047" comment="libgstpbutils-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153944" comment="libgstpbutils-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149048" comment="libgstpbutils-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153945" comment="libgstpbutils-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149049" comment="libgstriff-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153946" comment="libgstriff-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149050" comment="libgstriff-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153947" comment="libgstriff-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149051" comment="libgstrtp-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153948" comment="libgstrtp-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149052" comment="libgstrtp-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153949" comment="libgstrtp-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149053" comment="libgstrtsp-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153950" comment="libgstrtsp-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149054" comment="libgstrtsp-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153951" comment="libgstrtsp-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149055" comment="libgstsdp-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153952" comment="libgstsdp-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149056" comment="libgstsdp-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153953" comment="libgstsdp-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149057" comment="libgsttag-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153954" comment="libgsttag-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149058" comment="libgsttag-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153955" comment="libgsttag-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149059" comment="libgstvideo-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153956" comment="libgstvideo-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149060" comment="libgstvideo-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153957" comment="libgstvideo-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149061" comment="typelib-1_0-GstAllocators-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153958" comment="typelib-1_0-GstAllocators-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154643" comment="typelib-1_0-GstApp-0_10-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153959" comment="typelib-1_0-GstApp-0_10 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149062" comment="typelib-1_0-GstApp-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153960" comment="typelib-1_0-GstApp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149063" comment="typelib-1_0-GstAudio-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153961" comment="typelib-1_0-GstAudio-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149064" comment="typelib-1_0-GstFft-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153962" comment="typelib-1_0-GstFft-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154644" comment="typelib-1_0-GstInterfaces-0_10-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153963" comment="typelib-1_0-GstInterfaces-0_10 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149065" comment="typelib-1_0-GstPbutils-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153964" comment="typelib-1_0-GstPbutils-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149066" comment="typelib-1_0-GstRiff-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153965" comment="typelib-1_0-GstRiff-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149067" comment="typelib-1_0-GstRtp-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153966" comment="typelib-1_0-GstRtp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149068" comment="typelib-1_0-GstRtsp-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153967" comment="typelib-1_0-GstRtsp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149069" comment="typelib-1_0-GstSdp-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153968" comment="typelib-1_0-GstSdp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149070" comment="typelib-1_0-GstTag-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153969" comment="typelib-1_0-GstTag-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149071" comment="typelib-1_0-GstVideo-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153970" comment="typelib-1_0-GstVideo-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5838</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5838" source="CVE"/>
    <description>
    The gst_date_time_new_from_iso8601_string function in gst/gstdatetime.c in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a malformed datetime string.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5838.html">CVE-2017-5838</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5838">SUSE bug 1023259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5838">SUSE bug 1023259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5838">SUSE bug 1023259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5838">SUSE bug 1024051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5838">SUSE bug 1024051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5838">SUSE bug 1024051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5838">SUSE bug 1024051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5838">SUSE bug 1024051</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149072" comment="gstreamer-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154019" comment="gstreamer is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149073" comment="gstreamer-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154020" comment="gstreamer-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149074" comment="gstreamer-devel-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154021" comment="gstreamer-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149075" comment="gstreamer-doc-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154022" comment="gstreamer-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149076" comment="gstreamer-lang-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154023" comment="gstreamer-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149077" comment="gstreamer-utils-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154024" comment="gstreamer-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149078" comment="libgstreamer-1_0-0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154025" comment="libgstreamer-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149079" comment="libgstreamer-1_0-0-32bit-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154026" comment="libgstreamer-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149080" comment="typelib-1_0-Gst-1_0-1.4.5-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154027" comment="typelib-1_0-Gst-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5839</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839" source="CVE"/>
    <description>
    The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-media.c in gst-plugins-base in GStreamer before 1.10.3 does not properly limit recursion, which allows remote attackers to cause a denial of service (stack overflow and crash) via vectors involving nested WAVEFORMATEX.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5839.html">CVE-2017-5839</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5839">SUSE bug 1023259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5839">SUSE bug 1024047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5839">SUSE bug 1024047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5839">SUSE bug 1024047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5839">SUSE bug 1024047</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5839">SUSE bug 1024047</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149034" comment="gstreamer-plugins-base-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153927" comment="gstreamer-plugins-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149035" comment="gstreamer-plugins-base-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153928" comment="gstreamer-plugins-base-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149036" comment="gstreamer-plugins-base-devel-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153929" comment="gstreamer-plugins-base-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149037" comment="gstreamer-plugins-base-doc-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153930" comment="gstreamer-plugins-base-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149038" comment="gstreamer-plugins-base-lang-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153931" comment="gstreamer-plugins-base-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149039" comment="libgstallocators-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153932" comment="libgstallocators-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149040" comment="libgstallocators-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153933" comment="libgstallocators-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149041" comment="libgstapp-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153936" comment="libgstapp-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149042" comment="libgstapp-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153937" comment="libgstapp-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149043" comment="libgstaudio-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153938" comment="libgstaudio-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149044" comment="libgstaudio-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153939" comment="libgstaudio-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149045" comment="libgstfft-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153940" comment="libgstfft-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149046" comment="libgstfft-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153941" comment="libgstfft-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149047" comment="libgstpbutils-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153944" comment="libgstpbutils-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149048" comment="libgstpbutils-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153945" comment="libgstpbutils-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149049" comment="libgstriff-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153946" comment="libgstriff-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149050" comment="libgstriff-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153947" comment="libgstriff-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149051" comment="libgstrtp-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153948" comment="libgstrtp-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149052" comment="libgstrtp-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153949" comment="libgstrtp-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149053" comment="libgstrtsp-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153950" comment="libgstrtsp-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149054" comment="libgstrtsp-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153951" comment="libgstrtsp-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149055" comment="libgstsdp-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153952" comment="libgstsdp-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149056" comment="libgstsdp-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153953" comment="libgstsdp-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149057" comment="libgsttag-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153954" comment="libgsttag-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149058" comment="libgsttag-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153955" comment="libgsttag-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149059" comment="libgstvideo-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153956" comment="libgstvideo-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149060" comment="libgstvideo-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153957" comment="libgstvideo-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149061" comment="typelib-1_0-GstAllocators-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153958" comment="typelib-1_0-GstAllocators-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149062" comment="typelib-1_0-GstApp-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153960" comment="typelib-1_0-GstApp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149063" comment="typelib-1_0-GstAudio-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153961" comment="typelib-1_0-GstAudio-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149064" comment="typelib-1_0-GstFft-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153962" comment="typelib-1_0-GstFft-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149065" comment="typelib-1_0-GstPbutils-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153964" comment="typelib-1_0-GstPbutils-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149066" comment="typelib-1_0-GstRiff-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153965" comment="typelib-1_0-GstRiff-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149067" comment="typelib-1_0-GstRtp-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153966" comment="typelib-1_0-GstRtp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149068" comment="typelib-1_0-GstRtsp-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153967" comment="typelib-1_0-GstRtsp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149069" comment="typelib-1_0-GstSdp-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153968" comment="typelib-1_0-GstSdp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149070" comment="typelib-1_0-GstTag-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153969" comment="typelib-1_0-GstTag-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149071" comment="typelib-1_0-GstVideo-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153970" comment="typelib-1_0-GstVideo-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5840</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840" source="CVE"/>
    <description>
    The qtdemux_parse_samples function in gst/isomp4/qtdemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving the current stts index.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5840.html">CVE-2017-5840</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5840">SUSE bug 1023259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5840">SUSE bug 1024034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5840">SUSE bug 1024034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5840">SUSE bug 1024034</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5840">SUSE bug 1024034</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154627" comment="gstreamer-plugins-good-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153915" comment="gstreamer-plugins-good is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154628" comment="gstreamer-plugins-good-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153916" comment="gstreamer-plugins-good-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154629" comment="gstreamer-plugins-good-doc-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153917" comment="gstreamer-plugins-good-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154630" comment="gstreamer-plugins-good-extra-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153918" comment="gstreamer-plugins-good-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154631" comment="gstreamer-plugins-good-extra-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153919" comment="gstreamer-plugins-good-extra-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154632" comment="gstreamer-plugins-good-lang-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153920" comment="gstreamer-plugins-good-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5841</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841" source="CVE"/>
    <description>
    The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving ncdt tags.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5841.html">CVE-2017-5841</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5841">SUSE bug 1023259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5841">SUSE bug 1024030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5841">SUSE bug 1024062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5841">SUSE bug 1024030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5841">SUSE bug 1024030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5841">SUSE bug 1024030</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5841">SUSE bug 1024030</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154627" comment="gstreamer-plugins-good-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153915" comment="gstreamer-plugins-good is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154628" comment="gstreamer-plugins-good-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153916" comment="gstreamer-plugins-good-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154629" comment="gstreamer-plugins-good-doc-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153917" comment="gstreamer-plugins-good-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154630" comment="gstreamer-plugins-good-extra-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153918" comment="gstreamer-plugins-good-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154631" comment="gstreamer-plugins-good-extra-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153919" comment="gstreamer-plugins-good-extra-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154632" comment="gstreamer-plugins-good-lang-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153920" comment="gstreamer-plugins-good-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5842</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842" source="CVE"/>
    <description>
    The html_context_handle_element function in gst/subparse/samiparse.c in gst-plugins-base in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted SMI file, as demonstrated by OneNote_Manager.smi.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5842.html">CVE-2017-5842</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5842">SUSE bug 1023259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5842">SUSE bug 1024041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5842">SUSE bug 1024041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5842">SUSE bug 1024041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5842">SUSE bug 1024041</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5842">SUSE bug 1024041</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149034" comment="gstreamer-plugins-base-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153927" comment="gstreamer-plugins-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149035" comment="gstreamer-plugins-base-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153928" comment="gstreamer-plugins-base-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149036" comment="gstreamer-plugins-base-devel-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153929" comment="gstreamer-plugins-base-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149037" comment="gstreamer-plugins-base-doc-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153930" comment="gstreamer-plugins-base-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149038" comment="gstreamer-plugins-base-lang-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153931" comment="gstreamer-plugins-base-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149039" comment="libgstallocators-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153932" comment="libgstallocators-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149040" comment="libgstallocators-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153933" comment="libgstallocators-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149041" comment="libgstapp-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153936" comment="libgstapp-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149042" comment="libgstapp-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153937" comment="libgstapp-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149043" comment="libgstaudio-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153938" comment="libgstaudio-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149044" comment="libgstaudio-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153939" comment="libgstaudio-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149045" comment="libgstfft-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153940" comment="libgstfft-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149046" comment="libgstfft-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153941" comment="libgstfft-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149047" comment="libgstpbutils-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153944" comment="libgstpbutils-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149048" comment="libgstpbutils-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153945" comment="libgstpbutils-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149049" comment="libgstriff-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153946" comment="libgstriff-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149050" comment="libgstriff-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153947" comment="libgstriff-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149051" comment="libgstrtp-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153948" comment="libgstrtp-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149052" comment="libgstrtp-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153949" comment="libgstrtp-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149053" comment="libgstrtsp-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153950" comment="libgstrtsp-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149054" comment="libgstrtsp-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153951" comment="libgstrtsp-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149055" comment="libgstsdp-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153952" comment="libgstsdp-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149056" comment="libgstsdp-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153953" comment="libgstsdp-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149057" comment="libgsttag-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153954" comment="libgsttag-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149058" comment="libgsttag-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153955" comment="libgsttag-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149059" comment="libgstvideo-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153956" comment="libgstvideo-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149060" comment="libgstvideo-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153957" comment="libgstvideo-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149061" comment="typelib-1_0-GstAllocators-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153958" comment="typelib-1_0-GstAllocators-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149062" comment="typelib-1_0-GstApp-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153960" comment="typelib-1_0-GstApp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149063" comment="typelib-1_0-GstAudio-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153961" comment="typelib-1_0-GstAudio-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149064" comment="typelib-1_0-GstFft-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153962" comment="typelib-1_0-GstFft-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149065" comment="typelib-1_0-GstPbutils-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153964" comment="typelib-1_0-GstPbutils-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149066" comment="typelib-1_0-GstRiff-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153965" comment="typelib-1_0-GstRiff-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149067" comment="typelib-1_0-GstRtp-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153966" comment="typelib-1_0-GstRtp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149068" comment="typelib-1_0-GstRtsp-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153967" comment="typelib-1_0-GstRtsp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149069" comment="typelib-1_0-GstSdp-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153968" comment="typelib-1_0-GstSdp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149070" comment="typelib-1_0-GstTag-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153969" comment="typelib-1_0-GstTag-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149071" comment="typelib-1_0-GstVideo-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153970" comment="typelib-1_0-GstVideo-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5844</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844" source="CVE"/>
    <description>
    The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-media.c in gst-plugins-base in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (floating point exception and crash) via a crafted ASF file.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5844.html">CVE-2017-5844</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5844">SUSE bug 1023259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5844">SUSE bug 1024079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5844">SUSE bug 1024079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5844">SUSE bug 1024079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5844">SUSE bug 1024079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5844">SUSE bug 1024079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5844">SUSE bug 1024079</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5844">SUSE bug 1024079</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154633" comment="gstreamer-0_10-plugin-gnomevfs-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153921" comment="gstreamer-0_10-plugin-gnomevfs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154634" comment="gstreamer-0_10-plugins-base-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153922" comment="gstreamer-0_10-plugins-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154635" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153923" comment="gstreamer-0_10-plugins-base-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154636" comment="gstreamer-0_10-plugins-base-devel-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153924" comment="gstreamer-0_10-plugins-base-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154637" comment="gstreamer-0_10-plugins-base-doc-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153925" comment="gstreamer-0_10-plugins-base-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154638" comment="gstreamer-0_10-plugins-base-lang-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153926" comment="gstreamer-0_10-plugins-base-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149034" comment="gstreamer-plugins-base-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153927" comment="gstreamer-plugins-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149035" comment="gstreamer-plugins-base-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153928" comment="gstreamer-plugins-base-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149036" comment="gstreamer-plugins-base-devel-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153929" comment="gstreamer-plugins-base-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149037" comment="gstreamer-plugins-base-doc-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153930" comment="gstreamer-plugins-base-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149038" comment="gstreamer-plugins-base-lang-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153931" comment="gstreamer-plugins-base-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149039" comment="libgstallocators-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153932" comment="libgstallocators-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149040" comment="libgstallocators-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153933" comment="libgstallocators-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154639" comment="libgstapp-0_10-0-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153934" comment="libgstapp-0_10-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154640" comment="libgstapp-0_10-0-32bit-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153935" comment="libgstapp-0_10-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149041" comment="libgstapp-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153936" comment="libgstapp-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149042" comment="libgstapp-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153937" comment="libgstapp-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149043" comment="libgstaudio-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153938" comment="libgstaudio-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149044" comment="libgstaudio-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153939" comment="libgstaudio-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149045" comment="libgstfft-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153940" comment="libgstfft-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149046" comment="libgstfft-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153941" comment="libgstfft-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154641" comment="libgstinterfaces-0_10-0-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153942" comment="libgstinterfaces-0_10-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154642" comment="libgstinterfaces-0_10-0-32bit-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153943" comment="libgstinterfaces-0_10-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149047" comment="libgstpbutils-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153944" comment="libgstpbutils-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149048" comment="libgstpbutils-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153945" comment="libgstpbutils-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149049" comment="libgstriff-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153946" comment="libgstriff-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149050" comment="libgstriff-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153947" comment="libgstriff-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149051" comment="libgstrtp-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153948" comment="libgstrtp-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149052" comment="libgstrtp-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153949" comment="libgstrtp-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149053" comment="libgstrtsp-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153950" comment="libgstrtsp-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149054" comment="libgstrtsp-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153951" comment="libgstrtsp-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149055" comment="libgstsdp-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153952" comment="libgstsdp-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149056" comment="libgstsdp-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153953" comment="libgstsdp-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149057" comment="libgsttag-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153954" comment="libgsttag-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149058" comment="libgsttag-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153955" comment="libgsttag-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149059" comment="libgstvideo-1_0-0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153956" comment="libgstvideo-1_0-0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149060" comment="libgstvideo-1_0-0-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153957" comment="libgstvideo-1_0-0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149061" comment="typelib-1_0-GstAllocators-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153958" comment="typelib-1_0-GstAllocators-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154643" comment="typelib-1_0-GstApp-0_10-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153959" comment="typelib-1_0-GstApp-0_10 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149062" comment="typelib-1_0-GstApp-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153960" comment="typelib-1_0-GstApp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149063" comment="typelib-1_0-GstAudio-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153961" comment="typelib-1_0-GstAudio-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149064" comment="typelib-1_0-GstFft-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153962" comment="typelib-1_0-GstFft-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154644" comment="typelib-1_0-GstInterfaces-0_10-0.10.36-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153963" comment="typelib-1_0-GstInterfaces-0_10 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149065" comment="typelib-1_0-GstPbutils-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153964" comment="typelib-1_0-GstPbutils-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149066" comment="typelib-1_0-GstRiff-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153965" comment="typelib-1_0-GstRiff-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149067" comment="typelib-1_0-GstRtp-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153966" comment="typelib-1_0-GstRtp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149068" comment="typelib-1_0-GstRtsp-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153967" comment="typelib-1_0-GstRtsp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149069" comment="typelib-1_0-GstSdp-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153968" comment="typelib-1_0-GstSdp-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149070" comment="typelib-1_0-GstTag-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153969" comment="typelib-1_0-GstTag-1_0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149071" comment="typelib-1_0-GstVideo-1_0-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153970" comment="typelib-1_0-GstVideo-1_0 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5845</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845" source="CVE"/>
    <description>
    The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (invalid memory read and crash) via a ncdt sub-tag that "goes behind" the surrounding tag.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5845.html">CVE-2017-5845</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5845">SUSE bug 1023259</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5845">SUSE bug 1024062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5845">SUSE bug 1024062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5845">SUSE bug 1024062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5845">SUSE bug 1024062</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5845">SUSE bug 1024062</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154627" comment="gstreamer-plugins-good-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153915" comment="gstreamer-plugins-good is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154628" comment="gstreamer-plugins-good-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153916" comment="gstreamer-plugins-good-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154629" comment="gstreamer-plugins-good-doc-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153917" comment="gstreamer-plugins-good-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154630" comment="gstreamer-plugins-good-extra-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153918" comment="gstreamer-plugins-good-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154631" comment="gstreamer-plugins-good-extra-32bit-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153919" comment="gstreamer-plugins-good-extra-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154632" comment="gstreamer-plugins-good-lang-1.4.5-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153920" comment="gstreamer-plugins-good-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5856</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5856" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5856" source="CVE"/>
    <description>
    Memory leak in the megasas_handle_dcmd function in hw/scsi/megasas.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) via MegaRAID Firmware Interface (MFI) commands with the sglist size set to a value over 2 Gb.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5856.html">CVE-2017-5856</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5856">SUSE bug 1023053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5856">SUSE bug 1023053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5856">SUSE bug 1024186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5856">SUSE bug 1024186</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5856">SUSE bug 1023053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5856">SUSE bug 1023053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5856">SUSE bug 1023053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5856">SUSE bug 1023053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5856">SUSE bug 1023053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5856">SUSE bug 1024186</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155579" comment="qemu-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155580" comment="qemu-arm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155581" comment="qemu-block-curl-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155582" comment="qemu-block-rbd-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155583" comment="qemu-extra-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155584" comment="qemu-guest-agent-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155585" comment="qemu-ipxe-1.0.0-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155586" comment="qemu-kvm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155587" comment="qemu-lang-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155588" comment="qemu-linux-user-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155589" comment="qemu-ppc-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155590" comment="qemu-s390-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155591" comment="qemu-seabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155592" comment="qemu-sgabios-8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155593" comment="qemu-testsuite-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155594" comment="qemu-tools-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155595" comment="qemu-vgabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155596" comment="qemu-x86-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5896</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5896" source="CVE"/>
    <description>
    Heap-based buffer overflow in the fz_subsample_pixmap function in fitz/pixmap.c in MuPDF 1.10a allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5896.html">CVE-2017-5896</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5896">SUSE bug 1024679</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5896">SUSE bug 1031053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5896">SUSE bug 1023761</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148624" comment="mupdf-1.10a-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153561" comment="mupdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148625" comment="mupdf-devel-static-1.10a-15.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153562" comment="mupdf-devel-static is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5897</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5897" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897" source="CVE"/>
    <description>
    The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allows remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5897.html">CVE-2017-5897</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5897">SUSE bug 1023762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5897">SUSE bug 1023762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5897">SUSE bug 1023762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5897">SUSE bug 1025039</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5897">SUSE bug 1023762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5897">SUSE bug 1023762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5897">SUSE bug 1023762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5897">SUSE bug 1023762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5897">SUSE bug 1023762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5897">SUSE bug 1023762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5897">SUSE bug 1023762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5897">SUSE bug 1023762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5897">SUSE bug 1025039</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5897">SUSE bug 1023762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5897">SUSE bug 1023762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5897">SUSE bug 1023762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5897">SUSE bug 1023762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5897">SUSE bug 1023762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5897">SUSE bug 1023762</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5897">SUSE bug 1023762</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148765" comment="kernel-debug-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148766" comment="kernel-debug-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148767" comment="kernel-debug-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148768" comment="kernel-default-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148769" comment="kernel-default-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148770" comment="kernel-default-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148771" comment="kernel-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148772" comment="kernel-docs-4.1.38-50.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148773" comment="kernel-docs-html-4.1.38-50.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148774" comment="kernel-docs-pdf-4.1.38-50.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148775" comment="kernel-ec2-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148776" comment="kernel-ec2-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148777" comment="kernel-ec2-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148778" comment="kernel-macros-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148779" comment="kernel-obs-build-4.1.38-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148780" comment="kernel-obs-qa-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148781" comment="kernel-pae-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148782" comment="kernel-pae-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148783" comment="kernel-pae-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148784" comment="kernel-pv-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148785" comment="kernel-pv-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148786" comment="kernel-pv-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148787" comment="kernel-source-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148788" comment="kernel-source-vanilla-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148789" comment="kernel-syms-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148790" comment="kernel-vanilla-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148791" comment="kernel-vanilla-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148792" comment="kernel-xen-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148793" comment="kernel-xen-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148794" comment="kernel-xen-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5898</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5898" source="CVE"/>
    <description>
    Integer overflow in the emulated_apdu_from_guest function in usb/dev-smartcard-reader.c in Quick Emulator (Qemu), when built with the CCID Card device emulator support, allows local users to cause a denial of service (application crash) via a large Application Protocol Data Units (APDU) unit.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5898.html">CVE-2017-5898</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5898">SUSE bug 1023907</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5898">SUSE bug 1023907</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5898">SUSE bug 1024307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5898">SUSE bug 1024307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5898">SUSE bug 1023907</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5898">SUSE bug 1023907</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5898">SUSE bug 1023907</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5898">SUSE bug 1024307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5898">SUSE bug 1023907</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5898">SUSE bug 1024307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5898">SUSE bug 1023907</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5898">SUSE bug 1024307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5898">SUSE bug 1024307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5898">SUSE bug 1024307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5898">SUSE bug 1024307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5898">SUSE bug 1024307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5898">SUSE bug 1024307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5898">SUSE bug 1024307</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5898">SUSE bug 1024307</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155579" comment="qemu-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155580" comment="qemu-arm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155581" comment="qemu-block-curl-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155582" comment="qemu-block-rbd-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155583" comment="qemu-extra-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155584" comment="qemu-guest-agent-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155585" comment="qemu-ipxe-1.0.0-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155586" comment="qemu-kvm-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155587" comment="qemu-lang-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155588" comment="qemu-linux-user-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155589" comment="qemu-ppc-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155590" comment="qemu-s390-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155591" comment="qemu-seabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155592" comment="qemu-sgabios-8-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155593" comment="qemu-testsuite-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155594" comment="qemu-tools-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155595" comment="qemu-vgabios-1.8.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155596" comment="qemu-x86-2.3.1-25.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5930</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5930" source="CVE"/>
    <description>
    The AliasHandler component in PostfixAdmin before 3.0.2 allows remote authenticated domain admins to delete protected aliases via the delete parameter to delete.php, involving a missing permission check.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5930.html">CVE-2017-5930</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5930">SUSE bug 1024211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5930">SUSE bug 1024211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5930">SUSE bug 1024211</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5930">SUSE bug 1024211</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148528" comment="postfixadmin-3.0.2-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154028" comment="postfixadmin is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5938</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5938" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the nav_path function in lib/viewvc.py in ViewVC before 1.0.14 and 1.1.x before 1.1.26 allows remote attackers to inject arbitrary web script or HTML via the nav_data name.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5938.html">CVE-2017-5938</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5938">SUSE bug 1024393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5938">SUSE bug 1024393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5938">SUSE bug 1024393</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5938">SUSE bug 1024393</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148626" comment="viewvc-1.1.26-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151738" comment="viewvc is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5951</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5951" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5951" source="CVE"/>
    <description>
    The mem_get_bits_rectangle function in base/gdevmem.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5951.html">CVE-2017-5951</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5951">SUSE bug 1032114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5951">SUSE bug 1032114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5951">SUSE bug 1032114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5951">SUSE bug 1032114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5951">SUSE bug 1032114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5951">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5951">SUSE bug 1032114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5951">SUSE bug 1032114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5951">SUSE bug 1032114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5951">SUSE bug 1032114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5951">SUSE bug 1032114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5951">SUSE bug 1032114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5951">SUSE bug 1032114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5951">SUSE bug 1032114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5951">SUSE bug 1032114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5951">SUSE bug 1032114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5951">SUSE bug 1032114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5951">SUSE bug 1032114</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5951">SUSE bug 1032114</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155225" comment="ghostscript-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155226" comment="ghostscript-devel-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135535" comment="ghostscript-mini-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135536" comment="ghostscript-mini-devel-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155227" comment="ghostscript-x11-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5953</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5953" source="CVE"/>
    <description>
    vim before patch 8.0.0322 does not properly validate values for tree length when handling a spell file, which may result in an integer overflow at a memory allocation site and a resultant buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5953.html">CVE-2017-5953</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5953">SUSE bug 1024724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5953">SUSE bug 1024724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5953">SUSE bug 1024724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5953">SUSE bug 1024724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5953">SUSE bug 1024724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5953">SUSE bug 1024724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5953">SUSE bug 1024724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5953">SUSE bug 1024724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5953">SUSE bug 1024724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5953">SUSE bug 1024724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5953">SUSE bug 1024724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5953">SUSE bug 1024724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5953">SUSE bug 1024724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5953">SUSE bug 1024724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5953">SUSE bug 1024724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5953">SUSE bug 1024724</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5953">SUSE bug 1024724</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148649" comment="gvim-7.4.326-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151192" comment="gvim is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148650" comment="vim-7.4.326-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151193" comment="vim is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148651" comment="vim-data-7.4.326-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151194" comment="vim-data is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5970</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970" source="CVE"/>
    <description>
    The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5970.html">CVE-2017-5970</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1025013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1025013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1025013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1025013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1025013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1025013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1025013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1025013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1025013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1025013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1025013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1025013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1025013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1025013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1025013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1025013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1025013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1025013</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1024938</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5970">SUSE bug 1025013</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148765" comment="kernel-debug-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148766" comment="kernel-debug-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148767" comment="kernel-debug-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148768" comment="kernel-default-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148769" comment="kernel-default-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148770" comment="kernel-default-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148771" comment="kernel-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148772" comment="kernel-docs-4.1.38-50.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148773" comment="kernel-docs-html-4.1.38-50.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148774" comment="kernel-docs-pdf-4.1.38-50.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148775" comment="kernel-ec2-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148776" comment="kernel-ec2-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148777" comment="kernel-ec2-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148778" comment="kernel-macros-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148779" comment="kernel-obs-build-4.1.38-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148780" comment="kernel-obs-qa-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148781" comment="kernel-pae-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148782" comment="kernel-pae-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148783" comment="kernel-pae-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148784" comment="kernel-pv-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148785" comment="kernel-pv-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148786" comment="kernel-pv-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148787" comment="kernel-source-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148788" comment="kernel-source-vanilla-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148789" comment="kernel-syms-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148790" comment="kernel-vanilla-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148791" comment="kernel-vanilla-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148792" comment="kernel-xen-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148793" comment="kernel-xen-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148794" comment="kernel-xen-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5974</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5974" source="CVE"/>
    <description>
    Heap-based buffer overflow in the __zzip_get32 function in fetch.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (crash) via a crafted ZIP file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5974.html">CVE-2017-5974</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5974">SUSE bug 1024517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5974">SUSE bug 1024517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5974">SUSE bug 1024517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5974">SUSE bug 1024517</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5974">SUSE bug 1024517</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155238" comment="libzzip-0-13-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155239" comment="libzzip-0-13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155240" comment="libzzip-0-13-32bit-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155241" comment="libzzip-0-13-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155242" comment="zziplib-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155243" comment="zziplib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155244" comment="zziplib-devel-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155245" comment="zziplib-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155246" comment="zziplib-devel-32bit-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155247" comment="zziplib-devel-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5975</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5975" source="CVE"/>
    <description>
    Heap-based buffer overflow in the __zzip_get64 function in fetch.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (crash) via a crafted ZIP file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5975.html">CVE-2017-5975</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5975">SUSE bug 1024528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5975">SUSE bug 1024528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5975">SUSE bug 1024528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5975">SUSE bug 1024528</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5975">SUSE bug 1024528</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155238" comment="libzzip-0-13-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155239" comment="libzzip-0-13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155240" comment="libzzip-0-13-32bit-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155241" comment="libzzip-0-13-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155242" comment="zziplib-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155243" comment="zziplib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155244" comment="zziplib-devel-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155245" comment="zziplib-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155246" comment="zziplib-devel-32bit-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155247" comment="zziplib-devel-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5976</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5976" source="CVE"/>
    <description>
    Heap-based buffer overflow in the zzip_mem_entry_extra_block function in memdisk.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (crash) via a crafted ZIP file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5976.html">CVE-2017-5976</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5976">SUSE bug 1024531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5976">SUSE bug 1024531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5976">SUSE bug 1024531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5976">SUSE bug 1024531</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5976">SUSE bug 1024531</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155238" comment="libzzip-0-13-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155239" comment="libzzip-0-13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155240" comment="libzzip-0-13-32bit-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155241" comment="libzzip-0-13-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155242" comment="zziplib-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155243" comment="zziplib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155244" comment="zziplib-devel-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155245" comment="zziplib-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155246" comment="zziplib-devel-32bit-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155247" comment="zziplib-devel-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5977</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5977" source="CVE"/>
    <description>
    The zzip_mem_entry_extra_block function in memdisk.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted ZIP file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5977.html">CVE-2017-5977</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5977">SUSE bug 1024534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5977">SUSE bug 1024534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5977">SUSE bug 1024534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5977">SUSE bug 1024534</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5977">SUSE bug 1024534</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155238" comment="libzzip-0-13-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155239" comment="libzzip-0-13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155240" comment="libzzip-0-13-32bit-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155241" comment="libzzip-0-13-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155242" comment="zziplib-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155243" comment="zziplib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155244" comment="zziplib-devel-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155245" comment="zziplib-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155246" comment="zziplib-devel-32bit-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155247" comment="zziplib-devel-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5978</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5978" source="CVE"/>
    <description>
    The zzip_mem_entry_new function in memdisk.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted ZIP file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5978.html">CVE-2017-5978</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5978">SUSE bug 1024533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5978">SUSE bug 1024533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5978">SUSE bug 1024533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5978">SUSE bug 1024533</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5978">SUSE bug 1024533</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155238" comment="libzzip-0-13-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155239" comment="libzzip-0-13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155240" comment="libzzip-0-13-32bit-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155241" comment="libzzip-0-13-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155242" comment="zziplib-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155243" comment="zziplib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155244" comment="zziplib-devel-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155245" comment="zziplib-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155246" comment="zziplib-devel-32bit-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155247" comment="zziplib-devel-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5979</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5979" source="CVE"/>
    <description>
    The prescan_entry function in fseeko.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted ZIP file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5979.html">CVE-2017-5979</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5979">SUSE bug 1024535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5979">SUSE bug 1024535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5979">SUSE bug 1024535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5979">SUSE bug 1024535</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5979">SUSE bug 1024535</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155238" comment="libzzip-0-13-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155239" comment="libzzip-0-13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155240" comment="libzzip-0-13-32bit-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155241" comment="libzzip-0-13-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155242" comment="zziplib-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155243" comment="zziplib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155244" comment="zziplib-devel-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155245" comment="zziplib-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155246" comment="zziplib-devel-32bit-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155247" comment="zziplib-devel-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5980</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5980" source="CVE"/>
    <description>
    The zzip_mem_entry_new function in memdisk.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted ZIP file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5980.html">CVE-2017-5980</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5980">SUSE bug 1024536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5980">SUSE bug 1024536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5980">SUSE bug 1024536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5980">SUSE bug 1024536</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5980">SUSE bug 1024536</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155238" comment="libzzip-0-13-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155239" comment="libzzip-0-13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155240" comment="libzzip-0-13-32bit-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155241" comment="libzzip-0-13-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155242" comment="zziplib-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155243" comment="zziplib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155244" comment="zziplib-devel-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155245" comment="zziplib-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155246" comment="zziplib-devel-32bit-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155247" comment="zziplib-devel-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5981</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5981" source="CVE"/>
    <description>
    seeko.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (assertion failure and crash) via a crafted ZIP file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5981.html">CVE-2017-5981</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5981">SUSE bug 1024539</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5981">SUSE bug 1024539</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5981">SUSE bug 1024539</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5981">SUSE bug 1024539</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5981">SUSE bug 1024539</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155238" comment="libzzip-0-13-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155239" comment="libzzip-0-13 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155240" comment="libzzip-0-13-32bit-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155241" comment="libzzip-0-13-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155242" comment="zziplib-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155243" comment="zziplib is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155244" comment="zziplib-devel-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155245" comment="zziplib-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155246" comment="zziplib-devel-32bit-0.13.62-10.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155247" comment="zziplib-devel-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5985</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5985" source="CVE"/>
    <description>
    lxc-user-nic in Linux Containers (LXC) allows local users with a lxc-usernet allocation to create network interfaces on the host and choose the name of those interfaces by leveraging lack of netns ownership check.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5985.html">CVE-2017-5985</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5985">SUSE bug 1028264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5985">SUSE bug 1028264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5985">SUSE bug 1028264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5985">SUSE bug 1028264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5985">SUSE bug 1028264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5985">SUSE bug 1028264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5985">SUSE bug 1028264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5985">SUSE bug 1028264</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5985">SUSE bug 1028264</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009151003" comment="lxc-1.1.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153860" comment="lxc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009151004" comment="lxc-devel-1.1.5-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153861" comment="lxc-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5986</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-5986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986" source="CVE"/>
    <description>
    Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-5986.html">CVE-2017-5986</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-5986">SUSE bug 1025235</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148765" comment="kernel-debug-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148766" comment="kernel-debug-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148767" comment="kernel-debug-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148768" comment="kernel-default-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148769" comment="kernel-default-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148770" comment="kernel-default-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148771" comment="kernel-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148772" comment="kernel-docs-4.1.38-50.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148773" comment="kernel-docs-html-4.1.38-50.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148774" comment="kernel-docs-pdf-4.1.38-50.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148775" comment="kernel-ec2-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148776" comment="kernel-ec2-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148777" comment="kernel-ec2-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148778" comment="kernel-macros-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148779" comment="kernel-obs-build-4.1.38-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148780" comment="kernel-obs-qa-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148781" comment="kernel-pae-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148782" comment="kernel-pae-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148783" comment="kernel-pae-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148784" comment="kernel-pv-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148785" comment="kernel-pv-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148786" comment="kernel-pv-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148787" comment="kernel-source-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148788" comment="kernel-source-vanilla-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148789" comment="kernel-syms-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148790" comment="kernel-vanilla-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148791" comment="kernel-vanilla-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148792" comment="kernel-xen-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148793" comment="kernel-xen-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148794" comment="kernel-xen-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6074</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" source="CVE"/>
    <description>
    The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6074.html">CVE-2017-6074</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1033287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1033287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1033287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1033287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1033287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1033287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1033287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1033287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1033287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1033287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1033287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1033287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1033287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1033287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1033287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1033287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1033287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1033287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1033287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1033287</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6074">SUSE bug 1026024</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148765" comment="kernel-debug-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148766" comment="kernel-debug-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148767" comment="kernel-debug-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148768" comment="kernel-default-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148769" comment="kernel-default-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148770" comment="kernel-default-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148771" comment="kernel-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148772" comment="kernel-docs-4.1.38-50.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148773" comment="kernel-docs-html-4.1.38-50.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148774" comment="kernel-docs-pdf-4.1.38-50.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148775" comment="kernel-ec2-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148776" comment="kernel-ec2-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148777" comment="kernel-ec2-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148778" comment="kernel-macros-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148779" comment="kernel-obs-build-4.1.38-50.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148780" comment="kernel-obs-qa-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148781" comment="kernel-pae-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148782" comment="kernel-pae-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148783" comment="kernel-pae-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148784" comment="kernel-pv-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148785" comment="kernel-pv-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148786" comment="kernel-pv-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148787" comment="kernel-source-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148788" comment="kernel-source-vanilla-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148789" comment="kernel-syms-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148790" comment="kernel-vanilla-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148791" comment="kernel-vanilla-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148792" comment="kernel-xen-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148793" comment="kernel-xen-base-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009148794" comment="kernel-xen-devel-4.1.38-50.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6188</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6188" source="CVE"/>
    <description>
    Munin before 2.999.6 has a local file write vulnerability when CGI graphs are enabled. Setting multiple upper_limit GET parameters allows overwriting any file accessible to the www-data user.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6188.html">CVE-2017-6188</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6188">SUSE bug 1026539</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6188">SUSE bug 1026539</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6188">SUSE bug 1026539</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6188">SUSE bug 1026539</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6188">SUSE bug 1026539</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6188">SUSE bug 1026539</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149318" comment="munin-2.0.25-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154029" comment="munin is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149319" comment="munin-node-2.0.25-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154030" comment="munin-node is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6214</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214" source="CVE"/>
    <description>
    The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6214.html">CVE-2017-6214</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6214">SUSE bug 1026722</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150436" comment="kernel-debug-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150437" comment="kernel-debug-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150438" comment="kernel-debug-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150439" comment="kernel-default-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150440" comment="kernel-default-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150441" comment="kernel-default-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150442" comment="kernel-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150443" comment="kernel-docs-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150444" comment="kernel-docs-html-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150445" comment="kernel-docs-pdf-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150446" comment="kernel-ec2-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150447" comment="kernel-ec2-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150448" comment="kernel-ec2-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150449" comment="kernel-macros-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150450" comment="kernel-obs-build-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150451" comment="kernel-obs-qa-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150452" comment="kernel-pae-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150453" comment="kernel-pae-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150454" comment="kernel-pae-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150455" comment="kernel-pv-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150456" comment="kernel-pv-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150457" comment="kernel-pv-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150458" comment="kernel-source-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150459" comment="kernel-source-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150460" comment="kernel-syms-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150461" comment="kernel-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150462" comment="kernel-vanilla-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150463" comment="kernel-xen-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150464" comment="kernel-xen-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150465" comment="kernel-xen-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6318</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6318" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6318" source="CVE"/>
    <description>
    saned in sane-backends 1.0.25 allows remote attackers to obtain sensitive memory information via a crafted SANE_NET_CONTROL_OPTION packet.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6318.html">CVE-2017-6318</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6318">SUSE bug 1027197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6318">SUSE bug 1027197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6318">SUSE bug 1027197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6318">SUSE bug 1027197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6318">SUSE bug 1027197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6318">SUSE bug 1027197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6318">SUSE bug 1027197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6318">SUSE bug 1027197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6318">SUSE bug 1027197</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6318">SUSE bug 1027197</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149440" comment="sane-backends-1.0.24-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154031" comment="sane-backends is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149441" comment="sane-backends-32bit-1.0.24-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154032" comment="sane-backends-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149442" comment="sane-backends-autoconfig-1.0.24-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154033" comment="sane-backends-autoconfig is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149443" comment="sane-backends-devel-1.0.24-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154034" comment="sane-backends-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6335</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6335" source="CVE"/>
    <description>
    The QuantumTransferMode function in coders/tiff.c in GraphicsMagick 1.3.25 and earlier allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a small samples per pixel value in a CMYKA TIFF file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6335.html">CVE-2017-6335</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6335">SUSE bug 1027255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6335">SUSE bug 1027255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6335">SUSE bug 1027255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6335">SUSE bug 1027255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6335">SUSE bug 1027255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6335">SUSE bug 1027255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6335">SUSE bug 1027255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6335">SUSE bug 1027255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6335">SUSE bug 1027255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6335">SUSE bug 1027255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6335">SUSE bug 1027255</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6335">SUSE bug 1027255</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150258" comment="GraphicsMagick-1.3.21-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150259" comment="GraphicsMagick-devel-1.3.21-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150260" comment="libGraphicsMagick++-Q16-11-1.3.21-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150261" comment="libGraphicsMagick++-devel-1.3.21-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150262" comment="libGraphicsMagick-Q16-3-1.3.21-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150263" comment="libGraphicsMagick3-config-1.3.21-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150264" comment="libGraphicsMagickWand-Q16-2-1.3.21-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150265" comment="perl-GraphicsMagick-1.3.21-29.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6345</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6345" source="CVE"/>
    <description>
    The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6345.html">CVE-2017-6345</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6345">SUSE bug 1027190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6345">SUSE bug 1027190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6345">SUSE bug 1027190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6345">SUSE bug 1027190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6345">SUSE bug 1027190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6345">SUSE bug 1027190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6345">SUSE bug 1027190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6345">SUSE bug 1027190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6345">SUSE bug 1027190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6345">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6345">SUSE bug 1027190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6345">SUSE bug 1027190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6345">SUSE bug 1027190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6345">SUSE bug 1027190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6345">SUSE bug 1027190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6345">SUSE bug 1027190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6345">SUSE bug 1027190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6345">SUSE bug 1027190</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6345">SUSE bug 1027190</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150436" comment="kernel-debug-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150437" comment="kernel-debug-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150438" comment="kernel-debug-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150439" comment="kernel-default-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150440" comment="kernel-default-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150441" comment="kernel-default-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150442" comment="kernel-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150443" comment="kernel-docs-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150444" comment="kernel-docs-html-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150445" comment="kernel-docs-pdf-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150446" comment="kernel-ec2-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150447" comment="kernel-ec2-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150448" comment="kernel-ec2-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150449" comment="kernel-macros-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150450" comment="kernel-obs-build-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150451" comment="kernel-obs-qa-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150452" comment="kernel-pae-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150453" comment="kernel-pae-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150454" comment="kernel-pae-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150455" comment="kernel-pv-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150456" comment="kernel-pv-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150457" comment="kernel-pv-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150458" comment="kernel-source-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150459" comment="kernel-source-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150460" comment="kernel-syms-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150461" comment="kernel-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150462" comment="kernel-vanilla-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150463" comment="kernel-xen-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150464" comment="kernel-xen-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150465" comment="kernel-xen-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6346</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6346" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6346" source="CVE"/>
    <description>
    Race condition in net/packet/af_packet.c in the Linux kernel before 4.9.13 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6346.html">CVE-2017-6346</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1027189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1027189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1027189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1027189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1027189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1027189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1027189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1027189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1027189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1027189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1027189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1027189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1027189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1027189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1027189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1027189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1027189</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1064388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1064388</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6346">SUSE bug 1064388</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150436" comment="kernel-debug-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150437" comment="kernel-debug-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150438" comment="kernel-debug-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150439" comment="kernel-default-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150440" comment="kernel-default-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150441" comment="kernel-default-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150442" comment="kernel-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150443" comment="kernel-docs-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150444" comment="kernel-docs-html-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150445" comment="kernel-docs-pdf-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150446" comment="kernel-ec2-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150447" comment="kernel-ec2-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150448" comment="kernel-ec2-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150449" comment="kernel-macros-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150450" comment="kernel-obs-build-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150451" comment="kernel-obs-qa-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150452" comment="kernel-pae-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150453" comment="kernel-pae-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150454" comment="kernel-pae-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150455" comment="kernel-pv-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150456" comment="kernel-pv-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150457" comment="kernel-pv-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150458" comment="kernel-source-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150459" comment="kernel-source-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150460" comment="kernel-syms-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150461" comment="kernel-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150462" comment="kernel-vanilla-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150463" comment="kernel-xen-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150464" comment="kernel-xen-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150465" comment="kernel-xen-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6347</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6347" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6347" source="CVE"/>
    <description>
    The ip_cmsg_recv_checksum function in net/ipv4/ip_sockglue.c in the Linux kernel before 4.10.1 has incorrect expectations about skb data layout, which allows local users to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted system calls, as demonstrated by use of the MSG_MORE flag in conjunction with loopback UDP transmission.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6347.html">CVE-2017-6347</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6347">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6347">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6347">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6347">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6347">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6347">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6347">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6347">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6347">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6347">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6347">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6347">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6347">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6347">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6347">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6347">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6347">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6347">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6347">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6347">SUSE bug 1027179</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150436" comment="kernel-debug-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150437" comment="kernel-debug-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150438" comment="kernel-debug-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150439" comment="kernel-default-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150440" comment="kernel-default-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150441" comment="kernel-default-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150442" comment="kernel-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150443" comment="kernel-docs-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150444" comment="kernel-docs-html-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150445" comment="kernel-docs-pdf-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150446" comment="kernel-ec2-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150447" comment="kernel-ec2-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150448" comment="kernel-ec2-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150449" comment="kernel-macros-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150450" comment="kernel-obs-build-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150451" comment="kernel-obs-qa-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150452" comment="kernel-pae-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150453" comment="kernel-pae-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150454" comment="kernel-pae-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150455" comment="kernel-pv-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150456" comment="kernel-pv-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150457" comment="kernel-pv-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150458" comment="kernel-source-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150459" comment="kernel-source-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150460" comment="kernel-syms-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150461" comment="kernel-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150462" comment="kernel-vanilla-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150463" comment="kernel-xen-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150464" comment="kernel-xen-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150465" comment="kernel-xen-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6348</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348" source="CVE"/>
    <description>
    The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6348.html">CVE-2017-6348</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6348">SUSE bug 1027178</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150436" comment="kernel-debug-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150437" comment="kernel-debug-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150438" comment="kernel-debug-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150439" comment="kernel-default-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150440" comment="kernel-default-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150441" comment="kernel-default-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150442" comment="kernel-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150443" comment="kernel-docs-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150444" comment="kernel-docs-html-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150445" comment="kernel-docs-pdf-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150446" comment="kernel-ec2-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150447" comment="kernel-ec2-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150448" comment="kernel-ec2-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150449" comment="kernel-macros-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150450" comment="kernel-obs-build-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150451" comment="kernel-obs-qa-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150452" comment="kernel-pae-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150453" comment="kernel-pae-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150454" comment="kernel-pae-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150455" comment="kernel-pv-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150456" comment="kernel-pv-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150457" comment="kernel-pv-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150458" comment="kernel-source-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150459" comment="kernel-source-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150460" comment="kernel-syms-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150461" comment="kernel-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150462" comment="kernel-vanilla-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150463" comment="kernel-xen-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150464" comment="kernel-xen-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150465" comment="kernel-xen-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6353</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353" source="CVE"/>
    <description>
    net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6353.html">CVE-2017-6353</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1025235</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6353">SUSE bug 1027066</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150436" comment="kernel-debug-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150437" comment="kernel-debug-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150438" comment="kernel-debug-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150439" comment="kernel-default-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150440" comment="kernel-default-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150441" comment="kernel-default-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150442" comment="kernel-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150443" comment="kernel-docs-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150444" comment="kernel-docs-html-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150445" comment="kernel-docs-pdf-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150446" comment="kernel-ec2-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150447" comment="kernel-ec2-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150448" comment="kernel-ec2-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150449" comment="kernel-macros-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150450" comment="kernel-obs-build-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150451" comment="kernel-obs-qa-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150452" comment="kernel-pae-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150453" comment="kernel-pae-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150454" comment="kernel-pae-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150455" comment="kernel-pv-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150456" comment="kernel-pv-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150457" comment="kernel-pv-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150458" comment="kernel-source-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150459" comment="kernel-source-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150460" comment="kernel-syms-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150461" comment="kernel-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150462" comment="kernel-vanilla-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150463" comment="kernel-xen-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150464" comment="kernel-xen-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150465" comment="kernel-xen-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6384</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6384" source="CVE"/>
    <description>
    Memory leak in the login_user function in saslserv/main.c in saslserv/main.so in Atheme 7.2.7 allows a remote unauthenticated attacker to consume memory and cause a denial of service. This is fixed in 7.2.8.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6384.html">CVE-2017-6384</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6384">SUSE bug 1027614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6384">SUSE bug 1027614</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6384">SUSE bug 1027614</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150929" comment="atheme-7.2.9-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152588" comment="atheme is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150930" comment="atheme-devel-7.2.9-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152589" comment="atheme-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150931" comment="libathemecore1-7.2.9-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152590" comment="libathemecore1 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6410</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6410" source="CVE"/>
    <description>
    kpac/script.cpp in KDE kio before 5.32 and kdelibs before 4.14.30 calls the PAC FindProxyForURL function with a full https URL (potentially including Basic Authentication credentials, a query string, or PATH_INFO), which allows remote attackers to obtain sensitive information via a crafted PAC file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6410.html">CVE-2017-6410</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6410">SUSE bug 1027309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6410">SUSE bug 1027520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6410">SUSE bug 1027309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6410">SUSE bug 1027520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6410">SUSE bug 1027309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6410">SUSE bug 1027520</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6410">SUSE bug 1027520</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149511" comment="kdelibs4-4.14.18-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152123" comment="kdelibs4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149512" comment="kdelibs4-apidocs-4.14.18-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154035" comment="kdelibs4-apidocs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149513" comment="kdelibs4-branding-upstream-4.14.18-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154036" comment="kdelibs4-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149514" comment="kdelibs4-core-4.14.18-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152124" comment="kdelibs4-core is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149515" comment="kdelibs4-doc-4.14.18-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152125" comment="kdelibs4-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149516" comment="kio-5.21.0-23.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154037" comment="kio is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149517" comment="kio-32bit-5.21.0-23.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154038" comment="kio-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149518" comment="kio-core-5.21.0-23.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154039" comment="kio-core is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149519" comment="kio-core-32bit-5.21.0-23.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154040" comment="kio-core-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149520" comment="kio-devel-5.21.0-23.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154041" comment="kio-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149521" comment="kio-devel-32bit-5.21.0-23.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154042" comment="kio-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149522" comment="kio-lang-5.21.0-23.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154043" comment="kio-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149523" comment="libkde4-4.14.18-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152126" comment="libkde4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149524" comment="libkde4-32bit-4.14.18-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154044" comment="libkde4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149525" comment="libkde4-devel-4.14.18-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152127" comment="libkde4-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149526" comment="libkdecore4-4.14.18-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152128" comment="libkdecore4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149527" comment="libkdecore4-32bit-4.14.18-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154045" comment="libkdecore4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149528" comment="libkdecore4-devel-4.14.18-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152129" comment="libkdecore4-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149529" comment="libksuseinstall-devel-4.14.18-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154046" comment="libksuseinstall-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149530" comment="libksuseinstall1-4.14.18-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152130" comment="libksuseinstall1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149531" comment="libksuseinstall1-32bit-4.14.18-15.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154047" comment="libksuseinstall1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6451</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6451" source="CVE"/>
    <description>
    The mx4200_send function in the legacy MX4200 refclock in NTP before 4.2.8p10 and 4.3.x before 4.3.94 does not properly handle the return value of the snprintf function, which allows local users to execute arbitrary code via unspecified vectors, which trigger an out-of-bounds memory write.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6451.html">CVE-2017-6451</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6451">SUSE bug 1030050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6451">SUSE bug 1030050</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154755" comment="ntp-4.2.8p10-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154756" comment="ntp-doc-4.2.8p10-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6458</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6458" source="CVE"/>
    <description>
    Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6458.html">CVE-2017-6458</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6458">SUSE bug 1030050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6458">SUSE bug 1030050</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154755" comment="ntp-4.2.8p10-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154756" comment="ntp-doc-4.2.8p10-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6460</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6460" source="CVE"/>
    <description>
    Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6460.html">CVE-2017-6460</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6460">SUSE bug 1030050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6460">SUSE bug 1030050</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154755" comment="ntp-4.2.8p10-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154756" comment="ntp-doc-4.2.8p10-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6462</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6462" source="CVE"/>
    <description>
    Buffer overflow in the legacy Datum Programmable Time Server (DPTS) refclock driver in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via a crafted /dev/datum device.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6462.html">CVE-2017-6462</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6462">SUSE bug 1030050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6462">SUSE bug 1030050</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154755" comment="ntp-4.2.8p10-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154756" comment="ntp-doc-4.2.8p10-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6463</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6463" source="CVE"/>
    <description>
    NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote authenticated users to cause a denial of service (daemon crash) via an invalid setting in a :config directive, related to the unpeer option.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6463.html">CVE-2017-6463</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6463">SUSE bug 1030050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6463">SUSE bug 1030050</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154755" comment="ntp-4.2.8p10-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154756" comment="ntp-doc-4.2.8p10-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6464</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6464" source="CVE"/>
    <description>
    NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote attackers to cause a denial of service (ntpd crash) via a malformed mode configuration directive.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6464.html">CVE-2017-6464</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6464">SUSE bug 1030050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6464">SUSE bug 1030050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6464">SUSE bug 1030050</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154755" comment="ntp-4.2.8p10-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154756" comment="ntp-doc-4.2.8p10-31.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6503</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6503" source="CVE"/>
    <description>
    WebUI in qBittorrent before 3.3.11 did not escape many values, which could potentially lead to XSS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6503.html">CVE-2017-6503</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6503">SUSE bug 1028072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6503">SUSE bug 1028072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6503">SUSE bug 1028072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6503">SUSE bug 1028072</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6503">SUSE bug 1028072</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149858" comment="qbittorrent-3.3.11-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154048" comment="qbittorrent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149859" comment="qbittorrent-nox-3.3.11-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154049" comment="qbittorrent-nox is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6504</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6504" source="CVE"/>
    <description>
    WebUI in qBittorrent before 3.3.11 did not set the X-Frame-Options header, which could potentially lead to clickjacking.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6504.html">CVE-2017-6504</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6504">SUSE bug 1028073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6504">SUSE bug 1028073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6504">SUSE bug 1028073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6504">SUSE bug 1028073</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6504">SUSE bug 1028073</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149858" comment="qbittorrent-3.3.11-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154048" comment="qbittorrent is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149859" comment="qbittorrent-nox-3.3.11-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154049" comment="qbittorrent-nox is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6507</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6507" source="CVE"/>
    <description>
    An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle 'restart' operations removing AppArmor profiles that aren't found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what's done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6507.html">CVE-2017-6507</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6507">SUSE bug 1029696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6507">SUSE bug 1029696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6507">SUSE bug 1029696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6507">SUSE bug 1029696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6507">SUSE bug 1029696</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6507">SUSE bug 1029696</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150898" comment="apache2-mod_apparmor-2.10.2-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154050" comment="apache2-mod_apparmor is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150899" comment="apparmor-2.10.2-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154051" comment="apparmor is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150900" comment="apparmor-abstractions-2.10.2-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154052" comment="apparmor-abstractions is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150901" comment="apparmor-docs-2.10.2-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154053" comment="apparmor-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150902" comment="apparmor-parser-2.10.2-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154054" comment="apparmor-parser is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150903" comment="apparmor-parser-lang-2.10.2-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154055" comment="apparmor-parser-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150904" comment="apparmor-profiles-2.10.2-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154056" comment="apparmor-profiles is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150905" comment="apparmor-utils-2.10.2-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154057" comment="apparmor-utils is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150906" comment="apparmor-utils-lang-2.10.2-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154058" comment="apparmor-utils-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150907" comment="libapparmor-devel-2.10.2-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154059" comment="libapparmor-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150908" comment="libapparmor1-2.10.2-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154060" comment="libapparmor1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150909" comment="libapparmor1-32bit-2.10.2-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154061" comment="libapparmor1-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150910" comment="pam_apparmor-2.10.2-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154062" comment="pam_apparmor is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150911" comment="pam_apparmor-32bit-2.10.2-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154063" comment="pam_apparmor-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150912" comment="perl-apparmor-2.10.2-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154064" comment="perl-apparmor is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150913" comment="python3-apparmor-2.10.2-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154065" comment="python3-apparmor is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150914" comment="ruby-apparmor-2.10.2-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154066" comment="ruby-apparmor is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6508</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6508" source="CVE"/>
    <description>
    CRLF injection vulnerability in the url_parse function in url.c in Wget through 1.19.1 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in the host subcomponent of a URL.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6508.html">CVE-2017-6508</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6508">SUSE bug 1028301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6508">SUSE bug 1028301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6508">SUSE bug 1028301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6508">SUSE bug 1028301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6508">SUSE bug 1028301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6508">SUSE bug 1028301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6508">SUSE bug 1028301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6508">SUSE bug 1028301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6508">SUSE bug 1028301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6508">SUSE bug 1028301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6508">SUSE bug 1028301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6508">SUSE bug 1028301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6508">SUSE bug 1028301</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6508">SUSE bug 1028301</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150257" comment="wget-1.14-11.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151442" comment="wget is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6542</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6542" source="CVE"/>
    <description>
    The ssh_agent_channel_data function in PuTTY before 0.68 allows remote attackers to have unspecified impact via a large length value in an agent protocol message and leveraging the ability to connect to the Unix-domain socket representing the forwarded agent connection, which trigger a buffer overflow.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6542.html">CVE-2017-6542</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6542">SUSE bug 1029256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6542">SUSE bug 1029256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6542">SUSE bug 1029256</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6542">SUSE bug 1029256</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149686" comment="putty-0.68-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152979" comment="putty is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6596</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6596" source="CVE"/>
    <description>
    partclone.chkimg in partclone 0.2.89 is prone to a heap-based buffer overflow vulnerability due to insufficient validation of the partclone image header. An attacker may be able to launch a 'Denial of Service attack' in the context of the user running the affected application.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6596.html">CVE-2017-6596</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6596">SUSE bug 1028904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6596">SUSE bug 1028904</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6596">SUSE bug 1028904</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149860" comment="partclone-0.3.5a-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154067" comment="partclone is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149861" comment="partclone-lang-0.3.5a-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154068" comment="partclone-lang is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6820</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6820" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6820" source="CVE"/>
    <description>
    rcube_utils.php in Roundcube before 1.1.8 and 1.2.x before 1.2.4 is susceptible to a cross-site scripting vulnerability via a crafted Cascading Style Sheets (CSS) token sequence within an SVG element.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6820.html">CVE-2017-6820</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6820">SUSE bug 1029035</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6820">SUSE bug 1029035</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6820">SUSE bug 1029035</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6820">SUSE bug 1029035</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6820">SUSE bug 1029035</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6820">SUSE bug 1029035</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6820">SUSE bug 1029035</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009149687" comment="roundcubemail-1.1.8-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6827</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6827" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827" source="CVE"/>
    <description>
    Heap-based buffer overflow in the MSADPCM::initializeCoefficients function in MSADPCM.cpp in audiofile (aka libaudiofile and Audio File Library) 0.3.6 allows remote attackers to have unspecified impact via a crafted audio file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6827.html">CVE-2017-6827</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6827">SUSE bug 1026979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6827">SUSE bug 1026979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6827">SUSE bug 1026979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6827">SUSE bug 1026979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6827">SUSE bug 1026979</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6827">SUSE bug 1026979</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154538" comment="audiofile-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153089" comment="audiofile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154539" comment="audiofile-devel-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153090" comment="audiofile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154540" comment="audiofile-devel-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153091" comment="audiofile-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154541" comment="audiofile-doc-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153092" comment="audiofile-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154542" comment="libaudiofile1-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153093" comment="libaudiofile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154543" comment="libaudiofile1-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153094" comment="libaudiofile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6828</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6828" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828" source="CVE"/>
    <description>
    Heap-based buffer overflow in the readValue function in FileHandle.cpp in audiofile (aka libaudiofile and Audio File Library) 0.3.6 allows remote attackers to have unspecified impact via a crafted WAV file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6828.html">CVE-2017-6828</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6828">SUSE bug 1026980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6828">SUSE bug 1026980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6828">SUSE bug 1026980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6828">SUSE bug 1026980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6828">SUSE bug 1026980</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6828">SUSE bug 1026980</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154538" comment="audiofile-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153089" comment="audiofile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154539" comment="audiofile-devel-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153090" comment="audiofile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154540" comment="audiofile-devel-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153091" comment="audiofile-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154541" comment="audiofile-doc-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153092" comment="audiofile-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154542" comment="libaudiofile1-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153093" comment="libaudiofile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154543" comment="libaudiofile1-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153094" comment="libaudiofile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6829</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829" source="CVE"/>
    <description>
    The decodeSample function in IMA.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6829.html">CVE-2017-6829</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6829">SUSE bug 1026981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6829">SUSE bug 1026981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6829">SUSE bug 1026981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6829">SUSE bug 1026981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6829">SUSE bug 1026981</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6829">SUSE bug 1026981</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154538" comment="audiofile-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153089" comment="audiofile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154539" comment="audiofile-devel-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153090" comment="audiofile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154540" comment="audiofile-devel-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153091" comment="audiofile-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154541" comment="audiofile-doc-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153092" comment="audiofile-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154542" comment="libaudiofile1-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153093" comment="libaudiofile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154543" comment="libaudiofile1-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153094" comment="libaudiofile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6830</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830" source="CVE"/>
    <description>
    Heap-based buffer overflow in the alaw2linear_buf function in G711.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6830.html">CVE-2017-6830</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6830">SUSE bug 1026982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6830">SUSE bug 1026982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6830">SUSE bug 1026982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6830">SUSE bug 1026982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6830">SUSE bug 1026982</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6830">SUSE bug 1026982</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154538" comment="audiofile-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153089" comment="audiofile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154539" comment="audiofile-devel-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153090" comment="audiofile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154540" comment="audiofile-devel-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153091" comment="audiofile-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154541" comment="audiofile-doc-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153092" comment="audiofile-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154542" comment="libaudiofile1-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153093" comment="libaudiofile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154543" comment="libaudiofile1-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153094" comment="libaudiofile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6831</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831" source="CVE"/>
    <description>
    Heap-based buffer overflow in the decodeBlockWAVE function in IMA.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6831.html">CVE-2017-6831</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6831">SUSE bug 1026983</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6831">SUSE bug 1026983</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6831">SUSE bug 1026983</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154538" comment="audiofile-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153089" comment="audiofile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154539" comment="audiofile-devel-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153090" comment="audiofile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154540" comment="audiofile-devel-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153091" comment="audiofile-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154541" comment="audiofile-doc-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153092" comment="audiofile-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154542" comment="libaudiofile1-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153093" comment="libaudiofile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154543" comment="libaudiofile1-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153094" comment="libaudiofile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6832</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832" source="CVE"/>
    <description>
    Heap-based buffer overflow in the decodeBlock in MSADPCM.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6832.html">CVE-2017-6832</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6832">SUSE bug 1026984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6832">SUSE bug 1026984</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6832">SUSE bug 1026984</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154538" comment="audiofile-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153089" comment="audiofile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154539" comment="audiofile-devel-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153090" comment="audiofile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154540" comment="audiofile-devel-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153091" comment="audiofile-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154541" comment="audiofile-doc-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153092" comment="audiofile-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154542" comment="libaudiofile1-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153093" comment="libaudiofile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154543" comment="libaudiofile1-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153094" comment="libaudiofile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6833</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833" source="CVE"/>
    <description>
    The runPull function in libaudiofile/modules/BlockCodec.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6833.html">CVE-2017-6833</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6833">SUSE bug 1026985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6833">SUSE bug 1026985</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6833">SUSE bug 1026985</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154538" comment="audiofile-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153089" comment="audiofile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154539" comment="audiofile-devel-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153090" comment="audiofile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154540" comment="audiofile-devel-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153091" comment="audiofile-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154541" comment="audiofile-doc-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153092" comment="audiofile-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154542" comment="libaudiofile1-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153093" comment="libaudiofile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154543" comment="libaudiofile1-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153094" comment="libaudiofile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6834</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ulaw2linear_buf function in G711.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6834.html">CVE-2017-6834</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6834">SUSE bug 1026986</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6834">SUSE bug 1026986</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6834">SUSE bug 1026986</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6834">SUSE bug 1026986</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6834">SUSE bug 1026986</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6834">SUSE bug 1026986</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154538" comment="audiofile-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153089" comment="audiofile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154539" comment="audiofile-devel-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153090" comment="audiofile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154540" comment="audiofile-devel-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153091" comment="audiofile-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154541" comment="audiofile-doc-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153092" comment="audiofile-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154542" comment="libaudiofile1-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153093" comment="libaudiofile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154543" comment="libaudiofile1-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153094" comment="libaudiofile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6835</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835" source="CVE"/>
    <description>
    The reset1 function in libaudiofile/modules/BlockCodec.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6835.html">CVE-2017-6835</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6835">SUSE bug 1026988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6835">SUSE bug 1026988</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6835">SUSE bug 1026988</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154538" comment="audiofile-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153089" comment="audiofile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154539" comment="audiofile-devel-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153090" comment="audiofile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154540" comment="audiofile-devel-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153091" comment="audiofile-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154541" comment="audiofile-doc-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153092" comment="audiofile-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154542" comment="libaudiofile1-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153093" comment="libaudiofile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154543" comment="libaudiofile1-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153094" comment="libaudiofile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6836</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836" source="CVE"/>
    <description>
    Heap-based buffer overflow in the Expand3To4Module::run function in libaudiofile/modules/SimpleModule.h in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6836.html">CVE-2017-6836</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6836">SUSE bug 1026987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6836">SUSE bug 1026987</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6836">SUSE bug 1026987</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154538" comment="audiofile-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153089" comment="audiofile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154539" comment="audiofile-devel-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153090" comment="audiofile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154540" comment="audiofile-devel-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153091" comment="audiofile-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154541" comment="audiofile-doc-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153092" comment="audiofile-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154542" comment="libaudiofile1-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153093" comment="libaudiofile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154543" comment="libaudiofile1-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153094" comment="libaudiofile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6837</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837" source="CVE"/>
    <description>
    WAVE.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via vectors related to a large number of coefficients.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6837.html">CVE-2017-6837</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6837">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6837">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6837">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6837">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6837">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6837">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6837">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6837">SUSE bug 1026978</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154538" comment="audiofile-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153089" comment="audiofile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154539" comment="audiofile-devel-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153090" comment="audiofile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154540" comment="audiofile-devel-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153091" comment="audiofile-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154541" comment="audiofile-doc-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153092" comment="audiofile-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154542" comment="libaudiofile1-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153093" comment="libaudiofile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154543" comment="libaudiofile1-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153094" comment="libaudiofile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6838</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838" source="CVE"/>
    <description>
    Integer overflow in sfcommands/sfconvert.c in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6838.html">CVE-2017-6838</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6838">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6838">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6838">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6838">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6838">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6838">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6838">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6838">SUSE bug 1026978</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154538" comment="audiofile-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153089" comment="audiofile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154539" comment="audiofile-devel-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153090" comment="audiofile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154540" comment="audiofile-devel-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153091" comment="audiofile-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154541" comment="audiofile-doc-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153092" comment="audiofile-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154542" comment="libaudiofile1-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153093" comment="libaudiofile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154543" comment="libaudiofile1-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153094" comment="libaudiofile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6839</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839" source="CVE"/>
    <description>
    Integer overflow in modules/MSADPCM.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6839.html">CVE-2017-6839</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6839">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6839">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6839">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6839">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6839">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6839">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6839">SUSE bug 1026978</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6839">SUSE bug 1026978</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154538" comment="audiofile-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153089" comment="audiofile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154539" comment="audiofile-devel-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153090" comment="audiofile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154540" comment="audiofile-devel-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153091" comment="audiofile-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154541" comment="audiofile-doc-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153092" comment="audiofile-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154542" comment="libaudiofile1-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153093" comment="libaudiofile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154543" comment="libaudiofile1-32bit-0.3.6-12.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153094" comment="libaudiofile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6850</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-6850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6850" source="CVE"/>
    <description>
    The jp2_cdef_destroy function in jp2_cod.c in JasPer before 2.0.13 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-6850.html">CVE-2017-6850</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6850">SUSE bug 1021868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6850">SUSE bug 1021868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6850">SUSE bug 1021868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6850">SUSE bug 1021868</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-6850">SUSE bug 1021868</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154526" comment="jasper-1.900.14-176.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154527" comment="libjasper-devel-1.900.14-176.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154528" comment="libjasper1-1.900.14-176.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151133" comment="libjasper1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154529" comment="libjasper1-32bit-1.900.14-176.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151134" comment="libjasper1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7184</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7184" source="CVE"/>
    <description>
    The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package 4.8.0.41.52.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7184.html">CVE-2017-7184</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030575</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030573</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7184">SUSE bug 1030575</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150436" comment="kernel-debug-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150437" comment="kernel-debug-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150438" comment="kernel-debug-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150439" comment="kernel-default-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150440" comment="kernel-default-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150441" comment="kernel-default-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150442" comment="kernel-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150443" comment="kernel-docs-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150444" comment="kernel-docs-html-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150445" comment="kernel-docs-pdf-4.1.39-53.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150446" comment="kernel-ec2-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150447" comment="kernel-ec2-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150448" comment="kernel-ec2-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150449" comment="kernel-macros-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150450" comment="kernel-obs-build-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150451" comment="kernel-obs-qa-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150452" comment="kernel-pae-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150453" comment="kernel-pae-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150454" comment="kernel-pae-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150455" comment="kernel-pv-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150456" comment="kernel-pv-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150457" comment="kernel-pv-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150458" comment="kernel-source-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150459" comment="kernel-source-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150460" comment="kernel-syms-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150461" comment="kernel-vanilla-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150462" comment="kernel-vanilla-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150463" comment="kernel-xen-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150464" comment="kernel-xen-base-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009150465" comment="kernel-xen-devel-4.1.39-53.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7187</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7187" source="CVE"/>
    <description>
    The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel through 4.10.4 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7187.html">CVE-2017-7187</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7187">SUSE bug 1030213</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155173" comment="kernel-debug-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155174" comment="kernel-debug-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155175" comment="kernel-debug-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155176" comment="kernel-default-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155177" comment="kernel-default-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155178" comment="kernel-default-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155179" comment="kernel-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155180" comment="kernel-docs-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155181" comment="kernel-docs-html-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155182" comment="kernel-docs-pdf-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155183" comment="kernel-ec2-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155184" comment="kernel-ec2-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155185" comment="kernel-ec2-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155186" comment="kernel-macros-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155187" comment="kernel-obs-build-4.1.39-56.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155188" comment="kernel-obs-qa-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155189" comment="kernel-pae-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155190" comment="kernel-pae-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155191" comment="kernel-pae-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155192" comment="kernel-pv-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155193" comment="kernel-pv-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155194" comment="kernel-pv-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155195" comment="kernel-source-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155196" comment="kernel-source-vanilla-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155197" comment="kernel-syms-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155198" comment="kernel-vanilla-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155199" comment="kernel-vanilla-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155200" comment="kernel-xen-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155201" comment="kernel-xen-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155202" comment="kernel-xen-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7207</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7207" source="CVE"/>
    <description>
    The mem_get_bits_rectangle function in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PostScript document.
    </description>
<advisory from="security@suse.de">
<severity>Low</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7207.html">CVE-2017-7207</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7207">SUSE bug 1030263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7207">SUSE bug 1030263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7207">SUSE bug 1030263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7207">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7207">SUSE bug 1030263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7207">SUSE bug 1030263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7207">SUSE bug 1030263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7207">SUSE bug 1030263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7207">SUSE bug 1030263</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7207">SUSE bug 1030263</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155225" comment="ghostscript-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155226" comment="ghostscript-devel-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135535" comment="ghostscript-mini-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135536" comment="ghostscript-mini-devel-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155227" comment="ghostscript-x11-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7261</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7261" source="CVE"/>
    <description>
    The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.5 does not check for a zero value of certain levels data, which allows local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7261.html">CVE-2017-7261</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7261">SUSE bug 1031052</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155173" comment="kernel-debug-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155174" comment="kernel-debug-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155175" comment="kernel-debug-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155176" comment="kernel-default-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155177" comment="kernel-default-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155178" comment="kernel-default-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155179" comment="kernel-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155180" comment="kernel-docs-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155181" comment="kernel-docs-html-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155182" comment="kernel-docs-pdf-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155183" comment="kernel-ec2-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155184" comment="kernel-ec2-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155185" comment="kernel-ec2-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155186" comment="kernel-macros-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155187" comment="kernel-obs-build-4.1.39-56.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155188" comment="kernel-obs-qa-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155189" comment="kernel-pae-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155190" comment="kernel-pae-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155191" comment="kernel-pae-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155192" comment="kernel-pv-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155193" comment="kernel-pv-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155194" comment="kernel-pv-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155195" comment="kernel-source-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155196" comment="kernel-source-vanilla-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155197" comment="kernel-syms-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155198" comment="kernel-vanilla-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155199" comment="kernel-vanilla-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155200" comment="kernel-xen-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155201" comment="kernel-xen-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155202" comment="kernel-xen-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7294</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7294" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7294" source="CVE"/>
    <description>
    The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7294.html">CVE-2017-7294</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031440</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7294">SUSE bug 1031481</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155173" comment="kernel-debug-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155174" comment="kernel-debug-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155175" comment="kernel-debug-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155176" comment="kernel-default-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155177" comment="kernel-default-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155178" comment="kernel-default-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155179" comment="kernel-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155180" comment="kernel-docs-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155181" comment="kernel-docs-html-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155182" comment="kernel-docs-pdf-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155183" comment="kernel-ec2-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155184" comment="kernel-ec2-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155185" comment="kernel-ec2-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155186" comment="kernel-macros-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155187" comment="kernel-obs-build-4.1.39-56.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155188" comment="kernel-obs-qa-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155189" comment="kernel-pae-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155190" comment="kernel-pae-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155191" comment="kernel-pae-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155192" comment="kernel-pv-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155193" comment="kernel-pv-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155194" comment="kernel-pv-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155195" comment="kernel-source-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155196" comment="kernel-source-vanilla-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155197" comment="kernel-syms-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155198" comment="kernel-vanilla-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155199" comment="kernel-vanilla-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155200" comment="kernel-xen-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155201" comment="kernel-xen-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155202" comment="kernel-xen-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7308</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7308" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7308" source="CVE"/>
    <description>
    The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7308.html">CVE-2017-7308</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1027179</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031579</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7308">SUSE bug 1031660</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155173" comment="kernel-debug-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155174" comment="kernel-debug-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155175" comment="kernel-debug-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155176" comment="kernel-default-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155177" comment="kernel-default-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155178" comment="kernel-default-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155179" comment="kernel-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155180" comment="kernel-docs-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155181" comment="kernel-docs-html-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155182" comment="kernel-docs-pdf-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155183" comment="kernel-ec2-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155184" comment="kernel-ec2-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155185" comment="kernel-ec2-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155186" comment="kernel-macros-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155187" comment="kernel-obs-build-4.1.39-56.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155188" comment="kernel-obs-qa-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155189" comment="kernel-pae-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155190" comment="kernel-pae-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155191" comment="kernel-pae-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155192" comment="kernel-pv-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155193" comment="kernel-pv-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155194" comment="kernel-pv-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155195" comment="kernel-source-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155196" comment="kernel-source-vanilla-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155197" comment="kernel-syms-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155198" comment="kernel-vanilla-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155199" comment="kernel-vanilla-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155200" comment="kernel-xen-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155201" comment="kernel-xen-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155202" comment="kernel-xen-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7392</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7392" source="CVE"/>
    <description>
    In TigerVNC 1.7.1 (SSecurityVeNCrypt.cxx SSecurityVeNCrypt::SSecurityVeNCrypt), an unauthenticated client can cause a small memory leak in the server.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7392.html">CVE-2017-7392</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7392">SUSE bug 1031886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7392">SUSE bug 1031886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7392">SUSE bug 1031886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7392">SUSE bug 1031886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7392">SUSE bug 1031886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7392">SUSE bug 1031886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7392">SUSE bug 1031886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7392">SUSE bug 1031886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154544" comment="tigervnc-1.5.0-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152053" comment="tigervnc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154545" comment="xorg-x11-Xvnc-1.5.0-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152054" comment="xorg-x11-Xvnc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7393</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7393" source="CVE"/>
    <description>
    In TigerVNC 1.7.1 (VNCSConnectionST.cxx VNCSConnectionST::fence), an authenticated client can cause a double free, leading to denial of service or potentially code execution.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7393.html">CVE-2017-7393</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7393">SUSE bug 1031875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7393">SUSE bug 1031875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7393">SUSE bug 1031875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7393">SUSE bug 1031879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7393">SUSE bug 1031879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7393">SUSE bug 1031875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7393">SUSE bug 1031875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7393">SUSE bug 1031875</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7393">SUSE bug 1031879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7393">SUSE bug 1031879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7393">SUSE bug 1031875</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154544" comment="tigervnc-1.5.0-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152053" comment="tigervnc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154545" comment="xorg-x11-Xvnc-1.5.0-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152054" comment="xorg-x11-Xvnc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7394</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7394" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7394" source="CVE"/>
    <description>
    In TigerVNC 1.7.1 (SSecurityPlain.cxx SSecurityPlain::processMsg), unauthenticated users can crash the server by sending long usernames.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7394.html">CVE-2017-7394</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7394">SUSE bug 1031879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7394">SUSE bug 1031879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7394">SUSE bug 1031879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7394">SUSE bug 1031879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7394">SUSE bug 1031879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7394">SUSE bug 1031879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7394">SUSE bug 1031879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7394">SUSE bug 1031879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7394">SUSE bug 1031879</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7394">SUSE bug 1031879</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154544" comment="tigervnc-1.5.0-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152053" comment="tigervnc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154545" comment="xorg-x11-Xvnc-1.5.0-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152054" comment="xorg-x11-Xvnc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7395</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7395" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7395" source="CVE"/>
    <description>
    In TigerVNC 1.7.1 (SMsgReader.cxx SMsgReader::readClientCutText), by causing an integer overflow, an authenticated client can crash the server.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7395.html">CVE-2017-7395</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7395">SUSE bug 1031877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7395">SUSE bug 1031877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7395">SUSE bug 1031877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7395">SUSE bug 1031877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7395">SUSE bug 1031877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7395">SUSE bug 1031877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7395">SUSE bug 1031877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7395">SUSE bug 1031877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7395">SUSE bug 1031877</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7395">SUSE bug 1031877</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154544" comment="tigervnc-1.5.0-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152053" comment="tigervnc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154545" comment="xorg-x11-Xvnc-1.5.0-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152054" comment="xorg-x11-Xvnc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7396</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7396" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7396" source="CVE"/>
    <description>
    In TigerVNC 1.7.1 (CConnection.cxx CConnection::CConnection), an unauthenticated client can cause a small memory leak in the server.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7396.html">CVE-2017-7396</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7396">SUSE bug 1031886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7396">SUSE bug 1031886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7396">SUSE bug 1031886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7396">SUSE bug 1031886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7396">SUSE bug 1031886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7396">SUSE bug 1031886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7396">SUSE bug 1031886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7396">SUSE bug 1031886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7396">SUSE bug 1031886</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7396">SUSE bug 1031886</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154544" comment="tigervnc-1.5.0-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152053" comment="tigervnc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154545" comment="xorg-x11-Xvnc-1.5.0-40.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152054" comment="xorg-x11-Xvnc is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7407</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407" source="CVE"/>
    <description>
    The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7407.html">CVE-2017-7407</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7407">SUSE bug 1032309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7407">SUSE bug 1032309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7407">SUSE bug 1032309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7407">SUSE bug 1032309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7407">SUSE bug 1032309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7407">SUSE bug 1032309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7407">SUSE bug 1032309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7407">SUSE bug 1032309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7407">SUSE bug 1032309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7407">SUSE bug 1032309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7407">SUSE bug 1032309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7407">SUSE bug 1032309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7407">SUSE bug 1032309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7407">SUSE bug 1032309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7407">SUSE bug 1032309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7407">SUSE bug 1032309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7407">SUSE bug 1032309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7407">SUSE bug 1032309</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7407">SUSE bug 1032309</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154757" comment="curl-7.37.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154758" comment="libcurl-devel-7.37.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154759" comment="libcurl-devel-32bit-7.37.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154760" comment="libcurl4-7.37.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154761" comment="libcurl4-32bit-7.37.0-19.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7418</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7418" source="CVE"/>
    <description>
    ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks control by replacing a path component (other than the last one) with a symbolic link. The threat model includes an attacker who is not granted full filesystem access by a hosting provider, but can reconfigure the home directory of an FTP user.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7418.html">CVE-2017-7418</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7418">SUSE bug 1032443</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154546" comment="proftpd-1.3.5d-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153640" comment="proftpd is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154547" comment="proftpd-devel-1.3.5d-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153641" comment="proftpd-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154548" comment="proftpd-doc-1.3.5d-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153642" comment="proftpd-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154549" comment="proftpd-lang-1.3.5d-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153643" comment="proftpd-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154550" comment="proftpd-ldap-1.3.5d-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153644" comment="proftpd-ldap is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154551" comment="proftpd-mysql-1.3.5d-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153645" comment="proftpd-mysql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154552" comment="proftpd-pgsql-1.3.5d-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153646" comment="proftpd-pgsql is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154553" comment="proftpd-radius-1.3.5d-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153647" comment="proftpd-radius is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154554" comment="proftpd-sqlite-1.3.5d-7.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009153648" comment="proftpd-sqlite is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7494</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494" source="CVE"/>
    <description>
    Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7494.html">CVE-2017-7494</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7494">SUSE bug 1038231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7494">SUSE bug 1038231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7494">SUSE bug 1038231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7494">SUSE bug 1038231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7494">SUSE bug 1038231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7494">SUSE bug 1038231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7494">SUSE bug 1038231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7494">SUSE bug 1038231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7494">SUSE bug 1038231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7494">SUSE bug 1038231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7494">SUSE bug 1038231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7494">SUSE bug 1040816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7494">SUSE bug 1038231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7494">SUSE bug 1040816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7494">SUSE bug 1038231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7494">SUSE bug 1040816</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7494">SUSE bug 1038231</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7494">SUSE bug 1038231</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156066" comment="ctdb-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156067" comment="ctdb-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152997" comment="ctdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156068" comment="ctdb-tests-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156069" comment="libdcerpc-atsvc-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152724" comment="libdcerpc-atsvc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156070" comment="libdcerpc-atsvc0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152725" comment="libdcerpc-atsvc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156071" comment="libdcerpc-atsvc0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152726" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156072" comment="libdcerpc-binding0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156073" comment="libdcerpc-binding0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156074" comment="libdcerpc-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156075" comment="libdcerpc-samr-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156076" comment="libdcerpc-samr0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156077" comment="libdcerpc-samr0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156078" comment="libdcerpc0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156079" comment="libdcerpc0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156080" comment="libgensec-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152731" comment="libgensec-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156081" comment="libgensec0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151266" comment="libgensec0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156082" comment="libgensec0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151267" comment="libgensec0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156083" comment="libndr-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156084" comment="libndr-krb5pac-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156085" comment="libndr-krb5pac0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156086" comment="libndr-krb5pac0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156087" comment="libndr-nbt-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156088" comment="libndr-nbt0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156089" comment="libndr-nbt0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156090" comment="libndr-standard-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156091" comment="libndr-standard0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156092" comment="libndr-standard0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156093" comment="libndr0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156094" comment="libndr0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156095" comment="libnetapi-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156096" comment="libnetapi0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156097" comment="libnetapi0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156098" comment="libregistry-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152740" comment="libregistry-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156099" comment="libregistry0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151278" comment="libregistry0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156100" comment="libregistry0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152741" comment="libregistry0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156101" comment="libsamba-credentials-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156102" comment="libsamba-credentials0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156103" comment="libsamba-credentials0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156104" comment="libsamba-hostconfig-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156105" comment="libsamba-hostconfig0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156106" comment="libsamba-hostconfig0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156107" comment="libsamba-passdb-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156108" comment="libsamba-passdb0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156109" comment="libsamba-passdb0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156110" comment="libsamba-policy-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156111" comment="libsamba-policy0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156112" comment="libsamba-policy0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156113" comment="libsamba-util-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156114" comment="libsamba-util0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156115" comment="libsamba-util0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156116" comment="libsamdb-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156117" comment="libsamdb0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156118" comment="libsamdb0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156119" comment="libsmbclient-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156120" comment="libsmbclient-raw-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152750" comment="libsmbclient-raw-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156121" comment="libsmbclient-raw0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151290" comment="libsmbclient-raw0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156122" comment="libsmbclient-raw0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151291" comment="libsmbclient-raw0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156123" comment="libsmbclient0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156124" comment="libsmbclient0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156125" comment="libsmbconf-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156126" comment="libsmbconf0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156127" comment="libsmbconf0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156128" comment="libsmbldap-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156129" comment="libsmbldap0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151295" comment="libsmbldap0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156130" comment="libsmbldap0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151296" comment="libsmbldap0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156131" comment="libtevent-util-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156132" comment="libtevent-util0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156133" comment="libtevent-util0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156134" comment="libwbclient-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156135" comment="libwbclient0-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156136" comment="libwbclient0-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156137" comment="samba-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156138" comment="samba-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151302" comment="samba-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156139" comment="samba-client-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156140" comment="samba-client-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156141" comment="samba-core-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156142" comment="samba-doc-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156143" comment="samba-libs-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156144" comment="samba-libs-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156145" comment="samba-pidl-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156146" comment="samba-python-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156147" comment="samba-test-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156148" comment="samba-test-devel-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152779" comment="samba-test-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156149" comment="samba-winbind-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009156150" comment="samba-winbind-32bit-4.2.4-33.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7572</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7572" source="CVE"/>
    <description>
    The _checkPolkitPrivilege function in serviceHelper.py in Back In Time (aka backintime) 1.1.18 and earlier uses a deprecated polkit authorization method (unix-process) that is subject to a race condition (time of check, time of use). With this authorization method, the owner of a process requesting a polkit operation is checked by polkitd via /proc/&lt;pid&gt;/status, by which time the requesting process may have been replaced by a different process with the same PID that has different privileges then the original requester.
    </description>
<advisory from="security@suse.de">
<severity>Critical</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7572.html">CVE-2017-7572</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7572">SUSE bug 1032717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7572">SUSE bug 1032717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7572">SUSE bug 1032717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7572">SUSE bug 1032717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7572">SUSE bug 1032717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7572">SUSE bug 1032717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7572">SUSE bug 1032717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7572">SUSE bug 1032717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7572">SUSE bug 1032717</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7572">SUSE bug 1032717</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154847" comment="backintime-1.1.20-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154848" comment="backintime is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154849" comment="backintime-lang-1.1.20-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154850" comment="backintime-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154851" comment="backintime-qt4-1.1.20-3.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154852" comment="backintime-qt4 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7585</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7585" source="CVE"/>
    <description>
    In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7585.html">CVE-2017-7585</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7585">SUSE bug 1033054</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154762" comment="libsndfile-1.0.25-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152564" comment="libsndfile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154763" comment="libsndfile-devel-1.0.25-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151189" comment="libsndfile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154764" comment="libsndfile-progs-1.0.25-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152565" comment="libsndfile-progs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154765" comment="libsndfile1-1.0.25-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151190" comment="libsndfile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154766" comment="libsndfile1-32bit-1.0.25-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151191" comment="libsndfile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7586</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7586" source="CVE"/>
    <description>
    In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7586.html">CVE-2017-7586</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7586">SUSE bug 1033053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7586">SUSE bug 1033053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7586">SUSE bug 1033053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7586">SUSE bug 1033053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7586">SUSE bug 1033053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7586">SUSE bug 1033053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7586">SUSE bug 1033053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7586">SUSE bug 1033053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7586">SUSE bug 1033053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7586">SUSE bug 1033053</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7586">SUSE bug 1033053</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154762" comment="libsndfile-1.0.25-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152564" comment="libsndfile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154763" comment="libsndfile-devel-1.0.25-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151189" comment="libsndfile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154764" comment="libsndfile-progs-1.0.25-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152565" comment="libsndfile-progs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154765" comment="libsndfile1-1.0.25-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151190" comment="libsndfile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154766" comment="libsndfile1-32bit-1.0.25-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151191" comment="libsndfile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7616</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7616" source="CVE"/>
    <description>
    Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7616.html">CVE-2017-7616</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7616">SUSE bug 1033336</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155173" comment="kernel-debug-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155174" comment="kernel-debug-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155175" comment="kernel-debug-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155176" comment="kernel-default-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155177" comment="kernel-default-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155178" comment="kernel-default-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155179" comment="kernel-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155180" comment="kernel-docs-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155181" comment="kernel-docs-html-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155182" comment="kernel-docs-pdf-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155183" comment="kernel-ec2-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155184" comment="kernel-ec2-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155185" comment="kernel-ec2-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155186" comment="kernel-macros-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155187" comment="kernel-obs-build-4.1.39-56.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155188" comment="kernel-obs-qa-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155189" comment="kernel-pae-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155190" comment="kernel-pae-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155191" comment="kernel-pae-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155192" comment="kernel-pv-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155193" comment="kernel-pv-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155194" comment="kernel-pv-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155195" comment="kernel-source-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155196" comment="kernel-source-vanilla-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155197" comment="kernel-syms-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155198" comment="kernel-vanilla-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155199" comment="kernel-vanilla-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155200" comment="kernel-xen-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155201" comment="kernel-xen-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155202" comment="kernel-xen-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7618</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7618" source="CVE"/>
    <description>
    crypto/ahash.c in the Linux kernel through 4.10.9 allows attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7618.html">CVE-2017-7618</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7618">SUSE bug 1033340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7618">SUSE bug 1033340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7618">SUSE bug 1033340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7618">SUSE bug 1033340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7618">SUSE bug 1033340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7618">SUSE bug 1033340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7618">SUSE bug 1033340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7618">SUSE bug 1033340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7618">SUSE bug 1033340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7618">SUSE bug 1033340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7618">SUSE bug 1033340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7618">SUSE bug 1033340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7618">SUSE bug 1033340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7618">SUSE bug 1033340</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7618">SUSE bug 1033340</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155173" comment="kernel-debug-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155174" comment="kernel-debug-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155175" comment="kernel-debug-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155176" comment="kernel-default-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155177" comment="kernel-default-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155178" comment="kernel-default-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155179" comment="kernel-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155180" comment="kernel-docs-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155181" comment="kernel-docs-html-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155182" comment="kernel-docs-pdf-4.1.39-56.2 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151962" comment="kernel-docs-pdf is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155183" comment="kernel-ec2-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151963" comment="kernel-ec2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155184" comment="kernel-ec2-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151964" comment="kernel-ec2-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155185" comment="kernel-ec2-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151965" comment="kernel-ec2-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155186" comment="kernel-macros-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155187" comment="kernel-obs-build-4.1.39-56.3 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155188" comment="kernel-obs-qa-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155189" comment="kernel-pae-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151969" comment="kernel-pae is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155190" comment="kernel-pae-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151970" comment="kernel-pae-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155191" comment="kernel-pae-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151971" comment="kernel-pae-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155192" comment="kernel-pv-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151972" comment="kernel-pv is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155193" comment="kernel-pv-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151973" comment="kernel-pv-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155194" comment="kernel-pv-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151359" comment="kernel-pv-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155195" comment="kernel-source-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155196" comment="kernel-source-vanilla-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155197" comment="kernel-syms-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155198" comment="kernel-vanilla-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155199" comment="kernel-vanilla-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155200" comment="kernel-xen-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151362" comment="kernel-xen is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155201" comment="kernel-xen-base-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151977" comment="kernel-xen-base is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155202" comment="kernel-xen-devel-4.1.39-56.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151363" comment="kernel-xen-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7741</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7741" source="CVE"/>
    <description>
    In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a segmentation violation (with write memory access) via a specially crafted FLAC file during a resample attempt, a similar issue to CVE-2017-7585.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7741.html">CVE-2017-7741</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033915</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7741">SUSE bug 1033915</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154762" comment="libsndfile-1.0.25-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152564" comment="libsndfile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154763" comment="libsndfile-devel-1.0.25-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151189" comment="libsndfile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154764" comment="libsndfile-progs-1.0.25-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152565" comment="libsndfile-progs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154765" comment="libsndfile1-1.0.25-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151190" comment="libsndfile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154766" comment="libsndfile1-32bit-1.0.25-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151191" comment="libsndfile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7742</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7742" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7742" source="CVE"/>
    <description>
    In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a segmentation violation (with read memory access) via a specially crafted FLAC file during a resample attempt, a similar issue to CVE-2017-7585.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7742.html">CVE-2017-7742</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033054</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033914</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7742">SUSE bug 1033914</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154762" comment="libsndfile-1.0.25-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152564" comment="libsndfile is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154763" comment="libsndfile-devel-1.0.25-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151189" comment="libsndfile-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154764" comment="libsndfile-progs-1.0.25-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152565" comment="libsndfile-progs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154765" comment="libsndfile1-1.0.25-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151190" comment="libsndfile1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154766" comment="libsndfile1-32bit-1.0.25-27.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151191" comment="libsndfile1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7853</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7853" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7853" source="CVE"/>
    <description>
    In libosip2 in GNU oSIP 4.1.0 and 5.0.0, a malformed SIP message can lead to a heap buffer overflow in the msg_osip_body_parse() function defined in osipparser2/osip_message_parse.c, resulting in a remote DoS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7853.html">CVE-2017-7853</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7853">SUSE bug 1034570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7853">SUSE bug 1034570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7853">SUSE bug 1034570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7853">SUSE bug 1034570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7853">SUSE bug 1034570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7853">SUSE bug 1034570</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7853">SUSE bug 1034570</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154843" comment="libosip2-4.1.0-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154844" comment="libosip2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154845" comment="libosip2-devel-4.1.0-5.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154846" comment="libosip2-devel is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7875</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7875" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7875" source="CVE"/>
    <description>
    In wallpaper.c in feh before v2.18.3, if a malicious client pretends to be the E17 window manager, it is possible to trigger an out-of-boundary heap write while receiving an IPC message. An integer overflow leads to a buffer overflow and/or a double free.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7875.html">CVE-2017-7875</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7875">SUSE bug 1034567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7875">SUSE bug 1034567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7875">SUSE bug 1034567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7875">SUSE bug 1034567</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7875">SUSE bug 1034567</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009154882" comment="feh-2.13.1-6.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154883" comment="feh is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7941</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-7941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7941" source="CVE"/>
    <description>
    The ReadSGIImage function in sgi.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-7941.html">CVE-2017-7941</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7941">SUSE bug 1034876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7941">SUSE bug 1034876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7941">SUSE bug 1034876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7941">SUSE bug 1034876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7941">SUSE bug 1034876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7941">SUSE bug 1034876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7941">SUSE bug 1034876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7941">SUSE bug 1034876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7941">SUSE bug 1034876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7941">SUSE bug 1034876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7941">SUSE bug 1034876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7941">SUSE bug 1034876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7941">SUSE bug 1034876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7941">SUSE bug 1034876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7941">SUSE bug 1034876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7941">SUSE bug 1034876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7941">SUSE bug 1034876</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-7941">SUSE bug 1034876</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155041" comment="GraphicsMagick-1.3.21-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155042" comment="GraphicsMagick-devel-1.3.21-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155043" comment="libGraphicsMagick++-Q16-11-1.3.21-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152593" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155044" comment="libGraphicsMagick++-devel-1.3.21-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155045" comment="libGraphicsMagick-Q16-3-1.3.21-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155046" comment="libGraphicsMagick3-config-1.3.21-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155047" comment="libGraphicsMagickWand-Q16-2-1.3.21-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155048" comment="perl-GraphicsMagick-1.3.21-32.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8114</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-8114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8114" source="CVE"/>
    <description>
    Roundcube Webmail allows arbitrary password resets by authenticated users. This affects versions before 1.0.11, 1.1.x before 1.1.9, and 1.2.x before 1.2.5. The problem is caused by an improperly restricted exec call in the virtualmin and sasl drivers of the password plugin.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8114.html">CVE-2017-8114</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8114">SUSE bug 1036955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8114">SUSE bug 1036955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8114">SUSE bug 1036955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8114">SUSE bug 1036955</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8114">SUSE bug 1036955</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155503" comment="roundcubemail-1.1.9-21.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8291</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-8291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8291" source="CVE"/>
    <description>
    Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8291.html">CVE-2017-8291</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8291">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8291">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8291">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8291">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8291">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8291">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8291">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8291">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8291">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8291">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8291">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8291">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8291">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8291">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8291">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8291">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8291">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8291">SUSE bug 1036453</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8291">SUSE bug 1036453</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155225" comment="ghostscript-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155226" comment="ghostscript-devel-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135535" comment="ghostscript-mini-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009135536" comment="ghostscript-mini-devel-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155227" comment="ghostscript-x11-9.15-17.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8364</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-8364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8364" source="CVE"/>
    <description>
    The read_buf function in stream.c in rzip 2.1 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted archive.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8364.html">CVE-2017-8364</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8364">SUSE bug 1036941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8364">SUSE bug 1036941</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8364">SUSE bug 1036941</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155504" comment="rzip-2.1-151.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155505" comment="rzip is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8400</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-8400" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8400" source="CVE"/>
    <description>
    In SWFTools 0.9.2, an out-of-bounds write of heap data can occur in the function png_load() in lib/png.c:755. This issue can be triggered by a malformed PNG file that is mishandled by png2swf. Attackers could exploit this issue for DoS; it might cause arbitrary code execution.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8400.html">CVE-2017-8400</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8400">SUSE bug 1037050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8400">SUSE bug 1037050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8400">SUSE bug 1037050</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8400">SUSE bug 1037050</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155301" comment="swftools-0.9.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155302" comment="swftools is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8401</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-8401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8401" source="CVE"/>
    <description>
    In SWFTools 0.9.2, an out-of-bounds read of heap data can occur in the function png_load() in lib/png.c:724. This issue can be triggered by a malformed PNG file that is mishandled by png2swf. Attackers could exploit this issue for DoS.
    </description>
<advisory from="security@suse.de">
<severity>Moderate</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8401.html">CVE-2017-8401</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8401">SUSE bug 1037051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8401">SUSE bug 1037051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8401">SUSE bug 1037051</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8401">SUSE bug 1037051</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155301" comment="swftools-0.9.2-8.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155302" comment="swftools is signed with openSUSE key"/>
        </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8422</title>
    <affected family="unix">
            <platform>openSUSE Leap 42.1</platform>
    </affected>
    <reference ref_id="CVE-2017-8422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8422" source="CVE"/>
    <description>
    KDE kdelibs before 4.14.32 and KAuth before 5.34 allow local users to gain root privileges by spoofing a callerID and leveraging a privileged helper app.
    </description>
<advisory from="security@suse.de">
<severity>Important</severity>
<cve href="https://www.suse.com/security/cve/CVE-2017-8422.html">CVE-2017-8422</cve>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8422">SUSE bug 1036244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8422">SUSE bug 1036244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8422">SUSE bug 1036244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8422">SUSE bug 1036244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8422">SUSE bug 1036244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8422">SUSE bug 749065</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8422">SUSE bug 869959</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8422">SUSE bug 1033300</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8422">SUSE bug 1036244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8422">SUSE bug 1036244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8422">SUSE bug 1036244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8422">SUSE bug 1041511</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8422">SUSE bug 1036244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8422">SUSE bug 1036244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8422">SUSE bug 1036244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8422">SUSE bug 1036244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8422">SUSE bug 1036244</bugzilla>
<bugzilla href="https://bugzilla.suse.com/CVE-2017-8422">SUSE bug 1036244</bugzilla>
</advisory>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117743" comment="openSUSE Leap 42.1 is installed"/>
      <criteria operator="OR">
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155506" comment="kauth-5.21.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155507" comment="kauth is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155508" comment="kauth-devel-5.21.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155509" comment="kauth-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155510" comment="kauth-devel-32bit-5.21.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155511" comment="kauth-devel-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155512" comment="kdelibs4-4.14.18-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152123" comment="kdelibs4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155513" comment="kdelibs4-apidocs-4.14.18-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154035" comment="kdelibs4-apidocs is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155514" comment="kdelibs4-branding-upstream-4.14.18-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154036" comment="kdelibs4-branding-upstream is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155515" comment="kdelibs4-core-4.14.18-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152124" comment="kdelibs4-core is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155516" comment="kdelibs4-doc-4.14.18-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152125" comment="kdelibs4-doc is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155517" comment="libKF5Auth5-5.21.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155518" comment="libKF5Auth5 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155519" comment="libKF5Auth5-32bit-5.21.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155520" comment="libKF5Auth5-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155521" comment="libKF5Auth5-lang-5.21.0-16.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009155522" comment="libKF5Auth5-lang is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155523" comment="libkde4-4.14.18-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152126" comment="libkde4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155524" comment="libkde4-32bit-4.14.18-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154044" comment="libkde4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155525" comment="libkde4-devel-4.14.18-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152127" comment="libkde4-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155526" comment="libkdecore4-4.14.18-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152128" comment="libkdecore4 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155527" comment="libkdecore4-32bit-4.14.18-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154045" comment="libkdecore4-32bit is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155528" comment="libkdecore4-devel-4.14.18-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152129" comment="libkdecore4-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155529" comment="libksuseinstall-devel-4.14.18-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154046" comment="libksuseinstall-devel is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155530" comment="libksuseinstall1-4.14.18-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009152130" comment="libksuseinstall1 is signed with openSUSE key"/>
        </criteria>
        <criteria operator="AND">
          <criterion test_ref="oval:org.opensuse.security:tst:2009155531" comment="libksuseinstall1-32bit-4.14.18-18.1 is installed"/>
          <criterion test_ref="oval:org.opensuse.security:tst:2009154047" comment="libksuseinstall1-32bit is signed with openSUSE key"/>
        </criteria>
      </criteria>
    </criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171505" version="1" comment="kinit is &lt;5.20.0-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171506" version="1" comment="kinit-devel is &lt;5.20.0-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171507" version="1" comment="kinit-lang is &lt;5.20.0-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118803" version="1" comment="sles-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171508" version="1" comment="chromedriver is &lt;53.0.2785.89-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171509" version="1" comment="chromium is &lt;53.0.2785.89-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171510" version="1" comment="chromium-desktop-gnome is &lt;53.0.2785.89-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171511" version="1" comment="chromium-desktop-kde is &lt;53.0.2785.89-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171512" version="1" comment="chromium-ffmpegsumo is &lt;53.0.2785.89-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116126" version="1" comment="sles-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171513" version="1" comment="irssi is &lt;0.8.20-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171514" version="1" comment="irssi-devel is &lt;0.8.20-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171515" version="1" comment="chromedriver is &lt;54.0.2840.59-109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171516" version="1" comment="chromium is &lt;54.0.2840.59-109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171517" version="1" comment="chromium-ffmpegsumo is &lt;54.0.2840.59-109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147478" version="1" comment="haproxy is &lt;1.5.4-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117479" version="1" comment="suse-sle12-cloud-compute-release is ==5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147479" version="1" comment="openstack-cinder is &lt;2014.2.3.dev13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147480" version="1" comment="openstack-cinder-volume is &lt;2014.2.3.dev13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147481" version="1" comment="python-cinder is &lt;2014.2.3.dev13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147482" version="1" comment="openstack-neutron is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147483" version="1" comment="openstack-neutron-dhcp-agent is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147484" version="1" comment="openstack-neutron-ha-tool is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147485" version="1" comment="openstack-neutron-l3-agent is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147486" version="1" comment="openstack-neutron-lbaas-agent is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147487" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147488" version="1" comment="openstack-neutron-metadata-agent is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147489" version="1" comment="openstack-neutron-metering-agent is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147490" version="1" comment="openstack-neutron-openvswitch-agent is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147491" version="1" comment="openstack-neutron-vpn-agent is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147492" version="1" comment="python-neutron is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147493" version="1" comment="python-Beaker is &lt;1.6.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147494" version="1" comment="python-keystoneclient is &lt;1.0.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147495" version="1" comment="python-keystoneclient-doc is &lt;1.0.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144245" version="1" comment="python-pycrypto is &lt;2.6.1-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147496" version="1" comment="python-pymongo is &lt;2.6.3-2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144246" version="1" comment="python-requests is &lt;2.3.0-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147497" version="1" comment="ruby2.1-rubygem-chef is &lt;10.32.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147498" version="1" comment="rubygem-chef is &lt;10.32.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141196" version="1" comment="ImageMagick is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141197" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141198" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141199" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141200" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116183" version="1" comment="sled-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141201" version="1" comment="MozillaFirefox is &lt;31.1.0esr-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141202" version="1" comment="MozillaFirefox-translations is &lt;31.1.0esr-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141203" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141204" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141205" version="1" comment="accountsservice is &lt;0.6.35-1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141206" version="1" comment="accountsservice-lang is &lt;0.6.35-1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141207" version="1" comment="libaccountsservice0 is &lt;0.6.35-1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141208" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.35-1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141209" version="1" comment="alsa is &lt;1.0.27.2-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141210" version="1" comment="libasound2 is &lt;1.0.27.2-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140446" version="1" comment="libasound2-32bit is &lt;1.0.27.2-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141211" version="1" comment="argyllcms is &lt;1.6.3-1.179" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141212" version="1" comment="avahi is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141213" version="1" comment="avahi-lang is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141214" version="1" comment="libavahi-client3 is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141215" version="1" comment="libavahi-client3-32bit is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141216" version="1" comment="libavahi-common3 is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141217" version="1" comment="libavahi-common3-32bit is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141218" version="1" comment="libavahi-core7 is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141219" version="1" comment="libdns_sd is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141220" version="1" comment="libdns_sd-32bit is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141221" version="1" comment="bash is &lt;4.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141222" version="1" comment="bash-doc is &lt;4.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141223" version="1" comment="bash-lang is &lt;4.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141224" version="1" comment="libreadline6 is &lt;6.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141225" version="1" comment="libreadline6-32bit is &lt;6.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141226" version="1" comment="readline-doc is &lt;6.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141227" version="1" comment="bind-libs is &lt;9.9.5P1-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141228" version="1" comment="bind-libs-32bit is &lt;9.9.5P1-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141229" version="1" comment="bind-utils is &lt;9.9.5P1-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141230" version="1" comment="bogofilter is &lt;1.2.4-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141231" version="1" comment="bzip2 is &lt;1.0.6-27.1129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141232" version="1" comment="libbz2-1 is &lt;1.0.6-27.1129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141233" version="1" comment="libbz2-1-32bit is &lt;1.0.6-27.1129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141234" version="1" comment="cifs-utils is &lt;6.4-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141235" version="1" comment="clamav is &lt;0.98.4-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141236" version="1" comment="colord is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141237" version="1" comment="colord-gtk-lang is &lt;0.1.25-3.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141238" version="1" comment="colord-lang is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141239" version="1" comment="libcolord-gtk1 is &lt;0.1.25-3.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141240" version="1" comment="libcolord2 is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141241" version="1" comment="libcolord2-32bit is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141242" version="1" comment="libcolorhug2 is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140495" version="1" comment="coolkey is &lt;1.1.0-147.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141243" version="1" comment="coreutils is &lt;8.22-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141244" version="1" comment="coreutils-lang is &lt;8.22-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141245" version="1" comment="cpio is &lt;2.11-26.182" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141246" version="1" comment="cpio-lang is &lt;2.11-26.182" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141247" version="1" comment="tar is &lt;1.27.1-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141248" version="1" comment="tar-lang is &lt;1.27.1-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141249" version="1" comment="cpp48 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141250" version="1" comment="gcc48 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141251" version="1" comment="gcc48-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141252" version="1" comment="gcc48-c++ is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141253" version="1" comment="gcc48-gij is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141254" version="1" comment="gcc48-gij-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141255" version="1" comment="gcc48-info is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141256" version="1" comment="libasan0 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141257" version="1" comment="libasan0-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141258" version="1" comment="libatomic1 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141259" version="1" comment="libatomic1-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141260" version="1" comment="libffi4 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141261" version="1" comment="libffi4-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141262" version="1" comment="libgcc_s1 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141263" version="1" comment="libgcc_s1-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141264" version="1" comment="libgcj48 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141265" version="1" comment="libgcj48-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141266" version="1" comment="libgcj48-jar is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141267" version="1" comment="libgcj_bc1 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141268" version="1" comment="libgfortran3 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141269" version="1" comment="libgomp1 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141270" version="1" comment="libgomp1-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141271" version="1" comment="libitm1 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141272" version="1" comment="libitm1-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141273" version="1" comment="libquadmath0 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141274" version="1" comment="libstdc++48-devel is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141275" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141276" version="1" comment="libstdc++6 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141277" version="1" comment="libstdc++6-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141278" version="1" comment="libtsan0 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141279" version="1" comment="cron is &lt;4.2-55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141280" version="1" comment="cronie is &lt;1.4.11-55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141281" version="1" comment="cups is &lt;1.7.5-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141282" version="1" comment="cups-client is &lt;1.7.5-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141283" version="1" comment="cups-libs is &lt;1.7.5-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141284" version="1" comment="cups-libs-32bit is &lt;1.7.5-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141285" version="1" comment="cups-filters is &lt;1.0.58-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141286" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141287" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141288" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140514" version="1" comment="cups-pk-helper is &lt;0.2.5-3.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140515" version="1" comment="cups-pk-helper-lang is &lt;0.2.5-3.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141289" version="1" comment="curl is &lt;7.37.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141290" version="1" comment="libcurl4 is &lt;7.37.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141291" version="1" comment="libcurl4-32bit is &lt;7.37.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140516" version="1" comment="cvs is &lt;1.12.12-181.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140518" version="1" comment="cyrus-sasl is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140519" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140520" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140521" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140522" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141292" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140523" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140524" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140527" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140528" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140529" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140532" version="1" comment="libsasl2-3 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140533" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141293" version="1" comment="dbus-1 is &lt;1.8.8-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141294" version="1" comment="dbus-1-x11 is &lt;1.8.8-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141295" version="1" comment="libdbus-1-3 is &lt;1.8.8-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141296" version="1" comment="libdbus-1-3-32bit is &lt;1.8.8-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140539" version="1" comment="dbus-1-glib is &lt;0.100.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140540" version="1" comment="dbus-1-glib-32bit is &lt;0.100.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141297" version="1" comment="dhcp is &lt;4.2.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141298" version="1" comment="dhcp-client is &lt;4.2.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141299" version="1" comment="dia is &lt;0.97.2-13.253" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141300" version="1" comment="dia-lang is &lt;0.97.2-13.253" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141301" version="1" comment="dracut is &lt;037-34.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141302" version="1" comment="ecryptfs-utils is &lt;103-5.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141303" version="1" comment="ecryptfs-utils-32bit is &lt;103-5.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141304" version="1" comment="elfutils is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141305" version="1" comment="libasm1 is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141306" version="1" comment="libdw1 is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141307" version="1" comment="libdw1-32bit is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141308" version="1" comment="libebl1 is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141309" version="1" comment="libebl1-32bit is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141310" version="1" comment="libelf1 is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141311" version="1" comment="libelf1-32bit is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141312" version="1" comment="emacs is &lt;24.3-14.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141313" version="1" comment="emacs-info is &lt;24.3-14.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141314" version="1" comment="emacs-x11 is &lt;24.3-14.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141315" version="1" comment="etags is &lt;24.3-14.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141316" version="1" comment="empathy is &lt;3.10.3-1.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141317" version="1" comment="empathy-lang is &lt;3.10.3-1.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141318" version="1" comment="telepathy-mission-control-plugin-goa is &lt;3.10.3-1.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141319" version="1" comment="evince is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141320" version="1" comment="evince-lang is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141321" version="1" comment="libevdocument3-4 is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141322" version="1" comment="libevview3-3 is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141323" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141324" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141325" version="1" comment="expat is &lt;2.1.0-13.232" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141326" version="1" comment="libexpat1 is &lt;2.1.0-13.232" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141327" version="1" comment="libexpat1-32bit is &lt;2.1.0-13.232" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141328" version="1" comment="facter is &lt;2.0.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141329" version="1" comment="fetchmail is &lt;6.3.26-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141330" version="1" comment="file is &lt;5.19-2.149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141331" version="1" comment="file-magic is &lt;5.19-2.149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141332" version="1" comment="libmagic1 is &lt;5.19-2.149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141333" version="1" comment="libmagic1-32bit is &lt;5.19-2.149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141334" version="1" comment="finch is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141335" version="1" comment="libpurple is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141336" version="1" comment="libpurple-lang is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141337" version="1" comment="libpurple-meanwhile is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141338" version="1" comment="libpurple-tcl is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141339" version="1" comment="pidgin is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141340" version="1" comment="flash-player is &lt;11.2.202.406-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141341" version="1" comment="flash-player-gnome is &lt;11.2.202.406-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141342" version="1" comment="freerdp is &lt;1.0.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141343" version="1" comment="libfreerdp-1_0 is &lt;1.0.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141344" version="1" comment="libfreerdp-1_0-plugins is &lt;1.0.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141345" version="1" comment="ft2demos is &lt;2.5.3-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141346" version="1" comment="fuse is &lt;2.9.3-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141347" version="1" comment="libfuse2 is &lt;2.9.3-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141348" version="1" comment="g3utils is &lt;1.1.36-54.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141349" version="1" comment="mgetty is &lt;1.1.36-54.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141350" version="1" comment="gd is &lt;2.1.0-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141351" version="1" comment="gd-32bit is &lt;2.1.0-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141352" version="1" comment="gdk-pixbuf-lang is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141353" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141354" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141355" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141356" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141357" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141358" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.2-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141359" version="1" comment="librsvg-2-2 is &lt;2.40.2-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141360" version="1" comment="librsvg-2-2-32bit is &lt;2.40.2-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141361" version="1" comment="rsvg-view is &lt;2.40.2-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141362" version="1" comment="gdm is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141363" version="1" comment="gdm-branding-upstream is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141364" version="1" comment="gdm-lang is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141365" version="1" comment="gdmflexiserver is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141366" version="1" comment="libgdm1 is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141367" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141368" version="1" comment="gimp is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141369" version="1" comment="gimp-lang is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141370" version="1" comment="gimp-plugins-python is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141371" version="1" comment="libgimp-2_0-0 is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141372" version="1" comment="libgimpui-2_0-0 is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141373" version="1" comment="glib2-lang is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141374" version="1" comment="glib2-tools is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141375" version="1" comment="libgio-2_0-0 is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141376" version="1" comment="libgio-2_0-0-32bit is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141377" version="1" comment="libgio-fam is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141378" version="1" comment="libglib-2_0-0 is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141379" version="1" comment="libglib-2_0-0-32bit is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141380" version="1" comment="libgmodule-2_0-0 is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141381" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141382" version="1" comment="libgobject-2_0-0 is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141383" version="1" comment="libgobject-2_0-0-32bit is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141384" version="1" comment="libgthread-2_0-0 is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141385" version="1" comment="libgthread-2_0-0-32bit is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141386" version="1" comment="glibc is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141387" version="1" comment="glibc-32bit is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141388" version="1" comment="glibc-devel is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141389" version="1" comment="glibc-devel-32bit is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141390" version="1" comment="glibc-i18ndata is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141391" version="1" comment="glibc-locale is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141392" version="1" comment="glibc-locale-32bit is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141393" version="1" comment="nscd is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141394" version="1" comment="gnome-keyring is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141395" version="1" comment="gnome-keyring-32bit is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141396" version="1" comment="gnome-keyring-lang is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141397" version="1" comment="gnome-keyring-pam is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141398" version="1" comment="gnome-keyring-pam-32bit is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141399" version="1" comment="libgck-modules-gnome-keyring is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141400" version="1" comment="gnome-online-accounts is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141401" version="1" comment="gnome-online-accounts-lang is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141402" version="1" comment="libgoa-1_0-0 is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141403" version="1" comment="libgoa-backend-1_0-1 is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141404" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141405" version="1" comment="gnome-shell is &lt;3.10.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141406" version="1" comment="gnome-shell-browser-plugin is &lt;3.10.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141407" version="1" comment="gnome-shell-calendar is &lt;3.10.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141408" version="1" comment="gnome-shell-lang is &lt;3.10.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141409" version="1" comment="gnutls is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141410" version="1" comment="libgnutls28 is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141411" version="1" comment="libgnutls28-32bit is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141412" version="1" comment="gpg2 is &lt;2.0.24-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141413" version="1" comment="gpg2-lang is &lt;2.0.24-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140643" version="1" comment="gpgme is &lt;1.5.1-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140644" version="1" comment="libgpgme11 is &lt;1.5.1-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140645" version="1" comment="groff is &lt;1.22.2-5.429" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140673" version="1" comment="gvim is &lt;7.4.326-2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140674" version="1" comment="vim is &lt;7.4.326-2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140675" version="1" comment="vim-data is &lt;7.4.326-2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140677" version="1" comment="gzip is &lt;1.6-7.392" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140678" version="1" comment="hardlink is &lt;1.0-6.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141414" version="1" comment="hplip is &lt;3.14.6-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141415" version="1" comment="hplip-hpijs is &lt;3.14.6-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141416" version="1" comment="hplip-sane is &lt;3.14.6-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141417" version="1" comment="ibus-chewing is &lt;1.4.10.1-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141418" version="1" comment="ibus-pinyin is &lt;1.5.0-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140686" version="1" comment="iputils is &lt;s20121221-2.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141419" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.65-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141420" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.65-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141421" version="1" comment="java-1_7_0-openjdk-plugin is &lt;1.5.1-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141422" version="1" comment="kbd is &lt;1.15.5-7.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141423" version="1" comment="kernel-default is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141424" version="1" comment="kernel-default-devel is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141425" version="1" comment="kernel-default-extra is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141426" version="1" comment="kernel-devel is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141427" version="1" comment="kernel-macros is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141428" version="1" comment="kernel-source is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141429" version="1" comment="kernel-syms is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141430" version="1" comment="kernel-xen is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141431" version="1" comment="kernel-xen-devel is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141432" version="1" comment="krb5 is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141433" version="1" comment="krb5-32bit is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141434" version="1" comment="krb5-client is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140711" version="1" comment="krb5-appl-clients is &lt;1.0.3-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141435" version="1" comment="lcms is &lt;1.19-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140713" version="1" comment="liblcms1 is &lt;1.19-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140714" version="1" comment="liblcms1-32bit is &lt;1.19-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140717" version="1" comment="libHX28 is &lt;3.18-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140718" version="1" comment="libHX28-32bit is &lt;3.18-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140719" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141436" version="1" comment="libIlmImf-Imf_2_1-21-32bit is &lt;2.1.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140720" version="1" comment="openexr is &lt;2.1.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140739" version="1" comment="libX11-6 is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140740" version="1" comment="libX11-6-32bit is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140741" version="1" comment="libX11-data is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140742" version="1" comment="libX11-xcb1 is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140743" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140744" version="1" comment="libXRes1 is &lt;1.0.7-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140745" version="1" comment="libXRes1-32bit is &lt;1.0.7-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140746" version="1" comment="libXcursor1 is &lt;1.1.14-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140747" version="1" comment="libXcursor1-32bit is &lt;1.1.14-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140748" version="1" comment="libXext6 is &lt;1.3.2-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140749" version="1" comment="libXext6-32bit is &lt;1.3.2-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140750" version="1" comment="libXfixes3 is &lt;5.0.1-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140751" version="1" comment="libXfixes3-32bit is &lt;5.0.1-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141437" version="1" comment="libXfont1 is &lt;1.4.7-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141438" version="1" comment="libXi6 is &lt;1.7.2-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141439" version="1" comment="libXi6-32bit is &lt;1.7.2-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140755" version="1" comment="libXinerama1 is &lt;1.1.3-3.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140756" version="1" comment="libXinerama1-32bit is &lt;1.1.3-3.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140757" version="1" comment="libXp6 is &lt;1.0.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140758" version="1" comment="libXp6-32bit is &lt;1.0.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141440" version="1" comment="libXrandr2 is &lt;1.4.2-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141441" version="1" comment="libXrandr2-32bit is &lt;1.4.2-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140761" version="1" comment="libXrender1 is &lt;0.9.8-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140762" version="1" comment="libXrender1-32bit is &lt;0.9.8-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140763" version="1" comment="libXt6 is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140764" version="1" comment="libXt6-32bit is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140765" version="1" comment="libXtst6 is &lt;1.2.2-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140766" version="1" comment="libXtst6-32bit is &lt;1.2.2-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140767" version="1" comment="libXv1 is &lt;1.0.10-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140768" version="1" comment="libXv1-32bit is &lt;1.0.10-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140769" version="1" comment="libXvMC1 is &lt;1.0.8-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140773" version="1" comment="libXxf86dga1 is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140774" version="1" comment="libXxf86vm1 is &lt;1.1.3-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140775" version="1" comment="libXxf86vm1-32bit is &lt;1.1.3-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141442" version="1" comment="libaugeas0 is &lt;1.2.0-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141443" version="1" comment="libblkid1 is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141444" version="1" comment="libblkid1-32bit is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141445" version="1" comment="libmount1 is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141446" version="1" comment="libmount1-32bit is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141447" version="1" comment="libsmartcols1 is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141448" version="1" comment="libuuid-devel is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141449" version="1" comment="libuuid1 is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141450" version="1" comment="libuuid1-32bit is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141451" version="1" comment="python-libmount is &lt;2.25-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141452" version="1" comment="util-linux is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141453" version="1" comment="util-linux-lang is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141454" version="1" comment="util-linux-systemd is &lt;2.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141455" version="1" comment="uuidd is &lt;2.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141456" version="1" comment="libcgroup1 is &lt;0.41.rc1-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141457" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141458" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141459" version="1" comment="libdcerpc0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141460" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141461" version="1" comment="libgensec0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141462" version="1" comment="libgensec0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141463" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141464" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141465" version="1" comment="libndr-nbt0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141466" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141467" version="1" comment="libndr-standard0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141468" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141469" version="1" comment="libndr0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141470" version="1" comment="libndr0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141471" version="1" comment="libnetapi0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141472" version="1" comment="libnetapi0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141473" version="1" comment="libpdb0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141474" version="1" comment="libpdb0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141475" version="1" comment="libregistry0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141476" version="1" comment="libsamba-credentials0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141477" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141478" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141479" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141480" version="1" comment="libsamba-util0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141481" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141482" version="1" comment="libsamdb0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141483" version="1" comment="libsamdb0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141484" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141485" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141486" version="1" comment="libsmbclient0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141487" version="1" comment="libsmbclient0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141488" version="1" comment="libsmbconf0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141489" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141490" version="1" comment="libsmbldap0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141491" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141492" version="1" comment="libtevent-util0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141493" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141494" version="1" comment="libwbclient0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141495" version="1" comment="libwbclient0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141496" version="1" comment="samba is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141497" version="1" comment="samba-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141498" version="1" comment="samba-client is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141499" version="1" comment="samba-client-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141500" version="1" comment="samba-doc is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141501" version="1" comment="samba-libs is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141502" version="1" comment="samba-libs-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141503" version="1" comment="samba-winbind is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141504" version="1" comment="samba-winbind-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140838" version="1" comment="libdmx1 is &lt;1.1.3-3.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141505" version="1" comment="libecpg6 is &lt;9.3.5-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141506" version="1" comment="libpq5 is &lt;9.3.5-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141507" version="1" comment="libpq5-32bit is &lt;9.3.5-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141508" version="1" comment="postgresql93 is &lt;9.3.5-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140839" version="1" comment="libevent-2_0-5 is &lt;2.0.21-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140840" version="1" comment="libexif12 is &lt;0.6.21-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140841" version="1" comment="libexif12-32bit is &lt;0.6.21-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141509" version="1" comment="libfbembed2_5 is &lt;2.5.2.26539-13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141510" version="1" comment="libfreebl3 is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141511" version="1" comment="libfreebl3-32bit is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141512" version="1" comment="libsoftokn3 is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141513" version="1" comment="libsoftokn3-32bit is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141514" version="1" comment="mozilla-nss is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141515" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141516" version="1" comment="mozilla-nss-certs is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141517" version="1" comment="mozilla-nss-certs-32bit is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141518" version="1" comment="mozilla-nss-tools is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141519" version="1" comment="libfreetype6 is &lt;2.5.3-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141520" version="1" comment="libfreetype6-32bit is &lt;2.5.3-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141521" version="1" comment="libgadu3 is &lt;1.11.4-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140590" version="1" comment="libgc1 is &lt;7.2d-3.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141522" version="1" comment="libgcrypt20 is &lt;1.6.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141523" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141524" version="1" comment="libgnomesu is &lt;1.0.0-352.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141525" version="1" comment="libgnomesu-lang is &lt;1.0.0-352.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141526" version="1" comment="libgnomesu0 is &lt;1.0.0-352.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140845" version="1" comment="libgssglue1 is &lt;0.4-3.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140846" version="1" comment="libgssglue1-32bit is &lt;0.4-3.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141527" version="1" comment="libgudev-1_0-0 is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141528" version="1" comment="libgudev-1_0-0-32bit is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141529" version="1" comment="libudev1 is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141530" version="1" comment="libudev1-32bit is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141531" version="1" comment="systemd is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141532" version="1" comment="systemd-32bit is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141533" version="1" comment="systemd-bash-completion is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141534" version="1" comment="systemd-sysvinit is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141535" version="1" comment="udev is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141536" version="1" comment="libid3tag0 is &lt;0.15.1b-182.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141537" version="1" comment="libipa_hbac0 is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141538" version="1" comment="libsss_idmap0 is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141539" version="1" comment="python-sssd-config is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141540" version="1" comment="sssd is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141541" version="1" comment="sssd-32bit is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141542" version="1" comment="sssd-ad is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141543" version="1" comment="sssd-ipa is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141544" version="1" comment="sssd-krb5 is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141545" version="1" comment="sssd-krb5-common is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141546" version="1" comment="sssd-ldap is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141547" version="1" comment="sssd-proxy is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141548" version="1" comment="sssd-tools is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141549" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141550" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141551" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141552" version="1" comment="libwebkit2gtk-3_0-25 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141553" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141554" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141555" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141556" version="1" comment="libwebkitgtk2-lang is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141557" version="1" comment="libwebkitgtk3-lang is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141558" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141559" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141560" version="1" comment="libjbig2 is &lt;2.0-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140690" version="1" comment="libjbig2-32bit is &lt;2.0-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140691" version="1" comment="libjson-c2 is &lt;0.11-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140692" version="1" comment="libjson-c2-32bit is &lt;0.11-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140875" version="1" comment="libltdl7 is &lt;2.4.2-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140876" version="1" comment="libltdl7-32bit is &lt;2.4.2-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140879" version="1" comment="liblua5_2 is &lt;5.2.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140881" version="1" comment="lua is &lt;5.2.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141561" version="1" comment="liblzo2-2 is &lt;2.08-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140883" version="1" comment="liblzo2-2-32bit is &lt;2.08-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141562" version="1" comment="libmikmod3 is &lt;3.2.0-4.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141563" version="1" comment="libmikmod3-32bit is &lt;3.2.0-4.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140884" version="1" comment="libmms0 is &lt;0.6.2-15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140885" version="1" comment="libmodplug1 is &lt;0.8.8.4-13.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141564" version="1" comment="libmspack0 is &lt;0.4-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140886" version="1" comment="libmusicbrainz4 is &lt;2.1.5-27.86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141565" version="1" comment="libmysqlclient18 is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141566" version="1" comment="libmysqlclient18-32bit is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141567" version="1" comment="libmysqlclient_r18 is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141568" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141569" version="1" comment="mariadb is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141570" version="1" comment="mariadb-client is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141571" version="1" comment="mariadb-errormessages is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140887" version="1" comment="libneon27 is &lt;0.30.0-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141572" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-59.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141573" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-59.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141574" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141575" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141576" version="1" comment="openssl is &lt;1.0.1i-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141577" version="1" comment="libpango-1_0-0 is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141578" version="1" comment="libpango-1_0-0-32bit is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141579" version="1" comment="pango-modules is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141580" version="1" comment="pango-modules-32bit is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141581" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140900" version="1" comment="libpcsclite1 is &lt;1.8.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141582" version="1" comment="libpcsclite1-32bit is &lt;1.8.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140901" version="1" comment="pcsc-lite is &lt;1.8.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141583" version="1" comment="libpng12-0 is &lt;1.2.50-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141584" version="1" comment="libpng12-0-32bit is &lt;1.2.50-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141585" version="1" comment="libpng16-16 is &lt;1.6.8-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141586" version="1" comment="libpng16-16-32bit is &lt;1.6.8-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141587" version="1" comment="libpolkit0 is &lt;0.112-2.189" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141588" version="1" comment="libpolkit0-32bit is &lt;0.112-2.189" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141589" version="1" comment="polkit is &lt;0.112-2.189" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141590" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.112-2.189" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141591" version="1" comment="libpoppler-glib8 is &lt;0.24.4-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141592" version="1" comment="libpoppler-qt4-4 is &lt;0.24.4-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141593" version="1" comment="libpoppler44 is &lt;0.24.4-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141594" version="1" comment="poppler-tools is &lt;0.24.4-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141595" version="1" comment="libproxy1 is &lt;0.4.11-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141596" version="1" comment="libproxy1-32bit is &lt;0.4.11-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141597" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.11-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141598" version="1" comment="libproxy1-config-gnome3-32bit is &lt;0.4.11-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141599" version="1" comment="libproxy1-networkmanager is &lt;0.4.11-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141600" version="1" comment="libproxy1-networkmanager-32bit is &lt;0.4.11-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140915" version="1" comment="libpulse-mainloop-glib0 is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140916" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140917" version="1" comment="libpulse0 is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140918" version="1" comment="libpulse0-32bit is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140919" version="1" comment="pulseaudio is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140920" version="1" comment="pulseaudio-esound-compat is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140921" version="1" comment="pulseaudio-gdm-hooks is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140922" version="1" comment="pulseaudio-lang is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141601" version="1" comment="pulseaudio-module-bluetooth is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141602" version="1" comment="pulseaudio-module-gconf is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141603" version="1" comment="pulseaudio-module-jack is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141604" version="1" comment="pulseaudio-module-lirc is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140923" version="1" comment="pulseaudio-module-x11 is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140924" version="1" comment="pulseaudio-module-zeroconf is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140925" version="1" comment="pulseaudio-utils is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141605" version="1" comment="libpython2_7-1_0 is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141606" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141607" version="1" comment="python-base is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141608" version="1" comment="python-devel is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141609" version="1" comment="python-xml is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141610" version="1" comment="libpython3_4m1_0 is &lt;3.4.1-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141611" version="1" comment="python3-base is &lt;3.4.1-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141612" version="1" comment="libqt4 is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141613" version="1" comment="libqt4-32bit is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141614" version="1" comment="libqt4-qt3support is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141615" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141616" version="1" comment="libqt4-sql is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141617" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141618" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141619" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141620" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141621" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141622" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141623" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141624" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141625" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141626" version="1" comment="libqt4-x11 is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141627" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140928" version="1" comment="libraptor2-0 is &lt;2.0.10-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141628" version="1" comment="raptor is &lt;2.0.10-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141629" version="1" comment="libraw9 is &lt;0.15.4-3.88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141630" version="1" comment="libreoffice is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141631" version="1" comment="libreoffice-base is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141632" version="1" comment="libreoffice-base-drivers-mysql is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141633" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141634" version="1" comment="libreoffice-calc is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141635" version="1" comment="libreoffice-calc-extensions is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141636" version="1" comment="libreoffice-draw is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141637" version="1" comment="libreoffice-filters-optional is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141638" version="1" comment="libreoffice-gnome is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141639" version="1" comment="libreoffice-icon-theme-tango is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141640" version="1" comment="libreoffice-impress is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141641" version="1" comment="libreoffice-l10n-af is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141642" version="1" comment="libreoffice-l10n-ar is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141643" version="1" comment="libreoffice-l10n-ca is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141644" version="1" comment="libreoffice-l10n-cs is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141645" version="1" comment="libreoffice-l10n-da is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141646" version="1" comment="libreoffice-l10n-de is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141647" version="1" comment="libreoffice-l10n-en is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141648" version="1" comment="libreoffice-l10n-es is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141649" version="1" comment="libreoffice-l10n-fi is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141650" version="1" comment="libreoffice-l10n-fr is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141651" version="1" comment="libreoffice-l10n-gu is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141652" version="1" comment="libreoffice-l10n-hi is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141653" version="1" comment="libreoffice-l10n-hu is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141654" version="1" comment="libreoffice-l10n-it is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141655" version="1" comment="libreoffice-l10n-ja is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141656" version="1" comment="libreoffice-l10n-ko is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141657" version="1" comment="libreoffice-l10n-nb is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141658" version="1" comment="libreoffice-l10n-nl is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141659" version="1" comment="libreoffice-l10n-nn is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141660" version="1" comment="libreoffice-l10n-pl is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141661" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141662" version="1" comment="libreoffice-l10n-pt-PT is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141663" version="1" comment="libreoffice-l10n-ru is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141664" version="1" comment="libreoffice-l10n-sk is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141665" version="1" comment="libreoffice-l10n-sv is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141666" version="1" comment="libreoffice-l10n-xh is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141667" version="1" comment="libreoffice-l10n-zh-Hans is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141668" version="1" comment="libreoffice-l10n-zh-Hant is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141669" version="1" comment="libreoffice-l10n-zu is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141670" version="1" comment="libreoffice-mailmerge is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141671" version="1" comment="libreoffice-math is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141672" version="1" comment="libreoffice-officebean is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141673" version="1" comment="libreoffice-pyuno is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141674" version="1" comment="libreoffice-writer is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141675" version="1" comment="libreoffice-writer-extensions is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141676" version="1" comment="librpcsecgss3 is &lt;0.19-16.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141677" version="1" comment="libsilc-1_1-2 is &lt;1.1.10-24.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141678" version="1" comment="libsilcclient-1_1-3 is &lt;1.1.10-24.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141679" version="1" comment="silc-toolkit is &lt;1.1.10-24.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140932" version="1" comment="libsmi is &lt;0.4.8-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140933" version="1" comment="libsmi2 is &lt;0.4.8-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141680" version="1" comment="libsndfile1 is &lt;1.0.25-18.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141681" version="1" comment="libsndfile1-32bit is &lt;1.0.25-18.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141682" version="1" comment="libsnmp30 is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141683" version="1" comment="libsnmp30-32bit is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141684" version="1" comment="net-snmp is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141685" version="1" comment="perl-SNMP is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141686" version="1" comment="snmp-mibs is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141687" version="1" comment="libsoup-2_4-1 is &lt;2.44.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141688" version="1" comment="libsoup-2_4-1-32bit is &lt;2.44.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141689" version="1" comment="libsoup-lang is &lt;2.44.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141690" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.44.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141691" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141692" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141693" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141694" version="1" comment="libspice-controller0 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141695" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141696" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141697" version="1" comment="libssh4 is &lt;0.6.3-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140963" version="1" comment="libtag1 is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141698" version="1" comment="libtag1-32bit is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140964" version="1" comment="libtag_c0 is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141699" version="1" comment="libtag_c0-32bit is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140965" version="1" comment="taglib is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141700" version="1" comment="libtasn1 is &lt;3.7-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141701" version="1" comment="libtasn1-6 is &lt;3.7-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141702" version="1" comment="libtasn1-6-32bit is &lt;3.7-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141703" version="1" comment="libtiff5 is &lt;4.0.3-9.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141704" version="1" comment="libtiff5-32bit is &lt;4.0.3-9.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140969" version="1" comment="libudisks2-0 is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140970" version="1" comment="udisks2 is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140971" version="1" comment="udisks2-lang is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141705" version="1" comment="libvirt is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141706" version="1" comment="libvirt-client is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141707" version="1" comment="libvirt-client-32bit is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141708" version="1" comment="libvirt-daemon is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141709" version="1" comment="libvirt-daemon-config-network is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141710" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141711" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141712" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141713" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141714" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141715" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141716" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141717" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141718" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141719" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141720" version="1" comment="libvirt-daemon-lxc is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141721" version="1" comment="libvirt-daemon-qemu is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141722" version="1" comment="libvirt-daemon-xen is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141723" version="1" comment="libvirt-doc is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141724" version="1" comment="libvorbis0 is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140999" version="1" comment="libvorbis0-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141725" version="1" comment="libvorbisenc2 is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141001" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141726" version="1" comment="libvorbisfile3 is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141003" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141727" version="1" comment="libvte9 is &lt;0.28.2-17.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141728" version="1" comment="libxcb-dri2-0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141729" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141730" version="1" comment="libxcb-glx0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141731" version="1" comment="libxcb-glx0-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141732" version="1" comment="libxcb-randr0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141733" version="1" comment="libxcb-render0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141734" version="1" comment="libxcb-render0-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141735" version="1" comment="libxcb-shape0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141736" version="1" comment="libxcb-shm0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141737" version="1" comment="libxcb-shm0-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141738" version="1" comment="libxcb-sync1 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141739" version="1" comment="libxcb-xf86dri0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141740" version="1" comment="libxcb-xfixes0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141741" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141742" version="1" comment="libxcb-xkb1 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141743" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141744" version="1" comment="libxcb-xv0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141745" version="1" comment="libxcb1 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141746" version="1" comment="libxcb1-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141747" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141748" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141749" version="1" comment="libxml2-2 is &lt;2.9.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141750" version="1" comment="libxml2-2-32bit is &lt;2.9.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141751" version="1" comment="libxml2-tools is &lt;2.9.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141752" version="1" comment="libyaml-0-2 is &lt;0.1.6-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141753" version="1" comment="libzip2 is &lt;0.11.1-4.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141754" version="1" comment="libzmq3 is &lt;4.0.4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141038" version="1" comment="logrotate is &lt;3.8.7-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140466" version="1" comment="m4 is &lt;1.4.16-15.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141042" version="1" comment="mipv6d is &lt;2.0.2.umip.0.4-19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141755" version="1" comment="mozilla-nspr is &lt;4.10.7-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141756" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141757" version="1" comment="mutt is &lt;1.5.21-44.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141758" version="1" comment="ntp is &lt;4.2.6p5-24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141759" version="1" comment="ntp-doc is &lt;4.2.6p5-24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141044" version="1" comment="opensc is &lt;0.13.0-1.122" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141760" version="1" comment="openslp is &lt;2.0.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141761" version="1" comment="openslp-32bit is &lt;2.0.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141762" version="1" comment="openssh is &lt;6.6p1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141763" version="1" comment="openssh-helpers is &lt;6.6p1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141764" version="1" comment="pam is &lt;1.1.8-11.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141765" version="1" comment="pam-32bit is &lt;1.1.8-11.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141766" version="1" comment="pam-doc is &lt;1.1.8-11.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141767" version="1" comment="pam-modules is &lt;12.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141060" version="1" comment="pam-modules-32bit is &lt;12.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141061" version="1" comment="pam_krb5 is &lt;2.4.4-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141062" version="1" comment="pam_krb5-32bit is &lt;2.4.4-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141063" version="1" comment="pam_ssh is &lt;2.0-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141064" version="1" comment="pam_ssh-32bit is &lt;2.0-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141768" version="1" comment="patch is &lt;2.7.1-5.191" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141065" version="1" comment="pcsc-ccid is &lt;1.4.14-1.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141769" version="1" comment="perl is &lt;5.18.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141770" version="1" comment="perl-32bit is &lt;5.18.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141771" version="1" comment="perl-base is &lt;5.18.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141772" version="1" comment="perl-doc is &lt;5.18.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141066" version="1" comment="perl-Config-IniFiles is &lt;2.82-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141067" version="1" comment="perl-HTML-Parser is &lt;3.71-1.178" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141068" version="1" comment="perl-LWP-Protocol-https is &lt;6.04-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141069" version="1" comment="perl-Tk is &lt;804.031-3.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141773" version="1" comment="perl-YAML-LibYAML is &lt;0.38-7.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141774" version="1" comment="pidgin-otr is &lt;4.0.0-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141072" version="1" comment="ppp is &lt;2.4.7-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141775" version="1" comment="procmail is &lt;3.22-267.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141776" version="1" comment="puppet is &lt;3.6.2-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141777" version="1" comment="python is &lt;2.7.7-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141778" version="1" comment="python-curses is &lt;2.7.7-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141779" version="1" comment="python-tk is &lt;2.7.7-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141780" version="1" comment="python3 is &lt;3.4.1-2.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141781" version="1" comment="python-cupshelpers is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141782" version="1" comment="system-config-printer is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141783" version="1" comment="system-config-printer-common is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141784" version="1" comment="system-config-printer-common-lang is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141785" version="1" comment="system-config-printer-dbus-service is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141786" version="1" comment="udev-configure-printer is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141787" version="1" comment="python-imaging is &lt;1.1.7-21.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141788" version="1" comment="python-libxml2 is &lt;2.9.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141789" version="1" comment="python-pyOpenSSL is &lt;0.14-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141085" version="1" comment="python-pywbem is &lt;0.7.0-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141790" version="1" comment="qemu is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141791" version="1" comment="qemu-block-curl is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141792" version="1" comment="qemu-ipxe is &lt;1.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141793" version="1" comment="qemu-kvm is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141794" version="1" comment="qemu-seabios is &lt;1.7.4-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141795" version="1" comment="qemu-sgabios is &lt;8-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141796" version="1" comment="qemu-tools is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141797" version="1" comment="qemu-vgabios is &lt;1.7.4-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141798" version="1" comment="qemu-x86 is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141103" version="1" comment="radvd is &lt;1.9.7-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141799" version="1" comment="rhythmbox is &lt;3.0.2-1.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141800" version="1" comment="rhythmbox-lang is &lt;3.0.2-1.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141801" version="1" comment="rsync is &lt;3.1.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141802" version="1" comment="rsyslog is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141122" version="1" comment="rtkit is &lt;0.11_git201205151338-8.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141123" version="1" comment="ruby is &lt;2.1-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141803" version="1" comment="shim is &lt;0.7-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141804" version="1" comment="socat is &lt;1.7.2.4-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141805" version="1" comment="squashfs is &lt;4.3-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141806" version="1" comment="strongswan is &lt;5.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141807" version="1" comment="strongswan-doc is &lt;5.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141808" version="1" comment="strongswan-ipsec is &lt;5.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141809" version="1" comment="strongswan-libs0 is &lt;5.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141810" version="1" comment="sudo is &lt;1.8.10p3-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141811" version="1" comment="sysconfig is &lt;0.83.7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141812" version="1" comment="sysconfig-netconfig is &lt;0.83.7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141134" version="1" comment="syslog-service is &lt;2.0-778.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141813" version="1" comment="sysvinit-tools is &lt;2.88+-94.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141139" version="1" comment="whois is &lt;5.1.1-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141814" version="1" comment="telepathy-gabble is &lt;0.18.1-3.268" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141815" version="1" comment="telepathy-idle is &lt;0.2.0-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141816" version="1" comment="tftp is &lt;5.2-8.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141817" version="1" comment="tigervnc is &lt;1.3.0-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141818" version="1" comment="xorg-x11-Xvnc is &lt;1.3.0-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141819" version="1" comment="unixODBC is &lt;2.3.1-4.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141820" version="1" comment="unixODBC-32bit is &lt;2.3.1-4.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141821" version="1" comment="vino is &lt;3.10.1-1.86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141822" version="1" comment="vino-lang is &lt;3.10.1-1.86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141823" version="1" comment="vorbis-tools is &lt;1.4.0-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141824" version="1" comment="vorbis-tools-lang is &lt;1.4.0-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141825" version="1" comment="w3m is &lt;0.5.3-153.145" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140672" version="1" comment="wdiff is &lt;1.2.1-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141826" version="1" comment="wget is &lt;1.14-4.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141827" version="1" comment="wireshark is &lt;1.10.9-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141828" version="1" comment="xalan-j2 is &lt;2.7.0-264.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141829" version="1" comment="xen is &lt;4.4.1_06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141830" version="1" comment="xen-kmp-default is &lt;4.4.1_06_k3.12.28_4-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141831" version="1" comment="xen-libs is &lt;4.4.1_06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141832" version="1" comment="xen-libs-32bit is &lt;4.4.1_06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141833" version="1" comment="xf86-video-intel is &lt;2.99.914-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141167" version="1" comment="xinetd is &lt;2.3.15-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141168" version="1" comment="xlockmore is &lt;5.43-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141834" version="1" comment="xorg-x11 is &lt;7.6_1-14.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141835" version="1" comment="xorg-x11-essentials is &lt;7.6_1-14.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141171" version="1" comment="xrdb is &lt;1.1.0-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141836" version="1" comment="xorg-x11-libs is &lt;7.6-45.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141837" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-12.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141838" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-12.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141839" version="1" comment="yast2 is &lt;3.1.108-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141840" version="1" comment="yast2-core is &lt;3.1.11-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141178" version="1" comment="zoo is &lt;2.10-1020.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109224" version="1" comment="DirectFB is &lt;1.7.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109231" version="1" comment="lib++dfb-1_7-1 is &lt;1.7.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109233" version="1" comment="libdirectfb-1_7-1 is &lt;1.7.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109234" version="1" comment="libdirectfb-1_7-1-32bit is &lt;1.7.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118774" version="1" comment="sled-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102628" version="1" comment="ImageMagick is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102634" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102638" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102637" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102640" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116011" version="1" comment="MozillaFirefox is &lt;38.4.0esr-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116014" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141841" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141842" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141843" version="1" comment="accountsservice is &lt;0.6.35-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141844" version="1" comment="accountsservice-lang is &lt;0.6.35-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141845" version="1" comment="libaccountsservice0 is &lt;0.6.35-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141846" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.35-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110200" version="1" comment="autofs is &lt;5.0.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141847" version="1" comment="bind-libs is &lt;9.9.6P1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141848" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141849" version="1" comment="bind-utils is &lt;9.9.6P1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141850" version="1" comment="binutils is &lt;2.25.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113975" version="1" comment="busybox is &lt;1.21.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141851" version="1" comment="cifs-utils is &lt;6.4-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109618" version="1" comment="clamav is &lt;0.98.7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141852" version="1" comment="colord is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141853" version="1" comment="colord-lang is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141854" version="1" comment="libcolord2 is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141855" version="1" comment="libcolord2-32bit is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141856" version="1" comment="libcolorhug2 is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114699" version="1" comment="coreutils is &lt;8.22-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114700" version="1" comment="coreutils-lang is &lt;8.22-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102938" version="1" comment="cpio is &lt;2.11-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102939" version="1" comment="cpio-lang is &lt;2.11-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115214" version="1" comment="cpp48 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115215" version="1" comment="gcc48 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115258" version="1" comment="gcc48-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115217" version="1" comment="gcc48-c++ is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115239" version="1" comment="gcc48-gij is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115238" version="1" comment="gcc48-gij-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115219" version="1" comment="gcc48-info is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115224" version="1" comment="libasan0 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115263" version="1" comment="libasan0-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115242" version="1" comment="libgcj48 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115241" version="1" comment="libgcj48-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115245" version="1" comment="libgcj48-jar is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115246" version="1" comment="libgcj_bc1 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115232" version="1" comment="libstdc++48-devel is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115271" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140508" version="1" comment="cron is &lt;4.2-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140509" version="1" comment="cronie is &lt;1.4.11-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110315" version="1" comment="cups is &lt;1.7.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110316" version="1" comment="cups-client is &lt;1.7.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110319" version="1" comment="cups-libs is &lt;1.7.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110320" version="1" comment="cups-libs-32bit is &lt;1.7.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113515" version="1" comment="cups-filters is &lt;1.0.58-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113516" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113518" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113519" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110168" version="1" comment="curl is &lt;7.37.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110172" version="1" comment="libcurl4 is &lt;7.37.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110171" version="1" comment="libcurl4-32bit is &lt;7.37.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107559" version="1" comment="dbus-1 is &lt;1.8.16-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107561" version="1" comment="dbus-1-x11 is &lt;1.8.16-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107564" version="1" comment="libdbus-1-3 is &lt;1.8.16-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107565" version="1" comment="libdbus-1-3-32bit is &lt;1.8.16-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141857" version="1" comment="dhcp is &lt;4.3.3-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141858" version="1" comment="dhcp-client is &lt;4.3.3-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141859" version="1" comment="dnsmasq is &lt;2.71-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138243" version="1" comment="dracut is &lt;037-66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113256" version="1" comment="e2fsprogs is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113260" version="1" comment="libcom_err2 is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113261" version="1" comment="libcom_err2-32bit is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113264" version="1" comment="libext2fs2 is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106094" version="1" comment="elfutils is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106096" version="1" comment="libasm1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106099" version="1" comment="libdw1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106100" version="1" comment="libdw1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106102" version="1" comment="libebl1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106103" version="1" comment="libebl1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106106" version="1" comment="libelf1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106107" version="1" comment="libelf1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141860" version="1" comment="facter is &lt;2.0.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103557" version="1" comment="file is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103559" version="1" comment="file-magic is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103561" version="1" comment="libmagic1 is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103560" version="1" comment="libmagic1-32bit is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102676" version="1" comment="finch is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102678" version="1" comment="libpurple is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102681" version="1" comment="libpurple-lang is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102682" version="1" comment="libpurple-meanwhile is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102683" version="1" comment="libpurple-tcl is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102684" version="1" comment="pidgin is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116120" version="1" comment="flash-player is &lt;11.2.202.548-111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116121" version="1" comment="flash-player-gnome is &lt;11.2.202.548-111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141861" version="1" comment="ft2demos is &lt;2.5.5-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110488" version="1" comment="fuse is &lt;2.9.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110491" version="1" comment="libfuse2 is &lt;2.9.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109545" version="1" comment="gd is &lt;2.1.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109546" version="1" comment="gd-32bit is &lt;2.1.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141862" version="1" comment="gdm is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141863" version="1" comment="gdm-branding-upstream is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141864" version="1" comment="gdm-lang is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141865" version="1" comment="gdmflexiserver is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141866" version="1" comment="libgdm1 is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141867" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141868" version="1" comment="glibc is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141869" version="1" comment="glibc-32bit is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141870" version="1" comment="glibc-devel is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141871" version="1" comment="glibc-devel-32bit is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141872" version="1" comment="glibc-i18ndata is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141873" version="1" comment="glibc-locale is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141874" version="1" comment="glibc-locale-32bit is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141875" version="1" comment="nscd is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141876" version="1" comment="gnome-keyring is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141877" version="1" comment="gnome-keyring-32bit is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141878" version="1" comment="gnome-keyring-lang is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141879" version="1" comment="gnome-keyring-pam is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141880" version="1" comment="gnome-keyring-pam-32bit is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141881" version="1" comment="libgck-modules-gnome-keyring is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107802" version="1" comment="gnome-settings-daemon is &lt;3.10.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107804" version="1" comment="gnome-settings-daemon-lang is &lt;3.10.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141882" version="1" comment="gnome-shell is &lt;3.10.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141883" version="1" comment="gnome-shell-browser-plugin is &lt;3.10.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141884" version="1" comment="gnome-shell-calendar is &lt;3.10.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141885" version="1" comment="gnome-shell-lang is &lt;3.10.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114253" version="1" comment="gnutls is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114258" version="1" comment="libgnutls28 is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114259" version="1" comment="libgnutls28-32bit is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109841" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109845" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109846" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109847" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109848" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109849" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109850" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109852" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109853" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109854" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109855" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109856" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109857" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141886" version="1" comment="hyper-v is &lt;6-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107566" version="1" comment="icu is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107572" version="1" comment="libicu52_1 is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107571" version="1" comment="libicu52_1-32bit is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107573" version="1" comment="libicu52_1-data is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115439" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.91-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115443" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.91-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114769" version="1" comment="java-1_7_0-openjdk-plugin is &lt;1.6.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141887" version="1" comment="java-1_8_0-openjdk-plugin is &lt;1.6.1-2.4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141888" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.65-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141889" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.65-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141890" version="1" comment="kbd is &lt;1.15.5-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141891" version="1" comment="kernel-default is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141892" version="1" comment="kernel-default-devel is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141893" version="1" comment="kernel-default-extra is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141894" version="1" comment="kernel-devel is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141895" version="1" comment="kernel-macros is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141896" version="1" comment="kernel-source is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141897" version="1" comment="kernel-syms is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141898" version="1" comment="kernel-xen is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141899" version="1" comment="kernel-xen-devel is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115941" version="1" comment="krb5 is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115942" version="1" comment="krb5-32bit is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115943" version="1" comment="krb5-client is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102936" version="1" comment="libFLAC8 is &lt;1.3.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102937" version="1" comment="libFLAC8-32bit is &lt;1.3.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141900" version="1" comment="libQt5Core5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141901" version="1" comment="libQt5DBus5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141902" version="1" comment="libQt5Gui5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141903" version="1" comment="libQt5Widgets5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108654" version="1" comment="libXfont1 is &lt;1.4.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140753" version="1" comment="libXi6 is &lt;1.7.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140754" version="1" comment="libXi6-32bit is &lt;1.7.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108423" version="1" comment="libarchive13 is &lt;3.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111372" version="1" comment="libaugeas0 is &lt;1.2.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141904" version="1" comment="libblkid1 is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141905" version="1" comment="libblkid1-32bit is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141906" version="1" comment="libmount1 is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141907" version="1" comment="libmount1-32bit is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141908" version="1" comment="libsmartcols1 is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141909" version="1" comment="libuuid-devel is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141910" version="1" comment="libuuid1 is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141911" version="1" comment="libuuid1-32bit is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141912" version="1" comment="python-libmount is &lt;2.25-30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141913" version="1" comment="util-linux is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141914" version="1" comment="util-linux-lang is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141915" version="1" comment="util-linux-systemd is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141916" version="1" comment="uuidd is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140793" version="1" comment="libcgroup1 is &lt;0.41.rc1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141917" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141918" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141919" version="1" comment="libdcerpc0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141920" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141921" version="1" comment="libgensec0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141922" version="1" comment="libgensec0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141923" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141924" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141925" version="1" comment="libndr-nbt0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141926" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141927" version="1" comment="libndr-standard0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141928" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141929" version="1" comment="libndr0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141930" version="1" comment="libndr0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141931" version="1" comment="libnetapi0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141932" version="1" comment="libnetapi0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141933" version="1" comment="libregistry0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141934" version="1" comment="libsamba-credentials0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141935" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141936" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141937" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141938" version="1" comment="libsamba-passdb0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141939" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141940" version="1" comment="libsamba-util0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141941" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141942" version="1" comment="libsamdb0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141943" version="1" comment="libsamdb0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141944" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141945" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141946" version="1" comment="libsmbclient0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141947" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141948" version="1" comment="libsmbconf0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141949" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141950" version="1" comment="libsmbldap0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141951" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141952" version="1" comment="libtevent-util0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141953" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141954" version="1" comment="libwbclient0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141955" version="1" comment="libwbclient0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141956" version="1" comment="samba is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141957" version="1" comment="samba-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141958" version="1" comment="samba-client is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141959" version="1" comment="samba-client-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141960" version="1" comment="samba-doc is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141961" version="1" comment="samba-libs is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141962" version="1" comment="samba-libs-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141963" version="1" comment="samba-winbind is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141964" version="1" comment="samba-winbind-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141965" version="1" comment="libecpg6 is &lt;9.4.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141966" version="1" comment="libpq5 is &lt;9.4.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141967" version="1" comment="libpq5-32bit is &lt;9.4.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141968" version="1" comment="postgresql94 is &lt;9.4.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116018" version="1" comment="libfreebl3 is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116019" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116022" version="1" comment="libsoftokn3 is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116023" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116026" version="1" comment="mozilla-nss is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116027" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116029" version="1" comment="mozilla-nss-certs is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116030" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116032" version="1" comment="mozilla-nss-sysinit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116033" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116034" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141969" version="1" comment="libfreetype6 is &lt;2.5.5-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141970" version="1" comment="libfreetype6-32bit is &lt;2.5.5-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114243" version="1" comment="libgcrypt20 is &lt;1.6.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114244" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141971" version="1" comment="libgudev-1_0-0 is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141972" version="1" comment="libgudev-1_0-0-32bit is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141973" version="1" comment="libudev1 is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141974" version="1" comment="libudev1-32bit is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141975" version="1" comment="systemd is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141976" version="1" comment="systemd-32bit is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141977" version="1" comment="systemd-bash-completion is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141978" version="1" comment="systemd-sysvinit is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141979" version="1" comment="udev is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141980" version="1" comment="libipa_hbac0 is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141981" version="1" comment="libsss_idmap0 is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141982" version="1" comment="libsss_sudo is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141983" version="1" comment="python-sssd-config is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141984" version="1" comment="sssd is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141985" version="1" comment="sssd-32bit is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141986" version="1" comment="sssd-ad is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141987" version="1" comment="sssd-ipa is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141988" version="1" comment="sssd-krb5 is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141989" version="1" comment="sssd-krb5-common is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141990" version="1" comment="sssd-ldap is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141991" version="1" comment="sssd-proxy is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141992" version="1" comment="sssd-tools is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106110" version="1" comment="libjasper1 is &lt;1.900.1-170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106111" version="1" comment="libjasper1-32bit is &lt;1.900.1-170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108618" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108619" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108628" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108630" version="1" comment="libwebkit2gtk-3_0-25 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108620" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108621" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108631" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108623" version="1" comment="libwebkitgtk2-lang is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108634" version="1" comment="libwebkitgtk3-lang is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108635" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108636" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105080" version="1" comment="libjpeg-turbo is &lt;1.3.1-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105088" version="1" comment="libjpeg62 is &lt;62.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105087" version="1" comment="libjpeg62-32bit is &lt;62.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105091" version="1" comment="libjpeg62-turbo is &lt;1.3.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105082" version="1" comment="libjpeg8 is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105081" version="1" comment="libjpeg8-32bit is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105086" version="1" comment="libturbojpeg0 is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105094" version="1" comment="libksba8 is &lt;1.3.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105814" version="1" comment="libmpfr4 is &lt;3.1.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107709" version="1" comment="libmspack0 is &lt;0.4-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141993" version="1" comment="libmysqlclient18 is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141994" version="1" comment="libmysqlclient18-32bit is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141995" version="1" comment="libmysqlclient_r18 is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141996" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141997" version="1" comment="mariadb is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141998" version="1" comment="mariadb-client is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141999" version="1" comment="mariadb-errormessages is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142000" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142001" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142002" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142003" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142004" version="1" comment="openssl is &lt;1.0.1i-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142005" version="1" comment="libpng15-15 is &lt;1.5.22-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105438" version="1" comment="libpng16-16 is &lt;1.6.8-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105439" version="1" comment="libpng16-16-32bit is &lt;1.6.8-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115371" version="1" comment="libpolkit0 is &lt;0.113-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115372" version="1" comment="libpolkit0-32bit is &lt;0.113-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115373" version="1" comment="polkit is &lt;0.113-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115376" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142006" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142007" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142008" version="1" comment="python-base is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142009" version="1" comment="python-devel is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142010" version="1" comment="python-xml is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140926" version="1" comment="libpython3_4m1_0 is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140927" version="1" comment="python3-base is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113431" version="1" comment="libqt4 is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113430" version="1" comment="libqt4-32bit is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113436" version="1" comment="libqt4-qt3support is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113435" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113438" version="1" comment="libqt4-sql is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113437" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113424" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113423" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113427" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113426" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113440" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113439" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113429" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113428" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113442" version="1" comment="libqt4-x11 is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113441" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115661" version="1" comment="libreoffice is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115662" version="1" comment="libreoffice-base is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115663" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115664" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115666" version="1" comment="libreoffice-calc is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115667" version="1" comment="libreoffice-calc-extensions is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115668" version="1" comment="libreoffice-draw is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115669" version="1" comment="libreoffice-filters-optional is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115670" version="1" comment="libreoffice-gnome is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115677" version="1" comment="libreoffice-icon-theme-tango is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115678" version="1" comment="libreoffice-impress is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115680" version="1" comment="libreoffice-l10n-af is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115681" version="1" comment="libreoffice-l10n-ar is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115686" version="1" comment="libreoffice-l10n-ca is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115687" version="1" comment="libreoffice-l10n-cs is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115689" version="1" comment="libreoffice-l10n-da is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115690" version="1" comment="libreoffice-l10n-de is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115693" version="1" comment="libreoffice-l10n-en is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115694" version="1" comment="libreoffice-l10n-es is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115698" version="1" comment="libreoffice-l10n-fi is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115699" version="1" comment="libreoffice-l10n-fr is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115702" version="1" comment="libreoffice-l10n-gu is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115704" version="1" comment="libreoffice-l10n-hi is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115706" version="1" comment="libreoffice-l10n-hu is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115707" version="1" comment="libreoffice-l10n-it is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115708" version="1" comment="libreoffice-l10n-ja is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115711" version="1" comment="libreoffice-l10n-ko is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115717" version="1" comment="libreoffice-l10n-nb is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115718" version="1" comment="libreoffice-l10n-nl is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115719" version="1" comment="libreoffice-l10n-nn is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115724" version="1" comment="libreoffice-l10n-pl is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115725" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115726" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115728" version="1" comment="libreoffice-l10n-ru is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115730" version="1" comment="libreoffice-l10n-sk is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115735" version="1" comment="libreoffice-l10n-sv is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115744" version="1" comment="libreoffice-l10n-xh is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115745" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115746" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115747" version="1" comment="libreoffice-l10n-zu is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115748" version="1" comment="libreoffice-mailmerge is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115749" version="1" comment="libreoffice-math is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115750" version="1" comment="libreoffice-officebean is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115751" version="1" comment="libreoffice-pyuno is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115754" version="1" comment="libreoffice-writer is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115755" version="1" comment="libreoffice-writer-extensions is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105408" version="1" comment="libruby2_1-2_1 is &lt;2.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105409" version="1" comment="ruby2.1 is &lt;2.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105414" version="1" comment="ruby2.1-stdlib is &lt;2.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105600" version="1" comment="libsndfile1 is &lt;1.0.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105601" version="1" comment="libsndfile1-32bit is &lt;1.0.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140934" version="1" comment="libsnmp30 is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140935" version="1" comment="libsnmp30-32bit is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140936" version="1" comment="net-snmp is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140937" version="1" comment="perl-SNMP is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140938" version="1" comment="snmp-mibs is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142011" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142012" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142013" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142014" version="1" comment="libspice-controller0 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142015" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142016" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142017" version="1" comment="libspice-server1 is &lt;0.12.5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108425" version="1" comment="libssh2-1 is &lt;1.4.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108426" version="1" comment="libssh2-1-32bit is &lt;1.4.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114957" version="1" comment="libssh4 is &lt;0.6.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109692" version="1" comment="libtasn1 is &lt;3.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109693" version="1" comment="libtasn1-6 is &lt;3.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109694" version="1" comment="libtasn1-6-32bit is &lt;3.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114060" version="1" comment="libtiff5 is &lt;4.0.4-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114059" version="1" comment="libtiff5-32bit is &lt;4.0.4-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115565" version="1" comment="libvdpau1 is &lt;0.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115566" version="1" comment="libvdpau1-32bit is &lt;0.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142018" version="1" comment="libvirt is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142019" version="1" comment="libvirt-client is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142020" version="1" comment="libvirt-client-32bit is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142021" version="1" comment="libvirt-daemon is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142022" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142023" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142024" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142025" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142026" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142027" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142028" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142029" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142030" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142031" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142032" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142033" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142034" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142035" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142036" version="1" comment="libvirt-doc is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114120" version="1" comment="libwmf-0_2-7 is &lt;0.2.8.4-242.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108092" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108093" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103731" version="1" comment="libxml2-2 is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103732" version="1" comment="libxml2-2-32bit is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103737" version="1" comment="libxml2-tools is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141036" version="1" comment="libyaml-0-2 is &lt;0.1.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142037" version="1" comment="libzip2 is &lt;0.11.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114236" version="1" comment="libzmq3 is &lt;4.0.4-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142038" version="1" comment="mailx is &lt;12.5-25.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116016" version="1" comment="mozilla-nspr is &lt;4.10.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116015" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105068" version="1" comment="mutt is &lt;1.5.21-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142039" version="1" comment="ntp is &lt;4.2.8p4-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142040" version="1" comment="ntp-doc is &lt;4.2.8p4-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142041" version="1" comment="openslp is &lt;2.0.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142042" version="1" comment="openslp-32bit is &lt;2.0.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114322" version="1" comment="openssh is &lt;6.6p1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114325" version="1" comment="openssh-helpers is &lt;6.6p1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142043" version="1" comment="openvpn is &lt;2.3.8-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113958" version="1" comment="p7zip is &lt;9.20.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141056" version="1" comment="pam is &lt;1.1.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141057" version="1" comment="pam-32bit is &lt;1.1.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141058" version="1" comment="pam-doc is &lt;1.1.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110205" version="1" comment="patch is &lt;2.7.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113959" version="1" comment="perl-XML-LibXML is &lt;2.0019-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109959" version="1" comment="perl-YAML-LibYAML is &lt;0.38-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108432" version="1" comment="pigz is &lt;2.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142044" version="1" comment="python is &lt;2.7.9-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142045" version="1" comment="python-curses is &lt;2.7.9-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142046" version="1" comment="python-tk is &lt;2.7.9-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141074" version="1" comment="python3 is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103738" version="1" comment="python-libxml2 is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142047" version="1" comment="python-requests is &lt;2.3.0-6.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142048" version="1" comment="qemu is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142049" version="1" comment="qemu-block-curl is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142050" version="1" comment="qemu-ipxe is &lt;1.0.0-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142051" version="1" comment="qemu-kvm is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142052" version="1" comment="qemu-seabios is &lt;1.8.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142053" version="1" comment="qemu-sgabios is &lt;8-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142054" version="1" comment="qemu-tools is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142055" version="1" comment="qemu-vgabios is &lt;1.8.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142056" version="1" comment="qemu-x86 is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142057" version="1" comment="rpcbind is &lt;0.2.1_rc4-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105405" version="1" comment="rpm is &lt;4.11.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105404" version="1" comment="rpm-32bit is &lt;4.11.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105406" version="1" comment="rpm-build is &lt;4.11.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142058" version="1" comment="rsyslog is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141124" version="1" comment="sblim-sfcb is &lt;1.4.8-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142059" version="1" comment="shim is &lt;0.9-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110995" version="1" comment="strongswan is &lt;5.1.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110997" version="1" comment="strongswan-doc is &lt;5.1.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110999" version="1" comment="strongswan-ipsec is &lt;5.1.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111000" version="1" comment="strongswan-libs0 is &lt;5.1.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142060" version="1" comment="sysconfig is &lt;0.83.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142061" version="1" comment="sysconfig-netconfig is &lt;0.83.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139103" version="1" comment="tar is &lt;1.27.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139104" version="1" comment="tar-lang is &lt;1.27.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108642" version="1" comment="tcpdump is &lt;4.5.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141141" version="1" comment="tftp is &lt;5.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142062" version="1" comment="tigervnc is &lt;1.4.3-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142063" version="1" comment="xorg-x11-Xvnc is &lt;1.4.3-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106381" version="1" comment="unzip is &lt;6.00-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115051" version="1" comment="vorbis-tools is &lt;1.4.0-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115052" version="1" comment="vorbis-tools-lang is &lt;1.4.0-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102008" version="1" comment="wget is &lt;1.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114951" version="1" comment="wireshark is &lt;1.12.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110201" version="1" comment="wpa_supplicant is &lt;2.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106065" version="1" comment="xdg-utils is &lt;20140630-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142064" version="1" comment="xen is &lt;4.5.1_12-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142065" version="1" comment="xen-kmp-default is &lt;4.5.1_12_k3.12.49_11-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142066" version="1" comment="xen-libs is &lt;4.5.1_12-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142067" version="1" comment="xen-libs-32bit is &lt;4.5.1_12-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142068" version="1" comment="xf86-video-intel is &lt;2.99.914-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142069" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-36.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142070" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-36.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142071" version="1" comment="yast2 is &lt;3.1.155-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142072" version="1" comment="yast2-core is &lt;3.1.18-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140428" version="1" comment="DirectFB is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140429" version="1" comment="lib++dfb-1_7-1 is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140430" version="1" comment="libdirectfb-1_7-1 is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142073" version="1" comment="libdirectfb-1_7-1-32bit is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128016" version="1" comment="sled-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130983" version="1" comment="ImageMagick is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130984" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130985" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130986" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130987" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131144" version="1" comment="MozillaFirefox is &lt;45.4.0esr-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131145" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142074" version="1" comment="NetworkManager is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142075" version="1" comment="NetworkManager-lang is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140431" version="1" comment="libnm-glib-vpn1 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140432" version="1" comment="libnm-glib4 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140433" version="1" comment="libnm-util2 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140434" version="1" comment="libnm0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142076" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140435" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140436" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140437" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140438" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140439" version="1" comment="accountsservice is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140440" version="1" comment="accountsservice-lang is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140441" version="1" comment="libaccountsservice0 is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140442" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142077" version="1" comment="argyllcms is &lt;1.6.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131107" version="1" comment="at is &lt;3.1.14-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131109" version="1" comment="libQtWebKit4 is &lt;4.8.6+2.3.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131110" version="1" comment="libQtWebKit4-32bit is &lt;4.8.6+2.3.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131111" version="1" comment="libbonobo is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131112" version="1" comment="libbonobo-32bit is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131113" version="1" comment="libbonobo-lang is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131114" version="1" comment="libkde4 is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131115" version="1" comment="libkde4-32bit is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131116" version="1" comment="libkdecore4 is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131117" version="1" comment="libkdecore4-32bit is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131118" version="1" comment="libksuseinstall1 is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131119" version="1" comment="libksuseinstall1-32bit is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131120" version="1" comment="libnetpbm11 is &lt;10.66.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131121" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131122" version="1" comment="netpbm is &lt;10.66.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140461" version="1" comment="augeas is &lt;1.2.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140462" version="1" comment="augeas-lenses is &lt;1.2.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140463" version="1" comment="libaugeas0 is &lt;1.2.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140464" version="1" comment="autofs is &lt;5.0.9-21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140467" version="1" comment="avahi is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140468" version="1" comment="avahi-lang is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140470" version="1" comment="libavahi-client3 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140471" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140472" version="1" comment="libavahi-common3 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140473" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140474" version="1" comment="libavahi-core7 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140475" version="1" comment="libdns_sd is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140476" version="1" comment="libdns_sd-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140477" version="1" comment="bash is &lt;4.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140478" version="1" comment="bash-doc is &lt;4.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142078" version="1" comment="bash-lang is &lt;4.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140479" version="1" comment="libreadline6 is &lt;6.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140480" version="1" comment="libreadline6-32bit is &lt;6.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140481" version="1" comment="readline-doc is &lt;6.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131136" version="1" comment="bind-libs is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131137" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131138" version="1" comment="bind-utils is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140482" version="1" comment="binutils is &lt;2.26.1-9.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131108" version="1" comment="bogofilter is &lt;1.2.4-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140483" version="1" comment="bzip2 is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140485" version="1" comment="libbz2-1 is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140486" version="1" comment="libbz2-1-32bit is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140488" version="1" comment="cifs-utils is &lt;6.5-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140489" version="1" comment="clamav is &lt;0.99.2-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142079" version="1" comment="colord is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140490" version="1" comment="colord-gtk-lang is &lt;0.1.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142080" version="1" comment="colord-lang is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140491" version="1" comment="libcolord-gtk1 is &lt;0.1.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140492" version="1" comment="libcolord2 is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140493" version="1" comment="libcolord2-32bit is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140494" version="1" comment="libcolorhug2 is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140496" version="1" comment="coreutils is &lt;8.25-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140497" version="1" comment="coreutils-lang is &lt;8.25-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140498" version="1" comment="cpp48 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140499" version="1" comment="gcc48 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140500" version="1" comment="gcc48-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140501" version="1" comment="gcc48-c++ is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142081" version="1" comment="gcc48-gij is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142082" version="1" comment="gcc48-gij-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140502" version="1" comment="gcc48-info is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140504" version="1" comment="libasan0 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140505" version="1" comment="libasan0-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142083" version="1" comment="libgcj48 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142084" version="1" comment="libgcj48-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142085" version="1" comment="libgcj48-jar is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142086" version="1" comment="libgcj_bc1 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140506" version="1" comment="libstdc++48-devel is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140507" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130930" version="1" comment="cracklib is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131013" version="1" comment="libcrack2 is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131014" version="1" comment="libcrack2-32bit is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130995" version="1" comment="ctags is &lt;5.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140510" version="1" comment="cups is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140511" version="1" comment="cups-client is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140512" version="1" comment="cups-libs is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140513" version="1" comment="cups-libs-32bit is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119506" version="1" comment="cups-filters is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119507" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119508" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119509" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131101" version="1" comment="curl is &lt;7.37.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131102" version="1" comment="libcurl4 is &lt;7.37.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131103" version="1" comment="libcurl4-32bit is &lt;7.37.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140535" version="1" comment="dbus-1 is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140536" version="1" comment="dbus-1-x11 is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140537" version="1" comment="libdbus-1-3 is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140538" version="1" comment="libdbus-1-3-32bit is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130039" version="1" comment="dhcp is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130040" version="1" comment="dhcp-client is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142087" version="1" comment="dia is &lt;0.97.3-15.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142088" version="1" comment="dia-lang is &lt;0.97.3-15.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140541" version="1" comment="dnsmasq is &lt;2.71-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131020" version="1" comment="dosfstools is &lt;3.0.26-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140546" version="1" comment="dracut is &lt;044-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121566" version="1" comment="ecryptfs-utils is &lt;103-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121567" version="1" comment="ecryptfs-utils-32bit is &lt;103-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140549" version="1" comment="emacs is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140551" version="1" comment="emacs-info is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140553" version="1" comment="emacs-x11 is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140554" version="1" comment="etags is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142089" version="1" comment="empathy is &lt;3.12.12-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142090" version="1" comment="empathy-lang is &lt;3.12.12-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142091" version="1" comment="telepathy-mission-control-plugin-goa is &lt;3.12.12-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140555" version="1" comment="eog is &lt;3.20.4-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140556" version="1" comment="eog-lang is &lt;3.20.4-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140557" version="1" comment="evince is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140558" version="1" comment="evince-browser-plugin is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140559" version="1" comment="evince-lang is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140560" version="1" comment="evince-plugin-djvudocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140561" version="1" comment="evince-plugin-dvidocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140562" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140563" version="1" comment="evince-plugin-psdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140564" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140565" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140566" version="1" comment="libevdocument3-4 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140567" version="1" comment="libevview3-3 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140568" version="1" comment="nautilus-evince is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142092" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142093" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128464" version="1" comment="expat is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128465" version="1" comment="libexpat1 is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128466" version="1" comment="libexpat1-32bit is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140569" version="1" comment="fetchmail is &lt;6.3.26-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142094" version="1" comment="finch is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142095" version="1" comment="libpurple is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142096" version="1" comment="libpurple-lang is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142097" version="1" comment="libpurple-meanwhile is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142098" version="1" comment="libpurple-tcl is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142099" version="1" comment="pidgin is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140574" version="1" comment="fontconfig is &lt;2.11.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140575" version="1" comment="fontconfig-32bit is &lt;2.11.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142100" version="1" comment="freerdp is &lt;2.0.0~git.1463131968.4e66df7-11.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142101" version="1" comment="libfreerdp2 is &lt;2.0.0~git.1463131968.4e66df7-11.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140589" version="1" comment="ft2demos is &lt;2.6.3-7.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131048" version="1" comment="gd is &lt;2.1.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131049" version="1" comment="gd-32bit is &lt;2.1.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140591" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140592" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140593" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140594" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140595" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140596" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140597" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140598" version="1" comment="librsvg-2-2 is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140599" version="1" comment="librsvg-2-2-32bit is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140600" version="1" comment="rsvg-view is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140601" version="1" comment="gdm is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140602" version="1" comment="gdm-lang is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140603" version="1" comment="gdmflexiserver is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140604" version="1" comment="libgdm1 is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140605" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125321" version="1" comment="ghostscript is &lt;9.15-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125322" version="1" comment="ghostscript-x11 is &lt;9.15-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142102" version="1" comment="gimp is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142103" version="1" comment="gimp-lang is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142104" version="1" comment="gimp-plugins-python is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142105" version="1" comment="libgimp-2_0-0 is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142106" version="1" comment="libgimpui-2_0-0 is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140606" version="1" comment="glib2-lang is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140607" version="1" comment="glib2-tools is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140608" version="1" comment="libgio-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140609" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142107" version="1" comment="libgio-fam is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140610" version="1" comment="libglib-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140611" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140612" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140613" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140614" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140615" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140616" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140617" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140618" version="1" comment="glibc is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140619" version="1" comment="glibc-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140620" version="1" comment="glibc-devel is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140621" version="1" comment="glibc-devel-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140623" version="1" comment="glibc-i18ndata is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140625" version="1" comment="glibc-locale is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140626" version="1" comment="glibc-locale-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140629" version="1" comment="nscd is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140630" version="1" comment="gnome-keyring is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140631" version="1" comment="gnome-keyring-32bit is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140632" version="1" comment="gnome-keyring-lang is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140633" version="1" comment="gnome-keyring-pam is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140634" version="1" comment="gnome-keyring-pam-32bit is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140635" version="1" comment="libgck-modules-gnome-keyring is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142108" version="1" comment="gnome-online-accounts is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142109" version="1" comment="gnome-online-accounts-lang is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140636" version="1" comment="libgoa-1_0-0 is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142110" version="1" comment="libgoa-1_0-0-32bit is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140637" version="1" comment="libgoa-backend-1_0-1 is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142111" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140638" version="1" comment="gnome-settings-daemon is &lt;3.20.1-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140639" version="1" comment="gnome-settings-daemon-lang is &lt;3.20.1-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140640" version="1" comment="gnome-shell is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140641" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142112" version="1" comment="gnome-shell-calendar is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140642" version="1" comment="gnome-shell-lang is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119616" version="1" comment="gpg2 is &lt;2.0.24-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119617" version="1" comment="gpg2-lang is &lt;2.0.24-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140648" version="1" comment="grub2 is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140650" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140653" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140654" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140655" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140656" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142113" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142114" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142115" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142116" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142117" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142118" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142119" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142120" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142121" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142122" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142123" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142124" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142125" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140657" version="1" comment="gtk2-data is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140658" version="1" comment="gtk2-lang is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140659" version="1" comment="gtk2-tools is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140660" version="1" comment="gtk2-tools-32bit is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140661" version="1" comment="libgtk-2_0-0 is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140662" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142126" version="1" comment="typelib-1_0-Gtk-2_0 is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140682" version="1" comment="hyper-v is &lt;7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140683" version="1" comment="ibus-chewing is &lt;1.4.14-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140684" version="1" comment="ibus-pinyin is &lt;1.5.0-7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142127" version="1" comment="imobiledevice-tools is &lt;1.2.0-7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140847" version="1" comment="libimobiledevice6 is &lt;1.2.0-7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130960" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130961" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130962" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.101-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130963" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.101-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140693" version="1" comment="kbd is &lt;1.15.5-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140694" version="1" comment="kdump is &lt;0.8.15-28.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140695" version="1" comment="kernel-default is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140697" version="1" comment="kernel-default-devel is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142128" version="1" comment="kernel-default-extra is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140699" version="1" comment="kernel-devel is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140700" version="1" comment="kernel-macros is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140701" version="1" comment="kernel-source is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140702" version="1" comment="kernel-syms is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140703" version="1" comment="krb5 is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140704" version="1" comment="krb5-32bit is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140705" version="1" comment="krb5-client is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126431" version="1" comment="lhasa is &lt;0.2.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126432" version="1" comment="liblhasa0 is &lt;0.2.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140571" version="1" comment="libFLAC++6 is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142129" version="1" comment="libFLAC++6-32bit is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140572" version="1" comment="libFLAC8 is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140573" version="1" comment="libFLAC8-32bit is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140721" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140722" version="1" comment="libQt5Core5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140723" version="1" comment="libQt5DBus5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140724" version="1" comment="libQt5Gui5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140725" version="1" comment="libQt5Network5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140726" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140727" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140728" version="1" comment="libQt5Sql5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140729" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140730" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140731" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140732" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140733" version="1" comment="libQt5Test5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140734" version="1" comment="libQt5Widgets5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140735" version="1" comment="libQt5Xml5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140736" version="1" comment="libQt5WebKit5 is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140737" version="1" comment="libQt5WebKit5-imports is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140738" version="1" comment="libQt5WebKitWidgets5 is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140752" version="1" comment="libXfont1 is &lt;1.5.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140759" version="1" comment="libXrandr2 is &lt;1.5.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140760" version="1" comment="libXrandr2-32bit is &lt;1.5.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140770" version="1" comment="libXvnc1 is &lt;1.6.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140771" version="1" comment="tigervnc is &lt;1.6.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140772" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130724" version="1" comment="libarchive13 is &lt;3.1.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125716" version="1" comment="libasan2 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125717" version="1" comment="libasan2-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125723" version="1" comment="libffi4 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125724" version="1" comment="libffi4-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125734" version="1" comment="libmpx0 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125735" version="1" comment="libmpx0-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125736" version="1" comment="libmpxwrappers0 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125737" version="1" comment="libmpxwrappers0-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140779" version="1" comment="libblkid1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140780" version="1" comment="libblkid1-32bit is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140781" version="1" comment="libfdisk1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140782" version="1" comment="libmount1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140783" version="1" comment="libmount1-32bit is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140784" version="1" comment="libsmartcols1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142130" version="1" comment="libuuid-devel is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140785" version="1" comment="libuuid1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140786" version="1" comment="libuuid1-32bit is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140787" version="1" comment="python-libmount is &lt;2.28-40.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140788" version="1" comment="util-linux is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140789" version="1" comment="util-linux-lang is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140790" version="1" comment="util-linux-systemd is &lt;2.28-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140791" version="1" comment="uuidd is &lt;2.28-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131768" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140794" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140795" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140796" version="1" comment="libdcerpc0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140797" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140798" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140799" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140800" version="1" comment="libndr-nbt0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140801" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140802" version="1" comment="libndr-standard0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140803" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140804" version="1" comment="libndr0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140805" version="1" comment="libndr0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140806" version="1" comment="libnetapi0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140807" version="1" comment="libnetapi0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140808" version="1" comment="libsamba-credentials0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140809" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140810" version="1" comment="libsamba-errors0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140811" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140812" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140813" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140814" version="1" comment="libsamba-passdb0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140815" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140816" version="1" comment="libsamba-util0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140817" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140818" version="1" comment="libsamdb0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140819" version="1" comment="libsamdb0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140820" version="1" comment="libsmbclient0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140821" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140822" version="1" comment="libsmbconf0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140823" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140824" version="1" comment="libsmbldap0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140825" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140826" version="1" comment="libtevent-util0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140827" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140828" version="1" comment="libwbclient0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140829" version="1" comment="libwbclient0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140830" version="1" comment="samba is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140831" version="1" comment="samba-client is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140832" version="1" comment="samba-client-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140833" version="1" comment="samba-doc is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140834" version="1" comment="samba-libs is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140835" version="1" comment="samba-libs-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140836" version="1" comment="samba-winbind is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140837" version="1" comment="samba-winbind-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131139" version="1" comment="libecpg6 is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131140" version="1" comment="libpq5 is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131141" version="1" comment="libpq5-32bit is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131142" version="1" comment="postgresql94 is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129282" version="1" comment="libfreebl3 is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129283" version="1" comment="libfreebl3-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129284" version="1" comment="libsoftokn3 is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129285" version="1" comment="libsoftokn3-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129288" version="1" comment="mozilla-nss is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129289" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129290" version="1" comment="mozilla-nss-certs is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129291" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129292" version="1" comment="mozilla-nss-sysinit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129293" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129294" version="1" comment="mozilla-nss-tools is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140587" version="1" comment="libfreetype6 is &lt;2.6.3-7.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140588" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131105" version="1" comment="libgcrypt20 is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131106" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126709" version="1" comment="libgif6 is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126710" version="1" comment="libgif6-32bit is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140842" version="1" comment="libgnomesu is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140843" version="1" comment="libgnomesu-lang is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140844" version="1" comment="libgnomesu0 is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124729" version="1" comment="libgraphite2-3 is &lt;1.3.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124730" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140676" version="1" comment="libgypsy0 is &lt;0.9-6.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123011" version="1" comment="libhogweed2 is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123012" version="1" comment="libhogweed2-32bit is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123014" version="1" comment="libnettle4 is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123015" version="1" comment="libnettle4-32bit is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130989" version="1" comment="libidn11 is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130990" version="1" comment="libidn11-32bit is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140848" version="1" comment="libipa_hbac0 is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140849" version="1" comment="libsss_idmap0 is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140850" version="1" comment="libsss_sudo is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140851" version="1" comment="python-sssd-config is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140852" version="1" comment="sssd is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140853" version="1" comment="sssd-32bit is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140854" version="1" comment="sssd-ad is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140855" version="1" comment="sssd-ipa is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140856" version="1" comment="sssd-krb5 is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140857" version="1" comment="sssd-krb5-common is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140858" version="1" comment="sssd-ldap is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140859" version="1" comment="sssd-proxy is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140860" version="1" comment="sssd-tools is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142131" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142132" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140862" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142133" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142134" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140863" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142135" version="1" comment="libwebkitgtk2-lang is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140864" version="1" comment="libwebkitgtk3-lang is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142136" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142137" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140865" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140866" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142138" version="1" comment="libwebkit2gtk3-lang is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140867" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140868" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140869" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128468" version="1" comment="libksba8 is &lt;1.3.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140870" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140871" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140874" version="1" comment="openldap2-client is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140715" version="1" comment="libldb1 is &lt;1.1.26-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140716" version="1" comment="libldb1-32bit is &lt;1.1.26-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118765" version="1" comment="libmspack0 is &lt;0.4-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131128" version="1" comment="libmysqlclient18 is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131129" version="1" comment="libmysqlclient18-32bit is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131130" version="1" comment="libmysqlclient_r18 is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131131" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131132" version="1" comment="mariadb is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131133" version="1" comment="mariadb-client is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131134" version="1" comment="mariadb-errormessages is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142139" version="1" comment="libndp0 is &lt;1.6-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142140" version="1" comment="libnewt0_52 is &lt;0.52.16-1.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140890" version="1" comment="libopenssl-devel is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140891" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140892" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140895" version="1" comment="openssl is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131148" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131149" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124478" version="1" comment="libotr5 is &lt;4.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140897" version="1" comment="libpango-1_0-0 is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140898" version="1" comment="libpango-1_0-0-32bit is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140899" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119221" version="1" comment="libpng12-0 is &lt;1.2.50-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119222" version="1" comment="libpng12-0-32bit is &lt;1.2.50-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119233" version="1" comment="libpng15-15 is &lt;1.5.22-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119224" version="1" comment="libpng16-16 is &lt;1.6.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119225" version="1" comment="libpng16-16-32bit is &lt;1.6.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140902" version="1" comment="libpolkit0 is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142141" version="1" comment="libpolkit0-32bit is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140903" version="1" comment="polkit is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140904" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140905" version="1" comment="libpoppler-glib8 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140906" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140907" version="1" comment="libpoppler60 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140908" version="1" comment="poppler-tools is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128640" version="1" comment="libpoppler44 is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140909" version="1" comment="libproxy1 is &lt;0.4.13-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140910" version="1" comment="libproxy1-32bit is &lt;0.4.13-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140911" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140912" version="1" comment="libproxy1-config-gnome3-32bit is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140913" version="1" comment="libproxy1-networkmanager is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142142" version="1" comment="libproxy1-networkmanager-32bit is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140914" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130996" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130997" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130999" version="1" comment="python-base is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131001" version="1" comment="python-devel is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131003" version="1" comment="python-xml is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125268" version="1" comment="libqt4 is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125269" version="1" comment="libqt4-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125270" version="1" comment="libqt4-qt3support is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125271" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125272" version="1" comment="libqt4-sql is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125273" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125274" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125275" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125277" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125278" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125279" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125280" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125281" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125282" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125283" version="1" comment="libqt4-x11 is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125284" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130948" version="1" comment="libreoffice is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131150" version="1" comment="libreoffice-base is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131151" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131152" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131153" version="1" comment="libreoffice-calc is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131154" version="1" comment="libreoffice-calc-extensions is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131155" version="1" comment="libreoffice-draw is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131156" version="1" comment="libreoffice-filters-optional is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131157" version="1" comment="libreoffice-gnome is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131158" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131159" version="1" comment="libreoffice-icon-theme-tango is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131160" version="1" comment="libreoffice-impress is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131161" version="1" comment="libreoffice-l10n-af is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131162" version="1" comment="libreoffice-l10n-ar is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131163" version="1" comment="libreoffice-l10n-ca is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131164" version="1" comment="libreoffice-l10n-cs is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131165" version="1" comment="libreoffice-l10n-da is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131166" version="1" comment="libreoffice-l10n-de is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131167" version="1" comment="libreoffice-l10n-en is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131168" version="1" comment="libreoffice-l10n-es is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131169" version="1" comment="libreoffice-l10n-fi is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131170" version="1" comment="libreoffice-l10n-fr is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131171" version="1" comment="libreoffice-l10n-gu is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131172" version="1" comment="libreoffice-l10n-hi is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131173" version="1" comment="libreoffice-l10n-hu is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131174" version="1" comment="libreoffice-l10n-it is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131175" version="1" comment="libreoffice-l10n-ja is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131176" version="1" comment="libreoffice-l10n-ko is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131177" version="1" comment="libreoffice-l10n-nb is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131178" version="1" comment="libreoffice-l10n-nl is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131179" version="1" comment="libreoffice-l10n-nn is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131180" version="1" comment="libreoffice-l10n-pl is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131181" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131182" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142143" version="1" comment="libreoffice-l10n-ro is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131183" version="1" comment="libreoffice-l10n-ru is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131184" version="1" comment="libreoffice-l10n-sk is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131185" version="1" comment="libreoffice-l10n-sv is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131186" version="1" comment="libreoffice-l10n-xh is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131187" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131188" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131189" version="1" comment="libreoffice-l10n-zu is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131190" version="1" comment="libreoffice-mailmerge is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131191" version="1" comment="libreoffice-math is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131192" version="1" comment="libreoffice-officebean is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131193" version="1" comment="libreoffice-pyuno is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131194" version="1" comment="libreoffice-writer is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131195" version="1" comment="libreoffice-writer-extensions is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142144" version="1" comment="libreofficekit is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140929" version="1" comment="libruby2_1-2_1 is &lt;2.1.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140930" version="1" comment="ruby2.1 is &lt;2.1.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140931" version="1" comment="ruby2.1-stdlib is &lt;2.1.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119271" version="1" comment="libsndfile1 is &lt;1.0.25-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119272" version="1" comment="libsndfile1-32bit is &lt;1.0.25-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140939" version="1" comment="libsoup-2_4-1 is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140940" version="1" comment="libsoup-2_4-1-32bit is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140941" version="1" comment="libsoup-lang is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140942" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140943" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140944" version="1" comment="libspice-client-glib-helper is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140945" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140946" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140947" version="1" comment="libspice-controller0 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140948" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140949" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140950" version="1" comment="libspice-server1 is &lt;0.12.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130774" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130775" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130776" version="1" comment="sqlite3 is &lt;3.8.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140951" version="1" comment="libsrtp1 is &lt;1.5.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140952" version="1" comment="libssh2-1 is &lt;1.4.3-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140953" version="1" comment="libssh2-1-32bit is &lt;1.4.3-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123868" version="1" comment="libssh4 is &lt;0.6.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140954" version="1" comment="libsystemd0 is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140955" version="1" comment="libsystemd0-32bit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140956" version="1" comment="libudev1 is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140957" version="1" comment="libudev1-32bit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140958" version="1" comment="systemd is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140959" version="1" comment="systemd-32bit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140960" version="1" comment="systemd-bash-completion is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140961" version="1" comment="systemd-sysvinit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140962" version="1" comment="udev is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128901" version="1" comment="libtasn1 is &lt;3.7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128902" version="1" comment="libtasn1-6 is &lt;3.7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128903" version="1" comment="libtasn1-6-32bit is &lt;3.7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140966" version="1" comment="libthai-data is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140967" version="1" comment="libthai0 is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140968" version="1" comment="libthai0-32bit is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131042" version="1" comment="libtiff5 is &lt;4.0.6-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131043" version="1" comment="libtiff5-32bit is &lt;4.0.6-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140975" version="1" comment="libusbmuxd4 is &lt;1.0.10-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140976" version="1" comment="libvdpau1 is &lt;1.1.1-6.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142145" version="1" comment="libvdpau1-32bit is &lt;1.1.1-6.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140977" version="1" comment="libvirt is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140978" version="1" comment="libvirt-client is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142146" version="1" comment="libvirt-client-32bit is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140979" version="1" comment="libvirt-daemon is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140980" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140981" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140982" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140983" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140984" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140985" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140986" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140987" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140988" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140989" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140990" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140991" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140992" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140993" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140994" version="1" comment="libvirt-doc is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141004" version="1" comment="libvte9 is &lt;0.28.2-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141007" version="1" comment="libxcb-dri2-0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141008" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141009" version="1" comment="libxcb-dri3-0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141010" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141011" version="1" comment="libxcb-glx0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141012" version="1" comment="libxcb-glx0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141013" version="1" comment="libxcb-present0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141014" version="1" comment="libxcb-present0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141015" version="1" comment="libxcb-randr0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141016" version="1" comment="libxcb-render0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141017" version="1" comment="libxcb-render0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141018" version="1" comment="libxcb-shape0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141019" version="1" comment="libxcb-shm0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141020" version="1" comment="libxcb-shm0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141021" version="1" comment="libxcb-sync1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141022" version="1" comment="libxcb-sync1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141023" version="1" comment="libxcb-xf86dri0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141024" version="1" comment="libxcb-xfixes0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141025" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141026" version="1" comment="libxcb-xinerama0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141027" version="1" comment="libxcb-xkb1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141028" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141029" version="1" comment="libxcb-xv0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141030" version="1" comment="libxcb1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141031" version="1" comment="libxcb1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131022" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131023" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141032" version="1" comment="libxml2-2 is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141033" version="1" comment="libxml2-2-32bit is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141035" version="1" comment="libxml2-tools is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141037" version="1" comment="libzip2 is &lt;0.11.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142147" version="1" comment="libzmq3 is &lt;4.0.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141041" version="1" comment="mailx is &lt;12.5-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129286" version="1" comment="mozilla-nspr is &lt;4.12-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129287" version="1" comment="mozilla-nspr-32bit is &lt;4.12-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141043" version="1" comment="mutt is &lt;1.6.0-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128799" version="1" comment="ntp is &lt;4.2.8p8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128800" version="1" comment="ntp-doc is &lt;4.2.8p8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131123" version="1" comment="openslp is &lt;2.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131124" version="1" comment="openslp-32bit is &lt;2.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141045" version="1" comment="openssh is &lt;7.2p2-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141047" version="1" comment="openssh-helpers is &lt;7.2p2-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141048" version="1" comment="openvpn is &lt;2.3.8-16.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128891" version="1" comment="p7zip is &lt;9.20.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131038" version="1" comment="perl is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131039" version="1" comment="perl-32bit is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131040" version="1" comment="perl-base is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131041" version="1" comment="perl-doc is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142148" version="1" comment="pidgin-otr is &lt;4.0.0-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142149" version="1" comment="puppet is &lt;3.8.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130998" version="1" comment="python is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131000" version="1" comment="python-curses is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131002" version="1" comment="python-tk is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141075" version="1" comment="python3-curses is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141076" version="1" comment="python-cupshelpers is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141077" version="1" comment="system-config-printer is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141078" version="1" comment="system-config-printer-common is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141079" version="1" comment="system-config-printer-common-lang is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141080" version="1" comment="system-config-printer-dbus-service is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141081" version="1" comment="udev-configure-printer is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141083" version="1" comment="python-libxml2 is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141084" version="1" comment="python-pyOpenSSL is &lt;16.0.0-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141086" version="1" comment="python-requests is &lt;2.8.1-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141087" version="1" comment="qemu is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141089" version="1" comment="qemu-block-curl is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141093" version="1" comment="qemu-ipxe is &lt;1.0.0-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141094" version="1" comment="qemu-kvm is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141098" version="1" comment="qemu-seabios is &lt;1.9.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141099" version="1" comment="qemu-sgabios is &lt;8-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141100" version="1" comment="qemu-tools is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141101" version="1" comment="qemu-vgabios is &lt;1.9.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141102" version="1" comment="qemu-x86 is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142150" version="1" comment="rhythmbox is &lt;3.4-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142151" version="1" comment="rhythmbox-lang is &lt;3.4-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141107" version="1" comment="rpcbind is &lt;0.2.3-21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141108" version="1" comment="rpm is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141109" version="1" comment="rpm-32bit is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141110" version="1" comment="rpm-build is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141111" version="1" comment="rsync is &lt;3.1.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141112" version="1" comment="rsyslog is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141125" version="1" comment="shim is &lt;0.9-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122758" version="1" comment="socat is &lt;1.7.2.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141126" version="1" comment="squashfs is &lt;4.3-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119278" version="1" comment="strongswan is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119279" version="1" comment="strongswan-doc is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119280" version="1" comment="strongswan-ipsec is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119281" version="1" comment="strongswan-libs0 is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141130" version="1" comment="sudo is &lt;1.8.10p3-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141131" version="1" comment="supportutils is &lt;3.0-85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141132" version="1" comment="sysconfig is &lt;0.84.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141133" version="1" comment="sysconfig-netconfig is &lt;0.84.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141138" version="1" comment="sysvinit-tools is &lt;2.88+-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136443" version="1" comment="tar is &lt;1.27.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136445" version="1" comment="tar-lang is &lt;1.27.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141140" version="1" comment="tcpdump is &lt;4.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142152" version="1" comment="telepathy-gabble is &lt;0.18.3-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141151" version="1" comment="unixODBC is &lt;2.3.4-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141152" version="1" comment="unixODBC-32bit is &lt;2.3.4-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141153" version="1" comment="update-alternatives is &lt;1.18.4-14.216" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141154" version="1" comment="vino is &lt;3.20.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141155" version="1" comment="vino-lang is &lt;3.20.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141157" version="1" comment="w3m is &lt;0.5.3-157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131037" version="1" comment="wget is &lt;1.14-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131146" version="1" comment="wireshark is &lt;1.12.13-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131098" version="1" comment="wpa_supplicant is &lt;2.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141159" version="1" comment="xen is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141161" version="1" comment="xen-libs is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141162" version="1" comment="xen-libs-32bit is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141165" version="1" comment="xf86-video-intel is &lt;2.99.917.641_ge4ef6e9-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141166" version="1" comment="xfsprogs is &lt;4.3.0-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141173" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-57.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141174" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-57.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119273" version="1" comment="xscreensaver is &lt;5.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119274" version="1" comment="xscreensaver-data is &lt;5.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141175" version="1" comment="yast2 is &lt;3.1.206-37.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141176" version="1" comment="yast2-core is &lt;3.1.23-6.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141177" version="1" comment="yast2-users is &lt;3.1.57-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159517" version="1" comment="sled-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156374" version="1" comment="ImageMagick is &lt;6.8.8.1-70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156375" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156376" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156377" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156378" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157344" version="1" comment="MozillaFirefox is &lt;52.2.0esr-108.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157346" version="1" comment="MozillaFirefox-translations is &lt;52.2.0esr-108.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159624" version="1" comment="NetworkManager is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159625" version="1" comment="NetworkManager-lang is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159169" version="1" comment="libnm-glib-vpn1 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159170" version="1" comment="libnm-glib4 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159171" version="1" comment="libnm-util2 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159172" version="1" comment="libnm0 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159626" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159173" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159174" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158923" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158924" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158925" version="1" comment="alsa is &lt;1.0.27.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158927" version="1" comment="libasound2 is &lt;1.0.27.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158928" version="1" comment="libasound2-32bit is &lt;1.0.27.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158932" version="1" comment="apparmor-docs is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158933" version="1" comment="apparmor-parser is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158934" version="1" comment="apparmor-profiles is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158935" version="1" comment="apparmor-utils is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158936" version="1" comment="libapparmor1 is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158937" version="1" comment="libapparmor1-32bit is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158938" version="1" comment="pam_apparmor is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158939" version="1" comment="pam_apparmor-32bit is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158940" version="1" comment="perl-apparmor is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150578" version="1" comment="audiofile is &lt;0.3.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150579" version="1" comment="libaudiofile1 is &lt;0.3.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150580" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158941" version="1" comment="augeas is &lt;1.2.0-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158942" version="1" comment="augeas-lenses is &lt;1.2.0-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158943" version="1" comment="libaugeas0 is &lt;1.2.0-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158944" version="1" comment="autofs is &lt;5.0.9-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155546" version="1" comment="bash is &lt;4.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155547" version="1" comment="bash-doc is &lt;4.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155548" version="1" comment="bash-lang is &lt;4.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155549" version="1" comment="libreadline6 is &lt;6.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155550" version="1" comment="libreadline6-32bit is &lt;6.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155551" version="1" comment="readline-doc is &lt;6.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157662" version="1" comment="bind-libs is &lt;9.9.9P1-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157663" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157664" version="1" comment="bind-utils is &lt;9.9.9P1-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157660" version="1" comment="clamav is &lt;0.99.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159627" version="1" comment="colord is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159628" version="1" comment="colord-lang is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158945" version="1" comment="libcolord2 is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158946" version="1" comment="libcolord2-32bit is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158947" version="1" comment="libcolorhug2 is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158948" version="1" comment="cpio is &lt;2.11-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158949" version="1" comment="cpio-lang is &lt;2.11-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158952" version="1" comment="cups is &lt;1.7.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158953" version="1" comment="cups-client is &lt;1.7.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158954" version="1" comment="cups-libs is &lt;1.7.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158955" version="1" comment="cups-libs-32bit is &lt;1.7.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158956" version="1" comment="cups-filters is &lt;1.0.58-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158957" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158958" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158959" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138209" version="1" comment="cups-pk-helper is &lt;0.2.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138210" version="1" comment="cups-pk-helper-lang is &lt;0.2.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154400" version="1" comment="curl is &lt;7.37.0-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154401" version="1" comment="libcurl4 is &lt;7.37.0-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154402" version="1" comment="libcurl4-32bit is &lt;7.37.0-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158960" version="1" comment="dbus-1 is &lt;1.8.22-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158961" version="1" comment="dbus-1-x11 is &lt;1.8.22-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158962" version="1" comment="libdbus-1-3 is &lt;1.8.22-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158963" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158964" version="1" comment="dnsmasq is &lt;2.76-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158969" version="1" comment="dracut is &lt;044-113.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159629" version="1" comment="drm-kmp-default is &lt;4.9.33_k4.4.73_5-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158971" version="1" comment="e2fsprogs is &lt;1.42.11-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158972" version="1" comment="libcom_err2 is &lt;1.42.11-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158973" version="1" comment="libcom_err2-32bit is &lt;1.42.11-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158974" version="1" comment="libext2fs2 is &lt;1.42.11-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158975" version="1" comment="emacs is &lt;24.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158977" version="1" comment="emacs-info is &lt;24.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158979" version="1" comment="emacs-x11 is &lt;24.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158980" version="1" comment="etags is &lt;24.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159630" version="1" comment="empathy is &lt;3.12.12-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159631" version="1" comment="empathy-lang is &lt;3.12.12-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159632" version="1" comment="telepathy-mission-control-plugin-goa is &lt;3.12.12-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148243" version="1" comment="expat is &lt;2.1.0-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148244" version="1" comment="libexpat1 is &lt;2.1.0-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148245" version="1" comment="libexpat1-32bit is &lt;2.1.0-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159633" version="1" comment="facter is &lt;2.4.6-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159634" version="1" comment="finch is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159635" version="1" comment="libpurple is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159636" version="1" comment="libpurple-branding-upstream is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159637" version="1" comment="libpurple-lang is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159638" version="1" comment="libpurple-plugin-sametime is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159639" version="1" comment="libpurple-tcl is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159640" version="1" comment="pidgin is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158992" version="1" comment="ft2demos is &lt;2.6.3-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148438" version="1" comment="gd is &lt;2.1.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148439" version="1" comment="gd-32bit is &lt;2.1.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158993" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158994" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158995" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158996" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158997" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158998" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149576" version="1" comment="gegl-0_2 is &lt;0.2.0-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149577" version="1" comment="gegl-0_2-lang is &lt;0.2.0-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149578" version="1" comment="libgegl-0_2-0 is &lt;0.2.0-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155975" version="1" comment="ghostscript is &lt;9.15-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155976" version="1" comment="ghostscript-x11 is &lt;9.15-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150803" version="1" comment="gimp is &lt;2.8.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150804" version="1" comment="gimp-lang is &lt;2.8.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150805" version="1" comment="gimp-plugins-python is &lt;2.8.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150806" version="1" comment="libgimp-2_0-0 is &lt;2.8.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150807" version="1" comment="libgimpui-2_0-0 is &lt;2.8.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156957" version="1" comment="glibc is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156958" version="1" comment="glibc-32bit is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156959" version="1" comment="glibc-devel is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156960" version="1" comment="glibc-devel-32bit is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156961" version="1" comment="glibc-i18ndata is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156962" version="1" comment="glibc-locale is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156963" version="1" comment="glibc-locale-32bit is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156964" version="1" comment="nscd is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159641" version="1" comment="gnome-online-accounts is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159642" version="1" comment="gnome-online-accounts-lang is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159138" version="1" comment="libgoa-1_0-0 is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159643" version="1" comment="libgoa-1_0-0-32bit is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159139" version="1" comment="libgoa-backend-1_0-1 is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159644" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158999" version="1" comment="gnome-settings-daemon is &lt;3.20.1-49.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159000" version="1" comment="gnome-settings-daemon-lang is &lt;3.20.1-49.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159001" version="1" comment="gnome-shell is &lt;3.20.4-76.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159002" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-76.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159645" version="1" comment="gnome-shell-calendar is &lt;3.20.4-76.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159003" version="1" comment="gnome-shell-lang is &lt;3.20.4-76.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159004" version="1" comment="gnutls is &lt;3.3.27-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159006" version="1" comment="libgnutls28 is &lt;3.3.27-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159007" version="1" comment="libgnutls28-32bit is &lt;3.3.27-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159008" version="1" comment="gpg2 is &lt;2.0.24-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159009" version="1" comment="gpg2-lang is &lt;2.0.24-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159010" version="1" comment="grub2 is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159012" version="1" comment="grub2-i386-pc is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159015" version="1" comment="grub2-snapper-plugin is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159016" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159017" version="1" comment="grub2-x86_64-efi is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159018" version="1" comment="grub2-x86_64-xen is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150843" version="1" comment="gstreamer is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150844" version="1" comment="gstreamer-lang is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150845" version="1" comment="gstreamer-utils is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150846" version="1" comment="libgstreamer-1_0-0 is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150847" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150848" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147825" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147829" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147830" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147831" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147832" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147833" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147834" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147836" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147837" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147838" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147839" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147840" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147841" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154327" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154328" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154329" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154330" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154331" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154332" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154333" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147371" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.31-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147372" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.31-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150831" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150832" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150833" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150834" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150835" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150836" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150837" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150838" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150839" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150840" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150841" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150842" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154408" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154409" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154410" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154411" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154412" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154413" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154414" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154415" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154416" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154417" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154418" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154419" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154420" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154421" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154422" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154423" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154424" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154425" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154426" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154427" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154428" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154429" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154430" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159019" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159020" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148134" version="1" comment="guile is &lt;2.0.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148135" version="1" comment="guile-modules-2_0 is &lt;2.0.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148136" version="1" comment="libguile-2_0-22 is &lt;2.0.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157587" version="1" comment="gvim is &lt;7.4.326-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157588" version="1" comment="vim is &lt;7.4.326-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157589" version="1" comment="vim-data is &lt;7.4.326-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159029" version="1" comment="hplip is &lt;3.16.11-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159030" version="1" comment="hplip-hpijs is &lt;3.16.11-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159031" version="1" comment="hplip-sane is &lt;3.16.11-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159032" version="1" comment="ibus-pinyin is &lt;1.5.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155970" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.141-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155971" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.141-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159646" version="1" comment="java-1_7_0-openjdk-plugin is &lt;1.6.2-2.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159647" version="1" comment="java-1_8_0-openjdk-plugin is &lt;1.6.2-2.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156235" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.131-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156236" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.131-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159034" version="1" comment="kdump is &lt;0.8.16-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159035" version="1" comment="kernel-default is &lt;4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159037" version="1" comment="kernel-default-devel is &lt;4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159648" version="1" comment="kernel-default-extra is &lt;4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159039" version="1" comment="kernel-devel is &lt;4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159040" version="1" comment="kernel-macros is &lt;4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159041" version="1" comment="kernel-source is &lt;4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159042" version="1" comment="kernel-syms is &lt;4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159043" version="1" comment="lftp is &lt;4.7.4-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159044" version="1" comment="libQt5Concurrent5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159045" version="1" comment="libQt5Core5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159046" version="1" comment="libQt5DBus5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159047" version="1" comment="libQt5Gui5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159048" version="1" comment="libQt5Network5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159049" version="1" comment="libQt5OpenGL5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159050" version="1" comment="libQt5PrintSupport5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159051" version="1" comment="libQt5Sql5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159052" version="1" comment="libQt5Sql5-mysql is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159053" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159054" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159055" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159056" version="1" comment="libQt5Test5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159057" version="1" comment="libQt5Widgets5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159058" version="1" comment="libQt5Xml5 is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159059" version="1" comment="libQt5WebKit5 is &lt;5.6.2-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159060" version="1" comment="libQt5WebKit5-imports is &lt;5.6.2-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159061" version="1" comment="libQt5WebKitWidgets5 is &lt;5.6.2-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136381" version="1" comment="libX11-6 is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136382" version="1" comment="libX11-6-32bit is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136383" version="1" comment="libX11-data is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136384" version="1" comment="libX11-xcb1 is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136385" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135061" version="1" comment="libXfixes3 is &lt;5.0.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135062" version="1" comment="libXfixes3-32bit is &lt;5.0.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136640" version="1" comment="libXi6 is &lt;1.7.4-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136641" version="1" comment="libXi6-32bit is &lt;1.7.4-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148436" version="1" comment="libXpm4 is &lt;3.5.11-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148437" version="1" comment="libXpm4-32bit is &lt;3.5.11-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135553" version="1" comment="libXrender1 is &lt;0.9.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135554" version="1" comment="libXrender1-32bit is &lt;0.9.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135081" version="1" comment="libXtst6 is &lt;1.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135082" version="1" comment="libXtst6-32bit is &lt;1.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135086" version="1" comment="libXv1 is &lt;1.0.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135087" version="1" comment="libXv1-32bit is &lt;1.0.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135556" version="1" comment="libXvMC1 is &lt;1.0.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154696" version="1" comment="libXvnc1 is &lt;1.6.0-18.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154697" version="1" comment="tigervnc is &lt;1.6.0-18.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154698" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135964" version="1" comment="libarchive13 is &lt;3.1.2-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159062" version="1" comment="libasan2 is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159063" version="1" comment="libasan2-32bit is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159064" version="1" comment="libffi4 is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159065" version="1" comment="libffi4-32bit is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159066" version="1" comment="libmpx0 is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159067" version="1" comment="libmpx0-32bit is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159068" version="1" comment="libmpxwrappers0 is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159069" version="1" comment="libmpxwrappers0-32bit is &lt;5.3.1+r233831-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142721" version="1" comment="libass5 is &lt;0.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159070" version="1" comment="libblkid1 is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159071" version="1" comment="libblkid1-32bit is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159072" version="1" comment="libfdisk1 is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159073" version="1" comment="libmount1 is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159074" version="1" comment="libmount1-32bit is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159075" version="1" comment="libsmartcols1 is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159649" version="1" comment="libuuid-devel is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159076" version="1" comment="libuuid1 is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159077" version="1" comment="libuuid1-32bit is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159078" version="1" comment="python-libmount is &lt;2.29.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159079" version="1" comment="util-linux is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159080" version="1" comment="util-linux-lang is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159081" version="1" comment="util-linux-systemd is &lt;2.29.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159082" version="1" comment="uuidd is &lt;2.29.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157339" version="1" comment="libcairo-gobject2 is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157340" version="1" comment="libcairo-gobject2-32bit is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157341" version="1" comment="libcairo-script-interpreter2 is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157342" version="1" comment="libcairo2 is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157343" version="1" comment="libcairo2-32bit is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146003" version="1" comment="libcares2 is &lt;1.9.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146004" version="1" comment="libcares2-32bit is &lt;1.9.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159084" version="1" comment="libcgroup1 is &lt;0.41.rc1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159085" version="1" comment="libdcerpc-binding0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159086" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159087" version="1" comment="libdcerpc0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159088" version="1" comment="libdcerpc0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159089" version="1" comment="libndr-krb5pac0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159090" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159091" version="1" comment="libndr-nbt0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159092" version="1" comment="libndr-nbt0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159093" version="1" comment="libndr-standard0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159094" version="1" comment="libndr-standard0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159095" version="1" comment="libndr0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159096" version="1" comment="libndr0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159097" version="1" comment="libnetapi0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159098" version="1" comment="libnetapi0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159099" version="1" comment="libsamba-credentials0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159100" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159101" version="1" comment="libsamba-errors0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159102" version="1" comment="libsamba-errors0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159103" version="1" comment="libsamba-hostconfig0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159104" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159105" version="1" comment="libsamba-passdb0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159106" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159107" version="1" comment="libsamba-util0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159108" version="1" comment="libsamba-util0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159109" version="1" comment="libsamdb0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159110" version="1" comment="libsamdb0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159111" version="1" comment="libsmbclient0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159112" version="1" comment="libsmbclient0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159113" version="1" comment="libsmbconf0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159114" version="1" comment="libsmbconf0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159115" version="1" comment="libsmbldap0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159116" version="1" comment="libsmbldap0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159117" version="1" comment="libtevent-util0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159118" version="1" comment="libtevent-util0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159119" version="1" comment="libwbclient0 is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159120" version="1" comment="libwbclient0-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159121" version="1" comment="samba is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159122" version="1" comment="samba-client is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159123" version="1" comment="samba-client-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159124" version="1" comment="samba-doc is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159125" version="1" comment="samba-libs is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159126" version="1" comment="samba-libs-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159127" version="1" comment="samba-winbind is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159128" version="1" comment="samba-winbind-32bit is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159129" version="1" comment="libecpg6 is &lt;9.6.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159130" version="1" comment="libpq5 is &lt;9.6.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159131" version="1" comment="libpq5-32bit is &lt;9.6.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159132" version="1" comment="postgresql96 is &lt;9.6.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154924" version="1" comment="libfbembed2_5 is &lt;2.5.2.26539-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155316" version="1" comment="libfreebl3 is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155317" version="1" comment="libfreebl3-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155318" version="1" comment="libsoftokn3 is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155319" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155322" version="1" comment="mozilla-nss is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155323" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155324" version="1" comment="mozilla-nss-certs is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155325" version="1" comment="mozilla-nss-certs-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155326" version="1" comment="mozilla-nss-sysinit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155327" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155328" version="1" comment="mozilla-nss-tools is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159136" version="1" comment="libfreetype6 is &lt;2.6.3-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159137" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136646" version="1" comment="libgc1 is &lt;7.2d-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156955" version="1" comment="libgcrypt20 is &lt;1.6.1-16.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156956" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145377" version="1" comment="libgme0 is &lt;0.6.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154911" version="1" comment="libgraphite2-3 is &lt;1.3.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154912" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156348" version="1" comment="libhogweed2 is &lt;2.7.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156349" version="1" comment="libhogweed2-32bit is &lt;2.7.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156351" version="1" comment="libnettle4 is &lt;2.7.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156352" version="1" comment="libnettle4-32bit is &lt;2.7.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159140" version="1" comment="libipa_hbac0 is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159141" version="1" comment="libsss_idmap0 is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159142" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159143" version="1" comment="libsss_sudo is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159144" version="1" comment="python-sssd-config is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159145" version="1" comment="sssd is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159146" version="1" comment="sssd-32bit is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159147" version="1" comment="sssd-ad is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159148" version="1" comment="sssd-ipa is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159149" version="1" comment="sssd-krb5 is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159150" version="1" comment="sssd-krb5-common is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159151" version="1" comment="sssd-ldap is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159152" version="1" comment="sssd-proxy is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159153" version="1" comment="sssd-tools is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150812" version="1" comment="libjasper1 is &lt;1.900.14-194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150813" version="1" comment="libjasper1-32bit is &lt;1.900.14-194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155614" version="1" comment="libkde4 is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155615" version="1" comment="libkde4-32bit is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155616" version="1" comment="libkdecore4 is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155617" version="1" comment="libkdecore4-32bit is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155618" version="1" comment="libksuseinstall1 is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155619" version="1" comment="libksuseinstall1-32bit is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156765" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156766" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156768" version="1" comment="openldap2-client is &lt;2.4.41-18.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159154" version="1" comment="libldb1 is &lt;1.1.29-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159155" version="1" comment="libldb1-32bit is &lt;1.1.29-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159156" version="1" comment="libltdl7 is &lt;2.4.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159157" version="1" comment="libltdl7-32bit is &lt;2.4.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159160" version="1" comment="liblua5_2 is &lt;5.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159162" version="1" comment="lua is &lt;5.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159163" version="1" comment="libmysqlclient18 is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159164" version="1" comment="libmysqlclient18-32bit is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159650" version="1" comment="libmysqlclient_r18 is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159651" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159165" version="1" comment="mariadb is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159166" version="1" comment="mariadb-client is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159167" version="1" comment="mariadb-errormessages is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139268" version="1" comment="libnetpbm11 is &lt;10.66.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156953" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139269" version="1" comment="netpbm is &lt;10.66.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145907" version="1" comment="libopenjp2-7 is &lt;2.1.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148318" version="1" comment="libopenssl-devel is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148319" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148320" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148321" version="1" comment="openssl is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149123" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149124" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148261" version="1" comment="libopus0 is &lt;1.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155050" version="1" comment="libosip2 is &lt;3.5.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143034" version="1" comment="libpcre1 is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143035" version="1" comment="libpcre1-32bit is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143036" version="1" comment="libpcre16-0 is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143037" version="1" comment="libpcrecpp0 is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143038" version="1" comment="libpcrecpp0-32bit is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147770" version="1" comment="libpcsclite1 is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147771" version="1" comment="libpcsclite1-32bit is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147772" version="1" comment="pcsc-lite is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155695" version="1" comment="libplist++3 is &lt;1.12-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155696" version="1" comment="libplist3 is &lt;1.12-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149999" version="1" comment="libpng12-0 is &lt;1.2.50-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150000" version="1" comment="libpng12-0-32bit is &lt;1.2.50-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150810" version="1" comment="libpng15-15 is &lt;1.5.22-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149948" version="1" comment="libpng16-16 is &lt;1.6.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149949" version="1" comment="libpng16-16-32bit is &lt;1.6.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159175" version="1" comment="libpulse-mainloop-glib0 is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159176" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159177" version="1" comment="libpulse0 is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159178" version="1" comment="libpulse0-32bit is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159179" version="1" comment="pulseaudio is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159180" version="1" comment="pulseaudio-esound-compat is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159181" version="1" comment="pulseaudio-gdm-hooks is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159182" version="1" comment="pulseaudio-lang is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159652" version="1" comment="pulseaudio-module-bluetooth is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159653" version="1" comment="pulseaudio-module-gconf is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159654" version="1" comment="pulseaudio-module-jack is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159655" version="1" comment="pulseaudio-module-lirc is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159183" version="1" comment="pulseaudio-module-x11 is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159184" version="1" comment="pulseaudio-module-zeroconf is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159185" version="1" comment="pulseaudio-utils is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159186" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159187" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159188" version="1" comment="python-base is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159656" version="1" comment="python-devel is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159190" version="1" comment="python-xml is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159191" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159192" version="1" comment="python3-base is &lt;3.4.6-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149137" version="1" comment="libquicktime0 is &lt;1.2.4-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159657" version="1" comment="libreoffice is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159658" version="1" comment="libreoffice-base is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159659" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159660" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159661" version="1" comment="libreoffice-calc is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159662" version="1" comment="libreoffice-calc-extensions is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159663" version="1" comment="libreoffice-draw is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159664" version="1" comment="libreoffice-filters-optional is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159665" version="1" comment="libreoffice-gnome is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159666" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159667" version="1" comment="libreoffice-icon-theme-tango is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159668" version="1" comment="libreoffice-impress is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159669" version="1" comment="libreoffice-l10n-af is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159670" version="1" comment="libreoffice-l10n-ar is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159671" version="1" comment="libreoffice-l10n-ca is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159672" version="1" comment="libreoffice-l10n-cs is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159673" version="1" comment="libreoffice-l10n-da is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159674" version="1" comment="libreoffice-l10n-de is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159675" version="1" comment="libreoffice-l10n-en is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159676" version="1" comment="libreoffice-l10n-es is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159677" version="1" comment="libreoffice-l10n-fi is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159678" version="1" comment="libreoffice-l10n-fr is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159679" version="1" comment="libreoffice-l10n-gu is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159680" version="1" comment="libreoffice-l10n-hi is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159681" version="1" comment="libreoffice-l10n-hu is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159682" version="1" comment="libreoffice-l10n-it is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159683" version="1" comment="libreoffice-l10n-ja is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159684" version="1" comment="libreoffice-l10n-ko is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159685" version="1" comment="libreoffice-l10n-nb is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159686" version="1" comment="libreoffice-l10n-nl is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159687" version="1" comment="libreoffice-l10n-nn is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159688" version="1" comment="libreoffice-l10n-pl is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159689" version="1" comment="libreoffice-l10n-pt_BR is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159690" version="1" comment="libreoffice-l10n-pt_PT is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159691" version="1" comment="libreoffice-l10n-ro is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159692" version="1" comment="libreoffice-l10n-ru is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159693" version="1" comment="libreoffice-l10n-sk is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159694" version="1" comment="libreoffice-l10n-sv is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159695" version="1" comment="libreoffice-l10n-xh is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159696" version="1" comment="libreoffice-l10n-zh_CN is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159697" version="1" comment="libreoffice-l10n-zh_TW is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159698" version="1" comment="libreoffice-l10n-zu is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159699" version="1" comment="libreoffice-mailmerge is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159700" version="1" comment="libreoffice-math is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159701" version="1" comment="libreoffice-officebean is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159702" version="1" comment="libreoffice-pyuno is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159703" version="1" comment="libreoffice-writer is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159704" version="1" comment="libreoffice-writer-extensions is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159705" version="1" comment="libreofficekit is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159193" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159194" version="1" comment="ruby2.1 is &lt;2.1.9-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159195" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155684" version="1" comment="libsndfile1 is &lt;1.0.25-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155685" version="1" comment="libsndfile1-32bit is &lt;1.0.25-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159196" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159197" version="1" comment="libspice-client-glib-helper is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159198" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159199" version="1" comment="libspice-controller0 is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159200" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159201" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159202" version="1" comment="libspice-server1 is &lt;0.12.8-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159203" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159204" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159205" version="1" comment="sqlite3 is &lt;3.8.10.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159206" version="1" comment="libsystemd0 is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159207" version="1" comment="libsystemd0-32bit is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159208" version="1" comment="libudev1 is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159209" version="1" comment="libudev1-32bit is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159210" version="1" comment="systemd is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159211" version="1" comment="systemd-32bit is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159212" version="1" comment="systemd-bash-completion is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159213" version="1" comment="systemd-sysvinit is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159214" version="1" comment="udev is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159215" version="1" comment="libtasn1 is &lt;4.9-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159216" version="1" comment="libtasn1-6 is &lt;4.9-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159217" version="1" comment="libtasn1-6-32bit is &lt;4.9-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154403" version="1" comment="libtiff5 is &lt;4.0.7-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154404" version="1" comment="libtiff5-32bit is &lt;4.0.7-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155553" version="1" comment="libtirpc-netconfig is &lt;1.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155554" version="1" comment="libtirpc3 is &lt;1.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155555" version="1" comment="libtirpc3-32bit is &lt;1.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149816" version="1" comment="libvirglrenderer0 is &lt;0.5.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159218" version="1" comment="libvirt is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159219" version="1" comment="libvirt-admin is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159220" version="1" comment="libvirt-client is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159221" version="1" comment="libvirt-daemon is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159222" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159223" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159224" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159225" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159226" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159227" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159228" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159229" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159230" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159231" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159232" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159233" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159234" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159235" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159236" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159237" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159238" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159239" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159240" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159241" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159242" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159243" version="1" comment="libvirt-doc is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159244" version="1" comment="libvirt-libs is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159247" version="1" comment="libvmtools0 is &lt;10.1.5-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159248" version="1" comment="open-vm-tools is &lt;10.1.5-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159249" version="1" comment="open-vm-tools-desktop is &lt;10.1.5-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157263" version="1" comment="libwireshark8 is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157264" version="1" comment="libwiretap6 is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157265" version="1" comment="libwscodecs1 is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157266" version="1" comment="libwsutil7 is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157267" version="1" comment="wireshark is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157268" version="1" comment="wireshark-gtk is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157768" version="1" comment="libxml2-2 is &lt;2.9.4-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157769" version="1" comment="libxml2-2-32bit is &lt;2.9.4-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157770" version="1" comment="libxml2-tools is &lt;2.9.4-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155536" version="1" comment="libxslt-tools is &lt;1.1.28-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155537" version="1" comment="libxslt1 is &lt;1.1.28-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155538" version="1" comment="libxslt1-32bit is &lt;1.1.28-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146180" version="1" comment="libz1 is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146181" version="1" comment="libz1-32bit is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146183" version="1" comment="zlib-devel is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159706" version="1" comment="libzmq3 is &lt;4.0.4-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154700" version="1" comment="libzzip-0-13 is &lt;0.13.62-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159250" version="1" comment="logrotate is &lt;3.11.0-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154609" version="1" comment="minicom is &lt;2.7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155320" version="1" comment="mozilla-nspr is &lt;4.13.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155321" version="1" comment="mozilla-nspr-32bit is &lt;4.13.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159252" version="1" comment="ntp is &lt;4.2.8p10-63.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159253" version="1" comment="ntp-doc is &lt;4.2.8p10-63.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131298" version="1" comment="openslp is &lt;2.0.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131299" version="1" comment="openslp-32bit is &lt;2.0.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159254" version="1" comment="openssh is &lt;7.2p2-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159256" version="1" comment="openssh-helpers is &lt;7.2p2-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157217" version="1" comment="openvpn is &lt;2.3.8-16.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155972" version="1" comment="pam is &lt;1.1.8-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155973" version="1" comment="pam-32bit is &lt;1.1.8-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155974" version="1" comment="pam-doc is &lt;1.1.8-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159258" version="1" comment="pcsc-ccid is &lt;1.4.25-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159707" version="1" comment="pidgin-plugin-otr is &lt;4.0.2-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148440" version="1" comment="ppp is &lt;2.4.7-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159708" version="1" comment="puppet is &lt;3.8.5-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159263" version="1" comment="python is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159265" version="1" comment="python-curses is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159269" version="1" comment="python-tk is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157771" version="1" comment="python-libxml2 is &lt;2.9.4-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159273" version="1" comment="python-requests is &lt;2.8.1-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159274" version="1" comment="python3 is &lt;3.4.6-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159275" version="1" comment="python3-curses is &lt;3.4.6-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159276" version="1" comment="qemu is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159278" version="1" comment="qemu-block-curl is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159282" version="1" comment="qemu-ipxe is &lt;1.0.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159283" version="1" comment="qemu-kvm is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159287" version="1" comment="qemu-seabios is &lt;1.10.2-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159288" version="1" comment="qemu-sgabios is &lt;8-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159289" version="1" comment="qemu-tools is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159290" version="1" comment="qemu-vgabios is &lt;1.10.2-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159291" version="1" comment="qemu-x86 is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155620" version="1" comment="rpcbind is &lt;0.2.3-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146857" version="1" comment="rrdtool is &lt;1.4.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146858" version="1" comment="rrdtool-cached is &lt;1.4.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159295" version="1" comment="rsyslog is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149621" version="1" comment="sane-backends is &lt;1.0.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149622" version="1" comment="sane-backends-32bit is &lt;1.0.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149623" version="1" comment="sane-backends-autoconfig is &lt;1.0.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159305" version="1" comment="sblim-sfcb is &lt;1.4.8-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159306" version="1" comment="shim is &lt;0.9-23.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156341" version="1" comment="strongswan is &lt;5.1.3-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156342" version="1" comment="strongswan-doc is &lt;5.1.3-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156343" version="1" comment="strongswan-ipsec is &lt;5.1.3-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156344" version="1" comment="strongswan-libs0 is &lt;5.1.3-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159307" version="1" comment="sudo is &lt;1.8.20p2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159308" version="1" comment="supportutils is &lt;3.0-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159312" version="1" comment="sysvinit-tools is &lt;2.88+-99.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159313" version="1" comment="tar is &lt;1.27.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159314" version="1" comment="tar-lang is &lt;1.27.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154731" version="1" comment="tcpdump is &lt;4.9.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157766" version="1" comment="unrar is &lt;5.0.14-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136644" version="1" comment="w3m is &lt;0.5.3.git20161120-160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149815" version="1" comment="wget is &lt;1.14-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159317" version="1" comment="xen is &lt;4.9.0_08-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159319" version="1" comment="xen-libs is &lt;4.9.0_08-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159320" version="1" comment="xen-libs-32bit is &lt;4.9.0_08-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159323" version="1" comment="xf86-video-intel is &lt;2.99.917.770_gcb6ba2da-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159324" version="1" comment="xfsprogs is &lt;4.3.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157352" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157353" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159325" version="1" comment="yast2 is &lt;3.2.36-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159326" version="1" comment="yast2-core is &lt;3.2.2-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159327" version="1" comment="yast2-users is &lt;3.2.11-1.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159709" version="1" comment="cluster-md-kmp-default is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159710" version="1" comment="cluster-network-kmp-default is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159711" version="1" comment="dlm-kmp-default is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159712" version="1" comment="gfs2-kmp-default is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159713" version="1" comment="ocfs2-kmp-default is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135880" version="1" comment="sle-ha-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114326" version="1" comment="conntrack-tools is &lt;1.4.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159714" version="1" comment="ctdb is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159715" version="1" comment="fence-agents is &lt;4.0.22+git.1455008135.15c5e92-8.93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159716" version="1" comment="haproxy is &lt;1.6.5-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159717" version="1" comment="libpacemaker3 is &lt;1.1.15-19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159718" version="1" comment="pacemaker is &lt;1.1.15-19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159719" version="1" comment="pacemaker-cli is &lt;1.1.15-19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145310" version="1" comment="pacemaker-cts is &lt;1.1.15-19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159720" version="1" comment="pacemaker-remote is &lt;1.1.15-19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159721" version="1" comment="lighttpd is &lt;1.4.35-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159722" version="1" comment="python-PyYAML is &lt;3.10-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145183" version="1" comment="ruby2.1-rubygem-bundler is &lt;1.7.3-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159723" version="1" comment="cluster-md-kmp-default is &lt;4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159724" version="1" comment="dlm-kmp-default is &lt;4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159725" version="1" comment="gfs2-kmp-default is &lt;4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159726" version="1" comment="ocfs2-kmp-default is &lt;4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159727" version="1" comment="sle-ha-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159728" version="1" comment="ctdb is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159729" version="1" comment="fence-agents is &lt;4.0.25+git.1485179354.eb43835-2.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159730" version="1" comment="haproxy is &lt;1.6.11-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159731" version="1" comment="libpacemaker3 is &lt;1.1.16-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159732" version="1" comment="pacemaker is &lt;1.1.16-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159733" version="1" comment="pacemaker-cli is &lt;1.1.16-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159734" version="1" comment="pacemaker-cts is &lt;1.1.16-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159735" version="1" comment="pacemaker-remote is &lt;1.1.16-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143040" version="1" comment="libpcreposix0 is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149624" version="1" comment="lighttpd is &lt;1.4.35-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147499" version="1" comment="sle-module-adv-systems-management-release is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147500" version="1" comment="puppet-server is &lt;3.6.2-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110039" version="1" comment="docker is &lt;1.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117868" version="1" comment="sle-module-containers-release is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109714" version="1" comment="python-PyYAML is &lt;3.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147501" version="1" comment="cups154 is &lt;1.5.4-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147502" version="1" comment="cups154-client is &lt;1.5.4-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147503" version="1" comment="cups154-filters is &lt;1.5.4-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147504" version="1" comment="cups154-libs is &lt;1.5.4-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117869" version="1" comment="sle-module-legacy-release is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147505" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.1-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147506" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.1-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147507" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.1-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147508" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.1-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147509" version="1" comment="syslog-ng is &lt;3.4.5-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117870" version="1" comment="sle-module-public-cloud is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125865" version="1" comment="cpp5 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125710" version="1" comment="gcc5 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125869" version="1" comment="gcc5-c++ is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125871" version="1" comment="gcc5-fortran is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125873" version="1" comment="gcc5-info is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125874" version="1" comment="gcc5-locale is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125877" version="1" comment="libffi-devel-gcc5 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125879" version="1" comment="libstdc++6-devel-gcc5 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125881" version="1" comment="sle-module-toolchain-release is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161298" version="1" comment="apache2-mod_php5 is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161299" version="1" comment="php5 is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161300" version="1" comment="php5-bcmath is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161301" version="1" comment="php5-bz2 is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161302" version="1" comment="php5-calendar is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161303" version="1" comment="php5-ctype is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161304" version="1" comment="php5-curl is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161305" version="1" comment="php5-dba is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161306" version="1" comment="php5-dom is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161307" version="1" comment="php5-enchant is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161308" version="1" comment="php5-exif is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161309" version="1" comment="php5-fastcgi is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161310" version="1" comment="php5-fileinfo is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161311" version="1" comment="php5-fpm is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161312" version="1" comment="php5-ftp is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161313" version="1" comment="php5-gd is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161314" version="1" comment="php5-gettext is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161315" version="1" comment="php5-gmp is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161316" version="1" comment="php5-iconv is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161317" version="1" comment="php5-intl is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161318" version="1" comment="php5-json is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161319" version="1" comment="php5-ldap is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161320" version="1" comment="php5-mbstring is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161321" version="1" comment="php5-mcrypt is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161322" version="1" comment="php5-mysql is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161323" version="1" comment="php5-odbc is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161324" version="1" comment="php5-openssl is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161325" version="1" comment="php5-pcntl is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161326" version="1" comment="php5-pdo is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161327" version="1" comment="php5-pear is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161328" version="1" comment="php5-pgsql is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161329" version="1" comment="php5-pspell is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161330" version="1" comment="php5-shmop is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161331" version="1" comment="php5-snmp is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161332" version="1" comment="php5-soap is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161333" version="1" comment="php5-sockets is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161334" version="1" comment="php5-sqlite is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161335" version="1" comment="php5-suhosin is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161336" version="1" comment="php5-sysvmsg is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161337" version="1" comment="php5-sysvsem is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161338" version="1" comment="php5-sysvshm is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161339" version="1" comment="php5-tokenizer is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161340" version="1" comment="php5-wddx is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161341" version="1" comment="php5-xmlreader is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161342" version="1" comment="php5-xmlrpc is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161343" version="1" comment="php5-xmlwriter is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161344" version="1" comment="php5-xsl is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161345" version="1" comment="php5-zip is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161346" version="1" comment="php5-zlib is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117871" version="1" comment="sle-module-web-scripting is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131451" version="1" comment="apache2-mod_php7 is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131452" version="1" comment="php7 is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131453" version="1" comment="php7-bcmath is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131454" version="1" comment="php7-bz2 is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131455" version="1" comment="php7-calendar is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131456" version="1" comment="php7-ctype is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131457" version="1" comment="php7-curl is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131458" version="1" comment="php7-dba is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131459" version="1" comment="php7-dom is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131460" version="1" comment="php7-enchant is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131461" version="1" comment="php7-exif is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131462" version="1" comment="php7-fastcgi is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131463" version="1" comment="php7-fileinfo is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131464" version="1" comment="php7-fpm is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131465" version="1" comment="php7-ftp is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131466" version="1" comment="php7-gd is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131467" version="1" comment="php7-gettext is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131468" version="1" comment="php7-gmp is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131469" version="1" comment="php7-iconv is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131470" version="1" comment="php7-imap is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131471" version="1" comment="php7-intl is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131472" version="1" comment="php7-json is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131473" version="1" comment="php7-ldap is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131474" version="1" comment="php7-mbstring is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131475" version="1" comment="php7-mcrypt is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131476" version="1" comment="php7-mysql is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131477" version="1" comment="php7-odbc is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131478" version="1" comment="php7-opcache is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131479" version="1" comment="php7-openssl is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131480" version="1" comment="php7-pcntl is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131481" version="1" comment="php7-pdo is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131482" version="1" comment="php7-pear is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131483" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131484" version="1" comment="php7-pgsql is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131485" version="1" comment="php7-phar is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131486" version="1" comment="php7-posix is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131487" version="1" comment="php7-pspell is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131488" version="1" comment="php7-shmop is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131489" version="1" comment="php7-snmp is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131490" version="1" comment="php7-soap is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131491" version="1" comment="php7-sockets is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131492" version="1" comment="php7-sqlite is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131493" version="1" comment="php7-sysvmsg is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131494" version="1" comment="php7-sysvsem is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131495" version="1" comment="php7-sysvshm is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131496" version="1" comment="php7-tokenizer is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131497" version="1" comment="php7-wddx is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131498" version="1" comment="php7-xmlreader is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131499" version="1" comment="php7-xmlrpc is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131500" version="1" comment="php7-xmlwriter is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131501" version="1" comment="php7-xsl is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131502" version="1" comment="php7-zip is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131503" version="1" comment="php7-zlib is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161347" version="1" comment="apache2-mod_wsgi is &lt;4.4.13-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161348" version="1" comment="nodejs4 is &lt;4.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161349" version="1" comment="nodejs4-devel is &lt;4.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161350" version="1" comment="nodejs4-docs is &lt;4.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161351" version="1" comment="npm4 is &lt;4.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148263" version="1" comment="nodejs6 is &lt;6.9.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148264" version="1" comment="nodejs6-devel is &lt;6.9.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148265" version="1" comment="nodejs6-docs is &lt;6.9.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148266" version="1" comment="npm6 is &lt;6.9.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143118" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143119" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143120" version="1" comment="accountsservice is &lt;0.6.35-1.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143121" version="1" comment="accountsservice-lang is &lt;0.6.35-1.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143122" version="1" comment="libaccountsservice0 is &lt;0.6.35-1.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143123" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.35-1.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140443" version="1" comment="alsa is &lt;1.0.27.2-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140444" version="1" comment="alsa-docs is &lt;1.0.27.2-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140445" version="1" comment="libasound2 is &lt;1.0.27.2-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140447" version="1" comment="ant is &lt;1.9.4-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140448" version="1" comment="apache-commons-beanutils is &lt;1.9.2-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140449" version="1" comment="apache-commons-beanutils-javadoc is &lt;1.9.2-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140450" version="1" comment="apache-commons-daemon is &lt;1.0.15-4.221" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140451" version="1" comment="apache-commons-daemon-javadoc is &lt;1.0.15-4.221" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140452" version="1" comment="apache-commons-httpclient is &lt;3.1-4.498" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143124" version="1" comment="apache2 is &lt;2.4.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143125" version="1" comment="apache2-doc is &lt;2.4.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143126" version="1" comment="apache2-example-pages is &lt;2.4.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143127" version="1" comment="apache2-prefork is &lt;2.4.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143128" version="1" comment="apache2-utils is &lt;2.4.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143129" version="1" comment="apache2-worker is &lt;2.4.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143130" version="1" comment="apache2-mod_jk is &lt;1.2.40-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143131" version="1" comment="apache2-mod_nss is &lt;1.0.8-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143132" version="1" comment="apache2-mod_perl is &lt;2.0.8-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143133" version="1" comment="augeas is &lt;1.2.0-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143134" version="1" comment="augeas-lenses is &lt;1.2.0-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143135" version="1" comment="automake is &lt;1.13.4-4.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143136" version="1" comment="avahi-utils is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143137" version="1" comment="bind is &lt;9.9.5P1-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143138" version="1" comment="bind-chrootenv is &lt;9.9.5P1-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143139" version="1" comment="bind-doc is &lt;9.9.5P1-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143140" version="1" comment="bind-libs is &lt;9.9.5P1-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143141" version="1" comment="bind-utils is &lt;9.9.5P1-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143142" version="1" comment="bzip2 is &lt;1.0.6-27.886" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143143" version="1" comment="bzip2-doc is &lt;1.0.6-27.886" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143144" version="1" comment="libbz2-1 is &lt;1.0.6-27.886" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143145" version="1" comment="coreutils is &lt;8.22-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143146" version="1" comment="coreutils-lang is &lt;8.22-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143147" version="1" comment="cpp48 is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143148" version="1" comment="gcc48 is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143149" version="1" comment="gcc48-c++ is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143150" version="1" comment="gcc48-info is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143151" version="1" comment="gcc48-locale is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143152" version="1" comment="libffi4 is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143153" version="1" comment="libgcc_s1 is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143154" version="1" comment="libgfortran3 is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143155" version="1" comment="libgomp1 is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143156" version="1" comment="libstdc++48-devel is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143157" version="1" comment="libstdc++6 is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140517" version="1" comment="cvs-doc is &lt;1.12.12-181.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140525" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140526" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140530" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140531" version="1" comment="cyrus-sasl-sqlauxprop-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143158" version="1" comment="libdbus-1-3 is &lt;1.8.8-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143159" version="1" comment="dhcp-relay is &lt;4.2.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143160" version="1" comment="dhcp-server is &lt;4.2.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143161" version="1" comment="docker is &lt;1.2.0-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140542" version="1" comment="dovecot22 is &lt;2.2.13-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140543" version="1" comment="dovecot22-backend-mysql is &lt;2.2.13-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140544" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.13-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140545" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.13-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143162" version="1" comment="dracut-fips is &lt;037-34.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143163" version="1" comment="ecryptfs-utils is &lt;103-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143164" version="1" comment="elfutils is &lt;0.158-3.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143165" version="1" comment="libasm1 is &lt;0.158-3.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143166" version="1" comment="libasm1-32bit is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143167" version="1" comment="libdw1 is &lt;0.158-3.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143168" version="1" comment="libebl1 is &lt;0.158-3.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143169" version="1" comment="libelf1 is &lt;0.158-3.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143170" version="1" comment="emacs-el is &lt;24.3-14.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143171" version="1" comment="emacs-nox is &lt;24.3-14.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143172" version="1" comment="fetchmail is &lt;6.3.26-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143173" version="1" comment="fetchmailconf is &lt;6.3.26-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143174" version="1" comment="file is &lt;5.19-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143175" version="1" comment="file-magic is &lt;5.19-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143176" version="1" comment="libmagic1 is &lt;5.19-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143177" version="1" comment="freeradius-server is &lt;3.0.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143178" version="1" comment="freeradius-server-doc is &lt;3.0.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143179" version="1" comment="freeradius-server-libs is &lt;3.0.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143180" version="1" comment="freeradius-server-utils is &lt;3.0.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143181" version="1" comment="ft2demos is &lt;2.5.3-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143182" version="1" comment="g3utils is &lt;1.1.36-54.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143183" version="1" comment="mgetty is &lt;1.1.36-54.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143184" version="1" comment="gd is &lt;2.1.0-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143185" version="1" comment="git-core is &lt;1.8.5.2-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143186" version="1" comment="glib2-lang is &lt;2.38.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143187" version="1" comment="glib2-tools is &lt;2.38.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143188" version="1" comment="libgio-2_0-0 is &lt;2.38.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143189" version="1" comment="libglib-2_0-0 is &lt;2.38.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143190" version="1" comment="libgmodule-2_0-0 is &lt;2.38.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143191" version="1" comment="libgobject-2_0-0 is &lt;2.38.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143192" version="1" comment="libgthread-2_0-0 is &lt;2.38.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143193" version="1" comment="glibc-html is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143194" version="1" comment="glibc-info is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143195" version="1" comment="glibc-profile is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143196" version="1" comment="glibc-profile-32bit is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143197" version="1" comment="gnome-shell is &lt;3.10.4-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143198" version="1" comment="gnome-shell-browser-plugin is &lt;3.10.4-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143199" version="1" comment="gnome-shell-lang is &lt;3.10.4-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143200" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140646" version="1" comment="groff-full is &lt;1.22.2-5.429" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140647" version="1" comment="gxditview is &lt;1.22.2-5.429" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143201" version="1" comment="guestfs-data is &lt;1.26.9-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143202" version="1" comment="guestfs-tools is &lt;1.26.9-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143203" version="1" comment="guestfsd is &lt;1.26.9-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143204" version="1" comment="libguestfs0 is &lt;1.26.9-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143205" version="1" comment="perl-Sys-Guestfs is &lt;1.26.9-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140671" version="1" comment="gv is &lt;3.7.4-1.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140679" version="1" comment="hplip is &lt;3.14.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140680" version="1" comment="hplip-hpijs is &lt;3.14.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140681" version="1" comment="hplip-sane is &lt;3.14.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143206" version="1" comment="hyper-v is &lt;6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143207" version="1" comment="ibus-pinyin is &lt;1.5.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140687" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-120.238" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140688" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-120.238" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143208" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143209" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143210" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143211" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.6-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143212" version="1" comment="kbd is &lt;1.15.5-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143213" version="1" comment="kernel-default-base is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143214" version="1" comment="kernel-default-man is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143215" version="1" comment="kernel-xen-base is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143216" version="1" comment="krb5-doc is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143217" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143218" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143219" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143220" version="1" comment="krb5-server is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140712" version="1" comment="krb5-appl-servers is &lt;1.0.3-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143221" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143222" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140776" version="1" comment="libapr-util1 is &lt;1.5.3-1.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140777" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.5.3-1.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140778" version="1" comment="libapr1 is &lt;1.5.1-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143223" version="1" comment="libcgroup-tools is &lt;0.41.rc1-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143224" version="1" comment="postgresql93-contrib is &lt;9.3.5-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143225" version="1" comment="postgresql93-docs is &lt;9.3.5-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143226" version="1" comment="postgresql93-server is &lt;9.3.5-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143227" version="1" comment="libfreebl3-hmac is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143228" version="1" comment="libfreebl3-hmac-32bit is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143229" version="1" comment="libsoftokn3-hmac is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143230" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143231" version="1" comment="libfreetype6 is &lt;2.5.3-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143232" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143233" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143234" version="1" comment="libgoa-1_0-0 is &lt;3.10.5-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143235" version="1" comment="libgoa-backend-1_0-1 is &lt;3.10.5-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140689" version="1" comment="libjbig2 is &lt;2.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140877" version="1" comment="libtool is &lt;2.4.2-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140878" version="1" comment="libtool-32bit is &lt;2.4.2-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140880" version="1" comment="liblua5_2-32bit is &lt;5.2.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140882" version="1" comment="liblzo2-2 is &lt;2.08-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143236" version="1" comment="mariadb-tools is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140888" version="1" comment="libneon27-32bit is &lt;0.30.0-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143237" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143238" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143239" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143240" version="1" comment="openssl is &lt;1.0.1i-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143241" version="1" comment="openssl-doc is &lt;1.0.1i-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143242" version="1" comment="libpango-1_0-0 is &lt;1.36.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143243" version="1" comment="pango-modules is &lt;1.36.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143244" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.36.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143245" version="1" comment="libpoppler-glib8 is &lt;0.24.4-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143246" version="1" comment="libpoppler-qt4-4 is &lt;0.24.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143247" version="1" comment="libpoppler44 is &lt;0.24.4-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143248" version="1" comment="poppler-tools is &lt;0.24.4-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143249" version="1" comment="python-base-32bit is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143250" version="1" comment="libqt4 is &lt;4.8.6-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143251" version="1" comment="libqt4-qt3support is &lt;4.8.6-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143252" version="1" comment="libqt4-sql is &lt;4.8.6-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143253" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143254" version="1" comment="libqt4-x11 is &lt;4.8.6-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143255" version="1" comment="qt4-x11-tools is &lt;4.8.6-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143256" version="1" comment="libtasn1 is &lt;3.7-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143257" version="1" comment="libtasn1-6 is &lt;3.7-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143258" version="1" comment="tiff is &lt;4.0.3-9.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140972" version="1" comment="libupsclient1 is &lt;2.7.1-4.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140973" version="1" comment="nut is &lt;2.7.1-4.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140974" version="1" comment="nut-drivers-net is &lt;2.7.1-4.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143259" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140997" version="1" comment="libvorbis-doc is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140998" version="1" comment="libvorbis0 is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141000" version="1" comment="libvorbisenc2 is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141002" version="1" comment="libvorbisfile3 is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143260" version="1" comment="python-vte is &lt;0.28.2-17.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143261" version="1" comment="vte2-lang is &lt;0.28.2-17.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143262" version="1" comment="libxml2-doc is &lt;2.9.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143263" version="1" comment="logwatch is &lt;7.4.0-13.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141040" version="1" comment="mailman is &lt;2.1.17-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143264" version="1" comment="mozilla-nspr is &lt;4.10.7-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143265" version="1" comment="openslp-server is &lt;2.0.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143266" version="1" comment="openssh-fips is &lt;6.6p1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143267" version="1" comment="openvswitch is &lt;2.1.2-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143268" version="1" comment="openvswitch-kmp-default is &lt;2.1.2_k3.12.28_4-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143269" version="1" comment="openvswitch-kmp-xen is &lt;2.1.2_k3.12.28_4-8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143270" version="1" comment="openvswitch-switch is &lt;2.1.2-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141054" version="1" comment="opie is &lt;2.4-724.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141055" version="1" comment="opie-32bit is &lt;2.4-724.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141059" version="1" comment="pam-modules is &lt;12.1-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143271" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.18-35.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143272" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.18-35.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143273" version="1" comment="ppc64-diag is &lt;2.6.7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141073" version="1" comment="procmail is &lt;3.22-267.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143274" version="1" comment="python is &lt;2.7.7-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143275" version="1" comment="python-32bit is &lt;2.7.7-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143276" version="1" comment="python-curses is &lt;2.7.7-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143277" version="1" comment="python-demo is &lt;2.7.7-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143278" version="1" comment="python-gdbm is &lt;2.7.7-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143279" version="1" comment="python-idle is &lt;2.7.7-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143280" version="1" comment="python-tk is &lt;2.7.7-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141082" version="1" comment="python-imaging is &lt;1.1.7-21.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143281" version="1" comment="qemu-guest-agent is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143282" version="1" comment="qemu-lang is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143283" version="1" comment="qemu-ppc is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143284" version="1" comment="qemu-s390 is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143285" version="1" comment="quagga is &lt;0.99.22.1-3.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143286" version="1" comment="rsyslog-diag-tools is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143287" version="1" comment="rsyslog-doc is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143288" version="1" comment="rsyslog-module-gssapi is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143289" version="1" comment="rsyslog-module-gtls is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143290" version="1" comment="rsyslog-module-mysql is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143291" version="1" comment="rsyslog-module-pgsql is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143292" version="1" comment="rsyslog-module-relp is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143293" version="1" comment="rsyslog-module-snmp is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143294" version="1" comment="rsyslog-module-udpspoof is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143295" version="1" comment="squashfs is &lt;4.3-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143296" version="1" comment="squid is &lt;3.3.13-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141128" version="1" comment="squidGuard is &lt;1.4-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141129" version="1" comment="squidGuard-doc is &lt;1.4-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143297" version="1" comment="stunnel is &lt;5.00-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143298" version="1" comment="systemtap is &lt;2.5-1.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143299" version="1" comment="systemtap-runtime is &lt;2.5-1.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143300" version="1" comment="systemtap-server is &lt;2.5-1.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143301" version="1" comment="sysvinit-tools is &lt;2.88+-94.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143302" version="1" comment="tomcat is &lt;7.0.55-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143303" version="1" comment="tomcat-admin-webapps is &lt;7.0.55-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143304" version="1" comment="tomcat-docs-webapp is &lt;7.0.55-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143305" version="1" comment="tomcat-el-2_2-api is &lt;7.0.55-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143306" version="1" comment="tomcat-javadoc is &lt;7.0.55-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143307" version="1" comment="tomcat-jsp-2_2-api is &lt;7.0.55-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143308" version="1" comment="tomcat-lib is &lt;7.0.55-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143309" version="1" comment="tomcat-servlet-3_0-api is &lt;7.0.55-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143310" version="1" comment="tomcat-webapps is &lt;7.0.55-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143311" version="1" comment="wireshark is &lt;1.10.9-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141158" version="1" comment="xalan-j2 is &lt;2.7.0-264.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143312" version="1" comment="xen-doc-html is &lt;4.4.1_06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143313" version="1" comment="xen-tools is &lt;4.4.1_06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143314" version="1" comment="xen-tools-domU is &lt;4.4.1_06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141169" version="1" comment="xorg-x11 is &lt;7.6_1-14.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141170" version="1" comment="xorg-x11-essentials is &lt;7.6_1-14.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141172" version="1" comment="xorg-x11-libs is &lt;7.6-45.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137922" version="1" comment="yast2 is &lt;3.1.108-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150266" version="1" comment="alsa-docs is &lt;1.0.27.2-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149933" version="1" comment="ant is &lt;1.9.4-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150267" version="1" comment="apache-commons-beanutils is &lt;1.9.2-1.149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150268" version="1" comment="apache-commons-beanutils-javadoc is &lt;1.9.2-1.149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143319" version="1" comment="apache2 is &lt;2.4.16-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143320" version="1" comment="apache2-doc is &lt;2.4.16-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143321" version="1" comment="apache2-example-pages is &lt;2.4.16-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143322" version="1" comment="apache2-prefork is &lt;2.4.16-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143323" version="1" comment="apache2-utils is &lt;2.4.16-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143324" version="1" comment="apache2-worker is &lt;2.4.16-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140459" version="1" comment="apache2-mod_jk is &lt;1.2.40-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143325" version="1" comment="apache2-mod_nss is &lt;1.0.8-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140460" version="1" comment="apache2-mod_perl is &lt;2.0.8-11.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111367" version="1" comment="augeas is &lt;1.2.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111371" version="1" comment="augeas-lenses is &lt;1.2.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143326" version="1" comment="bind is &lt;9.9.6P1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143327" version="1" comment="bind-chrootenv is &lt;9.9.6P1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143328" version="1" comment="bind-doc is &lt;9.9.6P1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150269" version="1" comment="bzip2-doc is &lt;1.0.6-27.1129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115220" version="1" comment="gcc48-locale is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140534" version="1" comment="davfs2 is &lt;1.5.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143329" version="1" comment="dhcp-relay is &lt;4.3.3-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143330" version="1" comment="dhcp-server is &lt;4.3.3-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143331" version="1" comment="dracut-fips is &lt;037-66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106097" version="1" comment="libasm1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150270" version="1" comment="fetchmailconf is &lt;6.3.26-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140576" version="1" comment="freeradius-server is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140577" version="1" comment="freeradius-server-doc is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140578" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140579" version="1" comment="freeradius-server-ldap is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140580" version="1" comment="freeradius-server-libs is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140581" version="1" comment="freeradius-server-mysql is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140582" version="1" comment="freeradius-server-perl is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140583" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140584" version="1" comment="freeradius-server-python is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140585" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140586" version="1" comment="freeradius-server-utils is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149936" version="1" comment="git-core is &lt;1.8.5.6-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143333" version="1" comment="glibc-html is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143334" version="1" comment="glibc-info is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143335" version="1" comment="glibc-profile is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143336" version="1" comment="glibc-profile-32bit is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114257" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143337" version="1" comment="guestfs-data is &lt;1.26.10-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143338" version="1" comment="guestfs-tools is &lt;1.26.10-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143339" version="1" comment="guestfsd is &lt;1.26.10-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143340" version="1" comment="libguestfs0 is &lt;1.26.10-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143341" version="1" comment="perl-Sys-Guestfs is &lt;1.26.10-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143342" version="1" comment="python-libguestfs is &lt;1.26.10-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143343" version="1" comment="ipsec-tools is &lt;0.8.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115441" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.91-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115442" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.91-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113202" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.10-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113204" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.10-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113209" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.10-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113211" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.10-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143344" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr1.10-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143345" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr1.10-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143346" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr1.10-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143347" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.65-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143348" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.65-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143417" version="1" comment="kernel-default-base is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143352" version="1" comment="kernel-default-man is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143357" version="1" comment="kernel-xen-base is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115946" version="1" comment="krb5-doc is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115947" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115948" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115949" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115950" version="1" comment="krb5-server is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102934" version="1" comment="libFLAC++6 is &lt;1.3.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140792" version="1" comment="libcgroup-tools is &lt;0.41.rc1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143358" version="1" comment="postgresql94-contrib is &lt;9.4.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143359" version="1" comment="postgresql94-docs is &lt;9.4.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143360" version="1" comment="postgresql94-server is &lt;9.4.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116020" version="1" comment="libfreebl3-hmac is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116021" version="1" comment="libfreebl3-hmac-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116024" version="1" comment="libsoftokn3-hmac is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116025" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114245" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114246" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106170" version="1" comment="libhivex0 is &lt;1.3.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106171" version="1" comment="perl-Win-Hivex is &lt;1.3.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107570" version="1" comment="libicu-doc is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140861" version="1" comment="libjansson4 is &lt;2.7-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105815" version="1" comment="libmpfr4-32bit is &lt;3.1.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143361" version="1" comment="mariadb-tools is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143362" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143363" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143364" version="1" comment="openssl-doc is &lt;1.0.1i-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143365" version="1" comment="python-base-32bit is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113422" version="1" comment="qt4-x11-tools is &lt;4.8.6-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114061" version="1" comment="tiff is &lt;4.0.4-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143366" version="1" comment="libvirt-lock-sanlock is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150271" version="1" comment="libvorbis-doc is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103736" version="1" comment="libxml2-doc is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143367" version="1" comment="openldap2 is &lt;2.4.41-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143368" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143369" version="1" comment="openslp-server is &lt;2.0.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114324" version="1" comment="openssh-fips is &lt;6.6p1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143370" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143371" version="1" comment="openvswitch is &lt;2.1.2-4.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143372" version="1" comment="openvswitch-kmp-default is &lt;2.1.2_k3.12.49_11-4.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143373" version="1" comment="openvswitch-kmp-xen is &lt;2.1.2_k3.12.49_11-4.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143374" version="1" comment="openvswitch-switch is &lt;2.1.2-4.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143375" version="1" comment="powerpc-utils is &lt;1.2.26-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143376" version="1" comment="ppc64-diag is &lt;2.6.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143377" version="1" comment="python-32bit is &lt;2.7.9-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143378" version="1" comment="python-demo is &lt;2.7.9-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143379" version="1" comment="python-gdbm is &lt;2.7.9-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143380" version="1" comment="python-idle is &lt;2.7.9-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143381" version="1" comment="qemu-block-rbd is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143382" version="1" comment="qemu-guest-agent is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143383" version="1" comment="qemu-lang is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143384" version="1" comment="qemu-ppc is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143385" version="1" comment="qemu-s390 is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143386" version="1" comment="rsyslog-diag-tools is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143387" version="1" comment="rsyslog-doc is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143388" version="1" comment="rsyslog-module-gssapi is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143389" version="1" comment="rsyslog-module-gtls is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143390" version="1" comment="rsyslog-module-mysql is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143391" version="1" comment="rsyslog-module-pgsql is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143392" version="1" comment="rsyslog-module-relp is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143393" version="1" comment="rsyslog-module-snmp is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143394" version="1" comment="rsyslog-module-udpspoof is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143395" version="1" comment="smt is &lt;3.0.8-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143396" version="1" comment="smt-support is &lt;3.0.8-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105076" version="1" comment="squid is &lt;3.3.13-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110998" version="1" comment="strongswan-hmac is &lt;5.1.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110494" version="1" comment="stunnel is &lt;5.00-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143397" version="1" comment="systemtap is &lt;2.5-4.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143398" version="1" comment="systemtap-runtime is &lt;2.5-4.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143399" version="1" comment="systemtap-server is &lt;2.5-4.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143400" version="1" comment="tomcat is &lt;8.0.23-1.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143401" version="1" comment="tomcat-admin-webapps is &lt;8.0.23-1.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143402" version="1" comment="tomcat-docs-webapp is &lt;8.0.23-1.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143403" version="1" comment="tomcat-el-3_0-api is &lt;8.0.23-1.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143404" version="1" comment="tomcat-javadoc is &lt;8.0.23-1.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143405" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.23-1.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143406" version="1" comment="tomcat-lib is &lt;8.0.23-1.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143407" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.23-1.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143408" version="1" comment="tomcat-webapps is &lt;8.0.23-1.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143409" version="1" comment="vsftpd is &lt;3.0.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143410" version="1" comment="xen-doc-html is &lt;4.5.1_12-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143411" version="1" comment="xen-tools is &lt;4.5.1_12-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143412" version="1" comment="xen-tools-domU is &lt;4.5.1_12-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128018" version="1" comment="sles-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140453" version="1" comment="apache2 is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140454" version="1" comment="apache2-doc is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140455" version="1" comment="apache2-example-pages is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140456" version="1" comment="apache2-prefork is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140457" version="1" comment="apache2-utils is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140458" version="1" comment="apache2-worker is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131934" version="1" comment="apache2-mod_nss is &lt;1.0.14-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131796" version="1" comment="flex is &lt;2.5.37-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131938" version="1" comment="flex-32bit is &lt;2.5.37-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131939" version="1" comment="libbonobo-doc is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140465" version="1" comment="automake is &lt;1.13.4-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140469" version="1" comment="avahi-utils is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131135" version="1" comment="bind is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131947" version="1" comment="bind-chrootenv is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131948" version="1" comment="bind-doc is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140484" version="1" comment="bzip2-doc is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140487" version="1" comment="chrony is &lt;2.3-3.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140503" version="1" comment="gcc48-locale is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130042" version="1" comment="dhcp-relay is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130043" version="1" comment="dhcp-server is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140547" version="1" comment="dracut-fips is &lt;044-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140548" version="1" comment="dstat is &lt;0.7.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140550" version="1" comment="emacs-el is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140552" version="1" comment="emacs-nox is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140570" version="1" comment="fetchmailconf is &lt;6.3.26-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126715" version="1" comment="giflib-progs is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124820" version="1" comment="git-core is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140622" version="1" comment="glibc-html is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140624" version="1" comment="glibc-info is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140627" version="1" comment="glibc-profile is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140628" version="1" comment="glibc-profile-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140649" version="1" comment="grub2-arm64-efi is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140651" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140652" version="1" comment="grub2-s390x-emu is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140663" version="1" comment="guestfs-data is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140664" version="1" comment="guestfs-tools is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140665" version="1" comment="guestfsd is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140666" version="1" comment="libguestfs0 is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140667" version="1" comment="perl-Sys-Guestfs is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140668" version="1" comment="python-libguestfs is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140669" version="1" comment="virt-p2v is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140670" version="1" comment="virt-v2v is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140685" version="1" comment="ipsec-tools is &lt;0.8.0-15.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131900" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131901" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131658" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.50-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131659" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.50-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131661" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.50-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131662" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.50-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128388" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr3.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128390" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr3.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128391" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr3.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131902" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.101-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131903" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.101-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140696" version="1" comment="kernel-default-base is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140698" version="1" comment="kernel-default-man is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140706" version="1" comment="krb5-doc is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140707" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140708" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140709" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140710" version="1" comment="krb5-server is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131949" version="1" comment="postgresql94-contrib is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131950" version="1" comment="postgresql94-docs is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131951" version="1" comment="postgresql94-server is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129312" version="1" comment="libfreebl3-hmac is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129313" version="1" comment="libfreebl3-hmac-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129314" version="1" comment="libsoftokn3-hmac is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129315" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131935" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131936" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131905" version="1" comment="libidn-tools is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140872" version="1" comment="openldap2 is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140873" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131946" version="1" comment="mariadb-tools is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140889" version="1" comment="libnghttp2-14 is &lt;1.7.1-1.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140893" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140894" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140896" version="1" comment="openssl-doc is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131910" version="1" comment="python-base-32bit is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125290" version="1" comment="qt4-x11-tools is &lt;4.8.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131759" version="1" comment="libtcnative-1-0 is &lt;1.1.32-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131044" version="1" comment="tiff is &lt;4.0.6-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140995" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140996" version="1" comment="libvirt-nss is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119309" version="1" comment="libvncclient0 is &lt;0.9.9-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119310" version="1" comment="libvncserver0 is &lt;0.9.9-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141005" version="1" comment="python-vte is &lt;0.28.2-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141006" version="1" comment="vte2-lang is &lt;0.28.2-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141034" version="1" comment="libxml2-doc is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141039" version="1" comment="logwatch is &lt;7.4.3-15.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131940" version="1" comment="openslp-server is &lt;2.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141046" version="1" comment="openssh-fips is &lt;7.2p2-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141049" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141050" version="1" comment="openvswitch is &lt;2.5.1-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141051" version="1" comment="openvswitch-dpdk is &lt;2.5.1-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141052" version="1" comment="openvswitch-dpdk-switch is &lt;2.5.1-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141053" version="1" comment="openvswitch-switch is &lt;2.5.1-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141070" version="1" comment="powerpc-utils is &lt;1.3.2-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141071" version="1" comment="ppc64-diag is &lt;2.7.1-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131909" version="1" comment="python-32bit is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131911" version="1" comment="python-demo is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131914" version="1" comment="python-gdbm is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131915" version="1" comment="python-idle is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141088" version="1" comment="qemu-arm is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141090" version="1" comment="qemu-block-rbd is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141091" version="1" comment="qemu-block-ssh is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141092" version="1" comment="qemu-guest-agent is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141095" version="1" comment="qemu-lang is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141096" version="1" comment="qemu-ppc is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141097" version="1" comment="qemu-s390 is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128392" version="1" comment="quagga is &lt;0.99.22.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141104" version="1" comment="res-signingkeys is &lt;3.0.18-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141105" version="1" comment="smt is &lt;3.0.18-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141106" version="1" comment="smt-support is &lt;3.0.18-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141113" version="1" comment="rsyslog-diag-tools is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141114" version="1" comment="rsyslog-doc is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141115" version="1" comment="rsyslog-module-gssapi is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141116" version="1" comment="rsyslog-module-gtls is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141117" version="1" comment="rsyslog-module-mysql is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141118" version="1" comment="rsyslog-module-pgsql is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141119" version="1" comment="rsyslog-module-relp is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141120" version="1" comment="rsyslog-module-snmp is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141121" version="1" comment="rsyslog-module-udpspoof is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141127" version="1" comment="squid is &lt;3.5.21-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119300" version="1" comment="strongswan-hmac is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141135" version="1" comment="systemtap is &lt;3.0-7.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141136" version="1" comment="systemtap-runtime is &lt;3.0-7.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141137" version="1" comment="systemtap-server is &lt;3.0-7.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141142" version="1" comment="tomcat is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141143" version="1" comment="tomcat-admin-webapps is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141144" version="1" comment="tomcat-docs-webapp is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141145" version="1" comment="tomcat-el-3_0-api is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141146" version="1" comment="tomcat-javadoc is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141147" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141148" version="1" comment="tomcat-lib is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141149" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141150" version="1" comment="tomcat-webapps is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141156" version="1" comment="vsftpd is &lt;3.0.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141160" version="1" comment="xen-doc-html is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141163" version="1" comment="xen-tools is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141164" version="1" comment="xen-tools-domU is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158922" version="1" comment="sles-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158926" version="1" comment="alsa-docs is &lt;1.0.27.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158929" version="1" comment="apache-commons-daemon is &lt;1.0.15-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158930" version="1" comment="apache-commons-daemon-javadoc is &lt;1.0.15-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157598" version="1" comment="apache2 is &lt;2.4.23-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157599" version="1" comment="apache2-doc is &lt;2.4.23-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157600" version="1" comment="apache2-example-pages is &lt;2.4.23-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157601" version="1" comment="apache2-prefork is &lt;2.4.23-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157602" version="1" comment="apache2-utils is &lt;2.4.23-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157603" version="1" comment="apache2-worker is &lt;2.4.23-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158931" version="1" comment="apache2-mod_apparmor is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157661" version="1" comment="bind is &lt;9.9.9P1-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157721" version="1" comment="bind-chrootenv is &lt;9.9.9P1-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157722" version="1" comment="bind-doc is &lt;9.9.9P1-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158950" version="1" comment="crash is &lt;7.1.8-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158951" version="1" comment="crash-kmp-default is &lt;7.1.8_k4.4.73_5-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158965" version="1" comment="dovecot22 is &lt;2.2.30.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158966" version="1" comment="dovecot22-backend-mysql is &lt;2.2.30.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158967" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.30.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158968" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.30.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158970" version="1" comment="dracut-fips is &lt;044-113.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158976" version="1" comment="emacs-el is &lt;24.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158978" version="1" comment="emacs-nox is &lt;24.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158981" version="1" comment="freeradius-server is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158982" version="1" comment="freeradius-server-doc is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158983" version="1" comment="freeradius-server-krb5 is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158984" version="1" comment="freeradius-server-ldap is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158985" version="1" comment="freeradius-server-libs is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158986" version="1" comment="freeradius-server-mysql is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158987" version="1" comment="freeradius-server-perl is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158988" version="1" comment="freeradius-server-postgresql is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158989" version="1" comment="freeradius-server-python is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158990" version="1" comment="freeradius-server-sqlite is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158991" version="1" comment="freeradius-server-utils is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155663" version="1" comment="git-core is &lt;2.12.3-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156986" version="1" comment="glibc-html is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156987" version="1" comment="glibc-info is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156988" version="1" comment="glibc-profile is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157048" version="1" comment="glibc-profile-32bit is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159005" version="1" comment="libgnutls-openssl27 is &lt;3.3.27-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159011" version="1" comment="grub2-arm64-efi is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159013" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159014" version="1" comment="grub2-s390x-emu is &lt;2.02-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159021" version="1" comment="guestfs-data is &lt;1.32.4-19.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159022" version="1" comment="guestfs-tools is &lt;1.32.4-19.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159023" version="1" comment="guestfsd is &lt;1.32.4-19.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159024" version="1" comment="libguestfs0 is &lt;1.32.4-19.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159025" version="1" comment="perl-Sys-Guestfs is &lt;1.32.4-19.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159026" version="1" comment="python-libguestfs is &lt;1.32.4-19.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159027" version="1" comment="virt-p2v is &lt;1.32.4-19.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159028" version="1" comment="virt-v2v is &lt;1.32.4-19.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159033" version="1" comment="ipsec-tools is &lt;0.8.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156771" version="1" comment="jakarta-taglibs-standard is &lt;1.1.1-255.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156772" version="1" comment="jakarta-taglibs-standard-javadoc is &lt;1.1.1-255.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155977" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.141-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155978" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.141-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155701" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.5-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155702" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.5-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155704" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.5-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155705" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.5-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155706" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr4.5-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155710" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr4.5-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155711" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr4.5-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156243" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.131-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156244" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.131-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159036" version="1" comment="kernel-default-base is &lt;4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159038" version="1" comment="kernel-default-man is &lt;4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159083" version="1" comment="libcgroup-tools is &lt;0.41.rc1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159133" version="1" comment="postgresql96-contrib is &lt;9.6.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159134" version="1" comment="postgresql96-docs is &lt;9.6.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159135" version="1" comment="postgresql96-server is &lt;9.6.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155339" version="1" comment="libfreebl3-hmac is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155342" version="1" comment="libfreebl3-hmac-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155340" version="1" comment="libsoftokn3-hmac is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155343" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156985" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157047" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156767" version="1" comment="openldap2 is &lt;2.4.41-18.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156770" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159158" version="1" comment="libtool is &lt;2.4.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159159" version="1" comment="libtool-32bit is &lt;2.4.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159161" version="1" comment="liblua5_2-32bit is &lt;5.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156854" version="1" comment="libmicrohttpd10 is &lt;0.9.30-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159168" version="1" comment="mariadb-tools is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148322" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148324" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148323" version="1" comment="openssl-doc is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159189" version="1" comment="python-base-32bit is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135881" version="1" comment="libtcnative-1-0 is &lt;1.1.34-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154405" version="1" comment="tiff is &lt;4.0.7-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159245" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159246" version="1" comment="libvirt-nss is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157775" version="1" comment="libxml2-doc is &lt;2.9.4-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159251" version="1" comment="memcached is &lt;1.4.33-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131966" version="1" comment="openslp-server is &lt;2.0.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159255" version="1" comment="openssh-fips is &lt;7.2p2-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157218" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159257" version="1" comment="openvswitch is &lt;2.7.0-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146969" version="1" comment="perl-DBD-mysql is &lt;4.021-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159259" version="1" comment="policycoreutils is &lt;2.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159260" version="1" comment="policycoreutils-python is &lt;2.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159261" version="1" comment="powerpc-utils is &lt;1.3.3-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159262" version="1" comment="ppc64-diag is &lt;2.7.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159264" version="1" comment="python-32bit is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159266" version="1" comment="python-demo is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159267" version="1" comment="python-gdbm is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159268" version="1" comment="python-idle is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159270" version="1" comment="python-PyYAML is &lt;3.12-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159271" version="1" comment="python-doc is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159272" version="1" comment="python-doc-pdf is &lt;2.7.13-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159277" version="1" comment="qemu-arm is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159279" version="1" comment="qemu-block-rbd is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159280" version="1" comment="qemu-block-ssh is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159281" version="1" comment="qemu-guest-agent is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159284" version="1" comment="qemu-lang is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159285" version="1" comment="qemu-ppc is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159286" version="1" comment="qemu-s390 is &lt;2.9.0-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131838" version="1" comment="quagga is &lt;0.99.22.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159292" version="1" comment="res-signingkeys is &lt;3.0.25-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159293" version="1" comment="smt is &lt;3.0.25-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159294" version="1" comment="smt-support is &lt;3.0.25-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159296" version="1" comment="rsyslog-diag-tools is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159297" version="1" comment="rsyslog-doc is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159298" version="1" comment="rsyslog-module-gssapi is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159299" version="1" comment="rsyslog-module-gtls is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159300" version="1" comment="rsyslog-module-mysql is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159301" version="1" comment="rsyslog-module-pgsql is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159302" version="1" comment="rsyslog-module-relp is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159303" version="1" comment="rsyslog-module-snmp is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159304" version="1" comment="rsyslog-module-udpspoof is &lt;8.24.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146970" version="1" comment="squid is &lt;3.5.21-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155979" version="1" comment="squidGuard is &lt;1.4-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155980" version="1" comment="squidGuard-doc is &lt;1.4-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156345" version="1" comment="strongswan-hmac is &lt;5.1.3-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159309" version="1" comment="systemtap is &lt;3.0-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159310" version="1" comment="systemtap-runtime is &lt;3.0-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159311" version="1" comment="systemtap-server is &lt;3.0-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155282" version="1" comment="tomcat is &lt;8.0.43-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155283" version="1" comment="tomcat-admin-webapps is &lt;8.0.43-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155284" version="1" comment="tomcat-docs-webapp is &lt;8.0.43-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155285" version="1" comment="tomcat-el-3_0-api is &lt;8.0.43-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155286" version="1" comment="tomcat-javadoc is &lt;8.0.43-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155287" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.43-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155288" version="1" comment="tomcat-lib is &lt;8.0.43-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155289" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.43-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155290" version="1" comment="tomcat-webapps is &lt;8.0.43-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159315" version="1" comment="tpm2.0-tools is &lt;2.0.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159316" version="1" comment="vsftpd is &lt;3.0.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159318" version="1" comment="xen-doc-html is &lt;4.9.0_08-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159321" version="1" comment="xen-tools is &lt;4.9.0_08-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159322" version="1" comment="xen-tools-domU is &lt;4.9.0_08-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147510" version="1" comment="apache-commons-daemon is &lt;1.0.15-4.181" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147511" version="1" comment="apache-commons-daemon-javadoc is &lt;1.0.15-4.181" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147512" version="1" comment="apache-commons-httpclient is &lt;3.1-4.364" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147513" version="1" comment="m4 is &lt;1.4.16-15.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147514" version="1" comment="coolkey is &lt;1.1.0-147.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147515" version="1" comment="cups-pk-helper is &lt;0.2.5-3.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147516" version="1" comment="cups-pk-helper-lang is &lt;0.2.5-3.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147517" version="1" comment="cvs is &lt;1.12.12-181.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147518" version="1" comment="cvs-doc is &lt;1.12.12-181.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147519" version="1" comment="dovecot22 is &lt;2.2.13-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147520" version="1" comment="dovecot22-backend-mysql is &lt;2.2.13-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147521" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.13-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147522" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.13-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147523" version="1" comment="gpgme is &lt;1.5.1-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147524" version="1" comment="libgpgme11 is &lt;1.5.1-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147525" version="1" comment="groff is &lt;1.22.2-5.287" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147526" version="1" comment="groff-full is &lt;1.22.2-5.287" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147527" version="1" comment="gxditview is &lt;1.22.2-5.287" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147528" version="1" comment="gv is &lt;3.7.4-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147529" version="1" comment="wdiff is &lt;1.2.1-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147530" version="1" comment="gvim is &lt;7.4.326-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147531" version="1" comment="vim is &lt;7.4.326-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147532" version="1" comment="vim-data is &lt;7.4.326-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147533" version="1" comment="gzip is &lt;1.6-7.209" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147534" version="1" comment="hardlink is &lt;1.0-6.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147535" version="1" comment="iputils is &lt;s20121221-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147536" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-120.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147537" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-120.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147538" version="1" comment="krb5-appl-clients is &lt;1.0.3-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147539" version="1" comment="krb5-appl-servers is &lt;1.0.3-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147540" version="1" comment="libHX28 is &lt;3.18-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147541" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147542" version="1" comment="openexr is &lt;2.1.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147543" version="1" comment="libX11-6 is &lt;1.6.2-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147544" version="1" comment="libX11-data is &lt;1.6.2-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147545" version="1" comment="libX11-xcb1 is &lt;1.6.2-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147546" version="1" comment="libXRes1 is &lt;1.0.7-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147547" version="1" comment="libXcursor1 is &lt;1.1.14-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147548" version="1" comment="libXext6 is &lt;1.3.2-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147549" version="1" comment="libXfixes3 is &lt;5.0.1-3.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147550" version="1" comment="libXinerama1 is &lt;1.1.3-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147551" version="1" comment="libXp6 is &lt;1.0.2-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147552" version="1" comment="libXrender1 is &lt;0.9.8-3.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147553" version="1" comment="libXt6 is &lt;1.1.4-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147554" version="1" comment="libXtst6 is &lt;1.2.2-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147555" version="1" comment="libXv1 is &lt;1.0.10-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147556" version="1" comment="libXvMC1 is &lt;1.0.8-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147557" version="1" comment="libXxf86dga1 is &lt;1.1.4-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147558" version="1" comment="libXxf86vm1 is &lt;1.1.3-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147559" version="1" comment="libapr-util1 is &lt;1.5.3-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147560" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.5.3-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147561" version="1" comment="libapr1 is &lt;1.5.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147562" version="1" comment="libdmx1 is &lt;1.1.3-3.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147563" version="1" comment="libexif12 is &lt;0.6.21-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147564" version="1" comment="libgc1 is &lt;7.2d-3.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147565" version="1" comment="libgssglue1 is &lt;0.4-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147566" version="1" comment="libgypsy0 is &lt;0.9-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147567" version="1" comment="libjson-c2 is &lt;0.11-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147568" version="1" comment="liblcms1 is &lt;1.19-17.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147569" version="1" comment="libltdl7 is &lt;2.4.2-14.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147570" version="1" comment="libtool is &lt;2.4.2-14.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147571" version="1" comment="libmodplug1 is &lt;0.8.8.4-13.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147572" version="1" comment="libmusicbrainz4 is &lt;2.1.5-27.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147573" version="1" comment="libneon27 is &lt;0.30.0-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147574" version="1" comment="libpcsclite1 is &lt;1.8.10-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147575" version="1" comment="pcsc-lite is &lt;1.8.10-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147576" version="1" comment="libpulse-mainloop-glib0 is &lt;5.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147577" version="1" comment="libpulse0 is &lt;5.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147578" version="1" comment="pulseaudio is &lt;5.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147579" version="1" comment="pulseaudio-esound-compat is &lt;5.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147580" version="1" comment="pulseaudio-gdm-hooks is &lt;5.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147581" version="1" comment="pulseaudio-lang is &lt;5.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147582" version="1" comment="pulseaudio-module-x11 is &lt;5.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147583" version="1" comment="pulseaudio-module-zeroconf is &lt;5.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147584" version="1" comment="pulseaudio-utils is &lt;5.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147585" version="1" comment="libraptor2-0 is &lt;2.0.10-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147586" version="1" comment="libsmi is &lt;0.4.8-18.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147587" version="1" comment="libsmi2 is &lt;0.4.8-18.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147588" version="1" comment="libtag1 is &lt;1.9.1-1.218" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147589" version="1" comment="libtag_c0 is &lt;1.9.1-1.218" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147590" version="1" comment="taglib is &lt;1.9.1-1.218" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147591" version="1" comment="libudisks2-0 is &lt;2.1.3-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147592" version="1" comment="udisks2 is &lt;2.1.3-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147593" version="1" comment="udisks2-lang is &lt;2.1.3-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147594" version="1" comment="libupsclient1 is &lt;2.7.1-4.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147595" version="1" comment="nut is &lt;2.7.1-4.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147596" version="1" comment="nut-drivers-net is &lt;2.7.1-4.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147597" version="1" comment="logrotate is &lt;3.8.7-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147598" version="1" comment="mipv6d is &lt;2.0.2.umip.0.4-19.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147599" version="1" comment="opensc is &lt;0.13.0-1.107" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147600" version="1" comment="opie is &lt;2.4-724.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147601" version="1" comment="pam_krb5 is &lt;2.4.4-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147602" version="1" comment="pam_ssh is &lt;2.0-1.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147603" version="1" comment="pcsc-ccid is &lt;1.4.14-1.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147604" version="1" comment="perl-Config-IniFiles is &lt;2.82-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147605" version="1" comment="perl-HTML-Parser is &lt;3.71-1.145" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147606" version="1" comment="perl-Tk is &lt;804.031-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147607" version="1" comment="ppp is &lt;2.4.7-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147608" version="1" comment="python-pywbem is &lt;0.7.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147609" version="1" comment="radvd is &lt;1.9.7-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147610" version="1" comment="rtkit is &lt;0.11_git201205151338-8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147611" version="1" comment="ruby is &lt;2.1-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147612" version="1" comment="whois is &lt;5.1.1-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147613" version="1" comment="xinetd is &lt;2.3.15-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147614" version="1" comment="xlockmore is &lt;5.43-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147615" version="1" comment="xrdb is &lt;1.1.0-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147616" version="1" comment="yast2 is &lt;3.1.206-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147617" version="1" comment="zoo is &lt;2.10-1020.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144701" version="1" comment="FastCGI is &lt;2.4.0-167.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144702" version="1" comment="perl-FastCGI is &lt;2.4.0-167.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117457" version="1" comment="sle-sdk-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144703" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144704" version="1" comment="libMagick++-devel is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144705" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144706" version="1" comment="MozillaFirefox-devel is &lt;31.1.0esr-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144707" version="1" comment="aaa_base-malloccheck is &lt;13.2+git20140911.61c1681-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144708" version="1" comment="accountsservice-devel is &lt;0.6.35-1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144709" version="1" comment="alsa-devel is &lt;1.0.27.2-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144710" version="1" comment="ant-jmf is &lt;1.9.4-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144711" version="1" comment="ant-scripts is &lt;1.9.4-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144712" version="1" comment="ant-swing is &lt;1.9.4-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144713" version="1" comment="apache2-devel is &lt;2.4.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144714" version="1" comment="augeas-devel is &lt;1.2.0-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144715" version="1" comment="avahi-compat-howl-devel is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144716" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144717" version="1" comment="libavahi-devel is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144718" version="1" comment="libhowl0 is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144719" version="1" comment="bash-devel is &lt;4.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144720" version="1" comment="readline-devel is &lt;6.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144721" version="1" comment="bind-devel is &lt;9.9.5P1-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144722" version="1" comment="checkbashisms is &lt;2.12.6-3.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144723" version="1" comment="cifs-utils-devel is &lt;6.4-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144724" version="1" comment="coolkey-devel is &lt;1.1.0-147.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144725" version="1" comment="ctdb-devel is &lt;2.5.3-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144726" version="1" comment="cups-devel is &lt;1.7.5-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144727" version="1" comment="cyrus-sasl-devel is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144728" version="1" comment="dbus-1-devel is &lt;1.8.8-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144729" version="1" comment="dbus-1-devel-doc is &lt;1.8.8-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144730" version="1" comment="dbus-1-glib-devel is &lt;0.100.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144731" version="1" comment="dhcp-devel is &lt;4.2.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144732" version="1" comment="dovecot22-devel is &lt;2.2.13-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144733" version="1" comment="evince-devel is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144734" version="1" comment="file-devel is &lt;5.19-2.149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144735" version="1" comment="finch-devel is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144736" version="1" comment="libpurple-devel is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144737" version="1" comment="pidgin-devel is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144738" version="1" comment="firebird-devel is &lt;2.5.2.26539-13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144739" version="1" comment="libfbembed-devel is &lt;2.5.2.26539-13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144740" version="1" comment="freeradius-server-devel is &lt;3.0.3-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144741" version="1" comment="freerdp-devel is &lt;1.0.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144742" version="1" comment="freetype2-devel is &lt;2.5.3-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144743" version="1" comment="fuse-devel is &lt;2.9.3-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144744" version="1" comment="fuse-devel-static is &lt;2.9.3-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144745" version="1" comment="libulockmgr1 is &lt;2.9.3-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144746" version="1" comment="gc-devel is &lt;7.2d-3.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144747" version="1" comment="gcc48-ada is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144748" version="1" comment="gcc48-fortran is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144749" version="1" comment="gcc48-java is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144750" version="1" comment="gcc48-obj-c++ is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144751" version="1" comment="gcc48-objc is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144752" version="1" comment="gcc48-objc-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144753" version="1" comment="libada48 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144754" version="1" comment="libffi48-devel is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144755" version="1" comment="libgcj48-devel is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144756" version="1" comment="libgfortran3-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144757" version="1" comment="libobjc4 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144758" version="1" comment="libobjc4-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144759" version="1" comment="libquadmath0-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144760" version="1" comment="gd-devel is &lt;2.1.0-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144761" version="1" comment="gdk-pixbuf-devel is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144762" version="1" comment="gdm-devel is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144763" version="1" comment="gimp-devel is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144764" version="1" comment="git is &lt;1.8.5.2-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144765" version="1" comment="git-arch is &lt;1.8.5.2-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144766" version="1" comment="git-core is &lt;1.8.5.2-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144767" version="1" comment="git-cvs is &lt;1.8.5.2-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144768" version="1" comment="git-daemon is &lt;1.8.5.2-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144769" version="1" comment="git-email is &lt;1.8.5.2-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144770" version="1" comment="git-gui is &lt;1.8.5.2-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144771" version="1" comment="git-svn is &lt;1.8.5.2-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144772" version="1" comment="git-web is &lt;1.8.5.2-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144773" version="1" comment="gitk is &lt;1.8.5.2-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144774" version="1" comment="glib2-devel is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144775" version="1" comment="glib2-devel-static is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144776" version="1" comment="glibc-devel-static is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144777" version="1" comment="gnome-online-accounts-devel is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144778" version="1" comment="gnome-shell-devel is &lt;3.10.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144779" version="1" comment="hplip-devel is &lt;3.14.6-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144780" version="1" comment="icecream is &lt;1.0.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144781" version="1" comment="lzo-devel is &lt;2.08-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144782" version="1" comment="id3lib is &lt;3.8.3-261.135" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144783" version="1" comment="kernel-docs is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144784" version="1" comment="kernel-obs-build is &lt;3.12.28-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144785" version="1" comment="kernel-zfcpdump is &lt;3.12.28-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144786" version="1" comment="krb5-devel is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144787" version="1" comment="lib3ds-1-3 is &lt;1.3.0-25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144788" version="1" comment="libHX-devel is &lt;3.18-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144789" version="1" comment="libX11-devel is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144790" version="1" comment="libXcursor-devel is &lt;1.1.14-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144791" version="1" comment="libXext-devel is &lt;1.3.2-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144792" version="1" comment="libXfixes-devel is &lt;5.0.1-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144793" version="1" comment="libXfont-devel is &lt;1.4.7-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144794" version="1" comment="libXi-devel is &lt;1.7.2-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144795" version="1" comment="libXinerama-devel is &lt;1.1.3-3.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144796" version="1" comment="libXp-devel is &lt;1.0.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144797" version="1" comment="libXrandr-devel is &lt;1.4.2-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144798" version="1" comment="libXrender-devel is &lt;0.9.8-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144799" version="1" comment="libXres-devel is &lt;1.0.7-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144800" version="1" comment="libXt-devel is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144801" version="1" comment="libXtst-devel is &lt;1.2.2-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144802" version="1" comment="libXv-devel is &lt;1.0.10-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144803" version="1" comment="libXvMC-devel is &lt;1.0.8-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144804" version="1" comment="libXxf86dga-devel is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144805" version="1" comment="libXxf86vm-devel is &lt;1.1.3-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144806" version="1" comment="libapr-util1-devel is &lt;1.5.3-1.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144807" version="1" comment="libapr1-devel is &lt;1.5.1-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144808" version="1" comment="libasm-devel is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144809" version="1" comment="libdw-devel is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144810" version="1" comment="libebl-devel is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144811" version="1" comment="libelf-devel is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144812" version="1" comment="libblkid-devel is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144813" version="1" comment="libmount-devel is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144814" version="1" comment="libsmartcols-devel is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144815" version="1" comment="libbz2-devel is &lt;1.0.6-27.1129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144816" version="1" comment="libcgroup-devel is &lt;0.41.rc1-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144817" version="1" comment="libcolord-devel is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144818" version="1" comment="libcolord-gtk-devel is &lt;0.1.25-3.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144819" version="1" comment="typelib-1_0-ColorHug-1_0 is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144820" version="1" comment="typelib-1_0-Colord-1_0 is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144821" version="1" comment="typelib-1_0-ColordGtk-1_0 is &lt;0.1.25-3.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144822" version="1" comment="libcurl-devel is &lt;7.37.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144823" version="1" comment="libdcerpc-atsvc-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144824" version="1" comment="libdcerpc-atsvc0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144825" version="1" comment="libdcerpc-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144826" version="1" comment="libdcerpc-samr-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144827" version="1" comment="libdcerpc-samr0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144828" version="1" comment="libgensec-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144829" version="1" comment="libndr-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144830" version="1" comment="libndr-krb5pac-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144831" version="1" comment="libndr-nbt-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144832" version="1" comment="libndr-standard-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144833" version="1" comment="libnetapi-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144834" version="1" comment="libpdb-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144835" version="1" comment="libregistry-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144836" version="1" comment="libsamba-credentials-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144837" version="1" comment="libsamba-hostconfig-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144838" version="1" comment="libsamba-policy-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144839" version="1" comment="libsamba-policy0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144840" version="1" comment="libsamba-util-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144841" version="1" comment="libsamdb-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144842" version="1" comment="libsmbclient-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144843" version="1" comment="libsmbclient-raw-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144844" version="1" comment="libsmbconf-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144845" version="1" comment="libsmbldap-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144846" version="1" comment="libsmbsharemodes-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144847" version="1" comment="libsmbsharemodes0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144848" version="1" comment="libtevent-util-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144849" version="1" comment="libwbclient-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144850" version="1" comment="samba-core-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144851" version="1" comment="samba-test-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144852" version="1" comment="libdmx-devel is &lt;1.1.3-3.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144853" version="1" comment="libevent-devel is &lt;2.0.21-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144854" version="1" comment="libexif-devel is &lt;0.6.21-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144855" version="1" comment="libexpat-devel is &lt;2.1.0-13.232" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144856" version="1" comment="libgadu-devel is &lt;1.11.4-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144857" version="1" comment="libgcrypt-devel is &lt;1.6.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144858" version="1" comment="libgnomesu-devel is &lt;1.0.0-352.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144859" version="1" comment="libgnutls-devel is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144860" version="1" comment="libgnutls-openssl-devel is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144861" version="1" comment="libgnutlsxx-devel is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144862" version="1" comment="libgnutlsxx28 is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144863" version="1" comment="libgpgme-devel is &lt;1.5.1-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144864" version="1" comment="libgssglue-devel is &lt;0.4-3.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144865" version="1" comment="libgudev-1_0-devel is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144866" version="1" comment="libudev-devel is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144867" version="1" comment="systemd-devel is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144868" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144869" version="1" comment="libguestfs-devel is &lt;1.26.9-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144870" version="1" comment="ocaml-libguestfs-devel is &lt;1.26.9-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144871" version="1" comment="libid3tag-devel is &lt;0.15.1b-182.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144872" version="1" comment="libipa_hbac-devel is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144873" version="1" comment="libsss_idmap-devel is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144874" version="1" comment="libsss_nss_idmap-devel is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144875" version="1" comment="libsss_nss_idmap0 is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144876" version="1" comment="libwebkitgtk-devel is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144877" version="1" comment="libwebkitgtk3-devel is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144878" version="1" comment="typelib-1_0-JavaScriptCore-1_0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144879" version="1" comment="typelib-1_0-WebKit-1_0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144880" version="1" comment="libjbig-devel is &lt;2.0-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144881" version="1" comment="libjson-c-devel is &lt;0.11-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144882" version="1" comment="liblcms-devel is &lt;1.19-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144883" version="1" comment="libmikmod-devel is &lt;3.2.0-4.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144884" version="1" comment="libmms-devel is &lt;0.6.2-15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144885" version="1" comment="libmodplug-devel is &lt;0.8.8.4-13.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144886" version="1" comment="libmspack-devel is &lt;0.4-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144887" version="1" comment="libmusicbrainz-devel is &lt;2.1.5-27.86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144888" version="1" comment="libmysqlclient-devel is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144889" version="1" comment="libmysqld-devel is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144890" version="1" comment="libmysqld18 is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144891" version="1" comment="libneon-devel is &lt;0.30.0-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144892" version="1" comment="libopenssl-devel is &lt;1.0.1i-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144893" version="1" comment="libpacemaker-devel is &lt;1.1.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144894" version="1" comment="pacemaker-cts is &lt;1.1.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144895" version="1" comment="libpcp3 is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144896" version="1" comment="pcp is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144897" version="1" comment="pcp-import-iostat2pcp is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144898" version="1" comment="pcp-import-mrtg2pcp is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144899" version="1" comment="pcp-import-sar2pcp is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144900" version="1" comment="pcp-import-sheet2pcp is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144901" version="1" comment="perl-PCP-LogImport is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144902" version="1" comment="perl-PCP-LogSummary is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144903" version="1" comment="perl-PCP-MMV is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144904" version="1" comment="perl-PCP-PMDA is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144905" version="1" comment="libpcscspy0 is &lt;1.8.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144906" version="1" comment="pcsc-lite-devel is &lt;1.8.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144907" version="1" comment="libpng12-compat-devel is &lt;1.2.50-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144908" version="1" comment="libpng12-devel is &lt;1.2.50-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144909" version="1" comment="libpng16-compat-devel is &lt;1.6.8-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144910" version="1" comment="libpng16-devel is &lt;1.6.8-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144911" version="1" comment="libpoppler-devel is &lt;0.24.4-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144912" version="1" comment="libpoppler-glib-devel is &lt;0.24.4-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144913" version="1" comment="libpoppler-qt4-devel is &lt;0.24.4-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144914" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;0.24.4-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144915" version="1" comment="libproxy-devel is &lt;0.4.11-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144916" version="1" comment="libpulse-devel is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144917" version="1" comment="libqt4-devel is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144918" version="1" comment="libqt4-devel-doc is &lt;4.8.6-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144919" version="1" comment="libqt4-devel-doc-data is &lt;4.8.6-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144920" version="1" comment="libqt4-linguist is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144921" version="1" comment="libqt4-private-headers-devel is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144922" version="1" comment="libraptor-devel is &lt;2.0.10-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144923" version="1" comment="libraw-devel is &lt;0.15.4-3.88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144924" version="1" comment="libraw-devel-static is &lt;0.15.4-3.88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144925" version="1" comment="librpcsecgss-devel is &lt;0.19-16.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144926" version="1" comment="librsvg-devel is &lt;2.40.2-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144927" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.40.2-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144928" version="1" comment="libserf-1-1 is &lt;1.3.7-1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144929" version="1" comment="silc-toolkit-devel is &lt;1.1.10-24.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144930" version="1" comment="libsmi-devel is &lt;0.4.8-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144931" version="1" comment="libsndfile-devel is &lt;1.0.25-18.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144932" version="1" comment="libsoup-devel is &lt;2.44.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144933" version="1" comment="libssh-devel is &lt;0.6.3-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144934" version="1" comment="libssh-devel-doc is &lt;0.6.3-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144935" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144936" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144937" version="1" comment="subversion is &lt;1.8.10-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144938" version="1" comment="subversion-bash-completion is &lt;1.8.10-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144939" version="1" comment="subversion-devel is &lt;1.8.10-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144940" version="1" comment="subversion-perl is &lt;1.8.10-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144941" version="1" comment="subversion-python is &lt;1.8.10-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144942" version="1" comment="subversion-server is &lt;1.8.10-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144943" version="1" comment="subversion-tools is &lt;1.8.10-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144944" version="1" comment="libtag-devel is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144945" version="1" comment="libtasn1-devel is &lt;3.7-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144946" version="1" comment="libtiff-devel is &lt;4.0.3-9.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144947" version="1" comment="libvirt-devel is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144948" version="1" comment="libvorbis-devel is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144949" version="1" comment="libxcb-composite0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144950" version="1" comment="libxcb-damage0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144951" version="1" comment="libxcb-devel is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144952" version="1" comment="libxcb-devel-doc is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144953" version="1" comment="libxcb-dpms0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144954" version="1" comment="libxcb-dri3-0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144955" version="1" comment="libxcb-present0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144956" version="1" comment="libxcb-record0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144957" version="1" comment="libxcb-res0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144958" version="1" comment="libxcb-screensaver0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144959" version="1" comment="libxcb-xevie0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144960" version="1" comment="libxcb-xinerama0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144961" version="1" comment="libxcb-xprint0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144962" version="1" comment="libxcb-xtest0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144963" version="1" comment="libxcb-xvmc0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144964" version="1" comment="libxml2-devel is &lt;2.9.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144965" version="1" comment="libyaml-devel is &lt;0.1.6-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144966" version="1" comment="libzip-devel is &lt;0.11.1-4.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144967" version="1" comment="zeromq-devel is &lt;4.0.4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144968" version="1" comment="lua-devel is &lt;5.2.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144969" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144970" version="1" comment="mozilla-nss-devel is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144971" version="1" comment="net-snmp-devel is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144972" version="1" comment="newt-devel is &lt;0.52.16-1.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144973" version="1" comment="newt-static is &lt;0.52.16-1.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144974" version="1" comment="nut-cgi is &lt;2.7.1-4.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144975" version="1" comment="nut-devel is &lt;2.7.1-4.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144976" version="1" comment="openexr-devel is &lt;2.1.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144977" version="1" comment="openslp-devel is &lt;2.0.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144978" version="1" comment="osc is &lt;0.148.1-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144979" version="1" comment="pam-devel is &lt;1.1.8-11.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144980" version="1" comment="pango-devel is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144981" version="1" comment="perl-Tk-devel is &lt;804.031-3.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144982" version="1" comment="php5-devel is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144983" version="1" comment="polkit-devel is &lt;0.112-2.189" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144984" version="1" comment="postgresql93-devel is &lt;9.3.5-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144985" version="1" comment="ppp-devel is &lt;2.4.7-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144986" version="1" comment="python3-devel is &lt;3.4.1-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144987" version="1" comment="quagga-devel is &lt;0.99.22.1-3.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144988" version="1" comment="rhythmbox-devel is &lt;3.0.2-1.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144989" version="1" comment="ruby-devel is &lt;2.1-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144990" version="1" comment="ruby2.1-rubygem-bundler is &lt;1.7.3-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144991" version="1" comment="spice-gtk-devel is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144992" version="1" comment="typelib-1_0-SpiceClientGtk-2_0 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144993" version="1" comment="sudo-devel is &lt;1.8.10p3-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144994" version="1" comment="systemtap-sdt-devel is &lt;2.5-1.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144995" version="1" comment="udisks2-devel is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144996" version="1" comment="unixODBC-devel is &lt;2.3.1-4.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144997" version="1" comment="vte2-devel is &lt;0.28.2-17.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144998" version="1" comment="wireshark-devel is &lt;1.10.9-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144999" version="1" comment="xalan-j2-demo is &lt;2.7.0-264.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145000" version="1" comment="xalan-j2-manual is &lt;2.7.0-264.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145001" version="1" comment="xen-devel is &lt;4.4.1_06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145002" version="1" comment="xfig is &lt;3.2.5c-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145003" version="1" comment="xorg-x11-devel is &lt;7.6-45.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145004" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.15.2-12.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145005" version="1" comment="yast2-core-devel is &lt;3.1.11-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145006" version="1" comment="yast2-devel-doc is &lt;3.1.108-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109226" version="1" comment="DirectFB-devel is &lt;1.7.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109232" version="1" comment="lib++dfb-devel is &lt;1.7.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118658" version="1" comment="sle-sdk-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102630" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102636" version="1" comment="libMagick++-devel is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102641" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116013" version="1" comment="MozillaFirefox-devel is &lt;38.4.0esr-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145007" version="1" comment="aaa_base-malloccheck is &lt;13.2+git20140911.61c1681-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149932" version="1" comment="accountsservice-devel is &lt;0.6.35-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145013" version="1" comment="apache2-devel is &lt;2.4.16-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111368" version="1" comment="augeas-devel is &lt;1.2.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145014" version="1" comment="bind-devel is &lt;9.9.6P1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145015" version="1" comment="binutils-devel is &lt;2.25.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145016" version="1" comment="binutils-gold is &lt;2.25.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145017" version="1" comment="cross-ppc-binutils is &lt;2.25.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145018" version="1" comment="cross-spu-binutils is &lt;2.25.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145019" version="1" comment="cifs-utils-devel is &lt;6.4-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145020" version="1" comment="ctdb-devel is &lt;2.5.5-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110318" version="1" comment="cups-devel is &lt;1.7.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107562" version="1" comment="dbus-1-devel is &lt;1.8.16-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107560" version="1" comment="dbus-1-devel-doc is &lt;1.8.16-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145021" version="1" comment="dhcp-devel is &lt;4.3.3-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113257" version="1" comment="e2fsprogs-devel is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113258" version="1" comment="libcom_err-devel is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113262" version="1" comment="libext2fs-devel is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103558" version="1" comment="file-devel is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102677" version="1" comment="finch-devel is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102680" version="1" comment="libpurple-devel is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102685" version="1" comment="pidgin-devel is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102932" version="1" comment="flac-devel is &lt;1.3.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145022" version="1" comment="freeradius-server-devel is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145023" version="1" comment="freetype2-devel is &lt;2.5.5-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110489" version="1" comment="fuse-devel is &lt;2.9.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110490" version="1" comment="fuse-devel-static is &lt;2.9.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110493" version="1" comment="libulockmgr1 is &lt;2.9.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115216" version="1" comment="gcc48-ada is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115218" version="1" comment="gcc48-fortran is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115240" version="1" comment="gcc48-java is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115221" version="1" comment="gcc48-obj-c++ is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115222" version="1" comment="gcc48-objc is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115261" version="1" comment="gcc48-objc-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115223" version="1" comment="libada48 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115237" version="1" comment="libffi48-devel is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115244" version="1" comment="libgcj48-devel is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115230" version="1" comment="libobjc4 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115269" version="1" comment="libobjc4-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109547" version="1" comment="gd-devel is &lt;2.1.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145024" version="1" comment="gdm-devel is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149934" version="1" comment="git is &lt;1.8.5.6-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149935" version="1" comment="git-arch is &lt;1.8.5.6-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149937" version="1" comment="git-cvs is &lt;1.8.5.6-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149938" version="1" comment="git-daemon is &lt;1.8.5.6-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149939" version="1" comment="git-email is &lt;1.8.5.6-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149940" version="1" comment="git-gui is &lt;1.8.5.6-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149941" version="1" comment="git-svn is &lt;1.8.5.6-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149942" version="1" comment="git-web is &lt;1.8.5.6-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149943" version="1" comment="gitk is &lt;1.8.5.6-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145037" version="1" comment="glibc-devel-static is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107803" version="1" comment="gnome-settings-daemon-devel is &lt;3.10.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145040" version="1" comment="gnome-shell-devel is &lt;3.10.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109843" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106169" version="1" comment="hivex-devel is &lt;1.3.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113207" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.10-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145043" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr1.10-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145392" version="1" comment="kernel-docs is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145393" version="1" comment="kernel-obs-build is &lt;3.12.49-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115944" version="1" comment="krb5-devel is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145046" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145047" version="1" comment="libQt5Concurrent-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145048" version="1" comment="libQt5Concurrent5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145049" version="1" comment="libQt5Core-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145050" version="1" comment="libQt5Core-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145051" version="1" comment="libQt5DBus-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145052" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145053" version="1" comment="libQt5Gui-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145054" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145055" version="1" comment="libQt5Network-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145056" version="1" comment="libQt5Network-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145057" version="1" comment="libQt5Network5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145058" version="1" comment="libQt5OpenGL-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145059" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145060" version="1" comment="libQt5OpenGL5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145061" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145062" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145063" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145064" version="1" comment="libQt5PrintSupport-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145065" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145066" version="1" comment="libQt5PrintSupport5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145067" version="1" comment="libQt5Sql-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145068" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145069" version="1" comment="libQt5Sql5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145070" version="1" comment="libQt5Sql5-mysql is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145071" version="1" comment="libQt5Sql5-postgresql is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145072" version="1" comment="libQt5Sql5-sqlite is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145073" version="1" comment="libQt5Sql5-unixODBC is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145074" version="1" comment="libQt5Test-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145075" version="1" comment="libQt5Test-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145076" version="1" comment="libQt5Test5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145077" version="1" comment="libQt5Widgets-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145078" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145079" version="1" comment="libQt5Xml-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145080" version="1" comment="libQt5Xml5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145081" version="1" comment="libqt5-qtbase-common-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145082" version="1" comment="libqt5-qtbase-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145083" version="1" comment="libqt5-qtbase-doc is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145084" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108652" version="1" comment="libXfont-devel is &lt;1.4.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145085" version="1" comment="libXi-devel is &lt;1.7.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108422" version="1" comment="libarchive-devel is &lt;3.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106095" version="1" comment="libasm-devel is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106098" version="1" comment="libdw-devel is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106101" version="1" comment="libebl-devel is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106104" version="1" comment="libelf-devel is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145086" version="1" comment="libblkid-devel is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145087" version="1" comment="libmount-devel is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145088" version="1" comment="libsmartcols-devel is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145090" version="1" comment="libcgroup-devel is &lt;0.41.rc1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145091" version="1" comment="libcolord-devel is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145092" version="1" comment="typelib-1_0-ColorHug-1_0 is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145093" version="1" comment="typelib-1_0-Colord-1_0 is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110170" version="1" comment="libcurl-devel is &lt;7.37.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145094" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145095" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145096" version="1" comment="libdcerpc-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145097" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145098" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145099" version="1" comment="libgensec-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145100" version="1" comment="libndr-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145101" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145102" version="1" comment="libndr-nbt-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145103" version="1" comment="libndr-standard-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145104" version="1" comment="libnetapi-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145105" version="1" comment="libregistry-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145106" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145107" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145108" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145109" version="1" comment="libsamba-policy-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145110" version="1" comment="libsamba-policy0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145111" version="1" comment="libsamba-util-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145112" version="1" comment="libsamdb-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145113" version="1" comment="libsmbclient-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145114" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145115" version="1" comment="libsmbconf-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145116" version="1" comment="libsmbldap-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145117" version="1" comment="libtevent-util-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145118" version="1" comment="libwbclient-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145119" version="1" comment="samba-core-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145120" version="1" comment="samba-test-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114241" version="1" comment="libgcrypt-devel is &lt;1.6.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114254" version="1" comment="libgnutls-devel is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114256" version="1" comment="libgnutls-openssl-devel is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114260" version="1" comment="libgnutlsxx-devel is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114261" version="1" comment="libgnutlsxx28 is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145123" version="1" comment="libgudev-1_0-devel is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145124" version="1" comment="libudev-devel is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145125" version="1" comment="systemd-devel is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145126" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145127" version="1" comment="libguestfs-devel is &lt;1.26.10-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145128" version="1" comment="ocaml-libguestfs-devel is &lt;1.26.10-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145129" version="1" comment="libgypsy-devel is &lt;0.9-6.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107569" version="1" comment="libicu-devel is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145130" version="1" comment="libipa_hbac-devel is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145131" version="1" comment="libsss_idmap-devel is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145132" version="1" comment="libsss_nss_idmap-devel is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145133" version="1" comment="libsss_nss_idmap0 is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106109" version="1" comment="libjasper-devel is &lt;1.900.1-170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108622" version="1" comment="libwebkitgtk-devel is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108633" version="1" comment="libwebkitgtk3-devel is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108624" version="1" comment="typelib-1_0-JavaScriptCore-1_0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108625" version="1" comment="typelib-1_0-WebKit-1_0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105090" version="1" comment="libjpeg62-devel is &lt;62.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105084" version="1" comment="libjpeg8-devel is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105093" version="1" comment="libksba-devel is &lt;1.3.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107708" version="1" comment="libmspack-devel is &lt;0.4-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145144" version="1" comment="libmysqlclient-devel is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145145" version="1" comment="libmysqld-devel is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145146" version="1" comment="libmysqld18 is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145147" version="1" comment="libopenssl-devel is &lt;1.0.1i-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145148" version="1" comment="libpacemaker-devel is &lt;1.1.13-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145149" version="1" comment="pacemaker-cts is &lt;1.1.13-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149944" version="1" comment="libpcp-devel is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105440" version="1" comment="libpng16-compat-devel is &lt;1.6.8-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105442" version="1" comment="libpng16-devel is &lt;1.6.8-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113432" version="1" comment="libqt4-devel is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113420" version="1" comment="libqt4-devel-doc is &lt;4.8.6-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113421" version="1" comment="libqt4-devel-doc-data is &lt;4.8.6-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113433" version="1" comment="libqt4-linguist is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113434" version="1" comment="libqt4-private-headers-devel is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105599" version="1" comment="libsndfile-devel is &lt;1.0.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145169" version="1" comment="libspice-server-devel is &lt;0.12.5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114955" version="1" comment="libssh-devel is &lt;0.6.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114956" version="1" comment="libssh-devel-doc is &lt;0.6.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108427" version="1" comment="libssh2-devel is &lt;1.4.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113993" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113994" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113995" version="1" comment="subversion is &lt;1.8.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113996" version="1" comment="subversion-bash-completion is &lt;1.8.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113997" version="1" comment="subversion-devel is &lt;1.8.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113998" version="1" comment="subversion-perl is &lt;1.8.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113999" version="1" comment="subversion-python is &lt;1.8.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114001" version="1" comment="subversion-server is &lt;1.8.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114002" version="1" comment="subversion-tools is &lt;1.8.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109695" version="1" comment="libtasn1-devel is &lt;3.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114232" version="1" comment="libtidy-0_99-0 is &lt;1.0.20100204cvs-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114233" version="1" comment="libtidy-0_99-0-devel is &lt;1.0.20100204cvs-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114234" version="1" comment="tidy is &lt;1.0.20100204cvs-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114058" version="1" comment="libtiff-devel is &lt;4.0.4-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115563" version="1" comment="libvdpau-devel is &lt;0.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145170" version="1" comment="libvirt-devel is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114122" version="1" comment="libwmf-devel is &lt;0.2.8.4-242.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114123" version="1" comment="libwmf-gnome is &lt;0.2.8.4-242.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108094" version="1" comment="libxerces-c-devel is &lt;3.1.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103734" version="1" comment="libxml2-devel is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145172" version="1" comment="libyaml-devel is &lt;0.1.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145173" version="1" comment="libzip-devel is &lt;0.11.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114238" version="1" comment="zeromq-devel is &lt;4.0.4-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109222" version="1" comment="mercurial is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116017" version="1" comment="mozilla-nspr-devel is &lt;4.10.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116031" version="1" comment="mozilla-nss-devel is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105817" version="1" comment="mpfr-devel is &lt;3.1.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145174" version="1" comment="net-snmp-devel is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145175" version="1" comment="openldap2-back-perl is &lt;2.4.41-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145176" version="1" comment="openslp-devel is &lt;2.0.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145177" version="1" comment="osc is &lt;0.152.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145178" version="1" comment="pam-devel is &lt;1.1.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145180" version="1" comment="php5-devel is &lt;5.5.14-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115374" version="1" comment="polkit-devel is &lt;0.113-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145181" version="1" comment="postgresql94-devel is &lt;9.4.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145182" version="1" comment="python3-devel is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105407" version="1" comment="rpm-devel is &lt;4.11.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105410" version="1" comment="ruby2.1-devel is &lt;2.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145184" version="1" comment="spice-gtk-devel is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145185" version="1" comment="typelib-1_0-SpiceClientGtk-2_0 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145186" version="1" comment="systemtap-sdt-devel is &lt;2.5-4.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114952" version="1" comment="wireshark-devel is &lt;1.12.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145189" version="1" comment="xen-devel is &lt;4.5.1_12-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145191" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.15.2-36.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145192" version="1" comment="yast2-core-devel is &lt;3.1.18-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145193" version="1" comment="yast2-devel-doc is &lt;3.1.155-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145194" version="1" comment="DirectFB-devel is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145195" version="1" comment="lib++dfb-devel is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135224" version="1" comment="sle-sdk-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131744" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131745" version="1" comment="libMagick++-devel is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131746" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119325" version="1" comment="LibVNCServer-devel is &lt;0.9.9-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131809" version="1" comment="MozillaFirefox-devel is &lt;45.4.0esr-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145196" version="1" comment="NetworkManager-devel is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145197" version="1" comment="aaa_base-malloccheck is &lt;13.2+git20140911.61c1681-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145198" version="1" comment="accountsservice-devel is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145009" version="1" comment="alsa-devel is &lt;1.0.27.2-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145010" version="1" comment="ant-jmf is &lt;1.9.4-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145011" version="1" comment="ant-scripts is &lt;1.9.4-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145012" version="1" comment="ant-swing is &lt;1.9.4-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145199" version="1" comment="apache2-devel is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145200" version="1" comment="augeas-devel is &lt;1.2.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145201" version="1" comment="avahi-compat-howl-devel is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145202" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145203" version="1" comment="libavahi-devel is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145204" version="1" comment="libhowl0 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145205" version="1" comment="python-avahi is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145206" version="1" comment="bash-devel is &lt;4.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145207" version="1" comment="readline-devel is &lt;6.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131806" version="1" comment="bind-devel is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145208" version="1" comment="binutils-devel is &lt;2.26.1-9.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145209" version="1" comment="binutils-gold is &lt;2.26.1-9.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145210" version="1" comment="cross-ppc-binutils is &lt;2.26.1-9.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145211" version="1" comment="cross-spu-binutils is &lt;2.26.1-9.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124479" version="1" comment="bsh2 is &lt;2.0.0.b5-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124480" version="1" comment="bsh2-classgen is &lt;2.0.0.b5-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124481" version="1" comment="bsh2-javadoc is &lt;2.0.0.b5-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145212" version="1" comment="cifs-utils-devel is &lt;6.5-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131751" version="1" comment="cracklib-devel is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145213" version="1" comment="cups-ddk is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145214" version="1" comment="cups-devel is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145215" version="1" comment="dbus-1-devel is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145216" version="1" comment="dbus-1-devel-doc is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130041" version="1" comment="dhcp-devel is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145217" version="1" comment="eog-devel is &lt;3.20.4-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145218" version="1" comment="evince-devel is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145219" version="1" comment="finch-devel is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145220" version="1" comment="libpurple-devel is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145221" version="1" comment="pidgin-devel is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145222" version="1" comment="flac-devel is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131797" version="1" comment="libQtWebKit-devel is &lt;4.8.6+2.3.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131798" version="1" comment="libbonobo-devel is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131799" version="1" comment="libnetpbm-devel is &lt;10.66.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130943" version="1" comment="mdbtools is &lt;0.7-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131801" version="1" comment="sgmltool is &lt;1.0.9-1075.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145223" version="1" comment="fontconfig-devel is &lt;2.11.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145224" version="1" comment="freerdp-devel is &lt;2.0.0~git.1463131968.4e66df7-11.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145225" version="1" comment="freetype2-devel is &lt;2.6.3-7.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145226" version="1" comment="gcc48-ada is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145227" version="1" comment="gcc48-fortran is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145228" version="1" comment="gcc48-java is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145229" version="1" comment="gcc48-obj-c++ is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145230" version="1" comment="gcc48-objc is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145231" version="1" comment="gcc48-objc-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145232" version="1" comment="libada48 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145233" version="1" comment="libffi48-devel is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145234" version="1" comment="libgcj48-devel is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145235" version="1" comment="libobjc4 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145236" version="1" comment="libobjc4-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131765" version="1" comment="gd-devel is &lt;2.1.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145237" version="1" comment="gdk-pixbuf-devel is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145238" version="1" comment="gdm-devel is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125327" version="1" comment="ghostscript-devel is &lt;9.15-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126713" version="1" comment="giflib-devel is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145239" version="1" comment="gimp-devel is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124818" version="1" comment="git is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124819" version="1" comment="git-arch is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124821" version="1" comment="git-cvs is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124822" version="1" comment="git-daemon is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124823" version="1" comment="git-email is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124824" version="1" comment="git-gui is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124825" version="1" comment="git-svn is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124826" version="1" comment="git-web is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124827" version="1" comment="gitk is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145240" version="1" comment="glib2-devel is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145241" version="1" comment="glib2-devel-static is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145242" version="1" comment="glibc-devel-static is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145243" version="1" comment="gnome-online-accounts-devel is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145244" version="1" comment="gnome-settings-daemon-devel is &lt;3.20.1-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145245" version="1" comment="gnome-shell-devel is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124736" version="1" comment="graphite2-devel is &lt;1.3.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145246" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145247" version="1" comment="gtk2-devel is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145041" version="1" comment="hplip-devel is &lt;3.14.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145042" version="1" comment="lzo-devel is &lt;2.08-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131660" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.50-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128389" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr3.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145248" version="1" comment="kernel-docs is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145249" version="1" comment="kernel-obs-build is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145250" version="1" comment="krb5-devel is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126434" version="1" comment="lhasa-devel is &lt;0.2.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145251" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145252" version="1" comment="libQt5Concurrent-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145253" version="1" comment="libQt5Core-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145254" version="1" comment="libQt5Core-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145255" version="1" comment="libQt5DBus-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145256" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145257" version="1" comment="libQt5Gui-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145258" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145259" version="1" comment="libQt5Network-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145260" version="1" comment="libQt5Network-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145261" version="1" comment="libQt5OpenGL-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145262" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145263" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145264" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145265" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145266" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145267" version="1" comment="libQt5PrintSupport-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145268" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145269" version="1" comment="libQt5Sql-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145270" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145271" version="1" comment="libQt5Test-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145272" version="1" comment="libQt5Test-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145273" version="1" comment="libQt5Widgets-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145274" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145275" version="1" comment="libQt5Xml-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145276" version="1" comment="libqt5-qtbase-common-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145277" version="1" comment="libqt5-qtbase-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145278" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145279" version="1" comment="libQt5WebKit-private-headers-devel is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145280" version="1" comment="libQt5WebKit5-devel is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145281" version="1" comment="libQt5WebKitWidgets-devel is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145282" version="1" comment="libQt5WebKitWidgets-private-headers-devel is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145283" version="1" comment="libXfont-devel is &lt;1.5.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145284" version="1" comment="libXrandr-devel is &lt;1.5.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130725" version="1" comment="libarchive-devel is &lt;3.1.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145285" version="1" comment="libblkid-devel is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145286" version="1" comment="libmount-devel is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145287" version="1" comment="libsmartcols-devel is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145288" version="1" comment="libbz2-devel is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145289" version="1" comment="libcolord-devel is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145290" version="1" comment="libcolord-gtk-devel is &lt;0.1.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145291" version="1" comment="typelib-1_0-ColorHug-1_0 is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145292" version="1" comment="typelib-1_0-Colord-1_0 is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145293" version="1" comment="typelib-1_0-ColordGtk-1_0 is &lt;0.1.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131794" version="1" comment="libcurl-devel is &lt;7.37.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128469" version="1" comment="libexpat-devel is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145121" version="1" comment="libgadu-devel is &lt;1.11.4-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145122" version="1" comment="libgadu3 is &lt;1.11.4-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131795" version="1" comment="libgcrypt-devel is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145294" version="1" comment="libgnomesu-devel is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145295" version="1" comment="libguestfs-devel is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145296" version="1" comment="ocaml-libguestfs-devel is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131747" version="1" comment="libidn-devel is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145297" version="1" comment="libimobiledevice-devel is &lt;1.2.0-7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145298" version="1" comment="libipa_hbac-devel is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145299" version="1" comment="libsss_idmap-devel is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145300" version="1" comment="libsss_nss_idmap-devel is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145301" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145302" version="1" comment="libwebkitgtk-devel is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145303" version="1" comment="libwebkitgtk3-devel is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145304" version="1" comment="typelib-1_0-JavaScriptCore-1_0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145305" version="1" comment="typelib-1_0-WebKit-1_0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145143" version="1" comment="libjbig-devel is &lt;2.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128470" version="1" comment="libksba-devel is &lt;1.3.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145306" version="1" comment="libldb-devel is &lt;1.1.26-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145307" version="1" comment="pyldb is &lt;1.1.26-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145308" version="1" comment="pyldb-devel is &lt;1.1.26-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118766" version="1" comment="libmspack-devel is &lt;0.4-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131803" version="1" comment="libmysqlclient-devel is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131804" version="1" comment="libmysqld-devel is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131805" version="1" comment="libmysqld18 is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123021" version="1" comment="libnettle-devel is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124482" version="1" comment="libotr-devel is &lt;4.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145309" version="1" comment="libpacemaker-devel is &lt;1.1.15-19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145150" version="1" comment="libpcp-devel is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145151" version="1" comment="libpcp3 is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145152" version="1" comment="pcp is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145153" version="1" comment="pcp-import-iostat2pcp is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145154" version="1" comment="pcp-import-mrtg2pcp is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145155" version="1" comment="pcp-import-sar2pcp is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145156" version="1" comment="pcp-import-sheet2pcp is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145157" version="1" comment="perl-PCP-LogImport is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145158" version="1" comment="perl-PCP-LogSummary is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145159" version="1" comment="perl-PCP-MMV is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145160" version="1" comment="perl-PCP-PMDA is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119234" version="1" comment="libpng12-compat-devel is &lt;1.2.50-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119235" version="1" comment="libpng12-devel is &lt;1.2.50-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119236" version="1" comment="libpng16-compat-devel is &lt;1.6.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119237" version="1" comment="libpng16-devel is &lt;1.6.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145311" version="1" comment="libpoppler-cpp0 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145312" version="1" comment="libpoppler-devel is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145313" version="1" comment="libpoppler-glib-devel is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145314" version="1" comment="libpoppler-qt4-devel is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145315" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145316" version="1" comment="libproxy-devel is &lt;0.4.13-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125285" version="1" comment="libqt4-devel is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125286" version="1" comment="libqt4-devel-doc is &lt;4.8.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125287" version="1" comment="libqt4-devel-doc-data is &lt;4.8.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125288" version="1" comment="libqt4-linguist is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125289" version="1" comment="libqt4-private-headers-devel is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145165" version="1" comment="libraw-devel is &lt;0.15.4-3.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145166" version="1" comment="libraw-devel-static is &lt;0.15.4-3.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145167" version="1" comment="libraw9 is &lt;0.15.4-3.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130949" version="1" comment="libreoffice-sdk is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145317" version="1" comment="librsvg-devel is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145318" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145168" version="1" comment="libserf-1-1 is &lt;1.3.7-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145319" version="1" comment="libsmbclient-devel is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145320" version="1" comment="libwbclient-devel is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119287" version="1" comment="libsndfile-devel is &lt;1.0.25-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145321" version="1" comment="libsoup-devel is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145322" version="1" comment="libspice-server-devel is &lt;0.12.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123873" version="1" comment="libssh-devel is &lt;0.6.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123874" version="1" comment="libssh-devel-doc is &lt;0.6.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145323" version="1" comment="libssh2-devel is &lt;1.4.3-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145324" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145325" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145326" version="1" comment="subversion is &lt;1.8.10-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145327" version="1" comment="subversion-bash-completion is &lt;1.8.10-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145328" version="1" comment="subversion-devel is &lt;1.8.10-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145329" version="1" comment="subversion-perl is &lt;1.8.10-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145330" version="1" comment="subversion-python is &lt;1.8.10-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145331" version="1" comment="subversion-server is &lt;1.8.10-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145332" version="1" comment="subversion-tools is &lt;1.8.10-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128912" version="1" comment="libtasn1-devel is &lt;3.7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131760" version="1" comment="libtcnative-1-0-devel is &lt;1.1.32-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131764" version="1" comment="libtiff-devel is &lt;4.0.6-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145333" version="1" comment="libudev-devel is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145334" version="1" comment="systemd-devel is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145335" version="1" comment="libusbmuxd-devel is &lt;1.0.10-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145336" version="1" comment="libvdpau-devel is &lt;1.1.1-6.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145337" version="1" comment="libvirt-devel is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145171" version="1" comment="libvorbis-devel is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145135" version="1" comment="libwebkit2gtk-3_0-25 is &lt;2.2.7-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114125" version="1" comment="libwmf-tools is &lt;0.2.8.4-242.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145338" version="1" comment="libxcb-composite0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145339" version="1" comment="libxcb-damage0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145340" version="1" comment="libxcb-devel is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145341" version="1" comment="libxcb-devel-doc is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145342" version="1" comment="libxcb-dpms0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145343" version="1" comment="libxcb-record0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145344" version="1" comment="libxcb-res0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145345" version="1" comment="libxcb-screensaver0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145346" version="1" comment="libxcb-xevie0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145347" version="1" comment="libxcb-xprint0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145348" version="1" comment="libxcb-xtest0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145349" version="1" comment="libxcb-xvmc0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131754" version="1" comment="libxerces-c-devel is &lt;3.1.1-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145350" version="1" comment="libxml2-devel is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145351" version="1" comment="libzip-devel is &lt;0.11.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145352" version="1" comment="zeromq-devel is &lt;4.0.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128191" version="1" comment="mercurial is &lt;2.8.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129305" version="1" comment="mozilla-nspr-devel is &lt;4.12-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129306" version="1" comment="mozilla-nss-devel is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109976" version="1" comment="mysql-connector-java is &lt;5.1.35-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145353" version="1" comment="ocaml is &lt;4.03.0-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145354" version="1" comment="ocaml-compiler-libs is &lt;4.03.0-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145355" version="1" comment="ocaml-rpm-macros is &lt;4.03.0-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145356" version="1" comment="ocaml-runtime is &lt;4.03.0-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145357" version="1" comment="openldap2-back-perl is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145358" version="1" comment="openldap2-devel is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145359" version="1" comment="openldap2-devel-static is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131800" version="1" comment="openslp-devel is &lt;2.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145360" version="1" comment="pango-devel is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131807" version="1" comment="php5-devel is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131811" version="1" comment="php7-devel is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145361" version="1" comment="polkit-devel is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131808" version="1" comment="postgresql94-devel is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128393" version="1" comment="quagga-devel is &lt;0.99.22.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145362" version="1" comment="rhythmbox-devel is &lt;3.4-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145363" version="1" comment="rpm-devel is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145364" version="1" comment="ruby2.1-devel is &lt;2.1.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131793" version="1" comment="samba-test-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145365" version="1" comment="spice-gtk-devel is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145366" version="1" comment="typelib-1_0-SpiceClientGtk-2_0 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130778" version="1" comment="sqlite3-devel is &lt;3.8.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145367" version="1" comment="sudo-devel is &lt;1.8.10p3-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145368" version="1" comment="systemtap-sdt-devel is &lt;3.0-7.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145369" version="1" comment="unixODBC-devel is &lt;2.3.4-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145370" version="1" comment="vte2-devel is &lt;0.28.2-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145371" version="1" comment="webkit2gtk3-devel is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131810" version="1" comment="wireshark-devel is &lt;1.12.13-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145187" version="1" comment="xalan-j2-demo is &lt;2.7.0-264.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145188" version="1" comment="xalan-j2-manual is &lt;2.7.0-264.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145372" version="1" comment="xen-devel is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145373" version="1" comment="xfsprogs-devel is &lt;4.3.0-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145190" version="1" comment="xorg-x11-devel is &lt;7.6-45.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145374" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.18.3-57.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145375" version="1" comment="yast2-core-devel is &lt;3.1.23-6.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159484" version="1" comment="sle-sdk-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159736" version="1" comment="FastCGI is &lt;2.4.0-168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159737" version="1" comment="FastCGI-devel is &lt;2.4.0-168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159738" version="1" comment="perl-FastCGI is &lt;2.4.0-168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156379" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156380" version="1" comment="libMagick++-devel is &lt;6.8.8.1-70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156381" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157361" version="1" comment="MozillaFirefox-devel is &lt;52.2.0esr-108.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159739" version="1" comment="NetworkManager-devel is &lt;1.0.12-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159740" version="1" comment="aaa_base-malloccheck is &lt;13.2+git20140911.61c1681-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159741" version="1" comment="alsa-devel is &lt;1.0.27.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159742" version="1" comment="apache-pdfbox is &lt;1.8.12-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157606" version="1" comment="apache2-devel is &lt;2.4.23-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159743" version="1" comment="apache2-mod_perl-devel is &lt;2.0.8-11.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150581" version="1" comment="audiofile-devel is &lt;0.3.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159744" version="1" comment="augeas-devel is &lt;1.2.0-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155574" version="1" comment="bash-devel is &lt;4.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155575" version="1" comment="readline-devel is &lt;6.3-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157743" version="1" comment="bind-devel is &lt;9.9.9P1-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157362" version="1" comment="cairo-devel is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159745" version="1" comment="crash-devel is &lt;7.1.8-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159746" version="1" comment="cups-ddk is &lt;1.7.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159747" version="1" comment="cups-devel is &lt;1.7.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159748" version="1" comment="dbus-1-devel is &lt;1.8.22-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159749" version="1" comment="dbus-1-devel-doc is &lt;1.8.22-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159750" version="1" comment="dovecot22-devel is &lt;2.2.30.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159751" version="1" comment="e2fsprogs-devel is &lt;1.42.11-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159752" version="1" comment="libcom_err-devel is &lt;1.42.11-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159753" version="1" comment="libext2fs-devel is &lt;1.42.11-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159754" version="1" comment="finch-devel is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159755" version="1" comment="libpurple-devel is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159756" version="1" comment="pidgin-devel is &lt;2.12.0-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159757" version="1" comment="freeradius-server-devel is &lt;3.0.14-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159758" version="1" comment="freetype2-devel is &lt;2.6.3-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136677" version="1" comment="gc-devel is &lt;7.2d-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148458" version="1" comment="gd-devel is &lt;2.1.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159759" version="1" comment="gdk-pixbuf-devel is &lt;2.34.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149585" version="1" comment="gegl-devel is &lt;0.2.0-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155982" version="1" comment="ghostscript-devel is &lt;9.15-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150808" version="1" comment="gimp-devel is &lt;2.8.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155662" version="1" comment="git is &lt;2.12.3-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155665" version="1" comment="git-arch is &lt;2.12.3-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155666" version="1" comment="git-cvs is &lt;2.12.3-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155667" version="1" comment="git-daemon is &lt;2.12.3-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155664" version="1" comment="git-doc is &lt;2.12.3-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155668" version="1" comment="git-email is &lt;2.12.3-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155669" version="1" comment="git-gui is &lt;2.12.3-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155670" version="1" comment="git-svn is &lt;2.12.3-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155671" version="1" comment="git-web is &lt;2.12.3-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155672" version="1" comment="gitk is &lt;2.12.3-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157042" version="1" comment="glibc-devel-static is &lt;2.22-61.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159760" version="1" comment="gnome-online-accounts-devel is &lt;3.20.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159761" version="1" comment="gnome-settings-daemon-devel is &lt;3.20.1-49.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159762" version="1" comment="gnome-shell-devel is &lt;3.20.4-76.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154937" version="1" comment="graphite2-devel is &lt;1.3.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147827" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154339" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154340" version="1" comment="typelib-1_0-GstApp-0_10 is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154341" version="1" comment="typelib-1_0-GstInterfaces-0_10 is &lt;0.10.36-17.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150852" version="1" comment="gstreamer-devel is &lt;1.8.3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150850" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150851" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.8.3-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154452" version="1" comment="gstreamer-plugins-base-devel is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154453" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154454" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154455" version="1" comment="typelib-1_0-GstFft-1_0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154456" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154457" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154458" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.8.3-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148159" version="1" comment="guile-devel is &lt;2.0.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148160" version="1" comment="libguilereadline-v-18-18 is &lt;2.0.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159763" version="1" comment="hplip-devel is &lt;3.16.11-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155703" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.5-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155707" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr4.5-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159764" version="1" comment="kernel-docs is &lt;4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159765" version="1" comment="kernel-obs-build is &lt;4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159766" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159767" version="1" comment="libQt5Concurrent-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159768" version="1" comment="libQt5Core-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159769" version="1" comment="libQt5Core-private-headers-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159770" version="1" comment="libQt5DBus-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159771" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159772" version="1" comment="libQt5Gui-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159773" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159774" version="1" comment="libQt5Network-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159775" version="1" comment="libQt5Network-private-headers-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159776" version="1" comment="libQt5OpenGL-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159777" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159778" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159779" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159780" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159781" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159782" version="1" comment="libQt5PrintSupport-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159783" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159784" version="1" comment="libQt5Sql-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159785" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159786" version="1" comment="libQt5Test-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159787" version="1" comment="libQt5Test-private-headers-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159788" version="1" comment="libQt5Widgets-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159789" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159790" version="1" comment="libQt5Xml-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159791" version="1" comment="libqt5-qtbase-common-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159792" version="1" comment="libqt5-qtbase-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159793" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.6.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159794" version="1" comment="libQt5WebKit-private-headers-devel is &lt;5.6.2-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159795" version="1" comment="libQt5WebKit5-devel is &lt;5.6.2-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159796" version="1" comment="libQt5WebKitWidgets-devel is &lt;5.6.2-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159797" version="1" comment="libQt5WebKitWidgets-private-headers-devel is &lt;5.6.2-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136407" version="1" comment="libX11-devel is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135059" version="1" comment="libXfixes-devel is &lt;5.0.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136675" version="1" comment="libXi-devel is &lt;1.7.4-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148457" version="1" comment="libXpm-devel is &lt;3.5.11-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148460" version="1" comment="libXpm-tools is &lt;3.5.11-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135560" version="1" comment="libXrender-devel is &lt;0.9.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135079" version="1" comment="libXtst-devel is &lt;1.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135084" version="1" comment="libXv-devel is &lt;1.0.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135561" version="1" comment="libXvMC-devel is &lt;1.0.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159798" version="1" comment="libapparmor-devel is &lt;2.8.2-49.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135984" version="1" comment="libarchive-devel is &lt;3.1.2-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142758" version="1" comment="libass-devel is &lt;0.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159799" version="1" comment="libblkid-devel is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159800" version="1" comment="libmount-devel is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159801" version="1" comment="libsmartcols-devel is &lt;2.29.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155271" version="1" comment="libbotan-1_10-0 is &lt;1.10.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155272" version="1" comment="libbotan-devel is &lt;1.10.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146076" version="1" comment="libcares-devel is &lt;1.9.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159802" version="1" comment="libcgroup-devel is &lt;0.41.rc1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159803" version="1" comment="libcolord-devel is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159804" version="1" comment="typelib-1_0-ColorHug-1_0 is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159805" version="1" comment="typelib-1_0-Colord-1_0 is &lt;1.3.3-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154450" version="1" comment="libcurl-devel is &lt;7.37.0-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148248" version="1" comment="libexpat-devel is &lt;2.1.0-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154940" version="1" comment="libfbembed-devel is &lt;2.5.2.26539-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157041" version="1" comment="libgcrypt-devel is &lt;1.6.1-16.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148270" version="1" comment="libgit2-24 is &lt;0.24.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145391" version="1" comment="libgme-devel is &lt;0.6.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159806" version="1" comment="libgnutls-devel is &lt;3.3.27-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159807" version="1" comment="libgnutls-openssl-devel is &lt;3.3.27-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159808" version="1" comment="libgnutlsxx-devel is &lt;3.3.27-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159809" version="1" comment="libgnutlsxx28 is &lt;3.3.27-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159810" version="1" comment="libguestfs-devel is &lt;1.32.4-19.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159811" version="1" comment="ocaml-libguestfs-devel is &lt;1.32.4-19.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159812" version="1" comment="libipa_hbac-devel is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159813" version="1" comment="libsss_idmap-devel is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159814" version="1" comment="libsss_nss_idmap-devel is &lt;1.13.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150816" version="1" comment="libjasper-devel is &lt;1.900.14-194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159815" version="1" comment="libldb-devel is &lt;1.1.29-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159816" version="1" comment="python-ldb is &lt;1.1.29-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159817" version="1" comment="python-ldb-devel is &lt;1.1.29-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156861" version="1" comment="libmicrohttpd-devel is &lt;0.9.30-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159818" version="1" comment="libmysqlclient-devel is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159819" version="1" comment="libmysqld-devel is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159820" version="1" comment="libmysqld18 is &lt;10.0.30-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139267" version="1" comment="libnetpbm-devel is &lt;10.66.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156353" version="1" comment="libnettle-devel is &lt;2.7.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148267" version="1" comment="libopus-devel is &lt;1.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148268" version="1" comment="libopus-devel-static is &lt;1.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155066" version="1" comment="libosip2-devel is &lt;3.5.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159821" version="1" comment="libpacemaker-devel is &lt;1.1.16-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143043" version="1" comment="pcre-devel is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143044" version="1" comment="pcre-devel-static is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143045" version="1" comment="pcre-tools is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147773" version="1" comment="libpcscspy0 is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147774" version="1" comment="pcsc-lite-devel is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155708" version="1" comment="libplist++-devel is &lt;1.12-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155709" version="1" comment="libplist-devel is &lt;1.12-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150239" version="1" comment="libpng12-compat-devel is &lt;1.2.50-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150240" version="1" comment="libpng12-devel is &lt;1.2.50-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150210" version="1" comment="libpng16-compat-devel is &lt;1.6.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150211" version="1" comment="libpng16-devel is &lt;1.6.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157354" version="1" comment="libpoppler44 is &lt;0.24.4-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159822" version="1" comment="libpulse-devel is &lt;5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149139" version="1" comment="libquicktime-devel is &lt;1.2.4-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159823" version="1" comment="libreoffice-sdk is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159824" version="1" comment="libsmbclient-devel is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159825" version="1" comment="libwbclient-devel is &lt;4.6.5+git.27.6afd48b1083-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155690" version="1" comment="libsndfile-devel is &lt;1.0.25-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159826" version="1" comment="libspice-server-devel is &lt;0.12.8-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159827" version="1" comment="libtasn1-devel is &lt;4.9-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135887" version="1" comment="libtcnative-1-0-devel is &lt;1.1.34-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154451" version="1" comment="libtiff-devel is &lt;4.0.7-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155576" version="1" comment="libtirpc-devel is &lt;1.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159828" version="1" comment="libudev-devel is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159829" version="1" comment="systemd-devel is &lt;228-142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157776" version="1" comment="libunrar-devel is &lt;5.0.14-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157777" version="1" comment="libunrar5_0_14 is &lt;5.0.14-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159830" version="1" comment="libvirt-devel is &lt;3.3.0-4.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157778" version="1" comment="libxml2-devel is &lt;2.9.4-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155570" version="1" comment="libxslt-devel is &lt;1.1.28-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159831" version="1" comment="zeromq-devel is &lt;4.0.4-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154703" version="1" comment="zziplib-devel is &lt;0.13.62-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159832" version="1" comment="lua-devel is &lt;5.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157040" version="1" comment="mercurial is &lt;2.8.2-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155344" version="1" comment="mozilla-nspr-devel is &lt;4.13.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155345" version="1" comment="mozilla-nss-devel is &lt;3.29.5-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156774" version="1" comment="openldap2-back-perl is &lt;2.4.41-18.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156775" version="1" comment="openldap2-devel is &lt;2.4.41-18.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156776" version="1" comment="openldap2-devel-static is &lt;2.4.41-18.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131843" version="1" comment="openslp-devel is &lt;2.0.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159833" version="1" comment="osc is &lt;0.158.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155981" version="1" comment="pam-devel is &lt;1.1.8-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157331" version="1" comment="php5-devel is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157744" version="1" comment="php7-devel is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159834" version="1" comment="postgresql96-devel is &lt;9.6.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148459" version="1" comment="ppp-devel is &lt;2.4.7-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159835" version="1" comment="python3-devel is &lt;3.4.6-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131839" version="1" comment="quagga-devel is &lt;0.99.22.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146871" version="1" comment="rrdtool-devel is &lt;1.4.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159836" version="1" comment="ruby2.1-devel is &lt;2.1.9-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149641" version="1" comment="sane-backends-devel is &lt;1.0.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159837" version="1" comment="spice-gtk-devel is &lt;0.33-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159838" version="1" comment="sqlite3-devel is &lt;3.8.10.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159839" version="1" comment="sudo-devel is &lt;1.8.20p2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159840" version="1" comment="systemtap-sdt-devel is &lt;3.0-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149827" version="1" comment="virglrenderer-devel is &lt;0.5.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157332" version="1" comment="wireshark-devel is &lt;2.2.7-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159841" version="1" comment="xen-devel is &lt;4.9.0_08-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159842" version="1" comment="xfsprogs-devel is &lt;4.3.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157364" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.18.3-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159843" version="1" comment="yast2-core-devel is &lt;3.2.2-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156396" version="1" comment="yodl is &lt;3.03.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146187" version="1" comment="zlib-devel-32bit is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146188" version="1" comment="zlib-devel-static is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117478" version="1" comment="sle-we-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118890" version="1" comment="sle-we-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136016" version="1" comment="sle-we-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144630" version="1" comment="libreoffice-l10n-bg is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144631" version="1" comment="libreoffice-l10n-hr is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144632" version="1" comment="libreoffice-l10n-lt is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144633" version="1" comment="libreoffice-l10n-uk is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159844" version="1" comment="sle-we-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159845" version="1" comment="libreoffice-l10n-bg is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159846" version="1" comment="libreoffice-l10n-hr is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159847" version="1" comment="libreoffice-l10n-lt is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159848" version="1" comment="libreoffice-l10n-uk is &lt;5.2.5.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103563" version="1" comment="libreoffice is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103653" version="1" comment="libreoffice-sdk is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117415" version="1" comment="sle-bsk-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102212" version="1" comment="libreoffice is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102302" version="1" comment="libreoffice-sdk is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107603" version="1" comment="cups is &lt;1.7.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107605" version="1" comment="cups-ddk is &lt;1.7.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107854" version="1" comment="kernel-zfcpdump is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108390" version="1" comment="kernel-zfcpdump is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105335" version="1" comment="kernel-zfcpdump is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110317" version="1" comment="cups-ddk is &lt;1.7.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110528" version="1" comment="kernel-zfcpdump is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111355" version="1" comment="krb5-mini is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111356" version="1" comment="krb5-mini-devel is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111593" version="1" comment="kernel-zfcpdump is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113199" version="1" comment="python-Jinja2 is &lt;2.7.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105766" version="1" comment="kernel-zfcpdump is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114119" version="1" comment="libwmf is &lt;0.2.8.4-242.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114453" version="1" comment="kernel-zfcpdump is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115006" version="1" comment="kernel-zfcpdump is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106082" version="1" comment="krb5-mini is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106083" version="1" comment="krb5-mini-devel is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115939" version="1" comment="krb5-mini is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115940" version="1" comment="krb5-mini-devel is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115575" version="1" comment="flute is &lt;1.3.0-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115590" version="1" comment="libbase is &lt;1.1.3-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115611" version="1" comment="libfonts is &lt;1.1.3-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115613" version="1" comment="libformula is &lt;1.1.3-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115632" version="1" comment="liblayout is &lt;0.2.10-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115634" version="1" comment="libloader is &lt;1.1.3-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115752" version="1" comment="libreoffice-sdk is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115756" version="1" comment="librepository is &lt;1.1.3-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115758" version="1" comment="librevenge is &lt;0.0.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115760" version="1" comment="librevenge-devel is &lt;0.0.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115762" version="1" comment="librevenge-generators-0_0-0 is &lt;0.0.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115764" version="1" comment="libserializer is &lt;1.1.2-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115781" version="1" comment="mdds is &lt;0.12.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115782" version="1" comment="mdds-devel is &lt;0.12.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115925" version="1" comment="pentaho-libxml is &lt;1.1.3-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115927" version="1" comment="pentaho-reporting-flow-engine is &lt;0.9.4-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115929" version="1" comment="sac is &lt;1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106173" version="1" comment="perl-Capture-Tiny is &lt;0.23-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118154" version="1" comment="kernel-zfcpdump is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118556" version="1" comment="krb5-mini is &lt;1.12.1-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118557" version="1" comment="krb5-mini-devel is &lt;1.12.1-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119006" version="1" comment="python-tdb is &lt;1.3.8-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119007" version="1" comment="python-tevent is &lt;0.9.26-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119008" version="1" comment="tdb is &lt;1.3.8-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119009" version="1" comment="tevent is &lt;0.9.26-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129267" version="1" comment="kernel-zfcpdump is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129383" version="1" comment="kernel-zfcpdump is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129446" version="1" comment="libreoffice is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129447" version="1" comment="libreoffice-sdk is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121130" version="1" comment="kernel-zfcpdump is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121621" version="1" comment="kernel-zfcpdump is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122485" version="1" comment="krb5-mini is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122486" version="1" comment="krb5-mini-devel is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124799" version="1" comment="kernel-zfcpdump is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125319" version="1" comment="ghostscript-mini is &lt;9.15-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125320" version="1" comment="ghostscript-mini-devel is &lt;9.15-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125667" version="1" comment="go is &lt;1.5.3-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125668" version="1" comment="go-doc is &lt;1.5.3-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125711" version="1" comment="gcc5-go is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125712" version="1" comment="libgo7 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125713" version="1" comment="krb5-mini is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125714" version="1" comment="krb5-mini-devel is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126706" version="1" comment="go is &lt;1.5.4-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126707" version="1" comment="go-doc is &lt;1.5.4-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127131" version="1" comment="go is &lt;1.6.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127132" version="1" comment="go-doc is &lt;1.6.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127705" version="1" comment="libudev-mini-devel is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127706" version="1" comment="libudev-mini1 is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127707" version="1" comment="systemd-mini is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127708" version="1" comment="systemd-mini-devel is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127709" version="1" comment="udev-mini is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128636" version="1" comment="libpoppler-cpp0 is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128637" version="1" comment="poppler is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128890" version="1" comment="kernel-zfcpdump is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118982" version="1" comment="kernel-zfcpdump is &lt;3.12.51-60.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118772" version="1" comment="sle-bsk-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119010" version="1" comment="python-tdb is &lt;1.3.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119011" version="1" comment="python-tevent is &lt;0.9.26-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119012" version="1" comment="tdb is &lt;1.3.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119013" version="1" comment="tevent is &lt;0.9.26-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129343" version="1" comment="kernel-zfcpdump is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129384" version="1" comment="kernel-zfcpdump is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121526" version="1" comment="kernel-zfcpdump is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130929" version="1" comment="kernel-zfcpdump is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130931" version="1" comment="cracklib-dict-small is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130932" version="1" comment="krb5-mini is &lt;1.12.1-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130933" version="1" comment="krb5-mini-devel is &lt;1.12.1-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130934" version="1" comment="ocaml is &lt;4.02.3-6.6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130935" version="1" comment="ocaml-ocamldoc is &lt;4.02.3-6.6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130936" version="1" comment="kdelibs4 is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130937" version="1" comment="kdelibs4-branding-upstream is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130938" version="1" comment="kdelibs4-core is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130939" version="1" comment="kdelibs4-doc is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130940" version="1" comment="libkde4-devel is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130941" version="1" comment="libkdecore4-devel is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130942" version="1" comment="libmdbodbc1 is &lt;0.7-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130944" version="1" comment="mdbtools-devel is &lt;0.7-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130945" version="1" comment="virtuoso is &lt;6.1.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130946" version="1" comment="virtuoso-drivers is &lt;6.1.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130947" version="1" comment="virtuoso-server is &lt;6.1.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130950" version="1" comment="libudev-mini-devel is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130951" version="1" comment="libudev-mini1 is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130952" version="1" comment="systemd-mini is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130953" version="1" comment="systemd-mini-devel is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130954" version="1" comment="udev-mini is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130955" version="1" comment="ghostscript-mini is &lt;9.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130956" version="1" comment="ghostscript-mini-devel is &lt;9.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130957" version="1" comment="kernel-zfcpdump is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130958" version="1" comment="ghostscript-mini is &lt;9.15-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130959" version="1" comment="ghostscript-mini-devel is &lt;9.15-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135535" version="1" comment="ghostscript-mini is &lt;9.15-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135536" version="1" comment="ghostscript-mini-devel is &lt;9.15-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135962" version="1" comment="kernel-zfcpdump is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136628" version="1" comment="kernel-zfcpdump is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143054" version="1" comment="kernel-zfcpdump is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123251" version="1" comment="kernel-zfcpdump is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125715" version="1" comment="kernel-zfcpdump is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127710" version="1" comment="libudev-mini-devel is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127711" version="1" comment="libudev-mini1 is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127712" version="1" comment="systemd-mini is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127713" version="1" comment="systemd-mini-devel is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127714" version="1" comment="udev-mini is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148394" version="1" comment="kernel-zfcpdump is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148657" version="1" comment="kernel-zfcpdump is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149121" version="1" comment="lynx is &lt;2.8.7-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149945" version="1" comment="kernel-zfcpdump is &lt;3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146958" version="1" comment="python-Twisted is &lt;15.2.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154699" version="1" comment="dpkg is &lt;1.16.10-12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154805" version="1" comment="ghostscript-mini is &lt;9.15-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154806" version="1" comment="ghostscript-mini-devel is &lt;9.15-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154903" version="1" comment="firebird is &lt;2.5.2.26539-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154904" version="1" comment="libfbclient2 is &lt;2.5.2.26539-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154905" version="1" comment="libfbclient2-devel is &lt;2.5.2.26539-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155607" version="1" comment="kdelibs4 is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155608" version="1" comment="kdelibs4-branding-upstream is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155609" version="1" comment="kdelibs4-core is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155610" version="1" comment="kdelibs4-doc is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155611" version="1" comment="libkde4-devel is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155612" version="1" comment="libkdecore4-devel is &lt;4.12.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155646" version="1" comment="kernel-zfcpdump is &lt;3.12.74-60.64.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155968" version="1" comment="ghostscript-mini is &lt;9.15-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155969" version="1" comment="ghostscript-mini-devel is &lt;9.15-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135537" version="1" comment="sle-bsk-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136629" version="1" comment="kernel-zfcpdump is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142719" version="1" comment="kernel-zfcpdump is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157579" version="1" comment="kernel-zfcpdump is &lt;4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157910" version="1" comment="libudev-mini-devel is &lt;228-149.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157911" version="1" comment="libudev-mini1 is &lt;228-149.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157912" version="1" comment="systemd-mini is &lt;228-149.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157913" version="1" comment="systemd-mini-devel is &lt;228-149.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157914" version="1" comment="udev-mini is &lt;228-149.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158168" version="1" comment="libreoffice is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158169" version="1" comment="libreoffice-sdk is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158775" version="1" comment="kernel-zfcpdump is &lt;4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158897" version="1" comment="libudev-mini-devel is &lt;228-150.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158898" version="1" comment="libudev-mini1 is &lt;228-150.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158899" version="1" comment="systemd-mini is &lt;228-150.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158900" version="1" comment="systemd-mini-devel is &lt;228-150.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158901" version="1" comment="udev-mini is &lt;228-150.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159502" version="1" comment="libpoppler-cpp0 is &lt;0.43.0-16.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159503" version="1" comment="poppler is &lt;0.43.0-16.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161399" version="1" comment="kernel-zfcpdump is &lt;4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161756" version="1" comment="kernel-zfcpdump is &lt;4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163123" version="1" comment="python-pycrypto is &lt;2.6.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147618" version="1" comment="libudev-mini-devel is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147619" version="1" comment="libudev-mini1 is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147620" version="1" comment="systemd-mini is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147621" version="1" comment="systemd-mini-devel is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147622" version="1" comment="udev-mini is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164281" version="1" comment="kernel-zfcpdump is &lt;4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165065" version="1" comment="krb5-mini is &lt;1.12.5-40.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165066" version="1" comment="krb5-mini-devel is &lt;1.12.5-40.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166109" version="1" comment="kernel-zfcpdump is &lt;4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166648" version="1" comment="krb5-mini is &lt;1.12.5-40.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166649" version="1" comment="krb5-mini-devel is &lt;1.12.5-40.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167424" version="1" comment="lynx is &lt;2.8.7-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167747" version="1" comment="kernel-zfcpdump is &lt;4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168778" version="1" comment="kernel-zfcpdump is &lt;4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149008" version="1" comment="kernel-zfcpdump is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149946" version="1" comment="kernel-zfcpdump is &lt;4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155049" version="1" comment="kernel-zfcpdump is &lt;4.4.59-92.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147203" version="1" comment="kernel-zfcpdump is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156952" version="1" comment="kernel-zfcpdump is &lt;4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169032" version="1" comment="kernel-zfcpdump is &lt;4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170438" version="1" comment="libudev-mini-devel is &lt;228-150.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170439" version="1" comment="libudev-mini1 is &lt;228-150.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170440" version="1" comment="systemd-mini is &lt;228-150.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170441" version="1" comment="systemd-mini-devel is &lt;228-150.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170442" version="1" comment="udev-mini is &lt;228-150.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171089" version="1" comment="ghostscript-mini is &lt;9.15-23.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171090" version="1" comment="ghostscript-mini-devel is &lt;9.15-23.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171091" version="1" comment="kernel-zfcpdump is &lt;4.4.114-92.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171160" version="1" comment="libreoffice is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171161" version="1" comment="libreoffice-sdk is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172454" version="1" comment="libudev-mini-devel is &lt;228-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172455" version="1" comment="libudev-mini1 is &lt;228-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172456" version="1" comment="systemd-mini is &lt;228-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172457" version="1" comment="systemd-mini-devel is &lt;228-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172458" version="1" comment="udev-mini is &lt;228-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172680" version="1" comment="cups is &lt;1.7.5-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172681" version="1" comment="cups-ddk is &lt;1.7.5-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169434" version="1" comment="kernel-zfcpdump is &lt;4.4.103-92.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173598" version="1" comment="kernel-zfcpdump is &lt;4.4.120-92.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173987" version="1" comment="krb5-mini is &lt;1.12.5-40.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173988" version="1" comment="krb5-mini-devel is &lt;1.12.5-40.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159504" version="1" comment="sle-bsk-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161352" version="1" comment="libudev-mini-devel is &lt;228-150.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161353" version="1" comment="libudev-mini1 is &lt;228-150.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161354" version="1" comment="systemd-mini is &lt;228-150.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161355" version="1" comment="systemd-mini-devel is &lt;228-150.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161356" version="1" comment="udev-mini is &lt;228-150.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162426" version="1" comment="kernel-zfcpdump is &lt;4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162651" version="1" comment="libreoffice is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162652" version="1" comment="libreoffice-sdk is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164282" version="1" comment="kernel-zfcpdump is &lt;4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166002" version="1" comment="kernel-zfcpdump is &lt;4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167748" version="1" comment="kernel-zfcpdump is &lt;4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168747" version="1" comment="kernel-zfcpdump is &lt;4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169033" version="1" comment="kernel-zfcpdump is &lt;4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170928" version="1" comment="kernel-zfcpdump is &lt;4.4.114-94.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171271" version="1" comment="libreoffice is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171272" version="1" comment="libreoffice-sdk is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173371" version="1" comment="python-tevent is &lt;0.9.34-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173372" version="1" comment="tevent is &lt;0.9.34-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173599" version="1" comment="kernel-zfcpdump is &lt;4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174550" version="1" comment="ocaml is &lt;4.03.0-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174551" version="1" comment="ocaml-ocamldoc is &lt;4.03.0-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174739" version="1" comment="kernel-zfcpdump is &lt;4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174740" version="1" comment="PackageKit is &lt;1.1.3-24.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174741" version="1" comment="PackageKit-branding-upstream is &lt;1.1.3-24.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174876" version="1" comment="libreoffice is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174877" version="1" comment="libreoffice-sdk is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169767" version="1" comment="kernel-zfcpdump is &lt;4.4.103-94.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102623" version="1" comment="tigervnc is &lt;1.3.0-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102624" version="1" comment="xorg-x11-Xvnc is &lt;1.3.0-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102886" version="1" comment="gnutls is &lt;3.2.15-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102891" version="1" comment="libgnutls28 is &lt;3.2.15-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102892" version="1" comment="libgnutls28-32bit is &lt;3.2.15-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102895" version="1" comment="flash-player is &lt;11.2.202.425-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102896" version="1" comment="flash-player-gnome is &lt;11.2.202.425-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102940" version="1" comment="mailx is &lt;12.5-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102931" version="1" comment="flac is &lt;1.3.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103131" version="1" comment="ntp is &lt;4.2.6p5-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103132" version="1" comment="ntp-doc is &lt;4.2.6p5-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103128" version="1" comment="openvpn is &lt;2.3.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103545" version="1" comment="dbus-1 is &lt;1.8.12-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103547" version="1" comment="dbus-1-x11 is &lt;1.8.12-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103551" version="1" comment="libdbus-1-3 is &lt;1.8.12-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103552" version="1" comment="libdbus-1-3-32bit is &lt;1.8.12-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103556" version="1" comment="tcpdump is &lt;4.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103657" version="1" comment="libssh is &lt;0.6.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103660" version="1" comment="libssh4 is &lt;0.6.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103564" version="1" comment="libreoffice-base is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103565" version="1" comment="libreoffice-base-drivers-mysql is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103566" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103568" version="1" comment="libreoffice-calc is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103569" version="1" comment="libreoffice-calc-extensions is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103570" version="1" comment="libreoffice-draw is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103571" version="1" comment="libreoffice-filters-optional is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103572" version="1" comment="libreoffice-gnome is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103578" version="1" comment="libreoffice-icon-theme-tango is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103579" version="1" comment="libreoffice-impress is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103581" version="1" comment="libreoffice-l10n-af is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103582" version="1" comment="libreoffice-l10n-ar is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103587" version="1" comment="libreoffice-l10n-ca is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103588" version="1" comment="libreoffice-l10n-cs is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103590" version="1" comment="libreoffice-l10n-da is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103591" version="1" comment="libreoffice-l10n-de is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103594" version="1" comment="libreoffice-l10n-en is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103595" version="1" comment="libreoffice-l10n-es is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103599" version="1" comment="libreoffice-l10n-fi is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103600" version="1" comment="libreoffice-l10n-fr is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103603" version="1" comment="libreoffice-l10n-gu is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103605" version="1" comment="libreoffice-l10n-hi is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103607" version="1" comment="libreoffice-l10n-hu is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103608" version="1" comment="libreoffice-l10n-it is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103609" version="1" comment="libreoffice-l10n-ja is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103612" version="1" comment="libreoffice-l10n-ko is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103618" version="1" comment="libreoffice-l10n-nb is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103619" version="1" comment="libreoffice-l10n-nl is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103620" version="1" comment="libreoffice-l10n-nn is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103625" version="1" comment="libreoffice-l10n-pl is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103626" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103627" version="1" comment="libreoffice-l10n-pt-PT is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103629" version="1" comment="libreoffice-l10n-ru is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103631" version="1" comment="libreoffice-l10n-sk is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103636" version="1" comment="libreoffice-l10n-sv is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103645" version="1" comment="libreoffice-l10n-xh is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103646" version="1" comment="libreoffice-l10n-zh-Hans is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103647" version="1" comment="libreoffice-l10n-zh-Hant is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103648" version="1" comment="libreoffice-l10n-zu is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103649" version="1" comment="libreoffice-mailmerge is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103650" version="1" comment="libreoffice-math is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103651" version="1" comment="libreoffice-officebean is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103652" version="1" comment="libreoffice-pyuno is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103655" version="1" comment="libreoffice-writer is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103656" version="1" comment="libreoffice-writer-extensions is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101424" version="1" comment="flash-player is &lt;11.2.202.411-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101425" version="1" comment="flash-player-gnome is &lt;11.2.202.411-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101430" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.71-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101434" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.71-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101705" version="1" comment="rsyslog is &lt;8.4.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102009" version="1" comment="flash-player is &lt;11.2.202.418-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102010" version="1" comment="flash-player-gnome is &lt;11.2.202.418-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102213" version="1" comment="libreoffice-base is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102214" version="1" comment="libreoffice-base-drivers-mysql is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102215" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102217" version="1" comment="libreoffice-calc is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102218" version="1" comment="libreoffice-calc-extensions is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102219" version="1" comment="libreoffice-draw is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102220" version="1" comment="libreoffice-filters-optional is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102221" version="1" comment="libreoffice-gnome is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102227" version="1" comment="libreoffice-icon-theme-tango is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102228" version="1" comment="libreoffice-impress is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102230" version="1" comment="libreoffice-l10n-af is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102231" version="1" comment="libreoffice-l10n-ar is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102236" version="1" comment="libreoffice-l10n-ca is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102237" version="1" comment="libreoffice-l10n-cs is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102239" version="1" comment="libreoffice-l10n-da is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102240" version="1" comment="libreoffice-l10n-de is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102243" version="1" comment="libreoffice-l10n-en is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102244" version="1" comment="libreoffice-l10n-es is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102248" version="1" comment="libreoffice-l10n-fi is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102249" version="1" comment="libreoffice-l10n-fr is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102252" version="1" comment="libreoffice-l10n-gu is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102254" version="1" comment="libreoffice-l10n-hi is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102256" version="1" comment="libreoffice-l10n-hu is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102257" version="1" comment="libreoffice-l10n-it is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102258" version="1" comment="libreoffice-l10n-ja is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102261" version="1" comment="libreoffice-l10n-ko is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102267" version="1" comment="libreoffice-l10n-nb is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102268" version="1" comment="libreoffice-l10n-nl is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102269" version="1" comment="libreoffice-l10n-nn is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102274" version="1" comment="libreoffice-l10n-pl is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102275" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102276" version="1" comment="libreoffice-l10n-pt-PT is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102278" version="1" comment="libreoffice-l10n-ru is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102280" version="1" comment="libreoffice-l10n-sk is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102285" version="1" comment="libreoffice-l10n-sv is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102294" version="1" comment="libreoffice-l10n-xh is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102295" version="1" comment="libreoffice-l10n-zh-Hans is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102296" version="1" comment="libreoffice-l10n-zh-Hant is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102297" version="1" comment="libreoffice-l10n-zu is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102298" version="1" comment="libreoffice-mailmerge is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102299" version="1" comment="libreoffice-math is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102300" version="1" comment="libreoffice-officebean is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102301" version="1" comment="libreoffice-pyuno is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102304" version="1" comment="libreoffice-writer is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102305" version="1" comment="libreoffice-writer-extensions is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102643" version="1" comment="MozillaFirefox is &lt;31.3.0esr-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102642" version="1" comment="MozillaFirefox-branding-SLE is &lt;31.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102646" version="1" comment="MozillaFirefox-translations is &lt;31.3.0esr-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102647" version="1" comment="libfreebl3 is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102648" version="1" comment="libfreebl3-32bit is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102651" version="1" comment="libsoftokn3 is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102652" version="1" comment="libsoftokn3-32bit is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102655" version="1" comment="mozilla-nss is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102656" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102657" version="1" comment="mozilla-nss-certs is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102658" version="1" comment="mozilla-nss-certs-32bit is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102662" version="1" comment="mozilla-nss-tools is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102867" version="1" comment="libpython2_7-1_0 is &lt;2.7.7-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102868" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.7-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102875" version="1" comment="python is &lt;2.7.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102869" version="1" comment="python-base is &lt;2.7.7-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102877" version="1" comment="python-curses is &lt;2.7.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102871" version="1" comment="python-devel is &lt;2.7.7-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102881" version="1" comment="python-tk is &lt;2.7.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102872" version="1" comment="python-xml is &lt;2.7.7-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102625" version="1" comment="compat-openssl098 is &lt;0.9.8j-66.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102626" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-66.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102627" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-66.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102665" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102666" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102669" version="1" comment="openssl is &lt;1.0.1i-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102488" version="1" comment="flash-player is &lt;11.2.202.424-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102489" version="1" comment="flash-player-gnome is &lt;11.2.202.424-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102467" version="1" comment="file is &lt;5.19-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102469" version="1" comment="file-magic is &lt;5.19-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102471" version="1" comment="libmagic1 is &lt;5.19-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102470" version="1" comment="libmagic1-32bit is &lt;5.19-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103733" version="1" comment="libxml2 is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118566" version="1" comment="xen is &lt;4.4.3_06-22.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118567" version="1" comment="xen-kmp-default is &lt;4.4.3_06_k3.12.48_52.27-22.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118568" version="1" comment="xen-libs is &lt;4.4.3_06-22.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118569" version="1" comment="xen-libs-32bit is &lt;4.4.3_06-22.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119510" version="1" comment="MozillaFirefox is &lt;38.5.0esr-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119511" version="1" comment="MozillaFirefox-translations is &lt;38.5.0esr-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119311" version="1" comment="bind is &lt;9.9.6P1-28.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119312" version="1" comment="bind-libs is &lt;9.9.6P1-28.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119313" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-28.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119314" version="1" comment="bind-utils is &lt;9.9.6P1-28.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118719" version="1" comment="compat-openssl098 is &lt;0.9.8j-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118720" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118721" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106878" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106879" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116182" version="1" comment="xfsprogs is &lt;3.2.1-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119797" version="1" comment="grub2 is &lt;2.02~beta2-56.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119798" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-56.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119799" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-56.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119800" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-56.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119801" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-56.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120801" version="1" comment="flash-player is &lt;11.2.202.559-117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120802" version="1" comment="flash-player-gnome is &lt;11.2.202.559-117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106933" version="1" comment="MozillaFirefox is &lt;31.5.0esr-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106936" version="1" comment="MozillaFirefox-translations is &lt;31.5.0esr-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107574" version="1" comment="freetype2 is &lt;2.5.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107579" version="1" comment="ft2demos is &lt;2.5.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107577" version="1" comment="libfreetype6 is &lt;2.5.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107578" version="1" comment="libfreetype6-32bit is &lt;2.5.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107604" version="1" comment="cups-client is &lt;1.7.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107607" version="1" comment="cups-libs is &lt;1.7.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107608" version="1" comment="cups-libs-32bit is &lt;1.7.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107616" version="1" comment="libecpg6 is &lt;9.3.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107618" version="1" comment="libpq5 is &lt;9.3.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107617" version="1" comment="libpq5-32bit is &lt;9.3.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107621" version="1" comment="postgresql93 is &lt;9.3.6-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107620" version="1" comment="postgresql93-libs is &lt;9.3.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105078" version="1" comment="unzip is &lt;6.00-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107710" version="1" comment="flash-player is &lt;11.2.202.451-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107711" version="1" comment="flash-player-gnome is &lt;11.2.202.451-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107690" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.75-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107694" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.75-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107707" version="1" comment="libmspack is &lt;0.4-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107808" version="1" comment="glibc is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107819" version="1" comment="glibc-32bit is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107809" version="1" comment="glibc-devel is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107820" version="1" comment="glibc-devel-32bit is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107813" version="1" comment="glibc-i18ndata is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107815" version="1" comment="glibc-locale is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107822" version="1" comment="glibc-locale-32bit is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107818" version="1" comment="nscd is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107833" version="1" comment="kernel-default is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107835" version="1" comment="kernel-default-devel is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107836" version="1" comment="kernel-default-extra is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107825" version="1" comment="kernel-devel is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107826" version="1" comment="kernel-macros is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107827" version="1" comment="kernel-source is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107843" version="1" comment="kernel-syms is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107846" version="1" comment="kernel-xen is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107848" version="1" comment="kernel-xen-devel is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107890" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107891" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107894" version="1" comment="openssl is &lt;1.0.1i-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107968" version="1" comment="compat-openssl098 is &lt;0.9.8j-73.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107969" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-73.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107970" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-73.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108095" version="1" comment="xerces-c is &lt;3.1.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108131" version="1" comment="xen is &lt;4.4.1_10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108137" version="1" comment="xen-kmp-default is &lt;4.4.1_10_k3.12.36_38-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108134" version="1" comment="xen-libs is &lt;4.4.1_10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108133" version="1" comment="xen-libs-32bit is &lt;4.4.1_10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108202" version="1" comment="MozillaFirefox is &lt;31.5.3esr-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108205" version="1" comment="MozillaFirefox-translations is &lt;31.5.3esr-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108358" version="1" comment="wireshark is &lt;1.10.13-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108369" version="1" comment="kernel-default is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108371" version="1" comment="kernel-default-devel is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108372" version="1" comment="kernel-default-extra is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108361" version="1" comment="kernel-devel is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108362" version="1" comment="kernel-macros is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108363" version="1" comment="kernel-source is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108379" version="1" comment="kernel-syms is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108382" version="1" comment="kernel-xen is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108384" version="1" comment="kernel-xen-devel is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108429" version="1" comment="libzip is &lt;0.11.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108431" version="1" comment="libzip2 is &lt;0.11.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108421" version="1" comment="libarchive is &lt;3.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108428" version="1" comment="libssh2_org is &lt;1.4.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105092" version="1" comment="libksba is &lt;1.3.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108627" version="1" comment="webkitgtk is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108641" version="1" comment="webkitgtk3 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108651" version="1" comment="libXfont is &lt;1.4.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108656" version="1" comment="xen is &lt;4.4.2_02-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108662" version="1" comment="xen-kmp-default is &lt;4.4.2_02_k3.12.38_44-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108659" version="1" comment="xen-libs is &lt;4.4.2_02-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108658" version="1" comment="xen-libs-32bit is &lt;4.4.2_02-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108664" version="1" comment="MozillaFirefox is &lt;31.6.0esr-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108667" version="1" comment="MozillaFirefox-translations is &lt;31.6.0esr-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108877" version="1" comment="flash-player is &lt;11.2.202.457-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108878" version="1" comment="flash-player-gnome is &lt;11.2.202.457-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108906" version="1" comment="gnutls is &lt;3.2.15-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108911" version="1" comment="libgnutls28 is &lt;3.2.15-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108912" version="1" comment="libgnutls28-32bit is &lt;3.2.15-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108923" version="1" comment="libmysqlclient18 is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108924" version="1" comment="libmysqlclient18-32bit is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108925" version="1" comment="libmysqlclient_r18 is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108926" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108929" version="1" comment="mariadb is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108931" version="1" comment="mariadb-client is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108933" version="1" comment="mariadb-errormessages is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109136" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.79-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109140" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.79-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109167" version="1" comment="cups-filters is &lt;1.0.58-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109168" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109170" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109171" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109160" version="1" comment="gdm is &lt;3.10.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109161" version="1" comment="gdm-branding-upstream is &lt;3.10.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109163" version="1" comment="gdm-lang is &lt;3.10.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109164" version="1" comment="gdmflexiserver is &lt;3.10.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109165" version="1" comment="libgdm1 is &lt;3.10.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109166" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105374" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105375" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105445" version="1" comment="flash-player is &lt;11.2.202.429-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105446" version="1" comment="flash-player-gnome is &lt;11.2.202.429-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109543" version="1" comment="ntp is &lt;4.2.6p5-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109544" version="1" comment="ntp-doc is &lt;4.2.6p5-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109608" version="1" comment="flash-player is &lt;11.2.202.460-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109609" version="1" comment="flash-player-gnome is &lt;11.2.202.460-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109615" version="1" comment="libspice-server1 is &lt;0.12.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109616" version="1" comment="spice is &lt;0.12.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109666" version="1" comment="qemu is &lt;2.0.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109668" version="1" comment="qemu-block-curl is &lt;2.0.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109671" version="1" comment="qemu-ipxe is &lt;1.0.0-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109672" version="1" comment="qemu-kvm is &lt;2.0.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109676" version="1" comment="qemu-seabios is &lt;1.7.4-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109677" version="1" comment="qemu-sgabios is &lt;8-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109678" version="1" comment="qemu-tools is &lt;2.0.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109679" version="1" comment="qemu-vgabios is &lt;1.7.4-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109680" version="1" comment="qemu-x86 is &lt;2.0.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109715" version="1" comment="xen is &lt;4.4.2_04-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109721" version="1" comment="xen-kmp-default is &lt;4.4.2_04_k3.12.39_47-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109718" version="1" comment="xen-libs is &lt;4.4.2_04-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109717" version="1" comment="xen-libs-32bit is &lt;4.4.2_04-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105317" version="1" comment="kernel-default is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105319" version="1" comment="kernel-default-devel is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105320" version="1" comment="kernel-default-extra is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105309" version="1" comment="kernel-devel is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105310" version="1" comment="kernel-macros is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105311" version="1" comment="kernel-source is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105327" version="1" comment="kernel-syms is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105330" version="1" comment="kernel-xen is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105332" version="1" comment="kernel-xen-devel is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109833" version="1" comment="fltk is &lt;1.3.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109837" version="1" comment="libfltk1 is &lt;1.3.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109839" version="1" comment="tigervnc is &lt;1.4.1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109840" version="1" comment="xorg-x11-Xvnc is &lt;1.4.1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109960" version="1" comment="MozillaFirefox is &lt;31.7.0esr-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109963" version="1" comment="MozillaFirefox-translations is &lt;31.7.0esr-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109991" version="1" comment="dnsmasq is &lt;2.71-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110203" version="1" comment="vorbis-tools is &lt;1.4.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110204" version="1" comment="vorbis-tools-lang is &lt;1.4.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105448" version="1" comment="MozillaFirefox is &lt;31.4.0esr-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105451" version="1" comment="MozillaFirefox-translations is &lt;31.4.0esr-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105452" version="1" comment="libfreebl3 is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105453" version="1" comment="libfreebl3-32bit is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105456" version="1" comment="libsoftokn3 is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105457" version="1" comment="libsoftokn3-32bit is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105460" version="1" comment="mozilla-nss is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105461" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105462" version="1" comment="mozilla-nss-certs is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105463" version="1" comment="mozilla-nss-certs-32bit is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105467" version="1" comment="mozilla-nss-tools is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110329" version="1" comment="xen is &lt;4.4.2_06-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110335" version="1" comment="xen-kmp-default is &lt;4.4.2_06_k3.12.39_47-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110332" version="1" comment="xen-libs is &lt;4.4.2_06-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110331" version="1" comment="xen-libs-32bit is &lt;4.4.2_06-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110337" version="1" comment="flash-player is &lt;11.2.202.466-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110338" version="1" comment="flash-player-gnome is &lt;11.2.202.466-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110327" version="1" comment="wireshark is &lt;1.10.14-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110507" version="1" comment="kernel-default is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110509" version="1" comment="kernel-default-devel is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110510" version="1" comment="kernel-default-extra is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110499" version="1" comment="kernel-devel is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110500" version="1" comment="kernel-macros is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110501" version="1" comment="kernel-source is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110517" version="1" comment="kernel-syms is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110520" version="1" comment="kernel-xen is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110522" version="1" comment="kernel-xen-devel is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110560" version="1" comment="libldap-2_4-2 is &lt;2.4.39-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110561" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.39-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110562" version="1" comment="openldap2-client is &lt;2.4.39-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110629" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-28.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110630" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-28.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110661" version="1" comment="flash-player is &lt;11.2.202.468-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110662" version="1" comment="flash-player-gnome is &lt;11.2.202.468-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110698" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110699" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110702" version="1" comment="openssl is &lt;1.0.1i-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110759" version="1" comment="compat-openssl098 is &lt;0.9.8j-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110760" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110761" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105415" version="1" comment="curl is &lt;7.37.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105418" version="1" comment="libcurl4 is &lt;7.37.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105417" version="1" comment="libcurl4-32bit is &lt;7.37.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110847" version="1" comment="libgcrypt is &lt;1.6.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110851" version="1" comment="libgcrypt20 is &lt;1.6.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110852" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111024" version="1" comment="bind is &lt;9.9.6P1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111029" version="1" comment="bind-libs is &lt;9.9.6P1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111028" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111031" version="1" comment="bind-utils is &lt;9.9.6P1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111113" version="1" comment="flash-player is &lt;11.2.202.481-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111114" version="1" comment="flash-player-gnome is &lt;11.2.202.481-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111508" version="1" comment="flash-player is &lt;11.2.202.491-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111509" version="1" comment="flash-player-gnome is &lt;11.2.202.491-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111445" version="1" comment="libecpg6 is &lt;9.3.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111447" version="1" comment="libpq5 is &lt;9.3.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111446" version="1" comment="libpq5-32bit is &lt;9.3.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111450" version="1" comment="postgresql93 is &lt;9.3.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111449" version="1" comment="postgresql93-libs is &lt;9.3.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105437" version="1" comment="libpng16 is &lt;1.6.8-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111472" version="1" comment="MozillaFirefox is &lt;31.8.0esr-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111475" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111479" version="1" comment="libfreebl3 is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111480" version="1" comment="libfreebl3-32bit is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111483" version="1" comment="libsoftokn3 is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111484" version="1" comment="libsoftokn3-32bit is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111477" version="1" comment="mozilla-nspr is &lt;4.10.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111476" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111487" version="1" comment="mozilla-nss is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111488" version="1" comment="mozilla-nss-32bit is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111490" version="1" comment="mozilla-nss-certs is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111491" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111495" version="1" comment="mozilla-nss-tools is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111459" version="1" comment="libmysqlclient18 is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111460" version="1" comment="libmysqlclient18-32bit is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111461" version="1" comment="libmysqlclient_r18 is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111462" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111465" version="1" comment="mariadb is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111467" version="1" comment="mariadb-client is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111469" version="1" comment="mariadb-errormessages is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111500" version="1" comment="xen is &lt;4.4.2_08-22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111506" version="1" comment="xen-kmp-default is &lt;4.4.2_08_k3.12.43_52.6-22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111503" version="1" comment="xen-libs is &lt;4.4.2_08-22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111502" version="1" comment="xen-libs-32bit is &lt;4.4.2_08-22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111511" version="1" comment="bind is &lt;9.9.6P1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111516" version="1" comment="bind-libs is &lt;9.9.6P1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111515" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111518" version="1" comment="bind-utils is &lt;9.9.6P1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111526" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.85-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111530" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.85-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111572" version="1" comment="kernel-default is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111574" version="1" comment="kernel-default-devel is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111575" version="1" comment="kernel-default-extra is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111564" version="1" comment="kernel-devel is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111565" version="1" comment="kernel-macros is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111566" version="1" comment="kernel-source is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111582" version="1" comment="kernel-syms is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111585" version="1" comment="kernel-xen is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111587" version="1" comment="kernel-xen-devel is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105429" version="1" comment="bind is &lt;9.9.5P1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105434" version="1" comment="bind-libs is &lt;9.9.5P1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105433" version="1" comment="bind-libs-32bit is &lt;9.9.5P1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105436" version="1" comment="bind-utils is &lt;9.9.5P1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113266" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113267" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113274" version="1" comment="python is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113268" version="1" comment="python-base is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113276" version="1" comment="python-curses is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113270" version="1" comment="python-devel is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113280" version="1" comment="python-tk is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113271" version="1" comment="python-xml is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113425" version="1" comment="libqt4-sql-plugins is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105336" version="1" comment="evolution-data-server is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105339" version="1" comment="evolution-data-server-lang is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105340" version="1" comment="libcamel-1_2-45 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105341" version="1" comment="libcamel-1_2-45-32bit is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105342" version="1" comment="libebackend-1_2-7 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105343" version="1" comment="libebackend-1_2-7-32bit is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105344" version="1" comment="libebook-1_2-14 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105345" version="1" comment="libebook-1_2-14-32bit is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105346" version="1" comment="libebook-contacts-1_2-0 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105347" version="1" comment="libebook-contacts-1_2-0-32bit is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105348" version="1" comment="libecal-1_2-16 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105349" version="1" comment="libecal-1_2-16-32bit is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105350" version="1" comment="libedata-book-1_2-20 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105351" version="1" comment="libedata-book-1_2-20-32bit is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105352" version="1" comment="libedata-cal-1_2-23 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105353" version="1" comment="libedata-cal-1_2-23-32bit is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105354" version="1" comment="libedataserver-1_2-18 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105355" version="1" comment="libedataserver-1_2-18-32bit is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113504" version="1" comment="flash-player is &lt;11.2.202.508-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113505" version="1" comment="flash-player-gnome is &lt;11.2.202.508-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113520" version="1" comment="MozillaFirefox is &lt;31.8.0esr-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113523" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113777" version="1" comment="xen is &lt;4.4.2_10-22.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113783" version="1" comment="xen-kmp-default is &lt;4.4.2_10_k3.12.44_52.10-22.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113780" version="1" comment="xen-libs is &lt;4.4.2_10-22.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113779" version="1" comment="xen-libs-32bit is &lt;4.4.2_10-22.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113667" version="1" comment="libQt5Core5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113672" version="1" comment="libQt5DBus5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113677" version="1" comment="libQt5Gui5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113720" version="1" comment="libQt5Widgets5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113725" version="1" comment="libqt5-qtbase is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105070" version="1" comment="libyaml is &lt;0.1.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105069" version="1" comment="libyaml-0-2 is &lt;0.1.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105403" version="1" comment="rpm-python is &lt;4.11.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113856" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113857" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113860" version="1" comment="openssl is &lt;1.0.1i-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105468" version="1" comment="flash-player is &lt;11.2.202.438-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105469" version="1" comment="flash-player-gnome is &lt;11.2.202.438-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105471" version="1" comment="flash-player is &lt;11.2.202.440-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105472" version="1" comment="flash-player-gnome is &lt;11.2.202.440-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105377" version="1" comment="binutils is &lt;2.24-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105598" version="1" comment="libsndfile is &lt;1.0.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114063" version="1" comment="MozillaFirefox is &lt;38.2.1esr-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114062" version="1" comment="MozillaFirefox-branding-SLE is &lt;31.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114066" version="1" comment="MozillaFirefox-translations is &lt;38.2.1esr-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114067" version="1" comment="libfreebl3 is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114068" version="1" comment="libfreebl3-32bit is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114071" version="1" comment="libsoftokn3 is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114072" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114075" version="1" comment="mozilla-nss is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114076" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114078" version="1" comment="mozilla-nss-certs is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114079" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114083" version="1" comment="mozilla-nss-tools is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114049" version="1" comment="bind is &lt;9.9.6P1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114054" version="1" comment="bind-libs is &lt;9.9.6P1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114053" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114056" version="1" comment="bind-utils is &lt;9.9.6P1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105748" version="1" comment="kernel-default is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105750" version="1" comment="kernel-default-devel is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105751" version="1" comment="kernel-default-extra is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105740" version="1" comment="kernel-devel is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105741" version="1" comment="kernel-macros is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105742" version="1" comment="kernel-source is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105758" version="1" comment="kernel-syms is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105761" version="1" comment="kernel-xen is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105763" version="1" comment="kernel-xen-devel is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105738" version="1" comment="clamav is &lt;0.98.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114237" version="1" comment="zeromq is &lt;4.0.4-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105072" version="1" comment="jasper is &lt;1.900.1-166.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105074" version="1" comment="libjasper1 is &lt;1.900.1-166.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105075" version="1" comment="libjasper1-32bit is &lt;1.900.1-166.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114239" version="1" comment="libgcrypt is &lt;1.6.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114263" version="1" comment="qemu is &lt;2.0.2-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114265" version="1" comment="qemu-block-curl is &lt;2.0.2-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114268" version="1" comment="qemu-ipxe is &lt;1.0.0-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114269" version="1" comment="qemu-kvm is &lt;2.0.2-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114273" version="1" comment="qemu-seabios is &lt;1.7.4-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114274" version="1" comment="qemu-sgabios is &lt;8-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114275" version="1" comment="qemu-tools is &lt;2.0.2-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114276" version="1" comment="qemu-vgabios is &lt;1.7.4-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114277" version="1" comment="qemu-x86 is &lt;2.0.2-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105785" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105786" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105789" version="1" comment="openssl is &lt;1.0.1i-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114321" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105816" version="1" comment="mpfr is &lt;3.1.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114336" version="1" comment="libsnmp30 is &lt;5.7.2.1-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114335" version="1" comment="libsnmp30-32bit is &lt;5.7.2.1-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114337" version="1" comment="net-snmp is &lt;5.7.2.1-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114341" version="1" comment="perl-SNMP is &lt;5.7.2.1-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114342" version="1" comment="snmp-mibs is &lt;5.7.2.1-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105980" version="1" comment="flash-player is &lt;11.2.202.442-67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105981" version="1" comment="flash-player-gnome is &lt;11.2.202.442-67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114454" version="1" comment="flash-player is &lt;11.2.202.521-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114455" version="1" comment="flash-player-gnome is &lt;11.2.202.521-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114432" version="1" comment="kernel-default is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114434" version="1" comment="kernel-default-devel is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114435" version="1" comment="kernel-default-extra is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114424" version="1" comment="kernel-devel is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114425" version="1" comment="kernel-macros is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114426" version="1" comment="kernel-source is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114442" version="1" comment="kernel-syms is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114445" version="1" comment="kernel-xen is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114447" version="1" comment="kernel-xen-devel is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105957" version="1" comment="libvirt is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105958" version="1" comment="libvirt-client is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105959" version="1" comment="libvirt-client-32bit is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105960" version="1" comment="libvirt-daemon is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105961" version="1" comment="libvirt-daemon-config-network is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105962" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105963" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105978" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105964" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105965" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105966" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105967" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105968" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105969" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105970" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105971" version="1" comment="libvirt-daemon-lxc is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105972" version="1" comment="libvirt-daemon-qemu is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105979" version="1" comment="libvirt-daemon-xen is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105975" version="1" comment="libvirt-doc is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114770" version="1" comment="MozillaFirefox is &lt;38.3.0esr-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114773" version="1" comment="MozillaFirefox-translations is &lt;38.3.0esr-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114775" version="1" comment="mozilla-nspr is &lt;4.10.9-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114774" version="1" comment="mozilla-nspr-32bit is &lt;4.10.9-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114953" version="1" comment="rpcbind is &lt;0.2.1_rc4-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114954" version="1" comment="libssh is &lt;0.6.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114985" version="1" comment="kernel-default is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114987" version="1" comment="kernel-default-devel is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114988" version="1" comment="kernel-default-extra is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114977" version="1" comment="kernel-devel is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114978" version="1" comment="kernel-macros is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114979" version="1" comment="kernel-source is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114995" version="1" comment="kernel-syms is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114998" version="1" comment="kernel-xen is &lt;3.12.48-52.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115000" version="1" comment="kernel-xen-devel is &lt;3.12.48-52.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106050" version="1" comment="libblkid1 is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106051" version="1" comment="libblkid1-32bit is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106054" version="1" comment="libmount1 is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106055" version="1" comment="libmount1-32bit is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106057" version="1" comment="libsmartcols1 is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106058" version="1" comment="libuuid-devel is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106060" version="1" comment="libuuid1 is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106061" version="1" comment="libuuid1-32bit is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106045" version="1" comment="python-libmount is &lt;2.25-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106062" version="1" comment="util-linux is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106063" version="1" comment="util-linux-lang is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106046" version="1" comment="util-linux-systemd is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106047" version="1" comment="uuidd is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115020" version="1" comment="libspice-server1 is &lt;0.12.4-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115021" version="1" comment="spice is &lt;0.12.4-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115023" version="1" comment="flash-player is &lt;11.2.202.535-105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115024" version="1" comment="flash-player-gnome is &lt;11.2.202.535-105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106066" version="1" comment="ntp is &lt;4.2.6p5-37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106067" version="1" comment="ntp-doc is &lt;4.2.6p5-37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115053" version="1" comment="flash-player is &lt;11.2.202.540-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115054" version="1" comment="flash-player-gnome is &lt;11.2.202.540-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116187" version="1" comment="strongswan is &lt;5.1.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116188" version="1" comment="strongswan-doc is &lt;5.1.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116189" version="1" comment="strongswan-ipsec is &lt;5.1.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116190" version="1" comment="strongswan-libs0 is &lt;5.1.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115065" version="1" comment="qemu is &lt;2.0.2-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115067" version="1" comment="qemu-block-curl is &lt;2.0.2-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115070" version="1" comment="qemu-ipxe is &lt;1.0.0-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115071" version="1" comment="qemu-kvm is &lt;2.0.2-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115075" version="1" comment="qemu-seabios is &lt;1.7.4-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115076" version="1" comment="qemu-sgabios is &lt;8-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115077" version="1" comment="qemu-tools is &lt;2.0.2-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115078" version="1" comment="qemu-vgabios is &lt;1.7.4-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115079" version="1" comment="qemu-x86 is &lt;2.0.2-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106108" version="1" comment="jasper is &lt;1.900.1-170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106084" version="1" comment="krb5 is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106085" version="1" comment="krb5-32bit is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106086" version="1" comment="krb5-client is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115143" version="1" comment="postgresql93 is &lt;9.3.10-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115142" version="1" comment="postgresql93-libs is &lt;9.3.10-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106112" version="1" comment="clamav is &lt;0.98.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115384" version="1" comment="glibc is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115395" version="1" comment="glibc-32bit is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115385" version="1" comment="glibc-devel is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115396" version="1" comment="glibc-devel-32bit is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115389" version="1" comment="glibc-i18ndata is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115391" version="1" comment="glibc-locale is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115398" version="1" comment="glibc-locale-32bit is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115394" version="1" comment="nscd is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106135" version="1" comment="compat-openssl098 is &lt;0.9.8j-70.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106136" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-70.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106137" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-70.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115562" version="1" comment="libvdpau is &lt;0.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115931" version="1" comment="xen is &lt;4.4.3_02-22.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115937" version="1" comment="xen-kmp-default is &lt;4.4.3_02_k3.12.48_52.27-22.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115934" version="1" comment="xen-libs is &lt;4.4.3_02-22.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115933" version="1" comment="xen-libs-32bit is &lt;4.4.3_02-22.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115569" version="1" comment="apache-commons-logging is &lt;1.1.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115570" version="1" comment="cmis-client is &lt;0.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115578" version="1" comment="graphite2 is &lt;1.3.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115582" version="1" comment="hyphen is &lt;2.8.8-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115585" version="1" comment="libabw is &lt;0.1.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115586" version="1" comment="libabw-0_1-1 is &lt;0.1.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115592" version="1" comment="libcdr is &lt;0.1.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115593" version="1" comment="libcdr-0_1-1 is &lt;0.1.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115571" version="1" comment="libcmis-0_5-5 is &lt;0.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115597" version="1" comment="libe-book is &lt;0.1.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115598" version="1" comment="libe-book-0_1-1 is &lt;0.1.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115606" version="1" comment="libetonyek is &lt;0.1.3-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115607" version="1" comment="libetonyek-0_1-1 is &lt;0.1.3-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115615" version="1" comment="libfreehand is &lt;0.1.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115616" version="1" comment="libfreehand-0_1-1 is &lt;0.1.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115620" version="1" comment="libgltf is &lt;0.0.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115621" version="1" comment="libgltf-0_0-0 is &lt;0.0.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115580" version="1" comment="libgraphite2-3 is &lt;1.3.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115581" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115584" version="1" comment="libhyphen0 is &lt;2.8.8-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115623" version="1" comment="libixion is &lt;0.9.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115624" version="1" comment="libixion-0_10-0 is &lt;0.9.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115628" version="1" comment="liblangtag is &lt;0.5.7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115631" version="1" comment="liblangtag1 is &lt;0.5.7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115636" version="1" comment="libmspub is &lt;0.1.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115637" version="1" comment="libmspub-0_1-1 is &lt;0.1.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115641" version="1" comment="libmwaw is &lt;0.3.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115642" version="1" comment="libmwaw-0_3-3 is &lt;0.3.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115646" version="1" comment="libodfgen is &lt;0.1.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115647" version="1" comment="libodfgen-0_1-1 is &lt;0.1.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115650" version="1" comment="liborcus is &lt;0.7.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115651" version="1" comment="liborcus-0_8-0 is &lt;0.7.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115654" version="1" comment="libpagemaker is &lt;0.0.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115655" version="1" comment="libpagemaker-0_0-0 is &lt;0.0.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115659" version="1" comment="libreoffice-share-linker is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115660" version="1" comment="libreoffice-voikko is &lt;4.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115759" version="1" comment="librevenge-0_0-0 is &lt;0.0.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115763" version="1" comment="librevenge-stream-0_0-0 is &lt;0.0.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115766" version="1" comment="libvisio is &lt;0.1.3-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115767" version="1" comment="libvisio-0_1-1 is &lt;0.1.3-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115771" version="1" comment="libvoikko is &lt;3.7.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115773" version="1" comment="libvoikko1 is &lt;3.7.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115776" version="1" comment="libwps is &lt;0.4.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115777" version="1" comment="libwps-0_4-4 is &lt;0.4.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115780" version="1" comment="malaga-suomi is &lt;1.18-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115784" version="1" comment="myspell-af_ZA is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115787" version="1" comment="myspell-ar is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115805" version="1" comment="myspell-be_BY is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115806" version="1" comment="myspell-bg_BG is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115807" version="1" comment="myspell-bn_BD is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115811" version="1" comment="myspell-bs_BA is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115812" version="1" comment="myspell-ca is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115818" version="1" comment="myspell-cs_CZ is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115819" version="1" comment="myspell-da_DK is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115820" version="1" comment="myspell-de is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115824" version="1" comment="myspell-dictionaries is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115825" version="1" comment="myspell-el_GR is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115826" version="1" comment="myspell-en is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115844" version="1" comment="myspell-es is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115865" version="1" comment="myspell-et_EE is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115869" version="1" comment="myspell-fr_FR is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115875" version="1" comment="myspell-gu_IN is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115876" version="1" comment="myspell-he_IL is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115877" version="1" comment="myspell-hi_IN is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115878" version="1" comment="myspell-hr_HR is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115879" version="1" comment="myspell-hu_HU is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115882" version="1" comment="myspell-it_IT is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115890" version="1" comment="myspell-lo_LA is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115891" version="1" comment="myspell-lt_LT is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115892" version="1" comment="myspell-lv_LV is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115896" version="1" comment="myspell-nl_NL is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115898" version="1" comment="myspell-no is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115900" version="1" comment="myspell-pl_PL is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115902" version="1" comment="myspell-pt_BR is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115903" version="1" comment="myspell-pt_PT is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115904" version="1" comment="myspell-ro is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115906" version="1" comment="myspell-ru_RU is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115908" version="1" comment="myspell-sk_SK is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115909" version="1" comment="myspell-sl_SI is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115910" version="1" comment="myspell-sr is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115916" version="1" comment="myspell-sv_SE is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115919" version="1" comment="myspell-te_IN is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115920" version="1" comment="myspell-th_TH is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115922" version="1" comment="myspell-vi is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115924" version="1" comment="myspell-zu_ZA is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105060" version="1" comment="xen is &lt;4.4.1_08-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105066" version="1" comment="xen-kmp-default is &lt;4.4.1_08_k3.12.28_4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105063" version="1" comment="xen-libs is &lt;4.4.1_08-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105062" version="1" comment="xen-libs-32bit is &lt;4.4.1_08-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116010" version="1" comment="MozillaFirefox-branding-SLE is &lt;31.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106166" version="1" comment="wireshark is &lt;1.10.12-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119270" version="1" comment="libsndfile is &lt;1.0.25-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117928" version="1" comment="libpng12 is &lt;1.2.50-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117929" version="1" comment="libpng12-0 is &lt;1.2.50-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117930" version="1" comment="libpng12-0-32bit is &lt;1.2.50-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117931" version="1" comment="libpng16 is &lt;1.6.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117932" version="1" comment="libpng16-16 is &lt;1.6.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117933" version="1" comment="libpng16-16-32bit is &lt;1.6.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119619" version="1" comment="libksba is &lt;1.3.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119620" version="1" comment="libksba8 is &lt;1.3.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116168" version="1" comment="dracut is &lt;037-51.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106365" version="1" comment="qemu is &lt;2.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106367" version="1" comment="qemu-block-curl is &lt;2.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106370" version="1" comment="qemu-ipxe is &lt;1.0.0-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106371" version="1" comment="qemu-kvm is &lt;2.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106375" version="1" comment="qemu-seabios is &lt;1.7.4-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106376" version="1" comment="qemu-sgabios is &lt;8-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106377" version="1" comment="qemu-tools is &lt;2.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106378" version="1" comment="qemu-vgabios is &lt;1.7.4-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106379" version="1" comment="qemu-x86 is &lt;2.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119308" version="1" comment="LibVNCServer is &lt;0.9.9-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116129" version="1" comment="sblim-sfcb is &lt;1.4.8-5.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106387" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106386" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106393" version="1" comment="libdcerpc0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106392" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106396" version="1" comment="libgensec0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106395" version="1" comment="libgensec0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106400" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106399" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106403" version="1" comment="libndr-nbt0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106402" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106406" version="1" comment="libndr-standard0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106405" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106408" version="1" comment="libndr0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106407" version="1" comment="libndr0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106411" version="1" comment="libnetapi0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106410" version="1" comment="libnetapi0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106414" version="1" comment="libpdb0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106413" version="1" comment="libpdb0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106417" version="1" comment="libregistry0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106420" version="1" comment="libsamba-credentials0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106419" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106423" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106422" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106429" version="1" comment="libsamba-util0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106428" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106432" version="1" comment="libsamdb0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106431" version="1" comment="libsamdb0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106436" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106435" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106438" version="1" comment="libsmbclient0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106437" version="1" comment="libsmbclient0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106441" version="1" comment="libsmbconf0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106440" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106444" version="1" comment="libsmbldap0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106443" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106449" version="1" comment="libtevent-util0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106448" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106452" version="1" comment="libwbclient0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106451" version="1" comment="libwbclient0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106454" version="1" comment="samba is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106453" version="1" comment="samba-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106456" version="1" comment="samba-client is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106455" version="1" comment="samba-client-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106458" version="1" comment="samba-doc is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106460" version="1" comment="samba-libs is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106459" version="1" comment="samba-libs-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106466" version="1" comment="samba-winbind is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106465" version="1" comment="samba-winbind-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118162" version="1" comment="kernel-default is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118163" version="1" comment="kernel-default-devel is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118164" version="1" comment="kernel-default-extra is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118165" version="1" comment="kernel-devel is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118166" version="1" comment="kernel-macros is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118167" version="1" comment="kernel-source is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118168" version="1" comment="kernel-syms is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118169" version="1" comment="kernel-xen is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118170" version="1" comment="kernel-xen-devel is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119604" version="1" comment="gdk-pixbuf is &lt;2.30.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119605" version="1" comment="gdk-pixbuf-lang is &lt;2.30.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119606" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.30.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119607" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.30.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119608" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.30.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119609" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.30.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119610" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.30.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106469" version="1" comment="libmspack is &lt;0.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106471" version="1" comment="libmspack0 is &lt;0.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118716" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118717" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118718" version="1" comment="openssl is &lt;1.0.1i-27.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118875" version="1" comment="flash-player is &lt;11.2.202.554-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118876" version="1" comment="flash-player-gnome is &lt;11.2.202.554-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106467" version="1" comment="vorbis-tools is &lt;1.4.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106468" version="1" comment="vorbis-tools-lang is &lt;1.4.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118563" version="1" comment="krb5 is &lt;1.12.1-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118564" version="1" comment="krb5-32bit is &lt;1.12.1-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118565" version="1" comment="krb5-client is &lt;1.12.1-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119014" version="1" comment="ldb is &lt;1.1.24-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119015" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119016" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119017" version="1" comment="libdcerpc0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119018" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119019" version="1" comment="libgensec0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119020" version="1" comment="libgensec0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119021" version="1" comment="libldb1 is &lt;1.1.24-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119022" version="1" comment="libldb1-32bit is &lt;1.1.24-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119023" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119024" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119025" version="1" comment="libndr-nbt0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119026" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119027" version="1" comment="libndr-standard0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119028" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119029" version="1" comment="libndr0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119030" version="1" comment="libndr0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119031" version="1" comment="libnetapi0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119032" version="1" comment="libnetapi0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119033" version="1" comment="libpdb0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119034" version="1" comment="libpdb0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119035" version="1" comment="libregistry0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119036" version="1" comment="libsamba-credentials0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119037" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119038" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119039" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119040" version="1" comment="libsamba-util0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119041" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119042" version="1" comment="libsamdb0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119043" version="1" comment="libsamdb0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119044" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119045" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119046" version="1" comment="libsmbclient0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119047" version="1" comment="libsmbclient0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119048" version="1" comment="libsmbconf0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119049" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119050" version="1" comment="libsmbldap0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119051" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119052" version="1" comment="libtalloc2 is &lt;2.1.5-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119053" version="1" comment="libtalloc2-32bit is &lt;2.1.5-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119054" version="1" comment="libtdb1 is &lt;1.3.8-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119055" version="1" comment="libtdb1-32bit is &lt;1.3.8-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119056" version="1" comment="libtevent-util0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119057" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119058" version="1" comment="libtevent0 is &lt;0.9.26-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119059" version="1" comment="libtevent0-32bit is &lt;0.9.26-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119060" version="1" comment="libwbclient0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119061" version="1" comment="libwbclient0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119062" version="1" comment="pytalloc is &lt;2.1.5-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119063" version="1" comment="pytalloc-32bit is &lt;2.1.5-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119064" version="1" comment="samba is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119065" version="1" comment="samba-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119066" version="1" comment="samba-client is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119067" version="1" comment="samba-client-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119068" version="1" comment="samba-doc is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119069" version="1" comment="samba-libs is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119070" version="1" comment="samba-libs-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119071" version="1" comment="samba-winbind is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119072" version="1" comment="samba-winbind-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119073" version="1" comment="talloc is &lt;2.1.5-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129268" version="1" comment="kernel-default is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129269" version="1" comment="kernel-default-devel is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129270" version="1" comment="kernel-default-extra is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129271" version="1" comment="kernel-devel is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129272" version="1" comment="kernel-macros is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129273" version="1" comment="kernel-source is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129274" version="1" comment="kernel-syms is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129275" version="1" comment="kernel-xen is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129276" version="1" comment="kernel-xen-devel is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129277" version="1" comment="dhcp is &lt;4.2.6-14.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129278" version="1" comment="dhcp-client is &lt;4.2.6-14.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129279" version="1" comment="MozillaFirefox is &lt;45.2.0esr-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129280" version="1" comment="MozillaFirefox-branding-SLE is &lt;45.0-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129281" version="1" comment="MozillaFirefox-translations is &lt;45.2.0esr-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129385" version="1" comment="kernel-default is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129386" version="1" comment="kernel-default-devel is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129387" version="1" comment="kernel-default-extra is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129388" version="1" comment="kernel-devel is &lt;3.12.60-52.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129389" version="1" comment="kernel-macros is &lt;3.12.60-52.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129390" version="1" comment="kernel-source is &lt;3.12.60-52.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129391" version="1" comment="kernel-syms is &lt;3.12.60-52.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129392" version="1" comment="kernel-xen is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129393" version="1" comment="kernel-xen-devel is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129394" version="1" comment="glibc is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129395" version="1" comment="glibc-32bit is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129396" version="1" comment="glibc-devel is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129397" version="1" comment="glibc-devel-32bit is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129398" version="1" comment="glibc-i18ndata is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129399" version="1" comment="glibc-locale is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129400" version="1" comment="glibc-locale-32bit is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129401" version="1" comment="nscd is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129448" version="1" comment="boost is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129449" version="1" comment="boost-license1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129450" version="1" comment="cmis-client is &lt;0.5.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129451" version="1" comment="hunspell is &lt;1.3.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129452" version="1" comment="hunspell-32bit is &lt;1.3.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129453" version="1" comment="hunspell-tools is &lt;1.3.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129454" version="1" comment="hyphen is &lt;2.8.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129455" version="1" comment="libOpenCOLLADA0 is &lt;1_3335ac1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129456" version="1" comment="libboost_atomic1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129457" version="1" comment="libboost_date_time1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129458" version="1" comment="libboost_filesystem1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129459" version="1" comment="libboost_iostreams1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129460" version="1" comment="libboost_program_options1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129461" version="1" comment="libboost_regex1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129462" version="1" comment="libboost_signals1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129463" version="1" comment="libboost_system1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129464" version="1" comment="libboost_thread1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129465" version="1" comment="libcmis-0_5-5 is &lt;0.5.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129466" version="1" comment="libetonyek is &lt;0.1.6-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129467" version="1" comment="libetonyek-0_1-1 is &lt;0.1.6-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129468" version="1" comment="libhyphen0 is &lt;2.8.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129469" version="1" comment="libixion is &lt;0.11.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129470" version="1" comment="libixion-0_11-0 is &lt;0.11.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129471" version="1" comment="liborcus is &lt;0.11.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129472" version="1" comment="liborcus-0_11-0 is &lt;0.11.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129473" version="1" comment="libreoffice-base is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129474" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129475" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129476" version="1" comment="libreoffice-calc is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129477" version="1" comment="libreoffice-calc-extensions is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129478" version="1" comment="libreoffice-draw is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129479" version="1" comment="libreoffice-filters-optional is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129480" version="1" comment="libreoffice-gnome is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129481" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129482" version="1" comment="libreoffice-icon-theme-tango is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129483" version="1" comment="libreoffice-impress is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129484" version="1" comment="libreoffice-l10n-af is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129485" version="1" comment="libreoffice-l10n-ar is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129486" version="1" comment="libreoffice-l10n-ca is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129487" version="1" comment="libreoffice-l10n-cs is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129488" version="1" comment="libreoffice-l10n-da is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129489" version="1" comment="libreoffice-l10n-de is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129490" version="1" comment="libreoffice-l10n-en is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129491" version="1" comment="libreoffice-l10n-es is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129492" version="1" comment="libreoffice-l10n-fi is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129493" version="1" comment="libreoffice-l10n-fr is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129494" version="1" comment="libreoffice-l10n-gu is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129495" version="1" comment="libreoffice-l10n-hi is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129496" version="1" comment="libreoffice-l10n-hu is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129497" version="1" comment="libreoffice-l10n-it is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129498" version="1" comment="libreoffice-l10n-ja is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129499" version="1" comment="libreoffice-l10n-ko is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129500" version="1" comment="libreoffice-l10n-nb is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129501" version="1" comment="libreoffice-l10n-nl is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129502" version="1" comment="libreoffice-l10n-nn is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129503" version="1" comment="libreoffice-l10n-pl is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129504" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129505" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129506" version="1" comment="libreoffice-l10n-ru is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129507" version="1" comment="libreoffice-l10n-sk is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129508" version="1" comment="libreoffice-l10n-sv is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129509" version="1" comment="libreoffice-l10n-xh is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129510" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129511" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129512" version="1" comment="libreoffice-l10n-zu is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129513" version="1" comment="libreoffice-mailmerge is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129514" version="1" comment="libreoffice-math is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129515" version="1" comment="libreoffice-officebean is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129516" version="1" comment="libreoffice-pyuno is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129517" version="1" comment="libreoffice-writer is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129518" version="1" comment="libreoffice-writer-extensions is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129519" version="1" comment="libvisio is &lt;0.1.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129520" version="1" comment="libvisio-0_1-1 is &lt;0.1.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129521" version="1" comment="libwps is &lt;0.4.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129522" version="1" comment="libwps-0_4-4 is &lt;0.4.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129523" version="1" comment="myspell-af_NA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129524" version="1" comment="myspell-af_ZA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129525" version="1" comment="myspell-ar is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129526" version="1" comment="myspell-ar_AE is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129527" version="1" comment="myspell-ar_BH is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129528" version="1" comment="myspell-ar_DZ is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129529" version="1" comment="myspell-ar_EG is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129530" version="1" comment="myspell-ar_IQ is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129531" version="1" comment="myspell-ar_JO is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129532" version="1" comment="myspell-ar_KW is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129533" version="1" comment="myspell-ar_LB is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129534" version="1" comment="myspell-ar_LY is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129535" version="1" comment="myspell-ar_MA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129536" version="1" comment="myspell-ar_OM is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129537" version="1" comment="myspell-ar_QA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129538" version="1" comment="myspell-ar_SA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129539" version="1" comment="myspell-ar_SD is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129540" version="1" comment="myspell-ar_SY is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129541" version="1" comment="myspell-ar_TN is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129542" version="1" comment="myspell-ar_YE is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129543" version="1" comment="myspell-be_BY is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129544" version="1" comment="myspell-bg_BG is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129545" version="1" comment="myspell-bn_BD is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129546" version="1" comment="myspell-bn_IN is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129547" version="1" comment="myspell-bs is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129548" version="1" comment="myspell-bs_BA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129549" version="1" comment="myspell-ca is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129550" version="1" comment="myspell-ca_AD is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129551" version="1" comment="myspell-ca_ES is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129552" version="1" comment="myspell-ca_ES_valencia is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129553" version="1" comment="myspell-ca_FR is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129554" version="1" comment="myspell-ca_IT is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129555" version="1" comment="myspell-cs_CZ is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129556" version="1" comment="myspell-da_DK is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129557" version="1" comment="myspell-de is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129558" version="1" comment="myspell-de_AT is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129559" version="1" comment="myspell-de_CH is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129560" version="1" comment="myspell-de_DE is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129561" version="1" comment="myspell-dictionaries is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129562" version="1" comment="myspell-el_GR is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129563" version="1" comment="myspell-en is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129564" version="1" comment="myspell-en_AU is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129565" version="1" comment="myspell-en_BS is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129566" version="1" comment="myspell-en_BZ is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129567" version="1" comment="myspell-en_CA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129568" version="1" comment="myspell-en_GB is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129569" version="1" comment="myspell-en_GH is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129570" version="1" comment="myspell-en_IE is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129571" version="1" comment="myspell-en_IN is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129572" version="1" comment="myspell-en_JM is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129573" version="1" comment="myspell-en_MW is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129574" version="1" comment="myspell-en_NA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129575" version="1" comment="myspell-en_NZ is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129576" version="1" comment="myspell-en_PH is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129577" version="1" comment="myspell-en_TT is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129578" version="1" comment="myspell-en_US is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129579" version="1" comment="myspell-en_ZA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129580" version="1" comment="myspell-en_ZW is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129581" version="1" comment="myspell-es is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129582" version="1" comment="myspell-es_AR is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129583" version="1" comment="myspell-es_BO is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129584" version="1" comment="myspell-es_CL is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129585" version="1" comment="myspell-es_CO is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129586" version="1" comment="myspell-es_CR is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129587" version="1" comment="myspell-es_CU is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129588" version="1" comment="myspell-es_DO is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129589" version="1" comment="myspell-es_EC is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129590" version="1" comment="myspell-es_ES is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129591" version="1" comment="myspell-es_GT is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129592" version="1" comment="myspell-es_HN is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129593" version="1" comment="myspell-es_MX is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129594" version="1" comment="myspell-es_NI is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129595" version="1" comment="myspell-es_PA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129596" version="1" comment="myspell-es_PE is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129597" version="1" comment="myspell-es_PR is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129598" version="1" comment="myspell-es_PY is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129599" version="1" comment="myspell-es_SV is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129600" version="1" comment="myspell-es_UY is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129601" version="1" comment="myspell-es_VE is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129602" version="1" comment="myspell-et_EE is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129603" version="1" comment="myspell-fr_BE is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129604" version="1" comment="myspell-fr_CA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129605" version="1" comment="myspell-fr_CH is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129606" version="1" comment="myspell-fr_FR is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129607" version="1" comment="myspell-fr_LU is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129608" version="1" comment="myspell-fr_MC is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129609" version="1" comment="myspell-gu_IN is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129610" version="1" comment="myspell-he_IL is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129611" version="1" comment="myspell-hi_IN is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129612" version="1" comment="myspell-hr_HR is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129613" version="1" comment="myspell-hu_HU is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129614" version="1" comment="myspell-it_IT is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129615" version="1" comment="myspell-lightproof-en is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129616" version="1" comment="myspell-lightproof-hu_HU is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129617" version="1" comment="myspell-lightproof-pt_BR is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129618" version="1" comment="myspell-lightproof-ru_RU is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129619" version="1" comment="myspell-lo_LA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129620" version="1" comment="myspell-lt_LT is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129621" version="1" comment="myspell-lv_LV is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129622" version="1" comment="myspell-nb_NO is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129623" version="1" comment="myspell-nl_BE is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129624" version="1" comment="myspell-nl_NL is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129625" version="1" comment="myspell-nn_NO is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129626" version="1" comment="myspell-no is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129627" version="1" comment="myspell-pl_PL is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129628" version="1" comment="myspell-pt_AO is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129629" version="1" comment="myspell-pt_BR is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129630" version="1" comment="myspell-pt_PT is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129631" version="1" comment="myspell-ro is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129632" version="1" comment="myspell-ro_RO is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129633" version="1" comment="myspell-ru_RU is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129634" version="1" comment="myspell-sk_SK is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129635" version="1" comment="myspell-sl_SI is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129636" version="1" comment="myspell-sr is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129637" version="1" comment="myspell-sr_CS is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129638" version="1" comment="myspell-sr_Latn_CS is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129639" version="1" comment="myspell-sr_Latn_RS is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129640" version="1" comment="myspell-sr_RS is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129641" version="1" comment="myspell-sv_FI is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129642" version="1" comment="myspell-sv_SE is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129643" version="1" comment="myspell-te is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129644" version="1" comment="myspell-te_IN is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129645" version="1" comment="myspell-th_TH is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129646" version="1" comment="myspell-vi is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129647" version="1" comment="myspell-vi_VN is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129648" version="1" comment="myspell-zu_ZA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129649" version="1" comment="openCOLLADA is &lt;1_3335ac1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121563" version="1" comment="libtiff5 is &lt;4.0.6-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121564" version="1" comment="libtiff5-32bit is &lt;4.0.6-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121565" version="1" comment="tiff is &lt;4.0.6-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121131" version="1" comment="kernel-default is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121132" version="1" comment="kernel-default-devel is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121133" version="1" comment="kernel-default-extra is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121134" version="1" comment="kernel-devel is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121135" version="1" comment="kernel-macros is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121136" version="1" comment="kernel-source is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121137" version="1" comment="kernel-syms is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121138" version="1" comment="kernel-xen is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121139" version="1" comment="kernel-xen-devel is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118755" version="1" comment="qemu is &lt;2.0.2-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118756" version="1" comment="qemu-block-curl is &lt;2.0.2-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118757" version="1" comment="qemu-ipxe is &lt;1.0.0-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118758" version="1" comment="qemu-kvm is &lt;2.0.2-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118759" version="1" comment="qemu-seabios is &lt;1.7.4-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118760" version="1" comment="qemu-sgabios is &lt;8-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118761" version="1" comment="qemu-tools is &lt;2.0.2-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118762" version="1" comment="qemu-vgabios is &lt;1.7.4-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118763" version="1" comment="qemu-x86 is &lt;2.0.2-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121168" version="1" comment="rsync is &lt;3.1.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121331" version="1" comment="libxml2 is &lt;2.9.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121332" version="1" comment="libxml2-2 is &lt;2.9.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121333" version="1" comment="libxml2-2-32bit is &lt;2.9.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121334" version="1" comment="libxml2-tools is &lt;2.9.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121335" version="1" comment="python-libxml2 is &lt;2.9.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121634" version="1" comment="bind is &lt;9.9.6P1-28.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121635" version="1" comment="bind-libs is &lt;9.9.6P1-28.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121636" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-28.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121637" version="1" comment="bind-utils is &lt;9.9.6P1-28.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121622" version="1" comment="giflib is &lt;5.0.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121623" version="1" comment="libgif6 is &lt;5.0.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121624" version="1" comment="libgif6-32bit is &lt;5.0.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121625" version="1" comment="kernel-default is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121626" version="1" comment="kernel-default-devel is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121627" version="1" comment="kernel-default-extra is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121628" version="1" comment="kernel-devel is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121629" version="1" comment="kernel-macros is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121630" version="1" comment="kernel-source is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121631" version="1" comment="kernel-syms is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121632" version="1" comment="kernel-xen is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121633" version="1" comment="kernel-xen-devel is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118608" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118609" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118610" version="1" comment="openldap2-client is &lt;2.4.41-18.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121140" version="1" comment="gdk-pixbuf is &lt;2.30.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121141" version="1" comment="gdk-pixbuf-lang is &lt;2.30.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121142" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.30.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121143" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.30.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121144" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.30.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121145" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.30.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121146" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.30.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119223" version="1" comment="libpng16 is &lt;1.6.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122055" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.95-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122058" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.95-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121001" version="1" comment="libvirt is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121002" version="1" comment="libvirt-client is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121003" version="1" comment="libvirt-client-32bit is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121004" version="1" comment="libvirt-daemon is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121005" version="1" comment="libvirt-daemon-config-network is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121006" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121007" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121008" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121009" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121010" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121011" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121012" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121013" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121014" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121015" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121016" version="1" comment="libvirt-daemon-lxc is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121017" version="1" comment="libvirt-daemon-qemu is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121018" version="1" comment="libvirt-daemon-xen is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121019" version="1" comment="libvirt-doc is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122759" version="1" comment="MozillaFirefox is &lt;38.6.0esr-57.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122404" version="1" comment="MozillaFirefox-branding-SLE is &lt;31.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122760" version="1" comment="MozillaFirefox-translations is &lt;38.6.0esr-57.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122761" version="1" comment="libfreebl3 is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122762" version="1" comment="libfreebl3-32bit is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122763" version="1" comment="libsoftokn3 is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122764" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122765" version="1" comment="mozilla-nss is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122766" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122767" version="1" comment="mozilla-nss-certs is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122768" version="1" comment="mozilla-nss-certs-32bit is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122769" version="1" comment="mozilla-nss-sysinit is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122770" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122771" version="1" comment="mozilla-nss-tools is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118764" version="1" comment="libmspack is &lt;0.4-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122211" version="1" comment="curl is &lt;7.37.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122212" version="1" comment="libcurl4 is &lt;7.37.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122213" version="1" comment="libcurl4-32bit is &lt;7.37.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123016" version="1" comment="flash-player is &lt;11.2.202.569-120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123017" version="1" comment="flash-player-gnome is &lt;11.2.202.569-120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122487" version="1" comment="krb5 is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122488" version="1" comment="krb5-32bit is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122489" version="1" comment="krb5-client is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123013" version="1" comment="libnettle is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122324" version="1" comment="glibc is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122325" version="1" comment="glibc-32bit is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122326" version="1" comment="glibc-devel is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122327" version="1" comment="glibc-devel-32bit is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122328" version="1" comment="glibc-i18ndata is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122329" version="1" comment="glibc-locale is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122330" version="1" comment="glibc-locale-32bit is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122331" version="1" comment="nscd is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123489" version="1" comment="postgresql93 is &lt;9.3.11-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122214" version="1" comment="dhcp is &lt;4.2.6-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122215" version="1" comment="dhcp-client is &lt;4.2.6-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123662" version="1" comment="libecpg6 is &lt;9.4.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123663" version="1" comment="libpq5 is &lt;9.4.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123664" version="1" comment="libpq5-32bit is &lt;9.4.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123665" version="1" comment="postgresql94 is &lt;9.4.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123666" version="1" comment="postgresql94-libs is &lt;9.4.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123667" version="1" comment="MozillaFirefox is &lt;38.6.1esr-60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123668" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123864" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123865" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123866" version="1" comment="openssl is &lt;1.0.1i-27.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123867" version="1" comment="libssh is &lt;0.6.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124405" version="1" comment="compat-openssl098 is &lt;0.9.8j-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124406" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124407" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119220" version="1" comment="libpng12 is &lt;1.2.50-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119282" version="1" comment="libxml2 is &lt;2.9.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119283" version="1" comment="libxml2-2 is &lt;2.9.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119284" version="1" comment="libxml2-2-32bit is &lt;2.9.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119285" version="1" comment="libxml2-tools is &lt;2.9.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119286" version="1" comment="python-libxml2 is &lt;2.9.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124477" version="1" comment="libotr is &lt;4.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124589" version="1" comment="flash-player is &lt;11.2.202.577-123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124590" version="1" comment="flash-player-gnome is &lt;11.2.202.577-123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124591" version="1" comment="libssh2-1 is &lt;1.4.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124592" version="1" comment="libssh2-1-32bit is &lt;1.4.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124593" version="1" comment="libssh2_org is &lt;1.4.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124594" version="1" comment="MozillaFirefox is &lt;38.7.0esr-63.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124595" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-63.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124596" version="1" comment="libfreebl3 is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124597" version="1" comment="libfreebl3-32bit is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124598" version="1" comment="libsoftokn3 is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124599" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124600" version="1" comment="mozilla-nspr is &lt;4.12-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124601" version="1" comment="mozilla-nspr-32bit is &lt;4.12-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124602" version="1" comment="mozilla-nss is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124603" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124604" version="1" comment="mozilla-nss-certs is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124605" version="1" comment="mozilla-nss-certs-32bit is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124606" version="1" comment="mozilla-nss-sysinit is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124607" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124608" version="1" comment="mozilla-nss-tools is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124728" version="1" comment="graphite2 is &lt;1.3.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124731" version="1" comment="bind is &lt;9.9.6P1-28.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124732" version="1" comment="bind-libs is &lt;9.9.6P1-28.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124733" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-28.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124734" version="1" comment="bind-utils is &lt;9.9.6P1-28.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124800" version="1" comment="kernel-default is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124801" version="1" comment="kernel-default-devel is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124802" version="1" comment="kernel-default-extra is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124803" version="1" comment="kernel-devel is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124804" version="1" comment="kernel-macros is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124805" version="1" comment="kernel-source is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124806" version="1" comment="kernel-syms is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124807" version="1" comment="kernel-xen is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124808" version="1" comment="kernel-xen-devel is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124880" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124881" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124882" version="1" comment="libdcerpc0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124883" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124884" version="1" comment="libgensec0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124885" version="1" comment="libgensec0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124886" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124887" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124888" version="1" comment="libndr-nbt0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124889" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124890" version="1" comment="libndr-standard0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124891" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124892" version="1" comment="libndr0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124893" version="1" comment="libndr0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124894" version="1" comment="libnetapi0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124895" version="1" comment="libnetapi0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124896" version="1" comment="libpdb0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124897" version="1" comment="libpdb0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124898" version="1" comment="libregistry0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124899" version="1" comment="libsamba-credentials0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124900" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124901" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124902" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124903" version="1" comment="libsamba-util0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124904" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124905" version="1" comment="libsamdb0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124906" version="1" comment="libsamdb0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124907" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124908" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124909" version="1" comment="libsmbclient0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124910" version="1" comment="libsmbclient0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124911" version="1" comment="libsmbconf0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124912" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124913" version="1" comment="libsmbldap0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124914" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124915" version="1" comment="libtevent-util0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124916" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124917" version="1" comment="libwbclient0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124918" version="1" comment="libwbclient0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124919" version="1" comment="samba is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124920" version="1" comment="samba-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124921" version="1" comment="samba-client is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124922" version="1" comment="samba-client-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124923" version="1" comment="samba-doc is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124924" version="1" comment="samba-libs is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124925" version="1" comment="samba-libs-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124926" version="1" comment="samba-winbind is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124927" version="1" comment="samba-winbind-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125276" version="1" comment="libqt4-sql-plugins is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125492" version="1" comment="pidgin-otr is &lt;4.0.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125669" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.99-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125670" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.99-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125718" version="1" comment="libatomic1 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125719" version="1" comment="libatomic1-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125720" version="1" comment="libcilkrts5 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125721" version="1" comment="libcilkrts5-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125722" version="1" comment="libffi-gcc5 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125725" version="1" comment="libgcc_s1 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125726" version="1" comment="libgcc_s1-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125727" version="1" comment="libgfortran3 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125728" version="1" comment="libgfortran3-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125729" version="1" comment="libgomp1 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125730" version="1" comment="libgomp1-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125731" version="1" comment="libitm1 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125732" version="1" comment="libitm1-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125733" version="1" comment="liblsan0 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125738" version="1" comment="libquadmath0 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125739" version="1" comment="libquadmath0-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125740" version="1" comment="libstdc++6 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125741" version="1" comment="libstdc++6-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125742" version="1" comment="libstdc++6-locale is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125743" version="1" comment="libtsan0 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125744" version="1" comment="libubsan0 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125745" version="1" comment="libubsan0-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125746" version="1" comment="flash-player is &lt;11.2.202.616-126.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125747" version="1" comment="flash-player-gnome is &lt;11.2.202.616-126.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125748" version="1" comment="krb5 is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125749" version="1" comment="krb5-32bit is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125750" version="1" comment="krb5-client is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127078" version="1" comment="python-backports.ssl_match_hostname is &lt;3.4.0.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127079" version="1" comment="python-tornado is &lt;4.2.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125751" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125752" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125753" version="1" comment="libdcerpc0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125754" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125755" version="1" comment="libgensec0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125756" version="1" comment="libgensec0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125757" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125758" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125759" version="1" comment="libndr-nbt0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125760" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125761" version="1" comment="libndr-standard0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125762" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125763" version="1" comment="libndr0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125764" version="1" comment="libndr0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125765" version="1" comment="libnetapi0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125766" version="1" comment="libnetapi0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125767" version="1" comment="libregistry0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125768" version="1" comment="libsamba-credentials0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125769" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125770" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125771" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125772" version="1" comment="libsamba-passdb0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125773" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125774" version="1" comment="libsamba-util0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125775" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125776" version="1" comment="libsamdb0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125777" version="1" comment="libsamdb0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125778" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125779" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125780" version="1" comment="libsmbclient0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125781" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125782" version="1" comment="libsmbconf0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125783" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125784" version="1" comment="libsmbldap0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125785" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125786" version="1" comment="libtevent-util0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125787" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125788" version="1" comment="libwbclient0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125789" version="1" comment="libwbclient0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125790" version="1" comment="samba is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125791" version="1" comment="samba-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125792" version="1" comment="samba-client is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125793" version="1" comment="samba-client-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125794" version="1" comment="samba-doc is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125795" version="1" comment="samba-libs is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125796" version="1" comment="samba-libs-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125797" version="1" comment="samba-winbind is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125798" version="1" comment="samba-winbind-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126091" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126092" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126093" version="1" comment="xerces-c is &lt;3.1.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126428" version="1" comment="libgcrypt is &lt;1.6.1-16.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126429" version="1" comment="libgcrypt20 is &lt;1.6.1-16.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126430" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126453" version="1" comment="cairo is &lt;1.12.16-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126454" version="1" comment="libcairo-gobject2 is &lt;1.12.16-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126455" version="1" comment="libcairo-gobject2-32bit is &lt;1.12.16-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126456" version="1" comment="libcairo2 is &lt;1.12.16-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126457" version="1" comment="libcairo2-32bit is &lt;1.12.16-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126708" version="1" comment="giflib is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127080" version="1" comment="libxml2 is &lt;2.9.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127081" version="1" comment="libxml2-2 is &lt;2.9.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127082" version="1" comment="libxml2-2-32bit is &lt;2.9.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127083" version="1" comment="libxml2-tools is &lt;2.9.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127084" version="1" comment="python-libxml2 is &lt;2.9.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127133" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127134" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127135" version="1" comment="openssl is &lt;1.0.1i-27.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127260" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.101-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127261" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.101-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127262" version="1" comment="ntp is &lt;4.2.8p6-46.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127263" version="1" comment="ntp-doc is &lt;4.2.8p6-46.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127264" version="1" comment="yast2-ntp-client is &lt;3.1.12.4-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127265" version="1" comment="MozillaFirefox is &lt;38.8.0esr-66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127266" version="1" comment="MozillaFirefox-translations is &lt;38.8.0esr-66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127284" version="1" comment="ImageMagick is &lt;6.8.8.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127285" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127286" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127287" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127288" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127361" version="1" comment="compat-openssl098 is &lt;0.9.8j-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127362" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127363" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120991" version="1" comment="wireshark is &lt;1.12.9-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127579" version="1" comment="flash-player is &lt;11.2.202.621-130.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127580" version="1" comment="flash-player-gnome is &lt;11.2.202.621-130.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127594" version="1" comment="xen is &lt;4.4.4_02-22.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127595" version="1" comment="xen-kmp-default is &lt;4.4.4_02_k3.12.55_52.42-22.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127596" version="1" comment="xen-libs is &lt;4.4.4_02-22.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127597" version="1" comment="xen-libs-32bit is &lt;4.4.4_02-22.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127715" version="1" comment="wireshark is &lt;1.12.11-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127716" version="1" comment="libgudev-1_0-0 is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127717" version="1" comment="libgudev-1_0-0-32bit is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127718" version="1" comment="libudev1 is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127719" version="1" comment="libudev1-32bit is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127720" version="1" comment="systemd is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127721" version="1" comment="systemd-32bit is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127722" version="1" comment="systemd-bash-completion is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127723" version="1" comment="systemd-sysvinit is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127724" version="1" comment="udev is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128012" version="1" comment="openssh is &lt;6.6p1-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128013" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128014" version="1" comment="openssh-helpers is &lt;6.6p1-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121336" version="1" comment="openssh is &lt;6.6p1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121337" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121338" version="1" comment="openssh-helpers is &lt;6.6p1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119512" version="1" comment="libmysqlclient18 is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119513" version="1" comment="libmysqlclient18-32bit is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119514" version="1" comment="libmysqlclient_r18 is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119515" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119516" version="1" comment="mariadb is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119517" version="1" comment="mariadb-client is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119518" version="1" comment="mariadb-errormessages is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128463" version="1" comment="supportutils is &lt;3.0-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128467" version="1" comment="libksba is &lt;1.3.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128615" version="1" comment="libxml2 is &lt;2.9.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128616" version="1" comment="libxml2-2 is &lt;2.9.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128617" version="1" comment="libxml2-2-32bit is &lt;2.9.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128618" version="1" comment="libxml2-tools is &lt;2.9.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128619" version="1" comment="python-libxml2 is &lt;2.9.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128638" version="1" comment="libpoppler-glib8 is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128639" version="1" comment="libpoppler-qt4-4 is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128641" version="1" comment="poppler-qt is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128642" version="1" comment="poppler-tools is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128786" version="1" comment="qemu is &lt;2.0.2-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128787" version="1" comment="qemu-block-curl is &lt;2.0.2-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128788" version="1" comment="qemu-ipxe is &lt;1.0.0-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128789" version="1" comment="qemu-kvm is &lt;2.0.2-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128790" version="1" comment="qemu-seabios is &lt;1.7.4-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128791" version="1" comment="qemu-sgabios is &lt;8-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128792" version="1" comment="qemu-tools is &lt;2.0.2-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128793" version="1" comment="qemu-vgabios is &lt;1.7.4-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128794" version="1" comment="qemu-x86 is &lt;2.0.2-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128795" version="1" comment="libspice-server1 is &lt;0.12.4-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128796" version="1" comment="spice is &lt;0.12.4-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128808" version="1" comment="ntp is &lt;4.2.8p8-46.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128809" version="1" comment="ntp-doc is &lt;4.2.8p8-46.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128810" version="1" comment="ImageMagick is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128811" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128812" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128813" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128814" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128883" version="1" comment="libarchive is &lt;3.1.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128884" version="1" comment="libarchive13 is &lt;3.1.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128892" version="1" comment="kernel-default is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128893" version="1" comment="kernel-default-devel is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128894" version="1" comment="kernel-default-extra is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128895" version="1" comment="kernel-devel is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128896" version="1" comment="kernel-macros is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128897" version="1" comment="kernel-source is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128898" version="1" comment="kernel-syms is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128899" version="1" comment="kernel-xen is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128900" version="1" comment="kernel-xen-devel is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128937" version="1" comment="flash-player is &lt;11.2.202.626-133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128938" version="1" comment="flash-player-gnome is &lt;11.2.202.626-133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128939" version="1" comment="libmysqlclient18 is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128940" version="1" comment="libmysqlclient18-32bit is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128941" version="1" comment="libmysqlclient_r18 is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128942" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128943" version="1" comment="mariadb is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128944" version="1" comment="mariadb-client is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128945" version="1" comment="mariadb-errormessages is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129017" version="1" comment="imap is &lt;2007e_suse-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129018" version="1" comment="libc-client2007e_suse is &lt;2007e_suse-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129089" version="1" comment="libimobiledevice is &lt;1.1.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129090" version="1" comment="libimobiledevice-tools is &lt;1.1.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129091" version="1" comment="libimobiledevice4 is &lt;1.1.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129092" version="1" comment="libusbmuxd2 is &lt;1.0.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129093" version="1" comment="usbmuxd is &lt;1.0.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120771" version="1" comment="libfreebl3 is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120772" version="1" comment="libfreebl3-32bit is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120773" version="1" comment="libsoftokn3 is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120774" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120775" version="1" comment="mozilla-nss is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120776" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120777" version="1" comment="mozilla-nss-certs is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120778" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120779" version="1" comment="mozilla-nss-sysinit is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120780" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120781" version="1" comment="mozilla-nss-tools is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119519" version="1" comment="bind is &lt;9.9.6P1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119520" version="1" comment="bind-libs is &lt;9.9.6P1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119521" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119522" version="1" comment="bind-utils is &lt;9.9.6P1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118775" version="1" comment="grub2 is &lt;2.02~beta2-73.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118776" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-73.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118777" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-73.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118778" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-73.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118779" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-73.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118801" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118802" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118734" version="1" comment="openssl is &lt;1.0.1i-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118983" version="1" comment="kernel-default is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118984" version="1" comment="kernel-default-devel is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118985" version="1" comment="kernel-default-extra is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118986" version="1" comment="kernel-devel is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118987" version="1" comment="kernel-macros is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118988" version="1" comment="kernel-source is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118989" version="1" comment="kernel-syms is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118990" version="1" comment="kernel-xen is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118991" version="1" comment="kernel-xen-devel is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119074" version="1" comment="ldb is &lt;1.1.24-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119075" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119076" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119077" version="1" comment="libdcerpc0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119078" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119079" version="1" comment="libgensec0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119080" version="1" comment="libgensec0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119081" version="1" comment="libldb1 is &lt;1.1.24-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119082" version="1" comment="libldb1-32bit is &lt;1.1.24-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119083" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119084" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119085" version="1" comment="libndr-nbt0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119086" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119087" version="1" comment="libndr-standard0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119088" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119089" version="1" comment="libndr0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119090" version="1" comment="libndr0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119091" version="1" comment="libnetapi0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119092" version="1" comment="libnetapi0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119093" version="1" comment="libregistry0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119094" version="1" comment="libsamba-credentials0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119095" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119096" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119097" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119098" version="1" comment="libsamba-passdb0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119099" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119100" version="1" comment="libsamba-util0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119101" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119102" version="1" comment="libsamdb0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119103" version="1" comment="libsamdb0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119104" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119105" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119106" version="1" comment="libsmbclient0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119107" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119108" version="1" comment="libsmbconf0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119109" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119110" version="1" comment="libsmbldap0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119111" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119112" version="1" comment="libtalloc2 is &lt;2.1.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119113" version="1" comment="libtalloc2-32bit is &lt;2.1.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119114" version="1" comment="libtdb1 is &lt;1.3.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119115" version="1" comment="libtdb1-32bit is &lt;1.3.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119116" version="1" comment="libtevent-util0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119117" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119118" version="1" comment="libtevent0 is &lt;0.9.26-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119119" version="1" comment="libtevent0-32bit is &lt;0.9.26-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119120" version="1" comment="libwbclient0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119121" version="1" comment="libwbclient0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119122" version="1" comment="pytalloc is &lt;2.1.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119123" version="1" comment="pytalloc-32bit is &lt;2.1.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119124" version="1" comment="samba is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119125" version="1" comment="samba-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119126" version="1" comment="samba-client is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119127" version="1" comment="samba-client-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119128" version="1" comment="samba-doc is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119129" version="1" comment="samba-libs is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119130" version="1" comment="samba-libs-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119131" version="1" comment="samba-winbind is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119132" version="1" comment="samba-winbind-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119133" version="1" comment="talloc is &lt;2.1.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118661" version="1" comment="xen is &lt;4.5.2_02-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118780" version="1" comment="xen-kmp-default is &lt;4.5.2_02_k3.12.49_11-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118781" version="1" comment="xen-libs is &lt;4.5.2_02-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118782" version="1" comment="xen-libs-32bit is &lt;4.5.2_02-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129344" version="1" comment="kernel-default is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129345" version="1" comment="kernel-default-devel is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129346" version="1" comment="kernel-default-extra is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129347" version="1" comment="kernel-devel is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129348" version="1" comment="kernel-macros is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129349" version="1" comment="kernel-source is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129350" version="1" comment="kernel-syms is &lt;3.12.59-60.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129351" version="1" comment="kernel-xen is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129352" version="1" comment="kernel-xen-devel is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129369" version="1" comment="qemu is &lt;2.3.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129370" version="1" comment="qemu-block-curl is &lt;2.3.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129371" version="1" comment="qemu-ipxe is &lt;1.0.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129372" version="1" comment="qemu-kvm is &lt;2.3.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129373" version="1" comment="qemu-seabios is &lt;1.8.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129374" version="1" comment="qemu-sgabios is &lt;8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129375" version="1" comment="qemu-tools is &lt;2.3.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129376" version="1" comment="qemu-vgabios is &lt;1.8.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129377" version="1" comment="qemu-x86 is &lt;2.3.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129402" version="1" comment="kernel-default is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129403" version="1" comment="kernel-default-devel is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129404" version="1" comment="kernel-default-extra is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129405" version="1" comment="kernel-devel is &lt;3.12.59-60.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129406" version="1" comment="kernel-macros is &lt;3.12.59-60.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129407" version="1" comment="kernel-source is &lt;3.12.59-60.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129408" version="1" comment="kernel-syms is &lt;3.12.59-60.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129409" version="1" comment="kernel-xen is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129410" version="1" comment="kernel-xen-devel is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129722" version="1" comment="glibc is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129723" version="1" comment="glibc-32bit is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129724" version="1" comment="glibc-devel is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129725" version="1" comment="glibc-devel-32bit is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129726" version="1" comment="glibc-i18ndata is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129727" version="1" comment="glibc-locale is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129728" version="1" comment="glibc-locale-32bit is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129729" version="1" comment="nscd is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129904" version="1" comment="ImageMagick is &lt;6.8.8.1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129905" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129906" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129907" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129908" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130569" version="1" comment="flash-player is &lt;11.2.202.632-137.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130570" version="1" comment="flash-player-gnome is &lt;11.2.202.632-137.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130723" version="1" comment="libarchive is &lt;3.1.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121638" version="1" comment="bind is &lt;9.9.6P1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121639" version="1" comment="bind-libs is &lt;9.9.6P1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121640" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121641" version="1" comment="bind-utils is &lt;9.9.6P1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130787" version="1" comment="gimp is &lt;2.8.10-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130788" version="1" comment="gimp-lang is &lt;2.8.10-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130789" version="1" comment="gimp-plugins-python is &lt;2.8.10-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130790" version="1" comment="libgimp-2_0-0 is &lt;2.8.10-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130791" version="1" comment="libgimpui-2_0-0 is &lt;2.8.10-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130964" version="1" comment="libvirt is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130965" version="1" comment="libvirt-client is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130966" version="1" comment="libvirt-client-32bit is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130967" version="1" comment="libvirt-daemon is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130968" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130969" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130970" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130971" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130972" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130973" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130974" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130975" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130976" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130977" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130978" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130979" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130980" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130981" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130982" version="1" comment="libvirt-doc is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130988" version="1" comment="libidn is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130991" version="1" comment="xen is &lt;4.5.3_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130992" version="1" comment="xen-kmp-default is &lt;4.5.3_08_k3.12.59_60.45-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130993" version="1" comment="xen-libs is &lt;4.5.3_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130994" version="1" comment="xen-libs-32bit is &lt;4.5.3_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121536" version="1" comment="kernel-default is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121537" version="1" comment="kernel-default-devel is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121538" version="1" comment="kernel-default-extra is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121539" version="1" comment="kernel-devel is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121540" version="1" comment="kernel-macros is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121541" version="1" comment="kernel-source is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121542" version="1" comment="kernel-syms is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121543" version="1" comment="kernel-xen is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121544" version="1" comment="kernel-xen-devel is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131004" version="1" comment="kernel-default is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131005" version="1" comment="kernel-default-devel is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131006" version="1" comment="kernel-default-extra is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131007" version="1" comment="kernel-devel is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131008" version="1" comment="kernel-macros is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131009" version="1" comment="kernel-source is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131010" version="1" comment="kernel-syms is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131011" version="1" comment="kernel-xen is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131012" version="1" comment="kernel-xen-devel is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131015" version="1" comment="MozillaFirefox is &lt;45.3.0esr-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131016" version="1" comment="MozillaFirefox-translations is &lt;45.3.0esr-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131017" version="1" comment="krb5 is &lt;1.12.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131018" version="1" comment="krb5-32bit is &lt;1.12.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131019" version="1" comment="krb5-client is &lt;1.12.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131021" version="1" comment="rsync is &lt;3.1.0-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131024" version="1" comment="xerces-c is &lt;3.1.1-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131025" version="1" comment="libstorage is &lt;2.25.35.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131026" version="1" comment="libstorage-ruby is &lt;2.25.35.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131027" version="1" comment="libstorage6 is &lt;2.25.35.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131028" version="1" comment="fontconfig is &lt;2.11.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131029" version="1" comment="fontconfig-32bit is &lt;2.11.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131030" version="1" comment="libmysqlclient18 is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131031" version="1" comment="libmysqlclient18-32bit is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131032" version="1" comment="libmysqlclient_r18 is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131033" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131034" version="1" comment="mariadb is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131035" version="1" comment="mariadb-client is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131036" version="1" comment="mariadb-errormessages is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131045" version="1" comment="openssh is &lt;6.6p1-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131046" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131047" version="1" comment="openssh-helpers is &lt;6.6p1-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131050" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131051" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131052" version="1" comment="libdcerpc0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131053" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131054" version="1" comment="libgensec0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131055" version="1" comment="libgensec0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131056" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131057" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131058" version="1" comment="libndr-nbt0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131059" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131060" version="1" comment="libndr-standard0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131061" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131062" version="1" comment="libndr0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131063" version="1" comment="libndr0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131064" version="1" comment="libnetapi0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131065" version="1" comment="libnetapi0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131066" version="1" comment="libregistry0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131067" version="1" comment="libsamba-credentials0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131068" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131069" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131070" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131071" version="1" comment="libsamba-passdb0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131072" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131073" version="1" comment="libsamba-util0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131074" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131075" version="1" comment="libsamdb0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131076" version="1" comment="libsamdb0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131077" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131078" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131079" version="1" comment="libsmbclient0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131080" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131081" version="1" comment="libsmbconf0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131082" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131083" version="1" comment="libsmbldap0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131084" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131085" version="1" comment="libtevent-util0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131086" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131087" version="1" comment="libwbclient0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131088" version="1" comment="libwbclient0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131089" version="1" comment="samba is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131090" version="1" comment="samba-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131091" version="1" comment="samba-client is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131092" version="1" comment="samba-client-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131093" version="1" comment="samba-doc is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131094" version="1" comment="samba-libs is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131095" version="1" comment="samba-libs-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131096" version="1" comment="samba-winbind is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131097" version="1" comment="samba-winbind-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131099" version="1" comment="flash-player is &lt;11.2.202.635-140.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131100" version="1" comment="flash-player-gnome is &lt;11.2.202.635-140.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131104" version="1" comment="libgcrypt is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131125" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131126" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131127" version="1" comment="openssl is &lt;1.0.1i-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131143" version="1" comment="postgresql94-libs is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131147" version="1" comment="compat-openssl098 is &lt;0.9.8j-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131196" version="1" comment="xen is &lt;4.5.3_10-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131197" version="1" comment="xen-kmp-default is &lt;4.5.3_10_k3.12.62_60.62-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131198" version="1" comment="xen-libs is &lt;4.5.3_10-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131199" version="1" comment="xen-libs-32bit is &lt;4.5.3_10-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131200" version="1" comment="libgudev-1_0-0 is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131201" version="1" comment="libgudev-1_0-0-32bit is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131202" version="1" comment="libudev1 is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131203" version="1" comment="libudev1-32bit is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131204" version="1" comment="systemd is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131205" version="1" comment="systemd-32bit is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131206" version="1" comment="systemd-bash-completion is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131207" version="1" comment="systemd-sysvinit is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131208" version="1" comment="udev is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131209" version="1" comment="ghostscript is &lt;9.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131210" version="1" comment="ghostscript-x11 is &lt;9.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131211" version="1" comment="libtiff5 is &lt;4.0.6-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131212" version="1" comment="libtiff5-32bit is &lt;4.0.6-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131213" version="1" comment="tiff is &lt;4.0.6-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131214" version="1" comment="freerdp is &lt;1.0.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131215" version="1" comment="libfreerdp-1_0 is &lt;1.0.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131216" version="1" comment="libfreerdp-1_0-plugins is &lt;1.0.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131217" version="1" comment="libX11 is &lt;1.6.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131218" version="1" comment="libX11-6 is &lt;1.6.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131219" version="1" comment="libX11-6-32bit is &lt;1.6.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131220" version="1" comment="libX11-data is &lt;1.6.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131221" version="1" comment="libX11-xcb1 is &lt;1.6.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131222" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131223" version="1" comment="libXfixes is &lt;5.0.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131224" version="1" comment="libXfixes3 is &lt;5.0.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131225" version="1" comment="libXfixes3-32bit is &lt;5.0.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131226" version="1" comment="libXi is &lt;1.7.4-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131227" version="1" comment="libXi6 is &lt;1.7.4-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131228" version="1" comment="libXi6-32bit is &lt;1.7.4-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131229" version="1" comment="libXrandr is &lt;1.4.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131230" version="1" comment="libXrandr2 is &lt;1.4.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131231" version="1" comment="libXrandr2-32bit is &lt;1.4.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131232" version="1" comment="libXrender is &lt;0.9.8-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131233" version="1" comment="libXrender1 is &lt;0.9.8-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131234" version="1" comment="libXrender1-32bit is &lt;0.9.8-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131235" version="1" comment="libXtst is &lt;1.2.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131236" version="1" comment="libXtst6 is &lt;1.2.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131237" version="1" comment="libXtst6-32bit is &lt;1.2.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131238" version="1" comment="libXv is &lt;1.0.10-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131239" version="1" comment="libXv1 is &lt;1.0.10-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131240" version="1" comment="libXv1-32bit is &lt;1.0.10-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131241" version="1" comment="libXvMC is &lt;1.0.8-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131242" version="1" comment="libXvMC1 is &lt;1.0.8-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131243" version="1" comment="flash-player is &lt;11.2.202.637-143.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131244" version="1" comment="flash-player-gnome is &lt;11.2.202.637-143.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131245" version="1" comment="gtk2 is &lt;2.24.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131246" version="1" comment="gtk2-lang is &lt;2.24.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131247" version="1" comment="gtk2-tools is &lt;2.24.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131248" version="1" comment="gtk2-tools-32bit is &lt;2.24.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131249" version="1" comment="libgtk-2_0-0 is &lt;2.24.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131250" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131251" version="1" comment="typelib-1_0-Gtk-2_0 is &lt;2.24.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131252" version="1" comment="kdump is &lt;0.8.15-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131253" version="1" comment="dbus-1 is &lt;1.8.22-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131254" version="1" comment="dbus-1-x11 is &lt;1.8.22-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131255" version="1" comment="libdbus-1-3 is &lt;1.8.22-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131256" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131257" version="1" comment="libipa_hbac0 is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131258" version="1" comment="libsss_idmap0 is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131259" version="1" comment="libsss_sudo is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131260" version="1" comment="python-sssd-config is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131261" version="1" comment="sssd is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131262" version="1" comment="sssd-32bit is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131263" version="1" comment="sssd-ad is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131264" version="1" comment="sssd-ipa is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131265" version="1" comment="sssd-krb5 is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131266" version="1" comment="sssd-krb5-common is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131267" version="1" comment="sssd-ldap is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131268" version="1" comment="sssd-proxy is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131269" version="1" comment="sssd-tools is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131270" version="1" comment="kernel-default is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131271" version="1" comment="kernel-default-devel is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131272" version="1" comment="kernel-default-extra is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131273" version="1" comment="kernel-devel is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131274" version="1" comment="kernel-macros is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131275" version="1" comment="kernel-source is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131276" version="1" comment="kernel-syms is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131277" version="1" comment="kernel-xen is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131278" version="1" comment="kernel-xen-devel is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131279" version="1" comment="qemu is &lt;2.3.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131280" version="1" comment="qemu-block-curl is &lt;2.3.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131281" version="1" comment="qemu-ipxe is &lt;1.0.0-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131282" version="1" comment="qemu-kvm is &lt;2.3.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131283" version="1" comment="qemu-seabios is &lt;1.8.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131284" version="1" comment="qemu-sgabios is &lt;8-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131285" version="1" comment="qemu-tools is &lt;2.3.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131286" version="1" comment="qemu-vgabios is &lt;1.8.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131287" version="1" comment="qemu-x86 is &lt;2.3.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131288" version="1" comment="libxml2 is &lt;2.9.1-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131289" version="1" comment="libxml2-2 is &lt;2.9.1-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131290" version="1" comment="libxml2-2-32bit is &lt;2.9.1-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131291" version="1" comment="libxml2-tools is &lt;2.9.1-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131292" version="1" comment="python-libxml2 is &lt;2.9.1-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131293" version="1" comment="ghostscript is &lt;9.15-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131294" version="1" comment="ghostscript-x11 is &lt;9.15-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131295" version="1" comment="libpython3_4m1_0 is &lt;3.4.5-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131296" version="1" comment="python3 is &lt;3.4.5-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131297" version="1" comment="python3-base is &lt;3.4.5-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131300" version="1" comment="flash-player is &lt;11.2.202.643-146.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131301" version="1" comment="flash-player-gnome is &lt;11.2.202.643-146.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131302" version="1" comment="gd is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131303" version="1" comment="gd-32bit is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131304" version="1" comment="ImageMagick is &lt;6.8.8.1-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131305" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131306" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131307" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131308" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135207" version="1" comment="bind is &lt;9.9.9P1-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135208" version="1" comment="bind-libs is &lt;9.9.9P1-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135209" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135210" version="1" comment="bind-utils is &lt;9.9.9P1-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135211" version="1" comment="curl is &lt;7.37.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135212" version="1" comment="libcurl4 is &lt;7.37.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135213" version="1" comment="libcurl4-32bit is &lt;7.37.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122059" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.72-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122062" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.72-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135356" version="1" comment="libblkid1 is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135357" version="1" comment="libblkid1-32bit is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135358" version="1" comment="libmount1 is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135359" version="1" comment="libmount1-32bit is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135360" version="1" comment="libsmartcols1 is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135361" version="1" comment="libuuid-devel is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135362" version="1" comment="libuuid1 is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135363" version="1" comment="libuuid1-32bit is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135364" version="1" comment="python-libmount is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135365" version="1" comment="util-linux is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135366" version="1" comment="util-linux-lang is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135367" version="1" comment="util-linux-systemd is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135368" version="1" comment="uuidd is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135369" version="1" comment="jasper is &lt;1.900.14-181.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135370" version="1" comment="libjasper1 is &lt;1.900.14-181.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135371" version="1" comment="libjasper1-32bit is &lt;1.900.14-181.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135487" version="1" comment="flash-player is &lt;11.2.202.644-149.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135488" version="1" comment="flash-player-gnome is &lt;11.2.202.644-149.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135538" version="1" comment="ghostscript is &lt;9.15-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135539" version="1" comment="ghostscript-x11 is &lt;9.15-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135541" version="1" comment="eog is &lt;3.10.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135542" version="1" comment="eog-lang is &lt;3.10.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135860" version="1" comment="bash is &lt;4.2-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135861" version="1" comment="bash-doc is &lt;4.2-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135862" version="1" comment="bash-lang is &lt;4.2-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135863" version="1" comment="libreadline6 is &lt;6.2-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135864" version="1" comment="libreadline6-32bit is &lt;6.2-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135865" version="1" comment="readline-doc is &lt;6.2-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135929" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.111-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135930" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.111-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135939" version="1" comment="tar is &lt;1.27.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135940" version="1" comment="tar-lang is &lt;1.27.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135941" version="1" comment="sudo is &lt;1.8.10p3-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135963" version="1" comment="libarchive is &lt;3.1.2-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135965" version="1" comment="kernel-default is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135966" version="1" comment="kernel-default-devel is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135967" version="1" comment="kernel-default-extra is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135968" version="1" comment="kernel-devel is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135969" version="1" comment="kernel-macros is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135970" version="1" comment="kernel-source is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135971" version="1" comment="kernel-syms is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135972" version="1" comment="kernel-xen is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135973" version="1" comment="kernel-xen-devel is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135995" version="1" comment="libmysqlclient18 is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135996" version="1" comment="libmysqlclient18-32bit is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135997" version="1" comment="libmysqlclient_r18 is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135998" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135999" version="1" comment="mariadb is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136000" version="1" comment="mariadb-client is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136001" version="1" comment="mariadb-errormessages is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136056" version="1" comment="gvim is &lt;7.4.326-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136057" version="1" comment="vim is &lt;7.4.326-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136058" version="1" comment="vim-data is &lt;7.4.326-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136131" version="1" comment="ImageMagick is &lt;6.8.8.1-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136132" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136133" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136134" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136135" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136136" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.121-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136137" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.121-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129316" version="1" comment="imap is &lt;2007e_suse-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129318" version="1" comment="libc-client2007e_suse is &lt;2007e_suse-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136208" version="1" comment="libpcre1 is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136209" version="1" comment="libpcre1-32bit is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136210" version="1" comment="libpcre16-0 is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136211" version="1" comment="libpcrecpp0 is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136212" version="1" comment="libpcrecpp0-32bit is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136213" version="1" comment="pcre is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136214" version="1" comment="qemu is &lt;2.3.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136215" version="1" comment="qemu-block-curl is &lt;2.3.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136216" version="1" comment="qemu-ipxe is &lt;1.0.0-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136217" version="1" comment="qemu-kvm is &lt;2.3.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136218" version="1" comment="qemu-seabios is &lt;1.8.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136219" version="1" comment="qemu-sgabios is &lt;8-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136220" version="1" comment="qemu-tools is &lt;2.3.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136221" version="1" comment="qemu-vgabios is &lt;1.8.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136222" version="1" comment="qemu-x86 is &lt;2.3.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136380" version="1" comment="libX11 is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136386" version="1" comment="MozillaFirefox is &lt;45.5.0esr-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136387" version="1" comment="MozillaFirefox-translations is &lt;45.5.0esr-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136388" version="1" comment="libfreebl3 is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136389" version="1" comment="libfreebl3-32bit is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136390" version="1" comment="libsoftokn3 is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136391" version="1" comment="libsoftokn3-32bit is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136392" version="1" comment="mozilla-nss is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136393" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136394" version="1" comment="mozilla-nss-certs is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136395" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136396" version="1" comment="mozilla-nss-sysinit is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136397" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136398" version="1" comment="mozilla-nss-tools is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136630" version="1" comment="kernel-default is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136631" version="1" comment="kernel-default-devel is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136632" version="1" comment="kernel-default-extra is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136633" version="1" comment="kernel-devel is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136634" version="1" comment="kernel-macros is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136635" version="1" comment="kernel-source is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136636" version="1" comment="kernel-syms is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136637" version="1" comment="kernel-xen is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136638" version="1" comment="kernel-xen-devel is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136639" version="1" comment="libXi is &lt;1.7.4-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136642" version="1" comment="MozillaFirefox is &lt;45.5.1esr-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136643" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136645" version="1" comment="gc is &lt;7.2d-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142349" version="1" comment="xen is &lt;4.5.5_02-22.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142350" version="1" comment="xen-kmp-default is &lt;4.5.5_02_k3.12.67_60.64.18-22.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142351" version="1" comment="xen-libs is &lt;4.5.5_02-22.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142352" version="1" comment="xen-libs-32bit is &lt;4.5.5_02-22.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142720" version="1" comment="libass is &lt;0.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142941" version="1" comment="flash-player is &lt;24.0.0.186-152.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142942" version="1" comment="flash-player-gnome is &lt;24.0.0.186-152.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143039" version="1" comment="pcre is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119621" version="1" comment="libmysqlclient18 is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119622" version="1" comment="libmysqlclient18-32bit is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119623" version="1" comment="libmysqlclient_r18 is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119624" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119625" version="1" comment="mariadb is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119626" version="1" comment="mariadb-client is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119627" version="1" comment="mariadb-errormessages is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143055" version="1" comment="kernel-default is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143056" version="1" comment="kernel-default-devel is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143057" version="1" comment="kernel-default-extra is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143058" version="1" comment="kernel-devel is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143059" version="1" comment="kernel-macros is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143060" version="1" comment="kernel-source is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143061" version="1" comment="kernel-syms is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143062" version="1" comment="kernel-xen is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143063" version="1" comment="kernel-xen-devel is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143413" version="1" comment="ntp is &lt;4.2.8p9-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143414" version="1" comment="ntp-doc is &lt;4.2.8p9-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144634" version="1" comment="xen is &lt;4.5.5_04-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144635" version="1" comment="xen-kmp-default is &lt;4.5.5_04_k3.12.67_60.64.24-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144636" version="1" comment="xen-libs is &lt;4.5.5_04-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144637" version="1" comment="xen-libs-32bit is &lt;4.5.5_04-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144638" version="1" comment="gd is &lt;2.1.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144639" version="1" comment="gd-32bit is &lt;2.1.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144640" version="1" comment="MozillaFirefox is &lt;45.6.0esr-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144641" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145376" version="1" comment="libgme is &lt;0.6.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145837" version="1" comment="ImageMagick is &lt;6.8.8.1-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145838" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145839" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145840" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145841" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145842" version="1" comment="wget is &lt;1.14-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145843" version="1" comment="dnsmasq is &lt;2.71-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145859" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145860" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145861" version="1" comment="libdcerpc0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145862" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145863" version="1" comment="libgensec0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145864" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145865" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145866" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145867" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145868" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145869" version="1" comment="libndr-standard0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145870" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145871" version="1" comment="libndr0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145872" version="1" comment="libndr0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145873" version="1" comment="libnetapi0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145874" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145875" version="1" comment="libregistry0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145876" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145877" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145878" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145879" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145880" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145881" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145882" version="1" comment="libsamba-util0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145883" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145884" version="1" comment="libsamdb0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145885" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145886" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145887" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145888" version="1" comment="libsmbclient0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145889" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145890" version="1" comment="libsmbconf0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145891" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145892" version="1" comment="libsmbldap0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145893" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145894" version="1" comment="libtevent-util0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145895" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145896" version="1" comment="libwbclient0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145897" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145898" version="1" comment="samba is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145899" version="1" comment="samba-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145900" version="1" comment="samba-client is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145901" version="1" comment="samba-client-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145902" version="1" comment="samba-doc is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145903" version="1" comment="samba-libs is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145904" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145905" version="1" comment="samba-winbind is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145906" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146001" version="1" comment="gstreamer-plugins-good is &lt;1.2.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146002" version="1" comment="gstreamer-plugins-good-lang is &lt;1.2.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146005" version="1" comment="gstreamer-plugins-bad is &lt;1.2.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146006" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.2.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146007" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.2.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146008" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.2.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146009" version="1" comment="libgstegl-1_0-0 is &lt;1.2.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146010" version="1" comment="libgstmpegts-1_0-0 is &lt;1.2.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146011" version="1" comment="libgstphotography-1_0-0 is &lt;1.2.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146012" version="1" comment="libtiff5 is &lt;4.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146013" version="1" comment="libtiff5-32bit is &lt;4.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146014" version="1" comment="tiff is &lt;4.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118792" version="1" comment="qemu is &lt;2.3.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118793" version="1" comment="qemu-block-curl is &lt;2.3.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118794" version="1" comment="qemu-ipxe is &lt;1.0.0-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118795" version="1" comment="qemu-kvm is &lt;2.3.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118796" version="1" comment="qemu-seabios is &lt;1.8.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118797" version="1" comment="qemu-sgabios is &lt;8-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118798" version="1" comment="qemu-tools is &lt;2.3.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118799" version="1" comment="qemu-vgabios is &lt;1.8.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118800" version="1" comment="qemu-x86 is &lt;2.3.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122332" version="1" comment="glibc is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122333" version="1" comment="glibc-32bit is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122334" version="1" comment="glibc-devel is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122335" version="1" comment="glibc-devel-32bit is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122336" version="1" comment="glibc-i18ndata is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122337" version="1" comment="glibc-locale is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122338" version="1" comment="glibc-locale-32bit is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122339" version="1" comment="nscd is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122216" version="1" comment="dhcp is &lt;4.3.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122217" version="1" comment="dhcp-client is &lt;4.3.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123221" version="1" comment="kernel-default is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123222" version="1" comment="kernel-default-devel is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123223" version="1" comment="kernel-default-extra is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123224" version="1" comment="kernel-devel is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123225" version="1" comment="kernel-macros is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123226" version="1" comment="kernel-source is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123227" version="1" comment="kernel-syms is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123228" version="1" comment="kernel-xen is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123229" version="1" comment="kernel-xen-devel is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119232" version="1" comment="libpng15 is &lt;1.5.22-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123869" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123870" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123871" version="1" comment="openssl is &lt;1.0.1i-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124720" version="1" comment="bind is &lt;9.9.6P1-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124721" version="1" comment="bind-libs is &lt;9.9.6P1-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124722" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124723" version="1" comment="bind-utils is &lt;9.9.6P1-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124928" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124929" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124930" version="1" comment="libdcerpc0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124931" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124932" version="1" comment="libgensec0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124933" version="1" comment="libgensec0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124934" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124935" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124936" version="1" comment="libndr-nbt0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124937" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124938" version="1" comment="libndr-standard0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124939" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124940" version="1" comment="libndr0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124941" version="1" comment="libndr0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124942" version="1" comment="libnetapi0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124943" version="1" comment="libnetapi0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124944" version="1" comment="libregistry0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124945" version="1" comment="libsamba-credentials0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124946" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124947" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124948" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124949" version="1" comment="libsamba-passdb0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124950" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124951" version="1" comment="libsamba-util0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124952" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124953" version="1" comment="libsamdb0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124954" version="1" comment="libsamdb0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124955" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124956" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124957" version="1" comment="libsmbclient0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124958" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124959" version="1" comment="libsmbconf0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124960" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124961" version="1" comment="libsmbldap0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124962" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124963" version="1" comment="libtevent-util0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124964" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124965" version="1" comment="libwbclient0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124966" version="1" comment="libwbclient0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124967" version="1" comment="samba is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124968" version="1" comment="samba-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124969" version="1" comment="samba-client is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124970" version="1" comment="samba-client-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124971" version="1" comment="samba-doc is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124972" version="1" comment="samba-libs is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124973" version="1" comment="samba-libs-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124974" version="1" comment="samba-winbind is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124975" version="1" comment="samba-winbind-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125323" version="1" comment="xen is &lt;4.5.2_06-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125324" version="1" comment="xen-kmp-default is &lt;4.5.2_06_k3.12.53_60.30-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125325" version="1" comment="xen-libs is &lt;4.5.2_06-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125326" version="1" comment="xen-libs-32bit is &lt;4.5.2_06-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125608" version="1" comment="libvirt is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125609" version="1" comment="libvirt-client is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125610" version="1" comment="libvirt-client-32bit is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125611" version="1" comment="libvirt-daemon is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125612" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125613" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125614" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125615" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125616" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125617" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125618" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125619" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125620" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125621" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125622" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125623" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125624" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125625" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125626" version="1" comment="libvirt-doc is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125671" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.77-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125672" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.77-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125799" version="1" comment="kernel-default is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125800" version="1" comment="kernel-default-devel is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125801" version="1" comment="kernel-default-extra is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125802" version="1" comment="kernel-devel is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125803" version="1" comment="kernel-macros is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125804" version="1" comment="kernel-source is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125805" version="1" comment="kernel-syms is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125806" version="1" comment="kernel-xen is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125807" version="1" comment="kernel-xen-devel is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125808" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125809" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125810" version="1" comment="libdcerpc0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125811" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125812" version="1" comment="libgensec0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125813" version="1" comment="libgensec0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125814" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125815" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125816" version="1" comment="libndr-nbt0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125817" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125818" version="1" comment="libndr-standard0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125819" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125820" version="1" comment="libndr0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125821" version="1" comment="libndr0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125822" version="1" comment="libnetapi0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125823" version="1" comment="libnetapi0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125824" version="1" comment="libregistry0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125825" version="1" comment="libsamba-credentials0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125826" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125827" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125828" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125829" version="1" comment="libsamba-passdb0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125830" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125831" version="1" comment="libsamba-util0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125832" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125833" version="1" comment="libsamdb0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125834" version="1" comment="libsamdb0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125835" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125836" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125837" version="1" comment="libsmbclient0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125838" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125839" version="1" comment="libsmbconf0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125840" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125841" version="1" comment="libsmbldap0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125842" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125843" version="1" comment="libtevent-util0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125844" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125845" version="1" comment="libwbclient0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125846" version="1" comment="libwbclient0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125847" version="1" comment="samba is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125848" version="1" comment="samba-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125849" version="1" comment="samba-client is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125850" version="1" comment="samba-client-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125851" version="1" comment="samba-doc is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125852" version="1" comment="samba-libs is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125853" version="1" comment="samba-libs-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125854" version="1" comment="samba-winbind is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125855" version="1" comment="samba-winbind-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126458" version="1" comment="libcairo-script-interpreter2 is &lt;1.12.16-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126711" version="1" comment="yast2-users is &lt;3.1.41.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126902" version="1" comment="ntp is &lt;4.2.8p6-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126903" version="1" comment="ntp-doc is &lt;4.2.8p6-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126904" version="1" comment="yast2-ntp-client is &lt;3.1.22-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127136" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127137" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127138" version="1" comment="openssl is &lt;1.0.1i-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127267" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.91-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127268" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.91-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127475" version="1" comment="ntp is &lt;4.2.8p7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127476" version="1" comment="ntp-doc is &lt;4.2.8p7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127725" version="1" comment="libgudev-1_0-0 is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127726" version="1" comment="libgudev-1_0-0-32bit is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127727" version="1" comment="libudev1 is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127728" version="1" comment="libudev1-32bit is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127729" version="1" comment="systemd is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127730" version="1" comment="systemd-32bit is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127731" version="1" comment="systemd-bash-completion is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127732" version="1" comment="systemd-sysvinit is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127733" version="1" comment="udev is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121339" version="1" comment="python-requests is &lt;2.8.1-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128797" version="1" comment="libspice-server1 is &lt;0.12.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128798" version="1" comment="spice is &lt;0.12.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128946" version="1" comment="libmysqlclient18 is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128947" version="1" comment="libmysqlclient18-32bit is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128948" version="1" comment="libmysqlclient_r18 is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128949" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128950" version="1" comment="mariadb is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128951" version="1" comment="mariadb-client is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128952" version="1" comment="mariadb-errormessages is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147398" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.31-13.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147399" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.31-13.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147083" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147084" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147087" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147088" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147089" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147090" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147091" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146506" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146507" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146508" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146509" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146510" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146511" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146512" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146513" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146514" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146515" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146516" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146517" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146518" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147923" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147924" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147925" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147926" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147927" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147928" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147929" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147930" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147931" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147932" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147933" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147934" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147935" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147966" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.121-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147967" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.121-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148004" version="1" comment="gnutls is &lt;3.2.15-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148005" version="1" comment="libgnutls28 is &lt;3.2.15-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148006" version="1" comment="libgnutls28-32bit is &lt;3.2.15-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148035" version="1" comment="cpio is &lt;2.11-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148036" version="1" comment="cpio-lang is &lt;2.11-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148137" version="1" comment="libspice-server1 is &lt;0.12.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148138" version="1" comment="spice is &lt;0.12.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148197" version="1" comment="libmysqlclient18 is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148198" version="1" comment="libmysqlclient18-32bit is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148199" version="1" comment="libmysqlclient_r18 is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148200" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148201" version="1" comment="mariadb is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148202" version="1" comment="mariadb-client is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148203" version="1" comment="mariadb-errormessages is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148246" version="1" comment="MozillaFirefox is &lt;45.7.0esr-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148247" version="1" comment="MozillaFirefox-translations is &lt;45.7.0esr-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148262" version="1" comment="opus is &lt;1.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148341" version="1" comment="libtiff5 is &lt;4.0.7-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148342" version="1" comment="libtiff5-32bit is &lt;4.0.7-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148343" version="1" comment="tiff is &lt;4.0.7-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148395" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-54.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148396" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-54.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148397" version="1" comment="openssl is &lt;1.0.1i-54.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148398" version="1" comment="kernel-default is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148399" version="1" comment="kernel-default-devel is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148400" version="1" comment="kernel-default-extra is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148401" version="1" comment="kernel-devel is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148402" version="1" comment="kernel-macros is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148403" version="1" comment="kernel-source is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148404" version="1" comment="kernel-syms is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148405" version="1" comment="kernel-xen is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148406" version="1" comment="kernel-xen-devel is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148435" version="1" comment="libXpm is &lt;3.5.11-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148539" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.131-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148540" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.131-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148658" version="1" comment="tigervnc is &lt;1.4.3-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148659" version="1" comment="xorg-x11-Xvnc is &lt;1.4.3-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148660" version="1" comment="kernel-default is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148661" version="1" comment="kernel-default-devel is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148662" version="1" comment="kernel-default-extra is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148663" version="1" comment="kernel-devel is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148664" version="1" comment="kernel-macros is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148665" version="1" comment="kernel-source is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148666" version="1" comment="kernel-syms is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148667" version="1" comment="kernel-xen is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148668" version="1" comment="kernel-xen-devel is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148669" version="1" comment="flash-player is &lt;24.0.0.221-158.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148670" version="1" comment="flash-player-gnome is &lt;24.0.0.221-158.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146849" version="1" comment="jasper is &lt;1.900.14-184.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146850" version="1" comment="libjasper1 is &lt;1.900.14-184.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146851" version="1" comment="libjasper1-32bit is &lt;1.900.14-184.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148700" version="1" comment="ImageMagick is &lt;6.8.8.1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148701" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148702" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148703" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148704" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148828" version="1" comment="libblkid1 is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148829" version="1" comment="libblkid1-32bit is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148830" version="1" comment="libmount1 is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148831" version="1" comment="libmount1-32bit is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148832" version="1" comment="libsmartcols1 is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148833" version="1" comment="libuuid-devel is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148834" version="1" comment="libuuid1 is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148835" version="1" comment="libuuid1-32bit is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148836" version="1" comment="python-libmount is &lt;2.25-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148837" version="1" comment="util-linux is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148838" version="1" comment="util-linux-lang is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148839" version="1" comment="util-linux-systemd is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148840" version="1" comment="uuidd is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148939" version="1" comment="xen is &lt;4.5.5_06-22.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148940" version="1" comment="xen-kmp-default is &lt;4.5.5_06_k3.12.69_60.64.32-22.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148941" version="1" comment="xen-libs is &lt;4.5.5_06-22.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148942" version="1" comment="xen-libs-32bit is &lt;4.5.5_06-22.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146177" version="1" comment="libz1 is &lt;1.2.8-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146178" version="1" comment="libz1-32bit is &lt;1.2.8-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146179" version="1" comment="zlib is &lt;1.2.8-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149099" version="1" comment="bind is &lt;9.9.9P1-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149100" version="1" comment="bind-libs is &lt;9.9.9P1-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149101" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149102" version="1" comment="bind-utils is &lt;9.9.9P1-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149122" version="1" comment="compat-openssl098 is &lt;0.9.8j-105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149133" version="1" comment="openssh is &lt;6.6p1-54.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149134" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-54.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149135" version="1" comment="openssh-helpers is &lt;6.6p1-54.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149136" version="1" comment="libquicktime is &lt;1.2.4-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149424" version="1" comment="dracut is &lt;037-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149562" version="1" comment="dbus-1 is &lt;1.8.22-24.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149563" version="1" comment="dbus-1-x11 is &lt;1.8.22-24.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149564" version="1" comment="libdbus-1-3 is &lt;1.8.22-24.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149565" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-24.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149566" version="1" comment="gegl is &lt;0.2.0-10.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149567" version="1" comment="gegl-0_2 is &lt;0.2.0-10.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149568" version="1" comment="gegl-0_2-lang is &lt;0.2.0-10.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149569" version="1" comment="libgegl-0_2-0 is &lt;0.2.0-10.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149570" version="1" comment="libvmtools0 is &lt;10.1.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149571" version="1" comment="open-vm-tools is &lt;10.1.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149572" version="1" comment="open-vm-tools-desktop is &lt;10.1.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149573" version="1" comment="flash-player is &lt;25.0.0.127-162.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149574" version="1" comment="flash-player-gnome is &lt;25.0.0.127-162.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149619" version="1" comment="MozillaFirefox is &lt;45.8.0esr-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149620" version="1" comment="MozillaFirefox-translations is &lt;45.8.0esr-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149947" version="1" comment="libpng16 is &lt;1.6.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149950" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149951" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149952" version="1" comment="libdcerpc0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149953" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149954" version="1" comment="libgensec0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149955" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149956" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149957" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149958" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149959" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149960" version="1" comment="libndr-standard0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149961" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149962" version="1" comment="libndr0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149963" version="1" comment="libndr0-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149964" version="1" comment="libnetapi0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149965" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149966" version="1" comment="libregistry0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149967" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149968" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149969" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149970" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149971" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149972" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149973" version="1" comment="libsamba-util0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149974" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149975" version="1" comment="libsamdb0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149976" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149977" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149978" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149979" version="1" comment="libsmbclient0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149980" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149981" version="1" comment="libsmbconf0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149982" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149983" version="1" comment="libsmbldap0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149984" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149985" version="1" comment="libtevent-util0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149986" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149987" version="1" comment="libwbclient0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149988" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149989" version="1" comment="samba is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149990" version="1" comment="samba-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149991" version="1" comment="samba-client is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149992" version="1" comment="samba-client-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149993" version="1" comment="samba-doc is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149994" version="1" comment="samba-libs is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149995" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149996" version="1" comment="samba-winbind is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149997" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149998" version="1" comment="libpng12 is &lt;1.2.50-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150001" version="1" comment="kernel-default is &lt;3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150002" version="1" comment="kernel-default-devel is &lt;3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150003" version="1" comment="kernel-default-extra is &lt;3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150004" version="1" comment="kernel-devel is &lt;3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150005" version="1" comment="kernel-macros is &lt;3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150006" version="1" comment="kernel-source is &lt;3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150007" version="1" comment="kernel-syms is &lt;3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150008" version="1" comment="kernel-xen is &lt;3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150009" version="1" comment="kernel-xen-devel is &lt;3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146876" version="1" comment="flash-player is &lt;24.0.0.194-155.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146877" version="1" comment="flash-player-gnome is &lt;24.0.0.194-155.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146878" version="1" comment="bind is &lt;9.9.9P1-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146879" version="1" comment="bind-libs is &lt;9.9.9P1-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146880" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146881" version="1" comment="bind-utils is &lt;9.9.9P1-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150809" version="1" comment="libpng15 is &lt;1.5.22-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150811" version="1" comment="jasper is &lt;1.900.14-194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150825" version="1" comment="gstreamer is &lt;1.2.4-2.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150826" version="1" comment="gstreamer-lang is &lt;1.2.4-2.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150827" version="1" comment="gstreamer-utils is &lt;1.2.4-2.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150828" version="1" comment="libgstreamer-1_0-0 is &lt;1.2.4-2.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150829" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.2.4-2.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150830" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.2.4-2.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151001" version="1" comment="flash-player is &lt;25.0.0.148-165.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151002" version="1" comment="flash-player-gnome is &lt;25.0.0.148-165.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154295" version="1" comment="bind is &lt;9.9.9P1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154296" version="1" comment="bind-libs is &lt;9.9.9P1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154297" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154298" version="1" comment="bind-utils is &lt;9.9.9P1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154318" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-11.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154319" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-11.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154320" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-11.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154321" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-11.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154322" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-11.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154323" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-11.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154324" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-11.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154325" version="1" comment="gstreamer-plugins-good is &lt;1.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154326" version="1" comment="gstreamer-plugins-good-lang is &lt;1.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154374" version="1" comment="gstreamer-plugins-base is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154375" version="1" comment="gstreamer-plugins-base-lang is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154376" version="1" comment="libgstallocators-1_0-0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154377" version="1" comment="libgstapp-1_0-0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154378" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154379" version="1" comment="libgstaudio-1_0-0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154380" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154381" version="1" comment="libgstfft-1_0-0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154382" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154383" version="1" comment="libgstpbutils-1_0-0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154384" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154385" version="1" comment="libgstriff-1_0-0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154386" version="1" comment="libgstrtp-1_0-0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154387" version="1" comment="libgstrtsp-1_0-0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154388" version="1" comment="libgstsdp-1_0-0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154389" version="1" comment="libgsttag-1_0-0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154390" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154391" version="1" comment="libgstvideo-1_0-0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154392" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154393" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154394" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154395" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154396" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154397" version="1" comment="libsndfile is &lt;1.0.25-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154398" version="1" comment="libsndfile1 is &lt;1.0.25-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154399" version="1" comment="libsndfile1-32bit is &lt;1.0.25-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154406" version="1" comment="ntp is &lt;4.2.8p10-60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154407" version="1" comment="ntp-doc is &lt;4.2.8p10-60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154606" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154607" version="1" comment="ruby2.1 is &lt;2.1.9-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154608" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154694" version="1" comment="tigervnc is &lt;1.4.3-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154695" version="1" comment="xorg-x11-Xvnc is &lt;1.4.3-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154701" version="1" comment="zziplib is &lt;0.13.62-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154702" version="1" comment="update-alternatives is &lt;1.16.10-12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154728" version="1" comment="libpcap is &lt;1.8.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154729" version="1" comment="libpcap1 is &lt;1.8.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154730" version="1" comment="libpcap1-32bit is &lt;1.8.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154807" version="1" comment="ghostscript is &lt;9.15-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154808" version="1" comment="ghostscript-x11 is &lt;9.15-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154906" version="1" comment="xen is &lt;4.5.5_10-22.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154907" version="1" comment="xen-kmp-default is &lt;4.5.5_10_k3.12.69_60.64.35-22.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154908" version="1" comment="xen-libs is &lt;4.5.5_10-22.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154909" version="1" comment="xen-libs-32bit is &lt;4.5.5_10-22.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154910" version="1" comment="graphite2 is &lt;1.3.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154913" version="1" comment="apparmor is &lt;2.8.2-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154914" version="1" comment="apparmor-docs is &lt;2.8.2-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154915" version="1" comment="apparmor-parser is &lt;2.8.2-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154916" version="1" comment="apparmor-profiles is &lt;2.8.2-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154917" version="1" comment="apparmor-utils is &lt;2.8.2-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154918" version="1" comment="libapparmor1 is &lt;2.8.2-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154919" version="1" comment="libapparmor1-32bit is &lt;2.8.2-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154920" version="1" comment="pam_apparmor is &lt;2.8.2-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154921" version="1" comment="pam_apparmor-32bit is &lt;2.8.2-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154922" version="1" comment="perl-apparmor is &lt;2.8.2-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154923" version="1" comment="firebird-classic is &lt;2.5.2.26539-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155280" version="1" comment="flash-player is &lt;25.0.0.171-168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155281" version="1" comment="flash-player-gnome is &lt;25.0.0.171-168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155303" version="1" comment="qemu is &lt;2.3.1-32.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155304" version="1" comment="qemu-block-curl is &lt;2.3.1-32.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155305" version="1" comment="qemu-ipxe is &lt;1.0.0-32.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155306" version="1" comment="qemu-kvm is &lt;2.3.1-32.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155307" version="1" comment="qemu-seabios is &lt;1.8.1-32.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155308" version="1" comment="qemu-sgabios is &lt;8-32.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155309" version="1" comment="qemu-tools is &lt;2.3.1-32.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155310" version="1" comment="qemu-vgabios is &lt;1.8.1-32.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155311" version="1" comment="qemu-x86 is &lt;2.3.1-32.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155312" version="1" comment="MozillaFirefox is &lt;45.9.0esr-105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155313" version="1" comment="MozillaFirefox-translations is &lt;45.9.0esr-105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155314" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.121-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155315" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.121-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155532" version="1" comment="libtirpc is &lt;0.2.3-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155533" version="1" comment="libtirpc1 is &lt;0.2.3-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155534" version="1" comment="libtirpc1-32bit is &lt;0.2.3-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155535" version="1" comment="libxslt is &lt;1.1.28-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155539" version="1" comment="libmysqlclient18 is &lt;10.0.30-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155540" version="1" comment="libmysqlclient18-32bit is &lt;10.0.30-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155541" version="1" comment="libmysqlclient_r18 is &lt;10.0.30-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155542" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.30-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155543" version="1" comment="mariadb is &lt;10.0.30-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155544" version="1" comment="mariadb-client is &lt;10.0.30-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155545" version="1" comment="mariadb-errormessages is &lt;10.0.30-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155613" version="1" comment="rpcbind is &lt;0.2.1_rc4-17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155647" version="1" comment="kernel-default is &lt;3.12.74-60.64.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155648" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155649" version="1" comment="kernel-default-extra is &lt;3.12.74-60.64.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155650" version="1" comment="kernel-devel is &lt;3.12.74-60.64.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155651" version="1" comment="kernel-macros is &lt;3.12.74-60.64.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155652" version="1" comment="kernel-source is &lt;3.12.74-60.64.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155653" version="1" comment="kernel-syms is &lt;3.12.74-60.64.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155654" version="1" comment="kernel-xen is &lt;3.12.74-60.64.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155655" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155678" version="1" comment="libxml2 is &lt;2.9.1-26.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155679" version="1" comment="libxml2-2 is &lt;2.9.1-26.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155680" version="1" comment="libxml2-2-32bit is &lt;2.9.1-26.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155681" version="1" comment="libxml2-tools is &lt;2.9.1-26.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155682" version="1" comment="python-libxml2 is &lt;2.9.1-26.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155683" version="1" comment="libsndfile is &lt;1.0.25-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155686" version="1" comment="libplist is &lt;1.8-10.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155687" version="1" comment="libplist++1 is &lt;1.8-10.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155688" version="1" comment="libplist1 is &lt;1.8-10.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155755" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155756" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155757" version="1" comment="libdcerpc0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155758" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155759" version="1" comment="libgensec0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155760" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155761" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155762" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155763" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155764" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155765" version="1" comment="libndr-standard0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155766" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155767" version="1" comment="libndr0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155768" version="1" comment="libndr0-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155769" version="1" comment="libnetapi0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155770" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155771" version="1" comment="libregistry0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155772" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155773" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155774" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155775" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155776" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155777" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155778" version="1" comment="libsamba-util0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155779" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155780" version="1" comment="libsamdb0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155781" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155782" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155783" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155784" version="1" comment="libsmbclient0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155785" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155786" version="1" comment="libsmbconf0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155787" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155788" version="1" comment="libsmbldap0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155789" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155790" version="1" comment="libtevent-util0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155791" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155792" version="1" comment="libwbclient0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155793" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155794" version="1" comment="samba is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155795" version="1" comment="samba-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155796" version="1" comment="samba-client is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155797" version="1" comment="samba-client-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155798" version="1" comment="samba-doc is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155799" version="1" comment="samba-libs is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155800" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155801" version="1" comment="samba-winbind is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155802" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156228" version="1" comment="libwireshark8 is &lt;2.2.6-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156229" version="1" comment="libwiretap6 is &lt;2.2.6-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156230" version="1" comment="libwscodecs1 is &lt;2.2.6-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156231" version="1" comment="libwsutil7 is &lt;2.2.6-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156232" version="1" comment="wireshark is &lt;2.2.6-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156233" version="1" comment="wireshark-gtk is &lt;2.2.6-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156234" version="1" comment="sudo is &lt;1.8.10p3-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147204" version="1" comment="gstreamer-plugins-base is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147205" version="1" comment="gstreamer-plugins-base-lang is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147206" version="1" comment="libgstallocators-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147207" version="1" comment="libgstapp-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147208" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147209" version="1" comment="libgstaudio-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147210" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147211" version="1" comment="libgstfft-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147212" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147213" version="1" comment="libgstpbutils-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147214" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147215" version="1" comment="libgstriff-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147216" version="1" comment="libgstrtp-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147217" version="1" comment="libgstrtsp-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147218" version="1" comment="libgstsdp-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147219" version="1" comment="libgsttag-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147220" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147221" version="1" comment="libgstvideo-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147222" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147223" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147224" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147225" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147226" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135543" version="1" comment="libX11 is &lt;1.6.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135544" version="1" comment="libX11-6 is &lt;1.6.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135545" version="1" comment="libX11-6-32bit is &lt;1.6.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135546" version="1" comment="libX11-data is &lt;1.6.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135547" version="1" comment="libX11-xcb1 is &lt;1.6.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135548" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135058" version="1" comment="libXfixes is &lt;5.0.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135549" version="1" comment="libXi is &lt;1.7.4-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135550" version="1" comment="libXi6 is &lt;1.7.4-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135551" version="1" comment="libXi6-32bit is &lt;1.7.4-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135552" version="1" comment="libXrender is &lt;0.9.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135078" version="1" comment="libXtst is &lt;1.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135083" version="1" comment="libXv is &lt;1.0.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135555" version="1" comment="libXvMC is &lt;1.0.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135679" version="1" comment="libpython3_4m1_0 is &lt;3.4.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135680" version="1" comment="python3 is &lt;3.4.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135681" version="1" comment="python3-base is &lt;3.4.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135682" version="1" comment="python3-curses is &lt;3.4.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135866" version="1" comment="qemu is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135867" version="1" comment="qemu-block-curl is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135868" version="1" comment="qemu-ipxe is &lt;1.0.0-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135869" version="1" comment="qemu-kvm is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135870" version="1" comment="qemu-seabios is &lt;1.9.1-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135871" version="1" comment="qemu-sgabios is &lt;8-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135872" version="1" comment="qemu-tools is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135873" version="1" comment="qemu-vgabios is &lt;1.9.1-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135874" version="1" comment="qemu-x86 is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135931" version="1" comment="sudo is &lt;1.8.10p3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136138" version="1" comment="libblkid1 is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136139" version="1" comment="libblkid1-32bit is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136140" version="1" comment="libfdisk1 is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136141" version="1" comment="libmount1 is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136142" version="1" comment="libmount1-32bit is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136143" version="1" comment="libsmartcols1 is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136144" version="1" comment="libuuid-devel is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136145" version="1" comment="libuuid1 is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136146" version="1" comment="libuuid1-32bit is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136147" version="1" comment="python-libmount is &lt;2.28-42.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136148" version="1" comment="util-linux is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136149" version="1" comment="util-linux-lang is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136150" version="1" comment="util-linux-systemd is &lt;2.28-42.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136151" version="1" comment="uuidd is &lt;2.28-42.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136647" version="1" comment="kernel-default is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136648" version="1" comment="kernel-default-devel is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136649" version="1" comment="kernel-default-extra is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136650" version="1" comment="kernel-devel is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136651" version="1" comment="kernel-macros is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136652" version="1" comment="kernel-source is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136653" version="1" comment="kernel-syms is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142153" version="1" comment="xen is &lt;4.7.1_02-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142154" version="1" comment="xen-libs is &lt;4.7.1_02-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142155" version="1" comment="xen-libs-32bit is &lt;4.7.1_02-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142722" version="1" comment="kernel-default is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142723" version="1" comment="kernel-default-devel is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142724" version="1" comment="kernel-default-extra is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142725" version="1" comment="kernel-devel is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142726" version="1" comment="kernel-macros is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142727" version="1" comment="kernel-source is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142728" version="1" comment="kernel-syms is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144642" version="1" comment="xen is &lt;4.7.1_04-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144643" version="1" comment="xen-libs is &lt;4.7.1_04-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144644" version="1" comment="xen-libs-32bit is &lt;4.7.1_04-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145908" version="1" comment="openjpeg2 is &lt;2.1.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145909" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145910" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145911" version="1" comment="libdcerpc0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145912" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145913" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145914" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145915" version="1" comment="libndr-nbt0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145916" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145917" version="1" comment="libndr-standard0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145918" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145919" version="1" comment="libndr0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145920" version="1" comment="libndr0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145921" version="1" comment="libnetapi0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145922" version="1" comment="libnetapi0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145923" version="1" comment="libsamba-credentials0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145924" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145925" version="1" comment="libsamba-errors0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145926" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145927" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145928" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145929" version="1" comment="libsamba-passdb0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145930" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145931" version="1" comment="libsamba-util0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145932" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145933" version="1" comment="libsamdb0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145934" version="1" comment="libsamdb0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145935" version="1" comment="libsmbclient0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145936" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145937" version="1" comment="libsmbconf0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145938" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145939" version="1" comment="libsmbldap0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145940" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145941" version="1" comment="libtevent-util0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145942" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145943" version="1" comment="libwbclient0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145944" version="1" comment="libwbclient0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145945" version="1" comment="samba is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145946" version="1" comment="samba-client is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145947" version="1" comment="samba-client-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145948" version="1" comment="samba-doc is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145949" version="1" comment="samba-libs is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145950" version="1" comment="samba-libs-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145951" version="1" comment="samba-winbind is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145952" version="1" comment="samba-winbind-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145953" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146015" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146016" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146017" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146018" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146019" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146020" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146021" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146022" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146023" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146024" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146025" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146026" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146145" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146146" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157165" version="1" comment="sudo is &lt;1.8.10p3-10.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147348" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147349" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147350" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147351" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147352" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147353" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147354" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147355" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147356" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147357" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147358" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147359" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147360" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147361" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147362" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147363" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147364" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147365" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147366" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147367" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147368" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147369" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147370" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157338" version="1" comment="cairo is &lt;1.15.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157345" version="1" comment="MozillaFirefox-branding-SLE is &lt;52-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157347" version="1" comment="libxml2 is &lt;2.9.4-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157348" version="1" comment="libxml2-2 is &lt;2.9.4-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157349" version="1" comment="libxml2-2-32bit is &lt;2.9.4-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157350" version="1" comment="libxml2-tools is &lt;2.9.4-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157351" version="1" comment="python-libxml2 is &lt;2.9.4-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157355" version="1" comment="poppler is &lt;0.24.4-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157356" version="1" comment="postgresql94 is &lt;9.4.12-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157580" version="1" comment="kernel-default is &lt;4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157581" version="1" comment="kernel-default-devel is &lt;4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157582" version="1" comment="kernel-default-extra is &lt;4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157583" version="1" comment="kernel-devel is &lt;4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157584" version="1" comment="kernel-macros is &lt;4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157585" version="1" comment="kernel-source is &lt;4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157586" version="1" comment="kernel-syms is &lt;4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157767" version="1" comment="libxml2 is &lt;2.9.4-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157772" version="1" comment="xen is &lt;4.7.2_06-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157773" version="1" comment="xen-libs is &lt;4.7.2_06-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157774" version="1" comment="xen-libs-32bit is &lt;4.7.2_06-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157915" version="1" comment="qemu is &lt;2.6.2-41.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157916" version="1" comment="qemu-block-curl is &lt;2.6.2-41.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157917" version="1" comment="qemu-ipxe is &lt;1.0.0-41.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157918" version="1" comment="qemu-kvm is &lt;2.6.2-41.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157919" version="1" comment="qemu-seabios is &lt;1.9.1-41.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157920" version="1" comment="qemu-sgabios is &lt;8-41.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157921" version="1" comment="qemu-tools is &lt;2.6.2-41.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157922" version="1" comment="qemu-vgabios is &lt;1.9.1-41.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157923" version="1" comment="qemu-x86 is &lt;2.6.2-41.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157924" version="1" comment="libsystemd0 is &lt;228-149.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157925" version="1" comment="libsystemd0-32bit is &lt;228-149.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157926" version="1" comment="libudev1 is &lt;228-149.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157927" version="1" comment="libudev1-32bit is &lt;228-149.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157928" version="1" comment="systemd is &lt;228-149.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157929" version="1" comment="systemd-32bit is &lt;228-149.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157930" version="1" comment="systemd-bash-completion is &lt;228-149.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157931" version="1" comment="systemd-sysvinit is &lt;228-149.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157932" version="1" comment="udev is &lt;228-149.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157933" version="1" comment="sudo is &lt;1.8.10p3-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157934" version="1" comment="libquicktime is &lt;1.2.4-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157935" version="1" comment="libquicktime0 is &lt;1.2.4-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157986" version="1" comment="libgcrypt is &lt;1.6.1-16.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157987" version="1" comment="libgcrypt20 is &lt;1.6.1-16.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157988" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157989" version="1" comment="libcares2 is &lt;1.9.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157990" version="1" comment="libcares2-32bit is &lt;1.9.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158170" version="1" comment="libncurses5 is &lt;5.9-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158171" version="1" comment="libncurses5-32bit is &lt;5.9-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158172" version="1" comment="libncurses6 is &lt;5.9-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158173" version="1" comment="libncurses6-32bit is &lt;5.9-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158174" version="1" comment="ncurses is &lt;5.9-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158175" version="1" comment="ncurses-devel is &lt;5.9-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158176" version="1" comment="ncurses-utils is &lt;5.9-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158177" version="1" comment="tack is &lt;5.9-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158178" version="1" comment="terminfo is &lt;5.9-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158179" version="1" comment="terminfo-base is &lt;5.9-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158180" version="1" comment="libixion is &lt;0.12.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158181" version="1" comment="libixion-0_12-0 is &lt;0.12.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158182" version="1" comment="libmwaw is &lt;0.3.11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158183" version="1" comment="libmwaw-0_3-3 is &lt;0.3.11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158184" version="1" comment="liborcus is &lt;0.12.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158185" version="1" comment="liborcus-0_12-0 is &lt;0.12.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158186" version="1" comment="libreoffice-base is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158187" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158188" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158189" version="1" comment="libreoffice-calc is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158190" version="1" comment="libreoffice-calc-extensions is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158191" version="1" comment="libreoffice-draw is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158192" version="1" comment="libreoffice-filters-optional is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158193" version="1" comment="libreoffice-gnome is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158194" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158195" version="1" comment="libreoffice-icon-theme-tango is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158196" version="1" comment="libreoffice-impress is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158197" version="1" comment="libreoffice-l10n-af is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158198" version="1" comment="libreoffice-l10n-ar is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158199" version="1" comment="libreoffice-l10n-ca is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158200" version="1" comment="libreoffice-l10n-cs is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158201" version="1" comment="libreoffice-l10n-da is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158202" version="1" comment="libreoffice-l10n-de is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158203" version="1" comment="libreoffice-l10n-en is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158204" version="1" comment="libreoffice-l10n-es is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158205" version="1" comment="libreoffice-l10n-fi is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158206" version="1" comment="libreoffice-l10n-fr is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158207" version="1" comment="libreoffice-l10n-gu is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158208" version="1" comment="libreoffice-l10n-hi is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158209" version="1" comment="libreoffice-l10n-hu is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158210" version="1" comment="libreoffice-l10n-it is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158211" version="1" comment="libreoffice-l10n-ja is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158212" version="1" comment="libreoffice-l10n-ko is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158213" version="1" comment="libreoffice-l10n-nb is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158214" version="1" comment="libreoffice-l10n-nl is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158215" version="1" comment="libreoffice-l10n-nn is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158216" version="1" comment="libreoffice-l10n-pl is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158217" version="1" comment="libreoffice-l10n-pt_BR is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158218" version="1" comment="libreoffice-l10n-pt_PT is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158219" version="1" comment="libreoffice-l10n-ro is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158220" version="1" comment="libreoffice-l10n-ru is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158221" version="1" comment="libreoffice-l10n-sk is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158222" version="1" comment="libreoffice-l10n-sv is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158223" version="1" comment="libreoffice-l10n-xh is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158224" version="1" comment="libreoffice-l10n-zh_CN is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158225" version="1" comment="libreoffice-l10n-zh_TW is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158226" version="1" comment="libreoffice-l10n-zu is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158227" version="1" comment="libreoffice-mailmerge is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158228" version="1" comment="libreoffice-math is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158229" version="1" comment="libreoffice-officebean is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158230" version="1" comment="libreoffice-pyuno is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158231" version="1" comment="libreoffice-writer is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158232" version="1" comment="libreoffice-writer-extensions is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158233" version="1" comment="libreofficekit is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158234" version="1" comment="libstaroffice is &lt;0.0.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158235" version="1" comment="libstaroffice-0_0-0 is &lt;0.0.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158236" version="1" comment="libzmf is &lt;0.0.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158237" version="1" comment="libzmf-0_0-0 is &lt;0.0.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158238" version="1" comment="myspell-af_NA is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158239" version="1" comment="myspell-af_ZA is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158240" version="1" comment="myspell-ar is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158241" version="1" comment="myspell-ar_AE is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158242" version="1" comment="myspell-ar_BH is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158243" version="1" comment="myspell-ar_DZ is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158244" version="1" comment="myspell-ar_EG is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158245" version="1" comment="myspell-ar_IQ is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158246" version="1" comment="myspell-ar_JO is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158247" version="1" comment="myspell-ar_KW is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158248" version="1" comment="myspell-ar_LB is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158249" version="1" comment="myspell-ar_LY is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158250" version="1" comment="myspell-ar_MA is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158251" version="1" comment="myspell-ar_OM is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158252" version="1" comment="myspell-ar_QA is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158253" version="1" comment="myspell-ar_SA is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158254" version="1" comment="myspell-ar_SD is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158255" version="1" comment="myspell-ar_SY is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158256" version="1" comment="myspell-ar_TN is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158257" version="1" comment="myspell-ar_YE is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158258" version="1" comment="myspell-be_BY is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158259" version="1" comment="myspell-bg_BG is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158260" version="1" comment="myspell-bn_BD is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158261" version="1" comment="myspell-bn_IN is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158262" version="1" comment="myspell-bs is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158263" version="1" comment="myspell-bs_BA is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158264" version="1" comment="myspell-ca is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158265" version="1" comment="myspell-ca_AD is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158266" version="1" comment="myspell-ca_ES is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158267" version="1" comment="myspell-ca_ES_valencia is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158268" version="1" comment="myspell-ca_FR is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158269" version="1" comment="myspell-ca_IT is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158270" version="1" comment="myspell-cs_CZ is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158271" version="1" comment="myspell-da_DK is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158272" version="1" comment="myspell-de is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158273" version="1" comment="myspell-de_AT is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158274" version="1" comment="myspell-de_CH is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158275" version="1" comment="myspell-de_DE is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158276" version="1" comment="myspell-dictionaries is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158277" version="1" comment="myspell-el_GR is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158278" version="1" comment="myspell-en is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158279" version="1" comment="myspell-en_AU is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158280" version="1" comment="myspell-en_BS is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158281" version="1" comment="myspell-en_BZ is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158282" version="1" comment="myspell-en_CA is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158283" version="1" comment="myspell-en_GB is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158284" version="1" comment="myspell-en_GH is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158285" version="1" comment="myspell-en_IE is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158286" version="1" comment="myspell-en_IN is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158287" version="1" comment="myspell-en_JM is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158288" version="1" comment="myspell-en_MW is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158289" version="1" comment="myspell-en_NA is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158290" version="1" comment="myspell-en_NZ is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158291" version="1" comment="myspell-en_PH is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158292" version="1" comment="myspell-en_TT is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158293" version="1" comment="myspell-en_US is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158294" version="1" comment="myspell-en_ZA is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158295" version="1" comment="myspell-en_ZW is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158296" version="1" comment="myspell-es is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158297" version="1" comment="myspell-es_AR is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158298" version="1" comment="myspell-es_BO is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158299" version="1" comment="myspell-es_CL is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158300" version="1" comment="myspell-es_CO is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158301" version="1" comment="myspell-es_CR is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158302" version="1" comment="myspell-es_CU is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158303" version="1" comment="myspell-es_DO is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158304" version="1" comment="myspell-es_EC is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158305" version="1" comment="myspell-es_ES is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158306" version="1" comment="myspell-es_GT is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158307" version="1" comment="myspell-es_HN is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158308" version="1" comment="myspell-es_MX is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158309" version="1" comment="myspell-es_NI is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158310" version="1" comment="myspell-es_PA is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158311" version="1" comment="myspell-es_PE is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158312" version="1" comment="myspell-es_PR is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158313" version="1" comment="myspell-es_PY is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158314" version="1" comment="myspell-es_SV is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158315" version="1" comment="myspell-es_UY is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158316" version="1" comment="myspell-es_VE is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158317" version="1" comment="myspell-et_EE is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158318" version="1" comment="myspell-fr_BE is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158319" version="1" comment="myspell-fr_CA is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158320" version="1" comment="myspell-fr_CH is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158321" version="1" comment="myspell-fr_FR is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158322" version="1" comment="myspell-fr_LU is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158323" version="1" comment="myspell-fr_MC is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158324" version="1" comment="myspell-gu_IN is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158325" version="1" comment="myspell-he_IL is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158326" version="1" comment="myspell-hi_IN is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158327" version="1" comment="myspell-hr_HR is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158328" version="1" comment="myspell-hu_HU is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158329" version="1" comment="myspell-it_IT is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158330" version="1" comment="myspell-lightproof-en is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158331" version="1" comment="myspell-lightproof-hu_HU is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158332" version="1" comment="myspell-lightproof-pt_BR is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158333" version="1" comment="myspell-lightproof-ru_RU is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158334" version="1" comment="myspell-lo_LA is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158335" version="1" comment="myspell-lt_LT is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158336" version="1" comment="myspell-lv_LV is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158337" version="1" comment="myspell-nb_NO is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158338" version="1" comment="myspell-nl_BE is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158339" version="1" comment="myspell-nl_NL is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158340" version="1" comment="myspell-nn_NO is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158341" version="1" comment="myspell-no is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158342" version="1" comment="myspell-pl_PL is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158343" version="1" comment="myspell-pt_AO is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158344" version="1" comment="myspell-pt_BR is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158345" version="1" comment="myspell-pt_PT is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158346" version="1" comment="myspell-ro is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158347" version="1" comment="myspell-ro_RO is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158348" version="1" comment="myspell-ru_RU is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158349" version="1" comment="myspell-sk_SK is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158350" version="1" comment="myspell-sl_SI is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158351" version="1" comment="myspell-sr is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158352" version="1" comment="myspell-sr_CS is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158353" version="1" comment="myspell-sr_Latn_CS is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158354" version="1" comment="myspell-sr_Latn_RS is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158355" version="1" comment="myspell-sr_RS is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158356" version="1" comment="myspell-sv_FI is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158357" version="1" comment="myspell-sv_SE is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158358" version="1" comment="myspell-te is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158359" version="1" comment="myspell-te_IN is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158360" version="1" comment="myspell-th_TH is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158361" version="1" comment="myspell-uk_UA is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158362" version="1" comment="myspell-vi is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158363" version="1" comment="myspell-vi_VN is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158364" version="1" comment="myspell-zu_ZA is &lt;20170511-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158424" version="1" comment="gnutls is &lt;3.2.15-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158425" version="1" comment="libgnutls28 is &lt;3.2.15-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158426" version="1" comment="libgnutls28-32bit is &lt;3.2.15-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158427" version="1" comment="libICE is &lt;1.0.8-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158428" version="1" comment="libICE6 is &lt;1.0.8-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158429" version="1" comment="libICE6-32bit is &lt;1.0.8-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158430" version="1" comment="libspice-server1 is &lt;0.12.7-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158431" version="1" comment="spice is &lt;0.12.7-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158776" version="1" comment="kernel-default is &lt;4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158777" version="1" comment="kernel-default-devel is &lt;4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158778" version="1" comment="kernel-default-extra is &lt;4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158779" version="1" comment="kernel-devel is &lt;4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158780" version="1" comment="kernel-macros is &lt;4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158781" version="1" comment="kernel-source is &lt;4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158782" version="1" comment="kernel-syms is &lt;4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158797" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-74.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158798" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-74.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158799" version="1" comment="libXdmcp is &lt;1.1.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158800" version="1" comment="libXdmcp6 is &lt;1.1.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158801" version="1" comment="libXdmcp6-32bit is &lt;1.1.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158878" version="1" comment="evince is &lt;3.20.1-6.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158879" version="1" comment="evince-browser-plugin is &lt;3.20.1-6.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158880" version="1" comment="evince-lang is &lt;3.20.1-6.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158881" version="1" comment="evince-plugin-djvudocument is &lt;3.20.1-6.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158882" version="1" comment="evince-plugin-dvidocument is &lt;3.20.1-6.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158883" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.1-6.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158884" version="1" comment="evince-plugin-psdocument is &lt;3.20.1-6.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158885" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.1-6.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158886" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.1-6.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158887" version="1" comment="libevdocument3-4 is &lt;3.20.1-6.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158888" version="1" comment="libevview3-3 is &lt;3.20.1-6.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158889" version="1" comment="nautilus-evince is &lt;3.20.1-6.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158890" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.1-6.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158891" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.1-6.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158902" version="1" comment="dracut is &lt;044.1-109.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158903" version="1" comment="libsystemd0 is &lt;228-150.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158904" version="1" comment="libsystemd0-32bit is &lt;228-150.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158905" version="1" comment="libudev1 is &lt;228-150.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158906" version="1" comment="libudev1-32bit is &lt;228-150.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158907" version="1" comment="systemd is &lt;228-150.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158908" version="1" comment="systemd-32bit is &lt;228-150.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158909" version="1" comment="systemd-bash-completion is &lt;228-150.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158910" version="1" comment="systemd-sysvinit is &lt;228-150.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158911" version="1" comment="udev is &lt;228-150.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159328" version="1" comment="jasper is &lt;1.900.14-195.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159329" version="1" comment="libjasper1 is &lt;1.900.14-195.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159330" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159505" version="1" comment="libquicktime is &lt;1.2.4-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159506" version="1" comment="libquicktime0 is &lt;1.2.4-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159507" version="1" comment="libical is &lt;1.0.1-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159508" version="1" comment="libical1 is &lt;1.0.1-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159509" version="1" comment="libical1-32bit is &lt;1.0.1-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159510" version="1" comment="libpoppler44 is &lt;0.24.4-14.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159511" version="1" comment="poppler is &lt;0.24.4-14.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159512" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159513" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159514" version="1" comment="libpoppler60 is &lt;0.43.0-16.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159515" version="1" comment="poppler-qt is &lt;0.43.0-16.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159516" version="1" comment="poppler-tools is &lt;0.43.0-16.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147400" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147401" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147402" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147403" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147404" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147405" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147406" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161357" version="1" comment="libmysqlclient18 is &lt;10.0.31-29.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161358" version="1" comment="libmysqlclient18-32bit is &lt;10.0.31-29.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161359" version="1" comment="libmysqlclient_r18 is &lt;10.0.31-29.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161360" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.31-29.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161361" version="1" comment="mariadb is &lt;10.0.31-29.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161362" version="1" comment="mariadb-client is &lt;10.0.31-29.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161363" version="1" comment="mariadb-errormessages is &lt;10.0.31-29.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161364" version="1" comment="libwireshark8 is &lt;2.2.8-48.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161365" version="1" comment="libwiretap6 is &lt;2.2.8-48.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161366" version="1" comment="libwscodecs1 is &lt;2.2.8-48.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161367" version="1" comment="libwsutil7 is &lt;2.2.8-48.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161368" version="1" comment="wireshark is &lt;2.2.8-48.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161369" version="1" comment="wireshark-gtk is &lt;2.2.8-48.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161400" version="1" comment="kernel-default is &lt;4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161401" version="1" comment="kernel-default-devel is &lt;4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161402" version="1" comment="kernel-default-extra is &lt;4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161403" version="1" comment="kernel-devel is &lt;4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161404" version="1" comment="kernel-macros is &lt;4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161405" version="1" comment="kernel-source is &lt;4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161406" version="1" comment="kernel-syms is &lt;4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161407" version="1" comment="libzypp is &lt;16.15.2-27.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161408" version="1" comment="zypper is &lt;1.13.30-18.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161409" version="1" comment="zypper-log is &lt;1.13.30-18.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161496" version="1" comment="libncurses5 is &lt;5.9-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161497" version="1" comment="libncurses5-32bit is &lt;5.9-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161498" version="1" comment="libncurses6 is &lt;5.9-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161499" version="1" comment="libncurses6-32bit is &lt;5.9-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161500" version="1" comment="ncurses is &lt;5.9-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161501" version="1" comment="ncurses-devel is &lt;5.9-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161502" version="1" comment="ncurses-utils is &lt;5.9-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161503" version="1" comment="tack is &lt;5.9-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161504" version="1" comment="terminfo is &lt;5.9-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161505" version="1" comment="terminfo-base is &lt;5.9-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146519" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146520" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146521" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146522" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146523" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146524" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146525" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146526" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146527" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146528" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146529" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146530" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146531" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161616" version="1" comment="puppet is &lt;3.8.5-15.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161617" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.18-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161618" version="1" comment="librsvg is &lt;2.40.18-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161619" version="1" comment="librsvg-2-2 is &lt;2.40.18-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161620" version="1" comment="librsvg-2-2-32bit is &lt;2.40.18-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161621" version="1" comment="rsvg-view is &lt;2.40.18-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161757" version="1" comment="libsoup is &lt;2.54.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161758" version="1" comment="libsoup-2_4-1 is &lt;2.54.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161759" version="1" comment="libsoup-2_4-1-32bit is &lt;2.54.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161760" version="1" comment="libsoup-lang is &lt;2.54.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161761" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.54.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161762" version="1" comment="kernel-default is &lt;4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161763" version="1" comment="kernel-default-devel is &lt;4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161764" version="1" comment="kernel-default-extra is &lt;4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161765" version="1" comment="kernel-devel is &lt;4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161766" version="1" comment="kernel-macros is &lt;4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161767" version="1" comment="kernel-source is &lt;4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161768" version="1" comment="kernel-syms is &lt;4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161786" version="1" comment="strongswan is &lt;5.1.3-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161787" version="1" comment="strongswan-doc is &lt;5.1.3-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161788" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161789" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161790" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161791" version="1" comment="openjpeg2 is &lt;2.1.0-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161792" version="1" comment="libxml2 is &lt;2.9.4-46.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161793" version="1" comment="libxml2-2 is &lt;2.9.4-46.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161794" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161795" version="1" comment="libxml2-tools is &lt;2.9.4-46.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161796" version="1" comment="python-libxml2 is &lt;2.9.4-46.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161962" version="1" comment="curl is &lt;7.37.0-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161963" version="1" comment="libcurl4 is &lt;7.37.0-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161964" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161965" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.144-27.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161966" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.144-27.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162111" version="1" comment="libplist is &lt;1.12-20.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162112" version="1" comment="libplist++3 is &lt;1.12-20.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162113" version="1" comment="libplist3 is &lt;1.12-20.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162114" version="1" comment="ImageMagick is &lt;6.8.8.1-71.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162115" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162116" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162117" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162118" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162178" version="1" comment="gnome-shell is &lt;3.20.4-77.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162179" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-77.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162180" version="1" comment="gnome-shell-calendar is &lt;3.20.4-77.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162181" version="1" comment="gnome-shell-lang is &lt;3.20.4-77.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162218" version="1" comment="freerdp is &lt;2.0.0~git.1463131968.4e66df7-12.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162219" version="1" comment="libfreerdp2 is &lt;2.0.0~git.1463131968.4e66df7-12.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147473" version="1" comment="openssh is &lt;7.2p2-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147474" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-66.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147475" version="1" comment="openssh-helpers is &lt;7.2p2-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162478" version="1" comment="libraw is &lt;0.15.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162479" version="1" comment="libraw9 is &lt;0.15.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162480" version="1" comment="expat is &lt;2.1.0-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162481" version="1" comment="libexpat1 is &lt;2.1.0-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162482" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162653" version="1" comment="icu is &lt;52.1-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162654" version="1" comment="libicu52_1 is &lt;52.1-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162655" version="1" comment="libicu52_1-32bit is &lt;52.1-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162656" version="1" comment="libicu52_1-data is &lt;52.1-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162933" version="1" comment="xen is &lt;4.7.3_03-43.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162934" version="1" comment="xen-libs is &lt;4.7.3_03-43.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162935" version="1" comment="xen-libs-32bit is &lt;4.7.3_03-43.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163124" version="1" comment="postgresql94 is &lt;9.4.13-21.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163125" version="1" comment="libecpg6 is &lt;9.6.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163126" version="1" comment="libpq5 is &lt;9.6.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163127" version="1" comment="libpq5-32bit is &lt;9.6.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163128" version="1" comment="postgresql96 is &lt;9.6.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163129" version="1" comment="postgresql96-libs is &lt;9.6.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163292" version="1" comment="gdk-pixbuf is &lt;2.34.0-19.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163293" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163294" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163295" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163296" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163297" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163298" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163348" version="1" comment="evince is &lt;3.20.1-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163349" version="1" comment="evince-browser-plugin is &lt;3.20.1-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163350" version="1" comment="evince-lang is &lt;3.20.1-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163351" version="1" comment="evince-plugin-djvudocument is &lt;3.20.1-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163352" version="1" comment="evince-plugin-dvidocument is &lt;3.20.1-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163353" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.1-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163354" version="1" comment="evince-plugin-psdocument is &lt;3.20.1-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163355" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.1-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163356" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.1-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163357" version="1" comment="libevdocument3-4 is &lt;3.20.1-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163358" version="1" comment="libevview3-3 is &lt;3.20.1-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163359" version="1" comment="nautilus-evince is &lt;3.20.1-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163360" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.1-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163361" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.1-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147623" version="1" comment="libsystemd0 is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147624" version="1" comment="libsystemd0-32bit is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147625" version="1" comment="libudev1 is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147626" version="1" comment="libudev1-32bit is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147627" version="1" comment="systemd is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147628" version="1" comment="systemd-32bit is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147629" version="1" comment="systemd-bash-completion is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147630" version="1" comment="systemd-sysvinit is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147631" version="1" comment="udev is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163575" version="1" comment="cvs is &lt;1.12.12-182.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147810" version="1" comment="dbus-1 is &lt;1.8.22-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147811" version="1" comment="dbus-1-x11 is &lt;1.8.22-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147812" version="1" comment="libdbus-1-3 is &lt;1.8.22-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147813" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164283" version="1" comment="xen is &lt;4.7.3_04-43.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164284" version="1" comment="xen-libs is &lt;4.7.3_04-43.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164285" version="1" comment="xen-libs-32bit is &lt;4.7.3_04-43.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164286" version="1" comment="kernel-default is &lt;4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164287" version="1" comment="kernel-default-devel is &lt;4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164288" version="1" comment="kernel-default-extra is &lt;4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164289" version="1" comment="kernel-devel is &lt;4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164290" version="1" comment="kernel-macros is &lt;4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164291" version="1" comment="kernel-source is &lt;4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164292" version="1" comment="kernel-syms is &lt;4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164440" version="1" comment="cpp48 is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164441" version="1" comment="gcc48 is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164442" version="1" comment="gcc48-32bit is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164443" version="1" comment="gcc48-c++ is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164444" version="1" comment="gcc48-gij is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164445" version="1" comment="gcc48-gij-32bit is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164446" version="1" comment="gcc48-info is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164447" version="1" comment="libasan0 is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164448" version="1" comment="libasan0-32bit is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164449" version="1" comment="libgcj48 is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164450" version="1" comment="libgcj48-32bit is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164451" version="1" comment="libgcj48-jar is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164452" version="1" comment="libgcj_bc1 is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164453" version="1" comment="libstdc++48-devel is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164454" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164489" version="1" comment="emacs is &lt;24.3-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164490" version="1" comment="emacs-info is &lt;24.3-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164491" version="1" comment="emacs-x11 is &lt;24.3-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164492" version="1" comment="etags is &lt;24.3-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164530" version="1" comment="libzip is &lt;0.11.1-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164531" version="1" comment="libzip2 is &lt;0.11.1-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164729" version="1" comment="libwireshark8 is &lt;2.2.9-48.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164730" version="1" comment="libwiretap6 is &lt;2.2.9-48.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164731" version="1" comment="libwscodecs1 is &lt;2.2.9-48.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164732" version="1" comment="libwsutil7 is &lt;2.2.9-48.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164733" version="1" comment="wireshark is &lt;2.2.9-48.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164734" version="1" comment="wireshark-gtk is &lt;2.2.9-48.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164753" version="1" comment="libtiff5 is &lt;4.0.8-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164754" version="1" comment="libtiff5-32bit is &lt;4.0.8-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164755" version="1" comment="tiff is &lt;4.0.8-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164756" version="1" comment="liblouis is &lt;2.6.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164757" version="1" comment="liblouis-data is &lt;2.6.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164758" version="1" comment="liblouis9 is &lt;2.6.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164759" version="1" comment="python3-louis is &lt;2.6.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164765" version="1" comment="MozillaFirefox is &lt;52.3.0esr-109.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164766" version="1" comment="MozillaFirefox-translations is &lt;52.3.0esr-109.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164846" version="1" comment="dnsmasq is &lt;2.78-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164980" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164981" version="1" comment="openjpeg2 is &lt;2.1.0-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164982" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164983" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164984" version="1" comment="libdcerpc0 is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164985" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164986" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164987" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164988" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164989" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164990" version="1" comment="libndr-standard0 is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164991" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164992" version="1" comment="libndr0 is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164993" version="1" comment="libndr0-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164994" version="1" comment="libnetapi0 is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164995" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164996" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164997" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164998" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164999" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165000" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165001" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165002" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165003" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165004" version="1" comment="libsamba-util0 is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165005" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165006" version="1" comment="libsamdb0 is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165007" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165008" version="1" comment="libsmbclient0 is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165009" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165010" version="1" comment="libsmbconf0 is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165011" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165012" version="1" comment="libsmbldap0 is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165013" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165014" version="1" comment="libtevent-util0 is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165015" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165016" version="1" comment="libwbclient0 is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165017" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165018" version="1" comment="samba is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165019" version="1" comment="samba-client is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165020" version="1" comment="samba-client-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165021" version="1" comment="samba-doc is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165022" version="1" comment="samba-libs is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165023" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165024" version="1" comment="samba-winbind is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165025" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165067" version="1" comment="krb5 is &lt;1.12.5-40.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165068" version="1" comment="krb5-32bit is &lt;1.12.5-40.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165069" version="1" comment="krb5-client is &lt;1.12.5-40.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165097" version="1" comment="MozillaFirefox is &lt;52.4.0esr-109.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165098" version="1" comment="MozillaFirefox-translations is &lt;52.4.0esr-109.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165099" version="1" comment="libfreebl3 is &lt;3.29.5-58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165100" version="1" comment="libfreebl3-32bit is &lt;3.29.5-58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165101" version="1" comment="libsoftokn3 is &lt;3.29.5-58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165102" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165103" version="1" comment="mozilla-nss is &lt;3.29.5-58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165104" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165105" version="1" comment="mozilla-nss-certs is &lt;3.29.5-58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165106" version="1" comment="mozilla-nss-certs-32bit is &lt;3.29.5-58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165107" version="1" comment="mozilla-nss-sysinit is &lt;3.29.5-58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165108" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.29.5-58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165109" version="1" comment="mozilla-nss-tools is &lt;3.29.5-58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165110" version="1" comment="libvirt is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165111" version="1" comment="libvirt-client is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165112" version="1" comment="libvirt-client-32bit is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165113" version="1" comment="libvirt-daemon is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165114" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165115" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165116" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165117" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165118" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165119" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165120" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165121" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165122" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165123" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165124" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165125" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165126" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165127" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165128" version="1" comment="libvirt-doc is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165685" version="1" comment="xerces-j2 is &lt;2.8.1-268.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165686" version="1" comment="wpa_supplicant is &lt;2.2-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165987" version="1" comment="curl is &lt;7.37.0-37.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165988" version="1" comment="libcurl4 is &lt;7.37.0-37.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165989" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165998" version="1" comment="openvpn is &lt;2.3.8-16.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166091" version="1" comment="tcpdump is &lt;4.9.2-14.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166092" version="1" comment="libwireshark8 is &lt;2.2.10-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166093" version="1" comment="libwiretap6 is &lt;2.2.10-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166094" version="1" comment="libwscodecs1 is &lt;2.2.10-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166095" version="1" comment="libwsutil7 is &lt;2.2.10-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166096" version="1" comment="wireshark is &lt;2.2.10-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166097" version="1" comment="wireshark-gtk is &lt;2.2.10-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166110" version="1" comment="xen is &lt;4.7.3_06-43.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166111" version="1" comment="xen-libs is &lt;4.7.3_06-43.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166112" version="1" comment="xen-libs-32bit is &lt;4.7.3_06-43.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166113" version="1" comment="kernel-default is &lt;4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166114" version="1" comment="kernel-default-devel is &lt;4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166115" version="1" comment="kernel-default-extra is &lt;4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166116" version="1" comment="kernel-devel is &lt;4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166117" version="1" comment="kernel-macros is &lt;4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166118" version="1" comment="kernel-source is &lt;4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166119" version="1" comment="kernel-syms is &lt;4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166128" version="1" comment="wget is &lt;1.14-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166493" version="1" comment="SuSEfirewall2 is &lt;3.6.312-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166494" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.18.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166495" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.18.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166496" version="1" comment="libwebkit2gtk3-lang is &lt;2.18.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166497" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.18.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166498" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.18.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166499" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.18.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166500" version="1" comment="webkit2gtk3 is &lt;2.18.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166501" version="1" comment="libwpd is &lt;0.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166502" version="1" comment="libwpd-0_10-10 is &lt;0.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166503" version="1" comment="qemu is &lt;2.6.2-41.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166504" version="1" comment="qemu-block-curl is &lt;2.6.2-41.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166505" version="1" comment="qemu-ipxe is &lt;1.0.0-41.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166506" version="1" comment="qemu-kvm is &lt;2.6.2-41.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166507" version="1" comment="qemu-seabios is &lt;1.9.1-41.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166508" version="1" comment="qemu-sgabios is &lt;8-41.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166509" version="1" comment="qemu-tools is &lt;2.6.2-41.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166510" version="1" comment="qemu-vgabios is &lt;1.9.1-41.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166511" version="1" comment="qemu-x86 is &lt;2.6.2-41.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166512" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166513" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166514" version="1" comment="libsss_sudo is &lt;1.13.4-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166515" version="1" comment="python-sssd-config is &lt;1.13.4-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166516" version="1" comment="sssd is &lt;1.13.4-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166517" version="1" comment="sssd-32bit is &lt;1.13.4-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166518" version="1" comment="sssd-ad is &lt;1.13.4-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166519" version="1" comment="sssd-ipa is &lt;1.13.4-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166520" version="1" comment="sssd-krb5 is &lt;1.13.4-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166521" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166522" version="1" comment="sssd-ldap is &lt;1.13.4-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166523" version="1" comment="sssd-proxy is &lt;1.13.4-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166524" version="1" comment="sssd-tools is &lt;1.13.4-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166650" version="1" comment="krb5 is &lt;1.12.5-40.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166651" version="1" comment="krb5-32bit is &lt;1.12.5-40.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166652" version="1" comment="krb5-client is &lt;1.12.5-40.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166653" version="1" comment="ImageMagick is &lt;6.8.8.1-71.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166654" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166655" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166656" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166657" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166658" version="1" comment="shadow is &lt;4.2.1-27.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166659" version="1" comment="libpoppler44 is &lt;0.24.4-14.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166660" version="1" comment="poppler is &lt;0.24.4-14.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166730" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166731" version="1" comment="samba is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166732" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.151-27.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166733" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.151-27.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149875" version="1" comment="ceph is &lt;10.2.4+git.1481215985.12b091b-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149876" version="1" comment="ceph-common is &lt;10.2.4+git.1481215985.12b091b-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149877" version="1" comment="libcephfs1 is &lt;10.2.4+git.1481215985.12b091b-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149878" version="1" comment="librados2 is &lt;10.2.4+git.1481215985.12b091b-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149879" version="1" comment="libradosstriper1 is &lt;10.2.4+git.1481215985.12b091b-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149880" version="1" comment="librbd1 is &lt;10.2.4+git.1481215985.12b091b-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149881" version="1" comment="python-cephfs is &lt;10.2.4+git.1481215985.12b091b-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149882" version="1" comment="python-rados is &lt;10.2.4+git.1481215985.12b091b-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149883" version="1" comment="python-rbd is &lt;10.2.4+git.1481215985.12b091b-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166988" version="1" comment="file is &lt;5.22-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166989" version="1" comment="file-magic is &lt;5.22-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166990" version="1" comment="libmagic1 is &lt;5.22-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166991" version="1" comment="libmagic1-32bit is &lt;5.22-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166992" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166993" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167012" version="1" comment="gimp is &lt;2.8.18-9.3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167013" version="1" comment="gimp-lang is &lt;2.8.18-9.3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167014" version="1" comment="gimp-plugins-python is &lt;2.8.18-9.3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167015" version="1" comment="libgimp-2_0-0 is &lt;2.8.18-9.3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167016" version="1" comment="libgimpui-2_0-0 is &lt;2.8.18-9.3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167077" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167078" version="1" comment="samba is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167079" version="1" comment="perl is &lt;5.18.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167080" version="1" comment="perl-32bit is &lt;5.18.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167081" version="1" comment="perl-base is &lt;5.18.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167082" version="1" comment="perl-doc is &lt;5.18.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167184" version="1" comment="kernel-firmware is &lt;20170530-21.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167185" version="1" comment="ucode-amd is &lt;20170530-21.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167186" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167187" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167188" version="1" comment="libdcerpc0 is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167189" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167190" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167191" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167192" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167193" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167194" version="1" comment="libndr-standard0 is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167195" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167196" version="1" comment="libndr0 is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167197" version="1" comment="libndr0-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167198" version="1" comment="libnetapi0 is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167199" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167200" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167201" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167202" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167203" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167204" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167205" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167206" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167207" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167208" version="1" comment="libsamba-util0 is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167209" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167210" version="1" comment="libsamdb0 is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167211" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167212" version="1" comment="libsmbclient0 is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167213" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167214" version="1" comment="libsmbconf0 is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167215" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167216" version="1" comment="libsmbldap0 is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167217" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167218" version="1" comment="libtevent-util0 is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167219" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167220" version="1" comment="libwbclient0 is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167221" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167222" version="1" comment="samba is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167223" version="1" comment="samba-client is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167224" version="1" comment="samba-client-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167225" version="1" comment="samba-doc is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167226" version="1" comment="samba-libs is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167227" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167228" version="1" comment="samba-winbind is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167229" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148047" version="1" comment="libxml2 is &lt;2.9.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148048" version="1" comment="libxml2-2 is &lt;2.9.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148049" version="1" comment="libxml2-2-32bit is &lt;2.9.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148050" version="1" comment="libxml2-tools is &lt;2.9.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148051" version="1" comment="python-libxml2 is &lt;2.9.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167294" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167295" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167296" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167297" version="1" comment="openssl is &lt;1.0.2j-60.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167367" version="1" comment="binutils is &lt;2.29.1-9.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167425" version="1" comment="xen is &lt;4.7.4_02-43.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167426" version="1" comment="xen-libs is &lt;4.7.4_02-43.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167427" version="1" comment="xen-libs-32bit is &lt;4.7.4_02-43.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167749" version="1" comment="MozillaFirefox is &lt;52.5.0esr-109.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167750" version="1" comment="MozillaFirefox-translations is &lt;52.5.0esr-109.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146182" version="1" comment="zlib is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148139" version="1" comment="libspice-server1 is &lt;0.12.7-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148140" version="1" comment="spice is &lt;0.12.7-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167751" version="1" comment="libXcursor is &lt;1.1.14-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167752" version="1" comment="libXcursor1 is &lt;1.1.14-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167753" version="1" comment="libXcursor1-32bit is &lt;1.1.14-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167754" version="1" comment="kernel-default is &lt;4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167755" version="1" comment="kernel-default-devel is &lt;4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167756" version="1" comment="kernel-default-extra is &lt;4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167757" version="1" comment="kernel-devel is &lt;4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167758" version="1" comment="kernel-macros is &lt;4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167759" version="1" comment="kernel-source is &lt;4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167760" version="1" comment="kernel-syms is &lt;4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167904" version="1" comment="openssh is &lt;7.2p2-74.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167905" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167906" version="1" comment="openssh-helpers is &lt;7.2p2-74.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168281" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168282" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168283" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168284" version="1" comment="openssl is &lt;1.0.2j-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168716" version="1" comment="ImageMagick is &lt;6.8.8.1-71.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168717" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168718" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168719" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168720" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168748" version="1" comment="libraw is &lt;0.15.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168749" version="1" comment="libraw9 is &lt;0.15.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168750" version="1" comment="libecpg6 is &lt;9.6.6-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168751" version="1" comment="libpq5 is &lt;9.6.6-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168752" version="1" comment="libpq5-32bit is &lt;9.6.6-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168753" version="1" comment="postgresql96 is &lt;9.6.6-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168754" version="1" comment="postgresql96-libs is &lt;9.6.6-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168779" version="1" comment="kernel-default is &lt;4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168780" version="1" comment="kernel-default-devel is &lt;4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168781" version="1" comment="kernel-default-extra is &lt;4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168782" version="1" comment="kernel-devel is &lt;4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168783" version="1" comment="kernel-macros is &lt;4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168784" version="1" comment="kernel-source is &lt;4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168785" version="1" comment="kernel-syms is &lt;4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168786" version="1" comment="evince is &lt;3.20.2-6.19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168787" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168788" version="1" comment="evince-lang is &lt;3.20.2-6.19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168789" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168790" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168791" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168792" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168793" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168794" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168795" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168796" version="1" comment="libevview3-3 is &lt;3.20.2-6.19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168797" version="1" comment="nautilus-evince is &lt;3.20.2-6.19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168798" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.2-6.19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168799" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.2-6.19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168910" version="1" comment="libwireshark8 is &lt;2.2.11-48.15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168911" version="1" comment="libwiretap6 is &lt;2.2.11-48.15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168912" version="1" comment="libwscodecs1 is &lt;2.2.11-48.15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168913" version="1" comment="libwsutil7 is &lt;2.2.11-48.15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168914" version="1" comment="wireshark is &lt;2.2.11-48.15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168915" version="1" comment="wireshark-gtk is &lt;2.2.11-48.15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168916" version="1" comment="gdk-pixbuf is &lt;2.34.0-19.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168917" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168918" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168919" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168920" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168921" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168922" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148841" version="1" comment="libblkid1 is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148842" version="1" comment="libblkid1-32bit is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148843" version="1" comment="libfdisk1 is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148844" version="1" comment="libmount1 is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148845" version="1" comment="libmount1-32bit is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148846" version="1" comment="libsmartcols1 is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148847" version="1" comment="libuuid-devel is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148848" version="1" comment="libuuid1 is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148849" version="1" comment="libuuid1-32bit is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148850" version="1" comment="python-libmount is &lt;2.28-44.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148851" version="1" comment="util-linux is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148852" version="1" comment="util-linux-lang is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148853" version="1" comment="util-linux-systemd is &lt;2.28-44.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148854" version="1" comment="uuidd is &lt;2.28-44.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148943" version="1" comment="xen is &lt;4.7.1_06-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148944" version="1" comment="xen-libs is &lt;4.7.1_06-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148945" version="1" comment="xen-libs-32bit is &lt;4.7.1_06-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149009" version="1" comment="kernel-default is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149010" version="1" comment="kernel-default-devel is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149011" version="1" comment="kernel-default-extra is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149012" version="1" comment="kernel-devel is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149013" version="1" comment="kernel-macros is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149014" version="1" comment="kernel-source is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149015" version="1" comment="kernel-syms is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149403" version="1" comment="libXvnc1 is &lt;1.6.0-16.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149404" version="1" comment="tigervnc is &lt;1.6.0-16.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149405" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-16.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149406" version="1" comment="qemu is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149407" version="1" comment="qemu-block-curl is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149408" version="1" comment="qemu-ipxe is &lt;1.0.0-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149409" version="1" comment="qemu-kvm is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149410" version="1" comment="qemu-seabios is &lt;1.9.1-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149411" version="1" comment="qemu-sgabios is &lt;8-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149412" version="1" comment="qemu-tools is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149413" version="1" comment="qemu-vgabios is &lt;1.9.1-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149414" version="1" comment="qemu-x86 is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149575" version="1" comment="gegl is &lt;0.2.0-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149579" version="1" comment="libvmtools0 is &lt;10.1.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149580" version="1" comment="open-vm-tools is &lt;10.1.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149581" version="1" comment="open-vm-tools-desktop is &lt;10.1.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149817" version="1" comment="virglrenderer is &lt;0.5.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150010" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150011" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150012" version="1" comment="libdcerpc0 is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150013" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150014" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150015" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150016" version="1" comment="libndr-nbt0 is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150017" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150018" version="1" comment="libndr-standard0 is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150019" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150020" version="1" comment="libndr0 is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150021" version="1" comment="libndr0-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150022" version="1" comment="libnetapi0 is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150023" version="1" comment="libnetapi0-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150024" version="1" comment="libsamba-credentials0 is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150025" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150026" version="1" comment="libsamba-errors0 is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150027" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150028" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150029" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150030" version="1" comment="libsamba-passdb0 is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150031" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150032" version="1" comment="libsamba-util0 is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150033" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150034" version="1" comment="libsamdb0 is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150035" version="1" comment="libsamdb0-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150036" version="1" comment="libsmbclient0 is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150037" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150038" version="1" comment="libsmbconf0 is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150039" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150040" version="1" comment="libsmbldap0 is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150041" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150042" version="1" comment="libtevent-util0 is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150043" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150044" version="1" comment="libwbclient0 is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150045" version="1" comment="libwbclient0-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150046" version="1" comment="samba is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150047" version="1" comment="samba-client is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150048" version="1" comment="samba-client-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150049" version="1" comment="samba-doc is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150050" version="1" comment="samba-libs is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150051" version="1" comment="samba-libs-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150052" version="1" comment="samba-winbind is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150053" version="1" comment="samba-winbind-32bit is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150054" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150055" version="1" comment="kernel-default is &lt;4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150056" version="1" comment="kernel-default-devel is &lt;4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150057" version="1" comment="kernel-default-extra is &lt;4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150058" version="1" comment="kernel-devel is &lt;4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150059" version="1" comment="kernel-macros is &lt;4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150060" version="1" comment="kernel-source is &lt;4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150061" version="1" comment="kernel-syms is &lt;4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150814" version="1" comment="dracut is &lt;044-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150915" version="1" comment="xen is &lt;4.7.2_02-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150916" version="1" comment="xen-libs is &lt;4.7.2_02-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150917" version="1" comment="xen-libs-32bit is &lt;4.7.2_02-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154334" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154335" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-12.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154925" version="1" comment="xen is &lt;4.7.2_04-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154926" version="1" comment="xen-libs is &lt;4.7.2_04-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154927" version="1" comment="xen-libs-32bit is &lt;4.7.2_04-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146960" version="1" comment="qemu is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146961" version="1" comment="qemu-block-curl is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146962" version="1" comment="qemu-ipxe is &lt;1.0.0-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146963" version="1" comment="qemu-kvm is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146964" version="1" comment="qemu-seabios is &lt;1.9.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146965" version="1" comment="qemu-sgabios is &lt;8-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146966" version="1" comment="qemu-tools is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146967" version="1" comment="qemu-vgabios is &lt;1.9.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146968" version="1" comment="qemu-x86 is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155051" version="1" comment="kernel-default is &lt;4.4.59-92.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155052" version="1" comment="kernel-default-devel is &lt;4.4.59-92.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155053" version="1" comment="kernel-default-extra is &lt;4.4.59-92.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155054" version="1" comment="kernel-devel is &lt;4.4.59-92.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155055" version="1" comment="kernel-macros is &lt;4.4.59-92.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155056" version="1" comment="kernel-source is &lt;4.4.59-92.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155057" version="1" comment="kernel-syms is &lt;4.4.59-92.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155552" version="1" comment="libtirpc is &lt;1.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155694" version="1" comment="libplist is &lt;1.12-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155803" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155804" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155805" version="1" comment="libdcerpc0 is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155806" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155807" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155808" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155809" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155810" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155811" version="1" comment="libndr-standard0 is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155812" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155813" version="1" comment="libndr0 is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155814" version="1" comment="libndr0-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155815" version="1" comment="libnetapi0 is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155816" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155817" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155818" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155819" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155820" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155821" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155822" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155823" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155824" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155825" version="1" comment="libsamba-util0 is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155826" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155827" version="1" comment="libsamdb0 is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155828" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155829" version="1" comment="libsmbclient0 is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155830" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155831" version="1" comment="libsmbconf0 is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155832" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155833" version="1" comment="libsmbldap0 is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155834" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155835" version="1" comment="libtevent-util0 is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155836" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155837" version="1" comment="libwbclient0 is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155838" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155839" version="1" comment="samba is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155840" version="1" comment="samba-client is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155841" version="1" comment="samba-client-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155842" version="1" comment="samba-doc is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155843" version="1" comment="samba-libs is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155844" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155845" version="1" comment="samba-winbind is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155846" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155847" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147227" version="1" comment="kernel-default is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147228" version="1" comment="kernel-default-devel is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147229" version="1" comment="kernel-default-extra is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147230" version="1" comment="kernel-devel is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147231" version="1" comment="kernel-macros is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147232" version="1" comment="kernel-source is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147233" version="1" comment="kernel-syms is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156237" version="1" comment="sudo is &lt;1.8.10p3-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156238" version="1" comment="libxml2 is &lt;2.9.4-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156239" version="1" comment="libxml2-2 is &lt;2.9.4-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156240" version="1" comment="libxml2-2-32bit is &lt;2.9.4-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156241" version="1" comment="libxml2-tools is &lt;2.9.4-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156242" version="1" comment="python-libxml2 is &lt;2.9.4-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156350" version="1" comment="libnettle is &lt;2.7.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156760" version="1" comment="libxml2 is &lt;2.9.4-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156761" version="1" comment="libxml2-2 is &lt;2.9.4-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156762" version="1" comment="libxml2-2-32bit is &lt;2.9.4-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156763" version="1" comment="libxml2-tools is &lt;2.9.4-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156764" version="1" comment="python-libxml2 is &lt;2.9.4-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156823" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156824" version="1" comment="libQt5Core5 is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156825" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156826" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156827" version="1" comment="libQt5Network5 is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156828" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156829" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156830" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156831" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156832" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156833" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156834" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156835" version="1" comment="libQt5Test5 is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156836" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156837" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156838" version="1" comment="libQtQuick5 is &lt;5.6.1-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156839" version="1" comment="libqt5-qtbase is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156840" version="1" comment="libqt5-qtdeclarative is &lt;5.6.1-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156954" version="1" comment="libgcrypt is &lt;1.6.1-16.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156965" version="1" comment="kernel-default is &lt;4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156966" version="1" comment="kernel-default-devel is &lt;4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156967" version="1" comment="kernel-default-extra is &lt;4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156968" version="1" comment="kernel-devel is &lt;4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156969" version="1" comment="kernel-macros is &lt;4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156970" version="1" comment="kernel-source is &lt;4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156971" version="1" comment="kernel-syms is &lt;4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157166" version="1" comment="openvpn is &lt;2.3.8-16.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169810" version="1" comment="gd is &lt;2.1.0-24.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169811" version="1" comment="gd-32bit is &lt;2.1.0-24.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169034" version="1" comment="kernel-default is &lt;4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169035" version="1" comment="kernel-default-devel is &lt;4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169036" version="1" comment="kernel-default-extra is &lt;4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169037" version="1" comment="kernel-devel is &lt;4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169038" version="1" comment="kernel-macros is &lt;4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169039" version="1" comment="kernel-source is &lt;4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169040" version="1" comment="kernel-syms is &lt;4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169960" version="1" comment="rsync is &lt;3.1.0-13.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169961" version="1" comment="procmail is &lt;3.22-269.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169973" version="1" comment="libvpx is &lt;1.3.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169974" version="1" comment="libvpx1 is &lt;1.3.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169975" version="1" comment="libvpx1-32bit is &lt;1.3.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169976" version="1" comment="vpx-tools is &lt;1.3.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170033" version="1" comment="libwireshark8 is &lt;2.2.12-48.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170034" version="1" comment="libwiretap6 is &lt;2.2.12-48.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170035" version="1" comment="libwscodecs1 is &lt;2.2.12-48.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170036" version="1" comment="libwsutil7 is &lt;2.2.12-48.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170037" version="1" comment="wireshark is &lt;2.2.12-48.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170038" version="1" comment="wireshark-gtk is &lt;2.2.12-48.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170039" version="1" comment="libexif is &lt;0.6.21-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170040" version="1" comment="libexif12 is &lt;0.6.21-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170041" version="1" comment="libexif12-32bit is &lt;0.6.21-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169041" version="1" comment="ImageMagick is &lt;6.8.8.1-71.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169042" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169043" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169044" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169045" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170042" version="1" comment="libevent is &lt;2.0.21-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170043" version="1" comment="libevent-2_0-5 is &lt;2.0.21-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170066" version="1" comment="curl is &lt;7.37.0-37.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170067" version="1" comment="libcurl4 is &lt;7.37.0-37.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170068" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169046" version="1" comment="libvorbis is &lt;1.3.3-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169047" version="1" comment="libvorbis0 is &lt;1.3.3-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169048" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169049" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169050" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169051" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169052" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170069" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.18.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170070" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.18.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170071" version="1" comment="libwebkit2gtk3-lang is &lt;2.18.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170072" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.18.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170073" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.18.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170074" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.18.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170075" version="1" comment="webkit2gtk3 is &lt;2.18.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170244" version="1" comment="transfig is &lt;3.2.5e-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170425" version="1" comment="clamav is &lt;0.99.3-33.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170443" version="1" comment="gd is &lt;2.1.0-24.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170444" version="1" comment="gd-32bit is &lt;2.1.0-24.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170445" version="1" comment="libncurses5 is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170446" version="1" comment="libncurses5-32bit is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170447" version="1" comment="libncurses6 is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170448" version="1" comment="libncurses6-32bit is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170449" version="1" comment="ncurses is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170450" version="1" comment="ncurses-devel is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170451" version="1" comment="ncurses-utils is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170452" version="1" comment="tack is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170453" version="1" comment="terminfo is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170454" version="1" comment="terminfo-base is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170455" version="1" comment="libsystemd0 is &lt;228-150.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170456" version="1" comment="libsystemd0-32bit is &lt;228-150.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170457" version="1" comment="libudev1 is &lt;228-150.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170458" version="1" comment="libudev1-32bit is &lt;228-150.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170459" version="1" comment="systemd is &lt;228-150.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170460" version="1" comment="systemd-32bit is &lt;228-150.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170461" version="1" comment="systemd-bash-completion is &lt;228-150.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170462" version="1" comment="systemd-sysvinit is &lt;228-150.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170463" version="1" comment="udev is &lt;228-150.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170464" version="1" comment="bind is &lt;9.9.9P1-63.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170465" version="1" comment="bind-libs is &lt;9.9.9P1-63.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170466" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170467" version="1" comment="bind-utils is &lt;9.9.9P1-63.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170837" version="1" comment="libXfont is &lt;1.5.1-11.3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170838" version="1" comment="libXfont1 is &lt;1.5.1-11.3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170839" version="1" comment="ecryptfs-utils is &lt;103-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170840" version="1" comment="ecryptfs-utils-32bit is &lt;103-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170867" version="1" comment="ImageMagick is &lt;6.8.8.1-71.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170868" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170869" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170870" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170871" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170872" version="1" comment="libsndfile is &lt;1.0.25-36.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170873" version="1" comment="libsndfile1 is &lt;1.0.25-36.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170874" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170911" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170912" version="1" comment="libjpeg62 is &lt;62.2.0-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170913" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170914" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170915" version="1" comment="libjpeg8 is &lt;8.1.2-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170916" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170917" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170918" version="1" comment="spice-vdagent is &lt;0.16.0-8.5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170919" version="1" comment="MozillaFirefox is &lt;52.6.0esr-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170920" version="1" comment="MozillaFirefox-translations is &lt;52.6.0esr-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169298" version="1" comment="qemu is &lt;2.6.2-41.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169299" version="1" comment="qemu-block-curl is &lt;2.6.2-41.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169300" version="1" comment="qemu-ipxe is &lt;1.0.0-41.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169301" version="1" comment="qemu-kvm is &lt;2.6.2-41.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169302" version="1" comment="qemu-seabios is &lt;1.9.1-41.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169303" version="1" comment="qemu-sgabios is &lt;8-41.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169304" version="1" comment="qemu-tools is &lt;2.6.2-41.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169305" version="1" comment="qemu-vgabios is &lt;1.9.1-41.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169306" version="1" comment="qemu-x86 is &lt;2.6.2-41.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170929" version="1" comment="libmysqlclient18 is &lt;10.0.33-29.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170930" version="1" comment="libmysqlclient18-32bit is &lt;10.0.33-29.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170931" version="1" comment="libmysqlclient_r18 is &lt;10.0.33-29.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170932" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.33-29.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170933" version="1" comment="mariadb is &lt;10.0.33-29.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170934" version="1" comment="mariadb-client is &lt;10.0.33-29.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170935" version="1" comment="mariadb-errormessages is &lt;10.0.33-29.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170936" version="1" comment="libvirt is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170937" version="1" comment="libvirt-client is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170938" version="1" comment="libvirt-client-32bit is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170939" version="1" comment="libvirt-daemon is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170940" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170941" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170942" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170943" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170944" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170945" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170946" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170947" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170948" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170949" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170950" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170951" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170952" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170953" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170954" version="1" comment="libvirt-doc is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171011" version="1" comment="libxml2 is &lt;2.9.4-46.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171012" version="1" comment="libxml2-2 is &lt;2.9.4-46.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171013" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171014" version="1" comment="libxml2-tools is &lt;2.9.4-46.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171015" version="1" comment="python-libxml2 is &lt;2.9.4-46.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171092" version="1" comment="ghostscript is &lt;9.15-23.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171093" version="1" comment="ghostscript-x11 is &lt;9.15-23.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171094" version="1" comment="kernel-default is &lt;4.4.114-92.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171095" version="1" comment="kernel-default-devel is &lt;4.4.114-92.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171096" version="1" comment="kernel-default-extra is &lt;4.4.114-92.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171097" version="1" comment="kernel-devel is &lt;4.4.114-92.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171098" version="1" comment="kernel-macros is &lt;4.4.114-92.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171099" version="1" comment="kernel-source is &lt;4.4.114-92.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171100" version="1" comment="kernel-syms is &lt;4.4.114-92.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171101" version="1" comment="freetype2 is &lt;2.6.3-7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171102" version="1" comment="ft2demos is &lt;2.6.3-7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171103" version="1" comment="libfreetype6 is &lt;2.6.3-7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171104" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171162" version="1" comment="libreoffice-base is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171163" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171164" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171165" version="1" comment="libreoffice-calc is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171166" version="1" comment="libreoffice-calc-extensions is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171167" version="1" comment="libreoffice-draw is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171168" version="1" comment="libreoffice-filters-optional is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171169" version="1" comment="libreoffice-gnome is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171170" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171171" version="1" comment="libreoffice-icon-theme-tango is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171172" version="1" comment="libreoffice-impress is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171173" version="1" comment="libreoffice-l10n-af is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171174" version="1" comment="libreoffice-l10n-ar is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171175" version="1" comment="libreoffice-l10n-ca is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171176" version="1" comment="libreoffice-l10n-cs is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171177" version="1" comment="libreoffice-l10n-da is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171178" version="1" comment="libreoffice-l10n-de is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171179" version="1" comment="libreoffice-l10n-en is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171180" version="1" comment="libreoffice-l10n-es is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171181" version="1" comment="libreoffice-l10n-fi is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171182" version="1" comment="libreoffice-l10n-fr is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171183" version="1" comment="libreoffice-l10n-gu is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171184" version="1" comment="libreoffice-l10n-hi is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171185" version="1" comment="libreoffice-l10n-hu is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171186" version="1" comment="libreoffice-l10n-it is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171187" version="1" comment="libreoffice-l10n-ja is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171188" version="1" comment="libreoffice-l10n-ko is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171189" version="1" comment="libreoffice-l10n-nb is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171190" version="1" comment="libreoffice-l10n-nl is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171191" version="1" comment="libreoffice-l10n-nn is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171192" version="1" comment="libreoffice-l10n-pl is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171193" version="1" comment="libreoffice-l10n-pt_BR is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171194" version="1" comment="libreoffice-l10n-pt_PT is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171195" version="1" comment="libreoffice-l10n-ro is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171196" version="1" comment="libreoffice-l10n-ru is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171197" version="1" comment="libreoffice-l10n-sk is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171198" version="1" comment="libreoffice-l10n-sv is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171199" version="1" comment="libreoffice-l10n-xh is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171200" version="1" comment="libreoffice-l10n-zh_CN is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171201" version="1" comment="libreoffice-l10n-zh_TW is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171202" version="1" comment="libreoffice-l10n-zu is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171203" version="1" comment="libreoffice-mailmerge is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171204" version="1" comment="libreoffice-math is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171205" version="1" comment="libreoffice-officebean is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171206" version="1" comment="libreoffice-pyuno is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171207" version="1" comment="libreoffice-writer is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171208" version="1" comment="libreoffice-writer-extensions is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171209" version="1" comment="libreofficekit is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171438" version="1" comment="glibc is &lt;2.22-62.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171439" version="1" comment="glibc-32bit is &lt;2.22-62.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171440" version="1" comment="glibc-devel is &lt;2.22-62.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171441" version="1" comment="glibc-devel-32bit is &lt;2.22-62.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171442" version="1" comment="glibc-i18ndata is &lt;2.22-62.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171443" version="1" comment="glibc-locale is &lt;2.22-62.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171444" version="1" comment="glibc-locale-32bit is &lt;2.22-62.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171445" version="1" comment="nscd is &lt;2.22-62.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171463" version="1" comment="p7zip is &lt;9.20.1-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171518" version="1" comment="xen is &lt;4.7.4_06-43.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171519" version="1" comment="xen-libs is &lt;4.7.4_06-43.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171520" version="1" comment="xen-libs-32bit is &lt;4.7.4_06-43.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171521" version="1" comment="libecpg6 is &lt;9.6.7-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171522" version="1" comment="libpq5 is &lt;9.6.7-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171523" version="1" comment="libpq5-32bit is &lt;9.6.7-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171524" version="1" comment="postgresql96 is &lt;9.6.7-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171525" version="1" comment="postgresql96-libs is &lt;9.6.7-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171526" version="1" comment="db48-utils is &lt;4.8.30-29.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171527" version="1" comment="libdb-4_8 is &lt;4.8.30-29.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171528" version="1" comment="libdb-4_8-32bit is &lt;4.8.30-29.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172323" version="1" comment="dhcp is &lt;4.3.3-10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172324" version="1" comment="dhcp-client is &lt;4.3.3-10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172459" version="1" comment="libsystemd0 is &lt;228-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172460" version="1" comment="libsystemd0-32bit is &lt;228-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172461" version="1" comment="libudev1 is &lt;228-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172462" version="1" comment="libudev1-32bit is &lt;228-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172463" version="1" comment="systemd is &lt;228-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172464" version="1" comment="systemd-32bit is &lt;228-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172465" version="1" comment="systemd-bash-completion is &lt;228-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172466" version="1" comment="systemd-sysvinit is &lt;228-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172467" version="1" comment="udev is &lt;228-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172489" version="1" comment="libzzip-0-13 is &lt;0.13.67-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172490" version="1" comment="zziplib is &lt;0.13.67-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172606" version="1" comment="puppet is &lt;3.8.5-15.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172607" version="1" comment="ImageMagick is &lt;6.8.8.1-71.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172608" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172609" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172610" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172611" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172641" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172642" version="1" comment="libIlmImf-Imf_2_1-21-32bit is &lt;2.1.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172643" version="1" comment="openexr is &lt;2.1.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169338" version="1" comment="ImageMagick is &lt;6.8.8.1-71.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169339" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169340" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169341" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169342" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172682" version="1" comment="cups-client is &lt;1.7.5-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172683" version="1" comment="cups-libs is &lt;1.7.5-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172684" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172685" version="1" comment="libwavpack1 is &lt;4.60.99-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172686" version="1" comment="wavpack is &lt;4.60.99-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172757" version="1" comment="libyaml-cpp0_5 is &lt;0.5.3-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172758" version="1" comment="yaml-cpp is &lt;0.5.3-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172771" version="1" comment="shotwell is &lt;0.22.0+git.20160103-15.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172772" version="1" comment="shotwell-lang is &lt;0.22.0+git.20160103-15.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172787" version="1" comment="augeas is &lt;1.2.0-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172788" version="1" comment="augeas-lenses is &lt;1.2.0-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172789" version="1" comment="libaugeas0 is &lt;1.2.0-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172790" version="1" comment="glibc is &lt;2.22-62.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172791" version="1" comment="glibc-32bit is &lt;2.22-62.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172792" version="1" comment="glibc-devel is &lt;2.22-62.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172793" version="1" comment="glibc-devel-32bit is &lt;2.22-62.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172794" version="1" comment="glibc-i18ndata is &lt;2.22-62.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172795" version="1" comment="glibc-locale is &lt;2.22-62.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172796" version="1" comment="glibc-locale-32bit is &lt;2.22-62.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172797" version="1" comment="nscd is &lt;2.22-62.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172946" version="1" comment="shadow is &lt;4.2.1-27.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172947" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.171-43.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172948" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.171-43.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172949" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.161-27.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172950" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.161-27.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173003" version="1" comment="postgresql94 is &lt;9.4.16-21.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173004" version="1" comment="kernel-firmware is &lt;20170530-21.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173005" version="1" comment="ucode-amd is &lt;20170530-21.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173006" version="1" comment="libcdio is &lt;0.90-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173007" version="1" comment="libcdio14 is &lt;0.90-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173008" version="1" comment="libcdio14-32bit is &lt;0.90-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173009" version="1" comment="libiso9660-8 is &lt;0.90-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173052" version="1" comment="libmysqlclient18 is &lt;10.0.34-29.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173053" version="1" comment="libmysqlclient18-32bit is &lt;10.0.34-29.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173054" version="1" comment="libmysqlclient_r18 is &lt;10.0.34-29.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173055" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.34-29.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173056" version="1" comment="mariadb is &lt;10.0.34-29.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173057" version="1" comment="mariadb-client is &lt;10.0.34-29.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173058" version="1" comment="mariadb-errormessages is &lt;10.0.34-29.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173106" version="1" comment="ucode-intel is &lt;20180312-13.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173107" version="1" comment="libid3tag is &lt;0.15.1b-184.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173108" version="1" comment="libid3tag0 is &lt;0.15.1b-184.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173373" version="1" comment="libecpg6 is &lt;9.6.8-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173374" version="1" comment="libpq5 is &lt;9.6.8-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173375" version="1" comment="libpq5-32bit is &lt;9.6.8-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173376" version="1" comment="postgresql96 is &lt;9.6.8-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173377" version="1" comment="postgresql96-libs is &lt;9.6.8-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173484" version="1" comment="curl is &lt;7.37.0-37.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173485" version="1" comment="libcurl4 is &lt;7.37.0-37.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173486" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173600" version="1" comment="libvorbis is &lt;1.3.3-10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173601" version="1" comment="libvorbis0 is &lt;1.3.3-10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173602" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173603" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173604" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173605" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173606" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173607" version="1" comment="kernel-default is &lt;4.4.120-92.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173608" version="1" comment="kernel-default-devel is &lt;4.4.120-92.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173609" version="1" comment="kernel-default-extra is &lt;4.4.120-92.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173610" version="1" comment="kernel-devel is &lt;4.4.120-92.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173611" version="1" comment="kernel-macros is &lt;4.4.120-92.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173612" version="1" comment="kernel-source is &lt;4.4.120-92.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173613" version="1" comment="kernel-syms is &lt;4.4.120-92.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173783" version="1" comment="clamav is &lt;0.99.4-33.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173784" version="1" comment="dhcp is &lt;4.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173785" version="1" comment="dhcp-client is &lt;4.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173786" version="1" comment="libwireshark8 is &lt;2.2.13-48.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173787" version="1" comment="libwiretap6 is &lt;2.2.13-48.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173788" version="1" comment="libwscodecs1 is &lt;2.2.13-48.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173789" version="1" comment="libwsutil7 is &lt;2.2.13-48.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173790" version="1" comment="wireshark is &lt;2.2.13-48.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173791" version="1" comment="wireshark-gtk is &lt;2.2.13-48.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169487" version="1" comment="glibc is &lt;2.22-62.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169488" version="1" comment="glibc-32bit is &lt;2.22-62.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169489" version="1" comment="glibc-devel is &lt;2.22-62.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169490" version="1" comment="glibc-devel-32bit is &lt;2.22-62.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169491" version="1" comment="glibc-i18ndata is &lt;2.22-62.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169492" version="1" comment="glibc-locale is &lt;2.22-62.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169493" version="1" comment="glibc-locale-32bit is &lt;2.22-62.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169494" version="1" comment="nscd is &lt;2.22-62.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173880" version="1" comment="qemu is &lt;2.6.2-41.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173881" version="1" comment="qemu-block-curl is &lt;2.6.2-41.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173882" version="1" comment="qemu-ipxe is &lt;1.0.0-41.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173883" version="1" comment="qemu-kvm is &lt;2.6.2-41.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173884" version="1" comment="qemu-seabios is &lt;1.9.1-41.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173885" version="1" comment="qemu-sgabios is &lt;8-41.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173886" version="1" comment="qemu-tools is &lt;2.6.2-41.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173887" version="1" comment="qemu-vgabios is &lt;1.9.1-41.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173888" version="1" comment="qemu-x86 is &lt;2.6.2-41.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173889" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173890" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173891" version="1" comment="libdcerpc0 is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173892" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173893" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173894" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173895" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173896" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173897" version="1" comment="libndr-standard0 is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173898" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173899" version="1" comment="libndr0 is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173900" version="1" comment="libndr0-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173901" version="1" comment="libnetapi0 is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173902" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173903" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173904" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173905" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173906" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173907" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173908" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173909" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173910" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173911" version="1" comment="libsamba-util0 is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173912" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173913" version="1" comment="libsamdb0 is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173914" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173915" version="1" comment="libsmbclient0 is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173916" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173917" version="1" comment="libsmbconf0 is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173918" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173919" version="1" comment="libsmbldap0 is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173920" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173921" version="1" comment="libtevent-util0 is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173922" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173923" version="1" comment="libwbclient0 is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173924" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173925" version="1" comment="samba is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173926" version="1" comment="samba-client is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173927" version="1" comment="samba-client-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173928" version="1" comment="samba-doc is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173929" version="1" comment="samba-libs is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173930" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173931" version="1" comment="samba-winbind is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173932" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173989" version="1" comment="krb5 is &lt;1.12.5-40.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173990" version="1" comment="krb5-32bit is &lt;1.12.5-40.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173991" version="1" comment="krb5-client is &lt;1.12.5-40.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173992" version="1" comment="MozillaFirefox is &lt;52.7.3esr-109.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173993" version="1" comment="MozillaFirefox-translations is &lt;52.7.3esr-109.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174092" version="1" comment="ImageMagick is &lt;6.8.8.1-71.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174093" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174094" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174095" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174096" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174097" version="1" comment="graphite2 is &lt;1.3.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174098" version="1" comment="libgraphite2-3 is &lt;1.3.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174099" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174100" version="1" comment="libvirt is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174101" version="1" comment="libvirt-client is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174102" version="1" comment="libvirt-client-32bit is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174103" version="1" comment="libvirt-daemon is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174104" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174105" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174106" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174107" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174108" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174109" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174110" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174111" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174112" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174113" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174114" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174115" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174116" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174117" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174118" version="1" comment="libvirt-doc is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169495" version="1" comment="libtiff5 is &lt;4.0.9-44.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169496" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169497" version="1" comment="tiff is &lt;4.0.9-44.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174153" version="1" comment="postgresql94 is &lt;9.4.17-21.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168951" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.161-43.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168952" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.161-43.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169498" version="1" comment="gwenhywfar is &lt;4.9.0beta-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169499" version="1" comment="gwenhywfar-lang is &lt;4.9.0beta-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169500" version="1" comment="gwenhywfar-tools is &lt;4.9.0beta-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169501" version="1" comment="libgwengui-gtk2-0 is &lt;4.9.0beta-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169502" version="1" comment="libgwenhywfar60 is &lt;4.9.0beta-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169503" version="1" comment="libgwenhywfar60-plugins is &lt;4.9.0beta-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174293" version="1" comment="xen is &lt;4.7.5_02-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174294" version="1" comment="xen-libs is &lt;4.7.5_02-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174295" version="1" comment="xen-libs-32bit is &lt;4.7.5_02-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174317" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174318" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174319" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174320" version="1" comment="openssl is &lt;1.0.2j-60.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169504" version="1" comment="postgresql94 is &lt;9.4.15-21.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169505" version="1" comment="libmysqlclient18 is &lt;10.0.32-29.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169506" version="1" comment="libmysqlclient18-32bit is &lt;10.0.32-29.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169507" version="1" comment="libmysqlclient_r18 is &lt;10.0.32-29.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169508" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.32-29.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169509" version="1" comment="mariadb is &lt;10.0.32-29.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169510" version="1" comment="mariadb-client is &lt;10.0.32-29.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169511" version="1" comment="mariadb-errormessages is &lt;10.0.32-29.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169577" version="1" comment="openslp is &lt;2.0.0-18.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169578" version="1" comment="openslp-32bit is &lt;2.0.0-18.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168954" version="1" comment="kernel-firmware is &lt;20170530-21.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168955" version="1" comment="ucode-amd is &lt;20170530-21.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169812" version="1" comment="rsync is &lt;3.1.0-13.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169813" version="1" comment="libncurses5 is &lt;5.9-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169814" version="1" comment="libncurses5-32bit is &lt;5.9-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169815" version="1" comment="libncurses6 is &lt;5.9-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169816" version="1" comment="libncurses6-32bit is &lt;5.9-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169817" version="1" comment="ncurses is &lt;5.9-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169818" version="1" comment="ncurses-devel is &lt;5.9-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169819" version="1" comment="ncurses-utils is &lt;5.9-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169820" version="1" comment="tack is &lt;5.9-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169821" version="1" comment="terminfo is &lt;5.9-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169822" version="1" comment="terminfo-base is &lt;5.9-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169823" version="1" comment="curl is &lt;7.37.0-37.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169824" version="1" comment="libcurl4 is &lt;7.37.0-37.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169825" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169826" version="1" comment="perl-XML-LibXML is &lt;2.0019-6.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169827" version="1" comment="ImageMagick is &lt;6.8.8.1-71.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169828" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-71.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169829" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169830" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-71.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169831" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161370" version="1" comment="libsystemd0 is &lt;228-150.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161371" version="1" comment="libsystemd0-32bit is &lt;228-150.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161372" version="1" comment="libudev1 is &lt;228-150.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161373" version="1" comment="libudev1-32bit is &lt;228-150.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161374" version="1" comment="systemd is &lt;228-150.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161375" version="1" comment="systemd-32bit is &lt;228-150.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161376" version="1" comment="systemd-bash-completion is &lt;228-150.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161377" version="1" comment="systemd-sysvinit is &lt;228-150.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161378" version="1" comment="udev is &lt;228-150.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162220" version="1" comment="libdcerpc-binding0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162221" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162222" version="1" comment="libdcerpc0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162223" version="1" comment="libdcerpc0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162224" version="1" comment="libndr-krb5pac0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162225" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162226" version="1" comment="libndr-nbt0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162227" version="1" comment="libndr-nbt0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162228" version="1" comment="libndr-standard0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162229" version="1" comment="libndr-standard0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162230" version="1" comment="libndr0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162231" version="1" comment="libndr0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162232" version="1" comment="libnetapi0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162233" version="1" comment="libnetapi0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162234" version="1" comment="libsamba-credentials0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162235" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162236" version="1" comment="libsamba-errors0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162237" version="1" comment="libsamba-errors0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162238" version="1" comment="libsamba-hostconfig0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162239" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162240" version="1" comment="libsamba-passdb0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162241" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162242" version="1" comment="libsamba-util0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162243" version="1" comment="libsamba-util0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162244" version="1" comment="libsamdb0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162245" version="1" comment="libsamdb0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162246" version="1" comment="libsmbclient0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162247" version="1" comment="libsmbclient0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162248" version="1" comment="libsmbconf0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162249" version="1" comment="libsmbconf0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162250" version="1" comment="libsmbldap0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162251" version="1" comment="libsmbldap0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162252" version="1" comment="libtevent-util0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162253" version="1" comment="libtevent-util0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162254" version="1" comment="libwbclient0 is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162255" version="1" comment="libwbclient0-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162256" version="1" comment="samba is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162257" version="1" comment="samba-client is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162258" version="1" comment="samba-client-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162259" version="1" comment="samba-doc is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162260" version="1" comment="samba-libs is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162261" version="1" comment="samba-libs-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162262" version="1" comment="samba-winbind is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162263" version="1" comment="samba-winbind-32bit is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162333" version="1" comment="libzypp is &lt;16.15.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162334" version="1" comment="yast2-pkg-bindings is &lt;3.2.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162427" version="1" comment="kernel-default is &lt;4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162428" version="1" comment="kernel-default-devel is &lt;4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162429" version="1" comment="kernel-default-extra is &lt;4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162430" version="1" comment="kernel-devel is &lt;4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162431" version="1" comment="kernel-macros is &lt;4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162432" version="1" comment="kernel-source is &lt;4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162433" version="1" comment="kernel-syms is &lt;4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162657" version="1" comment="libixion is &lt;0.12.1-13.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162658" version="1" comment="libixion-0_12-0 is &lt;0.12.1-13.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162659" version="1" comment="libmwaw is &lt;0.3.11-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162660" version="1" comment="libmwaw-0_3-3 is &lt;0.3.11-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162661" version="1" comment="liborcus is &lt;0.12.1-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162662" version="1" comment="liborcus-0_12-0 is &lt;0.12.1-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162663" version="1" comment="libreoffice-base is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162664" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162665" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162666" version="1" comment="libreoffice-calc is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162667" version="1" comment="libreoffice-calc-extensions is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162668" version="1" comment="libreoffice-draw is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162669" version="1" comment="libreoffice-filters-optional is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162670" version="1" comment="libreoffice-gnome is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162671" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162672" version="1" comment="libreoffice-icon-theme-tango is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162673" version="1" comment="libreoffice-impress is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162674" version="1" comment="libreoffice-l10n-af is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162675" version="1" comment="libreoffice-l10n-ar is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162676" version="1" comment="libreoffice-l10n-ca is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162677" version="1" comment="libreoffice-l10n-cs is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162678" version="1" comment="libreoffice-l10n-da is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162679" version="1" comment="libreoffice-l10n-de is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162680" version="1" comment="libreoffice-l10n-en is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162681" version="1" comment="libreoffice-l10n-es is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162682" version="1" comment="libreoffice-l10n-fi is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162683" version="1" comment="libreoffice-l10n-fr is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162684" version="1" comment="libreoffice-l10n-gu is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162685" version="1" comment="libreoffice-l10n-hi is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162686" version="1" comment="libreoffice-l10n-hu is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162687" version="1" comment="libreoffice-l10n-it is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162688" version="1" comment="libreoffice-l10n-ja is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162689" version="1" comment="libreoffice-l10n-ko is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162690" version="1" comment="libreoffice-l10n-nb is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162691" version="1" comment="libreoffice-l10n-nl is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162692" version="1" comment="libreoffice-l10n-nn is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162693" version="1" comment="libreoffice-l10n-pl is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162694" version="1" comment="libreoffice-l10n-pt_BR is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162695" version="1" comment="libreoffice-l10n-pt_PT is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162696" version="1" comment="libreoffice-l10n-ro is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162697" version="1" comment="libreoffice-l10n-ru is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162698" version="1" comment="libreoffice-l10n-sk is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162699" version="1" comment="libreoffice-l10n-sv is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162700" version="1" comment="libreoffice-l10n-xh is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162701" version="1" comment="libreoffice-l10n-zh_CN is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162702" version="1" comment="libreoffice-l10n-zh_TW is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162703" version="1" comment="libreoffice-l10n-zu is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162704" version="1" comment="libreoffice-mailmerge is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162705" version="1" comment="libreoffice-math is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162706" version="1" comment="libreoffice-officebean is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162707" version="1" comment="libreoffice-pyuno is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162708" version="1" comment="libreoffice-writer is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162709" version="1" comment="libreoffice-writer-extensions is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162710" version="1" comment="libreofficekit is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162711" version="1" comment="libstaroffice is &lt;0.0.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162712" version="1" comment="libstaroffice-0_0-0 is &lt;0.0.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162713" version="1" comment="libzmf is &lt;0.0.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162714" version="1" comment="libzmf-0_0-0 is &lt;0.0.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162715" version="1" comment="myspell-af_NA is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162716" version="1" comment="myspell-af_ZA is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162717" version="1" comment="myspell-ar is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162718" version="1" comment="myspell-ar_AE is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162719" version="1" comment="myspell-ar_BH is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162720" version="1" comment="myspell-ar_DZ is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162721" version="1" comment="myspell-ar_EG is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162722" version="1" comment="myspell-ar_IQ is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162723" version="1" comment="myspell-ar_JO is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162724" version="1" comment="myspell-ar_KW is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162725" version="1" comment="myspell-ar_LB is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162726" version="1" comment="myspell-ar_LY is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162727" version="1" comment="myspell-ar_MA is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162728" version="1" comment="myspell-ar_OM is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162729" version="1" comment="myspell-ar_QA is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162730" version="1" comment="myspell-ar_SA is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162731" version="1" comment="myspell-ar_SD is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162732" version="1" comment="myspell-ar_SY is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162733" version="1" comment="myspell-ar_TN is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162734" version="1" comment="myspell-ar_YE is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162735" version="1" comment="myspell-be_BY is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162736" version="1" comment="myspell-bg_BG is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162737" version="1" comment="myspell-bn_BD is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162738" version="1" comment="myspell-bn_IN is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162739" version="1" comment="myspell-bs is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162740" version="1" comment="myspell-bs_BA is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162741" version="1" comment="myspell-ca is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162742" version="1" comment="myspell-ca_AD is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162743" version="1" comment="myspell-ca_ES is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162744" version="1" comment="myspell-ca_ES_valencia is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162745" version="1" comment="myspell-ca_FR is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162746" version="1" comment="myspell-ca_IT is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162747" version="1" comment="myspell-cs_CZ is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162748" version="1" comment="myspell-da_DK is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162749" version="1" comment="myspell-de is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162750" version="1" comment="myspell-de_AT is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162751" version="1" comment="myspell-de_CH is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162752" version="1" comment="myspell-de_DE is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162753" version="1" comment="myspell-dictionaries is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162754" version="1" comment="myspell-el_GR is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162755" version="1" comment="myspell-en is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162756" version="1" comment="myspell-en_AU is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162757" version="1" comment="myspell-en_BS is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162758" version="1" comment="myspell-en_BZ is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162759" version="1" comment="myspell-en_CA is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162760" version="1" comment="myspell-en_GB is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162761" version="1" comment="myspell-en_GH is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162762" version="1" comment="myspell-en_IE is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162763" version="1" comment="myspell-en_IN is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162764" version="1" comment="myspell-en_JM is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162765" version="1" comment="myspell-en_MW is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162766" version="1" comment="myspell-en_NA is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162767" version="1" comment="myspell-en_NZ is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162768" version="1" comment="myspell-en_PH is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162769" version="1" comment="myspell-en_TT is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162770" version="1" comment="myspell-en_US is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162771" version="1" comment="myspell-en_ZA is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162772" version="1" comment="myspell-en_ZW is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162773" version="1" comment="myspell-es is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162774" version="1" comment="myspell-es_AR is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162775" version="1" comment="myspell-es_BO is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162776" version="1" comment="myspell-es_CL is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162777" version="1" comment="myspell-es_CO is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162778" version="1" comment="myspell-es_CR is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162779" version="1" comment="myspell-es_CU is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162780" version="1" comment="myspell-es_DO is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162781" version="1" comment="myspell-es_EC is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162782" version="1" comment="myspell-es_ES is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162783" version="1" comment="myspell-es_GT is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162784" version="1" comment="myspell-es_HN is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162785" version="1" comment="myspell-es_MX is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162786" version="1" comment="myspell-es_NI is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162787" version="1" comment="myspell-es_PA is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162788" version="1" comment="myspell-es_PE is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162789" version="1" comment="myspell-es_PR is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162790" version="1" comment="myspell-es_PY is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162791" version="1" comment="myspell-es_SV is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162792" version="1" comment="myspell-es_UY is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162793" version="1" comment="myspell-es_VE is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162794" version="1" comment="myspell-et_EE is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162795" version="1" comment="myspell-fr_BE is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162796" version="1" comment="myspell-fr_CA is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162797" version="1" comment="myspell-fr_CH is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162798" version="1" comment="myspell-fr_FR is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162799" version="1" comment="myspell-fr_LU is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162800" version="1" comment="myspell-fr_MC is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162801" version="1" comment="myspell-gu_IN is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162802" version="1" comment="myspell-he_IL is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162803" version="1" comment="myspell-hi_IN is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162804" version="1" comment="myspell-hr_HR is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162805" version="1" comment="myspell-hu_HU is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162806" version="1" comment="myspell-it_IT is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162807" version="1" comment="myspell-lightproof-en is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162808" version="1" comment="myspell-lightproof-hu_HU is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162809" version="1" comment="myspell-lightproof-pt_BR is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162810" version="1" comment="myspell-lightproof-ru_RU is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162811" version="1" comment="myspell-lo_LA is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162812" version="1" comment="myspell-lt_LT is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162813" version="1" comment="myspell-lv_LV is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162814" version="1" comment="myspell-nb_NO is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162815" version="1" comment="myspell-nl_BE is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162816" version="1" comment="myspell-nl_NL is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162817" version="1" comment="myspell-nn_NO is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162818" version="1" comment="myspell-no is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162819" version="1" comment="myspell-pl_PL is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162820" version="1" comment="myspell-pt_AO is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162821" version="1" comment="myspell-pt_BR is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162822" version="1" comment="myspell-pt_PT is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162823" version="1" comment="myspell-ro is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162824" version="1" comment="myspell-ro_RO is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162825" version="1" comment="myspell-ru_RU is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162826" version="1" comment="myspell-sk_SK is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162827" version="1" comment="myspell-sl_SI is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162828" version="1" comment="myspell-sr is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162829" version="1" comment="myspell-sr_CS is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162830" version="1" comment="myspell-sr_Latn_CS is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162831" version="1" comment="myspell-sr_Latn_RS is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162832" version="1" comment="myspell-sr_RS is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162833" version="1" comment="myspell-sv_FI is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162834" version="1" comment="myspell-sv_SE is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162835" version="1" comment="myspell-te is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162836" version="1" comment="myspell-te_IN is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162837" version="1" comment="myspell-th_TH is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162838" version="1" comment="myspell-uk_UA is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162839" version="1" comment="myspell-vi is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162840" version="1" comment="myspell-vi_VN is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162841" version="1" comment="myspell-zu_ZA is &lt;20170511-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162936" version="1" comment="xen is &lt;4.9.0_11-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162937" version="1" comment="xen-libs is &lt;4.9.0_11-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162938" version="1" comment="xen-libs-32bit is &lt;4.9.0_11-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162969" version="1" comment="libzypp is &lt;16.15.6-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162970" version="1" comment="zypper is &lt;1.13.32-21.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162971" version="1" comment="zypper-log is &lt;1.13.32-21.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163515" version="1" comment="qemu is &lt;2.9.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163516" version="1" comment="qemu-block-curl is &lt;2.9.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163517" version="1" comment="qemu-ipxe is &lt;1.0.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163518" version="1" comment="qemu-kvm is &lt;2.9.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163519" version="1" comment="qemu-seabios is &lt;1.10.2-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163520" version="1" comment="qemu-sgabios is &lt;8-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163521" version="1" comment="qemu-tools is &lt;2.9.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163522" version="1" comment="qemu-vgabios is &lt;1.10.2-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163523" version="1" comment="qemu-x86 is &lt;2.9.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163576" version="1" comment="xen is &lt;4.9.0_12-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163577" version="1" comment="xen-libs is &lt;4.9.0_12-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163578" version="1" comment="xen-libs-32bit is &lt;4.9.0_12-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164293" version="1" comment="kernel-default is &lt;4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164294" version="1" comment="kernel-default-devel is &lt;4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164295" version="1" comment="kernel-default-extra is &lt;4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164296" version="1" comment="kernel-devel is &lt;4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164297" version="1" comment="kernel-macros is &lt;4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164298" version="1" comment="kernel-source is &lt;4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164299" version="1" comment="kernel-syms is &lt;4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164735" version="1" comment="libspice-server1 is &lt;0.12.8-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164736" version="1" comment="spice is &lt;0.12.8-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164772" version="1" comment="libvirt is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164773" version="1" comment="libvirt-admin is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164774" version="1" comment="libvirt-client is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164775" version="1" comment="libvirt-daemon is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164776" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164777" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164778" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164779" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164780" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164781" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164782" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164783" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164784" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164785" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164786" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164787" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164788" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164789" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164790" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164791" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164792" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164793" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164794" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164795" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164796" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164797" version="1" comment="libvirt-doc is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164798" version="1" comment="libvirt-libs is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165129" version="1" comment="libdcerpc-binding0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165130" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165131" version="1" comment="libdcerpc0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165132" version="1" comment="libdcerpc0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165133" version="1" comment="libndr-krb5pac0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165134" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165135" version="1" comment="libndr-nbt0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165136" version="1" comment="libndr-nbt0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165137" version="1" comment="libndr-standard0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165138" version="1" comment="libndr-standard0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165139" version="1" comment="libndr0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165140" version="1" comment="libndr0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165141" version="1" comment="libnetapi0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165142" version="1" comment="libnetapi0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165143" version="1" comment="libsamba-credentials0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165144" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165145" version="1" comment="libsamba-errors0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165146" version="1" comment="libsamba-errors0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165147" version="1" comment="libsamba-hostconfig0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165148" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165149" version="1" comment="libsamba-passdb0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165150" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165151" version="1" comment="libsamba-util0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165152" version="1" comment="libsamba-util0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165153" version="1" comment="libsamdb0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165154" version="1" comment="libsamdb0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165155" version="1" comment="libsmbclient0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165156" version="1" comment="libsmbclient0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165157" version="1" comment="libsmbconf0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165158" version="1" comment="libsmbconf0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165159" version="1" comment="libsmbldap0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165160" version="1" comment="libsmbldap0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165161" version="1" comment="libtevent-util0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165162" version="1" comment="libtevent-util0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165163" version="1" comment="libwbclient0 is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165164" version="1" comment="libwbclient0-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165165" version="1" comment="samba is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165166" version="1" comment="samba-client is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165167" version="1" comment="samba-client-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165168" version="1" comment="samba-doc is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165169" version="1" comment="samba-libs is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165170" version="1" comment="samba-libs-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165171" version="1" comment="samba-winbind is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165172" version="1" comment="samba-winbind-32bit is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165687" version="1" comment="xen is &lt;4.9.0_14-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165688" version="1" comment="xen-libs is &lt;4.9.0_14-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165689" version="1" comment="xen-libs-32bit is &lt;4.9.0_14-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166003" version="1" comment="kernel-default is &lt;4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166004" version="1" comment="kernel-default-devel is &lt;4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166005" version="1" comment="kernel-default-extra is &lt;4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166006" version="1" comment="kernel-devel is &lt;4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166007" version="1" comment="kernel-macros is &lt;4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166008" version="1" comment="kernel-source is &lt;4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166009" version="1" comment="kernel-syms is &lt;4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166010" version="1" comment="libvirt is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166011" version="1" comment="libvirt-admin is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166012" version="1" comment="libvirt-client is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166013" version="1" comment="libvirt-daemon is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166014" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166015" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166016" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166017" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166018" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166019" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166020" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166021" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166022" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166023" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166024" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166025" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166026" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166027" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166028" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166029" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166030" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166031" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166032" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166033" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166034" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166035" version="1" comment="libvirt-doc is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166036" version="1" comment="libvirt-libs is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166448" version="1" comment="qemu is &lt;2.9.1-6.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166449" version="1" comment="qemu-block-curl is &lt;2.9.1-6.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166450" version="1" comment="qemu-ipxe is &lt;1.0.0-6.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166451" version="1" comment="qemu-kvm is &lt;2.9.1-6.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166452" version="1" comment="qemu-seabios is &lt;1.10.2-6.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166453" version="1" comment="qemu-sgabios is &lt;8-6.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166454" version="1" comment="qemu-tools is &lt;2.9.1-6.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166455" version="1" comment="qemu-vgabios is &lt;1.10.2-6.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166456" version="1" comment="qemu-x86 is &lt;2.9.1-6.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166525" version="1" comment="SuSEfirewall2 is &lt;3.6.312.333-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166526" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167298" version="1" comment="xen is &lt;4.9.1_02-3.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167299" version="1" comment="xen-libs is &lt;4.9.1_02-3.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167300" version="1" comment="xen-libs-32bit is &lt;4.9.1_02-3.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167247" version="1" comment="libdcerpc-binding0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167248" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167249" version="1" comment="libdcerpc0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167250" version="1" comment="libdcerpc0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167251" version="1" comment="libndr-krb5pac0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167252" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167253" version="1" comment="libndr-nbt0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167254" version="1" comment="libndr-nbt0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167255" version="1" comment="libndr-standard0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167256" version="1" comment="libndr-standard0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167257" version="1" comment="libndr0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167258" version="1" comment="libndr0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167259" version="1" comment="libnetapi0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167260" version="1" comment="libnetapi0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167261" version="1" comment="libsamba-credentials0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167262" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167263" version="1" comment="libsamba-errors0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167264" version="1" comment="libsamba-errors0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167265" version="1" comment="libsamba-hostconfig0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167266" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167267" version="1" comment="libsamba-passdb0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167268" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167269" version="1" comment="libsamba-util0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167270" version="1" comment="libsamba-util0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167271" version="1" comment="libsamdb0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167272" version="1" comment="libsamdb0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167273" version="1" comment="libsmbclient0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167274" version="1" comment="libsmbclient0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167275" version="1" comment="libsmbconf0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167276" version="1" comment="libsmbconf0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167277" version="1" comment="libsmbldap0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167278" version="1" comment="libsmbldap0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167279" version="1" comment="libtevent-util0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167280" version="1" comment="libtevent-util0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167281" version="1" comment="libwbclient0 is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167282" version="1" comment="libwbclient0-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167283" version="1" comment="samba is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167284" version="1" comment="samba-client is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167285" version="1" comment="samba-client-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167286" version="1" comment="samba-doc is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167287" version="1" comment="samba-libs is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167288" version="1" comment="samba-libs-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167289" version="1" comment="samba-winbind is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167290" version="1" comment="samba-winbind-32bit is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167761" version="1" comment="kernel-default is &lt;4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167762" version="1" comment="kernel-default-devel is &lt;4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167763" version="1" comment="kernel-default-extra is &lt;4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167764" version="1" comment="kernel-devel is &lt;4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167765" version="1" comment="kernel-macros is &lt;4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167766" version="1" comment="kernel-source is &lt;4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167767" version="1" comment="kernel-syms is &lt;4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168755" version="1" comment="kernel-default is &lt;4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168756" version="1" comment="kernel-default-devel is &lt;4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168757" version="1" comment="kernel-default-extra is &lt;4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168758" version="1" comment="kernel-devel is &lt;4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168759" version="1" comment="kernel-macros is &lt;4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168760" version="1" comment="kernel-source is &lt;4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168761" version="1" comment="kernel-syms is &lt;4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169053" version="1" comment="kernel-default is &lt;4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169054" version="1" comment="kernel-default-devel is &lt;4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169055" version="1" comment="kernel-default-extra is &lt;4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169056" version="1" comment="kernel-devel is &lt;4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169057" version="1" comment="kernel-macros is &lt;4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169058" version="1" comment="kernel-source is &lt;4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169059" version="1" comment="kernel-syms is &lt;4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170468" version="1" comment="libvirt is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170469" version="1" comment="libvirt-admin is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170470" version="1" comment="libvirt-client is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170471" version="1" comment="libvirt-daemon is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170472" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170473" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170474" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170475" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170476" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170477" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170478" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170479" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170480" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170481" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170482" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170483" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170484" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170485" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170486" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170487" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170488" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170489" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170490" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170491" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170492" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170493" version="1" comment="libvirt-doc is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170494" version="1" comment="libvirt-libs is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170495" version="1" comment="libtasn1 is &lt;4.9-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170496" version="1" comment="libtasn1-6 is &lt;4.9-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170497" version="1" comment="libtasn1-6-32bit is &lt;4.9-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170841" version="1" comment="libXdmcp is &lt;1.1.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170842" version="1" comment="libXdmcp6 is &lt;1.1.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170843" version="1" comment="libXdmcp6-32bit is &lt;1.1.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170844" version="1" comment="libICE is &lt;1.0.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170845" version="1" comment="libICE6 is &lt;1.0.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170846" version="1" comment="libICE6-32bit is &lt;1.0.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170847" version="1" comment="jasper is &lt;1.900.14-195.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170848" version="1" comment="libjasper1 is &lt;1.900.14-195.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170849" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170955" version="1" comment="kernel-default is &lt;4.4.114-94.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170956" version="1" comment="kernel-default-devel is &lt;4.4.114-94.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170957" version="1" comment="kernel-default-extra is &lt;4.4.114-94.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170958" version="1" comment="kernel-devel is &lt;4.4.114-94.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170959" version="1" comment="kernel-macros is &lt;4.4.114-94.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170960" version="1" comment="kernel-source is &lt;4.4.114-94.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170961" version="1" comment="kernel-syms is &lt;4.4.114-94.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171273" version="1" comment="xen is &lt;4.9.1_08-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171274" version="1" comment="xen-libs is &lt;4.9.1_08-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171275" version="1" comment="xen-libs-32bit is &lt;4.9.1_08-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171276" version="1" comment="libreoffice-base is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171277" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171278" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171279" version="1" comment="libreoffice-calc is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171280" version="1" comment="libreoffice-calc-extensions is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171281" version="1" comment="libreoffice-draw is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171282" version="1" comment="libreoffice-filters-optional is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171283" version="1" comment="libreoffice-gnome is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171284" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171285" version="1" comment="libreoffice-icon-theme-tango is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171286" version="1" comment="libreoffice-impress is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171287" version="1" comment="libreoffice-l10n-af is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171288" version="1" comment="libreoffice-l10n-ar is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171289" version="1" comment="libreoffice-l10n-ca is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171290" version="1" comment="libreoffice-l10n-cs is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171291" version="1" comment="libreoffice-l10n-da is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171292" version="1" comment="libreoffice-l10n-de is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171293" version="1" comment="libreoffice-l10n-en is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171294" version="1" comment="libreoffice-l10n-es is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171295" version="1" comment="libreoffice-l10n-fi is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171296" version="1" comment="libreoffice-l10n-fr is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171297" version="1" comment="libreoffice-l10n-gu is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171298" version="1" comment="libreoffice-l10n-hi is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171299" version="1" comment="libreoffice-l10n-hu is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171300" version="1" comment="libreoffice-l10n-it is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171301" version="1" comment="libreoffice-l10n-ja is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171302" version="1" comment="libreoffice-l10n-ko is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171303" version="1" comment="libreoffice-l10n-nb is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171304" version="1" comment="libreoffice-l10n-nl is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171305" version="1" comment="libreoffice-l10n-nn is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171306" version="1" comment="libreoffice-l10n-pl is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171307" version="1" comment="libreoffice-l10n-pt_BR is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171308" version="1" comment="libreoffice-l10n-pt_PT is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171309" version="1" comment="libreoffice-l10n-ro is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171310" version="1" comment="libreoffice-l10n-ru is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171311" version="1" comment="libreoffice-l10n-sk is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171312" version="1" comment="libreoffice-l10n-sv is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171313" version="1" comment="libreoffice-l10n-xh is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171314" version="1" comment="libreoffice-l10n-zh_CN is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171315" version="1" comment="libreoffice-l10n-zh_TW is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171316" version="1" comment="libreoffice-l10n-zu is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171317" version="1" comment="libreoffice-mailmerge is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171318" version="1" comment="libreoffice-math is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171319" version="1" comment="libreoffice-officebean is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171320" version="1" comment="libreoffice-pyuno is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171321" version="1" comment="libreoffice-writer is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171322" version="1" comment="libreoffice-writer-extensions is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171323" version="1" comment="libreofficekit is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171529" version="1" comment="drm is &lt;4.9.33-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171530" version="1" comment="drm-kmp-default is &lt;4.9.33_k4.4.114_94.11-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172798" version="1" comment="augeas is &lt;1.2.0-17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172799" version="1" comment="augeas-lenses is &lt;1.2.0-17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172800" version="1" comment="libaugeas0 is &lt;1.2.0-17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173378" version="1" comment="libdcerpc-binding0 is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173379" version="1" comment="libdcerpc-binding0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173380" version="1" comment="libdcerpc0 is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173381" version="1" comment="libdcerpc0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173382" version="1" comment="libndr-krb5pac0 is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173383" version="1" comment="libndr-krb5pac0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173384" version="1" comment="libndr-nbt0 is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173385" version="1" comment="libndr-nbt0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173386" version="1" comment="libndr-standard0 is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173387" version="1" comment="libndr-standard0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173388" version="1" comment="libndr0 is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173389" version="1" comment="libndr0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173390" version="1" comment="libnetapi0 is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173391" version="1" comment="libnetapi0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173392" version="1" comment="libsamba-credentials0 is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173393" version="1" comment="libsamba-credentials0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173394" version="1" comment="libsamba-errors0 is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173395" version="1" comment="libsamba-errors0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173396" version="1" comment="libsamba-hostconfig0 is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173397" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173398" version="1" comment="libsamba-passdb0 is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173399" version="1" comment="libsamba-passdb0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173400" version="1" comment="libsamba-util0 is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173401" version="1" comment="libsamba-util0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173402" version="1" comment="libsamdb0 is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173403" version="1" comment="libsamdb0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173404" version="1" comment="libsmbclient0 is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173405" version="1" comment="libsmbclient0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173406" version="1" comment="libsmbconf0 is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173407" version="1" comment="libsmbconf0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173408" version="1" comment="libsmbldap0 is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173409" version="1" comment="libsmbldap0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173410" version="1" comment="libtalloc2 is &lt;2.1.10-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173411" version="1" comment="libtalloc2-32bit is &lt;2.1.10-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173412" version="1" comment="libtevent-util0 is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173413" version="1" comment="libtevent-util0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173414" version="1" comment="libtevent0 is &lt;0.9.34-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173415" version="1" comment="libtevent0-32bit is &lt;0.9.34-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173416" version="1" comment="libwbclient0 is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173417" version="1" comment="libwbclient0-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173418" version="1" comment="python-talloc is &lt;2.1.10-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173419" version="1" comment="python-talloc-32bit is &lt;2.1.10-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173420" version="1" comment="samba is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173421" version="1" comment="samba-client is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173422" version="1" comment="samba-client-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173423" version="1" comment="samba-doc is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173424" version="1" comment="samba-libs is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173425" version="1" comment="samba-libs-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173426" version="1" comment="samba-winbind is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173427" version="1" comment="samba-winbind-32bit is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173428" version="1" comment="talloc is &lt;2.1.10-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173429" version="1" comment="qemu is &lt;2.9.1-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173430" version="1" comment="qemu-block-curl is &lt;2.9.1-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173431" version="1" comment="qemu-ipxe is &lt;1.0.0-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173432" version="1" comment="qemu-kvm is &lt;2.9.1-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173433" version="1" comment="qemu-seabios is &lt;1.10.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173434" version="1" comment="qemu-sgabios is &lt;8-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173435" version="1" comment="qemu-tools is &lt;2.9.1-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173436" version="1" comment="qemu-vgabios is &lt;1.10.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173437" version="1" comment="qemu-x86 is &lt;2.9.1-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173614" version="1" comment="kernel-default is &lt;4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173615" version="1" comment="kernel-default-devel is &lt;4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173616" version="1" comment="kernel-default-extra is &lt;4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173617" version="1" comment="kernel-devel is &lt;4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173618" version="1" comment="kernel-macros is &lt;4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173619" version="1" comment="kernel-source is &lt;4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173620" version="1" comment="kernel-syms is &lt;4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174154" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.33-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174155" version="1" comment="libspice-client-glib-helper is &lt;0.33-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174156" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.33-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174157" version="1" comment="libspice-controller0 is &lt;0.33-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174158" version="1" comment="spice-gtk is &lt;0.33-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174159" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.33-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174160" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.33-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174161" version="1" comment="libidn is &lt;1.28-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174162" version="1" comment="libidn11 is &lt;1.28-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174163" version="1" comment="libidn11-32bit is &lt;1.28-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174321" version="1" comment="libvirt is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174322" version="1" comment="libvirt-admin is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174323" version="1" comment="libvirt-client is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174324" version="1" comment="libvirt-daemon is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174325" version="1" comment="libvirt-daemon-config-network is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174326" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174327" version="1" comment="libvirt-daemon-driver-interface is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174328" version="1" comment="libvirt-daemon-driver-libxl is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174329" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174330" version="1" comment="libvirt-daemon-driver-network is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174331" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174332" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174333" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174334" version="1" comment="libvirt-daemon-driver-secret is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174335" version="1" comment="libvirt-daemon-driver-storage is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174336" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174337" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174338" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174339" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174340" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174341" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174342" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174343" version="1" comment="libvirt-daemon-lxc is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174344" version="1" comment="libvirt-daemon-qemu is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174345" version="1" comment="libvirt-daemon-xen is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174346" version="1" comment="libvirt-doc is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174347" version="1" comment="libvirt-libs is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174348" version="1" comment="virt-install is &lt;1.4.1-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174349" version="1" comment="virt-manager is &lt;1.4.1-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174350" version="1" comment="virt-manager-common is &lt;1.4.1-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174351" version="1" comment="libzzip-0-13 is &lt;0.13.67-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174352" version="1" comment="zziplib is &lt;0.13.67-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174364" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174365" version="1" comment="python3 is &lt;3.4.6-25.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174366" version="1" comment="python3-base is &lt;3.4.6-25.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174367" version="1" comment="python3-curses is &lt;3.4.6-25.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174438" version="1" comment="evince is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174439" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174440" version="1" comment="evince-lang is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174441" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174442" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174443" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174444" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174445" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174446" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174447" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174448" version="1" comment="libevview3-3 is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174449" version="1" comment="nautilus-evince is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174450" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174451" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174452" version="1" comment="ntp is &lt;4.2.8p11-64.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174453" version="1" comment="ntp-doc is &lt;4.2.8p11-64.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174552" version="1" comment="libwireshark8 is &lt;2.2.14-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174553" version="1" comment="libwiretap6 is &lt;2.2.14-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174554" version="1" comment="libwscodecs1 is &lt;2.2.14-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174555" version="1" comment="libwsutil7 is &lt;2.2.14-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174556" version="1" comment="wireshark is &lt;2.2.14-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174557" version="1" comment="wireshark-gtk is &lt;2.2.14-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174742" version="1" comment="kernel-default is &lt;4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174743" version="1" comment="kernel-default-devel is &lt;4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174744" version="1" comment="kernel-default-extra is &lt;4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174745" version="1" comment="kernel-devel is &lt;4.4.126-94.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174746" version="1" comment="kernel-macros is &lt;4.4.126-94.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174747" version="1" comment="kernel-source is &lt;4.4.126-94.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174748" version="1" comment="kernel-syms is &lt;4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174749" version="1" comment="PackageKit-backend-zypp is &lt;1.1.3-24.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174750" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.3-24.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174751" version="1" comment="PackageKit-gtk3-module is &lt;1.1.3-24.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174752" version="1" comment="PackageKit-lang is &lt;1.1.3-24.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174753" version="1" comment="libpackagekit-glib2-18 is &lt;1.1.3-24.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174754" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.1.3-24.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174874" version="1" comment="rzsz is &lt;0.12.21~rc-1001.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174878" version="1" comment="perl is &lt;5.18.2-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174879" version="1" comment="perl-32bit is &lt;5.18.2-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174880" version="1" comment="perl-base is &lt;5.18.2-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174881" version="1" comment="perl-doc is &lt;5.18.2-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174882" version="1" comment="zsh is &lt;5.0.5-6.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174883" version="1" comment="boost is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174884" version="1" comment="boost-license1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174885" version="1" comment="gnome-documents is &lt;3.20.1-10.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174886" version="1" comment="gnome-documents-lang is &lt;3.20.1-10.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174887" version="1" comment="gnome-documents_books-common is &lt;3.20.1-10.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174888" version="1" comment="gnome-shell-search-provider-documents is &lt;3.20.1-10.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174889" version="1" comment="libboost_atomic1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174890" version="1" comment="libboost_date_time1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174891" version="1" comment="libboost_filesystem1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174892" version="1" comment="libboost_iostreams1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174893" version="1" comment="libboost_locale1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174894" version="1" comment="libboost_program_options1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174895" version="1" comment="libboost_random1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174896" version="1" comment="libboost_regex1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174897" version="1" comment="libboost_signals1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174898" version="1" comment="libboost_system1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174899" version="1" comment="libboost_thread1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174900" version="1" comment="libepubgen is &lt;0.1.0-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174901" version="1" comment="libepubgen-0_1-1 is &lt;0.1.0-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174902" version="1" comment="libixion is &lt;0.13.0-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174903" version="1" comment="libixion-0_13-0 is &lt;0.13.0-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174904" version="1" comment="libmwaw is &lt;0.3.13-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174905" version="1" comment="libmwaw-0_3-3 is &lt;0.3.13-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174906" version="1" comment="liborcus is &lt;0.13.4-10.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174907" version="1" comment="liborcus-0_13-0 is &lt;0.13.4-10.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174908" version="1" comment="libqxp is &lt;0.0.1-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174909" version="1" comment="libqxp-0_0-0 is &lt;0.0.1-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174910" version="1" comment="libreoffice-base is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174911" version="1" comment="libreoffice-base-drivers-mysql is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174912" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174913" version="1" comment="libreoffice-branding-upstream is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174914" version="1" comment="libreoffice-calc is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174915" version="1" comment="libreoffice-calc-extensions is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174916" version="1" comment="libreoffice-draw is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174917" version="1" comment="libreoffice-filters-optional is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174918" version="1" comment="libreoffice-gnome is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174919" version="1" comment="libreoffice-gtk2 is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174920" version="1" comment="libreoffice-icon-themes is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174921" version="1" comment="libreoffice-impress is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174922" version="1" comment="libreoffice-l10n-af is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174923" version="1" comment="libreoffice-l10n-ar is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174924" version="1" comment="libreoffice-l10n-ca is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174925" version="1" comment="libreoffice-l10n-cs is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174926" version="1" comment="libreoffice-l10n-da is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174927" version="1" comment="libreoffice-l10n-de is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174928" version="1" comment="libreoffice-l10n-en is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174929" version="1" comment="libreoffice-l10n-es is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174930" version="1" comment="libreoffice-l10n-fi is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174931" version="1" comment="libreoffice-l10n-fr is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174932" version="1" comment="libreoffice-l10n-gu is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174933" version="1" comment="libreoffice-l10n-hi is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174934" version="1" comment="libreoffice-l10n-hu is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174935" version="1" comment="libreoffice-l10n-it is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174936" version="1" comment="libreoffice-l10n-ja is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174937" version="1" comment="libreoffice-l10n-ko is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174938" version="1" comment="libreoffice-l10n-nb is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174939" version="1" comment="libreoffice-l10n-nl is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174940" version="1" comment="libreoffice-l10n-nn is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174941" version="1" comment="libreoffice-l10n-pl is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174942" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174943" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174944" version="1" comment="libreoffice-l10n-ro is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174945" version="1" comment="libreoffice-l10n-ru is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174946" version="1" comment="libreoffice-l10n-sk is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174947" version="1" comment="libreoffice-l10n-sv is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174948" version="1" comment="libreoffice-l10n-xh is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174949" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174950" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174951" version="1" comment="libreoffice-l10n-zu is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174952" version="1" comment="libreoffice-mailmerge is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174953" version="1" comment="libreoffice-math is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174954" version="1" comment="libreoffice-officebean is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174955" version="1" comment="libreoffice-pyuno is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174956" version="1" comment="libreoffice-writer is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174957" version="1" comment="libreoffice-writer-extensions is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174958" version="1" comment="libstaroffice is &lt;0.0.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174959" version="1" comment="libstaroffice-0_0-0 is &lt;0.0.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174960" version="1" comment="libwps is &lt;0.4.7-10.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174961" version="1" comment="libwps-0_4-4 is &lt;0.4.7-10.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174962" version="1" comment="myspell-af_NA is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174963" version="1" comment="myspell-af_ZA is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174964" version="1" comment="myspell-ar is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174965" version="1" comment="myspell-ar_AE is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174966" version="1" comment="myspell-ar_BH is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174967" version="1" comment="myspell-ar_DZ is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174968" version="1" comment="myspell-ar_EG is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174969" version="1" comment="myspell-ar_IQ is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174970" version="1" comment="myspell-ar_JO is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174971" version="1" comment="myspell-ar_KW is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174972" version="1" comment="myspell-ar_LB is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174973" version="1" comment="myspell-ar_LY is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174974" version="1" comment="myspell-ar_MA is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174975" version="1" comment="myspell-ar_OM is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174976" version="1" comment="myspell-ar_QA is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174977" version="1" comment="myspell-ar_SA is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174978" version="1" comment="myspell-ar_SD is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174979" version="1" comment="myspell-ar_SY is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174980" version="1" comment="myspell-ar_TN is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174981" version="1" comment="myspell-ar_YE is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174982" version="1" comment="myspell-be_BY is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174983" version="1" comment="myspell-bg_BG is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174984" version="1" comment="myspell-bn_BD is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174985" version="1" comment="myspell-bn_IN is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174986" version="1" comment="myspell-bs is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174987" version="1" comment="myspell-bs_BA is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174988" version="1" comment="myspell-ca is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174989" version="1" comment="myspell-ca_AD is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174990" version="1" comment="myspell-ca_ES is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174991" version="1" comment="myspell-ca_ES_valencia is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174992" version="1" comment="myspell-ca_FR is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174993" version="1" comment="myspell-ca_IT is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174994" version="1" comment="myspell-cs_CZ is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174995" version="1" comment="myspell-da_DK is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174996" version="1" comment="myspell-de is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174997" version="1" comment="myspell-de_AT is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174998" version="1" comment="myspell-de_CH is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174999" version="1" comment="myspell-de_DE is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175000" version="1" comment="myspell-dictionaries is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175001" version="1" comment="myspell-el_GR is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175002" version="1" comment="myspell-en is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175003" version="1" comment="myspell-en_AU is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175004" version="1" comment="myspell-en_BS is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175005" version="1" comment="myspell-en_BZ is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175006" version="1" comment="myspell-en_CA is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175007" version="1" comment="myspell-en_GB is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175008" version="1" comment="myspell-en_GH is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175009" version="1" comment="myspell-en_IE is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175010" version="1" comment="myspell-en_IN is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175011" version="1" comment="myspell-en_JM is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175012" version="1" comment="myspell-en_MW is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175013" version="1" comment="myspell-en_NA is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175014" version="1" comment="myspell-en_NZ is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175015" version="1" comment="myspell-en_PH is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175016" version="1" comment="myspell-en_TT is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175017" version="1" comment="myspell-en_US is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175018" version="1" comment="myspell-en_ZA is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175019" version="1" comment="myspell-en_ZW is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175020" version="1" comment="myspell-es is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175021" version="1" comment="myspell-es_AR is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175022" version="1" comment="myspell-es_BO is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175023" version="1" comment="myspell-es_CL is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175024" version="1" comment="myspell-es_CO is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175025" version="1" comment="myspell-es_CR is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175026" version="1" comment="myspell-es_CU is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175027" version="1" comment="myspell-es_DO is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175028" version="1" comment="myspell-es_EC is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175029" version="1" comment="myspell-es_ES is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175030" version="1" comment="myspell-es_GT is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175031" version="1" comment="myspell-es_HN is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175032" version="1" comment="myspell-es_MX is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175033" version="1" comment="myspell-es_NI is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175034" version="1" comment="myspell-es_PA is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175035" version="1" comment="myspell-es_PE is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175036" version="1" comment="myspell-es_PR is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175037" version="1" comment="myspell-es_PY is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175038" version="1" comment="myspell-es_SV is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175039" version="1" comment="myspell-es_UY is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175040" version="1" comment="myspell-es_VE is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175041" version="1" comment="myspell-et_EE is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175042" version="1" comment="myspell-fr_BE is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175043" version="1" comment="myspell-fr_CA is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175044" version="1" comment="myspell-fr_CH is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175045" version="1" comment="myspell-fr_FR is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175046" version="1" comment="myspell-fr_LU is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175047" version="1" comment="myspell-fr_MC is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175048" version="1" comment="myspell-gu_IN is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175049" version="1" comment="myspell-he_IL is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175050" version="1" comment="myspell-hi_IN is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175051" version="1" comment="myspell-hr_HR is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175052" version="1" comment="myspell-hu_HU is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175053" version="1" comment="myspell-id is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175054" version="1" comment="myspell-id_ID is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175055" version="1" comment="myspell-it_IT is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175056" version="1" comment="myspell-lightproof-en is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175057" version="1" comment="myspell-lightproof-hu_HU is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175058" version="1" comment="myspell-lightproof-pt_BR is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175059" version="1" comment="myspell-lightproof-ru_RU is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175060" version="1" comment="myspell-lo_LA is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175061" version="1" comment="myspell-lt_LT is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175062" version="1" comment="myspell-lv_LV is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175063" version="1" comment="myspell-nb_NO is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175064" version="1" comment="myspell-nl_BE is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175065" version="1" comment="myspell-nl_NL is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175066" version="1" comment="myspell-nn_NO is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175067" version="1" comment="myspell-no is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175068" version="1" comment="myspell-pl_PL is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175069" version="1" comment="myspell-pt_AO is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175070" version="1" comment="myspell-pt_BR is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175071" version="1" comment="myspell-pt_PT is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175072" version="1" comment="myspell-ro is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175073" version="1" comment="myspell-ro_RO is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175074" version="1" comment="myspell-ru_RU is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175075" version="1" comment="myspell-sk_SK is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175076" version="1" comment="myspell-sl_SI is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175077" version="1" comment="myspell-sr is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175078" version="1" comment="myspell-sr_CS is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175079" version="1" comment="myspell-sr_Latn_CS is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175080" version="1" comment="myspell-sr_Latn_RS is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175081" version="1" comment="myspell-sr_RS is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175082" version="1" comment="myspell-sv_FI is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175083" version="1" comment="myspell-sv_SE is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175084" version="1" comment="myspell-te is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175085" version="1" comment="myspell-te_IN is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175086" version="1" comment="myspell-th_TH is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175087" version="1" comment="myspell-uk_UA is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175088" version="1" comment="myspell-vi is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175089" version="1" comment="myspell-vi_VN is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175090" version="1" comment="myspell-zu_ZA is &lt;20180403-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168956" version="1" comment="qemu is &lt;2.9.1-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168957" version="1" comment="qemu-block-curl is &lt;2.9.1-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168958" version="1" comment="qemu-ipxe is &lt;1.0.0-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168959" version="1" comment="qemu-kvm is &lt;2.9.1-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168960" version="1" comment="qemu-seabios is &lt;1.10.2-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168961" version="1" comment="qemu-sgabios is &lt;8-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168962" version="1" comment="qemu-tools is &lt;2.9.1-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168963" version="1" comment="qemu-vgabios is &lt;1.10.2-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168964" version="1" comment="qemu-x86 is &lt;2.9.1-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117426" version="1" comment="sle-ha-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114327" version="1" comment="libnetfilter_cthelper is &lt;1.0.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114329" version="1" comment="libnetfilter_cthelper0 is &lt;1.0.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114331" version="1" comment="libnetfilter_cttimeout is &lt;1.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114333" version="1" comment="libnetfilter_cttimeout1 is &lt;1.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114744" version="1" comment="haproxy is &lt;1.5.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146027" version="1" comment="ctdb is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146028" version="1" comment="samba is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125856" version="1" comment="ctdb is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165226" version="1" comment="ctdb is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165227" version="1" comment="samba is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150062" version="1" comment="ctdb is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150063" version="1" comment="samba is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130777" version="1" comment="hawk2 is &lt;1.0.1+git.1456406635.49e230d-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125858" version="1" comment="sle-ha-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131309" version="1" comment="ctdb is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136223" version="1" comment="libpacemaker3 is &lt;1.1.13-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136224" version="1" comment="pacemaker is &lt;1.1.13-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136225" version="1" comment="pacemaker-cli is &lt;1.1.13-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136226" version="1" comment="pacemaker-cts is &lt;1.1.13-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136227" version="1" comment="pacemaker-remote is &lt;1.1.13-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136228" version="1" comment="libpcreposix0 is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145954" version="1" comment="ctdb is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125857" version="1" comment="ctdb is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167083" version="1" comment="ctdb is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150064" version="1" comment="ctdb is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155848" version="1" comment="ctdb is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135875" version="1" comment="libpacemaker3 is &lt;1.1.15-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135876" version="1" comment="pacemaker is &lt;1.1.15-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135877" version="1" comment="pacemaker-cli is &lt;1.1.15-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135878" version="1" comment="pacemaker-cts is &lt;1.1.15-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135879" version="1" comment="pacemaker-remote is &lt;1.1.15-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136654" version="1" comment="cluster-md-kmp-default is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136655" version="1" comment="cluster-network-kmp-default is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136656" version="1" comment="dlm-kmp-default is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136657" version="1" comment="gfs2-kmp-default is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136658" version="1" comment="ocfs2-kmp-default is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142729" version="1" comment="cluster-md-kmp-default is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142730" version="1" comment="cluster-network-kmp-default is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142731" version="1" comment="dlm-kmp-default is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142732" version="1" comment="gfs2-kmp-default is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142733" version="1" comment="ocfs2-kmp-default is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145955" version="1" comment="ctdb is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157590" version="1" comment="cluster-md-kmp-default is &lt;4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157591" version="1" comment="cluster-network-kmp-default is &lt;4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157592" version="1" comment="dlm-kmp-default is &lt;4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157593" version="1" comment="gfs2-kmp-default is &lt;4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157594" version="1" comment="ocfs2-kmp-default is &lt;4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158783" version="1" comment="cluster-md-kmp-default is &lt;4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158784" version="1" comment="cluster-network-kmp-default is &lt;4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158785" version="1" comment="dlm-kmp-default is &lt;4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158786" version="1" comment="gfs2-kmp-default is &lt;4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158787" version="1" comment="ocfs2-kmp-default is &lt;4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161410" version="1" comment="cluster-md-kmp-default is &lt;4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161411" version="1" comment="cluster-network-kmp-default is &lt;4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161412" version="1" comment="dlm-kmp-default is &lt;4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161413" version="1" comment="gfs2-kmp-default is &lt;4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161414" version="1" comment="ocfs2-kmp-default is &lt;4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161415" version="1" comment="hawk is &lt;1.0.0+git.1448981395.15fb8b9-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161416" version="1" comment="hawk-templates is &lt;1.0.0+git.1448981395.15fb8b9-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161769" version="1" comment="cluster-md-kmp-default is &lt;4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161770" version="1" comment="cluster-network-kmp-default is &lt;4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161771" version="1" comment="dlm-kmp-default is &lt;4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161772" version="1" comment="gfs2-kmp-default is &lt;4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161773" version="1" comment="ocfs2-kmp-default is &lt;4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164300" version="1" comment="cluster-md-kmp-default is &lt;4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164301" version="1" comment="cluster-network-kmp-default is &lt;4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164302" version="1" comment="dlm-kmp-default is &lt;4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164303" version="1" comment="gfs2-kmp-default is &lt;4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164304" version="1" comment="ocfs2-kmp-default is &lt;4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165026" version="1" comment="ctdb is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166120" version="1" comment="cluster-md-kmp-default is &lt;4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166121" version="1" comment="cluster-network-kmp-default is &lt;4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166122" version="1" comment="dlm-kmp-default is &lt;4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166123" version="1" comment="gfs2-kmp-default is &lt;4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166124" version="1" comment="ocfs2-kmp-default is &lt;4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167230" version="1" comment="ctdb is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167768" version="1" comment="cluster-md-kmp-default is &lt;4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167769" version="1" comment="cluster-network-kmp-default is &lt;4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167770" version="1" comment="dlm-kmp-default is &lt;4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167771" version="1" comment="gfs2-kmp-default is &lt;4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167772" version="1" comment="ocfs2-kmp-default is &lt;4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168800" version="1" comment="cluster-md-kmp-default is &lt;4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168801" version="1" comment="cluster-network-kmp-default is &lt;4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168802" version="1" comment="dlm-kmp-default is &lt;4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168803" version="1" comment="gfs2-kmp-default is &lt;4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168804" version="1" comment="ocfs2-kmp-default is &lt;4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149016" version="1" comment="cluster-md-kmp-default is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149017" version="1" comment="cluster-network-kmp-default is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149018" version="1" comment="dlm-kmp-default is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149019" version="1" comment="gfs2-kmp-default is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149020" version="1" comment="ocfs2-kmp-default is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150065" version="1" comment="ctdb is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150066" version="1" comment="cluster-md-kmp-default is &lt;4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150067" version="1" comment="cluster-network-kmp-default is &lt;4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150068" version="1" comment="dlm-kmp-default is &lt;4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150069" version="1" comment="gfs2-kmp-default is &lt;4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150070" version="1" comment="ocfs2-kmp-default is &lt;4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155058" version="1" comment="cluster-md-kmp-default is &lt;4.4.59-92.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155059" version="1" comment="cluster-network-kmp-default is &lt;4.4.59-92.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155060" version="1" comment="dlm-kmp-default is &lt;4.4.59-92.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155061" version="1" comment="gfs2-kmp-default is &lt;4.4.59-92.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155062" version="1" comment="ocfs2-kmp-default is &lt;4.4.59-92.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155849" version="1" comment="ctdb is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147234" version="1" comment="cluster-md-kmp-default is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147235" version="1" comment="cluster-network-kmp-default is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147236" version="1" comment="dlm-kmp-default is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147237" version="1" comment="gfs2-kmp-default is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147238" version="1" comment="ocfs2-kmp-default is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156972" version="1" comment="cluster-md-kmp-default is &lt;4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156973" version="1" comment="cluster-network-kmp-default is &lt;4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156974" version="1" comment="dlm-kmp-default is &lt;4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156975" version="1" comment="gfs2-kmp-default is &lt;4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156976" version="1" comment="ocfs2-kmp-default is &lt;4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169060" version="1" comment="cluster-md-kmp-default is &lt;4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169061" version="1" comment="cluster-network-kmp-default is &lt;4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169062" version="1" comment="dlm-kmp-default is &lt;4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169063" version="1" comment="gfs2-kmp-default is &lt;4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169064" version="1" comment="ocfs2-kmp-default is &lt;4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171105" version="1" comment="cluster-md-kmp-default is &lt;4.4.114-92.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171106" version="1" comment="cluster-network-kmp-default is &lt;4.4.114-92.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171107" version="1" comment="dlm-kmp-default is &lt;4.4.114-92.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171108" version="1" comment="gfs2-kmp-default is &lt;4.4.114-92.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171109" version="1" comment="ocfs2-kmp-default is &lt;4.4.114-92.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169436" version="1" comment="cluster-md-kmp-default is &lt;4.4.103-92.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169437" version="1" comment="cluster-network-kmp-default is &lt;4.4.103-92.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169438" version="1" comment="dlm-kmp-default is &lt;4.4.103-92.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169439" version="1" comment="gfs2-kmp-default is &lt;4.4.103-92.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169440" version="1" comment="kernel-default is &lt;4.4.103-92.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169441" version="1" comment="ocfs2-kmp-default is &lt;4.4.103-92.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173621" version="1" comment="cluster-md-kmp-default is &lt;4.4.120-92.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173622" version="1" comment="cluster-network-kmp-default is &lt;4.4.120-92.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173623" version="1" comment="dlm-kmp-default is &lt;4.4.120-92.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173624" version="1" comment="gfs2-kmp-default is &lt;4.4.120-92.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173625" version="1" comment="ocfs2-kmp-default is &lt;4.4.120-92.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173933" version="1" comment="ctdb is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162264" version="1" comment="ctdb is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162265" version="1" comment="ldirectord is &lt;4.0.1+git.1495055229.643177f1-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162266" version="1" comment="monitoring-plugins-metadata is &lt;4.0.1+git.1495055229.643177f1-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162267" version="1" comment="resource-agents is &lt;4.0.1+git.1495055229.643177f1-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162434" version="1" comment="cluster-md-kmp-default is &lt;4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162435" version="1" comment="dlm-kmp-default is &lt;4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162436" version="1" comment="gfs2-kmp-default is &lt;4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162437" version="1" comment="ocfs2-kmp-default is &lt;4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164305" version="1" comment="cluster-md-kmp-default is &lt;4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164306" version="1" comment="dlm-kmp-default is &lt;4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164307" version="1" comment="gfs2-kmp-default is &lt;4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164308" version="1" comment="ocfs2-kmp-default is &lt;4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165173" version="1" comment="ctdb is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166037" version="1" comment="cluster-md-kmp-default is &lt;4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166038" version="1" comment="dlm-kmp-default is &lt;4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166039" version="1" comment="gfs2-kmp-default is &lt;4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166040" version="1" comment="ocfs2-kmp-default is &lt;4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167291" version="1" comment="ctdb is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167773" version="1" comment="cluster-md-kmp-default is &lt;4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167774" version="1" comment="dlm-kmp-default is &lt;4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167775" version="1" comment="gfs2-kmp-default is &lt;4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167776" version="1" comment="ocfs2-kmp-default is &lt;4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168762" version="1" comment="cluster-md-kmp-default is &lt;4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168763" version="1" comment="dlm-kmp-default is &lt;4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168764" version="1" comment="gfs2-kmp-default is &lt;4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168765" version="1" comment="ocfs2-kmp-default is &lt;4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169065" version="1" comment="cluster-md-kmp-default is &lt;4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169066" version="1" comment="dlm-kmp-default is &lt;4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169067" version="1" comment="gfs2-kmp-default is &lt;4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169068" version="1" comment="ocfs2-kmp-default is &lt;4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170962" version="1" comment="cluster-md-kmp-default is &lt;4.4.114-94.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170963" version="1" comment="dlm-kmp-default is &lt;4.4.114-94.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170964" version="1" comment="gfs2-kmp-default is &lt;4.4.114-94.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170965" version="1" comment="ocfs2-kmp-default is &lt;4.4.114-94.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173438" version="1" comment="ctdb is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173626" version="1" comment="cluster-md-kmp-default is &lt;4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173627" version="1" comment="dlm-kmp-default is &lt;4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173628" version="1" comment="gfs2-kmp-default is &lt;4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173629" version="1" comment="ocfs2-kmp-default is &lt;4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174755" version="1" comment="cluster-md-kmp-default is &lt;4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174756" version="1" comment="dlm-kmp-default is &lt;4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174757" version="1" comment="gfs2-kmp-default is &lt;4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174758" version="1" comment="ocfs2-kmp-default is &lt;4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169768" version="1" comment="cluster-md-kmp-default is &lt;4.4.103-94.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169769" version="1" comment="dlm-kmp-default is &lt;4.4.103-94.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169770" version="1" comment="gfs2-kmp-default is &lt;4.4.103-94.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169771" version="1" comment="kernel-default is &lt;4.4.103-94.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169772" version="1" comment="ocfs2-kmp-default is &lt;4.4.103-94.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107850" version="1" comment="kgraft-patch-3_12_38-44-default is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107851" version="1" comment="kgraft-patch-3_12_38-44-xen is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107852" version="1" comment="kgraft-patch-SLE12_Update_3 is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117427" version="1" comment="sle-live-patching-release is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108386" version="1" comment="kgraft-patch-3_12_39-47-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108387" version="1" comment="kgraft-patch-3_12_39-47-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108388" version="1" comment="kgraft-patch-SLE12_Update_4 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117449" version="1" comment="kgraft-patch-3_12_32-33-default is &lt;2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117450" version="1" comment="kgraft-patch-3_12_32-33-xen is &lt;2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109209" version="1" comment="kgraft-patch-3_12_36-38-default is &lt;2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109210" version="1" comment="kgraft-patch-3_12_36-38-xen is &lt;2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117451" version="1" comment="kgraft-patch-SLE12_Update_1 is &lt;2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109211" version="1" comment="kgraft-patch-SLE12_Update_2 is &lt;2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110524" version="1" comment="kgraft-patch-3_12_43-52_6-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110525" version="1" comment="kgraft-patch-3_12_43-52_6-xen is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110526" version="1" comment="kgraft-patch-SLE12_Update_5 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111589" version="1" comment="kgraft-patch-3_12_44-52_10-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111590" version="1" comment="kgraft-patch-3_12_44-52_10-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111591" version="1" comment="kgraft-patch-SLE12_Update_6 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114149" version="1" comment="kgraft-patch-3_12_32-33-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114150" version="1" comment="kgraft-patch-3_12_32-33-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114151" version="1" comment="kgraft-patch-SLE12_Update_1 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114152" version="1" comment="kgraft-patch-3_12_36-38-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114153" version="1" comment="kgraft-patch-3_12_36-38-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114154" version="1" comment="kgraft-patch-SLE12_Update_2 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114155" version="1" comment="kgraft-patch-3_12_38-44-default is &lt;2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114156" version="1" comment="kgraft-patch-3_12_38-44-xen is &lt;2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114157" version="1" comment="kgraft-patch-SLE12_Update_3 is &lt;2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114158" version="1" comment="kgraft-patch-3_12_39-47-default is &lt;2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114159" version="1" comment="kgraft-patch-3_12_39-47-xen is &lt;2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114160" version="1" comment="kgraft-patch-SLE12_Update_4 is &lt;2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114161" version="1" comment="kgraft-patch-3_12_43-52_6-default is &lt;2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114162" version="1" comment="kgraft-patch-3_12_43-52_6-xen is &lt;2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114163" version="1" comment="kgraft-patch-SLE12_Update_5 is &lt;2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114449" version="1" comment="kgraft-patch-3_12_44-52_18-default is &lt;1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114450" version="1" comment="kgraft-patch-3_12_44-52_18-xen is &lt;1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114451" version="1" comment="kgraft-patch-SLE12_Update_7 is &lt;1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115002" version="1" comment="kgraft-patch-3_12_48-52_27-default is &lt;1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115003" version="1" comment="kgraft-patch-3_12_48-52_27-xen is &lt;1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115004" version="1" comment="kgraft-patch-SLE12_Update_8 is &lt;1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117428" version="1" comment="kgraft-patch-3_12_32-33-default is &lt;4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117429" version="1" comment="kgraft-patch-3_12_32-33-xen is &lt;4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117430" version="1" comment="kgraft-patch-SLE12_Update_1 is &lt;4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117431" version="1" comment="kgraft-patch-3_12_36-38-default is &lt;4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117432" version="1" comment="kgraft-patch-3_12_36-38-xen is &lt;4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117433" version="1" comment="kgraft-patch-SLE12_Update_2 is &lt;4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117440" version="1" comment="kgraft-patch-3_12_38-44-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117441" version="1" comment="kgraft-patch-3_12_38-44-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117442" version="1" comment="kgraft-patch-SLE12_Update_3 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117443" version="1" comment="kgraft-patch-3_12_39-47-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117444" version="1" comment="kgraft-patch-3_12_39-47-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117445" version="1" comment="kgraft-patch-SLE12_Update_4 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117446" version="1" comment="kgraft-patch-3_12_43-52_6-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117447" version="1" comment="kgraft-patch-3_12_43-52_6-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117448" version="1" comment="kgraft-patch-SLE12_Update_5 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117434" version="1" comment="kgraft-patch-3_12_44-52_10-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117435" version="1" comment="kgraft-patch-3_12_44-52_10-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117436" version="1" comment="kgraft-patch-SLE12_Update_6 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117437" version="1" comment="kgraft-patch-3_12_44-52_18-default is &lt;2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117438" version="1" comment="kgraft-patch-3_12_44-52_18-xen is &lt;2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117439" version="1" comment="kgraft-patch-SLE12_Update_7 is &lt;2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118189" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118190" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118191" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118992" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118993" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118994" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129295" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129296" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129297" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129353" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129354" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129355" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129411" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129412" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129413" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129414" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129415" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129416" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121147" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121148" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121149" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130792" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;5-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130793" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;5-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130794" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;5-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131310" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131311" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131312" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131313" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131314" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131315" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131316" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131317" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131318" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131319" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131320" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131321" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131322" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131323" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131324" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131325" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131326" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131327" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121560" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121561" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121562" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131328" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131329" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131330" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131331" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131332" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131333" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131334" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131335" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131336" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131337" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131338" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131339" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131340" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131341" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131342" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131343" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131344" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131345" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131346" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;6-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131347" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;6-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131348" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;6-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131349" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131350" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131351" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131352" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131353" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131354" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121642" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121643" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121644" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131355" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131356" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131357" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131358" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;7-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131359" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;7-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131360" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;7-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131361" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131362" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131363" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131364" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131365" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131366" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131367" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131368" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131369" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131370" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131371" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131372" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131373" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131374" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131375" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131376" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131377" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131378" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131379" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131380" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131381" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131382" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131383" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131384" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135974" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135975" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135976" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136659" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136660" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136661" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136662" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136663" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142353" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;8-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142354" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;8-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142355" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;8-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142356" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142357" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142358" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142359" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142360" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142361" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142362" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142363" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142364" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142365" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142366" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142367" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142368" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142369" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142370" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142734" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142735" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142736" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142737" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142738" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142739" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142740" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142741" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143041" version="1" comment="kgraft-patch-4_4_21-69-default is &lt;2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143042" version="1" comment="kgraft-patch-SLE12-SP2_Update_0 is &lt;2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143064" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143065" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143066" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143067" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143068" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143069" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144645" version="1" comment="kgraft-patch-4_4_21-81-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144646" version="1" comment="kgraft-patch-SLE12-SP2_Update_1 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144647" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144648" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144649" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121645" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121646" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121647" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121308" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121309" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121310" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121302" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121303" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121304" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121305" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121306" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121307" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121299" version="1" comment="kgraft-patch-3_12_48-52_27-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121300" version="1" comment="kgraft-patch-3_12_48-52_27-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121301" version="1" comment="kgraft-patch-SLE12_Update_8 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121290" version="1" comment="kgraft-patch-3_12_43-52_6-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121291" version="1" comment="kgraft-patch-3_12_43-52_6-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121292" version="1" comment="kgraft-patch-SLE12_Update_5 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121287" version="1" comment="kgraft-patch-3_12_39-47-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121288" version="1" comment="kgraft-patch-3_12_39-47-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121289" version="1" comment="kgraft-patch-SLE12_Update_4 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121284" version="1" comment="kgraft-patch-3_12_38-44-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121285" version="1" comment="kgraft-patch-3_12_38-44-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121286" version="1" comment="kgraft-patch-SLE12_Update_3 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121293" version="1" comment="kgraft-patch-3_12_44-52_10-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121294" version="1" comment="kgraft-patch-3_12_44-52_10-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121295" version="1" comment="kgraft-patch-SLE12_Update_6 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121296" version="1" comment="kgraft-patch-3_12_44-52_18-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121297" version="1" comment="kgraft-patch-3_12_44-52_18-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121298" version="1" comment="kgraft-patch-SLE12_Update_7 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121281" version="1" comment="kgraft-patch-3_12_36-38-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121282" version="1" comment="kgraft-patch-3_12_36-38-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121283" version="1" comment="kgraft-patch-SLE12_Update_2 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121278" version="1" comment="kgraft-patch-3_12_32-33-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121279" version="1" comment="kgraft-patch-3_12_32-33-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121280" version="1" comment="kgraft-patch-SLE12_Update_1 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123252" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123253" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123254" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123018" version="1" comment="kgraft-patch-3_12_38-44-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123019" version="1" comment="kgraft-patch-3_12_38-44-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123020" version="1" comment="kgraft-patch-SLE12_Update_3 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123164" version="1" comment="kgraft-patch-3_12_39-47-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123165" version="1" comment="kgraft-patch-3_12_39-47-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123166" version="1" comment="kgraft-patch-SLE12_Update_4 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123167" version="1" comment="kgraft-patch-3_12_43-52_6-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123168" version="1" comment="kgraft-patch-3_12_43-52_6-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123169" version="1" comment="kgraft-patch-SLE12_Update_5 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123170" version="1" comment="kgraft-patch-3_12_44-52_10-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123171" version="1" comment="kgraft-patch-3_12_44-52_10-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123172" version="1" comment="kgraft-patch-SLE12_Update_6 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123173" version="1" comment="kgraft-patch-3_12_44-52_18-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123174" version="1" comment="kgraft-patch-3_12_44-52_18-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123175" version="1" comment="kgraft-patch-SLE12_Update_7 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123176" version="1" comment="kgraft-patch-3_12_48-52_27-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123177" version="1" comment="kgraft-patch-3_12_48-52_27-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123178" version="1" comment="kgraft-patch-SLE12_Update_8 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123179" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123180" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123181" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123182" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123183" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123184" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123185" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123186" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123187" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123230" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;3-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123231" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;3-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123232" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;3-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123233" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123234" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123235" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123236" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123237" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123238" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124809" version="1" comment="kgraft-patch-3_12_55-52_42-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124810" version="1" comment="kgraft-patch-3_12_55-52_42-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124811" version="1" comment="kgraft-patch-SLE12_Update_12 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125859" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125860" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125861" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126206" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126207" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126208" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126209" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;4-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126210" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;4-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126211" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;4-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126212" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126213" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126214" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126215" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126216" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126217" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126218" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126219" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126220" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126221" version="1" comment="kgraft-patch-3_12_39-47-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126222" version="1" comment="kgraft-patch-3_12_39-47-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126223" version="1" comment="kgraft-patch-SLE12_Update_4 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126224" version="1" comment="kgraft-patch-3_12_44-52_10-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126225" version="1" comment="kgraft-patch-3_12_44-52_10-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126226" version="1" comment="kgraft-patch-SLE12_Update_6 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126227" version="1" comment="kgraft-patch-3_12_44-52_18-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126228" version="1" comment="kgraft-patch-3_12_44-52_18-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126229" version="1" comment="kgraft-patch-SLE12_Update_7 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126230" version="1" comment="kgraft-patch-3_12_48-52_27-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126231" version="1" comment="kgraft-patch-3_12_48-52_27-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126232" version="1" comment="kgraft-patch-SLE12_Update_8 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126233" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126234" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126235" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126252" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126253" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126254" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126255" version="1" comment="kgraft-patch-3_12_43-52_6-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126256" version="1" comment="kgraft-patch-3_12_43-52_6-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126257" version="1" comment="kgraft-patch-SLE12_Update_5 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128904" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128905" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128906" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157595" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157596" version="1" comment="kgraft-patch-SLE12-SP2_Update_9 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147407" version="1" comment="kgraft-patch-4_4_21-69-default is &lt;3-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147408" version="1" comment="kgraft-patch-SLE12-SP2_Update_0 is &lt;3-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147409" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147410" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147411" version="1" comment="kgraft-patch-4_4_21-81-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147412" version="1" comment="kgraft-patch-SLE12-SP2_Update_1 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147413" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147414" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147415" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147416" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147417" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147418" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147419" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147420" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147421" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147422" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147423" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147424" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158788" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158789" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147425" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147426" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147427" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147428" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147429" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147430" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147431" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147432" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147433" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159331" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159332" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159333" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159334" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159335" version="1" comment="kgraft-patch-4_4_21-69-default is &lt;7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159336" version="1" comment="kgraft-patch-SLE12-SP2_Update_0 is &lt;7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159337" version="1" comment="kgraft-patch-4_4_21-81-default is &lt;7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159338" version="1" comment="kgraft-patch-SLE12-SP2_Update_1 is &lt;7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159339" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159340" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159341" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159342" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159343" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159344" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159364" version="1" comment="kgraft-patch-4_4_49-92_14-default is &lt;3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159365" version="1" comment="kgraft-patch-SLE12-SP2_Update_6 is &lt;3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159366" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159367" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161417" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161418" version="1" comment="kgraft-patch-SLE12-SP2_Update_11 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161425" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161426" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161427" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161428" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161506" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161507" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161508" version="1" comment="kgraft-patch-4_4_21-69-default is &lt;8-18.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161509" version="1" comment="kgraft-patch-SLE12-SP2_Update_0 is &lt;8-18.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161510" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161511" version="1" comment="kgraft-patch-SLE12-SP2_Update_9 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161512" version="1" comment="kgraft-patch-4_4_49-92_14-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161513" version="1" comment="kgraft-patch-SLE12-SP2_Update_6 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161514" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161515" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161516" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161517" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161518" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161519" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161520" version="1" comment="kgraft-patch-4_4_21-81-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161521" version="1" comment="kgraft-patch-SLE12-SP2_Update_1 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161522" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161523" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161774" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161775" version="1" comment="kgraft-patch-SLE12-SP2_Update_12 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147632" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147633" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147634" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163641" version="1" comment="kgraft-patch-4_4_21-81-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163642" version="1" comment="kgraft-patch-SLE12-SP2_Update_1 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163643" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163644" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163645" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163646" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163647" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163648" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163649" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163650" version="1" comment="kgraft-patch-SLE12-SP2_Update_12 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163651" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163652" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163653" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163654" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163655" version="1" comment="kgraft-patch-4_4_49-92_14-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163656" version="1" comment="kgraft-patch-SLE12-SP2_Update_6 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163657" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163658" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163659" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163660" version="1" comment="kgraft-patch-SLE12-SP2_Update_9 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163661" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163662" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147814" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147815" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163663" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163664" version="1" comment="kgraft-patch-SLE12-SP2_Update_11 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163665" version="1" comment="kgraft-patch-4_4_21-69-default is &lt;9-18.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163666" version="1" comment="kgraft-patch-SLE12-SP2_Update_0 is &lt;9-18.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147816" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147817" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147818" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164309" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164310" version="1" comment="kgraft-patch-SLE12-SP2_Update_13 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147842" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147843" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165850" version="1" comment="kgraft-patch-4_4_21-81-default is &lt;10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165851" version="1" comment="kgraft-patch-SLE12-SP2_Update_1 is &lt;10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165852" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165853" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165854" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165855" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165856" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165857" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165858" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165859" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165860" version="1" comment="kgraft-patch-4_4_49-92_14-default is &lt;6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165861" version="1" comment="kgraft-patch-SLE12-SP2_Update_6 is &lt;6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165862" version="1" comment="kgraft-patch-4_4_21-69-default is &lt;10-18.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165863" version="1" comment="kgraft-patch-SLE12-SP2_Update_0 is &lt;10-18.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165864" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165865" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165866" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;4-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165867" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;4-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165868" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;4-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165869" version="1" comment="kgraft-patch-SLE12-SP2_Update_9 is &lt;4-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165870" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165871" version="1" comment="kgraft-patch-SLE12-SP2_Update_11 is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165872" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165873" version="1" comment="kgraft-patch-SLE12-SP2_Update_12 is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165874" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165875" version="1" comment="kgraft-patch-SLE12-SP2_Update_13 is &lt;2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165876" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165877" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166125" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;1-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166126" version="1" comment="kgraft-patch-SLE12-SP2_Update_14 is &lt;1-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167301" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167302" version="1" comment="kgraft-patch-SLE12-SP2_Update_13 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167303" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167304" version="1" comment="kgraft-patch-SLE12-SP2_Update_12 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167305" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167306" version="1" comment="kgraft-patch-SLE12-SP2_Update_11 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167307" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167308" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167309" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167310" version="1" comment="kgraft-patch-SLE12-SP2_Update_9 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167311" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167312" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167313" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167314" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167315" version="1" comment="kgraft-patch-4_4_49-92_14-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167316" version="1" comment="kgraft-patch-SLE12-SP2_Update_6 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167317" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167318" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167319" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167320" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167368" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167369" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167370" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167371" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167777" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167778" version="1" comment="kgraft-patch-SLE12-SP2_Update_15 is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168285" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168286" version="1" comment="kgraft-patch-SLE12-SP2_Update_9 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168287" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168288" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168289" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168290" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168291" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168292" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168293" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168294" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168295" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168296" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168297" version="1" comment="kgraft-patch-4_4_49-92_14-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168298" version="1" comment="kgraft-patch-SLE12-SP2_Update_6 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168299" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168300" version="1" comment="kgraft-patch-SLE12-SP2_Update_12 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168301" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168302" version="1" comment="kgraft-patch-SLE12-SP2_Update_13 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168303" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168304" version="1" comment="kgraft-patch-SLE12-SP2_Update_11 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168305" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168306" version="1" comment="kgraft-patch-SLE12-SP2_Update_14 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168307" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168308" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168309" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168310" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168805" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168806" version="1" comment="kgraft-patch-SLE12-SP2_Update_16 is &lt;1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148407" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148408" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148409" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148671" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148672" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148673" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149021" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149022" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149688" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149689" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149690" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149691" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149692" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149693" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149694" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149695" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149696" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149697" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149698" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149699" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149700" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149701" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149702" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149703" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149704" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149705" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149706" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149707" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149708" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149709" version="1" comment="kgraft-patch-4_4_21-69-default is &lt;4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149710" version="1" comment="kgraft-patch-SLE12-SP2_Update_0 is &lt;4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149711" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149712" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149713" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149714" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149715" version="1" comment="kgraft-patch-4_4_21-81-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149716" version="1" comment="kgraft-patch-SLE12-SP2_Update_1 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149717" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149718" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149719" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149720" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149721" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149812" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149813" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149814" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150071" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150072" version="1" comment="kgraft-patch-3_12_69-60_64_35-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150073" version="1" comment="kgraft-patch-SLE12-SP1_Update_14 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150074" version="1" comment="kgraft-patch-4_4_49-92_14-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150075" version="1" comment="kgraft-patch-SLE12-SP2_Update_6 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150076" version="1" comment="kgraft-patch-4_4_21-69-default is &lt;5-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150077" version="1" comment="kgraft-patch-SLE12-SP2_Update_0 is &lt;5-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150078" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150079" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150080" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150081" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150082" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150083" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150084" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150085" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150086" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150087" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150088" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150089" version="1" comment="kgraft-patch-4_4_21-81-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150090" version="1" comment="kgraft-patch-SLE12-SP2_Update_1 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150091" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150092" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150093" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150094" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150095" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150096" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150097" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150098" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150099" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150100" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150101" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150102" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150103" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150104" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150105" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150106" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150107" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150108" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150109" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150110" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150111" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150112" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150113" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150114" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150115" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150116" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150117" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154431" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154432" version="1" comment="kgraft-patch-3_12_69-60_64_35-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154433" version="1" comment="kgraft-patch-SLE12-SP1_Update_14 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154434" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154435" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154436" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154437" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154438" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155063" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155064" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155366" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155367" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155368" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155369" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155370" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155371" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155372" version="1" comment="kgraft-patch-4_4_21-81-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155373" version="1" comment="kgraft-patch-SLE12-SP2_Update_1 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155374" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155375" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155376" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155377" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155378" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155379" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155380" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155381" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155382" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155383" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155384" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155385" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155386" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155387" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155388" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155389" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155390" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155391" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155392" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155393" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155394" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155395" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155396" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155397" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155398" version="1" comment="kgraft-patch-4_4_21-69-default is &lt;6-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155399" version="1" comment="kgraft-patch-SLE12-SP2_Update_0 is &lt;6-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155556" version="1" comment="kgraft-patch-4_4_49-92_14-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155557" version="1" comment="kgraft-patch-SLE12-SP2_Update_6 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155656" version="1" comment="kgraft-patch-3_12_74-60_64_40-default is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155657" version="1" comment="kgraft-patch-3_12_74-60_64_40-xen is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155658" version="1" comment="kgraft-patch-SLE12-SP1_Update_15 is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147239" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147240" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156977" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156978" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169069" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169070" version="1" comment="kgraft-patch-SLE12-SP2_Update_17 is &lt;1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170498" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170499" version="1" comment="kgraft-patch-SLE12-SP2_Update_13 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170500" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170501" version="1" comment="kgraft-patch-SLE12-SP2_Update_12 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170502" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170503" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170504" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170505" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170506" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170507" version="1" comment="kgraft-patch-SLE12-SP2_Update_14 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170508" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170509" version="1" comment="kgraft-patch-SLE12-SP2_Update_11 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170510" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170511" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170512" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170513" version="1" comment="kgraft-patch-SLE12-SP2_Update_9 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170514" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170515" version="1" comment="kgraft-patch-SLE12-SP2_Update_15 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170516" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170517" version="1" comment="kgraft-patch-SLE12-SP2_Update_17 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170518" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170519" version="1" comment="kgraft-patch-SLE12-SP2_Update_16 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170520" version="1" comment="kgraft-patch-4_4_49-92_14-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170521" version="1" comment="kgraft-patch-SLE12-SP2_Update_6 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170522" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170523" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171110" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;1-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171111" version="1" comment="kgraft-patch-SLE12-SP2_Update_18 is &lt;1-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172612" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172613" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172614" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172615" version="1" comment="kgraft-patch-SLE12-SP2_Update_9 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172616" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172617" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172618" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172619" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172620" version="1" comment="kgraft-patch-4_4_49-92_14-default is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172621" version="1" comment="kgraft-patch-SLE12-SP2_Update_6 is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172622" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172623" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172624" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172625" version="1" comment="kgraft-patch-SLE12-SP2_Update_11 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172626" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172627" version="1" comment="kgraft-patch-SLE12-SP2_Update_13 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172628" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172629" version="1" comment="kgraft-patch-SLE12-SP2_Update_16 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172630" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172631" version="1" comment="kgraft-patch-SLE12-SP2_Update_17 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172632" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172633" version="1" comment="kgraft-patch-SLE12-SP2_Update_14 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172644" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172645" version="1" comment="kgraft-patch-SLE12-SP2_Update_12 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172646" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172647" version="1" comment="kgraft-patch-SLE12-SP2_Update_15 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173630" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173631" version="1" comment="kgraft-patch-SLE12-SP2_Update_20 is &lt;1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161622" version="1" comment="kgraft-patch-4_4_73-5-default is &lt;2-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161623" version="1" comment="kgraft-patch-SLE12-SP3_Update_0 is &lt;2-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161624" version="1" comment="sle-live-patching-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162438" version="1" comment="kgraft-patch-4_4_82-6_3-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162439" version="1" comment="kgraft-patch-SLE12-SP3_Update_1 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164311" version="1" comment="kgraft-patch-4_4_82-6_6-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164312" version="1" comment="kgraft-patch-SLE12-SP3_Update_2 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165878" version="1" comment="kgraft-patch-4_4_82-6_3-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165879" version="1" comment="kgraft-patch-SLE12-SP3_Update_1 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166041" version="1" comment="kgraft-patch-4_4_92-6_18-default is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166042" version="1" comment="kgraft-patch-SLE12-SP3_Update_4 is &lt;1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167084" version="1" comment="kgraft-patch-4_4_82-6_3-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167085" version="1" comment="kgraft-patch-SLE12-SP3_Update_1 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167086" version="1" comment="kgraft-patch-4_4_82-6_9-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167087" version="1" comment="kgraft-patch-SLE12-SP3_Update_3 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167088" version="1" comment="kgraft-patch-4_4_82-6_6-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167089" version="1" comment="kgraft-patch-SLE12-SP3_Update_2 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167779" version="1" comment="kgraft-patch-4_4_92-6_30-default is &lt;1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167780" version="1" comment="kgraft-patch-SLE12-SP3_Update_5 is &lt;1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168311" version="1" comment="kgraft-patch-4_4_92-6_18-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168312" version="1" comment="kgraft-patch-SLE12-SP3_Update_4 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168313" version="1" comment="kgraft-patch-4_4_82-6_6-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168314" version="1" comment="kgraft-patch-SLE12-SP3_Update_2 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168315" version="1" comment="kgraft-patch-4_4_82-6_9-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168316" version="1" comment="kgraft-patch-SLE12-SP3_Update_3 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168317" version="1" comment="kgraft-patch-4_4_82-6_3-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168318" version="1" comment="kgraft-patch-SLE12-SP3_Update_1 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168766" version="1" comment="kgraft-patch-4_4_103-6_33-default is &lt;1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168767" version="1" comment="kgraft-patch-SLE12-SP3_Update_6 is &lt;1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169071" version="1" comment="kgraft-patch-4_4_103-6_38-default is &lt;1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169072" version="1" comment="kgraft-patch-SLE12-SP3_Update_7 is &lt;1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170850" version="1" comment="kgraft-patch-4_4_82-6_3-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170851" version="1" comment="kgraft-patch-SLE12-SP3_Update_1 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170852" version="1" comment="kgraft-patch-4_4_82-6_9-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170853" version="1" comment="kgraft-patch-SLE12-SP3_Update_3 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170854" version="1" comment="kgraft-patch-4_4_82-6_6-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170855" version="1" comment="kgraft-patch-SLE12-SP3_Update_2 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170856" version="1" comment="kgraft-patch-4_4_92-6_18-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170857" version="1" comment="kgraft-patch-SLE12-SP3_Update_4 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170966" version="1" comment="kgraft-patch-4_4_114-94_11-default is &lt;1-4.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170967" version="1" comment="kgraft-patch-SLE12-SP3_Update_8 is &lt;1-4.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171248" version="1" comment="kgraft-patch-4_4_92-6_30-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171249" version="1" comment="kgraft-patch-SLE12-SP3_Update_5 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171250" version="1" comment="kgraft-patch-4_4_103-6_33-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171251" version="1" comment="kgraft-patch-SLE12-SP3_Update_6 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171252" version="1" comment="kgraft-patch-4_4_103-6_38-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171253" version="1" comment="kgraft-patch-SLE12-SP3_Update_7 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172648" version="1" comment="kgraft-patch-4_4_103-6_33-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172649" version="1" comment="kgraft-patch-SLE12-SP3_Update_6 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172650" version="1" comment="kgraft-patch-4_4_103-6_38-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172651" version="1" comment="kgraft-patch-SLE12-SP3_Update_7 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172652" version="1" comment="kgraft-patch-4_4_92-6_30-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172653" version="1" comment="kgraft-patch-SLE12-SP3_Update_5 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172654" version="1" comment="kgraft-patch-4_4_92-6_18-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172655" version="1" comment="kgraft-patch-SLE12-SP3_Update_4 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172656" version="1" comment="kgraft-patch-4_4_82-6_6-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172657" version="1" comment="kgraft-patch-SLE12-SP3_Update_2 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172658" version="1" comment="kgraft-patch-4_4_82-6_9-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172659" version="1" comment="kgraft-patch-SLE12-SP3_Update_3 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172660" version="1" comment="kgraft-patch-4_4_82-6_3-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172661" version="1" comment="kgraft-patch-SLE12-SP3_Update_1 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173632" version="1" comment="kgraft-patch-4_4_120-94_17-default is &lt;1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173633" version="1" comment="kgraft-patch-SLE12-SP3_Update_10 is &lt;1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174598" version="1" comment="kgraft-patch-4_4_114-94_11-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174599" version="1" comment="kgraft-patch-SLE12-SP3_Update_8 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174600" version="1" comment="kgraft-patch-4_4_114-94_14-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174601" version="1" comment="kgraft-patch-SLE12-SP3_Update_9 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174602" version="1" comment="kgraft-patch-4_4_103-6_33-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174603" version="1" comment="kgraft-patch-SLE12-SP3_Update_6 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174604" version="1" comment="kgraft-patch-4_4_103-6_38-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174605" version="1" comment="kgraft-patch-SLE12-SP3_Update_7 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174606" version="1" comment="kgraft-patch-4_4_92-6_30-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174607" version="1" comment="kgraft-patch-SLE12-SP3_Update_5 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174608" version="1" comment="kgraft-patch-4_4_92-6_18-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174609" version="1" comment="kgraft-patch-SLE12-SP3_Update_4 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174610" version="1" comment="kgraft-patch-4_4_82-6_6-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174611" version="1" comment="kgraft-patch-SLE12-SP3_Update_2 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174612" version="1" comment="kgraft-patch-4_4_82-6_9-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174613" version="1" comment="kgraft-patch-SLE12-SP3_Update_3 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174614" version="1" comment="kgraft-patch-4_4_82-6_3-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174615" version="1" comment="kgraft-patch-SLE12-SP3_Update_1 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174759" version="1" comment="kgraft-patch-4_4_126-94_22-default is &lt;1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174760" version="1" comment="kgraft-patch-SLE12-SP3_Update_11 is &lt;1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161625" version="1" comment="puppet-server is &lt;3.8.5-15.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165070" version="1" comment="salt is &lt;2016.11.4-46.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165071" version="1" comment="salt-api is &lt;2016.11.4-46.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165072" version="1" comment="salt-bash-completion is &lt;2016.11.4-46.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165073" version="1" comment="salt-cloud is &lt;2016.11.4-46.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165074" version="1" comment="salt-doc is &lt;2016.11.4-46.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165075" version="1" comment="salt-master is &lt;2016.11.4-46.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165076" version="1" comment="salt-minion is &lt;2016.11.4-46.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165077" version="1" comment="salt-proxy is &lt;2016.11.4-46.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165078" version="1" comment="salt-ssh is &lt;2016.11.4-46.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165079" version="1" comment="salt-syndic is &lt;2016.11.4-46.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165080" version="1" comment="salt-zsh-completion is &lt;2016.11.4-46.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168721" version="1" comment="salt is &lt;2016.11.4-46.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168722" version="1" comment="salt-api is &lt;2016.11.4-46.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168723" version="1" comment="salt-bash-completion is &lt;2016.11.4-46.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168724" version="1" comment="salt-cloud is &lt;2016.11.4-46.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168725" version="1" comment="salt-doc is &lt;2016.11.4-46.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168726" version="1" comment="salt-master is &lt;2016.11.4-46.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168727" version="1" comment="salt-minion is &lt;2016.11.4-46.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168728" version="1" comment="salt-proxy is &lt;2016.11.4-46.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168729" version="1" comment="salt-ssh is &lt;2016.11.4-46.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168730" version="1" comment="salt-syndic is &lt;2016.11.4-46.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168731" version="1" comment="salt-zsh-completion is &lt;2016.11.4-46.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156841" version="1" comment="salt is &lt;2016.11.4-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156842" version="1" comment="salt-api is &lt;2016.11.4-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156843" version="1" comment="salt-bash-completion is &lt;2016.11.4-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156844" version="1" comment="salt-cloud is &lt;2016.11.4-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156845" version="1" comment="salt-doc is &lt;2016.11.4-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156846" version="1" comment="salt-master is &lt;2016.11.4-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156847" version="1" comment="salt-minion is &lt;2016.11.4-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156848" version="1" comment="salt-proxy is &lt;2016.11.4-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156849" version="1" comment="salt-ssh is &lt;2016.11.4-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156850" version="1" comment="salt-syndic is &lt;2016.11.4-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156851" version="1" comment="salt-zsh-completion is &lt;2016.11.4-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172634" version="1" comment="puppet-server is &lt;3.8.5-15.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172687" version="1" comment="ruby2.1-rubygem-puppet is &lt;4.8.1-32.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172688" version="1" comment="rubygem-puppet is &lt;4.8.1-32.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118611" version="1" comment="ruby2.1-rubygem-passenger is &lt;5.0.18-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118612" version="1" comment="rubygem-passenger is &lt;5.0.18-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118613" version="1" comment="rubygem-passenger-apache2 is &lt;5.0.18-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111432" version="1" comment="python-setuptools is &lt;1.1.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115047" version="1" comment="docker is &lt;1.8.3-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118570" version="1" comment="ruby2.1-rubygem-rack-1_4 is &lt;1.4.5-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118571" version="1" comment="rubygem-rack-1_4 is &lt;1.4.5-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130756" version="1" comment="sles12-docker-image is &lt;1.1.2-20160727" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130757" version="1" comment="sles12sp1-docker-image is &lt;1.0.5-20160727" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142371" version="1" comment="containerd is &lt;0.2.4+gitr565_0366d7e-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142372" version="1" comment="docker is &lt;1.12.3-81.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142373" version="1" comment="ruby2.1-rubygem-docker-api is &lt;1.31.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142374" version="1" comment="ruby2.1-rubygem-excon is &lt;0.52.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142375" version="1" comment="rubygem-docker-api is &lt;1.31.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142376" version="1" comment="rubygem-excon is &lt;0.52.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142377" version="1" comment="runc is &lt;0.1.1+gitr2816_02f8fa7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124724" version="1" comment="sles12sp1-docker-image is &lt;1.0.4-20160308170633" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124735" version="1" comment="sles11sp4-docker-image is &lt;1.1.1-20160304104123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124812" version="1" comment="sles12-docker-image is &lt;1.1.1-20160307082632" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126712" version="1" comment="portus is &lt;2.0.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126780" version="1" comment="docker is &lt;1.10.3-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165029" version="1" comment="portus is &lt;2.2.0-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165174" version="1" comment="sles12-docker-image is &lt;1.1.4-20171002" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165175" version="1" comment="sles12sp1-docker-image is &lt;1.0.7-20171002" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165176" version="1" comment="sles12sp2-docker-image is &lt;1.0.2-20171006" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148141" version="1" comment="containerd is &lt;0.2.5+gitr569_2a5e70c-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148142" version="1" comment="docker is &lt;1.12.6-87.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148143" version="1" comment="runc is &lt;0.1.1+gitr2819_50a19c6-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170524" version="1" comment="ruby2.1-rubygem-passenger is &lt;5.0.18-12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170525" version="1" comment="rubygem-passenger is &lt;5.0.18-12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170526" version="1" comment="rubygem-passenger-apache2 is &lt;5.0.18-12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170968" version="1" comment="containerd is &lt;0.2.9+gitr706_06b9cb351610-16.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170969" version="1" comment="docker is &lt;17.09.1_ce-98.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170970" version="1" comment="docker-libnetwork is &lt;0.7.0.1+gitr2066_7b2b1feb1de4-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170971" version="1" comment="docker-runc is &lt;1.0.0rc4+gitr3338_3f2f8b84a77f-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170972" version="1" comment="golang-github-docker-libnetwork is &lt;0.7.0.1+gitr2066_7b2b1feb1de4-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174119" version="1" comment="docker-distribution is &lt;2.6.2-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174120" version="1" comment="docker-distribution-registry is &lt;2.6.2-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168319" version="1" comment="libpmi0 is &lt;17.02.9-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168320" version="1" comment="libslurm29 is &lt;16.05.8.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168321" version="1" comment="libslurm31 is &lt;17.02.9-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168322" version="1" comment="pdsh is &lt;2.33-7.5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168323" version="1" comment="perl-slurm is &lt;17.02.9-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168324" version="1" comment="slurm is &lt;17.02.9-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168325" version="1" comment="slurm-auth-none is &lt;17.02.9-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168326" version="1" comment="slurm-devel is &lt;17.02.9-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168327" version="1" comment="slurm-doc is &lt;17.02.9-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168328" version="1" comment="slurm-lua is &lt;17.02.9-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168329" version="1" comment="slurm-munge is &lt;17.02.9-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168330" version="1" comment="slurm-pam_slurm is &lt;17.02.9-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168331" version="1" comment="slurm-plugins is &lt;17.02.9-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168332" version="1" comment="slurm-sched-wiki is &lt;17.02.9-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168333" version="1" comment="slurm-slurmdb-direct is &lt;17.02.9-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168334" version="1" comment="slurm-slurmdbd is &lt;17.02.9-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168335" version="1" comment="slurm-sql is &lt;17.02.9-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168336" version="1" comment="slurm-torque is &lt;17.02.9-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168337" version="1" comment="slurmlibs is &lt;16.05.8.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168338" version="1" comment="sle-module-hpc-release is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174558" version="1" comment="libpmi0 is &lt;17.02.10-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174559" version="1" comment="libslurm31 is &lt;17.02.10-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174560" version="1" comment="perl-slurm is &lt;17.02.10-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174561" version="1" comment="slurm is &lt;17.02.10-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174562" version="1" comment="slurm-auth-none is &lt;17.02.10-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174563" version="1" comment="slurm-devel is &lt;17.02.10-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174564" version="1" comment="slurm-doc is &lt;17.02.10-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174565" version="1" comment="slurm-lua is &lt;17.02.10-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174566" version="1" comment="slurm-munge is &lt;17.02.10-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174567" version="1" comment="slurm-pam_slurm is &lt;17.02.10-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174568" version="1" comment="slurm-plugins is &lt;17.02.10-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174569" version="1" comment="slurm-sched-wiki is &lt;17.02.10-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174570" version="1" comment="slurm-slurmdb-direct is &lt;17.02.10-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174571" version="1" comment="slurm-slurmdbd is &lt;17.02.10-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174572" version="1" comment="slurm-sql is &lt;17.02.10-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174573" version="1" comment="slurm-torque is &lt;17.02.10-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102454" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102461" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102462" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102464" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107609" version="1" comment="cups154 is &lt;1.5.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107610" version="1" comment="cups154-client is &lt;1.5.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107613" version="1" comment="cups154-filters is &lt;1.5.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107614" version="1" comment="cups154-libs is &lt;1.5.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110321" version="1" comment="cups154 is &lt;1.5.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110322" version="1" comment="cups154-client is &lt;1.5.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110325" version="1" comment="cups154-filters is &lt;1.5.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110326" version="1" comment="cups154-libs is &lt;1.5.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110566" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110567" version="1" comment="openldap2 is &lt;2.4.39-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110783" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110790" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110791" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110793" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113283" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.7-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113289" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.7-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113290" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.7-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113292" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.7-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106138" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.3-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106145" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.3-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106146" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.3-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106148" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.3-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118092" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.15-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118093" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.15-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118094" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.15-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118095" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.15-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120902" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-18.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120903" version="1" comment="openldap2 is &lt;2.4.41-18.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131385" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.30-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131386" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.30-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131387" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.30-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131388" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.30-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136399" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.35-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136400" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.35-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136401" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.35-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136402" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.35-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122490" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.20-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122491" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.20-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122492" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.20-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122493" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.20-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127548" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.25-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127549" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.25-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127550" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.25-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127551" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.25-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128319" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.26-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128320" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.26-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128321" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.26-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128322" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.26-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158802" version="1" comment="compat-libgcrypt11 is &lt;1.5.0-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167907" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.50-50.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167908" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.50-50.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167909" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.50-50.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167910" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.50-50.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149625" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.41-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149626" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.41-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149627" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.41-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149628" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.41-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155697" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.45-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155698" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.45-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155699" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.45-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155700" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.45-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107837" version="1" comment="kernel-ec2 is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107839" version="1" comment="kernel-ec2-devel is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107840" version="1" comment="kernel-ec2-extra is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108373" version="1" comment="kernel-ec2 is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108375" version="1" comment="kernel-ec2-devel is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108376" version="1" comment="kernel-ec2-extra is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105321" version="1" comment="kernel-ec2 is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105323" version="1" comment="kernel-ec2-devel is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105324" version="1" comment="kernel-ec2-extra is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110511" version="1" comment="kernel-ec2 is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110513" version="1" comment="kernel-ec2-devel is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110514" version="1" comment="kernel-ec2-extra is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111576" version="1" comment="kernel-ec2 is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111578" version="1" comment="kernel-ec2-devel is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111579" version="1" comment="kernel-ec2-extra is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105752" version="1" comment="kernel-ec2 is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105754" version="1" comment="kernel-ec2-devel is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105755" version="1" comment="kernel-ec2-extra is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114436" version="1" comment="kernel-ec2 is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114438" version="1" comment="kernel-ec2-devel is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114439" version="1" comment="kernel-ec2-extra is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114989" version="1" comment="kernel-ec2 is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114991" version="1" comment="kernel-ec2-devel is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114992" version="1" comment="kernel-ec2-extra is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118171" version="1" comment="kernel-ec2 is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118172" version="1" comment="kernel-ec2-devel is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118173" version="1" comment="kernel-ec2-extra is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118995" version="1" comment="kernel-ec2 is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118996" version="1" comment="kernel-ec2-devel is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118997" version="1" comment="kernel-ec2-extra is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129298" version="1" comment="kernel-ec2 is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129299" version="1" comment="kernel-ec2-devel is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129300" version="1" comment="kernel-ec2-extra is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129356" version="1" comment="kernel-ec2 is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129357" version="1" comment="kernel-ec2-devel is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129358" version="1" comment="kernel-ec2-extra is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129417" version="1" comment="kernel-ec2 is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129418" version="1" comment="kernel-ec2-devel is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129419" version="1" comment="kernel-ec2-extra is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129420" version="1" comment="kernel-ec2 is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129421" version="1" comment="kernel-ec2-devel is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129422" version="1" comment="kernel-ec2-extra is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121150" version="1" comment="kernel-ec2 is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121151" version="1" comment="kernel-ec2-devel is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121152" version="1" comment="kernel-ec2-extra is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121545" version="1" comment="kernel-ec2 is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121546" version="1" comment="kernel-ec2-devel is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121547" version="1" comment="kernel-ec2-extra is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131389" version="1" comment="kernel-ec2 is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131390" version="1" comment="kernel-ec2-devel is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131391" version="1" comment="kernel-ec2-extra is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121648" version="1" comment="kernel-ec2 is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121649" version="1" comment="kernel-ec2-devel is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121650" version="1" comment="kernel-ec2-extra is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131392" version="1" comment="kernel-ec2 is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131393" version="1" comment="kernel-ec2-devel is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131394" version="1" comment="kernel-ec2-extra is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131395" version="1" comment="kernel-ec2 is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131396" version="1" comment="kernel-ec2-devel is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131397" version="1" comment="kernel-ec2-extra is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135977" version="1" comment="kernel-ec2 is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135978" version="1" comment="kernel-ec2-devel is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135979" version="1" comment="kernel-ec2-extra is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136664" version="1" comment="kernel-ec2 is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136665" version="1" comment="kernel-ec2-devel is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136666" version="1" comment="kernel-ec2-extra is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141179" version="1" comment="kernel-ec2 is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141180" version="1" comment="kernel-ec2-devel is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141181" version="1" comment="kernel-ec2-extra is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143070" version="1" comment="kernel-ec2 is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143071" version="1" comment="kernel-ec2-devel is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143072" version="1" comment="kernel-ec2-extra is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144650" version="1" comment="kernel-ec2 is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144651" version="1" comment="kernel-ec2-devel is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144652" version="1" comment="kernel-ec2-extra is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123683" version="1" comment="kernel-ec2 is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123684" version="1" comment="kernel-ec2-devel is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123685" version="1" comment="kernel-ec2-extra is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124813" version="1" comment="kernel-ec2 is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124814" version="1" comment="kernel-ec2-devel is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124815" version="1" comment="kernel-ec2-extra is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125862" version="1" comment="kernel-ec2 is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125863" version="1" comment="kernel-ec2-devel is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125864" version="1" comment="kernel-ec2-extra is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121153" version="1" comment="python-rsa is &lt;3.1.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128907" version="1" comment="kernel-ec2 is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128908" version="1" comment="kernel-ec2-devel is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128909" version="1" comment="kernel-ec2-extra is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157394" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157395" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157396" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157665" version="1" comment="kernel-ec2 is &lt;3.12.61-52.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157666" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157667" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161429" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161430" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161431" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161524" version="1" comment="kernel-ec2 is &lt;3.12.61-52.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161525" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161526" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161573" version="1" comment="python-tablib is &lt;0.9.11-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161797" version="1" comment="kernel-ec2 is &lt;3.12.61-52.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161798" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161799" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161800" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161801" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161802" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163130" version="1" comment="python-paramiko is &lt;1.15.2-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163667" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163668" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163669" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164493" version="1" comment="kernel-ec2 is &lt;3.12.61-52.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164494" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164495" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166417" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166418" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166419" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166457" version="1" comment="kernel-ec2 is &lt;3.12.61-52.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166458" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166459" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167730" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167731" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167732" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167983" version="1" comment="kernel-ec2 is &lt;3.12.61-52.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167984" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167985" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168604" version="1" comment="python-PyJWT is &lt;1.4.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148410" version="1" comment="kernel-ec2 is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148411" version="1" comment="kernel-ec2-devel is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148412" version="1" comment="kernel-ec2-extra is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148441" version="1" comment="kernel-ec2 is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148442" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148443" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148674" version="1" comment="kernel-ec2 is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148675" version="1" comment="kernel-ec2-devel is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148676" version="1" comment="kernel-ec2-extra is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150118" version="1" comment="kernel-ec2 is &lt;3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150119" version="1" comment="kernel-ec2-devel is &lt;3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150120" version="1" comment="kernel-ec2-extra is &lt;3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150121" version="1" comment="kernel-ec2 is &lt;3.12.61-52.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150122" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150123" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155329" version="1" comment="kernel-ec2 is &lt;3.12.61-52.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155330" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155331" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155659" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155660" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155661" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156979" version="1" comment="kernel-ec2 is &lt;3.12.61-52.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156980" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156981" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156982" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156983" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156984" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169173" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169174" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169175" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171254" version="1" comment="kernel-ec2 is &lt;3.12.61-52.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171255" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171256" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172262" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172263" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172264" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173970" version="1" comment="kernel-ec2 is &lt;3.12.61-52.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173971" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173972" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173994" version="1" comment="kernel-ec2 is &lt;3.12.74-60.64.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173995" version="1" comment="kernel-ec2-devel is &lt;3.12.74-60.64.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173996" version="1" comment="kernel-ec2-extra is &lt;3.12.74-60.64.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169773" version="1" comment="kernel-ec2 is &lt;3.12.61-52.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169774" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169775" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125866" version="1" comment="gcc5-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125867" version="1" comment="gcc5-ada is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125868" version="1" comment="gcc5-ada-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125870" version="1" comment="gcc5-c++-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125872" version="1" comment="gcc5-fortran-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125875" version="1" comment="libada5 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125876" version="1" comment="libada5-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125878" version="1" comment="libffi-devel-gcc5-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125880" version="1" comment="libstdc++6-devel-gcc5-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102154" version="1" comment="apache2-mod_php5 is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102155" version="1" comment="php5 is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102156" version="1" comment="php5-bcmath is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102157" version="1" comment="php5-bz2 is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102158" version="1" comment="php5-calendar is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102159" version="1" comment="php5-ctype is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102160" version="1" comment="php5-curl is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102161" version="1" comment="php5-dba is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102163" version="1" comment="php5-dom is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102164" version="1" comment="php5-enchant is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102165" version="1" comment="php5-exif is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102166" version="1" comment="php5-fastcgi is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102167" version="1" comment="php5-fileinfo is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102169" version="1" comment="php5-fpm is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102170" version="1" comment="php5-ftp is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102171" version="1" comment="php5-gd is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102172" version="1" comment="php5-gettext is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102173" version="1" comment="php5-gmp is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102174" version="1" comment="php5-iconv is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102176" version="1" comment="php5-intl is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102177" version="1" comment="php5-json is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102178" version="1" comment="php5-ldap is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102179" version="1" comment="php5-mbstring is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102180" version="1" comment="php5-mcrypt is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102182" version="1" comment="php5-mysql is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102183" version="1" comment="php5-odbc is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102185" version="1" comment="php5-openssl is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102186" version="1" comment="php5-pcntl is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102187" version="1" comment="php5-pdo is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102188" version="1" comment="php5-pear is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102189" version="1" comment="php5-pgsql is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102192" version="1" comment="php5-pspell is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102194" version="1" comment="php5-shmop is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102195" version="1" comment="php5-snmp is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102196" version="1" comment="php5-soap is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102197" version="1" comment="php5-sockets is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102198" version="1" comment="php5-sqlite is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102199" version="1" comment="php5-suhosin is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102200" version="1" comment="php5-sysvmsg is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102201" version="1" comment="php5-sysvsem is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102202" version="1" comment="php5-sysvshm is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102204" version="1" comment="php5-tokenizer is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102205" version="1" comment="php5-wddx is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102206" version="1" comment="php5-xmlreader is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102207" version="1" comment="php5-xmlrpc is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102208" version="1" comment="php5-xmlwriter is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102209" version="1" comment="php5-xsl is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102210" version="1" comment="php5-zip is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102211" version="1" comment="php5-zlib is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106946" version="1" comment="apache2-mod_php5 is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106947" version="1" comment="php5 is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106948" version="1" comment="php5-bcmath is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106949" version="1" comment="php5-bz2 is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106950" version="1" comment="php5-calendar is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106951" version="1" comment="php5-ctype is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106952" version="1" comment="php5-curl is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106953" version="1" comment="php5-dba is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106955" version="1" comment="php5-dom is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106956" version="1" comment="php5-enchant is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106957" version="1" comment="php5-exif is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106958" version="1" comment="php5-fastcgi is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106959" version="1" comment="php5-fileinfo is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106961" version="1" comment="php5-fpm is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106962" version="1" comment="php5-ftp is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106963" version="1" comment="php5-gd is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106964" version="1" comment="php5-gettext is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106965" version="1" comment="php5-gmp is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106966" version="1" comment="php5-iconv is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106968" version="1" comment="php5-intl is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106969" version="1" comment="php5-json is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106970" version="1" comment="php5-ldap is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106971" version="1" comment="php5-mbstring is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106972" version="1" comment="php5-mcrypt is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106974" version="1" comment="php5-mysql is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106975" version="1" comment="php5-odbc is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106977" version="1" comment="php5-openssl is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106978" version="1" comment="php5-pcntl is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106979" version="1" comment="php5-pdo is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106980" version="1" comment="php5-pear is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106981" version="1" comment="php5-pgsql is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106984" version="1" comment="php5-pspell is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106986" version="1" comment="php5-shmop is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106987" version="1" comment="php5-snmp is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106988" version="1" comment="php5-soap is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106989" version="1" comment="php5-sockets is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106990" version="1" comment="php5-sqlite is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106991" version="1" comment="php5-suhosin is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106992" version="1" comment="php5-sysvmsg is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106993" version="1" comment="php5-sysvsem is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106994" version="1" comment="php5-sysvshm is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106996" version="1" comment="php5-tokenizer is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106997" version="1" comment="php5-wddx is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106998" version="1" comment="php5-xmlreader is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106999" version="1" comment="php5-xmlrpc is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107000" version="1" comment="php5-xmlwriter is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107001" version="1" comment="php5-xsl is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107002" version="1" comment="php5-zip is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107003" version="1" comment="php5-zlib is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109548" version="1" comment="apache2-mod_php5 is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109549" version="1" comment="php5 is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109550" version="1" comment="php5-bcmath is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109551" version="1" comment="php5-bz2 is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109552" version="1" comment="php5-calendar is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109553" version="1" comment="php5-ctype is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109554" version="1" comment="php5-curl is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109555" version="1" comment="php5-dba is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109557" version="1" comment="php5-dom is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109558" version="1" comment="php5-enchant is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109559" version="1" comment="php5-exif is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109560" version="1" comment="php5-fastcgi is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109561" version="1" comment="php5-fileinfo is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109563" version="1" comment="php5-fpm is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109564" version="1" comment="php5-ftp is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109565" version="1" comment="php5-gd is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109566" version="1" comment="php5-gettext is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109567" version="1" comment="php5-gmp is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109568" version="1" comment="php5-iconv is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109570" version="1" comment="php5-intl is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109571" version="1" comment="php5-json is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109572" version="1" comment="php5-ldap is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109573" version="1" comment="php5-mbstring is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109574" version="1" comment="php5-mcrypt is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109576" version="1" comment="php5-mysql is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109577" version="1" comment="php5-odbc is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109579" version="1" comment="php5-openssl is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109580" version="1" comment="php5-pcntl is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109581" version="1" comment="php5-pdo is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109582" version="1" comment="php5-pear is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109583" version="1" comment="php5-pgsql is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109586" version="1" comment="php5-pspell is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109588" version="1" comment="php5-shmop is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109589" version="1" comment="php5-snmp is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109590" version="1" comment="php5-soap is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109591" version="1" comment="php5-sockets is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109592" version="1" comment="php5-sqlite is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109593" version="1" comment="php5-suhosin is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109594" version="1" comment="php5-sysvmsg is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109595" version="1" comment="php5-sysvsem is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109596" version="1" comment="php5-sysvshm is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109598" version="1" comment="php5-tokenizer is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109599" version="1" comment="php5-wddx is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109600" version="1" comment="php5-xmlreader is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109601" version="1" comment="php5-xmlrpc is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109602" version="1" comment="php5-xmlwriter is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109603" version="1" comment="php5-xsl is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109604" version="1" comment="php5-zip is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109605" version="1" comment="php5-zlib is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111374" version="1" comment="apache2-mod_php5 is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111375" version="1" comment="php5 is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111376" version="1" comment="php5-bcmath is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111377" version="1" comment="php5-bz2 is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111378" version="1" comment="php5-calendar is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111379" version="1" comment="php5-ctype is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111380" version="1" comment="php5-curl is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111381" version="1" comment="php5-dba is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111383" version="1" comment="php5-dom is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111384" version="1" comment="php5-enchant is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111385" version="1" comment="php5-exif is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111386" version="1" comment="php5-fastcgi is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111387" version="1" comment="php5-fileinfo is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111389" version="1" comment="php5-fpm is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111390" version="1" comment="php5-ftp is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111391" version="1" comment="php5-gd is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111392" version="1" comment="php5-gettext is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111393" version="1" comment="php5-gmp is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111394" version="1" comment="php5-iconv is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111396" version="1" comment="php5-intl is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111397" version="1" comment="php5-json is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111398" version="1" comment="php5-ldap is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111399" version="1" comment="php5-mbstring is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111400" version="1" comment="php5-mcrypt is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111402" version="1" comment="php5-mysql is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111403" version="1" comment="php5-odbc is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111405" version="1" comment="php5-openssl is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111406" version="1" comment="php5-pcntl is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111407" version="1" comment="php5-pdo is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111408" version="1" comment="php5-pear is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111409" version="1" comment="php5-pgsql is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111412" version="1" comment="php5-pspell is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111414" version="1" comment="php5-shmop is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111415" version="1" comment="php5-snmp is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111416" version="1" comment="php5-soap is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111417" version="1" comment="php5-sockets is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111418" version="1" comment="php5-sqlite is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111419" version="1" comment="php5-suhosin is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111420" version="1" comment="php5-sysvmsg is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111421" version="1" comment="php5-sysvsem is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111422" version="1" comment="php5-sysvshm is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111424" version="1" comment="php5-tokenizer is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111425" version="1" comment="php5-wddx is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111426" version="1" comment="php5-xmlreader is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111427" version="1" comment="php5-xmlrpc is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111428" version="1" comment="php5-xmlwriter is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111429" version="1" comment="php5-xsl is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111430" version="1" comment="php5-zip is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111431" version="1" comment="php5-zlib is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113863" version="1" comment="apache2-mod_php5 is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113864" version="1" comment="php5 is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113865" version="1" comment="php5-bcmath is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113866" version="1" comment="php5-bz2 is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113867" version="1" comment="php5-calendar is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113868" version="1" comment="php5-ctype is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113869" version="1" comment="php5-curl is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113870" version="1" comment="php5-dba is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113872" version="1" comment="php5-dom is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113873" version="1" comment="php5-enchant is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113874" version="1" comment="php5-exif is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113875" version="1" comment="php5-fastcgi is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113876" version="1" comment="php5-fileinfo is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113878" version="1" comment="php5-fpm is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113879" version="1" comment="php5-ftp is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113880" version="1" comment="php5-gd is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113881" version="1" comment="php5-gettext is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113882" version="1" comment="php5-gmp is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113883" version="1" comment="php5-iconv is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113885" version="1" comment="php5-intl is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113886" version="1" comment="php5-json is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113887" version="1" comment="php5-ldap is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113888" version="1" comment="php5-mbstring is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113889" version="1" comment="php5-mcrypt is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113891" version="1" comment="php5-mysql is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113892" version="1" comment="php5-odbc is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113893" version="1" comment="php5-opcache is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113894" version="1" comment="php5-openssl is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113895" version="1" comment="php5-pcntl is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113896" version="1" comment="php5-pdo is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113897" version="1" comment="php5-pear is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113898" version="1" comment="php5-pgsql is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113900" version="1" comment="php5-posix is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113901" version="1" comment="php5-pspell is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113903" version="1" comment="php5-shmop is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113904" version="1" comment="php5-snmp is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113905" version="1" comment="php5-soap is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113906" version="1" comment="php5-sockets is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113907" version="1" comment="php5-sqlite is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113908" version="1" comment="php5-suhosin is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113909" version="1" comment="php5-sysvmsg is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113910" version="1" comment="php5-sysvsem is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113911" version="1" comment="php5-sysvshm is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113913" version="1" comment="php5-tokenizer is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113914" version="1" comment="php5-wddx is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113915" version="1" comment="php5-xmlreader is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113916" version="1" comment="php5-xmlrpc is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113917" version="1" comment="php5-xmlwriter is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113918" version="1" comment="php5-xsl is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113919" version="1" comment="php5-zip is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113920" version="1" comment="php5-zlib is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114640" version="1" comment="apache2-mod_php5 is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114641" version="1" comment="php5 is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114642" version="1" comment="php5-bcmath is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114643" version="1" comment="php5-bz2 is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114644" version="1" comment="php5-calendar is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114645" version="1" comment="php5-ctype is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114646" version="1" comment="php5-curl is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114647" version="1" comment="php5-dba is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114649" version="1" comment="php5-dom is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114650" version="1" comment="php5-enchant is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114651" version="1" comment="php5-exif is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114652" version="1" comment="php5-fastcgi is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114653" version="1" comment="php5-fileinfo is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114655" version="1" comment="php5-fpm is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114656" version="1" comment="php5-ftp is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114657" version="1" comment="php5-gd is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114658" version="1" comment="php5-gettext is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114659" version="1" comment="php5-gmp is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114660" version="1" comment="php5-iconv is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114662" version="1" comment="php5-intl is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114663" version="1" comment="php5-json is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114664" version="1" comment="php5-ldap is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114665" version="1" comment="php5-mbstring is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114666" version="1" comment="php5-mcrypt is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114668" version="1" comment="php5-mysql is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114669" version="1" comment="php5-odbc is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114670" version="1" comment="php5-opcache is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114671" version="1" comment="php5-openssl is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114672" version="1" comment="php5-pcntl is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114673" version="1" comment="php5-pdo is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114674" version="1" comment="php5-pear is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114675" version="1" comment="php5-pgsql is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114677" version="1" comment="php5-posix is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114678" version="1" comment="php5-pspell is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114680" version="1" comment="php5-shmop is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114681" version="1" comment="php5-snmp is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114682" version="1" comment="php5-soap is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114683" version="1" comment="php5-sockets is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114684" version="1" comment="php5-sqlite is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114685" version="1" comment="php5-suhosin is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114686" version="1" comment="php5-sysvmsg is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114687" version="1" comment="php5-sysvsem is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114688" version="1" comment="php5-sysvshm is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114690" version="1" comment="php5-tokenizer is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114691" version="1" comment="php5-wddx is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114692" version="1" comment="php5-xmlreader is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114693" version="1" comment="php5-xmlrpc is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114694" version="1" comment="php5-xmlwriter is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114695" version="1" comment="php5-xsl is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114696" version="1" comment="php5-zip is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114697" version="1" comment="php5-zlib is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106472" version="1" comment="apache2-mod_php5 is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106473" version="1" comment="php5 is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106474" version="1" comment="php5-bcmath is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106475" version="1" comment="php5-bz2 is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106476" version="1" comment="php5-calendar is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106477" version="1" comment="php5-ctype is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106478" version="1" comment="php5-curl is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106479" version="1" comment="php5-dba is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106481" version="1" comment="php5-dom is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106482" version="1" comment="php5-enchant is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106483" version="1" comment="php5-exif is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106484" version="1" comment="php5-fastcgi is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106485" version="1" comment="php5-fileinfo is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106487" version="1" comment="php5-fpm is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106488" version="1" comment="php5-ftp is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106489" version="1" comment="php5-gd is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106490" version="1" comment="php5-gettext is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106491" version="1" comment="php5-gmp is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106492" version="1" comment="php5-iconv is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106494" version="1" comment="php5-intl is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106495" version="1" comment="php5-json is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106496" version="1" comment="php5-ldap is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106497" version="1" comment="php5-mbstring is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106498" version="1" comment="php5-mcrypt is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106500" version="1" comment="php5-mysql is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106501" version="1" comment="php5-odbc is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106503" version="1" comment="php5-openssl is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106504" version="1" comment="php5-pcntl is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106505" version="1" comment="php5-pdo is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106506" version="1" comment="php5-pear is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106507" version="1" comment="php5-pgsql is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106510" version="1" comment="php5-pspell is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106512" version="1" comment="php5-shmop is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106513" version="1" comment="php5-snmp is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106514" version="1" comment="php5-soap is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106515" version="1" comment="php5-sockets is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106516" version="1" comment="php5-sqlite is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106517" version="1" comment="php5-suhosin is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106518" version="1" comment="php5-sysvmsg is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106519" version="1" comment="php5-sysvsem is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106520" version="1" comment="php5-sysvshm is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106522" version="1" comment="php5-tokenizer is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106523" version="1" comment="php5-wddx is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106524" version="1" comment="php5-xmlreader is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106525" version="1" comment="php5-xmlrpc is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106526" version="1" comment="php5-xmlwriter is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106527" version="1" comment="php5-xsl is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106528" version="1" comment="php5-zip is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106529" version="1" comment="php5-zlib is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130571" version="1" comment="apache2-mod_php5 is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130572" version="1" comment="php5 is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130573" version="1" comment="php5-bcmath is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130574" version="1" comment="php5-bz2 is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130575" version="1" comment="php5-calendar is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130576" version="1" comment="php5-ctype is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130577" version="1" comment="php5-curl is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130578" version="1" comment="php5-dba is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130579" version="1" comment="php5-dom is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130580" version="1" comment="php5-enchant is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130581" version="1" comment="php5-exif is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130582" version="1" comment="php5-fastcgi is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130583" version="1" comment="php5-fileinfo is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130584" version="1" comment="php5-fpm is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130585" version="1" comment="php5-ftp is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130586" version="1" comment="php5-gd is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130587" version="1" comment="php5-gettext is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130588" version="1" comment="php5-gmp is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130589" version="1" comment="php5-iconv is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130590" version="1" comment="php5-imap is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130591" version="1" comment="php5-intl is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130592" version="1" comment="php5-json is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130593" version="1" comment="php5-ldap is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130594" version="1" comment="php5-mbstring is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130595" version="1" comment="php5-mcrypt is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130596" version="1" comment="php5-mysql is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130597" version="1" comment="php5-odbc is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130598" version="1" comment="php5-opcache is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130599" version="1" comment="php5-openssl is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130600" version="1" comment="php5-pcntl is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130601" version="1" comment="php5-pdo is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130602" version="1" comment="php5-pear is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130603" version="1" comment="php5-pgsql is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130604" version="1" comment="php5-phar is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130605" version="1" comment="php5-posix is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130606" version="1" comment="php5-pspell is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130607" version="1" comment="php5-shmop is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130608" version="1" comment="php5-snmp is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130609" version="1" comment="php5-soap is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130610" version="1" comment="php5-sockets is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130611" version="1" comment="php5-sqlite is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130612" version="1" comment="php5-suhosin is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130613" version="1" comment="php5-sysvmsg is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130614" version="1" comment="php5-sysvsem is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130615" version="1" comment="php5-sysvshm is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130616" version="1" comment="php5-tokenizer is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130617" version="1" comment="php5-wddx is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130618" version="1" comment="php5-xmlreader is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130619" version="1" comment="php5-xmlrpc is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130620" version="1" comment="php5-xmlwriter is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130621" version="1" comment="php5-xsl is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130622" version="1" comment="php5-zip is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130623" version="1" comment="php5-zlib is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131398" version="1" comment="apache2-mod_php5 is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131399" version="1" comment="php5 is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131400" version="1" comment="php5-bcmath is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131401" version="1" comment="php5-bz2 is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131402" version="1" comment="php5-calendar is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131403" version="1" comment="php5-ctype is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131404" version="1" comment="php5-curl is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131405" version="1" comment="php5-dba is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131406" version="1" comment="php5-dom is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131407" version="1" comment="php5-enchant is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131408" version="1" comment="php5-exif is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131409" version="1" comment="php5-fastcgi is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131410" version="1" comment="php5-fileinfo is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131411" version="1" comment="php5-fpm is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131412" version="1" comment="php5-ftp is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131413" version="1" comment="php5-gd is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131414" version="1" comment="php5-gettext is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131415" version="1" comment="php5-gmp is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131416" version="1" comment="php5-iconv is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131417" version="1" comment="php5-imap is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131418" version="1" comment="php5-intl is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131419" version="1" comment="php5-json is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131420" version="1" comment="php5-ldap is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131421" version="1" comment="php5-mbstring is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131422" version="1" comment="php5-mcrypt is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131423" version="1" comment="php5-mysql is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131424" version="1" comment="php5-odbc is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131425" version="1" comment="php5-opcache is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131426" version="1" comment="php5-openssl is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131427" version="1" comment="php5-pcntl is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131428" version="1" comment="php5-pdo is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131429" version="1" comment="php5-pear is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131430" version="1" comment="php5-pgsql is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131431" version="1" comment="php5-phar is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131432" version="1" comment="php5-posix is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131433" version="1" comment="php5-pspell is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131434" version="1" comment="php5-shmop is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131435" version="1" comment="php5-snmp is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131436" version="1" comment="php5-soap is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131437" version="1" comment="php5-sockets is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131438" version="1" comment="php5-sqlite is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131439" version="1" comment="php5-suhosin is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131440" version="1" comment="php5-sysvmsg is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131441" version="1" comment="php5-sysvsem is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131442" version="1" comment="php5-sysvshm is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131443" version="1" comment="php5-tokenizer is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131444" version="1" comment="php5-wddx is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131445" version="1" comment="php5-xmlreader is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131446" version="1" comment="php5-xmlrpc is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131447" version="1" comment="php5-xmlwriter is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131448" version="1" comment="php5-xsl is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131449" version="1" comment="php5-zip is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131450" version="1" comment="php5-zlib is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131504" version="1" comment="nodejs4 is &lt;4.6.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131505" version="1" comment="nodejs4-devel is &lt;4.6.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131506" version="1" comment="nodejs4-docs is &lt;4.6.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131507" version="1" comment="npm4 is &lt;4.6.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131508" version="1" comment="apache2-mod_php5 is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131509" version="1" comment="php5 is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131510" version="1" comment="php5-bcmath is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131511" version="1" comment="php5-bz2 is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131512" version="1" comment="php5-calendar is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131513" version="1" comment="php5-ctype is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131514" version="1" comment="php5-curl is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131515" version="1" comment="php5-dba is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131516" version="1" comment="php5-dom is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131517" version="1" comment="php5-enchant is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131518" version="1" comment="php5-exif is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131519" version="1" comment="php5-fastcgi is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131520" version="1" comment="php5-fileinfo is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131521" version="1" comment="php5-fpm is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131522" version="1" comment="php5-ftp is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131523" version="1" comment="php5-gd is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131524" version="1" comment="php5-gettext is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131525" version="1" comment="php5-gmp is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131526" version="1" comment="php5-iconv is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131527" version="1" comment="php5-imap is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131528" version="1" comment="php5-intl is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131529" version="1" comment="php5-json is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131530" version="1" comment="php5-ldap is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131531" version="1" comment="php5-mbstring is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131532" version="1" comment="php5-mcrypt is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131533" version="1" comment="php5-mysql is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131534" version="1" comment="php5-odbc is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131535" version="1" comment="php5-opcache is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131536" version="1" comment="php5-openssl is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131537" version="1" comment="php5-pcntl is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131538" version="1" comment="php5-pdo is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131539" version="1" comment="php5-pear is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131540" version="1" comment="php5-pgsql is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131541" version="1" comment="php5-phar is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131542" version="1" comment="php5-posix is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131543" version="1" comment="php5-pspell is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131544" version="1" comment="php5-shmop is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131545" version="1" comment="php5-snmp is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131546" version="1" comment="php5-soap is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131547" version="1" comment="php5-sockets is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131548" version="1" comment="php5-sqlite is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131549" version="1" comment="php5-suhosin is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131550" version="1" comment="php5-sysvmsg is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131551" version="1" comment="php5-sysvsem is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131552" version="1" comment="php5-sysvshm is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131553" version="1" comment="php5-tokenizer is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131554" version="1" comment="php5-wddx is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131555" version="1" comment="php5-xmlreader is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131556" version="1" comment="php5-xmlrpc is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131557" version="1" comment="php5-xmlwriter is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131558" version="1" comment="php5-xsl is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131559" version="1" comment="php5-zip is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131560" version="1" comment="php5-zlib is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131561" version="1" comment="apache2-mod_php7 is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131562" version="1" comment="php7 is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131563" version="1" comment="php7-bcmath is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131564" version="1" comment="php7-bz2 is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131565" version="1" comment="php7-calendar is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131566" version="1" comment="php7-ctype is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131567" version="1" comment="php7-curl is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131568" version="1" comment="php7-dba is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131569" version="1" comment="php7-dom is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131570" version="1" comment="php7-enchant is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131571" version="1" comment="php7-exif is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131572" version="1" comment="php7-fastcgi is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131573" version="1" comment="php7-fileinfo is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131574" version="1" comment="php7-fpm is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131575" version="1" comment="php7-ftp is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131576" version="1" comment="php7-gd is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131577" version="1" comment="php7-gettext is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131578" version="1" comment="php7-gmp is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131579" version="1" comment="php7-iconv is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131580" version="1" comment="php7-imap is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131581" version="1" comment="php7-intl is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131582" version="1" comment="php7-json is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131583" version="1" comment="php7-ldap is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131584" version="1" comment="php7-mbstring is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131585" version="1" comment="php7-mcrypt is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131586" version="1" comment="php7-mysql is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131587" version="1" comment="php7-odbc is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131588" version="1" comment="php7-opcache is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131589" version="1" comment="php7-openssl is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131590" version="1" comment="php7-pcntl is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131591" version="1" comment="php7-pdo is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131592" version="1" comment="php7-pear is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131593" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131594" version="1" comment="php7-pgsql is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131595" version="1" comment="php7-phar is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131596" version="1" comment="php7-posix is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131597" version="1" comment="php7-pspell is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131598" version="1" comment="php7-shmop is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131599" version="1" comment="php7-snmp is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131600" version="1" comment="php7-soap is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131601" version="1" comment="php7-sockets is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131602" version="1" comment="php7-sqlite is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131603" version="1" comment="php7-sysvmsg is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131604" version="1" comment="php7-sysvsem is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131605" version="1" comment="php7-sysvshm is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131606" version="1" comment="php7-tokenizer is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131607" version="1" comment="php7-wddx is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131608" version="1" comment="php7-xmlreader is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131609" version="1" comment="php7-xmlrpc is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131610" version="1" comment="php7-xmlwriter is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131611" version="1" comment="php7-xsl is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131612" version="1" comment="php7-zip is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131613" version="1" comment="php7-zlib is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135372" version="1" comment="apache2-mod_php5 is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135373" version="1" comment="php5 is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135374" version="1" comment="php5-bcmath is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135375" version="1" comment="php5-bz2 is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135376" version="1" comment="php5-calendar is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135377" version="1" comment="php5-ctype is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135378" version="1" comment="php5-curl is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135379" version="1" comment="php5-dba is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135380" version="1" comment="php5-dom is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135381" version="1" comment="php5-enchant is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135382" version="1" comment="php5-exif is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135383" version="1" comment="php5-fastcgi is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135384" version="1" comment="php5-fileinfo is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135385" version="1" comment="php5-fpm is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135386" version="1" comment="php5-ftp is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135387" version="1" comment="php5-gd is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135388" version="1" comment="php5-gettext is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135389" version="1" comment="php5-gmp is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135390" version="1" comment="php5-iconv is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135391" version="1" comment="php5-imap is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135392" version="1" comment="php5-intl is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135393" version="1" comment="php5-json is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135394" version="1" comment="php5-ldap is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135395" version="1" comment="php5-mbstring is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135396" version="1" comment="php5-mcrypt is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135397" version="1" comment="php5-mysql is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135398" version="1" comment="php5-odbc is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135399" version="1" comment="php5-opcache is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135400" version="1" comment="php5-openssl is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135401" version="1" comment="php5-pcntl is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135402" version="1" comment="php5-pdo is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135403" version="1" comment="php5-pear is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135404" version="1" comment="php5-pgsql is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135405" version="1" comment="php5-phar is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135406" version="1" comment="php5-posix is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135407" version="1" comment="php5-pspell is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135408" version="1" comment="php5-shmop is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135409" version="1" comment="php5-snmp is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135410" version="1" comment="php5-soap is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135411" version="1" comment="php5-sockets is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135412" version="1" comment="php5-sqlite is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135413" version="1" comment="php5-suhosin is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135414" version="1" comment="php5-sysvmsg is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135415" version="1" comment="php5-sysvsem is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135416" version="1" comment="php5-sysvshm is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135417" version="1" comment="php5-tokenizer is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135418" version="1" comment="php5-wddx is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135419" version="1" comment="php5-xmlreader is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135420" version="1" comment="php5-xmlrpc is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135421" version="1" comment="php5-xmlwriter is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135422" version="1" comment="php5-xsl is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135423" version="1" comment="php5-zip is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135424" version="1" comment="php5-zlib is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135942" version="1" comment="nodejs4 is &lt;4.6.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135943" version="1" comment="nodejs4-devel is &lt;4.6.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135944" version="1" comment="nodejs4-docs is &lt;4.6.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135945" version="1" comment="npm4 is &lt;4.6.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136059" version="1" comment="apache2-mod_php7 is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136060" version="1" comment="php7 is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136061" version="1" comment="php7-bcmath is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136062" version="1" comment="php7-bz2 is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136063" version="1" comment="php7-calendar is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136064" version="1" comment="php7-ctype is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136065" version="1" comment="php7-curl is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136066" version="1" comment="php7-dba is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136067" version="1" comment="php7-dom is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136068" version="1" comment="php7-enchant is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136069" version="1" comment="php7-exif is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136070" version="1" comment="php7-fastcgi is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136071" version="1" comment="php7-fileinfo is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136072" version="1" comment="php7-fpm is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136073" version="1" comment="php7-ftp is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136074" version="1" comment="php7-gd is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136075" version="1" comment="php7-gettext is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136076" version="1" comment="php7-gmp is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136077" version="1" comment="php7-iconv is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136078" version="1" comment="php7-imap is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136079" version="1" comment="php7-intl is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136080" version="1" comment="php7-json is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136081" version="1" comment="php7-ldap is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136082" version="1" comment="php7-mbstring is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136083" version="1" comment="php7-mcrypt is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136084" version="1" comment="php7-mysql is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136085" version="1" comment="php7-odbc is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136086" version="1" comment="php7-opcache is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136087" version="1" comment="php7-openssl is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136088" version="1" comment="php7-pcntl is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136089" version="1" comment="php7-pdo is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136090" version="1" comment="php7-pear is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136091" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136092" version="1" comment="php7-pgsql is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136093" version="1" comment="php7-phar is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136094" version="1" comment="php7-posix is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136095" version="1" comment="php7-pspell is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136096" version="1" comment="php7-shmop is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136097" version="1" comment="php7-snmp is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136098" version="1" comment="php7-soap is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136099" version="1" comment="php7-sockets is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136100" version="1" comment="php7-sqlite is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136101" version="1" comment="php7-sysvmsg is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136102" version="1" comment="php7-sysvsem is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136103" version="1" comment="php7-sysvshm is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136104" version="1" comment="php7-tokenizer is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136105" version="1" comment="php7-wddx is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136106" version="1" comment="php7-xmlreader is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136107" version="1" comment="php7-xmlrpc is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136108" version="1" comment="php7-xmlwriter is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136109" version="1" comment="php7-xsl is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136110" version="1" comment="php7-zip is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136111" version="1" comment="php7-zlib is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121568" version="1" comment="apache2-mod_php5 is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121569" version="1" comment="php5 is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121570" version="1" comment="php5-bcmath is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121571" version="1" comment="php5-bz2 is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121572" version="1" comment="php5-calendar is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121573" version="1" comment="php5-ctype is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121574" version="1" comment="php5-curl is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121575" version="1" comment="php5-dba is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121576" version="1" comment="php5-dom is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121577" version="1" comment="php5-enchant is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121578" version="1" comment="php5-exif is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121579" version="1" comment="php5-fastcgi is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121580" version="1" comment="php5-fileinfo is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121581" version="1" comment="php5-fpm is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121582" version="1" comment="php5-ftp is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121583" version="1" comment="php5-gd is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121584" version="1" comment="php5-gettext is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121585" version="1" comment="php5-gmp is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121586" version="1" comment="php5-iconv is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121587" version="1" comment="php5-intl is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121588" version="1" comment="php5-json is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121589" version="1" comment="php5-ldap is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121590" version="1" comment="php5-mbstring is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121591" version="1" comment="php5-mcrypt is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121592" version="1" comment="php5-mysql is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121593" version="1" comment="php5-odbc is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121594" version="1" comment="php5-opcache is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121595" version="1" comment="php5-openssl is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121596" version="1" comment="php5-pcntl is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121597" version="1" comment="php5-pdo is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121598" version="1" comment="php5-pear is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121599" version="1" comment="php5-pgsql is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121600" version="1" comment="php5-posix is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121601" version="1" comment="php5-pspell is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121602" version="1" comment="php5-shmop is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121603" version="1" comment="php5-snmp is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121604" version="1" comment="php5-soap is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121605" version="1" comment="php5-sockets is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121606" version="1" comment="php5-sqlite is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121607" version="1" comment="php5-suhosin is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121608" version="1" comment="php5-sysvmsg is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121609" version="1" comment="php5-sysvsem is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121610" version="1" comment="php5-sysvshm is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121611" version="1" comment="php5-tokenizer is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121612" version="1" comment="php5-wddx is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121613" version="1" comment="php5-xmlreader is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121614" version="1" comment="php5-xmlrpc is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121615" version="1" comment="php5-xmlwriter is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121616" version="1" comment="php5-xsl is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121617" version="1" comment="php5-zip is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121618" version="1" comment="php5-zlib is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136229" version="1" comment="apache2-mod_php5 is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136230" version="1" comment="php5 is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136231" version="1" comment="php5-bcmath is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136232" version="1" comment="php5-bz2 is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136233" version="1" comment="php5-calendar is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136234" version="1" comment="php5-ctype is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136235" version="1" comment="php5-curl is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136236" version="1" comment="php5-dba is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136237" version="1" comment="php5-dom is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136238" version="1" comment="php5-enchant is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136239" version="1" comment="php5-exif is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136240" version="1" comment="php5-fastcgi is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136241" version="1" comment="php5-fileinfo is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136242" version="1" comment="php5-fpm is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136243" version="1" comment="php5-ftp is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136244" version="1" comment="php5-gd is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136245" version="1" comment="php5-gettext is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136246" version="1" comment="php5-gmp is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136247" version="1" comment="php5-iconv is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136248" version="1" comment="php5-imap is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136249" version="1" comment="php5-intl is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136250" version="1" comment="php5-json is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136251" version="1" comment="php5-ldap is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136252" version="1" comment="php5-mbstring is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136253" version="1" comment="php5-mcrypt is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136254" version="1" comment="php5-mysql is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136255" version="1" comment="php5-odbc is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136256" version="1" comment="php5-opcache is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136257" version="1" comment="php5-openssl is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136258" version="1" comment="php5-pcntl is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136259" version="1" comment="php5-pdo is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136260" version="1" comment="php5-pear is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136261" version="1" comment="php5-pgsql is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136262" version="1" comment="php5-phar is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136263" version="1" comment="php5-posix is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136264" version="1" comment="php5-pspell is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136265" version="1" comment="php5-shmop is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136266" version="1" comment="php5-snmp is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136267" version="1" comment="php5-soap is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136268" version="1" comment="php5-sockets is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136269" version="1" comment="php5-sqlite is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136270" version="1" comment="php5-suhosin is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136271" version="1" comment="php5-sysvmsg is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136272" version="1" comment="php5-sysvsem is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136273" version="1" comment="php5-sysvshm is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136274" version="1" comment="php5-tokenizer is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136275" version="1" comment="php5-wddx is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136276" version="1" comment="php5-xmlreader is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136277" version="1" comment="php5-xmlrpc is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136278" version="1" comment="php5-xmlwriter is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136279" version="1" comment="php5-xsl is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136280" version="1" comment="php5-zip is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136281" version="1" comment="php5-zlib is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126792" version="1" comment="apache2-mod_php5 is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126793" version="1" comment="php5 is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126794" version="1" comment="php5-bcmath is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126795" version="1" comment="php5-bz2 is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126796" version="1" comment="php5-calendar is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126797" version="1" comment="php5-ctype is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126798" version="1" comment="php5-curl is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126799" version="1" comment="php5-dba is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126800" version="1" comment="php5-dom is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126801" version="1" comment="php5-enchant is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126802" version="1" comment="php5-exif is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126803" version="1" comment="php5-fastcgi is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126804" version="1" comment="php5-fileinfo is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126805" version="1" comment="php5-fpm is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126806" version="1" comment="php5-ftp is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126807" version="1" comment="php5-gd is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126808" version="1" comment="php5-gettext is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126809" version="1" comment="php5-gmp is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126810" version="1" comment="php5-iconv is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126811" version="1" comment="php5-intl is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126812" version="1" comment="php5-json is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126813" version="1" comment="php5-ldap is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126814" version="1" comment="php5-mbstring is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126815" version="1" comment="php5-mcrypt is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126816" version="1" comment="php5-mysql is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126817" version="1" comment="php5-odbc is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126818" version="1" comment="php5-opcache is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126819" version="1" comment="php5-openssl is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126820" version="1" comment="php5-pcntl is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126821" version="1" comment="php5-pdo is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126822" version="1" comment="php5-pear is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126823" version="1" comment="php5-pgsql is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126824" version="1" comment="php5-posix is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126825" version="1" comment="php5-pspell is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126826" version="1" comment="php5-shmop is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126827" version="1" comment="php5-snmp is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126828" version="1" comment="php5-soap is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126829" version="1" comment="php5-sockets is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126830" version="1" comment="php5-sqlite is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126831" version="1" comment="php5-suhosin is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126832" version="1" comment="php5-sysvmsg is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126833" version="1" comment="php5-sysvsem is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126834" version="1" comment="php5-sysvshm is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126835" version="1" comment="php5-tokenizer is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126836" version="1" comment="php5-wddx is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126837" version="1" comment="php5-xmlreader is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126838" version="1" comment="php5-xmlrpc is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126839" version="1" comment="php5-xmlwriter is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126840" version="1" comment="php5-xsl is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126841" version="1" comment="php5-zip is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126842" version="1" comment="php5-zlib is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127401" version="1" comment="apache2-mod_php5 is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127402" version="1" comment="php5 is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127403" version="1" comment="php5-bcmath is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127404" version="1" comment="php5-bz2 is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127405" version="1" comment="php5-calendar is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127406" version="1" comment="php5-ctype is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127407" version="1" comment="php5-curl is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127408" version="1" comment="php5-dba is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127409" version="1" comment="php5-dom is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127410" version="1" comment="php5-enchant is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127411" version="1" comment="php5-exif is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127412" version="1" comment="php5-fastcgi is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127413" version="1" comment="php5-fileinfo is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127414" version="1" comment="php5-fpm is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127415" version="1" comment="php5-ftp is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127416" version="1" comment="php5-gd is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127417" version="1" comment="php5-gettext is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127418" version="1" comment="php5-gmp is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127419" version="1" comment="php5-iconv is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127420" version="1" comment="php5-intl is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127421" version="1" comment="php5-json is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127422" version="1" comment="php5-ldap is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127423" version="1" comment="php5-mbstring is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127424" version="1" comment="php5-mcrypt is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127425" version="1" comment="php5-mysql is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127426" version="1" comment="php5-odbc is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127427" version="1" comment="php5-opcache is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127428" version="1" comment="php5-openssl is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127429" version="1" comment="php5-pcntl is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127430" version="1" comment="php5-pdo is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127431" version="1" comment="php5-pear is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127432" version="1" comment="php5-pgsql is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127433" version="1" comment="php5-phar is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127434" version="1" comment="php5-posix is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127435" version="1" comment="php5-pspell is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127436" version="1" comment="php5-shmop is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127437" version="1" comment="php5-snmp is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127438" version="1" comment="php5-soap is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127439" version="1" comment="php5-sockets is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127440" version="1" comment="php5-sqlite is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127441" version="1" comment="php5-suhosin is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127442" version="1" comment="php5-sysvmsg is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127443" version="1" comment="php5-sysvsem is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127444" version="1" comment="php5-sysvshm is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127445" version="1" comment="php5-tokenizer is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127446" version="1" comment="php5-wddx is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127447" version="1" comment="php5-xmlreader is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127448" version="1" comment="php5-xmlrpc is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127449" version="1" comment="php5-xmlwriter is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127450" version="1" comment="php5-xsl is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127451" version="1" comment="php5-zip is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127452" version="1" comment="php5-zlib is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128410" version="1" comment="apache2-mod_php5 is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128411" version="1" comment="php5 is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128412" version="1" comment="php5-bcmath is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128413" version="1" comment="php5-bz2 is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128414" version="1" comment="php5-calendar is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128415" version="1" comment="php5-ctype is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128416" version="1" comment="php5-curl is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128417" version="1" comment="php5-dba is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128418" version="1" comment="php5-dom is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128419" version="1" comment="php5-enchant is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128420" version="1" comment="php5-exif is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128421" version="1" comment="php5-fastcgi is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128422" version="1" comment="php5-fileinfo is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128423" version="1" comment="php5-fpm is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128424" version="1" comment="php5-ftp is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128425" version="1" comment="php5-gd is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128426" version="1" comment="php5-gettext is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128427" version="1" comment="php5-gmp is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128428" version="1" comment="php5-iconv is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128429" version="1" comment="php5-intl is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128430" version="1" comment="php5-json is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128431" version="1" comment="php5-ldap is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128432" version="1" comment="php5-mbstring is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128433" version="1" comment="php5-mcrypt is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128434" version="1" comment="php5-mysql is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128435" version="1" comment="php5-odbc is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128436" version="1" comment="php5-opcache is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128437" version="1" comment="php5-openssl is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128438" version="1" comment="php5-pcntl is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128439" version="1" comment="php5-pdo is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128440" version="1" comment="php5-pear is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128441" version="1" comment="php5-pgsql is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128442" version="1" comment="php5-phar is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128443" version="1" comment="php5-posix is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128444" version="1" comment="php5-pspell is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128445" version="1" comment="php5-shmop is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128446" version="1" comment="php5-snmp is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128447" version="1" comment="php5-soap is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128448" version="1" comment="php5-sockets is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128449" version="1" comment="php5-sqlite is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128450" version="1" comment="php5-suhosin is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128451" version="1" comment="php5-sysvmsg is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128452" version="1" comment="php5-sysvsem is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128453" version="1" comment="php5-sysvshm is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128454" version="1" comment="php5-tokenizer is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128455" version="1" comment="php5-wddx is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128456" version="1" comment="php5-xmlreader is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128457" version="1" comment="php5-xmlrpc is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128458" version="1" comment="php5-xmlwriter is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128459" version="1" comment="php5-xsl is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128460" version="1" comment="php5-zip is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128461" version="1" comment="php5-zlib is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129019" version="1" comment="apache2-mod_php5 is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129020" version="1" comment="php5 is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129021" version="1" comment="php5-bcmath is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129022" version="1" comment="php5-bz2 is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129023" version="1" comment="php5-calendar is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129024" version="1" comment="php5-ctype is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129025" version="1" comment="php5-curl is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129026" version="1" comment="php5-dba is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129027" version="1" comment="php5-dom is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129028" version="1" comment="php5-enchant is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129029" version="1" comment="php5-exif is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129030" version="1" comment="php5-fastcgi is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129031" version="1" comment="php5-fileinfo is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129032" version="1" comment="php5-fpm is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129033" version="1" comment="php5-ftp is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129034" version="1" comment="php5-gd is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129035" version="1" comment="php5-gettext is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129036" version="1" comment="php5-gmp is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129037" version="1" comment="php5-iconv is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129038" version="1" comment="php5-imap is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129039" version="1" comment="php5-intl is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129040" version="1" comment="php5-json is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129041" version="1" comment="php5-ldap is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129042" version="1" comment="php5-mbstring is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129043" version="1" comment="php5-mcrypt is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129044" version="1" comment="php5-mysql is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129045" version="1" comment="php5-odbc is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129046" version="1" comment="php5-opcache is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129047" version="1" comment="php5-openssl is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129048" version="1" comment="php5-pcntl is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129049" version="1" comment="php5-pdo is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129050" version="1" comment="php5-pear is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129051" version="1" comment="php5-pgsql is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129052" version="1" comment="php5-phar is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129053" version="1" comment="php5-posix is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129054" version="1" comment="php5-pspell is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129055" version="1" comment="php5-shmop is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129056" version="1" comment="php5-snmp is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129057" version="1" comment="php5-soap is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129058" version="1" comment="php5-sockets is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129059" version="1" comment="php5-sqlite is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129060" version="1" comment="php5-suhosin is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129061" version="1" comment="php5-sysvmsg is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129062" version="1" comment="php5-sysvsem is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129063" version="1" comment="php5-sysvshm is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129064" version="1" comment="php5-tokenizer is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129065" version="1" comment="php5-wddx is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129066" version="1" comment="php5-xmlreader is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129067" version="1" comment="php5-xmlrpc is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129068" version="1" comment="php5-xmlwriter is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129069" version="1" comment="php5-xsl is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129070" version="1" comment="php5-zip is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129071" version="1" comment="php5-zlib is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157269" version="1" comment="apache2-mod_php5 is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157270" version="1" comment="php5 is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157271" version="1" comment="php5-bcmath is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157272" version="1" comment="php5-bz2 is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157273" version="1" comment="php5-calendar is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157274" version="1" comment="php5-ctype is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157275" version="1" comment="php5-curl is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157276" version="1" comment="php5-dba is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157277" version="1" comment="php5-dom is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157278" version="1" comment="php5-enchant is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157279" version="1" comment="php5-exif is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157280" version="1" comment="php5-fastcgi is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157281" version="1" comment="php5-fileinfo is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157282" version="1" comment="php5-fpm is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157283" version="1" comment="php5-ftp is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157284" version="1" comment="php5-gd is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157285" version="1" comment="php5-gettext is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157286" version="1" comment="php5-gmp is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157287" version="1" comment="php5-iconv is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157288" version="1" comment="php5-imap is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157289" version="1" comment="php5-intl is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157290" version="1" comment="php5-json is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157291" version="1" comment="php5-ldap is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157292" version="1" comment="php5-mbstring is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157293" version="1" comment="php5-mcrypt is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157294" version="1" comment="php5-mysql is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157295" version="1" comment="php5-odbc is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157296" version="1" comment="php5-opcache is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157297" version="1" comment="php5-openssl is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157298" version="1" comment="php5-pcntl is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157299" version="1" comment="php5-pdo is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157300" version="1" comment="php5-pear is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157301" version="1" comment="php5-pgsql is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157302" version="1" comment="php5-phar is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157303" version="1" comment="php5-posix is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157304" version="1" comment="php5-pspell is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157305" version="1" comment="php5-shmop is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157306" version="1" comment="php5-snmp is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157307" version="1" comment="php5-soap is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157308" version="1" comment="php5-sockets is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157309" version="1" comment="php5-sqlite is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157310" version="1" comment="php5-suhosin is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157311" version="1" comment="php5-sysvmsg is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157312" version="1" comment="php5-sysvsem is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157313" version="1" comment="php5-sysvshm is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157314" version="1" comment="php5-tokenizer is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157315" version="1" comment="php5-wddx is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157316" version="1" comment="php5-xmlreader is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157317" version="1" comment="php5-xmlrpc is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157318" version="1" comment="php5-xmlwriter is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157319" version="1" comment="php5-xsl is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157320" version="1" comment="php5-zip is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157321" version="1" comment="php5-zlib is &lt;5.5.14-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157668" version="1" comment="apache2-mod_php7 is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157669" version="1" comment="php7 is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157670" version="1" comment="php7-bcmath is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157671" version="1" comment="php7-bz2 is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157672" version="1" comment="php7-calendar is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157673" version="1" comment="php7-ctype is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157674" version="1" comment="php7-curl is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157675" version="1" comment="php7-dba is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157676" version="1" comment="php7-dom is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157677" version="1" comment="php7-enchant is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157678" version="1" comment="php7-exif is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157679" version="1" comment="php7-fastcgi is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157680" version="1" comment="php7-fileinfo is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157681" version="1" comment="php7-fpm is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157682" version="1" comment="php7-ftp is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157683" version="1" comment="php7-gd is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157684" version="1" comment="php7-gettext is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157685" version="1" comment="php7-gmp is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157686" version="1" comment="php7-iconv is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157687" version="1" comment="php7-imap is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157688" version="1" comment="php7-intl is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157689" version="1" comment="php7-json is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157690" version="1" comment="php7-ldap is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157691" version="1" comment="php7-mbstring is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157692" version="1" comment="php7-mcrypt is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157693" version="1" comment="php7-mysql is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157694" version="1" comment="php7-odbc is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157695" version="1" comment="php7-opcache is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157696" version="1" comment="php7-openssl is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157697" version="1" comment="php7-pcntl is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157698" version="1" comment="php7-pdo is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157699" version="1" comment="php7-pear is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157700" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157701" version="1" comment="php7-pgsql is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157702" version="1" comment="php7-phar is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157703" version="1" comment="php7-posix is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157704" version="1" comment="php7-pspell is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157705" version="1" comment="php7-shmop is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157706" version="1" comment="php7-snmp is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157707" version="1" comment="php7-soap is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157708" version="1" comment="php7-sockets is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157709" version="1" comment="php7-sqlite is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157710" version="1" comment="php7-sysvmsg is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157711" version="1" comment="php7-sysvsem is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157712" version="1" comment="php7-sysvshm is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157713" version="1" comment="php7-tokenizer is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157714" version="1" comment="php7-wddx is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157715" version="1" comment="php7-xmlreader is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157716" version="1" comment="php7-xmlrpc is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157717" version="1" comment="php7-xmlwriter is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157718" version="1" comment="php7-xsl is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157719" version="1" comment="php7-zip is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157720" version="1" comment="php7-zlib is &lt;7.0.7-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161915" version="1" comment="nodejs-common is &lt;1.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161916" version="1" comment="nodejs4 is &lt;4.8.4-15.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161917" version="1" comment="nodejs4-devel is &lt;4.8.4-15.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161918" version="1" comment="nodejs4-docs is &lt;4.8.4-15.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161919" version="1" comment="nodejs6 is &lt;6.11.1-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161920" version="1" comment="nodejs6-devel is &lt;6.11.1-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161921" version="1" comment="nodejs6-docs is &lt;6.11.1-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161922" version="1" comment="npm4 is &lt;4.8.4-15.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161923" version="1" comment="npm6 is &lt;6.11.1-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162483" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162484" version="1" comment="php7 is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162485" version="1" comment="php7-bcmath is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162486" version="1" comment="php7-bz2 is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162487" version="1" comment="php7-calendar is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162488" version="1" comment="php7-ctype is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162489" version="1" comment="php7-curl is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162490" version="1" comment="php7-dba is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162491" version="1" comment="php7-dom is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162492" version="1" comment="php7-enchant is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162493" version="1" comment="php7-exif is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162494" version="1" comment="php7-fastcgi is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162495" version="1" comment="php7-fileinfo is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162496" version="1" comment="php7-fpm is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162497" version="1" comment="php7-ftp is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162498" version="1" comment="php7-gd is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162499" version="1" comment="php7-gettext is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162500" version="1" comment="php7-gmp is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162501" version="1" comment="php7-iconv is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162502" version="1" comment="php7-imap is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162503" version="1" comment="php7-intl is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162504" version="1" comment="php7-json is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162505" version="1" comment="php7-ldap is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162506" version="1" comment="php7-mbstring is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162507" version="1" comment="php7-mcrypt is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162508" version="1" comment="php7-mysql is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162509" version="1" comment="php7-odbc is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162510" version="1" comment="php7-opcache is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162511" version="1" comment="php7-openssl is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162512" version="1" comment="php7-pcntl is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162513" version="1" comment="php7-pdo is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162514" version="1" comment="php7-pear is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162515" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162516" version="1" comment="php7-pgsql is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162517" version="1" comment="php7-phar is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162518" version="1" comment="php7-posix is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162519" version="1" comment="php7-pspell is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162520" version="1" comment="php7-shmop is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162521" version="1" comment="php7-snmp is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162522" version="1" comment="php7-soap is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162523" version="1" comment="php7-sockets is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162524" version="1" comment="php7-sqlite is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162525" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162526" version="1" comment="php7-sysvsem is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162527" version="1" comment="php7-sysvshm is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162528" version="1" comment="php7-tokenizer is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162529" version="1" comment="php7-wddx is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162530" version="1" comment="php7-xmlreader is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162531" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162532" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162533" version="1" comment="php7-xsl is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162534" version="1" comment="php7-zip is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162535" version="1" comment="php7-zlib is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162842" version="1" comment="apache2-mod_php5 is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162843" version="1" comment="php5 is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162844" version="1" comment="php5-bcmath is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162845" version="1" comment="php5-bz2 is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162846" version="1" comment="php5-calendar is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162847" version="1" comment="php5-ctype is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162848" version="1" comment="php5-curl is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162849" version="1" comment="php5-dba is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162850" version="1" comment="php5-dom is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162851" version="1" comment="php5-enchant is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162852" version="1" comment="php5-exif is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162853" version="1" comment="php5-fastcgi is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162854" version="1" comment="php5-fileinfo is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162855" version="1" comment="php5-fpm is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162856" version="1" comment="php5-ftp is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162857" version="1" comment="php5-gd is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162858" version="1" comment="php5-gettext is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162859" version="1" comment="php5-gmp is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162860" version="1" comment="php5-iconv is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162861" version="1" comment="php5-imap is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162862" version="1" comment="php5-intl is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162863" version="1" comment="php5-json is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162864" version="1" comment="php5-ldap is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162865" version="1" comment="php5-mbstring is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162866" version="1" comment="php5-mcrypt is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162867" version="1" comment="php5-mysql is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162868" version="1" comment="php5-odbc is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162869" version="1" comment="php5-opcache is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162870" version="1" comment="php5-openssl is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162871" version="1" comment="php5-pcntl is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162872" version="1" comment="php5-pdo is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162873" version="1" comment="php5-pear is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162874" version="1" comment="php5-pgsql is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162875" version="1" comment="php5-phar is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162876" version="1" comment="php5-posix is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162877" version="1" comment="php5-pspell is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162878" version="1" comment="php5-shmop is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162879" version="1" comment="php5-snmp is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162880" version="1" comment="php5-soap is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162881" version="1" comment="php5-sockets is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162882" version="1" comment="php5-sqlite is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162883" version="1" comment="php5-suhosin is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162884" version="1" comment="php5-sysvmsg is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162885" version="1" comment="php5-sysvsem is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162886" version="1" comment="php5-sysvshm is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162887" version="1" comment="php5-tokenizer is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162888" version="1" comment="php5-wddx is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162889" version="1" comment="php5-xmlreader is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162890" version="1" comment="php5-xmlrpc is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162891" version="1" comment="php5-xmlwriter is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162892" version="1" comment="php5-xsl is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162893" version="1" comment="php5-zip is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162894" version="1" comment="php5-zlib is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163670" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163671" version="1" comment="php7 is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163672" version="1" comment="php7-bcmath is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163673" version="1" comment="php7-bz2 is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163674" version="1" comment="php7-calendar is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163675" version="1" comment="php7-ctype is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163676" version="1" comment="php7-curl is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163677" version="1" comment="php7-dba is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163678" version="1" comment="php7-dom is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163679" version="1" comment="php7-enchant is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163680" version="1" comment="php7-exif is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163681" version="1" comment="php7-fastcgi is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163682" version="1" comment="php7-fileinfo is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163683" version="1" comment="php7-fpm is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163684" version="1" comment="php7-ftp is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163685" version="1" comment="php7-gd is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163686" version="1" comment="php7-gettext is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163687" version="1" comment="php7-gmp is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163688" version="1" comment="php7-iconv is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163689" version="1" comment="php7-imap is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163690" version="1" comment="php7-intl is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163691" version="1" comment="php7-json is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163692" version="1" comment="php7-ldap is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163693" version="1" comment="php7-mbstring is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163694" version="1" comment="php7-mcrypt is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163695" version="1" comment="php7-mysql is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163696" version="1" comment="php7-odbc is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163697" version="1" comment="php7-opcache is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163698" version="1" comment="php7-openssl is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163699" version="1" comment="php7-pcntl is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163700" version="1" comment="php7-pdo is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163701" version="1" comment="php7-pear is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163702" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163703" version="1" comment="php7-pgsql is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163704" version="1" comment="php7-phar is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163705" version="1" comment="php7-posix is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163706" version="1" comment="php7-pspell is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163707" version="1" comment="php7-shmop is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163708" version="1" comment="php7-snmp is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163709" version="1" comment="php7-soap is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163710" version="1" comment="php7-sockets is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163711" version="1" comment="php7-sqlite is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163712" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163713" version="1" comment="php7-sysvsem is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163714" version="1" comment="php7-sysvshm is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163715" version="1" comment="php7-tokenizer is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163716" version="1" comment="php7-wddx is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163717" version="1" comment="php7-xmlreader is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163718" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163719" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163720" version="1" comment="php7-xsl is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163721" version="1" comment="php7-zip is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163722" version="1" comment="php7-zlib is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164313" version="1" comment="apache2-mod_php5 is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164314" version="1" comment="php5 is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164315" version="1" comment="php5-bcmath is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164316" version="1" comment="php5-bz2 is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164317" version="1" comment="php5-calendar is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164318" version="1" comment="php5-ctype is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164319" version="1" comment="php5-curl is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164320" version="1" comment="php5-dba is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164321" version="1" comment="php5-dom is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164322" version="1" comment="php5-enchant is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164323" version="1" comment="php5-exif is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164324" version="1" comment="php5-fastcgi is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164325" version="1" comment="php5-fileinfo is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164326" version="1" comment="php5-fpm is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164327" version="1" comment="php5-ftp is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164328" version="1" comment="php5-gd is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164329" version="1" comment="php5-gettext is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164330" version="1" comment="php5-gmp is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164331" version="1" comment="php5-iconv is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164332" version="1" comment="php5-imap is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164333" version="1" comment="php5-intl is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164334" version="1" comment="php5-json is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164335" version="1" comment="php5-ldap is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164336" version="1" comment="php5-mbstring is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164337" version="1" comment="php5-mcrypt is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164338" version="1" comment="php5-mysql is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164339" version="1" comment="php5-odbc is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164340" version="1" comment="php5-opcache is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164341" version="1" comment="php5-openssl is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164342" version="1" comment="php5-pcntl is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164343" version="1" comment="php5-pdo is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164344" version="1" comment="php5-pear is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164345" version="1" comment="php5-pgsql is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164346" version="1" comment="php5-phar is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164347" version="1" comment="php5-posix is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164348" version="1" comment="php5-pspell is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164349" version="1" comment="php5-shmop is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164350" version="1" comment="php5-snmp is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164351" version="1" comment="php5-soap is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164352" version="1" comment="php5-sockets is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164353" version="1" comment="php5-sqlite is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164354" version="1" comment="php5-suhosin is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164355" version="1" comment="php5-sysvmsg is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164356" version="1" comment="php5-sysvsem is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164357" version="1" comment="php5-sysvshm is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164358" version="1" comment="php5-tokenizer is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164359" version="1" comment="php5-wddx is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164360" version="1" comment="php5-xmlreader is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164361" version="1" comment="php5-xmlrpc is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164362" version="1" comment="php5-xmlwriter is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164363" version="1" comment="php5-xsl is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164364" version="1" comment="php5-zip is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164365" version="1" comment="php5-zlib is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167911" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167912" version="1" comment="php7 is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167913" version="1" comment="php7-bcmath is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167914" version="1" comment="php7-bz2 is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167915" version="1" comment="php7-calendar is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167916" version="1" comment="php7-ctype is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167917" version="1" comment="php7-curl is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167918" version="1" comment="php7-dba is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167919" version="1" comment="php7-dom is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167920" version="1" comment="php7-enchant is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167921" version="1" comment="php7-exif is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167922" version="1" comment="php7-fastcgi is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167923" version="1" comment="php7-fileinfo is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167924" version="1" comment="php7-fpm is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167925" version="1" comment="php7-ftp is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167926" version="1" comment="php7-gd is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167927" version="1" comment="php7-gettext is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167928" version="1" comment="php7-gmp is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167929" version="1" comment="php7-iconv is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167930" version="1" comment="php7-imap is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167931" version="1" comment="php7-intl is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167932" version="1" comment="php7-json is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167933" version="1" comment="php7-ldap is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167934" version="1" comment="php7-mbstring is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167935" version="1" comment="php7-mcrypt is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167936" version="1" comment="php7-mysql is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167937" version="1" comment="php7-odbc is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167938" version="1" comment="php7-opcache is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167939" version="1" comment="php7-openssl is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167940" version="1" comment="php7-pcntl is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167941" version="1" comment="php7-pdo is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167942" version="1" comment="php7-pear is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167943" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167944" version="1" comment="php7-pgsql is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167945" version="1" comment="php7-phar is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167946" version="1" comment="php7-posix is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167947" version="1" comment="php7-pspell is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167948" version="1" comment="php7-shmop is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167949" version="1" comment="php7-snmp is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167950" version="1" comment="php7-soap is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167951" version="1" comment="php7-sockets is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167952" version="1" comment="php7-sqlite is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167953" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167954" version="1" comment="php7-sysvsem is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167955" version="1" comment="php7-sysvshm is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167956" version="1" comment="php7-tokenizer is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167957" version="1" comment="php7-wddx is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167958" version="1" comment="php7-xmlreader is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167959" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167960" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167961" version="1" comment="php7-xsl is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167962" version="1" comment="php7-zip is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167963" version="1" comment="php7-zlib is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168339" version="1" comment="apache2-mod_php5 is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168340" version="1" comment="php5 is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168341" version="1" comment="php5-bcmath is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168342" version="1" comment="php5-bz2 is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168343" version="1" comment="php5-calendar is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168344" version="1" comment="php5-ctype is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168345" version="1" comment="php5-curl is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168346" version="1" comment="php5-dba is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168347" version="1" comment="php5-dom is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168348" version="1" comment="php5-enchant is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168349" version="1" comment="php5-exif is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168350" version="1" comment="php5-fastcgi is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168351" version="1" comment="php5-fileinfo is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168352" version="1" comment="php5-fpm is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168353" version="1" comment="php5-ftp is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168354" version="1" comment="php5-gd is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168355" version="1" comment="php5-gettext is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168356" version="1" comment="php5-gmp is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168357" version="1" comment="php5-iconv is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168358" version="1" comment="php5-imap is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168359" version="1" comment="php5-intl is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168360" version="1" comment="php5-json is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168361" version="1" comment="php5-ldap is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168362" version="1" comment="php5-mbstring is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168363" version="1" comment="php5-mcrypt is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168364" version="1" comment="php5-mysql is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168365" version="1" comment="php5-odbc is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168366" version="1" comment="php5-opcache is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168367" version="1" comment="php5-openssl is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168368" version="1" comment="php5-pcntl is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168369" version="1" comment="php5-pdo is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168370" version="1" comment="php5-pear is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168371" version="1" comment="php5-pgsql is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168372" version="1" comment="php5-phar is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168373" version="1" comment="php5-posix is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168374" version="1" comment="php5-pspell is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168375" version="1" comment="php5-shmop is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168376" version="1" comment="php5-snmp is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168377" version="1" comment="php5-soap is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168378" version="1" comment="php5-sockets is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168379" version="1" comment="php5-sqlite is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168380" version="1" comment="php5-suhosin is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168381" version="1" comment="php5-sysvmsg is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168382" version="1" comment="php5-sysvsem is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168383" version="1" comment="php5-sysvshm is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168384" version="1" comment="php5-tokenizer is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168385" version="1" comment="php5-wddx is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168386" version="1" comment="php5-xmlreader is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168387" version="1" comment="php5-xmlrpc is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168388" version="1" comment="php5-xmlwriter is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168389" version="1" comment="php5-xsl is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168390" version="1" comment="php5-zip is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168391" version="1" comment="php5-zlib is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146532" version="1" comment="apache2-mod_php5 is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146533" version="1" comment="php5 is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146534" version="1" comment="php5-bcmath is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146535" version="1" comment="php5-bz2 is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146536" version="1" comment="php5-calendar is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146537" version="1" comment="php5-ctype is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146538" version="1" comment="php5-curl is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146539" version="1" comment="php5-dba is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146540" version="1" comment="php5-dom is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146541" version="1" comment="php5-enchant is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146542" version="1" comment="php5-exif is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146543" version="1" comment="php5-fastcgi is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146544" version="1" comment="php5-fileinfo is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146545" version="1" comment="php5-fpm is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146546" version="1" comment="php5-ftp is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146547" version="1" comment="php5-gd is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146548" version="1" comment="php5-gettext is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146549" version="1" comment="php5-gmp is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146550" version="1" comment="php5-iconv is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146551" version="1" comment="php5-imap is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146552" version="1" comment="php5-intl is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146553" version="1" comment="php5-json is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146554" version="1" comment="php5-ldap is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146555" version="1" comment="php5-mbstring is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146556" version="1" comment="php5-mcrypt is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146557" version="1" comment="php5-mysql is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146558" version="1" comment="php5-odbc is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146559" version="1" comment="php5-opcache is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146560" version="1" comment="php5-openssl is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146561" version="1" comment="php5-pcntl is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146562" version="1" comment="php5-pdo is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146563" version="1" comment="php5-pear is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146564" version="1" comment="php5-pgsql is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146565" version="1" comment="php5-phar is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146566" version="1" comment="php5-posix is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146567" version="1" comment="php5-pspell is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146568" version="1" comment="php5-shmop is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146569" version="1" comment="php5-snmp is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146570" version="1" comment="php5-soap is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146571" version="1" comment="php5-sockets is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146572" version="1" comment="php5-sqlite is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146573" version="1" comment="php5-suhosin is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146574" version="1" comment="php5-sysvmsg is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146575" version="1" comment="php5-sysvsem is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146576" version="1" comment="php5-sysvshm is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146577" version="1" comment="php5-tokenizer is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146578" version="1" comment="php5-wddx is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146579" version="1" comment="php5-xmlreader is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146580" version="1" comment="php5-xmlrpc is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146581" version="1" comment="php5-xmlwriter is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146582" version="1" comment="php5-xsl is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146583" version="1" comment="php5-zip is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146584" version="1" comment="php5-zlib is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148705" version="1" comment="apache2-mod_php7 is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148706" version="1" comment="php7 is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148707" version="1" comment="php7-bcmath is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148708" version="1" comment="php7-bz2 is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148709" version="1" comment="php7-calendar is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148710" version="1" comment="php7-ctype is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148711" version="1" comment="php7-curl is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148712" version="1" comment="php7-dba is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148713" version="1" comment="php7-dom is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148714" version="1" comment="php7-enchant is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148715" version="1" comment="php7-exif is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148716" version="1" comment="php7-fastcgi is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148717" version="1" comment="php7-fileinfo is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148718" version="1" comment="php7-fpm is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148719" version="1" comment="php7-ftp is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148720" version="1" comment="php7-gd is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148721" version="1" comment="php7-gettext is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148722" version="1" comment="php7-gmp is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148723" version="1" comment="php7-iconv is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148724" version="1" comment="php7-imap is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148725" version="1" comment="php7-intl is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148726" version="1" comment="php7-json is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148727" version="1" comment="php7-ldap is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148728" version="1" comment="php7-mbstring is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148729" version="1" comment="php7-mcrypt is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148730" version="1" comment="php7-mysql is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148731" version="1" comment="php7-odbc is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148732" version="1" comment="php7-opcache is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148733" version="1" comment="php7-openssl is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148734" version="1" comment="php7-pcntl is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148735" version="1" comment="php7-pdo is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148736" version="1" comment="php7-pear is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148737" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148738" version="1" comment="php7-pgsql is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148739" version="1" comment="php7-phar is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148740" version="1" comment="php7-posix is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148741" version="1" comment="php7-pspell is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148742" version="1" comment="php7-shmop is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148743" version="1" comment="php7-snmp is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148744" version="1" comment="php7-soap is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148745" version="1" comment="php7-sockets is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148746" version="1" comment="php7-sqlite is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148747" version="1" comment="php7-sysvmsg is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148748" version="1" comment="php7-sysvsem is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148749" version="1" comment="php7-sysvshm is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148750" version="1" comment="php7-tokenizer is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148751" version="1" comment="php7-wddx is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148752" version="1" comment="php7-xmlreader is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148753" version="1" comment="php7-xmlrpc is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148754" version="1" comment="php7-xmlwriter is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148755" version="1" comment="php7-xsl is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148756" version="1" comment="php7-zip is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148757" version="1" comment="php7-zlib is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148855" version="1" comment="apache2-mod_php5 is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148856" version="1" comment="php5 is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148857" version="1" comment="php5-bcmath is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148858" version="1" comment="php5-bz2 is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148859" version="1" comment="php5-calendar is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148860" version="1" comment="php5-ctype is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148861" version="1" comment="php5-curl is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148862" version="1" comment="php5-dba is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148863" version="1" comment="php5-dom is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148864" version="1" comment="php5-enchant is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148865" version="1" comment="php5-exif is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148866" version="1" comment="php5-fastcgi is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148867" version="1" comment="php5-fileinfo is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148868" version="1" comment="php5-fpm is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148869" version="1" comment="php5-ftp is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148870" version="1" comment="php5-gd is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148871" version="1" comment="php5-gettext is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148872" version="1" comment="php5-gmp is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148873" version="1" comment="php5-iconv is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148874" version="1" comment="php5-imap is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148875" version="1" comment="php5-intl is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148876" version="1" comment="php5-json is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148877" version="1" comment="php5-ldap is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148878" version="1" comment="php5-mbstring is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148879" version="1" comment="php5-mcrypt is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148880" version="1" comment="php5-mysql is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148881" version="1" comment="php5-odbc is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148882" version="1" comment="php5-opcache is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148883" version="1" comment="php5-openssl is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148884" version="1" comment="php5-pcntl is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148885" version="1" comment="php5-pdo is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148886" version="1" comment="php5-pear is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148887" version="1" comment="php5-pgsql is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148888" version="1" comment="php5-phar is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148889" version="1" comment="php5-posix is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148890" version="1" comment="php5-pspell is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148891" version="1" comment="php5-shmop is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148892" version="1" comment="php5-snmp is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148893" version="1" comment="php5-soap is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148894" version="1" comment="php5-sockets is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148895" version="1" comment="php5-sqlite is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148896" version="1" comment="php5-suhosin is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148897" version="1" comment="php5-sysvmsg is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148898" version="1" comment="php5-sysvsem is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148899" version="1" comment="php5-sysvshm is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148900" version="1" comment="php5-tokenizer is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148901" version="1" comment="php5-wddx is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148902" version="1" comment="php5-xmlreader is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148903" version="1" comment="php5-xmlrpc is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148904" version="1" comment="php5-xmlwriter is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148905" version="1" comment="php5-xsl is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148906" version="1" comment="php5-zip is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148907" version="1" comment="php5-zlib is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149722" version="1" comment="apache2-mod_php5 is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149723" version="1" comment="php5 is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149724" version="1" comment="php5-bcmath is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149725" version="1" comment="php5-bz2 is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149726" version="1" comment="php5-calendar is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149727" version="1" comment="php5-ctype is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149728" version="1" comment="php5-curl is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149729" version="1" comment="php5-dba is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149730" version="1" comment="php5-dom is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149731" version="1" comment="php5-enchant is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149732" version="1" comment="php5-exif is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149733" version="1" comment="php5-fastcgi is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149734" version="1" comment="php5-fileinfo is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149735" version="1" comment="php5-fpm is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149736" version="1" comment="php5-ftp is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149737" version="1" comment="php5-gd is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149738" version="1" comment="php5-gettext is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149739" version="1" comment="php5-gmp is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149740" version="1" comment="php5-iconv is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149741" version="1" comment="php5-imap is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149742" version="1" comment="php5-intl is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149743" version="1" comment="php5-json is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149744" version="1" comment="php5-ldap is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149745" version="1" comment="php5-mbstring is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149746" version="1" comment="php5-mcrypt is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149747" version="1" comment="php5-mysql is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149748" version="1" comment="php5-odbc is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149749" version="1" comment="php5-opcache is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149750" version="1" comment="php5-openssl is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149751" version="1" comment="php5-pcntl is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149752" version="1" comment="php5-pdo is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149753" version="1" comment="php5-pear is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149754" version="1" comment="php5-pgsql is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149755" version="1" comment="php5-phar is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149756" version="1" comment="php5-posix is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149757" version="1" comment="php5-pspell is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149758" version="1" comment="php5-shmop is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149759" version="1" comment="php5-snmp is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149760" version="1" comment="php5-soap is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149761" version="1" comment="php5-sockets is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149762" version="1" comment="php5-sqlite is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149763" version="1" comment="php5-suhosin is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149764" version="1" comment="php5-sysvmsg is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149765" version="1" comment="php5-sysvsem is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149766" version="1" comment="php5-sysvshm is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149767" version="1" comment="php5-tokenizer is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149768" version="1" comment="php5-wddx is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149769" version="1" comment="php5-xmlreader is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149770" version="1" comment="php5-xmlrpc is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149771" version="1" comment="php5-xmlwriter is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149772" version="1" comment="php5-xsl is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149773" version="1" comment="php5-zip is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149774" version="1" comment="php5-zlib is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150124" version="1" comment="nodejs4 is &lt;4.7.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150125" version="1" comment="nodejs4-devel is &lt;4.7.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150126" version="1" comment="nodejs4-docs is &lt;4.7.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150127" version="1" comment="npm4 is &lt;4.7.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150272" version="1" comment="apache2-mod_php7 is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150273" version="1" comment="php7 is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150274" version="1" comment="php7-bcmath is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150275" version="1" comment="php7-bz2 is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150276" version="1" comment="php7-calendar is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150277" version="1" comment="php7-ctype is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150278" version="1" comment="php7-curl is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150279" version="1" comment="php7-dba is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150280" version="1" comment="php7-dom is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150281" version="1" comment="php7-enchant is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150282" version="1" comment="php7-exif is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150283" version="1" comment="php7-fastcgi is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150284" version="1" comment="php7-fileinfo is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150285" version="1" comment="php7-fpm is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150286" version="1" comment="php7-ftp is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150287" version="1" comment="php7-gd is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150288" version="1" comment="php7-gettext is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150289" version="1" comment="php7-gmp is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150290" version="1" comment="php7-iconv is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150291" version="1" comment="php7-imap is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150292" version="1" comment="php7-intl is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150293" version="1" comment="php7-json is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150294" version="1" comment="php7-ldap is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150295" version="1" comment="php7-mbstring is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150296" version="1" comment="php7-mcrypt is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150297" version="1" comment="php7-mysql is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150298" version="1" comment="php7-odbc is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150299" version="1" comment="php7-opcache is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150300" version="1" comment="php7-openssl is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150301" version="1" comment="php7-pcntl is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150302" version="1" comment="php7-pdo is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150303" version="1" comment="php7-pear is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150304" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150305" version="1" comment="php7-pgsql is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150306" version="1" comment="php7-phar is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150307" version="1" comment="php7-posix is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150308" version="1" comment="php7-pspell is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150309" version="1" comment="php7-shmop is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150310" version="1" comment="php7-snmp is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150311" version="1" comment="php7-soap is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150312" version="1" comment="php7-sockets is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150313" version="1" comment="php7-sqlite is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150314" version="1" comment="php7-sysvmsg is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150315" version="1" comment="php7-sysvsem is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150316" version="1" comment="php7-sysvshm is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150317" version="1" comment="php7-tokenizer is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150318" version="1" comment="php7-wddx is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150319" version="1" comment="php7-xmlreader is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150320" version="1" comment="php7-xmlrpc is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150321" version="1" comment="php7-xmlwriter is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150322" version="1" comment="php7-xsl is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150323" version="1" comment="php7-zip is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150324" version="1" comment="php7-zlib is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146260" version="1" comment="apache2-mod_php7 is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146261" version="1" comment="php7 is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146262" version="1" comment="php7-bcmath is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146263" version="1" comment="php7-bz2 is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146264" version="1" comment="php7-calendar is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146265" version="1" comment="php7-ctype is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146266" version="1" comment="php7-curl is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146267" version="1" comment="php7-dba is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146268" version="1" comment="php7-dom is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146269" version="1" comment="php7-enchant is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146270" version="1" comment="php7-exif is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146271" version="1" comment="php7-fastcgi is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146272" version="1" comment="php7-fileinfo is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146273" version="1" comment="php7-fpm is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146274" version="1" comment="php7-ftp is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146275" version="1" comment="php7-gd is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146276" version="1" comment="php7-gettext is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146277" version="1" comment="php7-gmp is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146278" version="1" comment="php7-iconv is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146279" version="1" comment="php7-imap is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146280" version="1" comment="php7-intl is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146281" version="1" comment="php7-json is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146282" version="1" comment="php7-ldap is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146283" version="1" comment="php7-mbstring is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146284" version="1" comment="php7-mcrypt is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146285" version="1" comment="php7-mysql is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146286" version="1" comment="php7-odbc is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146287" version="1" comment="php7-opcache is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146288" version="1" comment="php7-openssl is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146289" version="1" comment="php7-pcntl is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146290" version="1" comment="php7-pdo is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146291" version="1" comment="php7-pear is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146292" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146293" version="1" comment="php7-pgsql is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146294" version="1" comment="php7-phar is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146295" version="1" comment="php7-posix is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146296" version="1" comment="php7-pspell is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146297" version="1" comment="php7-shmop is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146298" version="1" comment="php7-snmp is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146299" version="1" comment="php7-soap is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146300" version="1" comment="php7-sockets is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146301" version="1" comment="php7-sqlite is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146302" version="1" comment="php7-sysvmsg is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146303" version="1" comment="php7-sysvsem is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146304" version="1" comment="php7-sysvshm is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146305" version="1" comment="php7-tokenizer is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146306" version="1" comment="php7-wddx is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146307" version="1" comment="php7-xmlreader is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146308" version="1" comment="php7-xmlrpc is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146309" version="1" comment="php7-xmlwriter is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146310" version="1" comment="php7-xsl is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146311" version="1" comment="php7-zip is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146312" version="1" comment="php7-zlib is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170076" version="1" comment="apache2-mod_php5 is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170077" version="1" comment="php5 is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170078" version="1" comment="php5-bcmath is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170079" version="1" comment="php5-bz2 is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170080" version="1" comment="php5-calendar is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170081" version="1" comment="php5-ctype is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170082" version="1" comment="php5-curl is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170083" version="1" comment="php5-dba is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170084" version="1" comment="php5-dom is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170085" version="1" comment="php5-enchant is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170086" version="1" comment="php5-exif is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170087" version="1" comment="php5-fastcgi is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170088" version="1" comment="php5-fileinfo is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170089" version="1" comment="php5-fpm is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170090" version="1" comment="php5-ftp is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170091" version="1" comment="php5-gd is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170092" version="1" comment="php5-gettext is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170093" version="1" comment="php5-gmp is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170094" version="1" comment="php5-iconv is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170095" version="1" comment="php5-imap is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170096" version="1" comment="php5-intl is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170097" version="1" comment="php5-json is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170098" version="1" comment="php5-ldap is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170099" version="1" comment="php5-mbstring is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170100" version="1" comment="php5-mcrypt is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170101" version="1" comment="php5-mysql is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170102" version="1" comment="php5-odbc is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170103" version="1" comment="php5-opcache is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170104" version="1" comment="php5-openssl is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170105" version="1" comment="php5-pcntl is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170106" version="1" comment="php5-pdo is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170107" version="1" comment="php5-pear is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170108" version="1" comment="php5-pgsql is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170109" version="1" comment="php5-phar is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170110" version="1" comment="php5-posix is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170111" version="1" comment="php5-pspell is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170112" version="1" comment="php5-shmop is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170113" version="1" comment="php5-snmp is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170114" version="1" comment="php5-soap is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170115" version="1" comment="php5-sockets is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170116" version="1" comment="php5-sqlite is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170117" version="1" comment="php5-suhosin is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170118" version="1" comment="php5-sysvmsg is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170119" version="1" comment="php5-sysvsem is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170120" version="1" comment="php5-sysvshm is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170121" version="1" comment="php5-tokenizer is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170122" version="1" comment="php5-wddx is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170123" version="1" comment="php5-xmlreader is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170124" version="1" comment="php5-xmlrpc is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170125" version="1" comment="php5-xmlwriter is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170126" version="1" comment="php5-xsl is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170127" version="1" comment="php5-zip is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170128" version="1" comment="php5-zlib is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168965" version="1" comment="nodejs4 is &lt;4.8.7-15.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168966" version="1" comment="nodejs4-devel is &lt;4.8.7-15.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168967" version="1" comment="nodejs4-docs is &lt;4.8.7-15.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168968" version="1" comment="npm4 is &lt;4.8.7-15.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170527" version="1" comment="nodejs6 is &lt;6.12.2-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170528" version="1" comment="nodejs6-devel is &lt;6.12.2-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170529" version="1" comment="nodejs6-docs is &lt;6.12.2-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170530" version="1" comment="npm6 is &lt;6.12.2-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170531" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170532" version="1" comment="php7 is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170533" version="1" comment="php7-bcmath is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170534" version="1" comment="php7-bz2 is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170535" version="1" comment="php7-calendar is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170536" version="1" comment="php7-ctype is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170537" version="1" comment="php7-curl is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170538" version="1" comment="php7-dba is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170539" version="1" comment="php7-dom is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170540" version="1" comment="php7-enchant is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170541" version="1" comment="php7-exif is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170542" version="1" comment="php7-fastcgi is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170543" version="1" comment="php7-fileinfo is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170544" version="1" comment="php7-fpm is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170545" version="1" comment="php7-ftp is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170546" version="1" comment="php7-gd is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170547" version="1" comment="php7-gettext is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170548" version="1" comment="php7-gmp is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170549" version="1" comment="php7-iconv is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170550" version="1" comment="php7-imap is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170551" version="1" comment="php7-intl is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170552" version="1" comment="php7-json is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170553" version="1" comment="php7-ldap is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170554" version="1" comment="php7-mbstring is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170555" version="1" comment="php7-mcrypt is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170556" version="1" comment="php7-mysql is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170557" version="1" comment="php7-odbc is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170558" version="1" comment="php7-opcache is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170559" version="1" comment="php7-openssl is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170560" version="1" comment="php7-pcntl is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170561" version="1" comment="php7-pdo is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170562" version="1" comment="php7-pear is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170563" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170564" version="1" comment="php7-pgsql is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170565" version="1" comment="php7-phar is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170566" version="1" comment="php7-posix is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170567" version="1" comment="php7-pspell is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170568" version="1" comment="php7-shmop is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170569" version="1" comment="php7-snmp is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170570" version="1" comment="php7-soap is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170571" version="1" comment="php7-sockets is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170572" version="1" comment="php7-sqlite is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170573" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170574" version="1" comment="php7-sysvsem is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170575" version="1" comment="php7-sysvshm is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170576" version="1" comment="php7-tokenizer is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170577" version="1" comment="php7-wddx is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170578" version="1" comment="php7-xmlreader is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170579" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170580" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170581" version="1" comment="php7-xsl is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170582" version="1" comment="php7-zip is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170583" version="1" comment="php7-zlib is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172325" version="1" comment="apache2-mod_php5 is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172326" version="1" comment="php5 is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172327" version="1" comment="php5-bcmath is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172328" version="1" comment="php5-bz2 is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172329" version="1" comment="php5-calendar is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172330" version="1" comment="php5-ctype is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172331" version="1" comment="php5-curl is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172332" version="1" comment="php5-dba is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172333" version="1" comment="php5-dom is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172334" version="1" comment="php5-enchant is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172335" version="1" comment="php5-exif is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172336" version="1" comment="php5-fastcgi is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172337" version="1" comment="php5-fileinfo is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172338" version="1" comment="php5-fpm is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172339" version="1" comment="php5-ftp is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172340" version="1" comment="php5-gd is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172341" version="1" comment="php5-gettext is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172342" version="1" comment="php5-gmp is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172343" version="1" comment="php5-iconv is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172344" version="1" comment="php5-imap is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172345" version="1" comment="php5-intl is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172346" version="1" comment="php5-json is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172347" version="1" comment="php5-ldap is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172348" version="1" comment="php5-mbstring is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172349" version="1" comment="php5-mcrypt is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172350" version="1" comment="php5-mysql is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172351" version="1" comment="php5-odbc is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172352" version="1" comment="php5-opcache is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172353" version="1" comment="php5-openssl is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172354" version="1" comment="php5-pcntl is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172355" version="1" comment="php5-pdo is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172356" version="1" comment="php5-pear is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172357" version="1" comment="php5-pgsql is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172358" version="1" comment="php5-phar is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172359" version="1" comment="php5-posix is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172360" version="1" comment="php5-pspell is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172361" version="1" comment="php5-shmop is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172362" version="1" comment="php5-snmp is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172363" version="1" comment="php5-soap is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172364" version="1" comment="php5-sockets is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172365" version="1" comment="php5-sqlite is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172366" version="1" comment="php5-suhosin is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172367" version="1" comment="php5-sysvmsg is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172368" version="1" comment="php5-sysvsem is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172369" version="1" comment="php5-sysvshm is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172370" version="1" comment="php5-tokenizer is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172371" version="1" comment="php5-wddx is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172372" version="1" comment="php5-xmlreader is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172373" version="1" comment="php5-xmlrpc is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172374" version="1" comment="php5-xmlwriter is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172375" version="1" comment="php5-xsl is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172376" version="1" comment="php5-zip is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172377" version="1" comment="php5-zlib is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172801" version="1" comment="apache2-mod_php7 is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172802" version="1" comment="php7 is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172803" version="1" comment="php7-bcmath is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172804" version="1" comment="php7-bz2 is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172805" version="1" comment="php7-calendar is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172806" version="1" comment="php7-ctype is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172807" version="1" comment="php7-curl is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172808" version="1" comment="php7-dba is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172809" version="1" comment="php7-dom is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172810" version="1" comment="php7-enchant is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172811" version="1" comment="php7-exif is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172812" version="1" comment="php7-fastcgi is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172813" version="1" comment="php7-fileinfo is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172814" version="1" comment="php7-fpm is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172815" version="1" comment="php7-ftp is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172816" version="1" comment="php7-gd is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172817" version="1" comment="php7-gettext is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172818" version="1" comment="php7-gmp is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172819" version="1" comment="php7-iconv is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172820" version="1" comment="php7-imap is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172821" version="1" comment="php7-intl is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172822" version="1" comment="php7-json is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172823" version="1" comment="php7-ldap is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172824" version="1" comment="php7-mbstring is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172825" version="1" comment="php7-mcrypt is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172826" version="1" comment="php7-mysql is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172827" version="1" comment="php7-odbc is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172828" version="1" comment="php7-opcache is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172829" version="1" comment="php7-openssl is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172830" version="1" comment="php7-pcntl is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172831" version="1" comment="php7-pdo is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172832" version="1" comment="php7-pear is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172833" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172834" version="1" comment="php7-pgsql is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172835" version="1" comment="php7-phar is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172836" version="1" comment="php7-posix is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172837" version="1" comment="php7-pspell is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172838" version="1" comment="php7-shmop is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172839" version="1" comment="php7-snmp is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172840" version="1" comment="php7-soap is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172841" version="1" comment="php7-sockets is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172842" version="1" comment="php7-sqlite is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172843" version="1" comment="php7-sysvmsg is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172844" version="1" comment="php7-sysvsem is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172845" version="1" comment="php7-sysvshm is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172846" version="1" comment="php7-tokenizer is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172847" version="1" comment="php7-wddx is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172848" version="1" comment="php7-xmlreader is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172849" version="1" comment="php7-xmlrpc is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172850" version="1" comment="php7-xmlwriter is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172851" version="1" comment="php7-xsl is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172852" version="1" comment="php7-zip is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172853" version="1" comment="php7-zlib is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173109" version="1" comment="apache2-mod_php5 is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173110" version="1" comment="php5 is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173111" version="1" comment="php5-bcmath is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173112" version="1" comment="php5-bz2 is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173113" version="1" comment="php5-calendar is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173114" version="1" comment="php5-ctype is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173115" version="1" comment="php5-curl is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173116" version="1" comment="php5-dba is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173117" version="1" comment="php5-dom is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173118" version="1" comment="php5-enchant is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173119" version="1" comment="php5-exif is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173120" version="1" comment="php5-fastcgi is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173121" version="1" comment="php5-fileinfo is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173122" version="1" comment="php5-fpm is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173123" version="1" comment="php5-ftp is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173124" version="1" comment="php5-gd is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173125" version="1" comment="php5-gettext is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173126" version="1" comment="php5-gmp is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173127" version="1" comment="php5-iconv is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173128" version="1" comment="php5-imap is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173129" version="1" comment="php5-intl is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173130" version="1" comment="php5-json is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173131" version="1" comment="php5-ldap is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173132" version="1" comment="php5-mbstring is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173133" version="1" comment="php5-mcrypt is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173134" version="1" comment="php5-mysql is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173135" version="1" comment="php5-odbc is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173136" version="1" comment="php5-opcache is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173137" version="1" comment="php5-openssl is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173138" version="1" comment="php5-pcntl is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173139" version="1" comment="php5-pdo is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173140" version="1" comment="php5-pear is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173141" version="1" comment="php5-pgsql is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173142" version="1" comment="php5-phar is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173143" version="1" comment="php5-posix is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173144" version="1" comment="php5-pspell is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173145" version="1" comment="php5-shmop is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173146" version="1" comment="php5-snmp is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173147" version="1" comment="php5-soap is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173148" version="1" comment="php5-sockets is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173149" version="1" comment="php5-sqlite is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173150" version="1" comment="php5-suhosin is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173151" version="1" comment="php5-sysvmsg is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173152" version="1" comment="php5-sysvsem is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173153" version="1" comment="php5-sysvshm is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173154" version="1" comment="php5-tokenizer is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173155" version="1" comment="php5-wddx is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173156" version="1" comment="php5-xmlreader is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173157" version="1" comment="php5-xmlrpc is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173158" version="1" comment="php5-xmlwriter is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173159" version="1" comment="php5-xsl is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173160" version="1" comment="php5-zip is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173161" version="1" comment="php5-zlib is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174454" version="1" comment="nodejs4 is &lt;4.9.1-15.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174455" version="1" comment="nodejs4-devel is &lt;4.9.1-15.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174456" version="1" comment="nodejs4-docs is &lt;4.9.1-15.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174457" version="1" comment="npm4 is &lt;4.9.1-15.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156852" version="1" comment="sle-pos-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135214" version="1" comment="bind-chrootenv is &lt;9.9.9P1-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135215" version="1" comment="bind-doc is &lt;9.9.9P1-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135882" version="1" comment="qemu-arm is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135883" version="1" comment="qemu-block-rbd is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135884" version="1" comment="qemu-block-ssh is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135885" version="1" comment="qemu-guest-agent is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135886" version="1" comment="qemu-lang is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135932" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.111-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135933" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.111-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135980" version="1" comment="dovecot22 is &lt;2.2.13-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135981" version="1" comment="dovecot22-backend-mysql is &lt;2.2.13-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135982" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.13-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135983" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.13-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136002" version="1" comment="mariadb-tools is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136152" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.121-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136153" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.121-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136403" version="1" comment="libfreebl3-hmac is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136404" version="1" comment="libsoftokn3-hmac is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136667" version="1" comment="kernel-default-base is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142199" version="1" comment="tomcat is &lt;8.0.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142200" version="1" comment="tomcat-admin-webapps is &lt;8.0.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142201" version="1" comment="tomcat-docs-webapp is &lt;8.0.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142202" version="1" comment="tomcat-el-3_0-api is &lt;8.0.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142203" version="1" comment="tomcat-javadoc is &lt;8.0.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142204" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142205" version="1" comment="tomcat-lib is &lt;8.0.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142206" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142207" version="1" comment="tomcat-webapps is &lt;8.0.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142742" version="1" comment="kernel-default-base is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157357" version="1" comment="libxml2-doc is &lt;2.9.4-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157358" version="1" comment="postgresql94-contrib is &lt;9.4.12-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157359" version="1" comment="postgresql94-docs is &lt;9.4.12-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157360" version="1" comment="postgresql94-server is &lt;9.4.12-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157397" version="1" comment="freeradius-server is &lt;3.0.3-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157398" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157399" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157400" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157401" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157402" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157403" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157404" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157405" version="1" comment="freeradius-server-python is &lt;3.0.3-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157406" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157407" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157597" version="1" comment="kernel-default-base is &lt;4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157936" version="1" comment="qemu-arm is &lt;2.6.2-41.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157937" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157938" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157939" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157940" version="1" comment="qemu-lang is &lt;2.6.2-41.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157991" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158432" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158790" version="1" comment="kernel-default-base is &lt;4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158912" version="1" comment="dracut-fips is &lt;044.1-109.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159477" version="1" comment="apache2 is &lt;2.4.23-29.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159478" version="1" comment="apache2-doc is &lt;2.4.23-29.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159479" version="1" comment="apache2-example-pages is &lt;2.4.23-29.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159480" version="1" comment="apache2-prefork is &lt;2.4.23-29.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159481" version="1" comment="apache2-utils is &lt;2.4.23-29.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159482" version="1" comment="apache2-worker is &lt;2.4.23-29.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161379" version="1" comment="mariadb-tools is &lt;10.0.31-29.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161419" version="1" comment="kernel-default-base is &lt;4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161784" version="1" comment="kernel-default-base is &lt;4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161803" version="1" comment="strongswan-hmac is &lt;5.1.3-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161804" version="1" comment="libxml2-doc is &lt;2.9.4-46.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161967" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.144-27.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161968" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.144-27.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162297" version="1" comment="freeradius-server is &lt;3.0.3-17.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162298" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162299" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162300" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162301" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162302" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162303" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162304" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162305" version="1" comment="freeradius-server-python is &lt;3.0.3-17.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162306" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162307" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147476" version="1" comment="openssh-fips is &lt;7.2p2-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162440" version="1" comment="libfpm_pb0 is &lt;1.1.1-17.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162441" version="1" comment="libospf0 is &lt;1.1.1-17.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162442" version="1" comment="libospfapiclient0 is &lt;1.1.1-17.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162443" version="1" comment="libquagga_pb0 is &lt;1.1.1-17.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162444" version="1" comment="libzebra1 is &lt;1.1.1-17.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162445" version="1" comment="quagga is &lt;1.1.1-17.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162895" version="1" comment="git is &lt;2.12.3-27.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162896" version="1" comment="git-core is &lt;2.12.3-27.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162897" version="1" comment="git-doc is &lt;2.12.3-27.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162898" version="1" comment="libicu-doc is &lt;52.1-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163131" version="1" comment="postgresql94-contrib is &lt;9.4.13-21.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163132" version="1" comment="postgresql94-docs is &lt;9.4.13-21.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163133" version="1" comment="postgresql94-server is &lt;9.4.13-21.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163134" version="1" comment="postgresql96-contrib is &lt;9.6.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163135" version="1" comment="postgresql96-docs is &lt;9.6.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163136" version="1" comment="postgresql96-server is &lt;9.6.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163579" version="1" comment="cvs-doc is &lt;1.12.12-182.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164366" version="1" comment="kernel-default-base is &lt;4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164496" version="1" comment="emacs-el is &lt;24.3-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164497" version="1" comment="emacs-nox is &lt;24.3-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164532" version="1" comment="apache2 is &lt;2.4.23-29.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164533" version="1" comment="apache2-doc is &lt;2.4.23-29.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164534" version="1" comment="apache2-example-pages is &lt;2.4.23-29.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164535" version="1" comment="apache2-prefork is &lt;2.4.23-29.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164536" version="1" comment="apache2-utils is &lt;2.4.23-29.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164537" version="1" comment="apache2-worker is &lt;2.4.23-29.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164760" version="1" comment="python-louis is &lt;2.6.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164799" version="1" comment="tcmu-runner is &lt;1.0.4-3.3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165081" version="1" comment="krb5-doc is &lt;1.12.5-40.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165082" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165083" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165084" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165085" version="1" comment="krb5-server is &lt;1.12.5-40.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165177" version="1" comment="libfreebl3-hmac is &lt;3.29.5-58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165178" version="1" comment="libsoftokn3-hmac is &lt;3.29.5-58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165179" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165180" version="1" comment="libvirt-nss is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165690" version="1" comment="xerces-j2-xml-apis is &lt;2.8.1-268.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165691" version="1" comment="xerces-j2-xml-resolver is &lt;2.8.1-268.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165692" version="1" comment="git is &lt;2.12.3-27.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165693" version="1" comment="git-core is &lt;2.12.3-27.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165694" version="1" comment="git-doc is &lt;2.12.3-27.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147968" version="1" comment="policycoreutils is &lt;2.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147969" version="1" comment="policycoreutils-python is &lt;2.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147970" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.121-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147971" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.121-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165999" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148007" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166127" version="1" comment="kernel-default-base is &lt;4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166527" version="1" comment="qemu-arm is &lt;2.6.2-41.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166528" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166529" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166530" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166531" version="1" comment="qemu-lang is &lt;2.6.2-41.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166661" version="1" comment="krb5-doc is &lt;1.12.5-40.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166662" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166663" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166664" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166665" version="1" comment="krb5-server is &lt;1.12.5-40.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166734" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.151-27.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166735" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.151-27.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166994" version="1" comment="tomcat is &lt;8.0.43-29.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166995" version="1" comment="tomcat-admin-webapps is &lt;8.0.43-29.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166996" version="1" comment="tomcat-docs-webapp is &lt;8.0.43-29.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166997" version="1" comment="tomcat-el-3_0-api is &lt;8.0.43-29.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166998" version="1" comment="tomcat-javadoc is &lt;8.0.43-29.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166999" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.43-29.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167000" version="1" comment="tomcat-lib is &lt;8.0.43-29.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167001" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.43-29.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167002" version="1" comment="tomcat-webapps is &lt;8.0.43-29.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148052" version="1" comment="libxml2-doc is &lt;2.9.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167321" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167322" version="1" comment="openssl-doc is &lt;1.0.2j-60.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167781" version="1" comment="libshibsp-lite6 is &lt;2.5.5-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167782" version="1" comment="libshibsp6 is &lt;2.5.5-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167783" version="1" comment="shibboleth-sp is &lt;2.5.5-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167784" version="1" comment="kernel-default-base is &lt;4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167964" version="1" comment="openssh-fips is &lt;7.2p2-74.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167965" version="1" comment="libsaml8 is &lt;2.5.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167966" version="1" comment="opensaml is &lt;2.5.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167967" version="1" comment="opensaml-bin is &lt;2.5.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167968" version="1" comment="opensaml-schemas is &lt;2.5.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168392" version="1" comment="libapr-util1 is &lt;1.5.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168393" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.5.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148204" version="1" comment="mariadb-tools is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168394" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168395" version="1" comment="openssl-doc is &lt;1.0.2j-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168768" version="1" comment="postgresql96-contrib is &lt;9.6.6-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168769" version="1" comment="postgresql96-docs is &lt;9.6.6-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168770" version="1" comment="postgresql96-server is &lt;9.6.6-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168807" version="1" comment="kernel-default-base is &lt;4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148541" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.131-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148542" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.131-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149023" version="1" comment="kernel-default-base is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149103" version="1" comment="bind-chrootenv is &lt;9.9.9P1-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149104" version="1" comment="bind-doc is &lt;9.9.9P1-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149415" version="1" comment="qemu-arm is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149416" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149417" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149418" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149419" version="1" comment="qemu-lang is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146859" version="1" comment="freeradius-server is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146860" version="1" comment="freeradius-server-doc is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146861" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146862" version="1" comment="freeradius-server-ldap is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146863" version="1" comment="freeradius-server-libs is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146864" version="1" comment="freeradius-server-mysql is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146865" version="1" comment="freeradius-server-perl is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146866" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146867" version="1" comment="freeradius-server-python is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146868" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146869" version="1" comment="freeradius-server-utils is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149818" version="1" comment="apache2 is &lt;2.4.23-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149819" version="1" comment="apache2-doc is &lt;2.4.23-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149820" version="1" comment="apache2-example-pages is &lt;2.4.23-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149821" version="1" comment="apache2-prefork is &lt;2.4.23-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149822" version="1" comment="apache2-utils is &lt;2.4.23-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149823" version="1" comment="apache2-worker is &lt;2.4.23-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150128" version="1" comment="kernel-default-base is &lt;4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146882" version="1" comment="bind-chrootenv is &lt;9.9.9P1-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146883" version="1" comment="bind-doc is &lt;9.9.9P1-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150815" version="1" comment="dracut-fips is &lt;044-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154299" version="1" comment="bind-chrootenv is &lt;9.9.9P1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154300" version="1" comment="bind-doc is &lt;9.9.9P1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154928" version="1" comment="apache2-mod_apparmor is &lt;2.8.2-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146971" version="1" comment="qemu-arm is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146972" version="1" comment="qemu-block-rbd is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146973" version="1" comment="qemu-block-ssh is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146974" version="1" comment="qemu-guest-agent is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146975" version="1" comment="qemu-lang is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155065" version="1" comment="kernel-default-base is &lt;4.4.59-92.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155332" version="1" comment="dovecot is &lt;2.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155333" version="1" comment="dovecot22 is &lt;2.2.29.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155334" version="1" comment="dovecot22-backend-mysql is &lt;2.2.29.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155335" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.29.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155336" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.29.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155337" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.121-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155338" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.121-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155558" version="1" comment="mariadb-tools is &lt;10.0.30-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147241" version="1" comment="kernel-default-base is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156245" version="1" comment="libxml2-doc is &lt;2.9.4-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156769" version="1" comment="libxml2-doc is &lt;2.9.4-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156853" version="1" comment="libmicrohttpd is &lt;0.9.30-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147373" version="1" comment="apache2 is &lt;2.4.23-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147374" version="1" comment="apache2-doc is &lt;2.4.23-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147375" version="1" comment="apache2-example-pages is &lt;2.4.23-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147376" version="1" comment="apache2-prefork is &lt;2.4.23-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147377" version="1" comment="apache2-utils is &lt;2.4.23-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147378" version="1" comment="apache2-worker is &lt;2.4.23-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156989" version="1" comment="kernel-default-base is &lt;4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157167" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169832" version="1" comment="libxmltooling6 is &lt;1.5.6-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169833" version="1" comment="xmltooling is &lt;1.5.6-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169834" version="1" comment="xmltooling-schemas is &lt;1.5.6-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169073" version="1" comment="kernel-default-base is &lt;4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169074" version="1" comment="libvorbis-doc is &lt;1.3.3-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170584" version="1" comment="apache2 is &lt;2.4.23-29.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170585" version="1" comment="apache2-doc is &lt;2.4.23-29.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170586" version="1" comment="apache2-example-pages is &lt;2.4.23-29.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170587" version="1" comment="apache2-prefork is &lt;2.4.23-29.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170588" version="1" comment="apache2-utils is &lt;2.4.23-29.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170589" version="1" comment="apache2-worker is &lt;2.4.23-29.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170590" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170591" version="1" comment="bind-doc is &lt;9.9.9P1-63.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170674" version="1" comment="openvswitch is &lt;2.5.1-25.12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170675" version="1" comment="openvswitch-switch is &lt;2.5.1-25.12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169307" version="1" comment="qemu-arm is &lt;2.6.2-41.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169308" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169309" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169310" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169311" version="1" comment="qemu-lang is &lt;2.6.2-41.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170973" version="1" comment="mariadb-tools is &lt;10.0.33-29.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170974" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170975" version="1" comment="libvirt-nss is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171016" version="1" comment="libxml2-doc is &lt;2.9.4-46.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171112" version="1" comment="kernel-default-base is &lt;4.4.114-92.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171210" version="1" comment="ipsec-tools is &lt;0.8.0-19.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171446" version="1" comment="glibc-html is &lt;2.22-62.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171447" version="1" comment="glibc-info is &lt;2.22-62.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171448" version="1" comment="glibc-profile is &lt;2.22-62.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171449" version="1" comment="libfpm_pb0 is &lt;1.1.1-17.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171450" version="1" comment="libospf0 is &lt;1.1.1-17.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171451" version="1" comment="libospfapiclient0 is &lt;1.1.1-17.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171452" version="1" comment="libquagga_pb0 is &lt;1.1.1-17.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171453" version="1" comment="libzebra1 is &lt;1.1.1-17.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171454" version="1" comment="quagga is &lt;1.1.1-17.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171464" version="1" comment="dovecot22 is &lt;2.2.31-19.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171465" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171466" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171467" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171531" version="1" comment="postgresql96-contrib is &lt;9.6.7-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171532" version="1" comment="postgresql96-docs is &lt;9.6.7-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171533" version="1" comment="postgresql96-server is &lt;9.6.7-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172378" version="1" comment="dhcp-relay is &lt;4.3.3-10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172379" version="1" comment="dhcp-server is &lt;4.3.3-10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172773" version="1" comment="squid is &lt;3.5.21-26.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172854" version="1" comment="glibc-html is &lt;2.22-62.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172855" version="1" comment="glibc-info is &lt;2.22-62.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172856" version="1" comment="glibc-profile is &lt;2.22-62.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172951" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.171-43.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172952" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.171-43.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172953" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.161-27.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172954" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.161-27.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173010" version="1" comment="postgresql94-contrib is &lt;9.4.16-21.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173011" version="1" comment="postgresql94-docs is &lt;9.4.16-21.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173012" version="1" comment="postgresql94-server is &lt;9.4.16-21.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173059" version="1" comment="mariadb-tools is &lt;10.0.34-29.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173162" version="1" comment="libxmltooling6 is &lt;1.5.6-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173163" version="1" comment="xmltooling is &lt;1.5.6-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173164" version="1" comment="xmltooling-schemas is &lt;1.5.6-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173439" version="1" comment="crash is &lt;7.1.5-15.3.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173440" version="1" comment="crash-kmp-default is &lt;7.1.5_k4.4.114_92.67-15.3.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173441" version="1" comment="postgresql96-contrib is &lt;9.6.8-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173442" version="1" comment="postgresql96-docs is &lt;9.6.8-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173443" version="1" comment="postgresql96-server is &lt;9.6.8-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173634" version="1" comment="libvorbis-doc is &lt;1.3.3-10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173635" version="1" comment="kernel-default-base is &lt;4.4.120-92.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173792" version="1" comment="dhcp-relay is &lt;4.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173793" version="1" comment="dhcp-server is &lt;4.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173794" version="1" comment="tomcat is &lt;8.0.50-29.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173795" version="1" comment="tomcat-admin-webapps is &lt;8.0.50-29.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173796" version="1" comment="tomcat-docs-webapp is &lt;8.0.50-29.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173797" version="1" comment="tomcat-el-3_0-api is &lt;8.0.50-29.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173798" version="1" comment="tomcat-javadoc is &lt;8.0.50-29.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173799" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.50-29.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173800" version="1" comment="tomcat-lib is &lt;8.0.50-29.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173801" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.50-29.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173802" version="1" comment="tomcat-webapps is &lt;8.0.50-29.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169512" version="1" comment="glibc-html is &lt;2.22-62.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169513" version="1" comment="glibc-info is &lt;2.22-62.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169514" version="1" comment="glibc-profile is &lt;2.22-62.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173934" version="1" comment="librelp is &lt;1.2.7-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173935" version="1" comment="librelp0 is &lt;1.2.7-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173936" version="1" comment="LibVNCServer is &lt;0.9.9-17.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173937" version="1" comment="libvncclient0 is &lt;0.9.9-17.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173938" version="1" comment="libvncserver0 is &lt;0.9.9-17.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173939" version="1" comment="qemu-arm is &lt;2.6.2-41.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173940" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173941" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173942" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173943" version="1" comment="qemu-lang is &lt;2.6.2-41.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173997" version="1" comment="memcached is &lt;1.4.39-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173998" version="1" comment="krb5-doc is &lt;1.12.5-40.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173999" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174000" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174001" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174002" version="1" comment="krb5-server is &lt;1.12.5-40.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174121" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174122" version="1" comment="libvirt-nss is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174164" version="1" comment="postgresql94-contrib is &lt;9.4.17-21.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174165" version="1" comment="postgresql94-docs is &lt;9.4.17-21.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174166" version="1" comment="postgresql94-server is &lt;9.4.17-21.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168969" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.161-43.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168970" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.161-43.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174353" version="1" comment="policycoreutils is &lt;2.5-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174354" version="1" comment="policycoreutils-python is &lt;2.5-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174355" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174356" version="1" comment="openssl-doc is &lt;1.0.2j-60.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169515" version="1" comment="postgresql94-contrib is &lt;9.4.15-21.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169516" version="1" comment="postgresql94-docs is &lt;9.4.15-21.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169517" version="1" comment="postgresql94-server is &lt;9.4.15-21.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169518" version="1" comment="mariadb-tools is &lt;10.0.32-29.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169579" version="1" comment="openslp-server is &lt;2.0.0-18.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129852" version="1" comment="kernel-compute is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129853" version="1" comment="kernel-compute-base is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129854" version="1" comment="kernel-compute-devel is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129855" version="1" comment="kernel-compute_debug is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129856" version="1" comment="kernel-compute_debug-devel is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129857" version="1" comment="kernel-devel-rt is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129858" version="1" comment="kernel-rt is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129859" version="1" comment="kernel-rt-base is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129860" version="1" comment="kernel-rt-devel is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129861" version="1" comment="kernel-rt_debug is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129862" version="1" comment="kernel-rt_debug-devel is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129863" version="1" comment="kernel-source-rt is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129864" version="1" comment="kernel-syms-rt is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129865" version="1" comment="SUSE-Linux-Enterprise-RT-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130758" version="1" comment="kernel-compute is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130759" version="1" comment="kernel-compute-base is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130760" version="1" comment="kernel-compute-devel is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130761" version="1" comment="kernel-compute_debug is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130762" version="1" comment="kernel-compute_debug-devel is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130763" version="1" comment="kernel-devel-rt is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130764" version="1" comment="kernel-rt is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130765" version="1" comment="kernel-rt-base is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130766" version="1" comment="kernel-rt-devel is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130767" version="1" comment="kernel-rt_debug is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130768" version="1" comment="kernel-rt_debug-devel is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130769" version="1" comment="kernel-source-rt is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130770" version="1" comment="kernel-syms-rt is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146147" version="1" comment="kernel-compute is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146148" version="1" comment="kernel-compute-base is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146149" version="1" comment="kernel-compute-devel is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146150" version="1" comment="kernel-compute_debug is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146151" version="1" comment="kernel-compute_debug-devel is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146152" version="1" comment="kernel-devel-rt is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146153" version="1" comment="kernel-rt is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146154" version="1" comment="kernel-rt-base is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146155" version="1" comment="kernel-rt-devel is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146156" version="1" comment="kernel-rt_debug is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146157" version="1" comment="kernel-rt_debug-devel is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146158" version="1" comment="kernel-source-rt is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146159" version="1" comment="kernel-syms-rt is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148144" version="1" comment="kernel-compute is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148145" version="1" comment="kernel-compute-base is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148146" version="1" comment="kernel-compute-devel is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148147" version="1" comment="kernel-compute_debug is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148148" version="1" comment="kernel-compute_debug-devel is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148149" version="1" comment="kernel-devel-rt is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148150" version="1" comment="kernel-rt is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148151" version="1" comment="kernel-rt-base is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148152" version="1" comment="kernel-rt-devel is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148153" version="1" comment="kernel-rt_debug is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148154" version="1" comment="kernel-rt_debug-devel is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148155" version="1" comment="kernel-source-rt is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148156" version="1" comment="kernel-syms-rt is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159518" version="1" comment="cluster-md-kmp-rt is &lt;4.4.74-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159519" version="1" comment="cluster-network-kmp-rt is &lt;4.4.74-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159520" version="1" comment="dlm-kmp-rt is &lt;4.4.74-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159521" version="1" comment="gfs2-kmp-rt is &lt;4.4.74-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159522" version="1" comment="kernel-devel-rt is &lt;4.4.74-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159523" version="1" comment="kernel-rt is &lt;4.4.74-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159524" version="1" comment="kernel-rt-base is &lt;4.4.74-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159525" version="1" comment="kernel-rt-devel is &lt;4.4.74-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159526" version="1" comment="kernel-rt_debug is &lt;4.4.74-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159527" version="1" comment="kernel-rt_debug-devel is &lt;4.4.74-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159528" version="1" comment="kernel-source-rt is &lt;4.4.74-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159529" version="1" comment="kernel-syms-rt is &lt;4.4.74-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159530" version="1" comment="ocfs2-kmp-rt is &lt;4.4.74-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159531" version="1" comment="SUSE-Linux-Enterprise-RT-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166666" version="1" comment="cluster-md-kmp-rt is &lt;4.4.88-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166667" version="1" comment="cluster-network-kmp-rt is &lt;4.4.88-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166668" version="1" comment="dlm-kmp-rt is &lt;4.4.88-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166669" version="1" comment="gfs2-kmp-rt is &lt;4.4.88-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166670" version="1" comment="kernel-devel-rt is &lt;4.4.88-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166671" version="1" comment="kernel-rt is &lt;4.4.88-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166672" version="1" comment="kernel-rt-base is &lt;4.4.88-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166673" version="1" comment="kernel-rt-devel is &lt;4.4.88-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166674" version="1" comment="kernel-rt_debug is &lt;4.4.88-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166675" version="1" comment="kernel-rt_debug-devel is &lt;4.4.88-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166676" version="1" comment="kernel-source-rt is &lt;4.4.88-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166677" version="1" comment="kernel-syms-rt is &lt;4.4.88-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166678" version="1" comment="ocfs2-kmp-rt is &lt;4.4.88-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168233" version="1" comment="cluster-md-kmp-rt is &lt;4.4.95-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168234" version="1" comment="cluster-network-kmp-rt is &lt;4.4.95-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168235" version="1" comment="dlm-kmp-rt is &lt;4.4.95-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168236" version="1" comment="gfs2-kmp-rt is &lt;4.4.95-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168237" version="1" comment="kernel-devel-rt is &lt;4.4.95-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168238" version="1" comment="kernel-rt is &lt;4.4.95-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168239" version="1" comment="kernel-rt-base is &lt;4.4.95-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168240" version="1" comment="kernel-rt-devel is &lt;4.4.95-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168241" version="1" comment="kernel-rt_debug is &lt;4.4.95-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168242" version="1" comment="kernel-rt_debug-devel is &lt;4.4.95-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168243" version="1" comment="kernel-source-rt is &lt;4.4.95-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168244" version="1" comment="kernel-syms-rt is &lt;4.4.95-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168245" version="1" comment="ocfs2-kmp-rt is &lt;4.4.95-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170129" version="1" comment="cluster-md-kmp-rt is &lt;4.4.104-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170130" version="1" comment="cluster-network-kmp-rt is &lt;4.4.104-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170131" version="1" comment="dlm-kmp-rt is &lt;4.4.104-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170132" version="1" comment="gfs2-kmp-rt is &lt;4.4.104-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170133" version="1" comment="kernel-devel-rt is &lt;4.4.104-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170134" version="1" comment="kernel-rt is &lt;4.4.104-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170135" version="1" comment="kernel-rt-base is &lt;4.4.104-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170136" version="1" comment="kernel-rt-devel is &lt;4.4.104-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170137" version="1" comment="kernel-rt_debug is &lt;4.4.104-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170138" version="1" comment="kernel-rt_debug-devel is &lt;4.4.104-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170139" version="1" comment="kernel-source-rt is &lt;4.4.104-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170140" version="1" comment="kernel-syms-rt is &lt;4.4.104-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170141" version="1" comment="ocfs2-kmp-rt is &lt;4.4.104-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171534" version="1" comment="cluster-md-kmp-rt is &lt;4.4.114-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171535" version="1" comment="cluster-network-kmp-rt is &lt;4.4.114-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171536" version="1" comment="dlm-kmp-rt is &lt;4.4.114-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171537" version="1" comment="gfs2-kmp-rt is &lt;4.4.114-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171538" version="1" comment="kernel-devel-rt is &lt;4.4.114-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171539" version="1" comment="kernel-rt is &lt;4.4.114-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171540" version="1" comment="kernel-rt-base is &lt;4.4.114-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171541" version="1" comment="kernel-rt-devel is &lt;4.4.114-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171542" version="1" comment="kernel-rt_debug is &lt;4.4.114-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171543" version="1" comment="kernel-rt_debug-devel is &lt;4.4.114-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171544" version="1" comment="kernel-source-rt is &lt;4.4.114-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171545" version="1" comment="kernel-syms-rt is &lt;4.4.114-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171546" version="1" comment="ocfs2-kmp-rt is &lt;4.4.114-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173444" version="1" comment="crash-kmp-rt is &lt;7.1.5_k4.4.21_6-15.3.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174574" version="1" comment="cluster-md-kmp-rt is &lt;4.4.120-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174575" version="1" comment="dlm-kmp-rt is &lt;4.4.120-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174576" version="1" comment="gfs2-kmp-rt is &lt;4.4.120-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174577" version="1" comment="kernel-devel-rt is &lt;4.4.120-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174578" version="1" comment="kernel-rt is &lt;4.4.120-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174579" version="1" comment="kernel-rt-base is &lt;4.4.120-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174580" version="1" comment="kernel-rt-devel is &lt;4.4.120-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174581" version="1" comment="kernel-rt_debug is &lt;4.4.120-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174582" version="1" comment="kernel-rt_debug-devel is &lt;4.4.120-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174583" version="1" comment="kernel-source-rt is &lt;4.4.120-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174584" version="1" comment="kernel-syms-rt is &lt;4.4.120-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174585" version="1" comment="ocfs2-kmp-rt is &lt;4.4.120-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174586" version="1" comment="SUSE-Linux-Enterprise-RT-release is ==12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117456" version="1" comment="SUSE_SLES_SAP-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131614" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131615" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131616" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131617" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131618" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131619" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131620" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131621" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131622" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131623" version="1" comment="kgraft-patch-3_12_55-52_42-default is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131624" version="1" comment="kgraft-patch-3_12_55-52_42-xen is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131625" version="1" comment="kgraft-patch-SLE12_Update_12 is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131626" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;4-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131627" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;4-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131628" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;4-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131629" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131630" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131631" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131632" version="1" comment="kgraft-patch-3_12_48-52_27-default is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131633" version="1" comment="kgraft-patch-3_12_48-52_27-xen is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131634" version="1" comment="kgraft-patch-SLE12_Update_8 is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131635" version="1" comment="kgraft-patch-3_12_44-52_18-default is &lt;6-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131636" version="1" comment="kgraft-patch-3_12_44-52_18-xen is &lt;6-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131637" version="1" comment="kgraft-patch-SLE12_Update_7 is &lt;6-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131638" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131639" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131640" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131641" version="1" comment="libmysqlclient-devel is &lt;10.0.26-20.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131642" version="1" comment="libmysqlclient18 is &lt;10.0.26-20.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131643" version="1" comment="libmysqlclient18-32bit is &lt;10.0.26-20.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131644" version="1" comment="libmysqlclient_r18 is &lt;10.0.26-20.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131645" version="1" comment="libmysqld-devel is &lt;10.0.26-20.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131646" version="1" comment="libmysqld18 is &lt;10.0.26-20.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131647" version="1" comment="mariadb is &lt;10.0.26-20.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131648" version="1" comment="mariadb-client is &lt;10.0.26-20.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131649" version="1" comment="mariadb-errormessages is &lt;10.0.26-20.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131650" version="1" comment="mariadb-tools is &lt;10.0.26-20.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131651" version="1" comment="apache2 is &lt;2.4.10-14.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131652" version="1" comment="apache2-doc is &lt;2.4.10-14.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131653" version="1" comment="apache2-example-pages is &lt;2.4.10-14.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131654" version="1" comment="apache2-prefork is &lt;2.4.10-14.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131655" version="1" comment="apache2-utils is &lt;2.4.10-14.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131656" version="1" comment="apache2-worker is &lt;2.4.10-14.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131657" version="1" comment="openssh-fips is &lt;6.6p1-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131663" version="1" comment="libstorage is &lt;2.25.16.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131664" version="1" comment="libstorage-ruby is &lt;2.25.16.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131665" version="1" comment="libstorage5 is &lt;2.25.16.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131666" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131667" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131668" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-27.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131669" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-27.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131670" version="1" comment="openssl is &lt;1.0.1i-27.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131671" version="1" comment="openssl-doc is &lt;1.0.1i-27.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131672" version="1" comment="apache2-mod_nss is &lt;1.0.14-10.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131673" version="1" comment="libmysqlclient-devel is &lt;10.0.27-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131674" version="1" comment="libmysqlclient18 is &lt;10.0.27-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131675" version="1" comment="libmysqlclient18-32bit is &lt;10.0.27-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131676" version="1" comment="libmysqlclient_r18 is &lt;10.0.27-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131677" version="1" comment="libmysqld-devel is &lt;10.0.27-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131678" version="1" comment="libmysqld18 is &lt;10.0.27-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131679" version="1" comment="mariadb is &lt;10.0.27-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131680" version="1" comment="mariadb-client is &lt;10.0.27-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131681" version="1" comment="mariadb-errormessages is &lt;10.0.27-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131682" version="1" comment="mariadb-tools is &lt;10.0.27-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131683" version="1" comment="bind is &lt;9.9.9P1-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131684" version="1" comment="bind-chrootenv is &lt;9.9.9P1-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131685" version="1" comment="bind-doc is &lt;9.9.9P1-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131686" version="1" comment="bind-libs is &lt;9.9.9P1-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131687" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131688" version="1" comment="bind-utils is &lt;9.9.9P1-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131689" version="1" comment="postgresql93 is &lt;9.3.14-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131690" version="1" comment="postgresql93-contrib is &lt;9.3.14-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131691" version="1" comment="postgresql93-docs is &lt;9.3.14-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131692" version="1" comment="postgresql93-server is &lt;9.3.14-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131693" version="1" comment="libgudev-1_0-0 is &lt;210-70.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131694" version="1" comment="libgudev-1_0-0-32bit is &lt;210-70.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131695" version="1" comment="libudev1 is &lt;210-70.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131696" version="1" comment="libudev1-32bit is &lt;210-70.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131697" version="1" comment="systemd is &lt;210-70.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131698" version="1" comment="systemd-32bit is &lt;210-70.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131699" version="1" comment="systemd-bash-completion is &lt;210-70.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131700" version="1" comment="systemd-sysvinit is &lt;210-70.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131701" version="1" comment="udev is &lt;210-70.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131702" version="1" comment="xen is &lt;4.4.4_04-22.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131703" version="1" comment="xen-doc-html is &lt;4.4.4_04-22.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131704" version="1" comment="xen-kmp-default is &lt;4.4.4_04_k3.12.60_52.54-22.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131705" version="1" comment="xen-libs is &lt;4.4.4_04-22.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131706" version="1" comment="xen-libs-32bit is &lt;4.4.4_04-22.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131707" version="1" comment="xen-tools is &lt;4.4.4_04-22.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131708" version="1" comment="xen-tools-domU is &lt;4.4.4_04-22.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131709" version="1" comment="kernel-default is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131710" version="1" comment="kernel-default-base is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131711" version="1" comment="kernel-default-devel is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131712" version="1" comment="kernel-devel is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131713" version="1" comment="kernel-macros is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131714" version="1" comment="kernel-source is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131715" version="1" comment="kernel-syms is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131716" version="1" comment="kernel-xen is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131717" version="1" comment="kernel-xen-base is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131718" version="1" comment="kernel-xen-devel is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131719" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131720" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131721" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131722" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131723" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131724" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131725" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131726" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131727" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131728" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131729" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131730" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131731" version="1" comment="kgraft-patch-3_12_55-52_42-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131732" version="1" comment="kgraft-patch-3_12_55-52_42-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131733" version="1" comment="kgraft-patch-SLE12_Update_12 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131734" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131735" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131736" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131737" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131738" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131739" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131740" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131741" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131742" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135216" version="1" comment="bind is &lt;9.9.9P1-28.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135217" version="1" comment="bind-chrootenv is &lt;9.9.9P1-28.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135218" version="1" comment="bind-doc is &lt;9.9.9P1-28.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135219" version="1" comment="bind-libs is &lt;9.9.9P1-28.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135220" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-28.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135221" version="1" comment="bind-utils is &lt;9.9.9P1-28.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135489" version="1" comment="qemu is &lt;2.0.2-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135490" version="1" comment="qemu-block-curl is &lt;2.0.2-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135491" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135492" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135493" version="1" comment="qemu-ipxe is &lt;1.0.0-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135494" version="1" comment="qemu-kvm is &lt;2.0.2-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135495" version="1" comment="qemu-lang is &lt;2.0.2-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135496" version="1" comment="qemu-seabios is &lt;1.7.4-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135497" version="1" comment="qemu-sgabios is &lt;8-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135498" version="1" comment="qemu-tools is &lt;2.0.2-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135499" version="1" comment="qemu-vgabios is &lt;1.7.4-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135500" version="1" comment="qemu-x86 is &lt;2.0.2-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136003" version="1" comment="libmysqlclient-devel is &lt;10.0.28-20.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136004" version="1" comment="libmysqlclient18 is &lt;10.0.28-20.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136005" version="1" comment="libmysqlclient18-32bit is &lt;10.0.28-20.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136006" version="1" comment="libmysqlclient_r18 is &lt;10.0.28-20.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136007" version="1" comment="libmysqld-devel is &lt;10.0.28-20.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136008" version="1" comment="libmysqld18 is &lt;10.0.28-20.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136009" version="1" comment="mariadb is &lt;10.0.28-20.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136010" version="1" comment="mariadb-client is &lt;10.0.28-20.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136011" version="1" comment="mariadb-errormessages is &lt;10.0.28-20.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136012" version="1" comment="mariadb-tools is &lt;10.0.28-20.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136112" version="1" comment="qemu is &lt;2.0.2-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136113" version="1" comment="qemu-block-curl is &lt;2.0.2-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136114" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136115" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136116" version="1" comment="qemu-ipxe is &lt;1.0.0-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136117" version="1" comment="qemu-kvm is &lt;2.0.2-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136118" version="1" comment="qemu-lang is &lt;2.0.2-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136119" version="1" comment="qemu-seabios is &lt;1.7.4-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136120" version="1" comment="qemu-sgabios is &lt;8-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136121" version="1" comment="qemu-tools is &lt;2.0.2-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136122" version="1" comment="qemu-vgabios is &lt;1.7.4-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136123" version="1" comment="qemu-x86 is &lt;2.0.2-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136405" version="1" comment="libfreebl3-hmac-32bit is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136406" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136668" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.60-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136669" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.60-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136670" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.60-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136671" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.60-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136672" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.60-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141182" version="1" comment="kernel-default is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141183" version="1" comment="kernel-default-base is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141184" version="1" comment="kernel-default-devel is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141185" version="1" comment="kernel-devel is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141186" version="1" comment="kernel-macros is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141187" version="1" comment="kernel-source is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141188" version="1" comment="kernel-syms is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141189" version="1" comment="kernel-xen is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141190" version="1" comment="kernel-xen-base is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141191" version="1" comment="kernel-xen-devel is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141192" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141193" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141194" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142743" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142744" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142745" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142746" version="1" comment="kgraft-patch-3_12_55-52_42-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142747" version="1" comment="kgraft-patch-3_12_55-52_42-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142748" version="1" comment="kgraft-patch-SLE12_Update_12 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142749" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142750" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142751" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142752" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142753" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142754" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142755" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142756" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142757" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142943" version="1" comment="xen is &lt;4.4.4_05-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142944" version="1" comment="xen-doc-html is &lt;4.4.4_05-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142945" version="1" comment="xen-kmp-default is &lt;4.4.4_05_k3.12.60_52.57-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142946" version="1" comment="xen-libs is &lt;4.4.4_05-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142947" version="1" comment="xen-libs-32bit is &lt;4.4.4_05-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142948" version="1" comment="xen-tools is &lt;4.4.4_05-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142949" version="1" comment="xen-tools-domU is &lt;4.4.4_05-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143415" version="1" comment="ntp is &lt;4.2.8p9-46.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143416" version="1" comment="ntp-doc is &lt;4.2.8p9-46.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144247" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144248" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144249" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144653" version="1" comment="kernel-default is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144654" version="1" comment="kernel-default-base is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144655" version="1" comment="kernel-default-devel is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144656" version="1" comment="kernel-devel is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144657" version="1" comment="kernel-macros is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144658" version="1" comment="kernel-source is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144659" version="1" comment="kernel-syms is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144660" version="1" comment="kernel-xen is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144661" version="1" comment="kernel-xen-base is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144662" version="1" comment="kernel-xen-devel is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144663" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144664" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144665" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145378" version="1" comment="xen is &lt;4.4.4_05-22.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145379" version="1" comment="xen-doc-html is &lt;4.4.4_05-22.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145380" version="1" comment="xen-kmp-default is &lt;4.4.4_05_k3.12.60_52.63-22.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145381" version="1" comment="xen-libs is &lt;4.4.4_05-22.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145382" version="1" comment="xen-libs-32bit is &lt;4.4.4_05-22.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145383" version="1" comment="xen-tools is &lt;4.4.4_05-22.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145384" version="1" comment="xen-tools-domU is &lt;4.4.4_05-22.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145385" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145386" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145387" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145388" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145389" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145390" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146029" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146030" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146031" version="1" comment="libdcerpc0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146032" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146033" version="1" comment="libgensec0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146034" version="1" comment="libgensec0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146035" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146036" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146037" version="1" comment="libndr-nbt0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146038" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146039" version="1" comment="libndr-standard0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146040" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146041" version="1" comment="libndr0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146042" version="1" comment="libndr0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146043" version="1" comment="libnetapi0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146044" version="1" comment="libnetapi0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146045" version="1" comment="libregistry0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146046" version="1" comment="libsamba-credentials0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146047" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146048" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146049" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146050" version="1" comment="libsamba-passdb0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146051" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146052" version="1" comment="libsamba-util0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146053" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146054" version="1" comment="libsamdb0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146055" version="1" comment="libsamdb0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146056" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146057" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146058" version="1" comment="libsmbclient0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146059" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146060" version="1" comment="libsmbconf0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146061" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146062" version="1" comment="libsmbldap0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146063" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146064" version="1" comment="libtevent-util0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146065" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146066" version="1" comment="libwbclient0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146067" version="1" comment="libwbclient0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146068" version="1" comment="samba-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146069" version="1" comment="samba-client is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146070" version="1" comment="samba-client-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146071" version="1" comment="samba-doc is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146072" version="1" comment="samba-libs is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146073" version="1" comment="samba-libs-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146074" version="1" comment="samba-winbind is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146075" version="1" comment="samba-winbind-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120803" version="1" comment="clamsap is &lt;0.98.9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157168" version="1" comment="sudo is &lt;1.8.10p3-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157322" version="1" comment="tomcat is &lt;7.0.78-7.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157323" version="1" comment="tomcat-admin-webapps is &lt;7.0.78-7.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157324" version="1" comment="tomcat-docs-webapp is &lt;7.0.78-7.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157325" version="1" comment="tomcat-el-2_2-api is &lt;7.0.78-7.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157326" version="1" comment="tomcat-javadoc is &lt;7.0.78-7.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157327" version="1" comment="tomcat-jsp-2_2-api is &lt;7.0.78-7.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157328" version="1" comment="tomcat-lib is &lt;7.0.78-7.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157329" version="1" comment="tomcat-servlet-3_0-api is &lt;7.0.78-7.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157330" version="1" comment="tomcat-webapps is &lt;7.0.78-7.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157723" version="1" comment="kernel-default is &lt;3.12.61-52.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157724" version="1" comment="kernel-default-base is &lt;3.12.61-52.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157725" version="1" comment="kernel-default-devel is &lt;3.12.61-52.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157726" version="1" comment="kernel-devel is &lt;3.12.61-52.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157727" version="1" comment="kernel-macros is &lt;3.12.61-52.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157728" version="1" comment="kernel-source is &lt;3.12.61-52.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157729" version="1" comment="kernel-syms is &lt;3.12.61-52.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157730" version="1" comment="kernel-xen is &lt;3.12.61-52.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157731" version="1" comment="kernel-xen-base is &lt;3.12.61-52.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157732" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157733" version="1" comment="kgraft-patch-3_12_61-52_80-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157734" version="1" comment="kgraft-patch-3_12_61-52_80-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157735" version="1" comment="kgraft-patch-SLE12_Update_23 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157736" version="1" comment="bind is &lt;9.9.9P1-28.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157737" version="1" comment="bind-chrootenv is &lt;9.9.9P1-28.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157738" version="1" comment="bind-devel is &lt;9.9.9P1-28.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157739" version="1" comment="bind-doc is &lt;9.9.9P1-28.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157740" version="1" comment="bind-libs is &lt;9.9.9P1-28.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157741" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-28.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157742" version="1" comment="bind-utils is &lt;9.9.9P1-28.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157941" version="1" comment="sudo is &lt;1.8.10p3-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157992" version="1" comment="xen is &lt;4.4.4_21-22.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157993" version="1" comment="xen-doc-html is &lt;4.4.4_21-22.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157994" version="1" comment="xen-kmp-default is &lt;4.4.4_21_k3.12.61_52.77-22.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157995" version="1" comment="xen-libs is &lt;4.4.4_21-22.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157996" version="1" comment="xen-libs-32bit is &lt;4.4.4_21-22.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157997" version="1" comment="xen-tools is &lt;4.4.4_21-22.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157998" version="1" comment="xen-tools-domU is &lt;4.4.4_21-22.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158433" version="1" comment="libspice-server1 is &lt;0.12.4-8.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158434" version="1" comment="spice is &lt;0.12.4-8.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158803" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-30.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158804" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-30.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158892" version="1" comment="evince is &lt;3.10.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158893" version="1" comment="evince-lang is &lt;3.10.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158894" version="1" comment="libevdocument3-4 is &lt;3.10.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158895" version="1" comment="libevview3-3 is &lt;3.10.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159345" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159346" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159347" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159348" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159349" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159350" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159351" version="1" comment="kgraft-patch-3_12_61-52_77-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159352" version="1" comment="kgraft-patch-3_12_61-52_77-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159353" version="1" comment="kgraft-patch-SLE12_Update_22 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159368" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159369" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159370" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159371" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;5-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159372" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;5-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159373" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;5-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159374" version="1" comment="kgraft-patch-3_12_61-52_69-default is &lt;3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159375" version="1" comment="kgraft-patch-3_12_61-52_69-xen is &lt;3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159376" version="1" comment="kgraft-patch-SLE12_Update_20 is &lt;3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159377" version="1" comment="kgraft-patch-3_12_61-52_72-default is &lt;2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159378" version="1" comment="kgraft-patch-3_12_61-52_72-xen is &lt;2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159379" version="1" comment="kgraft-patch-SLE12_Update_21 is &lt;2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161380" version="1" comment="libmysqlclient-devel is &lt;10.0.31-20.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161381" version="1" comment="libmysqlclient18 is &lt;10.0.31-20.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161382" version="1" comment="libmysqlclient18-32bit is &lt;10.0.31-20.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161383" version="1" comment="libmysqlclient_r18 is &lt;10.0.31-20.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161384" version="1" comment="libmysqld-devel is &lt;10.0.31-20.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161385" version="1" comment="libmysqld18 is &lt;10.0.31-20.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161386" version="1" comment="mariadb is &lt;10.0.31-20.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161387" version="1" comment="mariadb-client is &lt;10.0.31-20.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161388" version="1" comment="mariadb-errormessages is &lt;10.0.31-20.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161389" version="1" comment="mariadb-tools is &lt;10.0.31-20.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147440" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147441" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147442" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147443" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147444" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147445" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161527" version="1" comment="kernel-default is &lt;3.12.61-52.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161528" version="1" comment="kernel-default-base is &lt;3.12.61-52.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161529" version="1" comment="kernel-default-devel is &lt;3.12.61-52.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161530" version="1" comment="kernel-devel is &lt;3.12.61-52.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161531" version="1" comment="kernel-macros is &lt;3.12.61-52.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161532" version="1" comment="kernel-source is &lt;3.12.61-52.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161533" version="1" comment="kernel-syms is &lt;3.12.61-52.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161534" version="1" comment="kernel-xen is &lt;3.12.61-52.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161535" version="1" comment="kernel-xen-base is &lt;3.12.61-52.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161536" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161537" version="1" comment="kgraft-patch-3_12_61-52_83-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161538" version="1" comment="kgraft-patch-3_12_61-52_83-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161539" version="1" comment="kgraft-patch-SLE12_Update_24 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147446" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147447" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147448" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147449" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147450" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147451" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161574" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161575" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161576" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161577" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161578" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161579" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161580" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161581" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161582" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147452" version="1" comment="kgraft-patch-3_12_55-52_42-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147453" version="1" comment="kgraft-patch-3_12_55-52_42-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147454" version="1" comment="kgraft-patch-SLE12_Update_12 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161583" version="1" comment="kgraft-patch-3_12_61-52_80-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161584" version="1" comment="kgraft-patch-3_12_61-52_80-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161585" version="1" comment="kgraft-patch-SLE12_Update_23 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161586" version="1" comment="kgraft-patch-3_12_61-52_77-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161587" version="1" comment="kgraft-patch-3_12_61-52_77-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161588" version="1" comment="kgraft-patch-SLE12_Update_22 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161589" version="1" comment="kgraft-patch-3_12_61-52_72-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161590" version="1" comment="kgraft-patch-3_12_61-52_72-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161591" version="1" comment="kgraft-patch-SLE12_Update_21 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161592" version="1" comment="kgraft-patch-3_12_61-52_69-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161593" version="1" comment="kgraft-patch-3_12_61-52_69-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161594" version="1" comment="kgraft-patch-SLE12_Update_20 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161595" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161596" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161597" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147455" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147456" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147457" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161776" version="1" comment="libsoup is &lt;2.44.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161777" version="1" comment="libsoup-2_4-1 is &lt;2.44.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161778" version="1" comment="libsoup-2_4-1-32bit is &lt;2.44.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161779" version="1" comment="libsoup-lang is &lt;2.44.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161780" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.44.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161805" version="1" comment="kernel-default is &lt;3.12.61-52.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161806" version="1" comment="kernel-default-base is &lt;3.12.61-52.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161807" version="1" comment="kernel-default-devel is &lt;3.12.61-52.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161808" version="1" comment="kernel-devel is &lt;3.12.61-52.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161809" version="1" comment="kernel-macros is &lt;3.12.61-52.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161810" version="1" comment="kernel-source is &lt;3.12.61-52.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161811" version="1" comment="kernel-syms is &lt;3.12.61-52.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161812" version="1" comment="kernel-xen is &lt;3.12.61-52.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161813" version="1" comment="kernel-xen-base is &lt;3.12.61-52.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161814" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161815" version="1" comment="kgraft-patch-3_12_61-52_86-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161816" version="1" comment="kgraft-patch-3_12_61-52_86-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161817" version="1" comment="kgraft-patch-SLE12_Update_25 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162268" version="1" comment="postgresql93 is &lt;9.3.18-25.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162269" version="1" comment="postgresql93-contrib is &lt;9.3.18-25.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162270" version="1" comment="postgresql93-docs is &lt;9.3.18-25.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162271" version="1" comment="postgresql93-server is &lt;9.3.18-25.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162446" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.10-38.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162447" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.10-38.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162448" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.10-38.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162449" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.10-38.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162450" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.10-38.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147635" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147636" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147637" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147638" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147639" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147640" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164538" version="1" comment="xen is &lt;4.4.4_22-22.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164539" version="1" comment="xen-doc-html is &lt;4.4.4_22-22.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164540" version="1" comment="xen-kmp-default is &lt;4.4.4_22_k3.12.61_52.89-22.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164541" version="1" comment="xen-libs is &lt;4.4.4_22-22.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164542" version="1" comment="xen-libs-32bit is &lt;4.4.4_22-22.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164543" version="1" comment="xen-tools is &lt;4.4.4_22-22.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164544" version="1" comment="xen-tools-domU is &lt;4.4.4_22-22.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147844" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147845" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147846" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166460" version="1" comment="libmysqlclient-devel is &lt;10.0.32-20.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166461" version="1" comment="libmysqlclient18 is &lt;10.0.32-20.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166462" version="1" comment="libmysqlclient18-32bit is &lt;10.0.32-20.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166463" version="1" comment="libmysqlclient_r18 is &lt;10.0.32-20.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166464" version="1" comment="libmysqld-devel is &lt;10.0.32-20.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166465" version="1" comment="libmysqld18 is &lt;10.0.32-20.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166466" version="1" comment="mariadb is &lt;10.0.32-20.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166467" version="1" comment="mariadb-client is &lt;10.0.32-20.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166468" version="1" comment="mariadb-errormessages is &lt;10.0.32-20.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166469" version="1" comment="mariadb-tools is &lt;10.0.32-20.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148157" version="1" comment="libspice-server1 is &lt;0.12.4-8.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148158" version="1" comment="spice is &lt;0.12.4-8.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148205" version="1" comment="libmysqlclient-devel is &lt;10.0.29-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148206" version="1" comment="libmysqlclient18 is &lt;10.0.29-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148207" version="1" comment="libmysqlclient18-32bit is &lt;10.0.29-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148208" version="1" comment="libmysqlclient_r18 is &lt;10.0.29-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148209" version="1" comment="libmysqld-devel is &lt;10.0.29-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148210" version="1" comment="libmysqld18 is &lt;10.0.29-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148211" version="1" comment="mariadb is &lt;10.0.29-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148212" version="1" comment="mariadb-client is &lt;10.0.29-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148213" version="1" comment="mariadb-errormessages is &lt;10.0.29-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148214" version="1" comment="mariadb-tools is &lt;10.0.29-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148444" version="1" comment="kernel-default is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148445" version="1" comment="kernel-default-base is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148446" version="1" comment="kernel-default-devel is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148447" version="1" comment="kernel-devel is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148448" version="1" comment="kernel-macros is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148449" version="1" comment="kernel-source is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148450" version="1" comment="kernel-syms is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148451" version="1" comment="kernel-xen is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148452" version="1" comment="kernel-xen-base is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148453" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148454" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148455" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148456" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148908" version="1" comment="libblkid1 is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148909" version="1" comment="libblkid1-32bit is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148910" version="1" comment="libmount1 is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148911" version="1" comment="libmount1-32bit is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148912" version="1" comment="libsmartcols1 is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148913" version="1" comment="libuuid1 is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148914" version="1" comment="libuuid1-32bit is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148915" version="1" comment="python-libmount is &lt;2.25-24.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148916" version="1" comment="util-linux is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148917" version="1" comment="util-linux-lang is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148918" version="1" comment="util-linux-systemd is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148919" version="1" comment="uuidd is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149024" version="1" comment="xen is &lt;4.4.4_14-22.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149025" version="1" comment="xen-doc-html is &lt;4.4.4_14-22.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149026" version="1" comment="xen-kmp-default is &lt;4.4.4_14_k3.12.61_52.66-22.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149027" version="1" comment="xen-libs is &lt;4.4.4_14-22.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149028" version="1" comment="xen-libs-32bit is &lt;4.4.4_14-22.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149029" version="1" comment="xen-tools is &lt;4.4.4_14-22.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149030" version="1" comment="xen-tools-domU is &lt;4.4.4_14-22.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149105" version="1" comment="bind is &lt;9.9.9P1-28.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149106" version="1" comment="bind-chrootenv is &lt;9.9.9P1-28.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149107" version="1" comment="bind-doc is &lt;9.9.9P1-28.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149108" version="1" comment="bind-libs is &lt;9.9.9P1-28.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149109" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-28.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149110" version="1" comment="bind-utils is &lt;9.9.9P1-28.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149138" version="1" comment="openssh-fips is &lt;6.6p1-54.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149447" version="1" comment="qemu is &lt;2.0.2-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149448" version="1" comment="qemu-block-curl is &lt;2.0.2-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149449" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149450" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149451" version="1" comment="qemu-ipxe is &lt;1.0.0-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149452" version="1" comment="qemu-kvm is &lt;2.0.2-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149453" version="1" comment="qemu-lang is &lt;2.0.2-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149454" version="1" comment="qemu-seabios is &lt;1.7.4-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149455" version="1" comment="qemu-sgabios is &lt;8-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149456" version="1" comment="qemu-tools is &lt;2.0.2-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149457" version="1" comment="qemu-vgabios is &lt;1.7.4-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149458" version="1" comment="qemu-x86 is &lt;2.0.2-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149629" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.1-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149630" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.1-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149631" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.1-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149632" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.1-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149633" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.1-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149634" version="1" comment="lighttpd-mod_cml is &lt;1.4.35-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149635" version="1" comment="lighttpd-mod_magnet is &lt;1.4.35-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149636" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.35-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149637" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.35-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149638" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.35-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149639" version="1" comment="lighttpd-mod_webdav is &lt;1.4.35-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149775" version="1" comment="kgraft-patch-3_12_55-52_42-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149776" version="1" comment="kgraft-patch-3_12_55-52_42-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149777" version="1" comment="kgraft-patch-SLE12_Update_12 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149778" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149779" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149780" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149781" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149782" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149783" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149784" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149785" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149786" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149787" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149788" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149789" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149790" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149791" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149792" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149793" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149794" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149795" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149796" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149797" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149798" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150129" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150130" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150131" version="1" comment="libdcerpc0 is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150132" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150133" version="1" comment="libgensec0 is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150134" version="1" comment="libgensec0-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150135" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150136" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150137" version="1" comment="libndr-nbt0 is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150138" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150139" version="1" comment="libndr-standard0 is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150140" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150141" version="1" comment="libndr0 is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150142" version="1" comment="libndr0-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150143" version="1" comment="libnetapi0 is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150144" version="1" comment="libnetapi0-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150145" version="1" comment="libregistry0 is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150146" version="1" comment="libsamba-credentials0 is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150147" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150148" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150149" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150150" version="1" comment="libsamba-passdb0 is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150151" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150152" version="1" comment="libsamba-util0 is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150153" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150154" version="1" comment="libsamdb0 is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150155" version="1" comment="libsamdb0-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150156" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150157" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150158" version="1" comment="libsmbclient0 is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150159" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150160" version="1" comment="libsmbconf0 is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150161" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150162" version="1" comment="libsmbldap0 is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150163" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150164" version="1" comment="libtevent-util0 is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150165" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150166" version="1" comment="libwbclient0 is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150167" version="1" comment="libwbclient0-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150168" version="1" comment="samba-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150169" version="1" comment="samba-client is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150170" version="1" comment="samba-client-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150171" version="1" comment="samba-doc is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150172" version="1" comment="samba-libs is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150173" version="1" comment="samba-libs-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150174" version="1" comment="samba-winbind is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150175" version="1" comment="samba-winbind-32bit is &lt;4.2.4-18.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150176" version="1" comment="kernel-default is &lt;3.12.61-52.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150177" version="1" comment="kernel-default-base is &lt;3.12.61-52.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150178" version="1" comment="kernel-default-devel is &lt;3.12.61-52.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150179" version="1" comment="kernel-devel is &lt;3.12.61-52.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150180" version="1" comment="kernel-macros is &lt;3.12.61-52.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150181" version="1" comment="kernel-source is &lt;3.12.61-52.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150182" version="1" comment="kernel-syms is &lt;3.12.61-52.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150183" version="1" comment="kernel-xen is &lt;3.12.61-52.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150184" version="1" comment="kernel-xen-base is &lt;3.12.61-52.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150185" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150186" version="1" comment="kgraft-patch-3_12_61-52_69-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150187" version="1" comment="kgraft-patch-3_12_61-52_69-xen is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150188" version="1" comment="kgraft-patch-SLE12_Update_20 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150189" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150190" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150191" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150192" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150193" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150194" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150195" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150196" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150197" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150198" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150199" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150200" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150201" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150202" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150203" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150204" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150205" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150206" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150207" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150208" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150209" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146884" version="1" comment="bind is &lt;9.9.9P1-28.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146885" version="1" comment="bind-chrootenv is &lt;9.9.9P1-28.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146886" version="1" comment="bind-doc is &lt;9.9.9P1-28.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146887" version="1" comment="bind-libs is &lt;9.9.9P1-28.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146888" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-28.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146889" version="1" comment="bind-utils is &lt;9.9.9P1-28.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154301" version="1" comment="bind is &lt;9.9.9P1-28.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154302" version="1" comment="bind-chrootenv is &lt;9.9.9P1-28.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154303" version="1" comment="bind-devel is &lt;9.9.9P1-28.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154304" version="1" comment="bind-doc is &lt;9.9.9P1-28.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154305" version="1" comment="bind-libs is &lt;9.9.9P1-28.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154306" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-28.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154307" version="1" comment="bind-utils is &lt;9.9.9P1-28.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154439" version="1" comment="ntp is &lt;4.2.8p10-46.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154440" version="1" comment="ntp-doc is &lt;4.2.8p10-46.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154610" version="1" comment="xen is &lt;4.4.4_16-22.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154611" version="1" comment="xen-doc-html is &lt;4.4.4_16-22.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154612" version="1" comment="xen-kmp-default is &lt;4.4.4_16_k3.12.61_52.69-22.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154613" version="1" comment="xen-libs is &lt;4.4.4_16-22.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154614" version="1" comment="xen-libs-32bit is &lt;4.4.4_16-22.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154615" version="1" comment="xen-tools is &lt;4.4.4_16-22.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154616" version="1" comment="xen-tools-domU is &lt;4.4.4_16-22.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154929" version="1" comment="xen is &lt;4.4.4_18-22.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154930" version="1" comment="xen-doc-html is &lt;4.4.4_18-22.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154931" version="1" comment="xen-kmp-default is &lt;4.4.4_18_k3.12.61_52.69-22.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154932" version="1" comment="xen-libs is &lt;4.4.4_18-22.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154933" version="1" comment="xen-libs-32bit is &lt;4.4.4_18-22.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154934" version="1" comment="xen-tools is &lt;4.4.4_18-22.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154935" version="1" comment="xen-tools-domU is &lt;4.4.4_18-22.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155341" version="1" comment="MozillaFirefox-devel is &lt;45.9.0esr-105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155346" version="1" comment="kernel-default is &lt;3.12.61-52.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155347" version="1" comment="kernel-default-base is &lt;3.12.61-52.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155348" version="1" comment="kernel-default-devel is &lt;3.12.61-52.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155349" version="1" comment="kernel-devel is &lt;3.12.61-52.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155350" version="1" comment="kernel-macros is &lt;3.12.61-52.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155351" version="1" comment="kernel-source is &lt;3.12.61-52.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155352" version="1" comment="kernel-syms is &lt;3.12.61-52.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155353" version="1" comment="kernel-xen is &lt;3.12.61-52.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155354" version="1" comment="kernel-xen-base is &lt;3.12.61-52.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155355" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155356" version="1" comment="kgraft-patch-3_12_61-52_72-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155357" version="1" comment="kgraft-patch-3_12_61-52_72-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155358" version="1" comment="kgraft-patch-SLE12_Update_21 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155400" version="1" comment="kgraft-patch-3_12_61-52_69-default is &lt;2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155401" version="1" comment="kgraft-patch-3_12_61-52_69-xen is &lt;2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155402" version="1" comment="kgraft-patch-SLE12_Update_20 is &lt;2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155403" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155404" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155405" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155406" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155407" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155408" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155409" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155410" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155411" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155412" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155413" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155414" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155415" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155416" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155417" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155418" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155419" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155420" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155421" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155422" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155423" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155559" version="1" comment="libmysqlclient-devel is &lt;10.0.30-20.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155560" version="1" comment="libmysqlclient18 is &lt;10.0.30-20.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155561" version="1" comment="libmysqlclient18-32bit is &lt;10.0.30-20.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155562" version="1" comment="libmysqlclient_r18 is &lt;10.0.30-20.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155563" version="1" comment="libmysqld-devel is &lt;10.0.30-20.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155564" version="1" comment="libmysqld18 is &lt;10.0.30-20.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155565" version="1" comment="mariadb is &lt;10.0.30-20.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155566" version="1" comment="mariadb-client is &lt;10.0.30-20.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155567" version="1" comment="mariadb-errormessages is &lt;10.0.30-20.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155568" version="1" comment="mariadb-tools is &lt;10.0.30-20.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155850" version="1" comment="ctdb is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155851" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155852" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155853" version="1" comment="libdcerpc0 is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155854" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155855" version="1" comment="libgensec0 is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155856" version="1" comment="libgensec0-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155857" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155858" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155859" version="1" comment="libndr-nbt0 is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155860" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155861" version="1" comment="libndr-standard0 is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155862" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155863" version="1" comment="libndr0 is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155864" version="1" comment="libndr0-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155865" version="1" comment="libnetapi0 is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155866" version="1" comment="libnetapi0-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155867" version="1" comment="libregistry0 is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155868" version="1" comment="libsamba-credentials0 is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155869" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155870" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155871" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155872" version="1" comment="libsamba-passdb0 is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155873" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155874" version="1" comment="libsamba-util0 is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155875" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155876" version="1" comment="libsamdb0 is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155877" version="1" comment="libsamdb0-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155878" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155879" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155880" version="1" comment="libsmbclient0 is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155881" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155882" version="1" comment="libsmbconf0 is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155883" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155884" version="1" comment="libsmbldap0 is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155885" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155886" version="1" comment="libtevent-util0 is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155887" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155888" version="1" comment="libwbclient0 is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155889" version="1" comment="libwbclient0-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155890" version="1" comment="samba is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155891" version="1" comment="samba-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155892" version="1" comment="samba-client is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155893" version="1" comment="samba-client-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155894" version="1" comment="samba-doc is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155895" version="1" comment="samba-libs is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155896" version="1" comment="samba-libs-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155897" version="1" comment="samba-winbind is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155898" version="1" comment="samba-winbind-32bit is &lt;4.2.4-18.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156246" version="1" comment="postgresql93 is &lt;9.3.17-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156247" version="1" comment="postgresql93-contrib is &lt;9.3.17-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156248" version="1" comment="postgresql93-docs is &lt;9.3.17-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156249" version="1" comment="postgresql93-server is &lt;9.3.17-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156855" version="1" comment="libxml2 is &lt;2.9.1-26.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156856" version="1" comment="libxml2-2 is &lt;2.9.1-26.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156857" version="1" comment="libxml2-2-32bit is &lt;2.9.1-26.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156858" version="1" comment="libxml2-doc is &lt;2.9.1-26.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156859" version="1" comment="libxml2-tools is &lt;2.9.1-26.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156860" version="1" comment="python-libxml2 is &lt;2.9.1-26.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156990" version="1" comment="glibc is &lt;2.19-22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156991" version="1" comment="glibc-32bit is &lt;2.19-22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156992" version="1" comment="glibc-devel is &lt;2.19-22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156993" version="1" comment="glibc-devel-32bit is &lt;2.19-22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156994" version="1" comment="glibc-html is &lt;2.19-22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156995" version="1" comment="glibc-i18ndata is &lt;2.19-22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156996" version="1" comment="glibc-info is &lt;2.19-22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156997" version="1" comment="glibc-locale is &lt;2.19-22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156998" version="1" comment="glibc-locale-32bit is &lt;2.19-22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156999" version="1" comment="glibc-profile is &lt;2.19-22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157000" version="1" comment="glibc-profile-32bit is &lt;2.19-22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157001" version="1" comment="nscd is &lt;2.19-22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157002" version="1" comment="kernel-default is &lt;3.12.61-52.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157003" version="1" comment="kernel-default-base is &lt;3.12.61-52.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157004" version="1" comment="kernel-default-devel is &lt;3.12.61-52.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157005" version="1" comment="kernel-devel is &lt;3.12.61-52.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157006" version="1" comment="kernel-macros is &lt;3.12.61-52.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157007" version="1" comment="kernel-source is &lt;3.12.61-52.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157008" version="1" comment="kernel-syms is &lt;3.12.61-52.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157009" version="1" comment="kernel-xen is &lt;3.12.61-52.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157010" version="1" comment="kernel-xen-base is &lt;3.12.61-52.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157011" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157012" version="1" comment="kgraft-patch-3_12_61-52_77-default is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157013" version="1" comment="kgraft-patch-3_12_61-52_77-xen is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157014" version="1" comment="kgraft-patch-SLE12_Update_22 is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124408" version="1" comment="SUSE_SLES_SAP-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157408" version="1" comment="kernel-default is &lt;3.12.74-60.64.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157409" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157410" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157411" version="1" comment="kernel-devel is &lt;3.12.74-60.64.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157412" version="1" comment="kernel-macros is &lt;3.12.74-60.64.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157413" version="1" comment="kernel-source is &lt;3.12.74-60.64.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157414" version="1" comment="kernel-syms is &lt;3.12.74-60.64.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157415" version="1" comment="kernel-xen is &lt;3.12.74-60.64.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157416" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157417" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157418" version="1" comment="kgraft-patch-3_12_74-60_64_48-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157419" version="1" comment="kgraft-patch-3_12_74-60_64_48-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157420" version="1" comment="kgraft-patch-SLE12-SP1_Update_17 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158365" version="1" comment="xen is &lt;4.5.5_12-22.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158366" version="1" comment="xen-doc-html is &lt;4.5.5_12-22.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158367" version="1" comment="xen-kmp-default is &lt;4.5.5_12_k3.12.74_60.64.45-22.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158368" version="1" comment="xen-libs is &lt;4.5.5_12-22.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158369" version="1" comment="xen-libs-32bit is &lt;4.5.5_12-22.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158370" version="1" comment="xen-tools is &lt;4.5.5_12-22.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158371" version="1" comment="xen-tools-domU is &lt;4.5.5_12-22.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158435" version="1" comment="libspice-server1 is &lt;0.12.5-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158436" version="1" comment="spice is &lt;0.12.5-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158805" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-53.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158806" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-53.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159354" version="1" comment="kgraft-patch-3_12_74-60_64_45-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159355" version="1" comment="kgraft-patch-3_12_74-60_64_45-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159356" version="1" comment="kgraft-patch-SLE12-SP1_Update_16 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159357" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159358" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159359" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159360" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159361" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159362" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159380" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;5-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159381" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;5-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159382" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;5-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159383" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159384" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159385" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159386" version="1" comment="kgraft-patch-3_12_74-60_64_40-default is &lt;2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159387" version="1" comment="kgraft-patch-3_12_74-60_64_40-xen is &lt;2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159388" version="1" comment="kgraft-patch-SLE12-SP1_Update_15 is &lt;2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159389" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &lt;3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159390" version="1" comment="kgraft-patch-3_12_69-60_64_35-xen is &lt;3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159391" version="1" comment="kgraft-patch-SLE12-SP1_Update_14 is &lt;3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159392" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159393" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159394" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159395" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159396" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159397" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161390" version="1" comment="libmysqlclient-devel is &lt;10.0.31-29.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161391" version="1" comment="libmysqld-devel is &lt;10.0.31-29.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161392" version="1" comment="libmysqld18 is &lt;10.0.31-29.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161432" version="1" comment="kernel-default is &lt;3.12.74-60.64.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161433" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161434" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161435" version="1" comment="kernel-devel is &lt;3.12.74-60.64.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161436" version="1" comment="kernel-macros is &lt;3.12.74-60.64.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161437" version="1" comment="kernel-source is &lt;3.12.74-60.64.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161438" version="1" comment="kernel-syms is &lt;3.12.74-60.64.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161439" version="1" comment="kernel-xen is &lt;3.12.74-60.64.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161440" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161441" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161442" version="1" comment="kgraft-patch-3_12_74-60_64_51-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161443" version="1" comment="kgraft-patch-3_12_74-60_64_51-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161444" version="1" comment="kgraft-patch-SLE12-SP1_Update_18 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161445" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161446" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161447" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161540" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161541" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161542" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161543" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161544" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161545" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161546" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161547" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161548" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161549" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161550" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161551" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161598" version="1" comment="kgraft-patch-3_12_74-60_64_48-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161599" version="1" comment="kgraft-patch-3_12_74-60_64_48-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161600" version="1" comment="kgraft-patch-SLE12-SP1_Update_17 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161601" version="1" comment="kgraft-patch-3_12_74-60_64_40-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161602" version="1" comment="kgraft-patch-3_12_74-60_64_40-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161603" version="1" comment="kgraft-patch-SLE12-SP1_Update_15 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161604" version="1" comment="kgraft-patch-3_12_74-60_64_45-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161605" version="1" comment="kgraft-patch-3_12_74-60_64_45-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161606" version="1" comment="kgraft-patch-SLE12-SP1_Update_16 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161607" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161608" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161609" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161610" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161611" version="1" comment="kgraft-patch-3_12_69-60_64_35-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161612" version="1" comment="kgraft-patch-SLE12-SP1_Update_14 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161613" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161614" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161615" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161818" version="1" comment="kernel-default is &lt;3.12.74-60.64.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161819" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161820" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161821" version="1" comment="kernel-devel is &lt;3.12.74-60.64.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161822" version="1" comment="kernel-macros is &lt;3.12.74-60.64.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161823" version="1" comment="kernel-source is &lt;3.12.74-60.64.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161824" version="1" comment="kernel-syms is &lt;3.12.74-60.64.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161825" version="1" comment="kernel-xen is &lt;3.12.74-60.64.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161826" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161827" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161828" version="1" comment="kgraft-patch-3_12_74-60_64_54-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161829" version="1" comment="kgraft-patch-3_12_74-60_64_54-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161830" version="1" comment="kgraft-patch-SLE12-SP1_Update_19 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162335" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr4.10-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162336" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr4.10-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162337" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr4.10-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162338" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr4.10-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162899" version="1" comment="xen is &lt;4.5.5_14-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162900" version="1" comment="xen-doc-html is &lt;4.5.5_14-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162901" version="1" comment="xen-kmp-default is &lt;4.5.5_14_k3.12.74_60.64.54-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162902" version="1" comment="xen-libs is &lt;4.5.5_14-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162903" version="1" comment="xen-libs-32bit is &lt;4.5.5_14-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162904" version="1" comment="xen-tools is &lt;4.5.5_14-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162905" version="1" comment="xen-tools-domU is &lt;4.5.5_14-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163580" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;9-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163581" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;9-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163582" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;9-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163583" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163584" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163585" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163586" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163587" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163588" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163589" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163590" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163591" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163592" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163593" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163594" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163595" version="1" comment="kgraft-patch-3_12_74-60_64_40-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163596" version="1" comment="kgraft-patch-3_12_74-60_64_40-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163597" version="1" comment="kgraft-patch-SLE12-SP1_Update_15 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163598" version="1" comment="kgraft-patch-3_12_74-60_64_45-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163599" version="1" comment="kgraft-patch-3_12_74-60_64_45-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163600" version="1" comment="kgraft-patch-SLE12-SP1_Update_16 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163601" version="1" comment="kgraft-patch-3_12_74-60_64_48-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163602" version="1" comment="kgraft-patch-3_12_74-60_64_48-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163603" version="1" comment="kgraft-patch-SLE12-SP1_Update_17 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163611" version="1" comment="apache2 is &lt;2.4.16-20.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163612" version="1" comment="apache2-doc is &lt;2.4.16-20.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163613" version="1" comment="apache2-example-pages is &lt;2.4.16-20.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163614" version="1" comment="apache2-prefork is &lt;2.4.16-20.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163615" version="1" comment="apache2-utils is &lt;2.4.16-20.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163616" version="1" comment="apache2-worker is &lt;2.4.16-20.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163617" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163618" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163619" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163620" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163621" version="1" comment="kgraft-patch-3_12_69-60_64_35-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163622" version="1" comment="kgraft-patch-SLE12-SP1_Update_14 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163623" version="1" comment="kgraft-patch-3_12_74-60_64_51-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163624" version="1" comment="kgraft-patch-3_12_74-60_64_51-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163625" version="1" comment="kgraft-patch-SLE12-SP1_Update_18 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163626" version="1" comment="kgraft-patch-3_12_74-60_64_54-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163627" version="1" comment="kgraft-patch-3_12_74-60_64_54-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163628" version="1" comment="kgraft-patch-SLE12-SP1_Update_19 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163629" version="1" comment="kgraft-patch-3_12_74-60_64_57-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163630" version="1" comment="kgraft-patch-3_12_74-60_64_57-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163631" version="1" comment="kgraft-patch-SLE12-SP1_Update_20 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163723" version="1" comment="kernel-default is &lt;3.12.74-60.64.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163724" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163725" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163726" version="1" comment="kernel-devel is &lt;3.12.74-60.64.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163727" version="1" comment="kernel-macros is &lt;3.12.74-60.64.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163728" version="1" comment="kernel-source is &lt;3.12.74-60.64.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163729" version="1" comment="kernel-syms is &lt;3.12.74-60.64.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163730" version="1" comment="kernel-xen is &lt;3.12.74-60.64.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163731" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163732" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163733" version="1" comment="kgraft-patch-3_12_74-60_64_60-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163734" version="1" comment="kgraft-patch-3_12_74-60_64_60-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163735" version="1" comment="kgraft-patch-SLE12-SP1_Update_21 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163736" version="1" comment="xen is &lt;4.5.5_16-22.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163737" version="1" comment="xen-doc-html is &lt;4.5.5_16-22.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163738" version="1" comment="xen-kmp-default is &lt;4.5.5_16_k3.12.74_60.64.57-22.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163739" version="1" comment="xen-libs is &lt;4.5.5_16-22.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163740" version="1" comment="xen-libs-32bit is &lt;4.5.5_16-22.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163741" version="1" comment="xen-tools is &lt;4.5.5_16-22.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163742" version="1" comment="xen-tools-domU is &lt;4.5.5_16-22.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164455" version="1" comment="gcc48-locale is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164767" version="1" comment="MozillaFirefox-devel is &lt;52.3.0esr-109.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165181" version="1" comment="MozillaFirefox-devel is &lt;52.4.0esr-109.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165182" version="1" comment="libfreebl3-hmac-32bit is &lt;3.29.5-58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165183" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.29.5-58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165184" version="1" comment="mozilla-nss-devel is &lt;3.29.5-58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165483" version="1" comment="apache2 is &lt;2.4.16-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165484" version="1" comment="apache2-doc is &lt;2.4.16-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165485" version="1" comment="apache2-example-pages is &lt;2.4.16-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165486" version="1" comment="apache2-prefork is &lt;2.4.16-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165487" version="1" comment="apache2-utils is &lt;2.4.16-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165488" version="1" comment="apache2-worker is &lt;2.4.16-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165489" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165490" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165491" version="1" comment="libdcerpc0 is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165492" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165493" version="1" comment="libgensec0 is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165494" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165495" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165496" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165497" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165498" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165499" version="1" comment="libndr-standard0 is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165500" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165501" version="1" comment="libndr0 is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165502" version="1" comment="libndr0-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165503" version="1" comment="libnetapi0 is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165504" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165505" version="1" comment="libregistry0 is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165506" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165507" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165508" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165509" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165510" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165511" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165512" version="1" comment="libsamba-util0 is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165513" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165514" version="1" comment="libsamdb0 is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165515" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165516" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165517" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165518" version="1" comment="libsmbclient0 is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165519" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165520" version="1" comment="libsmbconf0 is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165521" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165522" version="1" comment="libsmbldap0 is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165523" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165524" version="1" comment="libtevent-util0 is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165525" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165526" version="1" comment="libwbclient0 is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165527" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165528" version="1" comment="samba is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165529" version="1" comment="samba-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165530" version="1" comment="samba-client is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165531" version="1" comment="samba-client-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165532" version="1" comment="samba-doc is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165533" version="1" comment="samba-libs is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165534" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165535" version="1" comment="samba-winbind is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165536" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165784" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;12-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165785" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;12-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165786" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;12-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165787" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165788" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165789" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165790" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;11-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165791" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;11-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165792" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;11-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165793" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165794" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165795" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165796" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165797" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165798" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165799" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165800" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165801" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165802" version="1" comment="kgraft-patch-3_12_74-60_64_45-default is &lt;5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165803" version="1" comment="kgraft-patch-3_12_74-60_64_45-xen is &lt;5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165804" version="1" comment="kgraft-patch-SLE12-SP1_Update_16 is &lt;5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165805" version="1" comment="kgraft-patch-3_12_74-60_64_40-default is &lt;5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165806" version="1" comment="kgraft-patch-3_12_74-60_64_40-xen is &lt;5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165807" version="1" comment="kgraft-patch-SLE12-SP1_Update_15 is &lt;5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165808" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &lt;6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165809" version="1" comment="kgraft-patch-3_12_69-60_64_35-xen is &lt;6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165810" version="1" comment="kgraft-patch-SLE12-SP1_Update_14 is &lt;6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165811" version="1" comment="kgraft-patch-3_12_74-60_64_60-default is &lt;2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165812" version="1" comment="kgraft-patch-3_12_74-60_64_60-xen is &lt;2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165813" version="1" comment="kgraft-patch-SLE12-SP1_Update_21 is &lt;2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165880" version="1" comment="kgraft-patch-3_12_74-60_64_51-default is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165881" version="1" comment="kgraft-patch-3_12_74-60_64_51-xen is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165882" version="1" comment="kgraft-patch-SLE12-SP1_Update_18 is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165883" version="1" comment="kgraft-patch-3_12_74-60_64_57-default is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165884" version="1" comment="kgraft-patch-3_12_74-60_64_57-xen is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165885" version="1" comment="kgraft-patch-SLE12-SP1_Update_20 is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165886" version="1" comment="kgraft-patch-3_12_74-60_64_48-default is &lt;4-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165887" version="1" comment="kgraft-patch-3_12_74-60_64_48-xen is &lt;4-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165888" version="1" comment="kgraft-patch-SLE12-SP1_Update_17 is &lt;4-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165889" version="1" comment="kgraft-patch-3_12_74-60_64_54-default is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165890" version="1" comment="kgraft-patch-3_12_74-60_64_54-xen is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165891" version="1" comment="kgraft-patch-SLE12-SP1_Update_19 is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166129" version="1" comment="xen is &lt;4.5.5_18-22.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166130" version="1" comment="xen-doc-html is &lt;4.5.5_18-22.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166131" version="1" comment="xen-kmp-default is &lt;4.5.5_18_k3.12.74_60.64.60-22.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166132" version="1" comment="xen-libs is &lt;4.5.5_18-22.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166133" version="1" comment="xen-libs-32bit is &lt;4.5.5_18-22.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166134" version="1" comment="xen-tools is &lt;4.5.5_18-22.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166135" version="1" comment="xen-tools-domU is &lt;4.5.5_18-22.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166420" version="1" comment="kernel-default is &lt;3.12.74-60.64.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166421" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166422" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166423" version="1" comment="kernel-devel is &lt;3.12.74-60.64.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166424" version="1" comment="kernel-macros is &lt;3.12.74-60.64.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166425" version="1" comment="kernel-source is &lt;3.12.74-60.64.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166426" version="1" comment="kernel-syms is &lt;3.12.74-60.64.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166427" version="1" comment="kernel-xen is &lt;3.12.74-60.64.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166428" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166429" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166430" version="1" comment="kgraft-patch-3_12_74-60_64_63-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166431" version="1" comment="kgraft-patch-3_12_74-60_64_63-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166432" version="1" comment="kgraft-patch-SLE12-SP1_Update_22 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166679" version="1" comment="qemu is &lt;2.3.1-33.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166680" version="1" comment="qemu-block-curl is &lt;2.3.1-33.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166681" version="1" comment="qemu-block-rbd is &lt;2.3.1-33.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166682" version="1" comment="qemu-guest-agent is &lt;2.3.1-33.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166683" version="1" comment="qemu-ipxe is &lt;1.0.0-33.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166684" version="1" comment="qemu-kvm is &lt;2.3.1-33.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166685" version="1" comment="qemu-lang is &lt;2.3.1-33.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166686" version="1" comment="qemu-ppc is &lt;2.3.1-33.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166687" version="1" comment="qemu-seabios is &lt;1.8.1-33.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166688" version="1" comment="qemu-sgabios is &lt;8-33.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166689" version="1" comment="qemu-tools is &lt;2.3.1-33.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166690" version="1" comment="qemu-vgabios is &lt;1.8.1-33.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166691" version="1" comment="qemu-x86 is &lt;2.3.1-33.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166736" version="1" comment="ctdb is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166737" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166738" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166739" version="1" comment="libdcerpc0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166740" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166741" version="1" comment="libgensec0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166742" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166743" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166744" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166745" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166746" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166747" version="1" comment="libndr-standard0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166748" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166749" version="1" comment="libndr0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166750" version="1" comment="libndr0-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166751" version="1" comment="libnetapi0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166752" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166753" version="1" comment="libregistry0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166754" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166755" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166756" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166757" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166758" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166759" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166760" version="1" comment="libsamba-util0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166761" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166762" version="1" comment="libsamdb0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166763" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166764" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166765" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166766" version="1" comment="libsmbclient0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166767" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166768" version="1" comment="libsmbconf0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166769" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166770" version="1" comment="libsmbldap0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166771" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166772" version="1" comment="libtevent-util0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166773" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166774" version="1" comment="libwbclient0 is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166775" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166776" version="1" comment="samba-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166777" version="1" comment="samba-client is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166778" version="1" comment="samba-client-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166779" version="1" comment="samba-doc is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166780" version="1" comment="samba-libs is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166781" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166782" version="1" comment="samba-winbind is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166783" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166784" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-54.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166785" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-54.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166786" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-54.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166787" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-54.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166788" version="1" comment="openssl is &lt;1.0.1i-54.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166789" version="1" comment="openssl-doc is &lt;1.0.1i-54.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167090" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167091" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167092" version="1" comment="libdcerpc0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167093" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167094" version="1" comment="libgensec0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167095" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167096" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167097" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167098" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167099" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167100" version="1" comment="libndr-standard0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167101" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167102" version="1" comment="libndr0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167103" version="1" comment="libndr0-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167104" version="1" comment="libnetapi0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167105" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167106" version="1" comment="libregistry0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167107" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167108" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167109" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167110" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167111" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167112" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167113" version="1" comment="libsamba-util0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167114" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167115" version="1" comment="libsamdb0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167116" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167117" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167118" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167119" version="1" comment="libsmbclient0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167120" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167121" version="1" comment="libsmbconf0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167122" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167123" version="1" comment="libsmbldap0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167124" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167125" version="1" comment="libtevent-util0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167126" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167127" version="1" comment="libwbclient0 is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167128" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167129" version="1" comment="samba-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167130" version="1" comment="samba-client is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167131" version="1" comment="samba-client-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167132" version="1" comment="samba-doc is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167133" version="1" comment="samba-libs is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167134" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167135" version="1" comment="samba-winbind is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167136" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167323" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167324" version="1" comment="kgraft-patch-3_12_69-60_64_35-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167325" version="1" comment="kgraft-patch-SLE12-SP1_Update_14 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167326" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167327" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167328" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167329" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167330" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167331" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167332" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167333" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167336" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167338" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167339" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167340" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167372" version="1" comment="kgraft-patch-3_12_74-60_64_60-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167373" version="1" comment="kgraft-patch-3_12_74-60_64_60-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167374" version="1" comment="kgraft-patch-SLE12-SP1_Update_21 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167375" version="1" comment="kgraft-patch-3_12_74-60_64_57-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167376" version="1" comment="kgraft-patch-3_12_74-60_64_57-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167377" version="1" comment="kgraft-patch-SLE12-SP1_Update_20 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167378" version="1" comment="kgraft-patch-3_12_74-60_64_54-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167379" version="1" comment="kgraft-patch-3_12_74-60_64_54-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167380" version="1" comment="kgraft-patch-SLE12-SP1_Update_19 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167381" version="1" comment="kgraft-patch-3_12_74-60_64_51-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167382" version="1" comment="kgraft-patch-3_12_74-60_64_51-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167383" version="1" comment="kgraft-patch-SLE12-SP1_Update_18 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167384" version="1" comment="kgraft-patch-3_12_74-60_64_48-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167385" version="1" comment="kgraft-patch-3_12_74-60_64_48-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167386" version="1" comment="kgraft-patch-SLE12-SP1_Update_17 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167387" version="1" comment="kgraft-patch-3_12_74-60_64_45-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167388" version="1" comment="kgraft-patch-3_12_74-60_64_45-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167389" version="1" comment="kgraft-patch-SLE12-SP1_Update_16 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167390" version="1" comment="kgraft-patch-3_12_74-60_64_40-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167391" version="1" comment="kgraft-patch-3_12_74-60_64_40-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167392" version="1" comment="kgraft-patch-SLE12-SP1_Update_15 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167334" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167335" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167337" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167733" version="1" comment="kernel-default is &lt;3.12.74-60.64.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167734" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167735" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167736" version="1" comment="kernel-devel is &lt;3.12.74-60.64.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167737" version="1" comment="kernel-macros is &lt;3.12.74-60.64.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167738" version="1" comment="kernel-source is &lt;3.12.74-60.64.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167739" version="1" comment="kernel-syms is &lt;3.12.74-60.64.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167740" version="1" comment="kernel-xen is &lt;3.12.74-60.64.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167741" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167742" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167743" version="1" comment="kgraft-patch-3_12_74-60_64_66-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167744" version="1" comment="kgraft-patch-3_12_74-60_64_66-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167745" version="1" comment="kgraft-patch-SLE12-SP1_Update_23 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167785" version="1" comment="MozillaFirefox-devel is &lt;52.5.0esr-109.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167969" version="1" comment="xen is &lt;4.5.5_20-22.36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167970" version="1" comment="xen-doc-html is &lt;4.5.5_20-22.36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167971" version="1" comment="xen-kmp-default is &lt;4.5.5_20_k3.12.74_60.64.63-22.36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167972" version="1" comment="xen-libs is &lt;4.5.5_20-22.36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167973" version="1" comment="xen-libs-32bit is &lt;4.5.5_20-22.36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167974" version="1" comment="xen-tools is &lt;4.5.5_20-22.36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167975" version="1" comment="xen-tools-domU is &lt;4.5.5_20-22.36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168396" version="1" comment="tomcat is &lt;8.0.43-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168397" version="1" comment="tomcat-admin-webapps is &lt;8.0.43-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168398" version="1" comment="tomcat-docs-webapp is &lt;8.0.43-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168399" version="1" comment="tomcat-el-3_0-api is &lt;8.0.43-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168400" version="1" comment="tomcat-javadoc is &lt;8.0.43-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168401" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.43-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168402" version="1" comment="tomcat-lib is &lt;8.0.43-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168403" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.43-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168404" version="1" comment="tomcat-webapps is &lt;8.0.43-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168405" version="1" comment="kgraft-patch-3_12_74-60_64_54-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168406" version="1" comment="kgraft-patch-3_12_74-60_64_54-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168407" version="1" comment="kgraft-patch-SLE12-SP1_Update_19 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168408" version="1" comment="kgraft-patch-3_12_74-60_64_51-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168409" version="1" comment="kgraft-patch-3_12_74-60_64_51-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168410" version="1" comment="kgraft-patch-SLE12-SP1_Update_18 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168411" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168412" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168413" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168414" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168415" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168416" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168417" version="1" comment="kgraft-patch-3_12_74-60_64_60-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168418" version="1" comment="kgraft-patch-3_12_74-60_64_60-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168419" version="1" comment="kgraft-patch-SLE12-SP1_Update_21 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168420" version="1" comment="kgraft-patch-3_12_74-60_64_45-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168421" version="1" comment="kgraft-patch-3_12_74-60_64_45-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168422" version="1" comment="kgraft-patch-SLE12-SP1_Update_16 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168423" version="1" comment="kgraft-patch-3_12_74-60_64_57-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168424" version="1" comment="kgraft-patch-3_12_74-60_64_57-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168425" version="1" comment="kgraft-patch-SLE12-SP1_Update_20 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168426" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168427" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168428" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168429" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168430" version="1" comment="kgraft-patch-3_12_69-60_64_35-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168431" version="1" comment="kgraft-patch-SLE12-SP1_Update_14 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168605" version="1" comment="kgraft-patch-3_12_74-60_64_48-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168606" version="1" comment="kgraft-patch-3_12_74-60_64_48-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168607" version="1" comment="kgraft-patch-SLE12-SP1_Update_17 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168608" version="1" comment="kgraft-patch-3_12_74-60_64_63-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168609" version="1" comment="kgraft-patch-3_12_74-60_64_63-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168610" version="1" comment="kgraft-patch-SLE12-SP1_Update_22 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168611" version="1" comment="kgraft-patch-3_12_74-60_64_40-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168612" version="1" comment="kgraft-patch-3_12_74-60_64_40-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168613" version="1" comment="kgraft-patch-SLE12-SP1_Update_15 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168614" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168615" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168616" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168808" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.5-30.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168809" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.5-30.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168810" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.5-30.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168811" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.5-30.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168936" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.15-38.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168937" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.15-38.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168938" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.15-38.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168939" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.15-38.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168940" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.15-38.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157015" version="1" comment="glibc is &lt;2.19-40.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157016" version="1" comment="glibc-32bit is &lt;2.19-40.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157017" version="1" comment="glibc-devel is &lt;2.19-40.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157018" version="1" comment="glibc-devel-32bit is &lt;2.19-40.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157019" version="1" comment="glibc-html is &lt;2.19-40.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157020" version="1" comment="glibc-i18ndata is &lt;2.19-40.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157021" version="1" comment="glibc-info is &lt;2.19-40.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157022" version="1" comment="glibc-locale is &lt;2.19-40.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157023" version="1" comment="glibc-locale-32bit is &lt;2.19-40.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157024" version="1" comment="glibc-profile is &lt;2.19-40.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157025" version="1" comment="glibc-profile-32bit is &lt;2.19-40.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157026" version="1" comment="nscd is &lt;2.19-40.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157027" version="1" comment="kernel-default is &lt;3.12.74-60.64.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157028" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157029" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157030" version="1" comment="kernel-devel is &lt;3.12.74-60.64.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157031" version="1" comment="kernel-macros is &lt;3.12.74-60.64.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157032" version="1" comment="kernel-source is &lt;3.12.74-60.64.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157033" version="1" comment="kernel-syms is &lt;3.12.74-60.64.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157034" version="1" comment="kernel-xen is &lt;3.12.74-60.64.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157035" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157036" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157037" version="1" comment="kgraft-patch-3_12_74-60_64_45-default is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157038" version="1" comment="kgraft-patch-3_12_74-60_64_45-xen is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157039" version="1" comment="kgraft-patch-SLE12-SP1_Update_16 is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170245" version="1" comment="kgraft-patch-3_12_74-60_64_45-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170246" version="1" comment="kgraft-patch-3_12_74-60_64_45-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170247" version="1" comment="kgraft-patch-SLE12-SP1_Update_16 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170248" version="1" comment="kgraft-patch-3_12_74-60_64_40-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170249" version="1" comment="kgraft-patch-3_12_74-60_64_40-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170250" version="1" comment="kgraft-patch-SLE12-SP1_Update_15 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170251" version="1" comment="kgraft-patch-3_12_74-60_64_54-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170252" version="1" comment="kgraft-patch-3_12_74-60_64_54-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170253" version="1" comment="kgraft-patch-SLE12-SP1_Update_19 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170254" version="1" comment="kgraft-patch-3_12_74-60_64_48-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170255" version="1" comment="kgraft-patch-3_12_74-60_64_48-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170256" version="1" comment="kgraft-patch-SLE12-SP1_Update_17 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170592" version="1" comment="kgraft-patch-3_12_74-60_64_66-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170593" version="1" comment="kgraft-patch-3_12_74-60_64_66-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170594" version="1" comment="kgraft-patch-SLE12-SP1_Update_23 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170595" version="1" comment="kgraft-patch-3_12_74-60_64_63-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170596" version="1" comment="kgraft-patch-3_12_74-60_64_63-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170597" version="1" comment="kgraft-patch-SLE12-SP1_Update_22 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170598" version="1" comment="kgraft-patch-3_12_74-60_64_60-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170599" version="1" comment="kgraft-patch-3_12_74-60_64_60-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170600" version="1" comment="kgraft-patch-SLE12-SP1_Update_21 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170601" version="1" comment="kgraft-patch-3_12_74-60_64_57-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170602" version="1" comment="kgraft-patch-3_12_74-60_64_57-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170603" version="1" comment="kgraft-patch-SLE12-SP1_Update_20 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170604" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170605" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170606" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170607" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170608" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170609" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170610" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170611" version="1" comment="kgraft-patch-3_12_69-60_64_35-xen is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170612" version="1" comment="kgraft-patch-SLE12-SP1_Update_14 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170613" version="1" comment="kgraft-patch-3_12_74-60_64_51-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170614" version="1" comment="kgraft-patch-3_12_74-60_64_51-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170615" version="1" comment="kgraft-patch-SLE12-SP1_Update_18 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170616" version="1" comment="bind-devel is &lt;9.9.9P1-63.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169176" version="1" comment="kernel-default is &lt;3.12.74-60.64.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169177" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169178" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169179" version="1" comment="kernel-devel is &lt;3.12.74-60.64.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169180" version="1" comment="kernel-macros is &lt;3.12.74-60.64.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169181" version="1" comment="kernel-source is &lt;3.12.74-60.64.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169182" version="1" comment="kernel-syms is &lt;3.12.74-60.64.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169183" version="1" comment="kernel-xen is &lt;3.12.74-60.64.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169184" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169185" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169186" version="1" comment="kgraft-patch-3_12_74-60_64_69-default is &lt;1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169187" version="1" comment="kgraft-patch-3_12_74-60_64_69-xen is &lt;1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169188" version="1" comment="kgraft-patch-SLE12-SP1_Update_24 is &lt;1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170921" version="1" comment="MozillaFirefox-devel is &lt;52.6.0esr-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169312" version="1" comment="kernel-firmware is &lt;20160516git-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169313" version="1" comment="ucode-amd is &lt;20160516git-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171455" version="1" comment="quagga is &lt;0.99.22.1-16.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172265" version="1" comment="kernel-default is &lt;3.12.74-60.64.82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172266" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172267" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172268" version="1" comment="kernel-devel is &lt;3.12.74-60.64.82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172269" version="1" comment="kernel-macros is &lt;3.12.74-60.64.82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172270" version="1" comment="kernel-source is &lt;3.12.74-60.64.82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172271" version="1" comment="kernel-syms is &lt;3.12.74-60.64.82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172272" version="1" comment="kernel-xen is &lt;3.12.74-60.64.82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172273" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172274" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172275" version="1" comment="kgraft-patch-3_12_74-60_64_82-default is &lt;1-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172276" version="1" comment="kgraft-patch-3_12_74-60_64_82-xen is &lt;1-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172277" version="1" comment="kgraft-patch-SLE12-SP1_Update_25 is &lt;1-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169343" version="1" comment="qemu is &lt;2.3.1-33.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169344" version="1" comment="qemu-block-curl is &lt;2.3.1-33.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169345" version="1" comment="qemu-block-rbd is &lt;2.3.1-33.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169346" version="1" comment="qemu-guest-agent is &lt;2.3.1-33.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169347" version="1" comment="qemu-ipxe is &lt;1.0.0-33.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169348" version="1" comment="qemu-kvm is &lt;2.3.1-33.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169349" version="1" comment="qemu-lang is &lt;2.3.1-33.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169350" version="1" comment="qemu-ppc is &lt;2.3.1-33.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169351" version="1" comment="qemu-seabios is &lt;1.8.1-33.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169352" version="1" comment="qemu-sgabios is &lt;8-33.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169353" version="1" comment="qemu-tools is &lt;2.3.1-33.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169354" version="1" comment="qemu-vgabios is &lt;1.8.1-33.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169355" version="1" comment="qemu-x86 is &lt;2.3.1-33.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172689" version="1" comment="xen is &lt;4.5.5_24-22.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172690" version="1" comment="xen-doc-html is &lt;4.5.5_24-22.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172691" version="1" comment="xen-kmp-default is &lt;4.5.5_24_k3.12.74_60.64.82-22.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172692" version="1" comment="xen-libs is &lt;4.5.5_24-22.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172693" version="1" comment="xen-libs-32bit is &lt;4.5.5_24-22.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172694" version="1" comment="xen-tools is &lt;4.5.5_24-22.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172695" version="1" comment="xen-tools-domU is &lt;4.5.5_24-22.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172955" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.10-30.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172956" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.10-30.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172957" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.10-30.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172958" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.10-30.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173060" version="1" comment="libmysqlclient-devel is &lt;10.0.34-29.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173061" version="1" comment="libmysqld-devel is &lt;10.0.34-29.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173062" version="1" comment="libmysqld18 is &lt;10.0.34-29.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173306" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.20-38.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173307" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.20-38.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173308" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.20-38.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173309" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.20-38.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173310" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.20-38.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169519" version="1" comment="glibc is &lt;2.19-40.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169520" version="1" comment="glibc-32bit is &lt;2.19-40.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169521" version="1" comment="glibc-devel is &lt;2.19-40.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169522" version="1" comment="glibc-devel-32bit is &lt;2.19-40.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169523" version="1" comment="glibc-html is &lt;2.19-40.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169524" version="1" comment="glibc-i18ndata is &lt;2.19-40.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169525" version="1" comment="glibc-info is &lt;2.19-40.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169526" version="1" comment="glibc-locale is &lt;2.19-40.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169527" version="1" comment="glibc-locale-32bit is &lt;2.19-40.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169528" version="1" comment="glibc-profile is &lt;2.19-40.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169529" version="1" comment="glibc-profile-32bit is &lt;2.19-40.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169530" version="1" comment="nscd is &lt;2.19-40.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174003" version="1" comment="kernel-default is &lt;3.12.74-60.64.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174004" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174005" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174006" version="1" comment="kernel-devel is &lt;3.12.74-60.64.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174007" version="1" comment="kernel-macros is &lt;3.12.74-60.64.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174008" version="1" comment="kernel-source is &lt;3.12.74-60.64.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174009" version="1" comment="kernel-syms is &lt;3.12.74-60.64.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174010" version="1" comment="kernel-xen is &lt;3.12.74-60.64.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174011" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174012" version="1" comment="kernel-xen-devel is &lt;3.12.74-60.64.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174013" version="1" comment="kgraft-patch-3_12_74-60_64_85-default is &lt;1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174014" version="1" comment="kgraft-patch-3_12_74-60_64_85-xen is &lt;1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174015" version="1" comment="kgraft-patch-SLE12-SP1_Update_26 is &lt;1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174167" version="1" comment="apache2 is &lt;2.4.16-20.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174168" version="1" comment="apache2-doc is &lt;2.4.16-20.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174169" version="1" comment="apache2-example-pages is &lt;2.4.16-20.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174170" version="1" comment="apache2-prefork is &lt;2.4.16-20.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174171" version="1" comment="apache2-utils is &lt;2.4.16-20.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174172" version="1" comment="apache2-worker is &lt;2.4.16-20.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174265" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-54.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174266" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-54.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174267" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-54.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174268" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-54.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174269" version="1" comment="openssl is &lt;1.0.1i-54.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174270" version="1" comment="openssl-doc is &lt;1.0.1i-54.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174616" version="1" comment="kgraft-patch-3_12_74-60_64_54-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174617" version="1" comment="kgraft-patch-3_12_74-60_64_54-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174618" version="1" comment="kgraft-patch-SLE12-SP1_Update_19 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174619" version="1" comment="kgraft-patch-3_12_74-60_64_51-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174620" version="1" comment="kgraft-patch-3_12_74-60_64_51-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174621" version="1" comment="kgraft-patch-SLE12-SP1_Update_18 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174622" version="1" comment="kgraft-patch-3_12_74-60_64_40-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174623" version="1" comment="kgraft-patch-3_12_74-60_64_40-xen is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174624" version="1" comment="kgraft-patch-SLE12-SP1_Update_15 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174625" version="1" comment="kgraft-patch-3_12_74-60_64_48-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174626" version="1" comment="kgraft-patch-3_12_74-60_64_48-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174627" version="1" comment="kgraft-patch-SLE12-SP1_Update_17 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174628" version="1" comment="kgraft-patch-3_12_74-60_64_45-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174629" version="1" comment="kgraft-patch-3_12_74-60_64_45-xen is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174630" version="1" comment="kgraft-patch-SLE12-SP1_Update_16 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174631" version="1" comment="kgraft-patch-3_12_74-60_64_57-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174632" version="1" comment="kgraft-patch-3_12_74-60_64_57-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174633" version="1" comment="kgraft-patch-SLE12-SP1_Update_20 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174634" version="1" comment="kgraft-patch-3_12_74-60_64_60-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174635" version="1" comment="kgraft-patch-3_12_74-60_64_60-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174636" version="1" comment="kgraft-patch-SLE12-SP1_Update_21 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174637" version="1" comment="kgraft-patch-3_12_74-60_64_63-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174638" version="1" comment="kgraft-patch-3_12_74-60_64_63-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174639" version="1" comment="kgraft-patch-SLE12-SP1_Update_22 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174640" version="1" comment="kgraft-patch-3_12_74-60_64_66-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174641" version="1" comment="kgraft-patch-3_12_74-60_64_66-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174642" version="1" comment="kgraft-patch-SLE12-SP1_Update_23 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174643" version="1" comment="kgraft-patch-3_12_74-60_64_69-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174644" version="1" comment="kgraft-patch-3_12_74-60_64_69-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174645" version="1" comment="kgraft-patch-SLE12-SP1_Update_24 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174646" version="1" comment="kgraft-patch-3_12_74-60_64_82-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174647" version="1" comment="kgraft-patch-3_12_74-60_64_82-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174648" version="1" comment="kgraft-patch-SLE12-SP1_Update_25 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174649" version="1" comment="kgraft-patch-3_12_74-60_64_85-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174650" version="1" comment="kgraft-patch-3_12_74-60_64_85-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174651" version="1" comment="kgraft-patch-SLE12-SP1_Update_26 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158807" version="1" comment="cryptctl is &lt;1.2.6-5.3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149125" version="1" comment="SUSE_SLES_SAP-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174652" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;9-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174653" version="1" comment="kgraft-patch-SLE12-SP2_Update_9 is &lt;9-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174654" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;10-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174655" version="1" comment="kgraft-patch-SLE12-SP2_Update_7 is &lt;10-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174656" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174657" version="1" comment="kgraft-patch-SLE12-SP2_Update_18 is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174658" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174659" version="1" comment="kgraft-patch-SLE12-SP2_Update_12 is &lt;8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174660" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;9-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174661" version="1" comment="kgraft-patch-SLE12-SP2_Update_10 is &lt;9-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174662" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174663" version="1" comment="kgraft-patch-SLE12-SP2_Update_11 is &lt;8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174664" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;4-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174665" version="1" comment="kgraft-patch-SLE12-SP2_Update_17 is &lt;4-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174666" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;4-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174667" version="1" comment="kgraft-patch-SLE12-SP2_Update_16 is &lt;4-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174668" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174669" version="1" comment="kgraft-patch-SLE12-SP2_Update_19 is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174670" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174671" version="1" comment="kgraft-patch-SLE12-SP2_Update_14 is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174672" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174673" version="1" comment="kgraft-patch-SLE12-SP2_Update_15 is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174674" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;10-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174675" version="1" comment="kgraft-patch-SLE12-SP2_Update_8 is &lt;10-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174676" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;7-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174677" version="1" comment="kgraft-patch-SLE12-SP2_Update_13 is &lt;7-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102887" version="1" comment="libgnutls-devel is &lt;3.2.15-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102889" version="1" comment="libgnutls-openssl-devel is &lt;3.2.15-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102893" version="1" comment="libgnutlsxx-devel is &lt;3.2.15-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102894" version="1" comment="libgnutlsxx28 is &lt;3.2.15-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103548" version="1" comment="dbus-1 is &lt;1.8.12-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103549" version="1" comment="dbus-1-devel is &lt;1.8.12-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103546" version="1" comment="dbus-1-devel-doc is &lt;1.8.12-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103658" version="1" comment="libssh-devel is &lt;0.6.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103659" version="1" comment="libssh-devel-doc is &lt;0.6.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103562" version="1" comment="python-magic is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102162" version="1" comment="php5-devel is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102645" version="1" comment="MozillaFirefox-devel is &lt;31.3.0esr-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102659" version="1" comment="mozilla-nss-devel is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102663" version="1" comment="libopenssl-devel is &lt;1.0.1i-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102476" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr2.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102481" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr2.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102468" version="1" comment="file-devel is &lt;5.19-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102472" version="1" comment="python-magic is &lt;5.19-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118573" version="1" comment="xen-devel is &lt;4.4.3_06-22.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119523" version="1" comment="MozillaFirefox-devel is &lt;38.5.0esr-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119335" version="1" comment="bind-devel is &lt;9.9.6P1-28.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106880" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.15.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117477" version="1" comment="xfsprogs-devel is &lt;3.2.1-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106935" version="1" comment="MozillaFirefox-devel is &lt;31.5.0esr-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106954" version="1" comment="php5-devel is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107575" version="1" comment="freetype2-devel is &lt;2.5.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107606" version="1" comment="cups-devel is &lt;1.7.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107619" version="1" comment="postgresql93-devel is &lt;9.3.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107657" version="1" comment="osc is &lt;0.151.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107810" version="1" comment="glibc-devel-static is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107824" version="1" comment="kernel-docs is &lt;3.12.38-44.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107841" version="1" comment="kernel-obs-build is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107888" version="1" comment="libopenssl-devel is &lt;1.0.1i-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108132" version="1" comment="xen-devel is &lt;4.4.1_10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108204" version="1" comment="MozillaFirefox-devel is &lt;31.5.3esr-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108359" version="1" comment="wireshark-devel is &lt;1.10.13-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108360" version="1" comment="kernel-docs is &lt;3.12.39-47.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108377" version="1" comment="kernel-obs-build is &lt;3.12.39-47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108430" version="1" comment="libzip-devel is &lt;0.11.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108657" version="1" comment="xen-devel is &lt;4.4.2_02-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108666" version="1" comment="MozillaFirefox-devel is &lt;31.6.0esr-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108907" version="1" comment="libgnutls-devel is &lt;3.2.15-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108909" version="1" comment="libgnutls-openssl-devel is &lt;3.2.15-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108913" version="1" comment="libgnutlsxx-devel is &lt;3.2.15-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108914" version="1" comment="libgnutlsxx28 is &lt;3.2.15-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108922" version="1" comment="libmysqlclient-devel is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108927" version="1" comment="libmysqld-devel is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108928" version="1" comment="libmysqld18 is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109123" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109124" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109125" version="1" comment="subversion is &lt;1.8.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109126" version="1" comment="subversion-bash-completion is &lt;1.8.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109127" version="1" comment="subversion-devel is &lt;1.8.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109128" version="1" comment="subversion-perl is &lt;1.8.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109129" version="1" comment="subversion-python is &lt;1.8.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109131" version="1" comment="subversion-server is &lt;1.8.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109132" version="1" comment="subversion-tools is &lt;1.8.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109162" version="1" comment="gdm-devel is &lt;3.10.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105376" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.15.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109556" version="1" comment="php5-devel is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109614" version="1" comment="libspice-server-devel is &lt;0.12.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109716" version="1" comment="xen-devel is &lt;4.4.2_04-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105308" version="1" comment="kernel-docs is &lt;3.12.32-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105325" version="1" comment="kernel-obs-build is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109834" version="1" comment="fltk-devel is &lt;1.3.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109836" version="1" comment="fltk-devel-static is &lt;1.3.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109962" version="1" comment="MozillaFirefox-devel is &lt;31.7.0esr-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109983" version="1" comment="apache2 is &lt;2.4.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109984" version="1" comment="apache2-devel is &lt;2.4.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105450" version="1" comment="MozillaFirefox-devel is &lt;31.4.0esr-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105464" version="1" comment="mozilla-nss-devel is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110330" version="1" comment="xen-devel is &lt;4.4.2_06-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110328" version="1" comment="wireshark-devel is &lt;1.10.14-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110498" version="1" comment="kernel-docs is &lt;3.12.43-52.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110515" version="1" comment="kernel-obs-build is &lt;3.12.43-52.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110530" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110535" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110569" version="1" comment="openldap2-back-perl is &lt;2.4.39-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110563" version="1" comment="openldap2-devel is &lt;2.4.39-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110565" version="1" comment="openldap2-devel-static is &lt;2.4.39-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110631" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.15.2-28.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110696" version="1" comment="libopenssl-devel is &lt;1.0.1i-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105416" version="1" comment="libcurl-devel is &lt;7.37.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110849" version="1" comment="libgcrypt-devel is &lt;1.6.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111026" version="1" comment="bind-devel is &lt;9.9.6P1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111382" version="1" comment="php5-devel is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111448" version="1" comment="postgresql93-devel is &lt;9.3.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111474" version="1" comment="MozillaFirefox-devel is &lt;31.8.0esr-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111478" version="1" comment="mozilla-nspr-devel is &lt;4.10.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111492" version="1" comment="mozilla-nss-devel is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111458" version="1" comment="libmysqlclient-devel is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111463" version="1" comment="libmysqld-devel is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111464" version="1" comment="libmysqld18 is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111357" version="1" comment="krb5 is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111360" version="1" comment="krb5-devel is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111501" version="1" comment="xen-devel is &lt;4.4.2_08-22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111513" version="1" comment="bind-devel is &lt;9.9.6P1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111563" version="1" comment="kernel-docs is &lt;3.12.44-52.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111580" version="1" comment="kernel-obs-build is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105431" version="1" comment="bind-devel is &lt;9.9.5P1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105419" version="1" comment="git is &lt;1.8.5.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105420" version="1" comment="git-arch is &lt;1.8.5.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105421" version="1" comment="git-core is &lt;1.8.5.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105422" version="1" comment="git-cvs is &lt;1.8.5.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105423" version="1" comment="git-daemon is &lt;1.8.5.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105424" version="1" comment="git-email is &lt;1.8.5.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105425" version="1" comment="git-gui is &lt;1.8.5.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105426" version="1" comment="git-svn is &lt;1.8.5.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105427" version="1" comment="git-web is &lt;1.8.5.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105428" version="1" comment="gitk is &lt;1.8.5.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105337" version="1" comment="evolution-data-server-devel is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105356" version="1" comment="typelib-1_0-EBook-1_2 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105357" version="1" comment="typelib-1_0-EBookContacts-1_2 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105358" version="1" comment="typelib-1_0-EDataServer-1_2 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113522" version="1" comment="MozillaFirefox-devel is &lt;31.8.0esr-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113778" version="1" comment="xen-devel is &lt;4.4.2_10-22.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113658" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113660" version="1" comment="libQt5Concurrent-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113662" version="1" comment="libQt5Concurrent5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113664" version="1" comment="libQt5Core-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113665" version="1" comment="libQt5Core-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113669" version="1" comment="libQt5DBus-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113670" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113674" version="1" comment="libQt5Gui-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113675" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113679" version="1" comment="libQt5Network-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113680" version="1" comment="libQt5Network-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113682" version="1" comment="libQt5Network5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113684" version="1" comment="libQt5OpenGL-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113685" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113687" version="1" comment="libQt5OpenGL5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113689" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113691" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113692" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113694" version="1" comment="libQt5PrintSupport-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113695" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113697" version="1" comment="libQt5PrintSupport5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113699" version="1" comment="libQt5Sql-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113700" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113702" version="1" comment="libQt5Sql5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113704" version="1" comment="libQt5Sql5-mysql is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113706" version="1" comment="libQt5Sql5-postgresql is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113708" version="1" comment="libQt5Sql5-sqlite is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113710" version="1" comment="libQt5Sql5-unixODBC is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113712" version="1" comment="libQt5Test-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113713" version="1" comment="libQt5Test-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113715" version="1" comment="libQt5Test5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113717" version="1" comment="libQt5Widgets-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113718" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113722" version="1" comment="libQt5Xml-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113724" version="1" comment="libQt5Xml5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113726" version="1" comment="libqt5-qtbase-common-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113727" version="1" comment="libqt5-qtbase-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113728" version="1" comment="libqt5-qtbase-doc is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113731" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105071" version="1" comment="libyaml-devel is &lt;0.1.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113854" version="1" comment="libopenssl-devel is &lt;1.0.1i-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113871" version="1" comment="php5-devel is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105378" version="1" comment="binutils-devel is &lt;2.24-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105380" version="1" comment="binutils-gold is &lt;2.24-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105389" version="1" comment="cross-ppc-binutils is &lt;2.24-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105396" version="1" comment="cross-spu-binutils is &lt;2.24-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111345" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111346" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111347" version="1" comment="subversion is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111348" version="1" comment="subversion-bash-completion is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111349" version="1" comment="subversion-devel is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111350" version="1" comment="subversion-perl is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111351" version="1" comment="subversion-python is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111353" version="1" comment="subversion-server is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111354" version="1" comment="subversion-tools is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114065" version="1" comment="MozillaFirefox-devel is &lt;38.2.1esr-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114080" version="1" comment="mozilla-nss-devel is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114051" version="1" comment="bind-devel is &lt;9.9.6P1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105739" version="1" comment="kernel-docs is &lt;3.12.36-38.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105756" version="1" comment="kernel-obs-build is &lt;3.12.36-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105073" version="1" comment="libjasper-devel is &lt;1.900.1-166.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105783" version="1" comment="libopenssl-devel is &lt;1.0.1i-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114328" version="1" comment="libnetfilter_cthelper-devel is &lt;1.0.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114332" version="1" comment="libnetfilter_cttimeout-devel is &lt;1.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114339" version="1" comment="net-snmp-devel is &lt;5.7.2.1-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114423" version="1" comment="kernel-docs is &lt;3.12.44-52.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114440" version="1" comment="kernel-obs-build is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105973" version="1" comment="libvirt-devel is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114648" version="1" comment="php5-devel is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114772" version="1" comment="MozillaFirefox-devel is &lt;38.3.0esr-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114776" version="1" comment="mozilla-nspr-devel is &lt;4.10.9-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114976" version="1" comment="kernel-docs is &lt;3.12.48-52.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114993" version="1" comment="kernel-obs-build is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106048" version="1" comment="libblkid-devel is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106052" version="1" comment="libmount-devel is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106056" version="1" comment="libsmartcols-devel is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115019" version="1" comment="libspice-server-devel is &lt;0.12.4-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106087" version="1" comment="krb5-devel is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115141" version="1" comment="postgresql93-devel is &lt;9.3.10-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115236" version="1" comment="libffi48 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115386" version="1" comment="glibc-devel-static is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115404" version="1" comment="apache2 is &lt;2.4.10-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115405" version="1" comment="apache2-devel is &lt;2.4.10-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115932" version="1" comment="xen-devel is &lt;4.4.3_02-22.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115579" version="1" comment="graphite2-devel is &lt;1.3.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115583" version="1" comment="hyphen-devel is &lt;2.8.8-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115587" version="1" comment="libabw-devel is &lt;0.1.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115588" version="1" comment="libabw-devel-doc is &lt;0.1.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115594" version="1" comment="libcdr-devel is &lt;0.1.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115595" version="1" comment="libcdr-devel-doc is &lt;0.1.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115572" version="1" comment="libcmis-c-0_5-5 is &lt;0.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115573" version="1" comment="libcmis-c-devel is &lt;0.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115574" version="1" comment="libcmis-devel is &lt;0.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115599" version="1" comment="libe-book-devel is &lt;0.1.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115600" version="1" comment="libe-book-devel-doc is &lt;0.1.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115608" version="1" comment="libetonyek-devel is &lt;0.1.3-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115609" version="1" comment="libetonyek-devel-doc is &lt;0.1.3-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115617" version="1" comment="libfreehand-devel is &lt;0.1.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115618" version="1" comment="libfreehand-devel-doc is &lt;0.1.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115625" version="1" comment="libixion-devel is &lt;0.9.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115629" version="1" comment="liblangtag-devel is &lt;0.5.7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115638" version="1" comment="libmspub-devel is &lt;0.1.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115639" version="1" comment="libmspub-devel-doc is &lt;0.1.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115643" version="1" comment="libmwaw-devel is &lt;0.3.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115644" version="1" comment="libmwaw-devel-doc is &lt;0.3.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115648" version="1" comment="libodfgen-devel is &lt;0.1.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115649" version="1" comment="libodfgen-devel-doc is &lt;0.1.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115652" version="1" comment="liborcus-devel is &lt;0.7.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115768" version="1" comment="libvisio-devel is &lt;0.1.3-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115769" version="1" comment="libvisio-devel-doc is &lt;0.1.3-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115772" version="1" comment="libvoikko-devel is &lt;3.7.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115778" version="1" comment="libwps-devel is &lt;0.4.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105061" version="1" comment="xen-devel is &lt;4.4.1_08-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106151" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr2.10-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106156" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr2.10-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106167" version="1" comment="wireshark-devel is &lt;1.10.12-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106168" version="1" comment="hivex is &lt;1.3.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117934" version="1" comment="libpng12-compat-devel is &lt;1.2.50-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117935" version="1" comment="libpng12-devel is &lt;1.2.50-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117936" version="1" comment="libpng16-compat-devel is &lt;1.6.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117937" version="1" comment="libpng16-devel is &lt;1.6.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119315" version="1" comment="git is &lt;1.8.5.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119316" version="1" comment="git-arch is &lt;1.8.5.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119317" version="1" comment="git-core is &lt;1.8.5.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119318" version="1" comment="git-cvs is &lt;1.8.5.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119319" version="1" comment="git-daemon is &lt;1.8.5.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119320" version="1" comment="git-email is &lt;1.8.5.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119321" version="1" comment="git-gui is &lt;1.8.5.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119322" version="1" comment="git-svn is &lt;1.8.5.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119323" version="1" comment="git-web is &lt;1.8.5.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119324" version="1" comment="gitk is &lt;1.8.5.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119635" version="1" comment="libksba-devel is &lt;1.3.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106383" version="1" comment="libdcerpc-atsvc-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106385" version="1" comment="libdcerpc-atsvc0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106388" version="1" comment="libdcerpc-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106389" version="1" comment="libdcerpc-samr-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106391" version="1" comment="libdcerpc-samr0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106394" version="1" comment="libgensec-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106397" version="1" comment="libndr-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106398" version="1" comment="libndr-krb5pac-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106401" version="1" comment="libndr-nbt-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106404" version="1" comment="libndr-standard-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106409" version="1" comment="libnetapi-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106412" version="1" comment="libpdb-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106415" version="1" comment="libregistry-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106418" version="1" comment="libsamba-credentials-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106421" version="1" comment="libsamba-hostconfig-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106424" version="1" comment="libsamba-policy-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106426" version="1" comment="libsamba-policy0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106427" version="1" comment="libsamba-util-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106430" version="1" comment="libsamdb-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106433" version="1" comment="libsmbclient-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106434" version="1" comment="libsmbclient-raw-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106439" version="1" comment="libsmbconf-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106442" version="1" comment="libsmbldap-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106445" version="1" comment="libsmbsharemodes-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106446" version="1" comment="libsmbsharemodes0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106447" version="1" comment="libtevent-util-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106450" version="1" comment="libwbclient-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106457" version="1" comment="samba-core-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106464" version="1" comment="samba-test-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118692" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118693" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106480" version="1" comment="php5-devel is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118192" version="1" comment="kernel-docs is &lt;3.12.51-52.31.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118176" version="1" comment="kernel-obs-build is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119630" version="1" comment="gdk-pixbuf-devel is &lt;2.30.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106470" version="1" comment="libmspack-devel is &lt;0.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118729" version="1" comment="libopenssl-devel is &lt;1.0.1i-27.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118572" version="1" comment="krb5-devel is &lt;1.12.1-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119134" version="1" comment="libdcerpc-atsvc-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119135" version="1" comment="libdcerpc-atsvc0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119136" version="1" comment="libdcerpc-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119137" version="1" comment="libdcerpc-samr-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119138" version="1" comment="libdcerpc-samr0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119139" version="1" comment="libgensec-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119140" version="1" comment="libldb-devel is &lt;1.1.24-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119141" version="1" comment="libndr-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119142" version="1" comment="libndr-krb5pac-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119143" version="1" comment="libndr-nbt-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119144" version="1" comment="libndr-standard-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119145" version="1" comment="libnetapi-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119146" version="1" comment="libpdb-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119147" version="1" comment="libregistry-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119148" version="1" comment="libsamba-credentials-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119149" version="1" comment="libsamba-hostconfig-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119150" version="1" comment="libsamba-policy-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119151" version="1" comment="libsamba-policy0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119152" version="1" comment="libsamba-util-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119153" version="1" comment="libsamdb-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119154" version="1" comment="libsmbclient-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119155" version="1" comment="libsmbclient-raw-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119156" version="1" comment="libsmbconf-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119157" version="1" comment="libsmbldap-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119158" version="1" comment="libsmbsharemodes-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119159" version="1" comment="libsmbsharemodes0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119160" version="1" comment="libtalloc-devel is &lt;2.1.5-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119161" version="1" comment="libtdb-devel is &lt;1.3.8-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119162" version="1" comment="libtevent-devel is &lt;0.9.26-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119163" version="1" comment="libtevent-util-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119164" version="1" comment="libwbclient-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119165" version="1" comment="pyldb is &lt;1.1.24-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119166" version="1" comment="pyldb-devel is &lt;1.1.24-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119167" version="1" comment="pytalloc-devel is &lt;2.1.5-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119168" version="1" comment="samba-core-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119169" version="1" comment="samba-test-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129301" version="1" comment="kernel-docs is &lt;3.12.60-52.49.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129302" version="1" comment="kernel-obs-build is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129303" version="1" comment="dhcp-devel is &lt;4.2.6-14.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129304" version="1" comment="MozillaFirefox-devel is &lt;45.2.0esr-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129423" version="1" comment="kernel-docs is &lt;3.12.60-52.54.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129424" version="1" comment="kernel-obs-build is &lt;3.12.60-52.54.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129425" version="1" comment="glibc-devel-static is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129650" version="1" comment="boost-devel is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129651" version="1" comment="hunspell-devel is &lt;1.3.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129652" version="1" comment="hunspell-devel-32bit is &lt;1.3.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129653" version="1" comment="hyphen-devel is &lt;2.8.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129654" version="1" comment="libboost_chrono1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129655" version="1" comment="libboost_graph1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129656" version="1" comment="libboost_graph_parallel1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129657" version="1" comment="libboost_locale1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129658" version="1" comment="libboost_log1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129659" version="1" comment="libboost_math1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129660" version="1" comment="libboost_mpi1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129661" version="1" comment="libboost_python1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129662" version="1" comment="libboost_random1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129663" version="1" comment="libboost_serialization1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129664" version="1" comment="libboost_test1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129665" version="1" comment="libboost_timer1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129666" version="1" comment="libboost_wave1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129667" version="1" comment="libcmis-c-0_5-5 is &lt;0.5.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129668" version="1" comment="libcmis-c-devel is &lt;0.5.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129669" version="1" comment="libcmis-devel is &lt;0.5.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129670" version="1" comment="libetonyek-devel is &lt;0.1.6-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129671" version="1" comment="libetonyek-devel-doc is &lt;0.1.6-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129672" version="1" comment="libhyphen0-32bit is &lt;2.8.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129673" version="1" comment="libixion-devel is &lt;0.11.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129674" version="1" comment="liborcus-devel is &lt;0.11.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129675" version="1" comment="libvisio-devel is &lt;0.1.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129676" version="1" comment="libvisio-devel-doc is &lt;0.1.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129677" version="1" comment="libwps-devel is &lt;0.4.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121619" version="1" comment="libtiff-devel is &lt;4.0.6-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121154" version="1" comment="kernel-docs is &lt;3.12.51-52.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121155" version="1" comment="kernel-obs-build is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121340" version="1" comment="libxml2-devel is &lt;2.9.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121654" version="1" comment="bind-devel is &lt;9.9.6P1-28.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121651" version="1" comment="giflib-devel is &lt;5.0.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121652" version="1" comment="kernel-docs is &lt;3.12.51-52.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121653" version="1" comment="kernel-obs-build is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120904" version="1" comment="openldap2-back-perl is &lt;2.4.41-18.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118617" version="1" comment="openldap2-devel is &lt;2.4.41-18.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118618" version="1" comment="openldap2-devel-static is &lt;2.4.41-18.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121156" version="1" comment="gdk-pixbuf-devel is &lt;2.30.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121620" version="1" comment="php5-devel is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121020" version="1" comment="libvirt-devel is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122773" version="1" comment="MozillaFirefox-devel is &lt;38.6.0esr-57.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122774" version="1" comment="mozilla-nss-devel is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122219" version="1" comment="libcurl-devel is &lt;7.37.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122494" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.30-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122495" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.30-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122496" version="1" comment="krb5-devel is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122340" version="1" comment="glibc-devel-static is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123490" version="1" comment="postgresql93-devel is &lt;9.3.11-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123491" version="1" comment="postgresql93-libs is &lt;9.3.11-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122220" version="1" comment="dhcp-devel is &lt;4.2.6-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123669" version="1" comment="postgresql94-devel is &lt;9.4.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123670" version="1" comment="MozillaFirefox-devel is &lt;38.6.1esr-60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119636" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119637" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119638" version="1" comment="subversion is &lt;1.8.10-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119639" version="1" comment="subversion-bash-completion is &lt;1.8.10-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119640" version="1" comment="subversion-devel is &lt;1.8.10-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119641" version="1" comment="subversion-perl is &lt;1.8.10-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119642" version="1" comment="subversion-python is &lt;1.8.10-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119643" version="1" comment="subversion-server is &lt;1.8.10-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119644" version="1" comment="subversion-tools is &lt;1.8.10-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123872" version="1" comment="libopenssl-devel is &lt;1.0.1i-27.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119299" version="1" comment="libxml2-devel is &lt;2.9.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124609" version="1" comment="libssh2-devel is &lt;1.4.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124610" version="1" comment="MozillaFirefox-devel is &lt;38.7.0esr-63.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124611" version="1" comment="mozilla-nspr-devel is &lt;4.12-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124612" version="1" comment="mozilla-nss-devel is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124737" version="1" comment="bind-devel is &lt;9.9.6P1-28.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124816" version="1" comment="kernel-docs is &lt;3.12.55-52.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124817" version="1" comment="kernel-obs-build is &lt;3.12.55-52.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124976" version="1" comment="libdcerpc-atsvc-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124977" version="1" comment="libdcerpc-atsvc0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124978" version="1" comment="libdcerpc-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124979" version="1" comment="libdcerpc-samr-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124980" version="1" comment="libdcerpc-samr0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124981" version="1" comment="libgensec-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124982" version="1" comment="libndr-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124983" version="1" comment="libndr-krb5pac-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124984" version="1" comment="libndr-nbt-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124985" version="1" comment="libndr-standard-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124986" version="1" comment="libnetapi-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124987" version="1" comment="libpdb-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124988" version="1" comment="libregistry-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124989" version="1" comment="libsamba-credentials-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124990" version="1" comment="libsamba-hostconfig-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124991" version="1" comment="libsamba-policy-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124992" version="1" comment="libsamba-policy0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124993" version="1" comment="libsamba-util-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124994" version="1" comment="libsamdb-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124995" version="1" comment="libsmbclient-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124996" version="1" comment="libsmbclient-raw-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124997" version="1" comment="libsmbconf-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124998" version="1" comment="libsmbldap-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124999" version="1" comment="libsmbsharemodes-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125000" version="1" comment="libsmbsharemodes0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125001" version="1" comment="libtevent-util-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125002" version="1" comment="libwbclient-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125003" version="1" comment="samba-core-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125004" version="1" comment="samba-test-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125643" version="1" comment="quagga is &lt;0.99.22.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125644" version="1" comment="quagga-devel is &lt;0.99.22.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125673" version="1" comment="quagga is &lt;0.99.22.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125674" version="1" comment="quagga-devel is &lt;0.99.22.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125882" version="1" comment="krb5-devel is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125883" version="1" comment="mercurial is &lt;2.8.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125884" version="1" comment="ctdb-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125885" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125886" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125887" version="1" comment="libdcerpc-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125888" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125889" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125890" version="1" comment="libgensec-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125891" version="1" comment="libndr-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125892" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125893" version="1" comment="libndr-nbt-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125894" version="1" comment="libndr-standard-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125895" version="1" comment="libnetapi-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125896" version="1" comment="libregistry-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125897" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125898" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125899" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125900" version="1" comment="libsamba-policy-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125901" version="1" comment="libsamba-policy0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125902" version="1" comment="libsamba-util-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125903" version="1" comment="libsamdb-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125904" version="1" comment="libsmbclient-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125905" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125906" version="1" comment="libsmbconf-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125907" version="1" comment="libsmbldap-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125908" version="1" comment="libtevent-util-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125909" version="1" comment="libwbclient-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125910" version="1" comment="samba-core-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125911" version="1" comment="samba-test-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126433" version="1" comment="libgcrypt-devel is &lt;1.6.1-16.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126459" version="1" comment="cairo-devel is &lt;1.12.16-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126843" version="1" comment="php5-devel is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127085" version="1" comment="libxml2-devel is &lt;2.9.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127139" version="1" comment="libopenssl-devel is &lt;1.0.1i-27.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127269" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127270" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127271" version="1" comment="subversion is &lt;1.8.10-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127272" version="1" comment="subversion-bash-completion is &lt;1.8.10-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127273" version="1" comment="subversion-devel is &lt;1.8.10-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127274" version="1" comment="subversion-perl is &lt;1.8.10-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127275" version="1" comment="subversion-python is &lt;1.8.10-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127276" version="1" comment="subversion-server is &lt;1.8.10-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127277" version="1" comment="subversion-tools is &lt;1.8.10-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127278" version="1" comment="yast2-ntp-client-devel-doc is &lt;3.1.12.4-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127279" version="1" comment="MozillaFirefox-devel is &lt;38.8.0esr-66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127289" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127290" version="1" comment="libMagick++-devel is &lt;6.8.8.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127291" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127453" version="1" comment="php5-devel is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120992" version="1" comment="wireshark-devel is &lt;1.12.9-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127552" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.40-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127553" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.40-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127598" version="1" comment="xen-devel is &lt;4.4.4_02-22.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127734" version="1" comment="wireshark-devel is &lt;1.12.11-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127735" version="1" comment="libgudev-1_0-devel is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127736" version="1" comment="libudev-devel is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127737" version="1" comment="systemd-devel is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127738" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119524" version="1" comment="libmysqlclient-devel is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119525" version="1" comment="libmysqld-devel is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119526" version="1" comment="libmysqld18 is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128462" version="1" comment="php5-devel is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128620" version="1" comment="libxml2-devel is &lt;2.9.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128643" version="1" comment="libpoppler-devel is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128644" version="1" comment="libpoppler-glib-devel is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128645" version="1" comment="libpoppler-qt4-devel is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128646" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128801" version="1" comment="libspice-server-devel is &lt;0.12.4-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128815" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128816" version="1" comment="libMagick++-devel is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128817" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128885" version="1" comment="libarchive-devel is &lt;3.1.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128910" version="1" comment="kernel-docs is &lt;3.12.55-52.45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128911" version="1" comment="kernel-obs-build is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128953" version="1" comment="libmysqlclient-devel is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128954" version="1" comment="libmysqld-devel is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128955" version="1" comment="libmysqld18 is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129072" version="1" comment="imap-devel is &lt;2007e_suse-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129073" version="1" comment="php5-devel is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129094" version="1" comment="libimobiledevice-devel is &lt;1.1.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129095" version="1" comment="libusbmuxd-devel is &lt;1.0.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120782" version="1" comment="mozilla-nss-devel is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119527" version="1" comment="bind-devel is &lt;9.9.6P1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118733" version="1" comment="libopenssl-devel is &lt;1.0.1i-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118659" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr2.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118660" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr2.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118998" version="1" comment="kernel-docs is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118999" version="1" comment="kernel-obs-build is &lt;3.12.51-60.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119170" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119171" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119172" version="1" comment="libdcerpc-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119173" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119174" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119175" version="1" comment="libgensec-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119176" version="1" comment="libldb-devel is &lt;1.1.24-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119177" version="1" comment="libndr-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119178" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119179" version="1" comment="libndr-nbt-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119180" version="1" comment="libndr-standard-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119181" version="1" comment="libnetapi-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119182" version="1" comment="libregistry-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119183" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119184" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119185" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119186" version="1" comment="libsamba-policy-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119187" version="1" comment="libsamba-policy0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119188" version="1" comment="libsamba-util-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119189" version="1" comment="libsamdb-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119190" version="1" comment="libsmbclient-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119191" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119192" version="1" comment="libsmbconf-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119193" version="1" comment="libsmbldap-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119194" version="1" comment="libtalloc-devel is &lt;2.1.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119195" version="1" comment="libtdb-devel is &lt;1.3.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119196" version="1" comment="libtevent-devel is &lt;0.9.26-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119197" version="1" comment="libtevent-util-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119198" version="1" comment="libwbclient-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119199" version="1" comment="pyldb is &lt;1.1.24-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119200" version="1" comment="pyldb-devel is &lt;1.1.24-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119201" version="1" comment="pytalloc-devel is &lt;2.1.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119202" version="1" comment="samba-core-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119203" version="1" comment="samba-test-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118662" version="1" comment="xen-devel is &lt;4.5.2_02-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129359" version="1" comment="kernel-docs is &lt;3.12.59-60.41.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129360" version="1" comment="kernel-obs-build is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129426" version="1" comment="kernel-docs is &lt;3.12.59-60.45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129427" version="1" comment="kernel-obs-build is &lt;3.12.59-60.45.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129730" version="1" comment="glibc-devel-static is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129731" version="1" comment="glibc-info is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129909" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129910" version="1" comment="libMagick++-devel is &lt;6.8.8.1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129911" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130446" version="1" comment="apache2 is &lt;2.4.16-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130447" version="1" comment="apache2-devel is &lt;2.4.16-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130624" version="1" comment="obs-service-source_validator is &lt;0.6+git20160531.fbfe336-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130625" version="1" comment="php5-devel is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121655" version="1" comment="bind-devel is &lt;9.9.6P1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130795" version="1" comment="gimp-devel is &lt;2.8.10-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131743" version="1" comment="libvirt-devel is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131748" version="1" comment="xen-devel is &lt;4.5.3_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121553" version="1" comment="kernel-docs is &lt;3.12.51-60.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121554" version="1" comment="kernel-obs-build is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131749" version="1" comment="kernel-docs is &lt;3.12.62-60.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131750" version="1" comment="kernel-obs-build is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131752" version="1" comment="MozillaFirefox-devel is &lt;45.3.0esr-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131753" version="1" comment="krb5-devel is &lt;1.12.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131755" version="1" comment="libstorage-devel is &lt;2.25.35.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131756" version="1" comment="fontconfig-devel is &lt;2.11.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131757" version="1" comment="ocaml-compiler-libs is &lt;4.02.3-6.6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131758" version="1" comment="ocaml-runtime is &lt;4.02.3-6.6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131761" version="1" comment="libmysqlclient-devel is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131762" version="1" comment="libmysqld-devel is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131763" version="1" comment="libmysqld18 is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131766" version="1" comment="ctdb-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131767" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131769" version="1" comment="libdcerpc-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131770" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131771" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131772" version="1" comment="libgensec-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131773" version="1" comment="libndr-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131774" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131775" version="1" comment="libndr-nbt-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131776" version="1" comment="libndr-standard-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131777" version="1" comment="libnetapi-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131778" version="1" comment="libregistry-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131779" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131780" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131781" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131782" version="1" comment="libsamba-policy-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131783" version="1" comment="libsamba-policy0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131784" version="1" comment="libsamba-util-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131785" version="1" comment="libsamdb-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131786" version="1" comment="libsmbclient-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131787" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131788" version="1" comment="libsmbconf-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131789" version="1" comment="libsmbldap-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131790" version="1" comment="libtevent-util-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131791" version="1" comment="libwbclient-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131792" version="1" comment="samba-core-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131802" version="1" comment="libopenssl-devel is &lt;1.0.1i-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131812" version="1" comment="xen-devel is &lt;4.5.3_10-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131813" version="1" comment="php5-devel is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131814" version="1" comment="libgudev-1_0-devel is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131815" version="1" comment="libudev-devel is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131816" version="1" comment="systemd-devel is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131817" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131818" version="1" comment="ghostscript-devel is &lt;9.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131819" version="1" comment="libtiff-devel is &lt;4.0.6-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131820" version="1" comment="freerdp-devel is &lt;1.0.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131821" version="1" comment="libX11-devel is &lt;1.6.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131822" version="1" comment="libXfixes-devel is &lt;5.0.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131823" version="1" comment="libXi-devel is &lt;1.7.4-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131824" version="1" comment="libXrandr-devel is &lt;1.4.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131825" version="1" comment="libXrender-devel is &lt;0.9.8-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131826" version="1" comment="libXtst-devel is &lt;1.2.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131827" version="1" comment="libXv-devel is &lt;1.0.10-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131828" version="1" comment="libXvMC-devel is &lt;1.0.8-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131829" version="1" comment="gtk2-devel is &lt;2.24.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131830" version="1" comment="dbus-1-devel is &lt;1.8.22-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131831" version="1" comment="dbus-1-devel-doc is &lt;1.8.22-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131832" version="1" comment="libipa_hbac-devel is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131833" version="1" comment="libsss_idmap-devel is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131834" version="1" comment="libsss_nss_idmap-devel is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131835" version="1" comment="libsss_nss_idmap0 is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131836" version="1" comment="kernel-docs is &lt;3.12.62-60.64.8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131837" version="1" comment="kernel-obs-build is &lt;3.12.62-60.64.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131840" version="1" comment="libxml2-devel is &lt;2.9.1-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131841" version="1" comment="ghostscript-devel is &lt;9.15-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131842" version="1" comment="python3-devel is &lt;3.4.5-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131844" version="1" comment="gd-devel is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131845" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131846" version="1" comment="libMagick++-devel is &lt;6.8.8.1-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131847" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131848" version="1" comment="php7-devel is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135222" version="1" comment="bind-devel is &lt;9.9.9P1-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135223" version="1" comment="libcurl-devel is &lt;7.37.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135261" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr3.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135262" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr3.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135425" version="1" comment="php5-devel is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135426" version="1" comment="libblkid-devel is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135427" version="1" comment="libmount-devel is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135428" version="1" comment="libsmartcols-devel is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135429" version="1" comment="libjasper-devel is &lt;1.900.14-181.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135540" version="1" comment="ghostscript-devel is &lt;9.15-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135557" version="1" comment="eog-devel is &lt;3.10.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135888" version="1" comment="bash-devel is &lt;4.2-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135889" version="1" comment="readline-devel is &lt;6.2-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135946" version="1" comment="sudo-devel is &lt;1.8.10p3-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135985" version="1" comment="kernel-docs is &lt;3.12.67-60.64.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135986" version="1" comment="kernel-obs-build is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135987" version="1" comment="dovecot22-devel is &lt;2.2.13-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136013" version="1" comment="libmysqlclient-devel is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136014" version="1" comment="libmysqld-devel is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136015" version="1" comment="libmysqld18 is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136124" version="1" comment="php7-devel is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136154" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136155" version="1" comment="libMagick++-devel is &lt;6.8.8.1-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136156" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129317" version="1" comment="imap-devel is &lt;2007e_suse-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136282" version="1" comment="php5-devel is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136283" version="1" comment="libpacemaker-devel is &lt;1.1.13-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136284" version="1" comment="pcre-devel is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136285" version="1" comment="pcre-devel-static is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136286" version="1" comment="pcre-tools is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136408" version="1" comment="MozillaFirefox-devel is &lt;45.5.0esr-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136409" version="1" comment="mozilla-nss-devel is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136673" version="1" comment="kernel-docs is &lt;3.12.67-60.64.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136674" version="1" comment="kernel-obs-build is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136676" version="1" comment="MozillaFirefox-devel is &lt;45.5.1esr-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142208" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr3.21-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142209" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr3.21-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142378" version="1" comment="xen-devel is &lt;4.5.5_02-22.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119645" version="1" comment="libmysqlclient-devel is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119646" version="1" comment="libmysqld-devel is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119647" version="1" comment="libmysqld18 is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143073" version="1" comment="kernel-docs is &lt;3.12.67-60.64.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143074" version="1" comment="kernel-obs-build is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144666" version="1" comment="xen-devel is &lt;4.5.5_04-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144667" version="1" comment="gd-devel is &lt;2.1.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144668" version="1" comment="MozillaFirefox-devel is &lt;45.6.0esr-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145844" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145845" version="1" comment="libMagick++-devel is &lt;6.8.8.1-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145846" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145956" version="1" comment="ctdb-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145957" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145958" version="1" comment="libdcerpc-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145959" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145960" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145961" version="1" comment="libgensec-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145962" version="1" comment="libndr-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145963" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145964" version="1" comment="libndr-nbt-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145965" version="1" comment="libndr-standard-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145966" version="1" comment="libnetapi-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145967" version="1" comment="libregistry-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145968" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145969" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145970" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145971" version="1" comment="libsamba-policy-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145972" version="1" comment="libsamba-policy0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145973" version="1" comment="libsamba-util-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145974" version="1" comment="libsamdb-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145975" version="1" comment="libsmbclient-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145976" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145977" version="1" comment="libsmbconf-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145978" version="1" comment="libsmbldap-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145979" version="1" comment="libtevent-util-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145980" version="1" comment="libwbclient-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145981" version="1" comment="samba-core-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145982" version="1" comment="samba-test-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146077" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.2.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146078" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.2.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146079" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.2.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146080" version="1" comment="libtiff-devel is &lt;4.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122497" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr2.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122498" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr2.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122341" version="1" comment="glibc-devel-static is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122342" version="1" comment="glibc-info is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122221" version="1" comment="dhcp-devel is &lt;4.3.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123239" version="1" comment="kernel-docs is &lt;3.12.53-60.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123240" version="1" comment="kernel-obs-build is &lt;3.12.53-60.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123875" version="1" comment="libopenssl-devel is &lt;1.0.1i-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124725" version="1" comment="bind-devel is &lt;9.9.6P1-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125005" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125006" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125007" version="1" comment="libdcerpc-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125008" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125009" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125010" version="1" comment="libgensec-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125011" version="1" comment="libndr-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125012" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125013" version="1" comment="libndr-nbt-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125014" version="1" comment="libndr-standard-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125015" version="1" comment="libnetapi-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125016" version="1" comment="libregistry-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125017" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125018" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125019" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125020" version="1" comment="libsamba-policy-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125021" version="1" comment="libsamba-policy0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125022" version="1" comment="libsamba-util-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125023" version="1" comment="libsamdb-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125024" version="1" comment="libsmbclient-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125025" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125026" version="1" comment="libsmbconf-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125027" version="1" comment="libsmbldap-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125028" version="1" comment="libtevent-util-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125029" version="1" comment="libwbclient-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125030" version="1" comment="samba-core-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125031" version="1" comment="samba-test-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125328" version="1" comment="xen-devel is &lt;4.5.2_06-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125627" version="1" comment="libvirt-devel is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125912" version="1" comment="kernel-docs is &lt;3.12.57-60.35.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125913" version="1" comment="kernel-obs-build is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125914" version="1" comment="ctdb-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125915" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125916" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125917" version="1" comment="libdcerpc-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125918" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125919" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125920" version="1" comment="libgensec-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125921" version="1" comment="libndr-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125922" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125923" version="1" comment="libndr-nbt-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125924" version="1" comment="libndr-standard-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125925" version="1" comment="libnetapi-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125926" version="1" comment="libregistry-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125927" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125928" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125929" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125930" version="1" comment="libsamba-policy-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125931" version="1" comment="libsamba-policy0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125932" version="1" comment="libsamba-util-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125933" version="1" comment="libsamdb-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125934" version="1" comment="libsmbclient-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125935" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125936" version="1" comment="libsmbconf-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125937" version="1" comment="libsmbldap-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125938" version="1" comment="libtevent-util-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125939" version="1" comment="libwbclient-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125940" version="1" comment="samba-core-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125941" version="1" comment="samba-test-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126094" version="1" comment="libxerces-c-devel is &lt;3.1.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126714" version="1" comment="yast2-users-devel-doc is &lt;3.1.41.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126905" version="1" comment="yast2-ntp-client-devel-doc is &lt;3.1.22-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127140" version="1" comment="libopenssl-devel is &lt;1.0.1i-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127739" version="1" comment="libgudev-1_0-devel is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127740" version="1" comment="libudev-devel is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127741" version="1" comment="systemd-devel is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127742" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128802" version="1" comment="libspice-server-devel is &lt;0.12.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128956" version="1" comment="libmysqlclient-devel is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128957" version="1" comment="libmysqld-devel is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128958" version="1" comment="libmysqld18 is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147085" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147092" version="1" comment="typelib-1_0-GstApp-0_10 is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147093" version="1" comment="typelib-1_0-GstInterfaces-0_10 is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146585" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147936" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148008" version="1" comment="libgnutls-devel is &lt;3.2.15-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148009" version="1" comment="libgnutls-openssl-devel is &lt;3.2.15-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148010" version="1" comment="libgnutlsxx-devel is &lt;3.2.15-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148011" version="1" comment="libgnutlsxx28 is &lt;3.2.15-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148161" version="1" comment="libspice-server-devel is &lt;0.12.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148215" version="1" comment="libmysqlclient-devel is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148216" version="1" comment="libmysqld-devel is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148217" version="1" comment="libmysqld18 is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146586" version="1" comment="php5-devel is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148249" version="1" comment="MozillaFirefox-devel is &lt;45.7.0esr-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148344" version="1" comment="libtiff-devel is &lt;4.0.7-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148413" version="1" comment="libopenssl-devel is &lt;1.0.1i-54.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148414" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr4.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148415" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr4.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148416" version="1" comment="kernel-docs is &lt;3.12.69-60.64.29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148417" version="1" comment="kernel-obs-build is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148677" version="1" comment="kernel-docs is &lt;3.12.69-60.64.32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148678" version="1" comment="kernel-obs-build is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146852" version="1" comment="libjasper-devel is &lt;1.900.14-184.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148758" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148759" version="1" comment="libMagick++-devel is &lt;6.8.8.1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148760" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148761" version="1" comment="php7-devel is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148920" version="1" comment="libblkid-devel is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148921" version="1" comment="libmount-devel is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148922" version="1" comment="libsmartcols-devel is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148923" version="1" comment="php5-devel is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148946" version="1" comment="xen-devel is &lt;4.5.5_06-22.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146184" version="1" comment="zlib-devel is &lt;1.2.8-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146185" version="1" comment="zlib-devel-32bit is &lt;1.2.8-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146186" version="1" comment="zlib-devel-static is &lt;1.2.8-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149111" version="1" comment="bind-devel is &lt;9.9.9P1-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149582" version="1" comment="dbus-1-devel is &lt;1.8.22-24.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149583" version="1" comment="dbus-1-devel-doc is &lt;1.8.22-24.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149584" version="1" comment="gegl-devel is &lt;0.2.0-10.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149640" version="1" comment="MozillaFirefox-devel is &lt;45.8.0esr-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149799" version="1" comment="php5-devel is &lt;5.5.14-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146870" version="1" comment="freeradius-server-devel is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149824" version="1" comment="apache2 is &lt;2.4.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149825" version="1" comment="apache2-devel is &lt;2.4.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149884" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr4.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149885" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr4.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150212" version="1" comment="ctdb-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150213" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150214" version="1" comment="libdcerpc-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150215" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150216" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150217" version="1" comment="libgensec-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150218" version="1" comment="libndr-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150219" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150220" version="1" comment="libndr-nbt-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150221" version="1" comment="libndr-standard-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150222" version="1" comment="libnetapi-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150223" version="1" comment="libregistry-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150224" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150225" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150226" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150227" version="1" comment="libsamba-policy-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150228" version="1" comment="libsamba-policy0 is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150229" version="1" comment="libsamba-util-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150230" version="1" comment="libsamdb-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150231" version="1" comment="libsmbclient-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150232" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150233" version="1" comment="libsmbconf-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150234" version="1" comment="libsmbldap-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150235" version="1" comment="libtevent-util-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150236" version="1" comment="libwbclient-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150237" version="1" comment="samba-core-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150238" version="1" comment="samba-test-devel is &lt;4.2.4-28.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150241" version="1" comment="kernel-docs is &lt;3.12.69-60.64.35.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150242" version="1" comment="kernel-obs-build is &lt;3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150325" version="1" comment="php7-devel is &lt;7.0.7-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146890" version="1" comment="bind-devel is &lt;9.9.9P1-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150849" version="1" comment="gstreamer-devel is &lt;1.2.4-2.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154308" version="1" comment="bind-devel is &lt;9.9.9P1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154336" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.36-11.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154337" version="1" comment="typelib-1_0-GstApp-0_10 is &lt;0.10.36-11.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154338" version="1" comment="typelib-1_0-GstInterfaces-0_10 is &lt;0.10.36-11.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154441" version="1" comment="gstreamer-plugins-base-devel is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154442" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154443" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154444" version="1" comment="typelib-1_0-GstFft-1_0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154445" version="1" comment="typelib-1_0-GstRiff-1_0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154446" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154447" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154448" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.2.4-2.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154449" version="1" comment="libsndfile-devel is &lt;1.0.25-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154617" version="1" comment="ruby2.1-devel is &lt;2.1.9-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154732" version="1" comment="libpcap-devel is &lt;1.8.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154809" version="1" comment="ghostscript-devel is &lt;9.15-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154936" version="1" comment="xen-devel is &lt;4.5.5_10-22.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154938" version="1" comment="libapparmor-devel is &lt;2.8.2-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154939" version="1" comment="firebird-devel is &lt;2.5.2.26539-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155270" version="1" comment="Botan is &lt;1.10.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155359" version="1" comment="dovecot22-devel is &lt;2.2.29.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155569" version="1" comment="libtirpc-devel is &lt;0.2.3-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155571" version="1" comment="libmysqlclient-devel is &lt;10.0.30-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155572" version="1" comment="libmysqld-devel is &lt;10.0.30-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155573" version="1" comment="libmysqld18 is &lt;10.0.30-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146313" version="1" comment="php7-devel is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155673" version="1" comment="kernel-docs is &lt;3.12.74-60.64.40.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155674" version="1" comment="kernel-obs-build is &lt;3.12.74-60.64.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155689" version="1" comment="libxml2-devel is &lt;2.9.1-26.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155691" version="1" comment="libplist++-devel is &lt;1.8-10.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155692" version="1" comment="libplist-devel is &lt;1.8-10.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155899" version="1" comment="ctdb-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155900" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155901" version="1" comment="libdcerpc-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155902" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155903" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155904" version="1" comment="libgensec-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155905" version="1" comment="libndr-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155906" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155907" version="1" comment="libndr-nbt-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155908" version="1" comment="libndr-standard-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155909" version="1" comment="libnetapi-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155910" version="1" comment="libregistry-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155911" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155912" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155913" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155914" version="1" comment="libsamba-policy-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155915" version="1" comment="libsamba-policy0 is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155916" version="1" comment="libsamba-util-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155917" version="1" comment="libsamdb-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155918" version="1" comment="libsmbclient-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155919" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155920" version="1" comment="libsmbconf-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155921" version="1" comment="libsmbldap-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155922" version="1" comment="libtevent-util-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155923" version="1" comment="libwbclient-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155924" version="1" comment="samba-core-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155925" version="1" comment="samba-test-devel is &lt;4.2.4-28.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156250" version="1" comment="wireshark-devel is &lt;2.2.6-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156251" version="1" comment="sudo-devel is &lt;1.8.10p3-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147242" version="1" comment="gstreamer-plugins-base-devel is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147243" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147244" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147245" version="1" comment="typelib-1_0-GstFft-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147246" version="1" comment="typelib-1_0-GstRiff-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147247" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147248" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147249" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135558" version="1" comment="libX11-devel is &lt;1.6.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135559" version="1" comment="libXi-devel is &lt;1.7.4-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135683" version="1" comment="python3-devel is &lt;3.4.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135890" version="1" comment="libpacemaker-devel is &lt;1.1.15-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135934" version="1" comment="sudo-devel is &lt;1.8.10p3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136157" version="1" comment="libblkid-devel is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136158" version="1" comment="libmount-devel is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136159" version="1" comment="libsmartcols-devel is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136287" version="1" comment="libgit2 is &lt;0.24.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136288" version="1" comment="libgit2-24 is &lt;0.24.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136678" version="1" comment="kernel-docs is &lt;4.4.21-84.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136679" version="1" comment="kernel-obs-build is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142156" version="1" comment="xen-devel is &lt;4.7.1_02-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142759" version="1" comment="kernel-docs is &lt;4.4.21-90.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142760" version="1" comment="kernel-obs-build is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144669" version="1" comment="xen-devel is &lt;4.7.1_04-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145983" version="1" comment="libsmbclient-devel is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145984" version="1" comment="libwbclient-devel is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146081" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146082" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157169" version="1" comment="sudo-devel is &lt;1.8.10p3-10.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147379" version="1" comment="gstreamer-plugins-base-devel is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147380" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147381" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147382" version="1" comment="typelib-1_0-GstFft-1_0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147383" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147384" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147385" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157363" version="1" comment="libxml2-devel is &lt;2.9.4-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157365" version="1" comment="postgresql94-devel is &lt;9.4.12-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157366" version="1" comment="postgresql94-libs is &lt;9.4.12-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157421" version="1" comment="freeradius-server-devel is &lt;3.0.3-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157604" version="1" comment="kernel-docs is &lt;4.4.59-92.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157605" version="1" comment="kernel-obs-build is &lt;4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157779" version="1" comment="xen-devel is &lt;4.7.2_06-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157942" version="1" comment="libudev-devel is &lt;228-149.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157943" version="1" comment="systemd-devel is &lt;228-149.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157944" version="1" comment="sudo-devel is &lt;1.8.10p3-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157945" version="1" comment="libquicktime-devel is &lt;1.2.4-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157999" version="1" comment="libgcrypt-devel is &lt;1.6.1-16.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158000" version="1" comment="libcares-devel is &lt;1.9.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158372" version="1" comment="libixion-devel is &lt;0.12.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158373" version="1" comment="libmwaw-devel is &lt;0.3.11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158374" version="1" comment="libmwaw-devel-doc is &lt;0.3.11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158375" version="1" comment="liborcus-devel is &lt;0.12.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158437" version="1" comment="libgnutls-devel is &lt;3.2.15-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158438" version="1" comment="libgnutls-openssl-devel is &lt;3.2.15-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158439" version="1" comment="libgnutlsxx-devel is &lt;3.2.15-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158440" version="1" comment="libgnutlsxx28 is &lt;3.2.15-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158441" version="1" comment="libICE-devel is &lt;1.0.8-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158442" version="1" comment="libspice-server-devel is &lt;0.12.7-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158791" version="1" comment="kernel-docs is &lt;4.4.74-92.29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158792" version="1" comment="kernel-obs-build is &lt;4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158808" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.18.3-74.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158809" version="1" comment="libXdmcp-devel is &lt;1.1.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158896" version="1" comment="evince-devel is &lt;3.20.1-6.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158913" version="1" comment="libudev-devel is &lt;228-150.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158914" version="1" comment="systemd-devel is &lt;228-150.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159363" version="1" comment="libjasper-devel is &lt;1.900.14-195.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159483" version="1" comment="apache2-devel is &lt;2.4.23-29.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159532" version="1" comment="libquicktime-devel is &lt;1.2.4-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159533" version="1" comment="libical-devel is &lt;1.0.1-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159534" version="1" comment="libical-devel-static is &lt;1.0.1-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159535" version="1" comment="libpoppler-devel is &lt;0.43.0-16.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159536" version="1" comment="libpoppler-glib-devel is &lt;0.43.0-16.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159537" version="1" comment="libpoppler-qt4-devel is &lt;0.43.0-16.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159538" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;0.43.0-16.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147434" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147435" version="1" comment="typelib-1_0-GstApp-0_10 is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147436" version="1" comment="typelib-1_0-GstInterfaces-0_10 is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161393" version="1" comment="wireshark-devel is &lt;2.2.8-48.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161420" version="1" comment="kernel-docs is &lt;4.4.74-92.32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161421" version="1" comment="kernel-obs-build is &lt;4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161422" version="1" comment="libzypp-devel is &lt;16.15.2-27.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161423" version="1" comment="libzypp-devel-doc is &lt;16.15.2-27.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161448" version="1" comment="nasm is &lt;2.10.09-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146587" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161626" version="1" comment="librsvg-devel is &lt;2.40.18-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161627" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.40.18-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161781" version="1" comment="libsoup-devel is &lt;2.54.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161782" version="1" comment="kernel-docs is &lt;4.4.74-92.35.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161783" version="1" comment="kernel-obs-build is &lt;4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161831" version="1" comment="libxml2-devel is &lt;2.9.4-46.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161969" version="1" comment="libcurl-devel is &lt;7.37.0-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162119" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.19-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162120" version="1" comment="subversion is &lt;1.8.19-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162121" version="1" comment="subversion-bash-completion is &lt;1.8.19-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162122" version="1" comment="subversion-devel is &lt;1.8.19-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162123" version="1" comment="subversion-perl is &lt;1.8.19-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162124" version="1" comment="subversion-python is &lt;1.8.19-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162125" version="1" comment="subversion-server is &lt;1.8.19-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162126" version="1" comment="subversion-tools is &lt;1.8.19-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162127" version="1" comment="libplist++-devel is &lt;1.12-20.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162128" version="1" comment="libplist-devel is &lt;1.12-20.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162129" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162130" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162131" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162182" version="1" comment="gnome-shell-devel is &lt;3.20.4-77.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162272" version="1" comment="freerdp-devel is &lt;2.0.0~git.1463131968.4e66df7-12.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162308" version="1" comment="freeradius-server-devel is &lt;3.0.3-17.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162315" version="1" comment="mercurial is &lt;2.8.2-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162451" version="1" comment="quagga-devel is &lt;1.1.1-17.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162536" version="1" comment="libraw-devel is &lt;0.15.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162537" version="1" comment="libraw-devel-static is &lt;0.15.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162538" version="1" comment="php7-devel is &lt;7.0.7-50.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162539" version="1" comment="libexpat-devel is &lt;2.1.0-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162906" version="1" comment="git-arch is &lt;2.12.3-27.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162907" version="1" comment="git-cvs is &lt;2.12.3-27.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162908" version="1" comment="git-daemon is &lt;2.12.3-27.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162909" version="1" comment="git-email is &lt;2.12.3-27.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162910" version="1" comment="git-gui is &lt;2.12.3-27.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162911" version="1" comment="git-svn is &lt;2.12.3-27.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162912" version="1" comment="git-web is &lt;2.12.3-27.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162913" version="1" comment="gitk is &lt;2.12.3-27.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162914" version="1" comment="libicu-devel is &lt;52.1-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162915" version="1" comment="php5-devel is &lt;5.5.14-109.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162939" version="1" comment="xen-devel is &lt;4.7.3_03-43.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163137" version="1" comment="postgresql94-devel is &lt;9.4.13-21.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163138" version="1" comment="postgresql94-libs is &lt;9.4.13-21.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163139" version="1" comment="postgresql96-devel is &lt;9.6.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163299" version="1" comment="gdk-pixbuf-devel is &lt;2.34.0-19.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163362" version="1" comment="evince-devel is &lt;3.20.1-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147641" version="1" comment="libudev-devel is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147642" version="1" comment="systemd-devel is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147819" version="1" comment="dbus-1-devel is &lt;1.8.22-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147820" version="1" comment="dbus-1-devel-doc is &lt;1.8.22-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163743" version="1" comment="php7-devel is &lt;7.0.7-50.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164367" version="1" comment="php5-devel is &lt;5.5.14-109.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164368" version="1" comment="xen-devel is &lt;4.7.3_04-43.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164369" version="1" comment="kernel-docs is &lt;4.4.74-92.38.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164370" version="1" comment="kernel-obs-build is &lt;4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164456" version="1" comment="gcc48-ada is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164457" version="1" comment="gcc48-fortran is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164458" version="1" comment="gcc48-java is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164459" version="1" comment="gcc48-obj-c++ is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164460" version="1" comment="gcc48-objc is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164461" version="1" comment="gcc48-objc-32bit is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164462" version="1" comment="libada48 is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164463" version="1" comment="libffi48 is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164464" version="1" comment="libffi48-devel is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164465" version="1" comment="libgcj48-devel is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164466" version="1" comment="libobjc4 is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164467" version="1" comment="libobjc4-32bit is &lt;4.8.5-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164545" version="1" comment="libzip-devel is &lt;0.11.1-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164546" version="1" comment="apache2-devel is &lt;2.4.23-29.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164737" version="1" comment="wireshark-devel is &lt;2.2.9-48.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164761" version="1" comment="libtiff-devel is &lt;4.0.8-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164762" version="1" comment="liblouis-devel is &lt;2.6.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164768" version="1" comment="mysql-connector-java is &lt;5.1.42-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164800" version="1" comment="tcmu-runner-devel is &lt;1.0.4-3.3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165027" version="1" comment="libsmbclient-devel is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165028" version="1" comment="libwbclient-devel is &lt;4.4.2-38.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165086" version="1" comment="krb5-devel is &lt;1.12.5-40.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165185" version="1" comment="libvirt-devel is &lt;2.0.0-27.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165695" version="1" comment="xerces-j2-demo is &lt;2.8.1-268.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165696" version="1" comment="xerces-j2-scripts is &lt;2.8.1-268.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165697" version="1" comment="git-arch is &lt;2.12.3-27.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165698" version="1" comment="git-cvs is &lt;2.12.3-27.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165699" version="1" comment="git-daemon is &lt;2.12.3-27.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165700" version="1" comment="git-email is &lt;2.12.3-27.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165701" version="1" comment="git-gui is &lt;2.12.3-27.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165702" version="1" comment="git-svn is &lt;2.12.3-27.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165703" version="1" comment="git-web is &lt;2.12.3-27.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165704" version="1" comment="gitk is &lt;2.12.3-27.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165990" version="1" comment="libcurl-devel is &lt;7.37.0-37.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166098" version="1" comment="Botan is &lt;1.10.9-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166099" version="1" comment="libbotan-1_10-0 is &lt;1.10.9-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166100" version="1" comment="libbotan-devel is &lt;1.10.9-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166101" version="1" comment="wireshark-devel is &lt;2.2.10-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166136" version="1" comment="xen-devel is &lt;4.7.3_06-43.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166137" version="1" comment="kernel-docs is &lt;4.4.90-92.45.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166138" version="1" comment="kernel-obs-build is &lt;4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166532" version="1" comment="webkit2gtk3-devel is &lt;2.18.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166533" version="1" comment="libwpd-devel is &lt;0.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166534" version="1" comment="libwpd-devel-doc is &lt;0.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166535" version="1" comment="libipa_hbac-devel is &lt;1.13.4-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166536" version="1" comment="libsss_idmap-devel is &lt;1.13.4-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166537" version="1" comment="libsss_nss_idmap-devel is &lt;1.13.4-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166692" version="1" comment="krb5-devel is &lt;1.12.5-40.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166693" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166694" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166695" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166790" version="1" comment="samba-test-devel is &lt;4.2.4-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149886" version="1" comment="libcephfs-devel is &lt;10.2.4+git.1481215985.12b091b-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149887" version="1" comment="librados-devel is &lt;10.2.4+git.1481215985.12b091b-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149888" version="1" comment="libradosstriper-devel is &lt;10.2.4+git.1481215985.12b091b-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149889" version="1" comment="librbd-devel is &lt;10.2.4+git.1481215985.12b091b-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167003" version="1" comment="file-devel is &lt;5.22-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167004" version="1" comment="python-magic is &lt;5.22-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167005" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.18.3-76.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167017" version="1" comment="gimp-devel is &lt;2.8.18-9.3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167137" version="1" comment="samba-test-devel is &lt;4.2.4-28.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167231" version="1" comment="libsmbclient-devel is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167232" version="1" comment="libwbclient-devel is &lt;4.4.2-38.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148053" version="1" comment="libxml2-devel is &lt;2.9.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167393" version="1" comment="binutils-devel is &lt;2.29.1-9.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167394" version="1" comment="binutils-gold is &lt;2.29.1-9.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167395" version="1" comment="cross-ppc-binutils is &lt;2.29.1-9.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167396" version="1" comment="cross-spu-binutils is &lt;2.29.1-9.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167428" version="1" comment="xen-devel is &lt;4.7.4_02-43.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148162" version="1" comment="libspice-server-devel is &lt;0.12.7-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167786" version="1" comment="libXcursor-devel is &lt;1.1.14-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167787" version="1" comment="shibboleth-sp-devel is &lt;2.5.5-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167788" version="1" comment="kernel-docs is &lt;4.4.90-92.50.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167789" version="1" comment="kernel-obs-build is &lt;4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167976" version="1" comment="libsaml-devel is &lt;2.5.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167977" version="1" comment="php7-devel is &lt;7.0.7-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167986" version="1" comment="build is &lt;20171128-9.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167987" version="1" comment="build-initvm-s390 is &lt;20171128-9.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167988" version="1" comment="build-initvm-x86_64 is &lt;20171128-9.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167989" version="1" comment="build-mkbaselibs is &lt;20171128-9.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167990" version="1" comment="obs-service-source_validator is &lt;0.7-9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167991" version="1" comment="osc is &lt;0.162.0-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168432" version="1" comment="libapr-util1-devel is &lt;1.5.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168433" version="1" comment="php5-devel is &lt;5.5.14-109.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168732" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168733" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168734" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168771" version="1" comment="libraw-devel is &lt;0.15.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168772" version="1" comment="libraw-devel-static is &lt;0.15.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168773" version="1" comment="postgresql96-devel is &lt;9.6.6-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168812" version="1" comment="kernel-docs is &lt;4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168813" version="1" comment="kernel-obs-build is &lt;4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168814" version="1" comment="evince-devel is &lt;3.20.2-6.19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168923" version="1" comment="wireshark-devel is &lt;2.2.11-48.15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168924" version="1" comment="gdk-pixbuf-devel is &lt;2.34.0-19.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148269" version="1" comment="libgit2 is &lt;0.24.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148924" version="1" comment="libblkid-devel is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148925" version="1" comment="libmount-devel is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148926" version="1" comment="libsmartcols-devel is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148947" version="1" comment="xen-devel is &lt;4.7.1_06-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149031" version="1" comment="kernel-docs is &lt;4.4.49-92.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149032" version="1" comment="kernel-obs-build is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149826" version="1" comment="apache2-devel is &lt;2.4.23-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150243" version="1" comment="libsmbclient-devel is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150244" version="1" comment="libwbclient-devel is &lt;4.4.2-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150245" version="1" comment="kernel-docs is &lt;4.4.49-92.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150246" version="1" comment="kernel-obs-build is &lt;4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150918" version="1" comment="xen-devel is &lt;4.7.2_02-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154941" version="1" comment="xen-devel is &lt;4.7.2_04-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155067" version="1" comment="kernel-docs is &lt;4.4.59-92.17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155068" version="1" comment="kernel-obs-build is &lt;4.4.59-92.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155926" version="1" comment="libsmbclient-devel is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155927" version="1" comment="libwbclient-devel is &lt;4.4.2-38.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147250" version="1" comment="kernel-docs is &lt;4.4.38-93.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147251" version="1" comment="kernel-obs-build is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156252" version="1" comment="sudo-devel is &lt;1.8.10p3-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156253" version="1" comment="libxml2-devel is &lt;2.9.4-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156773" version="1" comment="libxml2-devel is &lt;2.9.4-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156862" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156863" version="1" comment="libQt5Concurrent-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156864" version="1" comment="libQt5Core-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156865" version="1" comment="libQt5Core-private-headers-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156866" version="1" comment="libQt5DBus-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156867" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156868" version="1" comment="libQt5Gui-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156869" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156870" version="1" comment="libQt5Network-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156871" version="1" comment="libQt5Network-private-headers-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156872" version="1" comment="libQt5OpenGL-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156873" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156874" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156875" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156876" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156877" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156878" version="1" comment="libQt5PrintSupport-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156879" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156880" version="1" comment="libQt5Sql-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156881" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156882" version="1" comment="libQt5Test-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156883" version="1" comment="libQt5Test-private-headers-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156884" version="1" comment="libQt5Widgets-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156885" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156886" version="1" comment="libQt5Xml-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156887" version="1" comment="libqt5-qtbase-common-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156888" version="1" comment="libqt5-qtbase-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156889" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.6.1-17.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156890" version="1" comment="libqt5-qtdeclarative-devel is &lt;5.6.1-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156891" version="1" comment="libqt5-qtdeclarative-private-headers-devel is &lt;5.6.1-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156892" version="1" comment="libqt5-qtdeclarative-tools is &lt;5.6.1-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147386" version="1" comment="apache2-devel is &lt;2.4.23-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157043" version="1" comment="kernel-docs is &lt;4.4.59-92.20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157044" version="1" comment="kernel-obs-build is &lt;4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169835" version="1" comment="gd-devel is &lt;2.1.0-24.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169836" version="1" comment="libxmltooling-devel is &lt;1.5.6-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169075" version="1" comment="kernel-docs is &lt;4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169076" version="1" comment="kernel-obs-build is &lt;4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169977" version="1" comment="libvpx-devel is &lt;1.3.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170044" version="1" comment="wireshark-devel is &lt;2.2.12-48.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170045" version="1" comment="libexif-devel is &lt;0.6.21-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169077" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169078" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169079" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170046" version="1" comment="libevent-devel is &lt;2.0.21-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170142" version="1" comment="php5-devel is &lt;5.5.14-109.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170143" version="1" comment="libcurl-devel is &lt;7.37.0-37.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169080" version="1" comment="libvorbis-devel is &lt;1.3.3-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170144" version="1" comment="webkit2gtk3-devel is &lt;2.18.5-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170617" version="1" comment="gd-devel is &lt;2.1.0-24.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170618" version="1" comment="apache2-devel is &lt;2.4.23-29.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170619" version="1" comment="libudev-devel is &lt;228-150.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170620" version="1" comment="systemd-devel is &lt;228-150.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170621" version="1" comment="php7-devel is &lt;7.0.7-50.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170858" version="1" comment="libXfont-devel is &lt;1.5.1-11.3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170875" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170876" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170877" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170878" version="1" comment="libsndfile-devel is &lt;1.0.25-36.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170922" version="1" comment="libjpeg62-devel is &lt;62.2.0-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170923" version="1" comment="libjpeg8-devel is &lt;8.1.2-31.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170976" version="1" comment="libmysqlclient-devel is &lt;10.0.33-29.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170977" version="1" comment="libmysqld-devel is &lt;10.0.33-29.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170978" version="1" comment="libmysqld18 is &lt;10.0.33-29.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170979" version="1" comment="libvirt-devel is &lt;2.0.0-27.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171017" version="1" comment="libxml2-devel is &lt;2.9.4-46.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171113" version="1" comment="ghostscript-devel is &lt;9.15-23.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171114" version="1" comment="kernel-docs is &lt;4.4.114-92.64.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171115" version="1" comment="kernel-obs-build is &lt;4.4.114-92.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171116" version="1" comment="freetype2-devel is &lt;2.6.3-7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171456" version="1" comment="glibc-devel-static is &lt;2.22-62.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171457" version="1" comment="quagga-devel is &lt;1.1.1-17.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171468" version="1" comment="dovecot22-devel is &lt;2.2.31-19.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171547" version="1" comment="xen-devel is &lt;4.7.4_06-43.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171548" version="1" comment="postgresql96-devel is &lt;9.6.7-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171549" version="1" comment="libdb-4_8-devel is &lt;4.8.30-29.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172380" version="1" comment="php5-devel is &lt;5.5.14-109.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172381" version="1" comment="dhcp-devel is &lt;4.3.3-10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172468" version="1" comment="libudev-devel is &lt;228-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172469" version="1" comment="systemd-devel is &lt;228-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172491" version="1" comment="zziplib-devel is &lt;0.13.67-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172635" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172636" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172637" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172662" version="1" comment="openexr-devel is &lt;2.1.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169356" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169357" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169358" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172696" version="1" comment="cups-devel is &lt;1.7.5-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172697" version="1" comment="wavpack-devel is &lt;4.60.99-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172857" version="1" comment="php7-devel is &lt;7.0.7-50.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172858" version="1" comment="augeas-devel is &lt;1.2.0-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172859" version="1" comment="glibc-devel-static is &lt;2.22-62.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173013" version="1" comment="postgresql94-devel is &lt;9.4.16-21.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173014" version="1" comment="postgresql94-libs is &lt;9.4.16-21.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173015" version="1" comment="libcdio++0 is &lt;0.90-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173016" version="1" comment="libcdio-devel is &lt;0.90-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173017" version="1" comment="libudf0 is &lt;0.90-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173063" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.20-38.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173064" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.20-38.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169442" version="1" comment="kernel-docs is &lt;4.4.103-92.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169443" version="1" comment="kernel-obs-build is &lt;4.4.103-92.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173165" version="1" comment="php5-devel is &lt;5.5.14-109.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173166" version="1" comment="libxmltooling-devel is &lt;1.5.6-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173167" version="1" comment="libid3tag-devel is &lt;0.15.1b-184.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173445" version="1" comment="crash-devel is &lt;7.1.5-15.3.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173446" version="1" comment="postgresql96-devel is &lt;9.6.8-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173487" version="1" comment="libcurl-devel is &lt;7.37.0-37.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173636" version="1" comment="libvorbis-devel is &lt;1.3.3-10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173637" version="1" comment="kernel-docs is &lt;4.4.120-92.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173638" version="1" comment="kernel-obs-build is &lt;4.4.120-92.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173803" version="1" comment="dhcp-devel is &lt;4.3.3-10.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173804" version="1" comment="wireshark-devel is &lt;2.2.13-48.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169531" version="1" comment="glibc-devel-static is &lt;2.22-62.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173944" version="1" comment="librelp-devel is &lt;1.2.7-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173945" version="1" comment="LibVNCServer-devel is &lt;0.9.9-17.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173946" version="1" comment="libsmbclient-devel is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173947" version="1" comment="libwbclient-devel is &lt;4.4.2-38.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174016" version="1" comment="memcached-devel is &lt;1.4.39-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174017" version="1" comment="krb5-devel is &lt;1.12.5-40.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174018" version="1" comment="MozillaFirefox-devel is &lt;52.7.3esr-109.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174123" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174124" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174125" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174126" version="1" comment="graphite2-devel is &lt;1.3.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174127" version="1" comment="libvirt-devel is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169532" version="1" comment="libtiff-devel is &lt;4.0.9-44.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174173" version="1" comment="postgresql94-devel is &lt;9.4.17-21.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174174" version="1" comment="postgresql94-libs is &lt;9.4.17-21.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169533" version="1" comment="gwenhywfar-devel is &lt;4.9.0beta-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169534" version="1" comment="libgwengui-qt4-0 is &lt;4.9.0beta-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174296" version="1" comment="xen-devel is &lt;4.7.5_02-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169535" version="1" comment="postgresql94-devel is &lt;9.4.15-21.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169536" version="1" comment="postgresql94-libs is &lt;9.4.15-21.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169537" version="1" comment="libmysqlclient-devel is &lt;10.0.32-29.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169538" version="1" comment="libmysqld-devel is &lt;10.0.32-29.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169539" version="1" comment="libmysqld18 is &lt;10.0.32-29.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169580" version="1" comment="openslp-devel is &lt;2.0.0-18.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169837" version="1" comment="libcurl-devel is &lt;7.37.0-37.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169838" version="1" comment="mercurial is &lt;2.8.2-15.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169839" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-71.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169840" version="1" comment="libMagick++-devel is &lt;6.8.8.1-71.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169841" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-71.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161394" version="1" comment="libudev-devel is &lt;228-150.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161395" version="1" comment="systemd-devel is &lt;228-150.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161628" version="1" comment="tcmu-runner is &lt;1.2.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161629" version="1" comment="tcmu-runner-devel is &lt;1.2.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162132" version="1" comment="freeradius-server is &lt;3.0.15-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162133" version="1" comment="freeradius-server-devel is &lt;3.0.15-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162273" version="1" comment="libsmbclient-devel is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162274" version="1" comment="libwbclient-devel is &lt;4.6.7+git.38.90b2cdb4f22-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162339" version="1" comment="libzypp-devel is &lt;16.15.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162340" version="1" comment="libzypp-devel-doc is &lt;16.15.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162341" version="1" comment="yast2-pkg-bindings-devel-doc is &lt;3.2.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162452" version="1" comment="kernel-docs is &lt;4.4.82-6.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162453" version="1" comment="kernel-obs-build is &lt;4.4.82-6.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162916" version="1" comment="libixion-devel is &lt;0.12.1-13.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162917" version="1" comment="libmwaw-devel is &lt;0.3.11-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162918" version="1" comment="libmwaw-devel-doc is &lt;0.3.11-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162919" version="1" comment="liborcus-devel is &lt;0.12.1-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162940" version="1" comment="xen-devel is &lt;4.9.0_11-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162972" version="1" comment="libzypp-devel is &lt;16.15.6-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162973" version="1" comment="libzypp-devel-doc is &lt;16.15.6-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163604" version="1" comment="xen-devel is &lt;4.9.0_12-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164371" version="1" comment="kernel-docs is &lt;4.4.82-6.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164372" version="1" comment="kernel-obs-build is &lt;4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164738" version="1" comment="libspice-server-devel is &lt;0.12.8-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164801" version="1" comment="libvirt-devel is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165186" version="1" comment="libsmbclient-devel is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165187" version="1" comment="libwbclient-devel is &lt;4.6.7+git.51.327af8d0a11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165705" version="1" comment="xen-devel is &lt;4.9.0_14-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166043" version="1" comment="kernel-docs is &lt;4.4.92-6.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166044" version="1" comment="kernel-obs-build is &lt;4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166045" version="1" comment="libvirt-devel is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167341" version="1" comment="xen-devel is &lt;4.9.1_02-3.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167292" version="1" comment="libsmbclient-devel is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167293" version="1" comment="libwbclient-devel is &lt;4.6.9+git.59.c2cff9cea4c-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167790" version="1" comment="kernel-docs is &lt;4.4.92-6.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167791" version="1" comment="kernel-obs-build is &lt;4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168774" version="1" comment="kernel-docs is &lt;4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168775" version="1" comment="kernel-obs-build is &lt;4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169081" version="1" comment="kernel-docs is &lt;4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169082" version="1" comment="kernel-obs-build is &lt;4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170622" version="1" comment="libvirt-devel is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170623" version="1" comment="libtasn1-devel is &lt;4.9-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170859" version="1" comment="libXdmcp-devel is &lt;1.1.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170860" version="1" comment="libICE-devel is &lt;1.0.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170861" version="1" comment="libjasper-devel is &lt;1.900.14-195.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170980" version="1" comment="kernel-docs is &lt;4.4.114-94.11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170981" version="1" comment="kernel-obs-build is &lt;4.4.114-94.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171324" version="1" comment="xen-devel is &lt;4.9.1_08-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172860" version="1" comment="augeas-devel is &lt;1.2.0-17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173447" version="1" comment="libsmbclient-devel is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173448" version="1" comment="libtalloc-devel is &lt;2.1.10-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173449" version="1" comment="libtevent-devel is &lt;0.9.34-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173450" version="1" comment="libwbclient-devel is &lt;4.6.13+git.72.2a684235f41-3.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173451" version="1" comment="python-talloc-devel is &lt;2.1.10-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173639" version="1" comment="kernel-docs is &lt;4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173640" version="1" comment="kernel-obs-build is &lt;4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173805" version="1" comment="librelp is &lt;1.2.12-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173806" version="1" comment="librelp-devel is &lt;1.2.12-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174175" version="1" comment="spice-gtk-devel is &lt;0.33-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174176" version="1" comment="libidn-devel is &lt;1.28-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174357" version="1" comment="libvirt-devel is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174358" version="1" comment="zziplib-devel is &lt;0.13.67-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174368" version="1" comment="mercurial is &lt;2.8.2-15.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174369" version="1" comment="python3-devel is &lt;3.4.6-25.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174458" version="1" comment="evince-devel is &lt;3.20.2-6.22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174587" version="1" comment="ocaml-compiler-libs is &lt;4.03.0-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174588" version="1" comment="ocaml-rpm-macros is &lt;4.03.0-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174589" version="1" comment="ocaml-runtime is &lt;4.03.0-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174590" version="1" comment="wireshark-devel is &lt;2.2.14-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174761" version="1" comment="kernel-docs is &lt;4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174762" version="1" comment="kernel-obs-build is &lt;4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174763" version="1" comment="PackageKit-devel is &lt;1.1.3-24.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174764" version="1" comment="libpackagekit-glib2-devel is &lt;1.1.3-24.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175091" version="1" comment="boost-devel is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175092" version="1" comment="libboost_chrono1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175093" version="1" comment="libboost_context1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175094" version="1" comment="libboost_graph1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175095" version="1" comment="libboost_graph_parallel1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175096" version="1" comment="libboost_log1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175097" version="1" comment="libboost_math1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175098" version="1" comment="libboost_mpi1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175099" version="1" comment="libboost_python1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175100" version="1" comment="libboost_serialization1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175101" version="1" comment="libboost_test1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175102" version="1" comment="libboost_timer1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175103" version="1" comment="libboost_wave1_54_0 is &lt;1.54.0-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175104" version="1" comment="libepubgen-devel is &lt;0.1.0-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175105" version="1" comment="libixion-devel is &lt;0.13.0-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175106" version="1" comment="libmwaw-devel is &lt;0.3.13-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175107" version="1" comment="libmwaw-devel-doc is &lt;0.3.13-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175108" version="1" comment="liborcus-devel is &lt;0.13.4-10.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175109" version="1" comment="libqxp-devel is &lt;0.0.1-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175110" version="1" comment="libqxp-doc is &lt;0.0.1-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175111" version="1" comment="libqxp-tools is &lt;0.0.1-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175112" version="1" comment="libwps-devel is &lt;0.4.7-10.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169776" version="1" comment="kernel-docs is &lt;4.4.103-94.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169777" version="1" comment="kernel-obs-build is &lt;4.4.103-94.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102890" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102615" version="1" comment="docker is &lt;1.3.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102864" version="1" comment="ruby2.1-rubygem-sle2docker is &lt;0.2.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102866" version="1" comment="sle2docker is &lt;0.2.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103129" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101432" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.71-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101433" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.71-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101706" version="1" comment="rsyslog-diag-tools is &lt;8.4.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101707" version="1" comment="rsyslog-doc is &lt;8.4.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101711" version="1" comment="rsyslog-module-gssapi is &lt;8.4.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101712" version="1" comment="rsyslog-module-gtls is &lt;8.4.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101715" version="1" comment="rsyslog-module-mysql is &lt;8.4.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101716" version="1" comment="rsyslog-module-pgsql is &lt;8.4.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101717" version="1" comment="rsyslog-module-relp is &lt;8.4.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101718" version="1" comment="rsyslog-module-snmp is &lt;8.4.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101719" version="1" comment="rsyslog-module-udpspoof is &lt;8.4.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102649" version="1" comment="libfreebl3-hmac is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102650" version="1" comment="libfreebl3-hmac-32bit is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102653" version="1" comment="libsoftokn3-hmac is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102654" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102876" version="1" comment="python-32bit is &lt;2.7.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102870" version="1" comment="python-base-32bit is &lt;2.7.7-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102878" version="1" comment="python-demo is &lt;2.7.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102873" version="1" comment="python-doc is &lt;2.7.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102874" version="1" comment="python-doc-pdf is &lt;2.7.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102879" version="1" comment="python-gdbm is &lt;2.7.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102880" version="1" comment="python-idle is &lt;2.7.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102667" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102668" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102670" version="1" comment="openssl-doc is &lt;1.0.1i-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102478" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr2.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102483" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr2.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102485" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr2.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118581" version="1" comment="xen-doc-html is &lt;4.4.3_06-22.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118582" version="1" comment="xen-tools is &lt;4.4.3_06-22.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118583" version="1" comment="xen-tools-domU is &lt;4.4.3_06-22.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119336" version="1" comment="bind-chrootenv is &lt;9.9.6P1-28.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119337" version="1" comment="bind-doc is &lt;9.9.6P1-28.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119802" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02~beta2-56.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119803" version="1" comment="grub2-s390x-emu is &lt;2.02~beta2-56.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107622" version="1" comment="postgresql93-contrib is &lt;9.3.6-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107623" version="1" comment="postgresql93-docs is &lt;9.3.6-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107627" version="1" comment="postgresql93-server is &lt;9.3.6-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107692" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.75-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107693" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.75-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107856" version="1" comment="vsftpd is &lt;3.0.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107812" version="1" comment="glibc-html is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107814" version="1" comment="glibc-info is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107817" version="1" comment="glibc-profile is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107823" version="1" comment="glibc-profile-32bit is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107834" version="1" comment="kernel-default-base is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107853" version="1" comment="kernel-default-man is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107847" version="1" comment="kernel-xen-base is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107892" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107893" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107895" version="1" comment="openssl-doc is &lt;1.0.1i-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108136" version="1" comment="xen-doc-html is &lt;4.4.1_10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108138" version="1" comment="xen-tools is &lt;4.4.1_10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108135" version="1" comment="xen-tools-domU is &lt;4.4.1_10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108370" version="1" comment="kernel-default-base is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108389" version="1" comment="kernel-default-man is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108383" version="1" comment="kernel-xen-base is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108661" version="1" comment="xen-doc-html is &lt;4.4.2_02-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108663" version="1" comment="xen-tools is &lt;4.4.2_02-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108660" version="1" comment="xen-tools-domU is &lt;4.4.2_02-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108910" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108935" version="1" comment="mariadb-tools is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109138" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.79-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109139" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.79-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109681" version="1" comment="qemu-block-rbd is &lt;2.0.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109670" version="1" comment="qemu-guest-agent is &lt;2.0.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109673" version="1" comment="qemu-lang is &lt;2.0.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109674" version="1" comment="qemu-ppc is &lt;2.0.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109675" version="1" comment="qemu-s390 is &lt;2.0.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109720" version="1" comment="xen-doc-html is &lt;4.4.2_04-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109722" version="1" comment="xen-tools is &lt;4.4.2_04-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109719" version="1" comment="xen-tools-domU is &lt;4.4.2_04-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105318" version="1" comment="kernel-default-base is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105334" version="1" comment="kernel-default-man is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105331" version="1" comment="kernel-xen-base is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109985" version="1" comment="apache2-doc is &lt;2.4.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109987" version="1" comment="apache2-example-pages is &lt;2.4.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109988" version="1" comment="apache2-prefork is &lt;2.4.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109989" version="1" comment="apache2-utils is &lt;2.4.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109990" version="1" comment="apache2-worker is &lt;2.4.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105454" version="1" comment="libfreebl3-hmac is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105455" version="1" comment="libfreebl3-hmac-32bit is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105458" version="1" comment="libsoftokn3-hmac is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105459" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110334" version="1" comment="xen-doc-html is &lt;4.4.2_06-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110336" version="1" comment="xen-tools is &lt;4.4.2_06-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110333" version="1" comment="xen-tools-domU is &lt;4.4.2_06-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110508" version="1" comment="kernel-default-base is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110527" version="1" comment="kernel-default-man is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110521" version="1" comment="kernel-xen-base is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110532" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110537" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110539" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110568" version="1" comment="openldap2-back-meta is &lt;2.4.39-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105399" version="1" comment="docker is &lt;1.4.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110700" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110701" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110703" version="1" comment="openssl-doc is &lt;1.0.1i-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110853" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110854" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111025" version="1" comment="bind-chrootenv is &lt;9.9.6P1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111027" version="1" comment="bind-doc is &lt;9.9.6P1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111451" version="1" comment="postgresql93-contrib is &lt;9.3.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111452" version="1" comment="postgresql93-docs is &lt;9.3.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111456" version="1" comment="postgresql93-server is &lt;9.3.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111481" version="1" comment="libfreebl3-hmac is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111482" version="1" comment="libfreebl3-hmac-32bit is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111485" version="1" comment="libsoftokn3-hmac is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111486" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111471" version="1" comment="mariadb-tools is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111358" version="1" comment="krb5-32bit is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111359" version="1" comment="krb5-client is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111362" version="1" comment="krb5-doc is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111363" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111364" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111365" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111366" version="1" comment="krb5-server is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111433" version="1" comment="tomcat is &lt;7.0.55-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111434" version="1" comment="tomcat-admin-webapps is &lt;7.0.55-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111435" version="1" comment="tomcat-docs-webapp is &lt;7.0.55-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111436" version="1" comment="tomcat-el-2_2-api is &lt;7.0.55-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111438" version="1" comment="tomcat-javadoc is &lt;7.0.55-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111439" version="1" comment="tomcat-jsp-2_2-api is &lt;7.0.55-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111441" version="1" comment="tomcat-lib is &lt;7.0.55-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111442" version="1" comment="tomcat-servlet-3_0-api is &lt;7.0.55-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111443" version="1" comment="tomcat-webapps is &lt;7.0.55-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111505" version="1" comment="xen-doc-html is &lt;4.4.2_08-22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111507" version="1" comment="xen-tools is &lt;4.4.2_08-22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111504" version="1" comment="xen-tools-domU is &lt;4.4.2_08-22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111512" version="1" comment="bind-chrootenv is &lt;9.9.6P1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111514" version="1" comment="bind-doc is &lt;9.9.6P1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111528" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.85-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111529" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.85-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111573" version="1" comment="kernel-default-base is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111592" version="1" comment="kernel-default-man is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111586" version="1" comment="kernel-xen-base is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105430" version="1" comment="bind-chrootenv is &lt;9.9.5P1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105432" version="1" comment="bind-doc is &lt;9.9.5P1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113275" version="1" comment="python-32bit is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113269" version="1" comment="python-base-32bit is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113277" version="1" comment="python-demo is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113272" version="1" comment="python-doc is &lt;2.7.9-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113273" version="1" comment="python-doc-pdf is &lt;2.7.9-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113278" version="1" comment="python-gdbm is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113279" version="1" comment="python-idle is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113782" version="1" comment="xen-doc-html is &lt;4.4.2_10-22.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113784" version="1" comment="xen-tools is &lt;4.4.2_10-22.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113781" version="1" comment="xen-tools-domU is &lt;4.4.2_10-22.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113858" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113859" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113861" version="1" comment="openssl-doc is &lt;1.0.1i-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114069" version="1" comment="libfreebl3-hmac is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114070" version="1" comment="libfreebl3-hmac-32bit is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114073" version="1" comment="libsoftokn3-hmac is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114074" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114050" version="1" comment="bind-chrootenv is &lt;9.9.6P1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114052" version="1" comment="bind-doc is &lt;9.9.6P1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105749" version="1" comment="kernel-default-base is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105765" version="1" comment="kernel-default-man is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105762" version="1" comment="kernel-xen-base is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114278" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114267" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114270" version="1" comment="qemu-lang is &lt;2.0.2-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114271" version="1" comment="qemu-ppc is &lt;2.0.2-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114272" version="1" comment="qemu-s390 is &lt;2.0.2-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105787" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105788" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105790" version="1" comment="openssl-doc is &lt;1.0.1i-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105927" version="1" comment="powerpc-utils is &lt;1.2.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114433" version="1" comment="kernel-default-base is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114452" version="1" comment="kernel-default-man is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114446" version="1" comment="kernel-xen-base is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105976" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114986" version="1" comment="kernel-default-base is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115005" version="1" comment="kernel-default-man is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114999" version="1" comment="kernel-xen-base is &lt;3.12.48-52.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106074" version="1" comment="strongswan is &lt;5.1.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106075" version="1" comment="strongswan-doc is &lt;5.1.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106076" version="1" comment="strongswan-hmac is &lt;5.1.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106077" version="1" comment="strongswan-ipsec is &lt;5.1.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106078" version="1" comment="strongswan-libs0 is &lt;5.1.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115080" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115069" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115072" version="1" comment="qemu-lang is &lt;2.0.2-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115073" version="1" comment="qemu-ppc is &lt;2.0.2-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115074" version="1" comment="qemu-s390 is &lt;2.0.2-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106089" version="1" comment="krb5-doc is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106090" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106091" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106092" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106093" version="1" comment="krb5-server is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115144" version="1" comment="postgresql93-contrib is &lt;9.3.10-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115145" version="1" comment="postgresql93-docs is &lt;9.3.10-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115149" version="1" comment="postgresql93-server is &lt;9.3.10-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115388" version="1" comment="glibc-html is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115390" version="1" comment="glibc-info is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115393" version="1" comment="glibc-profile is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115399" version="1" comment="glibc-profile-32bit is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115406" version="1" comment="apache2-doc is &lt;2.4.10-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115408" version="1" comment="apache2-example-pages is &lt;2.4.10-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115400" version="1" comment="apache2-mod_auth_kerb is &lt;5.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115402" version="1" comment="apache2-mod_jk is &lt;1.2.40-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115403" version="1" comment="apache2-mod_security2 is &lt;2.8.0-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115409" version="1" comment="apache2-prefork is &lt;2.4.10-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115410" version="1" comment="apache2-utils is &lt;2.4.10-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115411" version="1" comment="apache2-worker is &lt;2.4.10-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115936" version="1" comment="xen-doc-html is &lt;4.4.3_02-22.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115938" version="1" comment="xen-tools is &lt;4.4.3_02-22.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115935" version="1" comment="xen-tools-domU is &lt;4.4.3_02-22.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105065" version="1" comment="xen-doc-html is &lt;4.4.1_08-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105067" version="1" comment="xen-tools is &lt;4.4.1_08-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105064" version="1" comment="xen-tools-domU is &lt;4.4.1_08-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106153" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr2.10-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106158" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr2.10-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106160" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr2.10-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116169" version="1" comment="dracut-fips is &lt;037-51.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106369" version="1" comment="qemu-guest-agent is &lt;2.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106372" version="1" comment="qemu-lang is &lt;2.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106373" version="1" comment="qemu-ppc is &lt;2.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106374" version="1" comment="qemu-s390 is &lt;2.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118696" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118697" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118698" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118177" version="1" comment="kernel-default-base is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118178" version="1" comment="kernel-default-man is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118179" version="1" comment="kernel-xen-base is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118735" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-27.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118736" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-27.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118737" version="1" comment="openssl-doc is &lt;1.0.1i-27.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118576" version="1" comment="krb5-doc is &lt;1.12.1-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118577" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118578" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118579" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118580" version="1" comment="krb5-server is &lt;1.12.1-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119204" version="1" comment="tdb-tools is &lt;1.3.8-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129307" version="1" comment="kernel-default-base is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129308" version="1" comment="kernel-default-man is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129309" version="1" comment="kernel-xen-base is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129310" version="1" comment="dhcp-relay is &lt;4.2.6-14.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129311" version="1" comment="dhcp-server is &lt;4.2.6-14.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129428" version="1" comment="kernel-default-base is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129429" version="1" comment="kernel-default-man is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129430" version="1" comment="kernel-xen-base is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129431" version="1" comment="glibc-html is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129432" version="1" comment="glibc-info is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129433" version="1" comment="glibc-profile is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129434" version="1" comment="glibc-profile-32bit is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121158" version="1" comment="kernel-default-base is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121159" version="1" comment="kernel-default-man is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121160" version="1" comment="kernel-xen-base is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118767" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118768" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118769" version="1" comment="qemu-lang is &lt;2.0.2-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118770" version="1" comment="qemu-ppc is &lt;2.0.2-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118771" version="1" comment="qemu-s390 is &lt;2.0.2-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121341" version="1" comment="libxml2-doc is &lt;2.9.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121660" version="1" comment="bind-chrootenv is &lt;9.9.6P1-28.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121661" version="1" comment="bind-doc is &lt;9.9.6P1-28.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121656" version="1" comment="giflib-progs is &lt;5.0.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121657" version="1" comment="kernel-default-base is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121658" version="1" comment="kernel-default-man is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121659" version="1" comment="kernel-xen-base is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120963" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120993" version="1" comment="apache-commons-collections is &lt;3.2.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120994" version="1" comment="apache-commons-collections-javadoc is &lt;3.2.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131849" version="1" comment="ctdb is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131850" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131851" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131852" version="1" comment="libdcerpc0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131853" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131854" version="1" comment="libgensec0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131855" version="1" comment="libgensec0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131856" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131857" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131858" version="1" comment="libndr-nbt0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131859" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131860" version="1" comment="libndr-standard0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131861" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131862" version="1" comment="libndr0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131863" version="1" comment="libndr0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131864" version="1" comment="libnetapi0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131865" version="1" comment="libnetapi0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131866" version="1" comment="libregistry0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131867" version="1" comment="libsamba-credentials0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131868" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131869" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131870" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131871" version="1" comment="libsamba-passdb0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131872" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131873" version="1" comment="libsamba-util0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131874" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131875" version="1" comment="libsamdb0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131876" version="1" comment="libsamdb0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131877" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131878" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131879" version="1" comment="libsmbclient0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131880" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131881" version="1" comment="libsmbconf0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131882" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131883" version="1" comment="libsmbldap0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131884" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131885" version="1" comment="libtevent-util0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131886" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131887" version="1" comment="libwbclient0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131888" version="1" comment="libwbclient0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131889" version="1" comment="samba is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131890" version="1" comment="samba-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131891" version="1" comment="samba-client is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131892" version="1" comment="samba-client-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131893" version="1" comment="samba-doc is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131894" version="1" comment="samba-libs is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131895" version="1" comment="samba-libs-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131896" version="1" comment="samba-winbind is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131897" version="1" comment="samba-winbind-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131898" version="1" comment="kernel-default-man is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135501" version="1" comment="qemu-ppc is &lt;2.0.2-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135502" version="1" comment="qemu-s390 is &lt;2.0.2-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122056" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.95-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122057" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.95-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136125" version="1" comment="qemu-ppc is &lt;2.0.2-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136126" version="1" comment="qemu-s390 is &lt;2.0.2-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141195" version="1" comment="kernel-default-man is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144670" version="1" comment="kernel-default-man is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121021" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122776" version="1" comment="libfreebl3-hmac is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122777" version="1" comment="libfreebl3-hmac-32bit is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122778" version="1" comment="libsoftokn3-hmac is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122779" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122499" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.30-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122500" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.30-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122501" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.30-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122502" version="1" comment="krb5-doc is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122503" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122504" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122505" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122506" version="1" comment="krb5-server is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122344" version="1" comment="glibc-html is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122345" version="1" comment="glibc-info is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122346" version="1" comment="glibc-profile is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122347" version="1" comment="glibc-profile-32bit is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123492" version="1" comment="postgresql93-contrib is &lt;9.3.11-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123493" version="1" comment="postgresql93-docs is &lt;9.3.11-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123494" version="1" comment="postgresql93-server is &lt;9.3.11-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122226" version="1" comment="dhcp-relay is &lt;4.2.6-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122227" version="1" comment="dhcp-server is &lt;4.2.6-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123671" version="1" comment="postgresql94-contrib is &lt;9.4.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123672" version="1" comment="postgresql94-docs is &lt;9.4.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123673" version="1" comment="postgresql94-server is &lt;9.4.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123876" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-27.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123877" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-27.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123878" version="1" comment="openssl-doc is &lt;1.0.1i-27.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119301" version="1" comment="libxml2-doc is &lt;2.9.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124613" version="1" comment="libfreebl3-hmac is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124614" version="1" comment="libfreebl3-hmac-32bit is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124615" version="1" comment="libsoftokn3-hmac is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124616" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124738" version="1" comment="bind-chrootenv is &lt;9.9.6P1-28.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124739" version="1" comment="bind-doc is &lt;9.9.6P1-28.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124828" version="1" comment="kernel-default-base is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124829" version="1" comment="kernel-default-man is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124830" version="1" comment="kernel-xen-base is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125032" version="1" comment="tomcat is &lt;7.0.68-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125033" version="1" comment="tomcat-admin-webapps is &lt;7.0.68-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125034" version="1" comment="tomcat-docs-webapp is &lt;7.0.68-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125035" version="1" comment="tomcat-el-2_2-api is &lt;7.0.68-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125036" version="1" comment="tomcat-javadoc is &lt;7.0.68-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125037" version="1" comment="tomcat-jsp-2_2-api is &lt;7.0.68-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125038" version="1" comment="tomcat-lib is &lt;7.0.68-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125039" version="1" comment="tomcat-servlet-3_0-api is &lt;7.0.68-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125040" version="1" comment="tomcat-webapps is &lt;7.0.68-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125675" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.99-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125676" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.99-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125942" version="1" comment="krb5-doc is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125943" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125944" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125945" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125946" version="1" comment="krb5-server is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126435" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126436" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127086" version="1" comment="libxml2-doc is &lt;2.9.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127141" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-27.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127142" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-27.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127143" version="1" comment="openssl-doc is &lt;1.0.1i-27.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127280" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.101-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127281" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.101-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127554" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.40-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127555" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.40-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127556" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.40-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127599" version="1" comment="xen-doc-html is &lt;4.4.4_02-22.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127600" version="1" comment="xen-tools is &lt;4.4.4_02-22.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127601" version="1" comment="xen-tools-domU is &lt;4.4.4_02-22.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128017" version="1" comment="openssh-fips is &lt;6.6p1-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121342" version="1" comment="openssh-fips is &lt;6.6p1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128323" version="1" comment="cyrus-imapd is &lt;2.3.18-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128324" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.18-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128325" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.18-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119528" version="1" comment="mariadb-tools is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128621" version="1" comment="libxml2-doc is &lt;2.9.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128803" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128804" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128805" version="1" comment="qemu-lang is &lt;2.0.2-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128806" version="1" comment="qemu-ppc is &lt;2.0.2-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128807" version="1" comment="qemu-s390 is &lt;2.0.2-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128913" version="1" comment="kernel-default-base is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128914" version="1" comment="kernel-default-man is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128915" version="1" comment="kernel-xen-base is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128959" version="1" comment="mariadb-tools is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120783" version="1" comment="libfreebl3-hmac is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120784" version="1" comment="libfreebl3-hmac-32bit is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120785" version="1" comment="libsoftokn3-hmac is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120786" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157745" version="1" comment="kernel-default-man is &lt;3.12.61-52.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161552" version="1" comment="kernel-default-man is &lt;3.12.61-52.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161832" version="1" comment="kernel-default-man is &lt;3.12.61-52.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163744" version="1" comment="kgraft-patch-3_12_61-52_86-default is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163745" version="1" comment="kgraft-patch-3_12_61-52_86-xen is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163746" version="1" comment="kgraft-patch-SLE12_Update_25 is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163747" version="1" comment="kgraft-patch-3_12_61-52_89-default is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163748" version="1" comment="kgraft-patch-3_12_61-52_89-xen is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163749" version="1" comment="kgraft-patch-SLE12_Update_26 is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163751" version="1" comment="kgraft-patch-3_12_61-52_69-default is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163752" version="1" comment="kgraft-patch-3_12_61-52_69-xen is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163753" version="1" comment="kgraft-patch-SLE12_Update_20 is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163754" version="1" comment="kgraft-patch-3_12_61-52_77-default is &lt;4-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163755" version="1" comment="kgraft-patch-3_12_61-52_77-xen is &lt;4-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163756" version="1" comment="kgraft-patch-SLE12_Update_22 is &lt;4-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163757" version="1" comment="kgraft-patch-3_12_61-52_80-default is &lt;3-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163758" version="1" comment="kgraft-patch-3_12_61-52_80-xen is &lt;3-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163759" version="1" comment="kgraft-patch-SLE12_Update_23 is &lt;3-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163760" version="1" comment="kgraft-patch-3_12_61-52_83-default is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163761" version="1" comment="kgraft-patch-3_12_61-52_83-xen is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163762" version="1" comment="kgraft-patch-SLE12_Update_24 is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163763" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;9-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163764" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;9-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163765" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;9-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163766" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163767" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163768" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163769" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163770" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163771" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163772" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;7-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163773" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;7-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163774" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;7-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163775" version="1" comment="kgraft-patch-3_12_61-52_72-default is &lt;4-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163776" version="1" comment="kgraft-patch-3_12_61-52_72-xen is &lt;4-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163777" version="1" comment="kgraft-patch-SLE12_Update_21 is &lt;4-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164498" version="1" comment="kernel-default is &lt;3.12.61-52.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164499" version="1" comment="kernel-default-base is &lt;3.12.61-52.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164500" version="1" comment="kernel-default-devel is &lt;3.12.61-52.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164501" version="1" comment="kernel-default-man is &lt;3.12.61-52.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164502" version="1" comment="kernel-devel is &lt;3.12.61-52.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164503" version="1" comment="kernel-macros is &lt;3.12.61-52.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164504" version="1" comment="kernel-source is &lt;3.12.61-52.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164505" version="1" comment="kernel-syms is &lt;3.12.61-52.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164506" version="1" comment="kernel-xen is &lt;3.12.61-52.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164507" version="1" comment="kernel-xen-base is &lt;3.12.61-52.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164508" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164509" version="1" comment="kgraft-patch-3_12_61-52_92-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164510" version="1" comment="kgraft-patch-3_12_61-52_92-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164511" version="1" comment="kgraft-patch-SLE12_Update_27 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164847" version="1" comment="dnsmasq is &lt;2.78-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165188" version="1" comment="dracut is &lt;037-51.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165189" version="1" comment="dracut-fips is &lt;037-51.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165228" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165229" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165230" version="1" comment="libdcerpc0 is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165231" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165232" version="1" comment="libgensec0 is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165233" version="1" comment="libgensec0-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165234" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165235" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165236" version="1" comment="libndr-nbt0 is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165237" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165238" version="1" comment="libndr-standard0 is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165239" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165240" version="1" comment="libndr0 is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165241" version="1" comment="libndr0-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165242" version="1" comment="libnetapi0 is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165243" version="1" comment="libnetapi0-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165244" version="1" comment="libregistry0 is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165245" version="1" comment="libsamba-credentials0 is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165246" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165247" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165248" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165249" version="1" comment="libsamba-passdb0 is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165250" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165251" version="1" comment="libsamba-util0 is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165252" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165253" version="1" comment="libsamdb0 is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165254" version="1" comment="libsamdb0-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165255" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165256" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165257" version="1" comment="libsmbclient0 is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165258" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165259" version="1" comment="libsmbconf0 is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165260" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165261" version="1" comment="libsmbldap0 is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165262" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165263" version="1" comment="libtevent-util0 is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165264" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165265" version="1" comment="libwbclient0 is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165266" version="1" comment="libwbclient0-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165267" version="1" comment="samba-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165268" version="1" comment="samba-client is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165269" version="1" comment="samba-client-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165270" version="1" comment="samba-doc is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165271" version="1" comment="samba-libs is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165272" version="1" comment="samba-libs-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165273" version="1" comment="samba-winbind is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165274" version="1" comment="samba-winbind-32bit is &lt;4.2.4-18.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165753" version="1" comment="apache2 is &lt;2.4.10-14.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165754" version="1" comment="apache2-doc is &lt;2.4.10-14.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165755" version="1" comment="apache2-example-pages is &lt;2.4.10-14.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165756" version="1" comment="apache2-prefork is &lt;2.4.10-14.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165757" version="1" comment="apache2-utils is &lt;2.4.10-14.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165758" version="1" comment="apache2-worker is &lt;2.4.10-14.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165814" version="1" comment="kgraft-patch-3_12_61-52_89-default is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165815" version="1" comment="kgraft-patch-3_12_61-52_89-xen is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165816" version="1" comment="kgraft-patch-SLE12_Update_26 is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165817" version="1" comment="kgraft-patch-3_12_61-52_86-default is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165818" version="1" comment="kgraft-patch-3_12_61-52_86-xen is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165819" version="1" comment="kgraft-patch-SLE12_Update_25 is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165820" version="1" comment="kgraft-patch-3_12_61-52_80-default is &lt;4-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165821" version="1" comment="kgraft-patch-3_12_61-52_80-xen is &lt;4-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165822" version="1" comment="kgraft-patch-SLE12_Update_23 is &lt;4-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165823" version="1" comment="kgraft-patch-3_12_61-52_77-default is &lt;5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165824" version="1" comment="kgraft-patch-3_12_61-52_77-xen is &lt;5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165825" version="1" comment="kgraft-patch-SLE12_Update_22 is &lt;5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165826" version="1" comment="kgraft-patch-3_12_61-52_69-default is &lt;6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165827" version="1" comment="kgraft-patch-3_12_61-52_69-xen is &lt;6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165828" version="1" comment="kgraft-patch-SLE12_Update_20 is &lt;6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165829" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165830" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165831" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165832" version="1" comment="kgraft-patch-3_12_61-52_92-default is &lt;2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165833" version="1" comment="kgraft-patch-3_12_61-52_92-xen is &lt;2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165834" version="1" comment="kgraft-patch-SLE12_Update_27 is &lt;2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165835" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165836" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165837" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165838" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165839" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165840" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165841" version="1" comment="kgraft-patch-3_12_61-52_83-default is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165842" version="1" comment="kgraft-patch-3_12_61-52_83-xen is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165843" version="1" comment="kgraft-patch-SLE12_Update_24 is &lt;3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165844" version="1" comment="kgraft-patch-3_12_61-52_72-default is &lt;5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165845" version="1" comment="kgraft-patch-3_12_61-52_72-xen is &lt;5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165846" version="1" comment="kgraft-patch-SLE12_Update_21 is &lt;5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165847" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165848" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165849" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166102" version="1" comment="xen is &lt;4.4.4_24-22.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166103" version="1" comment="xen-doc-html is &lt;4.4.4_24-22.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166104" version="1" comment="xen-kmp-default is &lt;4.4.4_24_k3.12.61_52.92-22.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166105" version="1" comment="xen-libs is &lt;4.4.4_24-22.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166106" version="1" comment="xen-libs-32bit is &lt;4.4.4_24-22.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166107" version="1" comment="xen-tools is &lt;4.4.4_24-22.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166108" version="1" comment="xen-tools-domU is &lt;4.4.4_24-22.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166470" version="1" comment="kernel-default is &lt;3.12.61-52.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166471" version="1" comment="kernel-default-base is &lt;3.12.61-52.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166472" version="1" comment="kernel-default-devel is &lt;3.12.61-52.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166473" version="1" comment="kernel-default-man is &lt;3.12.61-52.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166474" version="1" comment="kernel-devel is &lt;3.12.61-52.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166475" version="1" comment="kernel-macros is &lt;3.12.61-52.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166476" version="1" comment="kernel-source is &lt;3.12.61-52.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166477" version="1" comment="kernel-syms is &lt;3.12.61-52.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166478" version="1" comment="kernel-xen is &lt;3.12.61-52.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166479" version="1" comment="kernel-xen-base is &lt;3.12.61-52.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166480" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166481" version="1" comment="kgraft-patch-3_12_61-52_101-default is &lt;1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166482" version="1" comment="kgraft-patch-3_12_61-52_101-xen is &lt;1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166483" version="1" comment="kgraft-patch-SLE12_Update_28 is &lt;1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166709" version="1" comment="qemu is &lt;2.0.2-48.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166710" version="1" comment="qemu-block-curl is &lt;2.0.2-48.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166711" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166712" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166713" version="1" comment="qemu-ipxe is &lt;1.0.0-48.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166714" version="1" comment="qemu-kvm is &lt;2.0.2-48.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166715" version="1" comment="qemu-lang is &lt;2.0.2-48.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166716" version="1" comment="qemu-ppc is &lt;2.0.2-48.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166717" version="1" comment="qemu-s390 is &lt;2.0.2-48.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166718" version="1" comment="qemu-seabios is &lt;1.7.4-48.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166719" version="1" comment="qemu-sgabios is &lt;8-48.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166720" version="1" comment="qemu-tools is &lt;2.0.2-48.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166721" version="1" comment="qemu-vgabios is &lt;1.7.4-48.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166722" version="1" comment="qemu-x86 is &lt;2.0.2-48.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167018" version="1" comment="tomcat is &lt;7.0.82-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167019" version="1" comment="tomcat-admin-webapps is &lt;7.0.82-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167020" version="1" comment="tomcat-docs-webapp is &lt;7.0.82-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167021" version="1" comment="tomcat-el-2_2-api is &lt;7.0.82-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167022" version="1" comment="tomcat-javadoc is &lt;7.0.82-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167023" version="1" comment="tomcat-jsp-2_2-api is &lt;7.0.82-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167024" version="1" comment="tomcat-lib is &lt;7.0.82-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167025" version="1" comment="tomcat-servlet-3_0-api is &lt;7.0.82-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167026" version="1" comment="tomcat-webapps is &lt;7.0.82-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167233" version="1" comment="kgraft-patch-3_12_61-52_80-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167234" version="1" comment="kgraft-patch-3_12_61-52_80-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167235" version="1" comment="kgraft-patch-SLE12_Update_23 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167342" version="1" comment="kgraft-patch-3_12_61-52_92-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167343" version="1" comment="kgraft-patch-3_12_61-52_92-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167344" version="1" comment="kgraft-patch-SLE12_Update_27 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167345" version="1" comment="kgraft-patch-3_12_61-52_89-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167346" version="1" comment="kgraft-patch-3_12_61-52_89-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167347" version="1" comment="kgraft-patch-SLE12_Update_26 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167348" version="1" comment="kgraft-patch-3_12_61-52_86-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167349" version="1" comment="kgraft-patch-3_12_61-52_86-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167350" version="1" comment="kgraft-patch-SLE12_Update_25 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167351" version="1" comment="kgraft-patch-3_12_61-52_83-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167352" version="1" comment="kgraft-patch-3_12_61-52_83-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167353" version="1" comment="kgraft-patch-SLE12_Update_24 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167354" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167355" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167356" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167397" version="1" comment="kgraft-patch-3_12_61-52_77-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167398" version="1" comment="kgraft-patch-3_12_61-52_77-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167399" version="1" comment="kgraft-patch-SLE12_Update_22 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167400" version="1" comment="kgraft-patch-3_12_61-52_72-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167401" version="1" comment="kgraft-patch-3_12_61-52_72-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167402" version="1" comment="kgraft-patch-SLE12_Update_21 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167403" version="1" comment="kgraft-patch-3_12_61-52_69-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167404" version="1" comment="kgraft-patch-3_12_61-52_69-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167405" version="1" comment="kgraft-patch-SLE12_Update_20 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167406" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167407" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167408" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167409" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167410" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167411" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167992" version="1" comment="xen is &lt;4.4.4_26-22.59.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167993" version="1" comment="xen-doc-html is &lt;4.4.4_26-22.59.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167994" version="1" comment="xen-kmp-default is &lt;4.4.4_26_k3.12.61_52.101-22.59.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167995" version="1" comment="xen-libs is &lt;4.4.4_26-22.59.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167996" version="1" comment="xen-libs-32bit is &lt;4.4.4_26-22.59.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167997" version="1" comment="xen-tools is &lt;4.4.4_26-22.59.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167998" version="1" comment="xen-tools-domU is &lt;4.4.4_26-22.59.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167999" version="1" comment="kernel-default is &lt;3.12.61-52.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168000" version="1" comment="kernel-default-base is &lt;3.12.61-52.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168001" version="1" comment="kernel-default-devel is &lt;3.12.61-52.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168002" version="1" comment="kernel-default-man is &lt;3.12.61-52.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168003" version="1" comment="kernel-devel is &lt;3.12.61-52.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168004" version="1" comment="kernel-macros is &lt;3.12.61-52.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168005" version="1" comment="kernel-source is &lt;3.12.61-52.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168006" version="1" comment="kernel-syms is &lt;3.12.61-52.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168007" version="1" comment="kernel-xen is &lt;3.12.61-52.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168008" version="1" comment="kernel-xen-base is &lt;3.12.61-52.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168009" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168010" version="1" comment="kgraft-patch-3_12_61-52_106-default is &lt;1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168011" version="1" comment="kgraft-patch-3_12_61-52_106-xen is &lt;1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168012" version="1" comment="kgraft-patch-SLE12_Update_29 is &lt;1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168434" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168435" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168436" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168437" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168438" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168439" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168440" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168441" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168442" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168443" version="1" comment="kgraft-patch-3_12_61-52_101-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168444" version="1" comment="kgraft-patch-3_12_61-52_101-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168445" version="1" comment="kgraft-patch-SLE12_Update_28 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168446" version="1" comment="kgraft-patch-3_12_61-52_72-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168447" version="1" comment="kgraft-patch-3_12_61-52_72-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168448" version="1" comment="kgraft-patch-SLE12_Update_21 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168449" version="1" comment="kgraft-patch-3_12_61-52_69-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168450" version="1" comment="kgraft-patch-3_12_61-52_69-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168451" version="1" comment="kgraft-patch-SLE12_Update_20 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168452" version="1" comment="kgraft-patch-3_12_61-52_80-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168453" version="1" comment="kgraft-patch-3_12_61-52_80-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168454" version="1" comment="kgraft-patch-SLE12_Update_23 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168455" version="1" comment="kgraft-patch-3_12_61-52_77-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168456" version="1" comment="kgraft-patch-3_12_61-52_77-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168457" version="1" comment="kgraft-patch-SLE12_Update_22 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168458" version="1" comment="kgraft-patch-3_12_61-52_86-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168459" version="1" comment="kgraft-patch-3_12_61-52_86-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168460" version="1" comment="kgraft-patch-SLE12_Update_25 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168461" version="1" comment="kgraft-patch-3_12_61-52_83-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168462" version="1" comment="kgraft-patch-3_12_61-52_83-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168463" version="1" comment="kgraft-patch-SLE12_Update_24 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168464" version="1" comment="kgraft-patch-3_12_61-52_92-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168465" version="1" comment="kgraft-patch-3_12_61-52_92-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168466" version="1" comment="kgraft-patch-SLE12_Update_27 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168467" version="1" comment="kgraft-patch-3_12_61-52_89-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168468" version="1" comment="kgraft-patch-3_12_61-52_89-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168469" version="1" comment="kgraft-patch-SLE12_Update_26 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168470" version="1" comment="kgraft-patch-3_12_61-52_106-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168471" version="1" comment="kgraft-patch-3_12_61-52_106-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168472" version="1" comment="kgraft-patch-SLE12_Update_29 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148461" version="1" comment="kernel-default-man is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149459" version="1" comment="qemu-ppc is &lt;2.0.2-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149460" version="1" comment="qemu-s390 is &lt;2.0.2-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150247" version="1" comment="kernel-default-man is &lt;3.12.61-52.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155360" version="1" comment="kernel-default-man is &lt;3.12.61-52.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157045" version="1" comment="kernel-default-man is &lt;3.12.61-52.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170257" version="1" comment="kgraft-patch-3_12_61-52_111-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170258" version="1" comment="kgraft-patch-3_12_61-52_111-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170259" version="1" comment="kgraft-patch-SLE12_Update_30 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170260" version="1" comment="kgraft-patch-3_12_61-52_89-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170261" version="1" comment="kgraft-patch-3_12_61-52_89-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170262" version="1" comment="kgraft-patch-SLE12_Update_26 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170263" version="1" comment="kgraft-patch-3_12_61-52_92-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170264" version="1" comment="kgraft-patch-3_12_61-52_92-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170265" version="1" comment="kgraft-patch-SLE12_Update_27 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170266" version="1" comment="kgraft-patch-3_12_61-52_83-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170267" version="1" comment="kgraft-patch-3_12_61-52_83-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170268" version="1" comment="kgraft-patch-SLE12_Update_24 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170269" version="1" comment="kgraft-patch-3_12_61-52_86-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170270" version="1" comment="kgraft-patch-3_12_61-52_86-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170271" version="1" comment="kgraft-patch-SLE12_Update_25 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170272" version="1" comment="kgraft-patch-3_12_61-52_77-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170273" version="1" comment="kgraft-patch-3_12_61-52_77-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170274" version="1" comment="kgraft-patch-SLE12_Update_22 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170275" version="1" comment="kgraft-patch-3_12_61-52_69-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170276" version="1" comment="kgraft-patch-3_12_61-52_69-xen is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170277" version="1" comment="kgraft-patch-SLE12_Update_20 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170278" version="1" comment="kgraft-patch-3_12_61-52_101-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170279" version="1" comment="kgraft-patch-3_12_61-52_101-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170280" version="1" comment="kgraft-patch-SLE12_Update_28 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170281" version="1" comment="kgraft-patch-3_12_61-52_106-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170282" version="1" comment="kgraft-patch-3_12_61-52_106-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170283" version="1" comment="kgraft-patch-SLE12_Update_29 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170426" version="1" comment="kgraft-patch-3_12_61-52_80-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170427" version="1" comment="kgraft-patch-3_12_61-52_80-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170428" version="1" comment="kgraft-patch-SLE12_Update_23 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170429" version="1" comment="kgraft-patch-3_12_61-52_72-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170430" version="1" comment="kgraft-patch-3_12_61-52_72-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170431" version="1" comment="kgraft-patch-SLE12_Update_21 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170624" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170625" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170626" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169083" version="1" comment="qemu is &lt;2.0.2-48.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169084" version="1" comment="qemu-block-curl is &lt;2.0.2-48.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169085" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169086" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169087" version="1" comment="qemu-ipxe is &lt;1.0.0-48.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169088" version="1" comment="qemu-kvm is &lt;2.0.2-48.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169089" version="1" comment="qemu-lang is &lt;2.0.2-48.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169090" version="1" comment="qemu-ppc is &lt;2.0.2-48.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169091" version="1" comment="qemu-s390 is &lt;2.0.2-48.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169092" version="1" comment="qemu-seabios is &lt;1.7.4-48.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169093" version="1" comment="qemu-sgabios is &lt;8-48.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169094" version="1" comment="qemu-tools is &lt;2.0.2-48.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169095" version="1" comment="qemu-vgabios is &lt;1.7.4-48.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169096" version="1" comment="qemu-x86 is &lt;2.0.2-48.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171257" version="1" comment="kernel-default is &lt;3.12.61-52.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171258" version="1" comment="kernel-default-base is &lt;3.12.61-52.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171259" version="1" comment="kernel-default-devel is &lt;3.12.61-52.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171325" version="1" comment="kernel-default-man is &lt;3.12.61-52.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171260" version="1" comment="kernel-devel is &lt;3.12.61-52.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171261" version="1" comment="kernel-macros is &lt;3.12.61-52.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171262" version="1" comment="kernel-source is &lt;3.12.61-52.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171263" version="1" comment="kernel-syms is &lt;3.12.61-52.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171264" version="1" comment="kernel-xen is &lt;3.12.61-52.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171265" version="1" comment="kernel-xen-base is &lt;3.12.61-52.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171266" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171267" version="1" comment="kgraft-patch-3_12_61-52_119-default is &lt;1-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171268" version="1" comment="kgraft-patch-3_12_61-52_119-xen is &lt;1-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171269" version="1" comment="kgraft-patch-SLE12_Update_31 is &lt;1-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169359" version="1" comment="kernel-firmware is &lt;20140807git-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169360" version="1" comment="ucode-amd is &lt;20140807git-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172588" version="1" comment="kgraft-patch-3_12_61-52_119-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172589" version="1" comment="kgraft-patch-3_12_61-52_119-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172590" version="1" comment="kgraft-patch-SLE12_Update_31 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172698" version="1" comment="xen is &lt;4.4.4_28-22.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172699" version="1" comment="xen-doc-html is &lt;4.4.4_28-22.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172700" version="1" comment="xen-kmp-default is &lt;4.4.4_28_k3.12.61_52.119-22.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172701" version="1" comment="xen-libs is &lt;4.4.4_28-22.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172702" version="1" comment="xen-libs-32bit is &lt;4.4.4_28-22.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172703" version="1" comment="xen-tools is &lt;4.4.4_28-22.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172704" version="1" comment="xen-tools-domU is &lt;4.4.4_28-22.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172959" version="1" comment="kgraft-patch-3_12_61-52_122-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172960" version="1" comment="kgraft-patch-3_12_61-52_122-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172961" version="1" comment="kgraft-patch-SLE12_Update_32 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173065" version="1" comment="libmysqlclient-devel is &lt;10.0.34-20.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173066" version="1" comment="libmysqlclient18 is &lt;10.0.34-20.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173067" version="1" comment="libmysqlclient18-32bit is &lt;10.0.34-20.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173068" version="1" comment="libmysqlclient_r18 is &lt;10.0.34-20.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173069" version="1" comment="libmysqld-devel is &lt;10.0.34-20.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173070" version="1" comment="libmysqld18 is &lt;10.0.34-20.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173071" version="1" comment="mariadb is &lt;10.0.34-20.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173072" version="1" comment="mariadb-client is &lt;10.0.34-20.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173073" version="1" comment="mariadb-errormessages is &lt;10.0.34-20.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173074" version="1" comment="mariadb-tools is &lt;10.0.34-20.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169540" version="1" comment="glibc is &lt;2.19-22.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169541" version="1" comment="glibc-32bit is &lt;2.19-22.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169542" version="1" comment="glibc-devel is &lt;2.19-22.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169543" version="1" comment="glibc-devel-32bit is &lt;2.19-22.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169544" version="1" comment="glibc-html is &lt;2.19-22.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169545" version="1" comment="glibc-i18ndata is &lt;2.19-22.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169546" version="1" comment="glibc-info is &lt;2.19-22.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169547" version="1" comment="glibc-locale is &lt;2.19-22.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169548" version="1" comment="glibc-locale-32bit is &lt;2.19-22.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169549" version="1" comment="glibc-profile is &lt;2.19-22.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169550" version="1" comment="glibc-profile-32bit is &lt;2.19-22.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169551" version="1" comment="nscd is &lt;2.19-22.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173973" version="1" comment="kernel-default is &lt;3.12.61-52.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173974" version="1" comment="kernel-default-base is &lt;3.12.61-52.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173975" version="1" comment="kernel-default-devel is &lt;3.12.61-52.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173976" version="1" comment="kernel-default-man is &lt;3.12.61-52.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173977" version="1" comment="kernel-devel is &lt;3.12.61-52.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173978" version="1" comment="kernel-macros is &lt;3.12.61-52.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173979" version="1" comment="kernel-source is &lt;3.12.61-52.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173980" version="1" comment="kernel-syms is &lt;3.12.61-52.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173981" version="1" comment="kernel-xen is &lt;3.12.61-52.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173982" version="1" comment="kernel-xen-base is &lt;3.12.61-52.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173983" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173984" version="1" comment="kgraft-patch-3_12_61-52_125-default is &lt;1-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173985" version="1" comment="kgraft-patch-3_12_61-52_125-xen is &lt;1-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173986" version="1" comment="kgraft-patch-SLE12_Update_33 is &lt;1-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174271" version="1" comment="apache2 is &lt;2.4.10-14.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174272" version="1" comment="apache2-doc is &lt;2.4.10-14.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174273" version="1" comment="apache2-example-pages is &lt;2.4.10-14.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174274" version="1" comment="apache2-prefork is &lt;2.4.10-14.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174275" version="1" comment="apache2-utils is &lt;2.4.10-14.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174276" version="1" comment="apache2-worker is &lt;2.4.10-14.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174281" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174282" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174283" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-27.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174284" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-27.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174285" version="1" comment="openssl is &lt;1.0.1i-27.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174286" version="1" comment="openssl-doc is &lt;1.0.1i-27.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174678" version="1" comment="kgraft-patch-3_12_61-52_106-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174679" version="1" comment="kgraft-patch-3_12_61-52_106-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174680" version="1" comment="kgraft-patch-SLE12_Update_29 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174681" version="1" comment="kgraft-patch-3_12_61-52_101-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174682" version="1" comment="kgraft-patch-3_12_61-52_101-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174683" version="1" comment="kgraft-patch-SLE12_Update_28 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174684" version="1" comment="kgraft-patch-3_12_61-52_72-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174685" version="1" comment="kgraft-patch-3_12_61-52_72-xen is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174686" version="1" comment="kgraft-patch-SLE12_Update_21 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174687" version="1" comment="kgraft-patch-3_12_61-52_80-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174688" version="1" comment="kgraft-patch-3_12_61-52_80-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174689" version="1" comment="kgraft-patch-SLE12_Update_23 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174690" version="1" comment="kgraft-patch-3_12_61-52_77-default is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174691" version="1" comment="kgraft-patch-3_12_61-52_77-xen is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174692" version="1" comment="kgraft-patch-SLE12_Update_22 is &lt;9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174693" version="1" comment="kgraft-patch-3_12_61-52_86-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174694" version="1" comment="kgraft-patch-3_12_61-52_86-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174695" version="1" comment="kgraft-patch-SLE12_Update_25 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174696" version="1" comment="kgraft-patch-3_12_61-52_83-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174697" version="1" comment="kgraft-patch-3_12_61-52_83-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174698" version="1" comment="kgraft-patch-SLE12_Update_24 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174699" version="1" comment="kgraft-patch-3_12_61-52_92-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174700" version="1" comment="kgraft-patch-3_12_61-52_92-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174701" version="1" comment="kgraft-patch-SLE12_Update_27 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174702" version="1" comment="kgraft-patch-3_12_61-52_89-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174703" version="1" comment="kgraft-patch-3_12_61-52_89-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174704" version="1" comment="kgraft-patch-SLE12_Update_26 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174705" version="1" comment="kgraft-patch-3_12_61-52_122-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174706" version="1" comment="kgraft-patch-3_12_61-52_122-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174707" version="1" comment="kgraft-patch-SLE12_Update_32 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174708" version="1" comment="kgraft-patch-3_12_61-52_125-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174709" version="1" comment="kgraft-patch-3_12_61-52_125-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174710" version="1" comment="kgraft-patch-SLE12_Update_33 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174711" version="1" comment="kgraft-patch-3_12_61-52_111-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174712" version="1" comment="kgraft-patch-3_12_61-52_111-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174713" version="1" comment="kgraft-patch-SLE12_Update_30 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174714" version="1" comment="kgraft-patch-3_12_61-52_119-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174715" version="1" comment="kgraft-patch-3_12_61-52_119-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174716" version="1" comment="kgraft-patch-SLE12_Update_31 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169778" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169779" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169780" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-27.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169781" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-27.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169782" version="1" comment="openssl is &lt;1.0.1i-27.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169783" version="1" comment="openssl-doc is &lt;1.0.1i-27.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169784" version="1" comment="kernel-default is &lt;3.12.61-52.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169785" version="1" comment="kernel-default-base is &lt;3.12.61-52.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169786" version="1" comment="kernel-default-devel is &lt;3.12.61-52.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169787" version="1" comment="kernel-default-man is &lt;3.12.61-52.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169788" version="1" comment="kernel-devel is &lt;3.12.61-52.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169789" version="1" comment="kernel-macros is &lt;3.12.61-52.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169790" version="1" comment="kernel-source is &lt;3.12.61-52.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169791" version="1" comment="kernel-syms is &lt;3.12.61-52.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169792" version="1" comment="kernel-xen is &lt;3.12.61-52.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169793" version="1" comment="kernel-xen-base is &lt;3.12.61-52.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169794" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119529" version="1" comment="bind-chrootenv is &lt;9.9.6P1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119530" version="1" comment="bind-doc is &lt;9.9.6P1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118806" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02~beta2-73.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118885" version="1" comment="grub2-s390x-emu is &lt;2.02~beta2-73.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118814" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118815" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118816" version="1" comment="openssl-doc is &lt;1.0.1i-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118804" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr2.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118805" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr2.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119000" version="1" comment="kernel-default-base is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119001" version="1" comment="kernel-default-man is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119002" version="1" comment="kernel-xen-base is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119205" version="1" comment="tdb-tools is &lt;1.3.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118808" version="1" comment="xen-doc-html is &lt;4.5.2_02-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118809" version="1" comment="xen-tools is &lt;4.5.2_02-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118810" version="1" comment="xen-tools-domU is &lt;4.5.2_02-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129361" version="1" comment="kernel-default-base is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129362" version="1" comment="kernel-default-man is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129363" version="1" comment="kernel-xen-base is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129378" version="1" comment="qemu-block-rbd is &lt;2.3.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129379" version="1" comment="qemu-guest-agent is &lt;2.3.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129380" version="1" comment="qemu-lang is &lt;2.3.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129381" version="1" comment="qemu-ppc is &lt;2.3.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129382" version="1" comment="qemu-s390 is &lt;2.3.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129435" version="1" comment="kernel-default-base is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129436" version="1" comment="kernel-default-man is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129437" version="1" comment="kernel-xen-base is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129732" version="1" comment="glibc-html is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129733" version="1" comment="glibc-profile is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129734" version="1" comment="glibc-profile-32bit is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130448" version="1" comment="apache2-doc is &lt;2.4.16-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130449" version="1" comment="apache2-example-pages is &lt;2.4.16-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130450" version="1" comment="apache2-prefork is &lt;2.4.16-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130451" version="1" comment="apache2-utils is &lt;2.4.16-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130452" version="1" comment="apache2-worker is &lt;2.4.16-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121662" version="1" comment="bind-chrootenv is &lt;9.9.6P1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121663" version="1" comment="bind-doc is &lt;9.9.6P1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131899" version="1" comment="squid is &lt;3.3.14-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131904" version="1" comment="libvirt-lock-sanlock is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131906" version="1" comment="xen-doc-html is &lt;4.5.3_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131907" version="1" comment="xen-tools is &lt;4.5.3_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131908" version="1" comment="xen-tools-domU is &lt;4.5.3_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121557" version="1" comment="kernel-default-base is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121558" version="1" comment="kernel-default-man is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121559" version="1" comment="kernel-xen-base is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131912" version="1" comment="python-doc is &lt;2.7.9-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131913" version="1" comment="python-doc-pdf is &lt;2.7.9-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131916" version="1" comment="kernel-default-base is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131917" version="1" comment="kernel-default-man is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131918" version="1" comment="kernel-xen-base is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131919" version="1" comment="krb5-doc is &lt;1.12.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131920" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131921" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131922" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131923" version="1" comment="krb5-server is &lt;1.12.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131924" version="1" comment="tomcat is &lt;8.0.32-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131925" version="1" comment="tomcat-admin-webapps is &lt;8.0.32-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131926" version="1" comment="tomcat-docs-webapp is &lt;8.0.32-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131927" version="1" comment="tomcat-el-3_0-api is &lt;8.0.32-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131928" version="1" comment="tomcat-javadoc is &lt;8.0.32-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131929" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.32-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131930" version="1" comment="tomcat-lib is &lt;8.0.32-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131931" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.32-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131932" version="1" comment="tomcat-webapps is &lt;8.0.32-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131933" version="1" comment="mariadb-tools is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131937" version="1" comment="cyrus-imapd is &lt;2.3.18-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131941" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.18-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131942" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.18-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131943" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131944" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131945" version="1" comment="openssl-doc is &lt;1.0.1i-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131952" version="1" comment="xen-doc-html is &lt;4.5.3_10-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131953" version="1" comment="xen-tools is &lt;4.5.3_10-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131954" version="1" comment="xen-tools-domU is &lt;4.5.3_10-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131955" version="1" comment="squidGuard is &lt;1.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131956" version="1" comment="squidGuard-doc is &lt;1.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131957" version="1" comment="kernel-default-base is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131958" version="1" comment="kernel-default-man is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131959" version="1" comment="kernel-xen-base is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131960" version="1" comment="qemu-block-rbd is &lt;2.3.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131961" version="1" comment="qemu-guest-agent is &lt;2.3.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131962" version="1" comment="qemu-lang is &lt;2.3.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131963" version="1" comment="qemu-ppc is &lt;2.3.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131964" version="1" comment="qemu-s390 is &lt;2.3.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131965" version="1" comment="libxml2-doc is &lt;2.9.1-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122060" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.72-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122061" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.72-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135263" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr3.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135264" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr3.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135988" version="1" comment="kernel-default-base is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135989" version="1" comment="kernel-default-man is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135990" version="1" comment="kernel-xen-base is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136289" version="1" comment="qemu-block-rbd is &lt;2.3.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136290" version="1" comment="qemu-guest-agent is &lt;2.3.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136291" version="1" comment="qemu-lang is &lt;2.3.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136292" version="1" comment="qemu-ppc is &lt;2.3.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136293" version="1" comment="qemu-s390 is &lt;2.3.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136680" version="1" comment="kernel-default-base is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136681" version="1" comment="kernel-default-man is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136682" version="1" comment="kernel-xen-base is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142210" version="1" comment="tomcat is &lt;8.0.32-10.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142211" version="1" comment="tomcat-admin-webapps is &lt;8.0.32-10.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142212" version="1" comment="tomcat-docs-webapp is &lt;8.0.32-10.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142213" version="1" comment="tomcat-el-3_0-api is &lt;8.0.32-10.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142214" version="1" comment="tomcat-javadoc is &lt;8.0.32-10.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142215" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.32-10.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142216" version="1" comment="tomcat-lib is &lt;8.0.32-10.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142217" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.32-10.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142218" version="1" comment="tomcat-webapps is &lt;8.0.32-10.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142219" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr3.21-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142220" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr3.21-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142379" version="1" comment="xen-doc-html is &lt;4.5.5_02-22.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142380" version="1" comment="xen-tools is &lt;4.5.5_02-22.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142381" version="1" comment="xen-tools-domU is &lt;4.5.5_02-22.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119653" version="1" comment="mariadb-tools is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143075" version="1" comment="kernel-default-base is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143076" version="1" comment="kernel-default-man is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143077" version="1" comment="kernel-xen-base is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144671" version="1" comment="xen-doc-html is &lt;4.5.5_04-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144672" version="1" comment="xen-tools is &lt;4.5.5_04-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144673" version="1" comment="xen-tools-domU is &lt;4.5.5_04-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122507" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr2.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122508" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr2.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118817" version="1" comment="qemu-block-rbd is &lt;2.3.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118818" version="1" comment="qemu-guest-agent is &lt;2.3.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118819" version="1" comment="qemu-lang is &lt;2.3.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118820" version="1" comment="qemu-ppc is &lt;2.3.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118886" version="1" comment="qemu-s390 is &lt;2.3.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122348" version="1" comment="glibc-html is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122349" version="1" comment="glibc-profile is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122350" version="1" comment="glibc-profile-32bit is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122228" version="1" comment="dhcp-relay is &lt;4.3.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122229" version="1" comment="dhcp-server is &lt;4.3.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123242" version="1" comment="kernel-default-base is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123255" version="1" comment="kernel-default-man is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123243" version="1" comment="kernel-xen-base is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123256" version="1" comment="lttng-modules is &lt;2.7.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123257" version="1" comment="lttng-modules-kmp-default is &lt;2.7.0_k3.12.53_60.30-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123879" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123880" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123881" version="1" comment="openssl-doc is &lt;1.0.1i-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124726" version="1" comment="bind-chrootenv is &lt;9.9.6P1-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124727" version="1" comment="bind-doc is &lt;9.9.6P1-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124740" version="1" comment="tomcat is &lt;8.0.32-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124741" version="1" comment="tomcat-admin-webapps is &lt;8.0.32-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124742" version="1" comment="tomcat-docs-webapp is &lt;8.0.32-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124743" version="1" comment="tomcat-el-3_0-api is &lt;8.0.32-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124744" version="1" comment="tomcat-javadoc is &lt;8.0.32-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124745" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.32-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124746" version="1" comment="tomcat-lib is &lt;8.0.32-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124747" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.32-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124748" version="1" comment="tomcat-webapps is &lt;8.0.32-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125329" version="1" comment="xen-doc-html is &lt;4.5.2_06-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125330" version="1" comment="xen-tools is &lt;4.5.2_06-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125331" version="1" comment="xen-tools-domU is &lt;4.5.2_06-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125628" version="1" comment="libvirt-lock-sanlock is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125677" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.77-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125678" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.77-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125947" version="1" comment="kernel-default-base is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125948" version="1" comment="kernel-default-man is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125949" version="1" comment="kernel-xen-base is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127144" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127145" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127146" version="1" comment="openssl-doc is &lt;1.0.1i-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127282" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.91-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127283" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.91-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128960" version="1" comment="mariadb-tools is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157422" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161449" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161833" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163750" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147972" version="1" comment="policycoreutils is &lt;2.3-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147973" version="1" comment="policycoreutils-python is &lt;2.3-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166433" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166696" version="1" comment="qemu-s390 is &lt;2.3.1-33.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167746" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148418" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-54.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148419" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-54.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148420" version="1" comment="openssl-doc is &lt;1.0.1i-54.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148421" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr4.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148422" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr4.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148423" version="1" comment="kernel-default-base is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148424" version="1" comment="kernel-default-man is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148425" version="1" comment="kernel-xen-base is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148679" version="1" comment="kernel-default-base is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148680" version="1" comment="kernel-default-man is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148681" version="1" comment="kernel-xen-base is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148948" version="1" comment="xen-doc-html is &lt;4.5.5_06-22.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148949" version="1" comment="xen-tools is &lt;4.5.5_06-22.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148950" version="1" comment="xen-tools-domU is &lt;4.5.5_06-22.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149425" version="1" comment="dracut-fips is &lt;037-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149828" version="1" comment="apache2-doc is &lt;2.4.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149829" version="1" comment="apache2-example-pages is &lt;2.4.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149830" version="1" comment="apache2-prefork is &lt;2.4.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149831" version="1" comment="apache2-utils is &lt;2.4.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149832" version="1" comment="apache2-worker is &lt;2.4.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149890" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr4.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149891" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr4.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150248" version="1" comment="kernel-default-base is &lt;3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150249" version="1" comment="kernel-default-man is &lt;3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150250" version="1" comment="kernel-xen-base is &lt;3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146959" version="1" comment="squid is &lt;3.3.14-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154942" version="1" comment="xen-doc-html is &lt;4.5.5_10-22.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154943" version="1" comment="xen-tools is &lt;4.5.5_10-22.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154944" version="1" comment="xen-tools-domU is &lt;4.5.5_10-22.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155361" version="1" comment="qemu-block-rbd is &lt;2.3.1-32.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155362" version="1" comment="qemu-guest-agent is &lt;2.3.1-32.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155363" version="1" comment="qemu-lang is &lt;2.3.1-32.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155364" version="1" comment="qemu-ppc is &lt;2.3.1-32.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155365" version="1" comment="qemu-s390 is &lt;2.3.1-32.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155675" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155676" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155677" version="1" comment="kernel-xen-base is &lt;3.12.74-60.64.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155693" version="1" comment="libxml2-doc is &lt;2.9.1-26.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155712" version="1" comment="tomcat is &lt;8.0.43-10.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155713" version="1" comment="tomcat-admin-webapps is &lt;8.0.43-10.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155714" version="1" comment="tomcat-docs-webapp is &lt;8.0.43-10.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155715" version="1" comment="tomcat-el-3_0-api is &lt;8.0.43-10.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155716" version="1" comment="tomcat-javadoc is &lt;8.0.43-10.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155717" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.43-10.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155718" version="1" comment="tomcat-lib is &lt;8.0.43-10.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155719" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.43-10.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155720" version="1" comment="tomcat-webapps is &lt;8.0.43-10.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157046" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169189" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172278" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169361" version="1" comment="qemu-s390 is &lt;2.3.1-33.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174019" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169795" version="1" comment="kernel-default is &lt;3.12.74-60.64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169796" version="1" comment="kernel-default-base is &lt;3.12.74-60.64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169797" version="1" comment="kernel-default-devel is &lt;3.12.74-60.64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169798" version="1" comment="kernel-default-man is &lt;3.12.74-60.64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169799" version="1" comment="kernel-devel is &lt;3.12.74-60.64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169800" version="1" comment="kernel-macros is &lt;3.12.74-60.64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169801" version="1" comment="kernel-source is &lt;3.12.74-60.64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169802" version="1" comment="kernel-syms is &lt;3.12.74-60.64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135891" version="1" comment="qemu-ppc is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135892" version="1" comment="qemu-s390 is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136683" version="1" comment="kernel-default-man is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142157" version="1" comment="xen-doc-html is &lt;4.7.1_02-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142158" version="1" comment="xen-tools is &lt;4.7.1_02-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142159" version="1" comment="xen-tools-domU is &lt;4.7.1_02-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142761" version="1" comment="kernel-default-man is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144674" version="1" comment="xen-doc-html is &lt;4.7.1_04-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144675" version="1" comment="xen-tools is &lt;4.7.1_04-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144676" version="1" comment="xen-tools-domU is &lt;4.7.1_04-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157607" version="1" comment="kernel-default-man is &lt;4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157780" version="1" comment="xen-doc-html is &lt;4.7.2_06-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157781" version="1" comment="xen-tools is &lt;4.7.2_06-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157782" version="1" comment="xen-tools-domU is &lt;4.7.2_06-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157946" version="1" comment="qemu-ppc is &lt;2.6.2-41.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157947" version="1" comment="qemu-s390 is &lt;2.6.2-41.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158001" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158376" version="1" comment="ncurses-devel-32bit is &lt;5.9-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158793" version="1" comment="kernel-default-man is &lt;4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161424" version="1" comment="kernel-default-man is &lt;4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161553" version="1" comment="ncurses-devel-32bit is &lt;5.9-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161785" version="1" comment="kernel-default-man is &lt;4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162941" version="1" comment="xen-doc-html is &lt;4.7.3_03-43.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162942" version="1" comment="xen-tools is &lt;4.7.3_03-43.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162943" version="1" comment="xen-tools-domU is &lt;4.7.3_03-43.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164373" version="1" comment="xen-doc-html is &lt;4.7.3_04-43.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164374" version="1" comment="xen-tools is &lt;4.7.3_04-43.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164375" version="1" comment="xen-tools-domU is &lt;4.7.3_04-43.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164376" version="1" comment="kernel-default-man is &lt;4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166139" version="1" comment="xen-doc-html is &lt;4.7.3_06-43.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166140" version="1" comment="xen-tools is &lt;4.7.3_06-43.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166141" version="1" comment="xen-tools-domU is &lt;4.7.3_06-43.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166142" version="1" comment="kernel-default-man is &lt;4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166538" version="1" comment="qemu-ppc is &lt;2.6.2-41.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166539" version="1" comment="qemu-s390 is &lt;2.6.2-41.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167138" version="1" comment="tboot is &lt;20160518_1.9.4-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167412" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167429" version="1" comment="xen-doc-html is &lt;4.7.4_02-43.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167430" version="1" comment="xen-tools is &lt;4.7.4_02-43.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167431" version="1" comment="xen-tools-domU is &lt;4.7.4_02-43.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167792" version="1" comment="kernel-default-man is &lt;4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168473" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168815" version="1" comment="kernel-default-man is &lt;4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148951" version="1" comment="xen-doc-html is &lt;4.7.1_06-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148952" version="1" comment="xen-tools is &lt;4.7.1_06-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148953" version="1" comment="xen-tools-domU is &lt;4.7.1_06-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149033" version="1" comment="kernel-default-man is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149420" version="1" comment="qemu-ppc is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149421" version="1" comment="qemu-s390 is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150251" version="1" comment="kernel-default-man is &lt;4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150919" version="1" comment="xen-doc-html is &lt;4.7.2_02-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150920" version="1" comment="xen-tools is &lt;4.7.2_02-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150921" version="1" comment="xen-tools-domU is &lt;4.7.2_02-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154945" version="1" comment="xen-doc-html is &lt;4.7.2_04-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154946" version="1" comment="xen-tools is &lt;4.7.2_04-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154947" version="1" comment="xen-tools-domU is &lt;4.7.2_04-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146976" version="1" comment="qemu-ppc is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146977" version="1" comment="qemu-s390 is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155069" version="1" comment="kernel-default-man is &lt;4.4.59-92.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147252" version="1" comment="kernel-default-man is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157049" version="1" comment="kernel-default-man is &lt;4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169097" version="1" comment="kernel-default-man is &lt;4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170627" version="1" comment="ncurses-devel-32bit is &lt;5.9-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170676" version="1" comment="openvswitch-dpdk is &lt;2.5.1-25.12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170677" version="1" comment="openvswitch-dpdk-switch is &lt;2.5.1-25.12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169314" version="1" comment="qemu-ppc is &lt;2.6.2-41.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169315" version="1" comment="qemu-s390 is &lt;2.6.2-41.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171117" version="1" comment="kernel-default-man is &lt;4.4.114-92.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171458" version="1" comment="glibc-profile-32bit is &lt;2.22-62.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171550" version="1" comment="xen-doc-html is &lt;4.7.4_06-43.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171551" version="1" comment="xen-tools is &lt;4.7.4_06-43.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171552" version="1" comment="xen-tools-domU is &lt;4.7.4_06-43.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172861" version="1" comment="glibc-profile-32bit is &lt;2.22-62.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173075" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.20-38.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173076" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.20-38.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173077" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.20-38.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169444" version="1" comment="kernel-default-base is &lt;4.4.103-92.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169445" version="1" comment="kernel-default-devel is &lt;4.4.103-92.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169446" version="1" comment="kernel-default-man is &lt;4.4.103-92.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169447" version="1" comment="kernel-devel is &lt;4.4.103-92.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169448" version="1" comment="kernel-macros is &lt;4.4.103-92.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169449" version="1" comment="kernel-source is &lt;4.4.103-92.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169450" version="1" comment="kernel-syms is &lt;4.4.103-92.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173641" version="1" comment="kernel-default-man is &lt;4.4.120-92.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169552" version="1" comment="glibc-profile-32bit is &lt;2.22-62.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173948" version="1" comment="qemu-ppc is &lt;2.6.2-41.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173949" version="1" comment="qemu-s390 is &lt;2.6.2-41.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174128" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174297" version="1" comment="xen-doc-html is &lt;4.7.5_02-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174298" version="1" comment="xen-tools is &lt;4.7.5_02-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174299" version="1" comment="xen-tools-domU is &lt;4.7.5_02-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174359" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169842" version="1" comment="ncurses-devel-32bit is &lt;5.9-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161630" version="1" comment="libtcmu1 is &lt;1.2.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162134" version="1" comment="freeradius-server-doc is &lt;3.0.15-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162135" version="1" comment="freeradius-server-krb5 is &lt;3.0.15-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162136" version="1" comment="freeradius-server-ldap is &lt;3.0.15-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162137" version="1" comment="freeradius-server-libs is &lt;3.0.15-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162138" version="1" comment="freeradius-server-mysql is &lt;3.0.15-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162139" version="1" comment="freeradius-server-perl is &lt;3.0.15-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162140" version="1" comment="freeradius-server-postgresql is &lt;3.0.15-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162141" version="1" comment="freeradius-server-python is &lt;3.0.15-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162142" version="1" comment="freeradius-server-sqlite is &lt;3.0.15-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162143" version="1" comment="freeradius-server-utils is &lt;3.0.15-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162183" version="1" comment="openvswitch is &lt;2.7.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162454" version="1" comment="kernel-default-base is &lt;4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162455" version="1" comment="kernel-default-man is &lt;4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166967" version="1" comment="xen-doc-html is &lt;4.9.0_11-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166968" version="1" comment="xen-tools is &lt;4.9.0_11-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166969" version="1" comment="xen-tools-domU is &lt;4.9.0_11-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163524" version="1" comment="qemu-arm is &lt;2.9.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163525" version="1" comment="qemu-block-rbd is &lt;2.9.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163526" version="1" comment="qemu-block-ssh is &lt;2.9.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163527" version="1" comment="qemu-guest-agent is &lt;2.9.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163528" version="1" comment="qemu-lang is &lt;2.9.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163529" version="1" comment="qemu-ppc is &lt;2.9.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163530" version="1" comment="qemu-s390 is &lt;2.9.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163605" version="1" comment="xen-doc-html is &lt;4.9.0_12-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163606" version="1" comment="xen-tools is &lt;4.9.0_12-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163607" version="1" comment="xen-tools-domU is &lt;4.9.0_12-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164377" version="1" comment="kernel-default-base is &lt;4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164378" version="1" comment="kernel-default-man is &lt;4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164802" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164803" version="1" comment="libvirt-nss is &lt;3.3.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165706" version="1" comment="xen-doc-html is &lt;4.9.0_14-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165707" version="1" comment="xen-tools is &lt;4.9.0_14-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165708" version="1" comment="xen-tools-domU is &lt;4.9.0_14-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166046" version="1" comment="kernel-default-base is &lt;4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166047" version="1" comment="kernel-default-man is &lt;4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166048" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166049" version="1" comment="libvirt-nss is &lt;3.3.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166484" version="1" comment="qemu-arm is &lt;2.9.1-6.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166485" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166486" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166487" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166488" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166489" version="1" comment="qemu-lang is &lt;2.9.1-6.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166490" version="1" comment="qemu-ppc is &lt;2.9.1-6.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166491" version="1" comment="qemu-s390 is &lt;2.9.1-6.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167357" version="1" comment="xen-doc-html is &lt;4.9.1_02-3.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167358" version="1" comment="xen-tools is &lt;4.9.1_02-3.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167359" version="1" comment="xen-tools-domU is &lt;4.9.1_02-3.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167793" version="1" comment="kernel-default-base is &lt;4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167794" version="1" comment="kernel-default-man is &lt;4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167978" version="1" comment="openvswitch is &lt;2.7.0-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168776" version="1" comment="kernel-default-base is &lt;4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168777" version="1" comment="kernel-default-man is &lt;4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169098" version="1" comment="kernel-default-base is &lt;4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169099" version="1" comment="kernel-default-man is &lt;4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170628" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170629" version="1" comment="libvirt-nss is &lt;3.3.0-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170982" version="1" comment="kernel-default-base is &lt;4.4.114-94.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170983" version="1" comment="kernel-default-man is &lt;4.4.114-94.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171326" version="1" comment="xen-doc-html is &lt;4.9.1_08-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171327" version="1" comment="xen-tools is &lt;4.9.1_08-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171328" version="1" comment="xen-tools-domU is &lt;4.9.1_08-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173452" version="1" comment="qemu-arm is &lt;2.9.1-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173453" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173454" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173455" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173456" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173457" version="1" comment="qemu-lang is &lt;2.9.1-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173458" version="1" comment="qemu-ppc is &lt;2.9.1-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173459" version="1" comment="qemu-s390 is &lt;2.9.1-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173642" version="1" comment="kernel-default-base is &lt;4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173643" version="1" comment="kernel-default-man is &lt;4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173807" version="1" comment="librelp0 is &lt;1.2.12-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174177" version="1" comment="libidn-tools is &lt;1.28-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174360" version="1" comment="libvirt-daemon-hooks is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174361" version="1" comment="libvirt-lock-sanlock is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174362" version="1" comment="libvirt-nss is &lt;3.3.0-5.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174459" version="1" comment="memcached is &lt;1.4.39-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174765" version="1" comment="kernel-default-base is &lt;4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174766" version="1" comment="kernel-default-man is &lt;4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169803" version="1" comment="kernel-default-base is &lt;4.4.103-94.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169804" version="1" comment="kernel-default-devel is &lt;4.4.103-94.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169805" version="1" comment="kernel-default-man is &lt;4.4.103-94.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169806" version="1" comment="kernel-devel is &lt;4.4.103-94.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169807" version="1" comment="kernel-macros is &lt;4.4.103-94.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169808" version="1" comment="kernel-source is &lt;4.4.103-94.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169809" version="1" comment="kernel-syms is &lt;4.4.103-94.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168971" version="1" comment="qemu-arm is &lt;2.9.1-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168972" version="1" comment="qemu-block-iscsi is &lt;2.9.1-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168973" version="1" comment="qemu-block-rbd is &lt;2.9.1-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168974" version="1" comment="qemu-block-ssh is &lt;2.9.1-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168975" version="1" comment="qemu-guest-agent is &lt;2.9.1-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168976" version="1" comment="qemu-lang is &lt;2.9.1-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168977" version="1" comment="qemu-ppc is &lt;2.9.1-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168978" version="1" comment="qemu-s390 is &lt;2.9.1-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158377" version="1" comment="libreoffice-l10n-bg is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158378" version="1" comment="libreoffice-l10n-hr is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158379" version="1" comment="libreoffice-l10n-lt is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158380" version="1" comment="libreoffice-l10n-uk is &lt;5.3.3.2-40.5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171211" version="1" comment="libreoffice-l10n-bg is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171212" version="1" comment="libreoffice-l10n-hr is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171213" version="1" comment="libreoffice-l10n-lt is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171214" version="1" comment="libreoffice-l10n-uk is &lt;5.4.5.1-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162920" version="1" comment="libreoffice-l10n-bg is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162921" version="1" comment="libreoffice-l10n-hr is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162922" version="1" comment="libreoffice-l10n-lt is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162923" version="1" comment="libreoffice-l10n-uk is &lt;5.3.5.2-43.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171329" version="1" comment="libreoffice-l10n-bg is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171330" version="1" comment="libreoffice-l10n-hr is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171331" version="1" comment="libreoffice-l10n-lt is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171332" version="1" comment="libreoffice-l10n-uk is &lt;5.4.5.1-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175113" version="1" comment="libreoffice-l10n-bg is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175114" version="1" comment="libreoffice-l10n-hr is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175115" version="1" comment="libreoffice-l10n-lt is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175116" version="1" comment="libreoffice-l10n-uk is &lt;6.0.3.2-43.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109992" version="1" comment="dnsmasq-utils is &lt;2.71-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117480" version="1" comment="python-keystoneclient is &lt;1.0.0-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117481" version="1" comment="python-keystoneclient-doc is &lt;1.0.0-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117482" version="1" comment="python-glanceclient is &lt;0.15.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117483" version="1" comment="python-keystoneclient is &lt;1.0.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117484" version="1" comment="python-keystoneclient-doc is &lt;1.0.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117485" version="1" comment="python-keystonemiddleware is &lt;1.2.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117486" version="1" comment="python-novaclient is &lt;2.20.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117487" version="1" comment="python-novaclient-doc is &lt;2.20.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117488" version="1" comment="python-swiftclient is &lt;2.3.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117489" version="1" comment="python-swiftclient-doc is &lt;2.3.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117490" version="1" comment="openstack-ceilometer is &lt;2014.2.4.dev18-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117491" version="1" comment="openstack-ceilometer-agent-compute is &lt;2014.2.4.dev18-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117492" version="1" comment="openstack-neutron is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117493" version="1" comment="openstack-neutron-dhcp-agent is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117494" version="1" comment="openstack-neutron-ha-tool is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117495" version="1" comment="openstack-neutron-l3-agent is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117496" version="1" comment="openstack-neutron-lbaas-agent is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117497" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117498" version="1" comment="openstack-neutron-metadata-agent is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117499" version="1" comment="openstack-neutron-metering-agent is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117500" version="1" comment="openstack-neutron-openvswitch-agent is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117501" version="1" comment="openstack-neutron-vpn-agent is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117502" version="1" comment="openstack-nova is &lt;2014.2.4~a0~dev61-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117503" version="1" comment="openstack-nova-compute is &lt;2014.2.4~a0~dev61-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117504" version="1" comment="openstack-suse is &lt;2014.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117505" version="1" comment="openstack-suse-sudo is &lt;2014.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117506" version="1" comment="python-ceilometer is &lt;2014.2.4.dev18-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117507" version="1" comment="python-neutron is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117508" version="1" comment="python-nova is &lt;2014.2.4~a0~dev61-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117840" version="1" comment="openstack-neutron is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117841" version="1" comment="openstack-neutron-dhcp-agent is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117842" version="1" comment="openstack-neutron-ha-tool is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117843" version="1" comment="openstack-neutron-l3-agent is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117844" version="1" comment="openstack-neutron-lbaas-agent is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117845" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117846" version="1" comment="openstack-neutron-metadata-agent is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117847" version="1" comment="openstack-neutron-metering-agent is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117848" version="1" comment="openstack-neutron-openvswitch-agent is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117849" version="1" comment="openstack-neutron-vpn-agent is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117873" version="1" comment="openstack-nova is &lt;2014.2.4~a0~dev80-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117874" version="1" comment="openstack-nova-compute is &lt;2014.2.4~a0~dev80-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117852" version="1" comment="python-neutron is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117875" version="1" comment="python-nova is &lt;2014.2.4~a0~dev80-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117854" version="1" comment="python-python-memcached is &lt;1.54-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145847" version="1" comment="dnsmasq is &lt;2.71-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145848" version="1" comment="dnsmasq-utils is &lt;2.71-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171553" version="1" comment="iperf is &lt;3.1.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171554" version="1" comment="iperf-devel is &lt;3.1.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171555" version="1" comment="libiperf0 is &lt;3.1.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171556" version="1" comment="MozillaThunderbird is &lt;45.3.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171557" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.3.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171558" version="1" comment="MozillaThunderbird-devel is &lt;45.3.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171559" version="1" comment="MozillaThunderbird-translations-common is &lt;45.3.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171560" version="1" comment="MozillaThunderbird-translations-other is &lt;45.3.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171561" version="1" comment="chromedriver is &lt;53.0.2785.113-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171562" version="1" comment="chromium is &lt;53.0.2785.113-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171563" version="1" comment="chromium-desktop-gnome is &lt;53.0.2785.113-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171564" version="1" comment="chromium-desktop-kde is &lt;53.0.2785.113-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171565" version="1" comment="chromium-ffmpegsumo is &lt;53.0.2785.113-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171566" version="1" comment="chromedriver is &lt;53.0.2785.143-106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171567" version="1" comment="chromium is &lt;53.0.2785.143-106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171568" version="1" comment="chromium-desktop-gnome is &lt;53.0.2785.143-106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171569" version="1" comment="chromium-desktop-kde is &lt;53.0.2785.143-106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171570" version="1" comment="chromium-ffmpegsumo is &lt;53.0.2785.143-106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171571" version="1" comment="MozillaThunderbird is &lt;45.4.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171572" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.4.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171573" version="1" comment="MozillaThunderbird-devel is &lt;45.4.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171574" version="1" comment="MozillaThunderbird-translations-common is &lt;45.4.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171575" version="1" comment="MozillaThunderbird-translations-other is &lt;45.4.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171576" version="1" comment="kde-cli-tools5 is &lt;5.5.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171577" version="1" comment="kde-cli-tools5-lang is &lt;5.5.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171578" version="1" comment="go1.4 is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171579" version="1" comment="go1.4-doc is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171580" version="1" comment="kcoreaddons is &lt;5.20.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171581" version="1" comment="kcoreaddons-devel is &lt;5.20.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133774" version="1" comment="kcoreaddons-devel-32bit is &lt;5.21.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171582" version="1" comment="kcoreaddons-lang is &lt;5.20.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171583" version="1" comment="libKF5CoreAddons5 is &lt;5.20.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133777" version="1" comment="libKF5CoreAddons5-32bit is &lt;5.21.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171584" version="1" comment="ffmpeg is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171585" version="1" comment="ffmpeg-devel is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171586" version="1" comment="libavcodec-devel is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171587" version="1" comment="libavcodec56 is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134958" version="1" comment="libavcodec56-32bit is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171588" version="1" comment="libavdevice-devel is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171589" version="1" comment="libavdevice56 is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134961" version="1" comment="libavdevice56-32bit is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171590" version="1" comment="libavfilter-devel is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171591" version="1" comment="libavfilter5 is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134964" version="1" comment="libavfilter5-32bit is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171592" version="1" comment="libavformat-devel is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171593" version="1" comment="libavformat56 is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134967" version="1" comment="libavformat56-32bit is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171594" version="1" comment="libavresample-devel is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171595" version="1" comment="libavresample2 is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134970" version="1" comment="libavresample2-32bit is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171596" version="1" comment="libavutil-devel is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171597" version="1" comment="libavutil54 is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134973" version="1" comment="libavutil54-32bit is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171598" version="1" comment="libpostproc-devel is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171599" version="1" comment="libpostproc53 is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134976" version="1" comment="libpostproc53-32bit is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171600" version="1" comment="libswresample-devel is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171601" version="1" comment="libswresample1 is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134979" version="1" comment="libswresample1-32bit is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171602" version="1" comment="libswscale-devel is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171603" version="1" comment="libswscale3 is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134982" version="1" comment="libswscale3-32bit is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171604" version="1" comment="chromedriver is &lt;54.0.2840.90-112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171605" version="1" comment="chromium is &lt;54.0.2840.90-112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171606" version="1" comment="chromium-ffmpegsumo is &lt;54.0.2840.90-112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171607" version="1" comment="MozillaThunderbird is &lt;45.5.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171608" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.5.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171609" version="1" comment="MozillaThunderbird-devel is &lt;45.5.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171610" version="1" comment="MozillaThunderbird-translations-common is &lt;45.5.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171611" version="1" comment="MozillaThunderbird-translations-other is &lt;45.5.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171612" version="1" comment="chromedriver is &lt;55.0.2883.75-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171613" version="1" comment="chromium is &lt;55.0.2883.75-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171614" version="1" comment="MozillaThunderbird is &lt;45.6.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171615" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.6.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171616" version="1" comment="MozillaThunderbird-devel is &lt;45.6.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171617" version="1" comment="MozillaThunderbird-translations-common is &lt;45.6.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171618" version="1" comment="MozillaThunderbird-translations-other is &lt;45.6.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171619" version="1" comment="chromedriver is &lt;51.0.2704.103-85.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171620" version="1" comment="chromium is &lt;51.0.2704.103-85.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171621" version="1" comment="chromium-desktop-gnome is &lt;51.0.2704.103-85.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171622" version="1" comment="chromium-desktop-kde is &lt;51.0.2704.103-85.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171623" version="1" comment="chromium-ffmpegsumo is &lt;51.0.2704.103-85.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171624" version="1" comment="imlib2 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171625" version="1" comment="imlib2-devel is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171626" version="1" comment="imlib2-filters is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171627" version="1" comment="imlib2-loaders is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171628" version="1" comment="libImlib2-1 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171629" version="1" comment="libprotobuf-lite8 is &lt;2.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171630" version="1" comment="libprotobuf8 is &lt;2.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171631" version="1" comment="libprotoc8 is &lt;2.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161070" version="1" comment="mosh is &lt;1.2.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171632" version="1" comment="ninja is &lt;1.5.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171633" version="1" comment="perl-Switch is &lt;2.17-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171634" version="1" comment="protobuf is &lt;2.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171635" version="1" comment="protobuf-devel is &lt;2.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171636" version="1" comment="protobuf-java is &lt;2.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171637" version="1" comment="python-protobuf is &lt;2.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171638" version="1" comment="znc is &lt;1.6.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171639" version="1" comment="znc-devel is &lt;1.6.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171640" version="1" comment="znc-perl is &lt;1.6.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171641" version="1" comment="znc-python3 is &lt;1.6.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171642" version="1" comment="znc-tcl is &lt;1.6.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171643" version="1" comment="znc is &lt;1.6.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171644" version="1" comment="znc-devel is &lt;1.6.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171645" version="1" comment="znc-perl is &lt;1.6.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171646" version="1" comment="znc-python3 is &lt;1.6.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171647" version="1" comment="znc-tcl is &lt;1.6.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171648" version="1" comment="MozillaThunderbird is &lt;45.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171649" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171650" version="1" comment="MozillaThunderbird-devel is &lt;45.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171651" version="1" comment="MozillaThunderbird-translations-common is &lt;45.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171652" version="1" comment="MozillaThunderbird-translations-other is &lt;45.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171653" version="1" comment="chromedriver is &lt;52.0.2743.82-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171654" version="1" comment="chromium is &lt;52.0.2743.82-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171655" version="1" comment="chromium-desktop-gnome is &lt;52.0.2743.82-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171656" version="1" comment="chromium-desktop-kde is &lt;52.0.2743.82-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171657" version="1" comment="chromium-ffmpegsumo is &lt;52.0.2743.82-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171658" version="1" comment="karchive is &lt;5.20.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171659" version="1" comment="karchive-devel is &lt;5.20.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130672" version="1" comment="karchive-devel-32bit is &lt;5.21.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171660" version="1" comment="libKF5Archive5 is &lt;5.20.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130674" version="1" comment="libKF5Archive5-32bit is &lt;5.21.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171661" version="1" comment="redis is &lt;3.0.7-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171662" version="1" comment="chromedriver is &lt;52.0.2743.116-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171663" version="1" comment="chromium is &lt;52.0.2743.116-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171664" version="1" comment="chromium-desktop-gnome is &lt;52.0.2743.116-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171665" version="1" comment="chromium-desktop-kde is &lt;52.0.2743.116-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171666" version="1" comment="chromium-ffmpegsumo is &lt;52.0.2743.116-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171667" version="1" comment="go is &lt;1.6.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171668" version="1" comment="go-doc is &lt;1.6.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171669" version="1" comment="chromedriver is &lt;61.0.3163.79-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171670" version="1" comment="chromium is &lt;61.0.3163.79-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164638" version="1" comment="freexl is &lt;1.0.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164639" version="1" comment="freexl-devel is &lt;1.0.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164640" version="1" comment="libfreexl1 is &lt;1.0.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171671" version="1" comment="chromedriver is &lt;61.0.3163.100-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171672" version="1" comment="chromium is &lt;61.0.3163.100-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171673" version="1" comment="libopenjp2-7 is &lt;2.1.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171674" version="1" comment="openjpeg2 is &lt;2.1.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171675" version="1" comment="openjpeg2-devel is &lt;2.1.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139954" version="1" comment="libopenjpeg1 is &lt;1.5.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171676" version="1" comment="openjpeg is &lt;1.5.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171677" version="1" comment="openjpeg-devel is &lt;1.5.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171678" version="1" comment="SDL2 is &lt;2.0.5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171679" version="1" comment="ffmpeg is &lt;3.3.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171680" version="1" comment="lame is &lt;3.99.5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171681" version="1" comment="lame-doc is &lt;3.99.5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171682" version="1" comment="lame-mp3rtp is &lt;3.99.5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171683" version="1" comment="libSDL2-2_0-0 is &lt;2.0.5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171684" version="1" comment="libSDL2-devel is &lt;2.0.5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171685" version="1" comment="libavcodec-devel is &lt;3.3.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171686" version="1" comment="libavcodec57 is &lt;3.3.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171687" version="1" comment="libavdevice-devel is &lt;3.3.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171688" version="1" comment="libavdevice57 is &lt;3.3.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171689" version="1" comment="libavfilter-devel is &lt;3.3.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171690" version="1" comment="libavfilter6 is &lt;3.3.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171691" version="1" comment="libavformat-devel is &lt;3.3.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171692" version="1" comment="libavformat57 is &lt;3.3.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171693" version="1" comment="libavresample-devel is &lt;3.3.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171694" version="1" comment="libavresample3 is &lt;3.3.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171695" version="1" comment="libavutil-devel is &lt;3.3.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171696" version="1" comment="libavutil55 is &lt;3.3.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171697" version="1" comment="libmp3lame-devel is &lt;3.99.5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171698" version="1" comment="libmp3lame0 is &lt;3.99.5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171699" version="1" comment="libpostproc-devel is &lt;3.3.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171700" version="1" comment="libpostproc54 is &lt;3.3.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171701" version="1" comment="libswresample-devel is &lt;3.3.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171702" version="1" comment="libswresample2 is &lt;3.3.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171703" version="1" comment="libswscale-devel is &lt;3.3.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171704" version="1" comment="libswscale4 is &lt;3.3.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171705" version="1" comment="libtwolame-devel is &lt;0.3.13-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171706" version="1" comment="libtwolame0 is &lt;0.3.13-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171707" version="1" comment="twolame is &lt;0.3.13-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147387" version="1" comment="libopenjp2-7 is &lt;2.1.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165200" version="1" comment="libopenjp2-7-32bit is &lt;2.1.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147389" version="1" comment="openjpeg2 is &lt;2.1.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147390" version="1" comment="openjpeg2-devel is &lt;2.1.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171708" version="1" comment="MozillaThunderbird is &lt;52.4.0-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171709" version="1" comment="MozillaThunderbird-buildsymbols is &lt;52.4.0-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171710" version="1" comment="MozillaThunderbird-devel is &lt;52.4.0-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171711" version="1" comment="MozillaThunderbird-translations-common is &lt;52.4.0-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171712" version="1" comment="MozillaThunderbird-translations-other is &lt;52.4.0-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171713" version="1" comment="libmbedtls9 is &lt;1.3.19-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165662" version="1" comment="libmbedtls9-32bit is &lt;1.3.19-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171714" version="1" comment="mbedtls is &lt;1.3.19-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171715" version="1" comment="mbedtls-devel is &lt;1.3.19-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171716" version="1" comment="libgit2 is &lt;0.24.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171717" version="1" comment="libgit2-24 is &lt;0.24.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171718" version="1" comment="libgit2-devel is &lt;0.24.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171719" version="1" comment="irssi is &lt;1.0.5-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171720" version="1" comment="irssi-devel is &lt;1.0.5-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171721" version="1" comment="jq is &lt;1.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171722" version="1" comment="libjq-devel is &lt;1.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171723" version="1" comment="libjq1 is &lt;1.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171724" version="1" comment="SDL2 is &lt;2.0.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171725" version="1" comment="libSDL2-2_0-0 is &lt;2.0.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166189" version="1" comment="libSDL2-2_0-0-32bit is &lt;2.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171726" version="1" comment="libSDL2-devel is &lt;2.0.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166191" version="1" comment="libSDL2-devel-32bit is &lt;2.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171727" version="1" comment="redis is &lt;4.0.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166801" version="1" comment="ansible is &lt;2.4.1.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171728" version="1" comment="mongodb is &lt;3.4.10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171729" version="1" comment="mongodb-mongoperf is &lt;3.4.10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171730" version="1" comment="mongodb-mongos is &lt;3.4.10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171731" version="1" comment="mongodb-server is &lt;3.4.10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171732" version="1" comment="mongodb-shell is &lt;3.4.10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171733" version="1" comment="MozillaThunderbird is &lt;52.5.0-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171734" version="1" comment="MozillaThunderbird-buildsymbols is &lt;52.5.0-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171735" version="1" comment="MozillaThunderbird-devel is &lt;52.5.0-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171736" version="1" comment="MozillaThunderbird-translations-common is &lt;52.5.0-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171737" version="1" comment="MozillaThunderbird-translations-other is &lt;52.5.0-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171738" version="1" comment="tor is &lt;0.3.1.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171739" version="1" comment="chromedriver is &lt;63.0.3239.84-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171740" version="1" comment="chromium is &lt;63.0.3239.84-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171741" version="1" comment="erlang is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171742" version="1" comment="erlang-debugger is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171743" version="1" comment="erlang-debugger-src is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171744" version="1" comment="erlang-dialyzer is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171745" version="1" comment="erlang-dialyzer-src is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171746" version="1" comment="erlang-diameter is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171747" version="1" comment="erlang-diameter-src is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171748" version="1" comment="erlang-doc is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171749" version="1" comment="erlang-epmd is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171750" version="1" comment="erlang-et is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171751" version="1" comment="erlang-et-src is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171752" version="1" comment="erlang-gs is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171753" version="1" comment="erlang-gs-src is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171754" version="1" comment="erlang-jinterface is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171755" version="1" comment="erlang-jinterface-src is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171756" version="1" comment="erlang-observer is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171757" version="1" comment="erlang-observer-src is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171758" version="1" comment="erlang-reltool is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171759" version="1" comment="erlang-reltool-src is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171760" version="1" comment="erlang-src is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171761" version="1" comment="erlang-wx is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171762" version="1" comment="erlang-wx-src is &lt;18.3.4.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171763" version="1" comment="chromedriver is &lt;63.0.3239.108-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171764" version="1" comment="chromium is &lt;63.0.3239.108-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171765" version="1" comment="enigmail is &lt;1.9.9-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171766" version="1" comment="MozillaThunderbird is &lt;52.5.2-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171767" version="1" comment="MozillaThunderbird-buildsymbols is &lt;52.5.2-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171768" version="1" comment="MozillaThunderbird-devel is &lt;52.5.2-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171769" version="1" comment="MozillaThunderbird-translations-common is &lt;52.5.2-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171770" version="1" comment="MozillaThunderbird-translations-other is &lt;52.5.2-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171771" version="1" comment="phpMyAdmin is &lt;4.7.7-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171772" version="1" comment="MozillaThunderbird is &lt;45.7.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171773" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.7.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171774" version="1" comment="MozillaThunderbird-devel is &lt;45.7.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171775" version="1" comment="MozillaThunderbird-translations-common is &lt;45.7.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171776" version="1" comment="MozillaThunderbird-translations-other is &lt;45.7.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171777" version="1" comment="kopete is &lt;15.12.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171778" version="1" comment="kopete-devel is &lt;15.12.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171779" version="1" comment="nginx is &lt;1.8.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171780" version="1" comment="libgit2 is &lt;0.24.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171781" version="1" comment="libgit2-24 is &lt;0.24.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171782" version="1" comment="libgit2-devel is &lt;0.24.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171783" version="1" comment="irssi is &lt;1.0.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171784" version="1" comment="irssi-devel is &lt;1.0.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171785" version="1" comment="chromedriver is &lt;56.0.2924.87-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171786" version="1" comment="chromium is &lt;56.0.2924.87-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171787" version="1" comment="kdelibs4 is &lt;4.14.25-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171788" version="1" comment="kdelibs4-apidocs is &lt;4.14.25-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171789" version="1" comment="kdelibs4-branding-upstream is &lt;4.14.25-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171790" version="1" comment="kdelibs4-core is &lt;4.14.25-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171791" version="1" comment="kdelibs4-doc is &lt;4.14.25-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171792" version="1" comment="kio is &lt;5.26.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149491" version="1" comment="kio-32bit is &lt;5.26.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171793" version="1" comment="kio-core is &lt;5.26.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149493" version="1" comment="kio-core-32bit is &lt;5.26.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171794" version="1" comment="kio-devel is &lt;5.26.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149495" version="1" comment="kio-devel-32bit is &lt;5.26.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171795" version="1" comment="kio-lang is &lt;5.26.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171796" version="1" comment="libkde4 is &lt;4.14.25-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149498" version="1" comment="libkde4-32bit is &lt;4.14.25-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171797" version="1" comment="libkde4-devel is &lt;4.14.25-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171798" version="1" comment="libkdecore4 is &lt;4.14.25-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149501" version="1" comment="libkdecore4-32bit is &lt;4.14.25-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171799" version="1" comment="libkdecore4-devel is &lt;4.14.25-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171800" version="1" comment="libksuseinstall-devel is &lt;4.14.25-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171801" version="1" comment="libksuseinstall1 is &lt;4.14.25-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149505" version="1" comment="libksuseinstall1-32bit is &lt;4.14.25-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171802" version="1" comment="MozillaThunderbird is &lt;45.8.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171803" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.8.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171804" version="1" comment="MozillaThunderbird-devel is &lt;45.8.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171805" version="1" comment="MozillaThunderbird-translations-common is &lt;45.8.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171806" version="1" comment="MozillaThunderbird-translations-other is &lt;45.8.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171807" version="1" comment="irssi is &lt;1.0.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171808" version="1" comment="irssi-devel is &lt;1.0.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171809" version="1" comment="chromedriver is &lt;57.0.2987.98-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171810" version="1" comment="chromium is &lt;57.0.2987.98-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171811" version="1" comment="libmbedtls9 is &lt;1.3.19-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149836" version="1" comment="libmbedtls9-32bit is &lt;1.3.19-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171812" version="1" comment="mbedtls is &lt;1.3.19-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171813" version="1" comment="mbedtls-devel is &lt;1.3.19-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171814" version="1" comment="chromedriver is &lt;57.0.2987.133-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171815" version="1" comment="chromium is &lt;57.0.2987.133-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171816" version="1" comment="geotiff is &lt;1.4.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171817" version="1" comment="geotiff-devel is &lt;1.4.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171818" version="1" comment="libgeotiff2 is &lt;1.4.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171819" version="1" comment="ffmpeg is &lt;3.1.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171820" version="1" comment="ffmpeg-devel is &lt;2.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171821" version="1" comment="libavcodec-devel is &lt;3.1.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171822" version="1" comment="libavcodec56 is &lt;2.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171823" version="1" comment="libavcodec57 is &lt;3.1.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150856" version="1" comment="libavcodec57-32bit is &lt;3.2.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171824" version="1" comment="libavdevice-devel is &lt;3.1.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171825" version="1" comment="libavdevice56 is &lt;2.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171826" version="1" comment="libavdevice57 is &lt;3.1.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150859" version="1" comment="libavdevice57-32bit is &lt;3.2.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171827" version="1" comment="libavfilter-devel is &lt;3.1.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171828" version="1" comment="libavfilter5 is &lt;2.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171829" version="1" comment="libavfilter6 is &lt;3.1.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150862" version="1" comment="libavfilter6-32bit is &lt;3.2.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171830" version="1" comment="libavformat-devel is &lt;3.1.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171831" version="1" comment="libavformat56 is &lt;2.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171832" version="1" comment="libavformat57 is &lt;3.1.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150865" version="1" comment="libavformat57-32bit is &lt;3.2.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171833" version="1" comment="libavresample-devel is &lt;3.1.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171834" version="1" comment="libavresample2 is &lt;2.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171835" version="1" comment="libavresample3 is &lt;3.1.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150868" version="1" comment="libavresample3-32bit is &lt;3.2.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171836" version="1" comment="libavutil-devel is &lt;3.1.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171837" version="1" comment="libavutil54 is &lt;2.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171838" version="1" comment="libavutil55 is &lt;3.1.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150871" version="1" comment="libavutil55-32bit is &lt;3.2.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171839" version="1" comment="libpostproc-devel is &lt;3.1.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171840" version="1" comment="libpostproc53 is &lt;2.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171841" version="1" comment="libpostproc54 is &lt;3.1.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150874" version="1" comment="libpostproc54-32bit is &lt;3.2.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171842" version="1" comment="libswresample-devel is &lt;3.1.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171843" version="1" comment="libswresample1 is &lt;2.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171844" version="1" comment="libswresample2 is &lt;3.1.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150877" version="1" comment="libswresample2-32bit is &lt;3.2.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171845" version="1" comment="libswscale-devel is &lt;3.1.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171846" version="1" comment="libswscale3 is &lt;2.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171847" version="1" comment="libswscale4 is &lt;3.1.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150880" version="1" comment="libswscale4-32bit is &lt;3.2.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171848" version="1" comment="chromedriver is &lt;58.0.3029.81-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171849" version="1" comment="chromium is &lt;58.0.3029.81-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171850" version="1" comment="chromedriver is &lt;58.0.3029.96-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171851" version="1" comment="chromium is &lt;58.0.3029.96-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171852" version="1" comment="MozillaThunderbird is &lt;52.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171853" version="1" comment="MozillaThunderbird-buildsymbols is &lt;52.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171854" version="1" comment="MozillaThunderbird-devel is &lt;52.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171855" version="1" comment="MozillaThunderbird-translations-common is &lt;52.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171856" version="1" comment="MozillaThunderbird-translations-other is &lt;52.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171857" version="1" comment="kauth is &lt;5.26.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171858" version="1" comment="kauth-devel is &lt;5.26.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155462" version="1" comment="kauth-devel-32bit is &lt;5.26.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171859" version="1" comment="kdelibs4 is &lt;4.14.25-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171860" version="1" comment="kdelibs4-apidocs is &lt;4.14.25-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171861" version="1" comment="kdelibs4-branding-upstream is &lt;4.14.25-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171862" version="1" comment="kdelibs4-core is &lt;4.14.25-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171863" version="1" comment="kdelibs4-doc is &lt;4.14.25-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171864" version="1" comment="libKF5Auth5 is &lt;5.26.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155469" version="1" comment="libKF5Auth5-32bit is &lt;5.26.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171865" version="1" comment="libKF5Auth5-lang is &lt;5.26.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171866" version="1" comment="libkde4 is &lt;4.14.25-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155472" version="1" comment="libkde4-32bit is &lt;4.14.25-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171867" version="1" comment="libkde4-devel is &lt;4.14.25-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171868" version="1" comment="libkdecore4 is &lt;4.14.25-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155475" version="1" comment="libkdecore4-32bit is &lt;4.14.25-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171869" version="1" comment="libkdecore4-devel is &lt;4.14.25-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171870" version="1" comment="libksuseinstall-devel is &lt;4.14.25-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171871" version="1" comment="libksuseinstall1 is &lt;4.14.25-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155479" version="1" comment="libksuseinstall1-32bit is &lt;4.14.25-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171872" version="1" comment="chromedriver is &lt;59.0.3071.86-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171873" version="1" comment="chromium is &lt;59.0.3071.86-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171874" version="1" comment="irssi is &lt;1.0.3-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171875" version="1" comment="irssi-devel is &lt;1.0.3-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171876" version="1" comment="irssi is &lt;0.8.21-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171877" version="1" comment="irssi-devel is &lt;0.8.21-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171878" version="1" comment="ffmpeg2 is &lt;2.8.11-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171879" version="1" comment="ffmpeg2-devel is &lt;2.8.11-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171880" version="1" comment="libavcodec56 is &lt;2.8.11-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171881" version="1" comment="libavdevice56 is &lt;2.8.11-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171882" version="1" comment="libavfilter5 is &lt;2.8.11-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171883" version="1" comment="libavformat56 is &lt;2.8.11-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171884" version="1" comment="libavresample2 is &lt;2.8.11-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171885" version="1" comment="libavutil54 is &lt;2.8.11-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171886" version="1" comment="libpostproc53 is &lt;2.8.11-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171887" version="1" comment="libswresample1 is &lt;2.8.11-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171888" version="1" comment="libswscale3 is &lt;2.8.11-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171889" version="1" comment="ffmpeg is &lt;3.1.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171890" version="1" comment="libavcodec-devel is &lt;3.1.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171891" version="1" comment="libavcodec57 is &lt;3.1.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171892" version="1" comment="libavdevice-devel is &lt;3.1.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171893" version="1" comment="libavdevice57 is &lt;3.1.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171894" version="1" comment="libavfilter-devel is &lt;3.1.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171895" version="1" comment="libavfilter6 is &lt;3.1.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171896" version="1" comment="libavformat-devel is &lt;3.1.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171897" version="1" comment="libavformat57 is &lt;3.1.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171898" version="1" comment="libavresample-devel is &lt;3.1.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171899" version="1" comment="libavresample3 is &lt;3.1.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171900" version="1" comment="libavutil-devel is &lt;3.1.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171901" version="1" comment="libavutil55 is &lt;3.1.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171902" version="1" comment="libpostproc-devel is &lt;3.1.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171903" version="1" comment="libpostproc54 is &lt;3.1.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171904" version="1" comment="libswresample-devel is &lt;3.1.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171905" version="1" comment="libswresample2 is &lt;3.1.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171906" version="1" comment="libswscale-devel is &lt;3.1.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171907" version="1" comment="libswscale4 is &lt;3.1.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171908" version="1" comment="MozillaThunderbird is &lt;52.2-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171909" version="1" comment="MozillaThunderbird-buildsymbols is &lt;52.2-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171910" version="1" comment="MozillaThunderbird-devel is &lt;52.2-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171911" version="1" comment="MozillaThunderbird-translations-common is &lt;52.2-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171912" version="1" comment="MozillaThunderbird-translations-other is &lt;52.2-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171913" version="1" comment="chromedriver is &lt;59.0.3071.104-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171914" version="1" comment="chromium is &lt;59.0.3071.104-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172060" version="1" comment="go is &lt;1.7.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172061" version="1" comment="go-doc is &lt;1.7.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171917" version="1" comment="akonadi_resources is &lt;16.08.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171918" version="1" comment="akregator5 is &lt;16.08.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171919" version="1" comment="blogilo5 is &lt;16.08.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171920" version="1" comment="kaddressbook5 is &lt;16.08.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171921" version="1" comment="kalarm5 is &lt;16.08.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171922" version="1" comment="kdepim is &lt;16.08.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171923" version="1" comment="kmail5 is &lt;16.08.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171924" version="1" comment="knotes5 is &lt;16.08.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171925" version="1" comment="kontact5 is &lt;16.08.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171926" version="1" comment="korganizer5 is &lt;16.08.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171927" version="1" comment="ktnef5 is &lt;16.08.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171928" version="1" comment="messagelib is &lt;16.08.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171929" version="1" comment="messagelib-devel is &lt;16.08.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171930" version="1" comment="ffmpeg2 is &lt;2.8.12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171931" version="1" comment="ffmpeg2-devel is &lt;2.8.12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171932" version="1" comment="libavcodec56 is &lt;2.8.12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171933" version="1" comment="libavdevice56 is &lt;2.8.12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171934" version="1" comment="libavfilter5 is &lt;2.8.12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171935" version="1" comment="libavformat56 is &lt;2.8.12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171936" version="1" comment="libavresample2 is &lt;2.8.12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171937" version="1" comment="libavutil54 is &lt;2.8.12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171938" version="1" comment="libpostproc53 is &lt;2.8.12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171939" version="1" comment="libswresample1 is &lt;2.8.12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171940" version="1" comment="libswscale3 is &lt;2.8.12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171941" version="1" comment="irssi is &lt;1.0.4-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171942" version="1" comment="irssi-devel is &lt;1.0.4-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171943" version="1" comment="chromedriver is &lt;60.0.3112.78-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171944" version="1" comment="chromium is &lt;60.0.3112.78-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171945" version="1" comment="ark is &lt;15.12.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171946" version="1" comment="libkerfuffle15 is &lt;15.12.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147112" version="1" comment="libkerfuffle16 is &lt;16.08.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171947" version="1" comment="MozillaThunderbird is &lt;52.3.0-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171948" version="1" comment="MozillaThunderbird-buildsymbols is &lt;52.3.0-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171949" version="1" comment="MozillaThunderbird-devel is &lt;52.3.0-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171950" version="1" comment="MozillaThunderbird-translations-common is &lt;52.3.0-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171951" version="1" comment="MozillaThunderbird-translations-other is &lt;52.3.0-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171952" version="1" comment="MozillaThunderbird is &lt;52.6-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171953" version="1" comment="MozillaThunderbird-buildsymbols is &lt;52.6-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171954" version="1" comment="MozillaThunderbird-devel is &lt;52.6-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171955" version="1" comment="MozillaThunderbird-translations-common is &lt;52.6-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171956" version="1" comment="MozillaThunderbird-translations-other is &lt;52.6-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171957" version="1" comment="chromedriver is &lt;64.0.3282.119-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171958" version="1" comment="chromium is &lt;64.0.3282.119-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171959" version="1" comment="libre2-0 is &lt;20180101-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171960" version="1" comment="re2 is &lt;20180101-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171961" version="1" comment="re2-devel is &lt;20180101-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171962" version="1" comment="chromedriver is &lt;64.0.3282.140-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171963" version="1" comment="chromium is &lt;64.0.3282.140-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171964" version="1" comment="libre2-0 is &lt;20180201-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170895" version="1" comment="libre2-0-32bit is &lt;20180201-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171965" version="1" comment="re2 is &lt;20180201-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171966" version="1" comment="re2-devel is &lt;20180201-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171967" version="1" comment="drkonqi5 is &lt;5.8.7-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171968" version="1" comment="plasma5-workspace is &lt;5.8.7-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171969" version="1" comment="plasma5-workspace-devel is &lt;5.8.7-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171970" version="1" comment="plasma5-workspace-lang is &lt;5.8.7-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171971" version="1" comment="plasma5-workspace-libs is &lt;5.8.7-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171972" version="1" comment="chromedriver is &lt;64.0.3282.167-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171973" version="1" comment="chromium is &lt;64.0.3282.167-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171974" version="1" comment="irssi is &lt;1.1.1-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171975" version="1" comment="irssi-devel is &lt;1.1.1-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171976" version="1" comment="ffmpeg is &lt;3.4.2-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171977" version="1" comment="libavcodec-devel is &lt;3.4.2-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171978" version="1" comment="libavcodec57 is &lt;3.4.2-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171979" version="1" comment="libavcodec57-32bit is &lt;3.4.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171980" version="1" comment="libavdevice-devel is &lt;3.4.2-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171981" version="1" comment="libavdevice57 is &lt;3.4.2-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171982" version="1" comment="libavdevice57-32bit is &lt;3.4.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171983" version="1" comment="libavfilter-devel is &lt;3.4.2-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171984" version="1" comment="libavfilter6 is &lt;3.4.2-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171985" version="1" comment="libavfilter6-32bit is &lt;3.4.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171986" version="1" comment="libavformat-devel is &lt;3.4.2-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171987" version="1" comment="libavformat57 is &lt;3.4.2-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171988" version="1" comment="libavformat57-32bit is &lt;3.4.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171989" version="1" comment="libavresample-devel is &lt;3.4.2-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171990" version="1" comment="libavresample3 is &lt;3.4.2-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171991" version="1" comment="libavresample3-32bit is &lt;3.4.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171992" version="1" comment="libavutil-devel is &lt;3.4.2-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171993" version="1" comment="libavutil55 is &lt;3.4.2-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171994" version="1" comment="libavutil55-32bit is &lt;3.4.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171995" version="1" comment="libpostproc-devel is &lt;3.4.2-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171996" version="1" comment="libpostproc54 is &lt;3.4.2-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171997" version="1" comment="libpostproc54-32bit is &lt;3.4.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171998" version="1" comment="libswresample-devel is &lt;3.4.2-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171999" version="1" comment="libswresample2 is &lt;3.4.2-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172000" version="1" comment="libswresample2-32bit is &lt;3.4.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172001" version="1" comment="libswscale-devel is &lt;3.4.2-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172002" version="1" comment="libswscale4 is &lt;3.4.2-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172003" version="1" comment="libswscale4-32bit is &lt;3.4.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172004" version="1" comment="irssi is &lt;1.0.6-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172005" version="1" comment="irssi-devel is &lt;1.0.6-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172006" version="1" comment="libsox3 is &lt;14.4.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172007" version="1" comment="sox is &lt;14.4.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172008" version="1" comment="sox-devel is &lt;14.4.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172009" version="1" comment="libmbedtls9 is &lt;1.3.19-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172010" version="1" comment="libmbedtls9-32bit is &lt;1.3.19-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172011" version="1" comment="mbedtls is &lt;1.3.19-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172012" version="1" comment="mbedtls-devel is &lt;1.3.19-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172279" version="1" comment="libmad is &lt;0.15.1b-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172280" version="1" comment="libmad-devel is &lt;0.15.1b-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172281" version="1" comment="libmad0 is &lt;0.15.1b-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172282" version="1" comment="libmad0-32bit is &lt;0.15.1b-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172382" version="1" comment="phpMyAdmin is &lt;4.7.8-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172470" version="1" comment="lame is &lt;3.100-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172471" version="1" comment="lame-doc is &lt;3.100-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172472" version="1" comment="lame-mp3rtp is &lt;3.100-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172473" version="1" comment="libmp3lame-devel is &lt;3.100-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172474" version="1" comment="libmp3lame0 is &lt;3.100-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172475" version="1" comment="libmp3lame0-32bit is &lt;3.100-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172638" version="1" comment="freexl is &lt;1.0.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172639" version="1" comment="freexl-devel is &lt;1.0.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172640" version="1" comment="libfreexl1 is &lt;1.0.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172663" version="1" comment="go is &lt;1.9.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172664" version="1" comment="go-doc is &lt;1.9.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172665" version="1" comment="go-race is &lt;1.9.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172666" version="1" comment="go1.9 is &lt;1.9.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172667" version="1" comment="go1.9-doc is &lt;1.9.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172668" version="1" comment="go1.9-race is &lt;1.9.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172711" version="1" comment="tor is &lt;0.3.2.10-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172759" version="1" comment="go1.8 is &lt;1.8.7-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172760" version="1" comment="go1.8-doc is &lt;1.8.7-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172761" version="1" comment="go1.8-race is &lt;1.8.7-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172762" version="1" comment="python-Django is &lt;1.11.10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172862" version="1" comment="python-Django is &lt;1.11.11-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173808" version="1" comment="nginx is &lt;1.13.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173809" version="1" comment="vim-plugin-nginx is &lt;1.13.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173810" version="1" comment="MozillaThunderbird is &lt;52.7-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173811" version="1" comment="MozillaThunderbird-buildsymbols is &lt;52.7-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173812" version="1" comment="MozillaThunderbird-devel is &lt;52.7-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173813" version="1" comment="MozillaThunderbird-translations-common is &lt;52.7-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173814" version="1" comment="MozillaThunderbird-translations-other is &lt;52.7-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174460" version="1" comment="pdns-recursor is &lt;4.1.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174717" version="1" comment="libmbedtls9 is &lt;1.3.19-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174718" version="1" comment="libmbedtls9-32bit is &lt;1.3.19-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174719" version="1" comment="mbedtls is &lt;1.3.19-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174720" version="1" comment="mbedtls-devel is &lt;1.3.19-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174767" version="1" comment="phpMyAdmin is &lt;4.8.0.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174768" version="1" comment="hdf5 is &lt;1.8.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174769" version="1" comment="hdf5-devel is &lt;1.8.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174770" version="1" comment="hdf5-devel-data is &lt;1.8.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174771" version="1" comment="hdf5-devel-static is &lt;1.8.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174772" version="1" comment="hdf5-examples is &lt;1.8.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174773" version="1" comment="hdf5-openmpi is &lt;1.8.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174774" version="1" comment="hdf5-openmpi-devel is &lt;1.8.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174775" version="1" comment="hdf5-openmpi-devel-static is &lt;1.8.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174776" version="1" comment="libhdf5-10 is &lt;1.8.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174777" version="1" comment="libhdf5-10-openmpi is &lt;1.8.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174778" version="1" comment="libhdf5_cpp12 is &lt;1.8.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174779" version="1" comment="libhdf5_fortran10 is &lt;1.8.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174780" version="1" comment="libhdf5_fortran10-openmpi is &lt;1.8.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174781" version="1" comment="libhdf5_hl10 is &lt;1.8.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174782" version="1" comment="libhdf5_hl10-openmpi is &lt;1.8.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174783" version="1" comment="libhdf5_hl_cpp11 is &lt;1.8.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174784" version="1" comment="libhdf5hl_fortran10 is &lt;1.8.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174785" version="1" comment="libhdf5hl_fortran10-openmpi is &lt;1.8.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172013" version="1" comment="redis is &lt;4.0.6-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143418" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.65-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143419" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.65-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172014" version="1" comment="libopenjp2-7 is &lt;2.1.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172015" version="1" comment="openjpeg2 is &lt;2.1.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172016" version="1" comment="openjpeg2-devel is &lt;2.1.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172017" version="1" comment="ffmpeg is &lt;2.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172018" version="1" comment="libavcodec-devel is &lt;2.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150855" version="1" comment="libavcodec57 is &lt;3.2.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172019" version="1" comment="libavdevice-devel is &lt;2.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150858" version="1" comment="libavdevice57 is &lt;3.2.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172020" version="1" comment="libavfilter-devel is &lt;2.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150861" version="1" comment="libavfilter6 is &lt;3.2.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172021" version="1" comment="libavformat-devel is &lt;2.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150864" version="1" comment="libavformat57 is &lt;3.2.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172022" version="1" comment="libavresample-devel is &lt;2.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150867" version="1" comment="libavresample3 is &lt;3.2.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172023" version="1" comment="libavutil-devel is &lt;2.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150870" version="1" comment="libavutil55 is &lt;3.2.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172024" version="1" comment="libpostproc-devel is &lt;2.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150873" version="1" comment="libpostproc54 is &lt;3.2.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172025" version="1" comment="libswresample-devel is &lt;2.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150876" version="1" comment="libswresample2 is &lt;3.2.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172026" version="1" comment="libswscale-devel is &lt;2.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150879" version="1" comment="libswscale4 is &lt;3.2.4-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172027" version="1" comment="libopenjp2-7 is &lt;2.1.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172028" version="1" comment="openjpeg2 is &lt;2.1.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172029" version="1" comment="openjpeg2-devel is &lt;2.1.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172030" version="1" comment="kdelibs4 is &lt;4.14.18-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172031" version="1" comment="kdelibs4-apidocs is &lt;4.14.18-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172032" version="1" comment="kdelibs4-branding-upstream is &lt;4.14.18-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172033" version="1" comment="kdelibs4-core is &lt;4.14.18-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172034" version="1" comment="kdelibs4-doc is &lt;4.14.18-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172035" version="1" comment="kio is &lt;5.20.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172036" version="1" comment="kio-core is &lt;5.20.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172037" version="1" comment="kio-devel is &lt;5.20.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172038" version="1" comment="kio-lang is &lt;5.20.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172039" version="1" comment="libkde4 is &lt;4.14.18-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172040" version="1" comment="libkde4-devel is &lt;4.14.18-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172041" version="1" comment="libkdecore4 is &lt;4.14.18-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172042" version="1" comment="libkdecore4-devel is &lt;4.14.18-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172043" version="1" comment="libksuseinstall-devel is &lt;4.14.18-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172044" version="1" comment="libksuseinstall1 is &lt;4.14.18-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172045" version="1" comment="kauth is &lt;5.20.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172046" version="1" comment="kauth-devel is &lt;5.20.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172047" version="1" comment="kdelibs4 is &lt;4.14.18-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172048" version="1" comment="kdelibs4-apidocs is &lt;4.14.18-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172049" version="1" comment="kdelibs4-branding-upstream is &lt;4.14.18-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172050" version="1" comment="kdelibs4-core is &lt;4.14.18-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172051" version="1" comment="kdelibs4-doc is &lt;4.14.18-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172052" version="1" comment="libKF5Auth5 is &lt;5.20.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172053" version="1" comment="libKF5Auth5-lang is &lt;5.20.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172054" version="1" comment="libkde4 is &lt;4.14.18-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172055" version="1" comment="libkde4-devel is &lt;4.14.18-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172056" version="1" comment="libkdecore4 is &lt;4.14.18-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172057" version="1" comment="libkdecore4-devel is &lt;4.14.18-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172058" version="1" comment="libksuseinstall-devel is &lt;4.14.18-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172059" version="1" comment="libksuseinstall1 is &lt;4.14.18-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170892" version="1" comment="chromedriver is &lt;64.0.3282.140-138.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170893" version="1" comment="chromium is &lt;64.0.3282.140-138.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143420" version="1" comment="LibVNCServer is &lt;0.9.1-154.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060800" version="1" comment="sles-release is ==11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059483" version="1" comment="MozillaFirefox is &lt;3.5.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059482" version="1" comment="MozillaFirefox-translations is &lt;3.5.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156399" version="1" comment="NetworkManager is &lt;0.7.0.r4359-15.22.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156400" version="1" comment="NetworkManager-glib is &lt;0.7.0.r4359-15.22.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156401" version="1" comment="NetworkManager-gnome is &lt;0.7.0.r1053-11.16.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054497" version="1" comment="OpenEXR is &lt;1.6.1-83.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054495" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054496" version="1" comment="OpenEXR-x86 is &lt;1.6.1-83.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156402" version="1" comment="PackageKit is &lt;0.3.14-2.12.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156403" version="1" comment="PackageKit-lang is &lt;0.3.14-2.12.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156404" version="1" comment="hal is &lt;0.5.12-23.40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156405" version="1" comment="hal-32bit is &lt;0.5.12-23.40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156406" version="1" comment="hal-doc is &lt;0.5.12-23.40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156407" version="1" comment="hal-x86 is &lt;0.5.12-23.40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156408" version="1" comment="libpackagekit-glib10 is &lt;0.3.14-2.12.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156409" version="1" comment="yast2-core is &lt;2.17.35-0.2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156410" version="1" comment="PolicyKit is &lt;0.9-14.34.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156411" version="1" comment="PolicyKit-32bit is &lt;0.9-14.34.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156412" version="1" comment="PolicyKit-doc is &lt;0.9-14.34.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156413" version="1" comment="PolicyKit-x86 is &lt;0.9-14.34.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156414" version="1" comment="amavisd-new is &lt;2.6.2-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156415" version="1" comment="apache2 is &lt;2.2.10-2.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156416" version="1" comment="apache2-doc is &lt;2.2.10-2.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156417" version="1" comment="apache2-example-pages is &lt;2.2.10-2.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156418" version="1" comment="apache2-prefork is &lt;2.2.10-2.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156419" version="1" comment="apache2-utils is &lt;2.2.10-2.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156420" version="1" comment="apache2-worker is &lt;2.2.10-2.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143445" version="1" comment="apache2-mod_perl is &lt;2.0.4-40.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058031" version="1" comment="apache2-mod_php5 is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111688" version="1" comment="php5 is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058032" version="1" comment="php5-bcmath is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058033" version="1" comment="php5-bz2 is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058034" version="1" comment="php5-calendar is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058035" version="1" comment="php5-ctype is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058036" version="1" comment="php5-curl is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058037" version="1" comment="php5-dba is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058038" version="1" comment="php5-dbase is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058039" version="1" comment="php5-dom is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058040" version="1" comment="php5-exif is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058041" version="1" comment="php5-fastcgi is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058042" version="1" comment="php5-ftp is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058043" version="1" comment="php5-gd is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058044" version="1" comment="php5-gettext is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058045" version="1" comment="php5-gmp is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058046" version="1" comment="php5-hash is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058047" version="1" comment="php5-iconv is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058048" version="1" comment="php5-json is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058049" version="1" comment="php5-ldap is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058050" version="1" comment="php5-mbstring is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058051" version="1" comment="php5-mcrypt is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058052" version="1" comment="php5-mysql is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058053" version="1" comment="php5-odbc is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058054" version="1" comment="php5-openssl is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058055" version="1" comment="php5-pcntl is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058056" version="1" comment="php5-pdo is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058057" version="1" comment="php5-pear is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058058" version="1" comment="php5-pgsql is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058059" version="1" comment="php5-pspell is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058060" version="1" comment="php5-shmop is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058061" version="1" comment="php5-snmp is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058062" version="1" comment="php5-soap is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058063" version="1" comment="php5-suhosin is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058064" version="1" comment="php5-sysvmsg is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058065" version="1" comment="php5-sysvsem is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058066" version="1" comment="php5-sysvshm is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058067" version="1" comment="php5-tokenizer is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058068" version="1" comment="php5-wddx is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058069" version="1" comment="php5-xmlreader is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058070" version="1" comment="php5-xmlrpc is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058071" version="1" comment="php5-xmlwriter is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058072" version="1" comment="php5-xsl is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058073" version="1" comment="php5-zip is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058074" version="1" comment="php5-zlib is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144309" version="1" comment="avahi is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144310" version="1" comment="avahi-lang is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144311" version="1" comment="avahi-utils is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144312" version="1" comment="libavahi-client3 is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144313" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144314" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144315" version="1" comment="libavahi-common3 is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144316" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144317" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144318" version="1" comment="libavahi-core5 is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144319" version="1" comment="libdns_sd is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144320" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144321" version="1" comment="libdns_sd-x86 is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057433" version="1" comment="bind is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057427" version="1" comment="bind-chrootenv is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057428" version="1" comment="bind-doc is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057431" version="1" comment="bind-libs is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057429" version="1" comment="bind-libs-32bit is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057430" version="1" comment="bind-libs-x86 is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057432" version="1" comment="bind-utils is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144329" version="1" comment="boost-license is &lt;1.36.0-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144330" version="1" comment="libboost_program_options1_36_0 is &lt;1.36.0-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144331" version="1" comment="libboost_regex1_36_0 is &lt;1.36.0-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144332" version="1" comment="libboost_signals1_36_0 is &lt;1.36.0-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156421" version="1" comment="bzip2 is &lt;1.0.5-34.246" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156422" version="1" comment="bzip2-doc is &lt;1.0.5-34.246" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156423" version="1" comment="libbz2-1 is &lt;1.0.5-34.246" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156424" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.246" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156425" version="1" comment="libbz2-1-x86 is &lt;1.0.5-34.246" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156426" version="1" comment="cifs-mount is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156427" version="1" comment="ldapsmb is &lt;1.34b-11.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156428" version="1" comment="libsmbclient0 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156429" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156430" version="1" comment="libsmbclient0-x86 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156431" version="1" comment="libtalloc1 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156432" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156433" version="1" comment="libtalloc1-x86 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156434" version="1" comment="libtdb1 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156435" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156436" version="1" comment="libtdb1-x86 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156437" version="1" comment="libwbclient0 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156438" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156439" version="1" comment="libwbclient0-x86 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156440" version="1" comment="samba is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156441" version="1" comment="samba-32bit is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156442" version="1" comment="samba-client is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156443" version="1" comment="samba-client-32bit is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156444" version="1" comment="samba-client-x86 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156445" version="1" comment="samba-krb-printing is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156446" version="1" comment="samba-winbind is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156447" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156448" version="1" comment="samba-winbind-x86 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156449" version="1" comment="samba-x86 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107268" version="1" comment="clamav is &lt;0.96-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143519" version="1" comment="coolkey is &lt;1.1.0-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156450" version="1" comment="cron is &lt;4.1-194.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058945" version="1" comment="cups is &lt;1.3.9-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058941" version="1" comment="cups-client is &lt;1.3.9-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058944" version="1" comment="cups-libs is &lt;1.3.9-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058942" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058943" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156451" version="1" comment="curl is &lt;7.19.0-11.24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156452" version="1" comment="libcurl4 is &lt;7.19.0-11.24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156453" version="1" comment="libcurl4-32bit is &lt;7.19.0-11.24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156454" version="1" comment="libcurl4-x86 is &lt;7.19.0-11.24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055776" version="1" comment="cyrus-imapd is &lt;2.3.11-60.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055777" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055778" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156455" version="1" comment="dbus-1 is &lt;1.2.10-3.11.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156456" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.11.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156457" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.11.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156458" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.11.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156459" version="1" comment="dhcp is &lt;3.1.3.ESV-0.3.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156460" version="1" comment="dhcp-client is &lt;3.1.3.ESV-0.3.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156461" version="1" comment="dhcp-relay is &lt;3.1.3.ESV-0.3.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156462" version="1" comment="dhcp-server is &lt;3.1.3.ESV-0.3.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156463" version="1" comment="e2fsprogs is &lt;1.41.9-2.1.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156464" version="1" comment="libcom_err2 is &lt;1.41.9-2.1.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156465" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.1.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156466" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.1.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156467" version="1" comment="libext2fs2 is &lt;1.41.9-2.1.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156468" version="1" comment="emacs is &lt;22.3-4.32.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156469" version="1" comment="emacs-el is &lt;22.3-4.32.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156470" version="1" comment="emacs-info is &lt;22.3-4.32.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156471" version="1" comment="emacs-nox is &lt;22.3-4.32.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156472" version="1" comment="emacs-x11 is &lt;22.3-4.32.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156473" version="1" comment="enscript is &lt;1.6.4-152.17.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156474" version="1" comment="evince is &lt;2.28.2-0.2.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156475" version="1" comment="evince-doc is &lt;2.28.2-0.2.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156476" version="1" comment="evince-lang is &lt;2.28.2-0.2.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156477" version="1" comment="evolution-data-server is &lt;2.28.2-0.10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156478" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156479" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156480" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057200" version="1" comment="expat is &lt;2.0.1-88.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057203" version="1" comment="libexpat1 is &lt;2.0.1-88.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057201" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057202" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053783" version="1" comment="fetchmail is &lt;6.3.8.90-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053784" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156481" version="1" comment="file is &lt;4.24-43.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156482" version="1" comment="file-32bit is &lt;4.24-43.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156483" version="1" comment="file-x86 is &lt;4.24-43.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156484" version="1" comment="findutils is &lt;4.4.0-38.24.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156485" version="1" comment="findutils-locate is &lt;4.4.0-38.24.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156486" version="1" comment="freeradius-server is &lt;2.1.1-7.7.19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144357" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.7.19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144358" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.7.19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144359" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.7.19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144360" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.7.19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156487" version="1" comment="freetype2 is &lt;2.3.7-25.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156488" version="1" comment="freetype2-32bit is &lt;2.3.7-25.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156489" version="1" comment="freetype2-x86 is &lt;2.3.7-25.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144361" version="1" comment="ft2demos is &lt;2.3.7-25.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060019" version="1" comment="fuse is &lt;2.7.2-61.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060020" version="1" comment="libfuse2 is &lt;2.7.2-61.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143559" version="1" comment="fvwm2 is &lt;2.5.26-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143560" version="1" comment="g3utils is &lt;1.1.36-26.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143561" version="1" comment="mgetty is &lt;1.1.36-26.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143562" version="1" comment="gd is &lt;2.0.36.RC1-52.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156490" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.27.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156491" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.27.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156492" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.27.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156493" version="1" comment="ghostscript-library is &lt;8.62-32.27.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156494" version="1" comment="ghostscript-omni is &lt;8.62-32.27.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156495" version="1" comment="ghostscript-x11 is &lt;8.62-32.27.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156496" version="1" comment="libgimpprint is &lt;4.2.7-32.27.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144362" version="1" comment="glib2 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144363" version="1" comment="glib2-doc is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144364" version="1" comment="glib2-lang is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144365" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144366" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144367" version="1" comment="libgio-2_0-0-x86 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144368" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144369" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144370" version="1" comment="libglib-2_0-0-x86 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144371" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144372" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144373" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144374" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144375" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144376" version="1" comment="libgobject-2_0-0-x86 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144377" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144378" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144379" version="1" comment="libgthread-2_0-0-x86 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058364" version="1" comment="gmime is &lt;2.2.23-1.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143597" version="1" comment="gmime-2_4 is &lt;2.4.8-1.2.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058363" version="1" comment="gmime-doc is &lt;2.2.23-1.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058365" version="1" comment="libgmime-2_0-3 is &lt;2.2.23-1.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143600" version="1" comment="libgmime-2_4-2 is &lt;2.4.8-1.2.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156497" version="1" comment="gnome-screensaver is &lt;2.28.3-0.4.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156498" version="1" comment="gnome-screensaver-lang is &lt;2.28.3-0.4.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054538" version="1" comment="gnutls is &lt;2.4.1-24.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054541" version="1" comment="libgnutls26 is &lt;2.4.1-24.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054539" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054540" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156499" version="1" comment="gpg2 is &lt;2.0.9-25.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156500" version="1" comment="gpg2-lang is &lt;2.0.9-25.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156501" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156502" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156503" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156504" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156505" version="1" comment="gstreamer-0_10-plugins-base-x86 is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156506" version="1" comment="libgstapp-0_10-0 is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156507" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156508" version="1" comment="libgstapp-0_10-0-x86 is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156509" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156510" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156511" version="1" comment="libgstinterfaces-0_10-0-x86 is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156512" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.17-1.1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156513" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.17-1.1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156514" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.17-1.1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156515" version="1" comment="gtk2 is &lt;2.18.9-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156516" version="1" comment="gtk2-32bit is &lt;2.18.9-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156517" version="1" comment="gtk2-doc is &lt;2.18.9-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156518" version="1" comment="gtk2-lang is &lt;2.18.9-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156519" version="1" comment="gtk2-x86 is &lt;2.18.9-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156520" version="1" comment="gvim is &lt;7.2-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156521" version="1" comment="vim is &lt;7.2-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156522" version="1" comment="vim-base is &lt;7.2-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156523" version="1" comment="vim-data is &lt;7.2-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057426" version="1" comment="gzip is &lt;1.3.12-69.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156524" version="1" comment="hplip is &lt;3.9.8-3.4.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156525" version="1" comment="hplip-hpijs is &lt;3.9.8-3.4.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143631" version="1" comment="ipsec-tools is &lt;0.7.3-1.1.93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057171" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.3-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057169" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.3-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057170" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.3-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156526" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr7.0-1.6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156527" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr7.0-1.6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156528" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr7.0-1.6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156529" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr7.0-1.6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156530" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr7.0-1.6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156531" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.8.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143634" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.8.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156532" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.8.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156533" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.8.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156534" version="1" comment="kdm is &lt;4.3.5-0.8.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156535" version="1" comment="kwin is &lt;4.3.5-0.8.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143639" version="1" comment="kdebase3-runtime is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143640" version="1" comment="kdebase3-runtime-32bit is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143641" version="1" comment="kdebase3-runtime-x86 is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056569" version="1" comment="kdelibs3 is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056564" version="1" comment="kdelibs3-32bit is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056567" version="1" comment="kdelibs3-default-style is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056565" version="1" comment="kdelibs3-default-style-32bit is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056566" version="1" comment="kdelibs3-default-style-x86 is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056568" version="1" comment="kdelibs3-x86 is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156536" version="1" comment="kdelibs4 is &lt;4.3.5-0.2.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156537" version="1" comment="kdelibs4-core is &lt;4.3.5-0.2.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156538" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.2.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156539" version="1" comment="libkde4 is &lt;4.3.5-0.2.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156540" version="1" comment="libkde4-32bit is &lt;4.3.5-0.2.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156541" version="1" comment="libkde4-x86 is &lt;4.3.5-0.2.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156542" version="1" comment="libkdecore4 is &lt;4.3.5-0.2.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156543" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.2.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156544" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.2.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156545" version="1" comment="kernel-default is &lt;2.6.32.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156546" version="1" comment="kernel-default-base is &lt;2.6.32.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156547" version="1" comment="kernel-default-devel is &lt;2.6.32.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156548" version="1" comment="kernel-default-man is &lt;2.6.32.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156549" version="1" comment="kernel-pae is &lt;2.6.32.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156550" version="1" comment="kernel-pae-base is &lt;2.6.32.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156551" version="1" comment="kernel-pae-devel is &lt;2.6.32.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156552" version="1" comment="kernel-ppc64 is &lt;2.6.32.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156553" version="1" comment="kernel-ppc64-base is &lt;2.6.32.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156554" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156555" version="1" comment="kernel-source is &lt;2.6.32.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156556" version="1" comment="kernel-syms is &lt;2.6.32.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156557" version="1" comment="kernel-trace is &lt;2.6.32.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156558" version="1" comment="kernel-trace-base is &lt;2.6.32.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156559" version="1" comment="kernel-trace-devel is &lt;2.6.32.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156560" version="1" comment="kernel-xen is &lt;2.6.32.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156561" version="1" comment="kernel-xen-base is &lt;2.6.32.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156562" version="1" comment="kernel-xen-devel is &lt;2.6.32.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059529" version="1" comment="krb5 is &lt;1.6.3-133.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059523" version="1" comment="krb5-32bit is &lt;1.6.3-133.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059524" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059525" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059526" version="1" comment="krb5-client is &lt;1.6.3-133.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059527" version="1" comment="krb5-server is &lt;1.6.3-133.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059528" version="1" comment="krb5-x86 is &lt;1.6.3-133.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144432" version="1" comment="krb5-doc is &lt;1.6.3-133.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144433" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144434" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156563" version="1" comment="kvm is &lt;0.12.3-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143670" version="1" comment="lcms is &lt;1.17-77.14.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143671" version="1" comment="liblcms1 is &lt;1.17-77.14.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143672" version="1" comment="liblcms1-32bit is &lt;1.17-77.14.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143673" version="1" comment="liblcms1-x86 is &lt;1.17-77.14.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111684" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111747" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156564" version="1" comment="libQtWebKit4 is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156565" version="1" comment="libQtWebKit4-32bit is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156566" version="1" comment="libQtWebKit4-x86 is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156567" version="1" comment="libqt4 is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156568" version="1" comment="libqt4-32bit is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156569" version="1" comment="libqt4-qt3support is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156570" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156571" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156572" version="1" comment="libqt4-sql is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156573" version="1" comment="libqt4-sql-32bit is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156574" version="1" comment="libqt4-sql-mysql is &lt;4.6.2-1.6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156575" version="1" comment="libqt4-sql-sqlite is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156576" version="1" comment="libqt4-sql-x86 is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156577" version="1" comment="libqt4-x11 is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156578" version="1" comment="libqt4-x11-32bit is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156579" version="1" comment="libqt4-x11-x86 is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156580" version="1" comment="libqt4-x86 is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156581" version="1" comment="qt4-x11-tools is &lt;4.6.2-1.6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143717" version="1" comment="libadns1 is &lt;1.4-73.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055474" version="1" comment="libapr-util1 is &lt;1.3.4-12.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055473" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055476" version="1" comment="libapr1 is &lt;1.3.3-11.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055475" version="1" comment="libapr1-32bit is &lt;1.3.3-11.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143718" version="1" comment="libarchive2 is &lt;2.5.5-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156582" version="1" comment="libdrm is &lt;2.4.17-0.3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156583" version="1" comment="libdrm-32bit is &lt;2.4.17-0.3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156584" version="1" comment="libdrm-x86 is &lt;2.4.17-0.3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144466" version="1" comment="libexif is &lt;0.6.17-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144467" version="1" comment="libexif-32bit is &lt;0.6.17-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144468" version="1" comment="libexif-x86 is &lt;0.6.17-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143723" version="1" comment="libexiv2-4 is &lt;0.17.1-31.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144469" version="1" comment="libgtop is &lt;2.28.0-1.2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144470" version="1" comment="libgtop-2_0-7 is &lt;2.28.0-1.2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144471" version="1" comment="libgtop-doc is &lt;2.28.0-1.2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144472" version="1" comment="libgtop-lang is &lt;2.28.0-1.2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156585" version="1" comment="libicu is &lt;4.0-7.24.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156586" version="1" comment="libicu-32bit is &lt;4.0-7.24.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156587" version="1" comment="libicu-doc is &lt;4.0-7.24.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144473" version="1" comment="libicu-x86 is &lt;4.0-7.24.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057091" version="1" comment="libltdl7 is &lt;2.2.6-2.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057089" version="1" comment="libltdl7-32bit is &lt;2.2.6-2.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057090" version="1" comment="libltdl7-x86 is &lt;2.2.6-2.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057094" version="1" comment="libtool is &lt;2.2.6-2.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057092" version="1" comment="libtool-32bit is &lt;2.2.6-2.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057093" version="1" comment="libtool-x86 is &lt;2.2.6-2.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143739" version="1" comment="libmusicbrainz4 is &lt;2.1.5-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111740" version="1" comment="libmysqlclient15 is &lt;5.0.67-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111752" version="1" comment="libmysqlclient15-32bit is &lt;5.0.67-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111781" version="1" comment="libmysqlclient15-x86 is &lt;5.0.67-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111741" version="1" comment="libmysqlclient_r15 is &lt;5.0.67-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111742" version="1" comment="mysql is &lt;5.0.67-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111743" version="1" comment="mysql-Max is &lt;5.0.67-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111744" version="1" comment="mysql-client is &lt;5.0.67-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055774" version="1" comment="libneon27 is &lt;0.28.3-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055772" version="1" comment="libneon27-32bit is &lt;0.28.3-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055773" version="1" comment="libneon27-x86 is &lt;0.28.3-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055775" version="1" comment="neon is &lt;0.28.3-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058587" version="1" comment="libnetpbm10 is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058585" version="1" comment="libnetpbm10-32bit is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058586" version="1" comment="libnetpbm10-x86 is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058588" version="1" comment="netpbm is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032233" version="1" comment="libopensc2 is &lt;0.11.6-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032231" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032232" version="1" comment="libopensc2-x86 is &lt;0.11.6-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032236" version="1" comment="opensc is &lt;0.11.6-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032234" version="1" comment="opensc-32bit is &lt;0.11.6-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032235" version="1" comment="opensc-x86 is &lt;0.11.6-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156588" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.27.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156589" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.27.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156590" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.27.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156591" version="1" comment="openssl is &lt;0.9.8h-30.27.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156592" version="1" comment="openssl-doc is &lt;0.9.8h-30.27.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053357" version="1" comment="libpng12-0 is &lt;1.2.31-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053355" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053356" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156593" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.2.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156594" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.2.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156595" version="1" comment="libpoppler5 is &lt;0.12.3-1.2.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156596" version="1" comment="poppler-tools is &lt;0.12.3-1.2.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156597" version="1" comment="libpulse-browse0 is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156598" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156599" version="1" comment="libpulse0 is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156600" version="1" comment="libpulse0-32bit is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156601" version="1" comment="libpulse0-x86 is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156602" version="1" comment="pulseaudio is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156603" version="1" comment="pulseaudio-esound-compat is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156604" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156605" version="1" comment="pulseaudio-lang is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156606" version="1" comment="pulseaudio-module-x11 is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156607" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156608" version="1" comment="pulseaudio-utils is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061430" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061429" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156609" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.0-8.9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156610" version="1" comment="python-base is &lt;2.6.0-8.9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156611" version="1" comment="python-base-32bit is &lt;2.6.0-8.9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156612" version="1" comment="python-base-x86 is &lt;2.6.0-8.9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156613" version="1" comment="python-xml is &lt;2.6.0-8.9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143870" version="1" comment="pyxml is &lt;0.8.4-194.23.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143768" version="1" comment="librpcsecgss is &lt;0.18-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156614" version="1" comment="libtirpc1 is &lt;0.2.1-1.2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143770" version="1" comment="libsamplerate is &lt;0.1.4-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143771" version="1" comment="libsamplerate-32bit is &lt;0.1.4-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143772" version="1" comment="libsamplerate-x86 is &lt;0.1.4-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156615" version="1" comment="libsndfile is &lt;1.0.20-2.1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156616" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156617" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156618" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156619" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156620" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156621" version="1" comment="net-snmp is &lt;5.4.2.1-8.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156622" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156623" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156624" version="1" comment="libsoup-2_4-1 is &lt;2.28.2-0.1.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156625" version="1" comment="libsoup-2_4-1-32bit is &lt;2.28.2-0.1.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156626" version="1" comment="libsoup-2_4-1-x86 is &lt;2.28.2-0.1.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054051" version="1" comment="libtiff3 is &lt;3.8.2-141.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054049" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054050" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054052" version="1" comment="tiff is &lt;3.8.2-141.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156627" version="1" comment="libvirt is &lt;0.7.6-1.9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156628" version="1" comment="libvirt-doc is &lt;0.7.6-1.9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156629" version="1" comment="libvirt-python is &lt;0.7.6-1.9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156630" version="1" comment="libvorbis is &lt;1.2.0-79.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156631" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156632" version="1" comment="libvorbis-doc is &lt;1.2.0-79.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156633" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156634" version="1" comment="libxml2 is &lt;2.7.6-0.1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156635" version="1" comment="libxml2-32bit is &lt;2.7.6-0.1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156636" version="1" comment="libxml2-doc is &lt;2.7.6-0.1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156637" version="1" comment="libxml2-x86 is &lt;2.7.6-0.1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144499" version="1" comment="libxslt is &lt;1.1.24-19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144500" version="1" comment="libxslt-32bit is &lt;1.1.24-19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144501" version="1" comment="libxslt-x86 is &lt;1.1.24-19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143802" version="1" comment="log4net is &lt;1.2.10-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156638" version="1" comment="mailman is &lt;2.1.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143806" version="1" comment="man is &lt;2.5.2-17.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111692" version="1" comment="mono-core is &lt;2.0.1-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111693" version="1" comment="mono-data is &lt;2.0.1-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111694" version="1" comment="mono-data-postgresql is &lt;2.0.1-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111695" version="1" comment="mono-data-sqlite is &lt;2.0.1-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111696" version="1" comment="mono-locale-extras is &lt;2.0.1-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111697" version="1" comment="mono-nunit is &lt;2.0.1-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111698" version="1" comment="mono-web is &lt;2.0.1-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111699" version="1" comment="mono-winforms is &lt;2.0.1-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059481" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059477" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059478" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059479" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059480" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156639" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.9-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156640" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.9-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156641" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.9-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156642" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.9-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156643" version="1" comment="mozilla-xulrunner191-x86 is &lt;1.9.1.9-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111745" version="1" comment="mutt is &lt;1.5.17-42.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053628" version="1" comment="nagios is &lt;3.0.6-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053627" version="1" comment="nagios-www is &lt;3.0.6-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144505" version="1" comment="nagios-plugins is &lt;1.4.13-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144506" version="1" comment="nagios-plugins-extras is &lt;1.4.13-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156644" version="1" comment="ntp is &lt;4.2.4p8-1.3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156645" version="1" comment="ntp-doc is &lt;4.2.4p8-1.3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156646" version="1" comment="openssh is &lt;5.1p1-41.31.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156647" version="1" comment="openssh-askpass is &lt;5.1p1-41.31.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054997" version="1" comment="openswan is &lt;2.6.16-1.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054996" version="1" comment="openswan-doc is &lt;2.6.16-1.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144517" version="1" comment="openvpn is &lt;2.0.9-143.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144518" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156648" version="1" comment="pam is &lt;1.0.4-0.5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156649" version="1" comment="pam-32bit is &lt;1.0.4-0.5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156650" version="1" comment="pam-doc is &lt;1.0.4-0.5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156651" version="1" comment="pam-x86 is &lt;1.0.4-0.5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144519" version="1" comment="pam_krb5 is &lt;2.3.1-47.10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144520" version="1" comment="pam_krb5-32bit is &lt;2.3.1-47.10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144521" version="1" comment="pam_krb5-x86 is &lt;2.3.1-47.10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143844" version="1" comment="pam_ldap is &lt;184-147.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143845" version="1" comment="pam_ldap-32bit is &lt;184-147.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143846" version="1" comment="pam_ldap-x86 is &lt;184-147.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144522" version="1" comment="pam_mount is &lt;0.47-13.13.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144523" version="1" comment="pam_mount-32bit is &lt;0.47-13.13.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144524" version="1" comment="pam_mount-x86 is &lt;0.47-13.13.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156652" version="1" comment="perl is &lt;5.10.0-64.47.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156653" version="1" comment="perl-32bit is &lt;5.10.0-64.47.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156654" version="1" comment="perl-base is &lt;5.10.0-64.47.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156655" version="1" comment="perl-doc is &lt;5.10.0-64.47.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156656" version="1" comment="perl-x86 is &lt;5.10.0-64.47.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056793" version="1" comment="perl-HTML-Parser is &lt;3.56-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143857" version="1" comment="perl-Tk is &lt;804.028-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156657" version="1" comment="perl-spamassassin is &lt;3.2.5-26.22.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156658" version="1" comment="spamassassin is &lt;3.2.5-26.22.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057282" version="1" comment="postgresql is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057276" version="1" comment="postgresql-contrib is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057277" version="1" comment="postgresql-docs is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057280" version="1" comment="postgresql-libs is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057278" version="1" comment="postgresql-libs-32bit is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057279" version="1" comment="postgresql-libs-x86 is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057281" version="1" comment="postgresql-server is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156659" version="1" comment="puppet is &lt;0.24.8-1.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156660" version="1" comment="puppet-server is &lt;0.24.8-1.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156661" version="1" comment="python is &lt;2.6.0-8.9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156662" version="1" comment="python-32bit is &lt;2.6.0-8.9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156663" version="1" comment="python-curses is &lt;2.6.0-8.9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156664" version="1" comment="python-demo is &lt;2.6.0-8.9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156665" version="1" comment="python-gdbm is &lt;2.6.0-8.9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156666" version="1" comment="python-idle is &lt;2.6.0-8.9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156667" version="1" comment="python-tk is &lt;2.6.0-8.9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156668" version="1" comment="python-x86 is &lt;2.6.0-8.9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143871" version="1" comment="qt3 is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143872" version="1" comment="qt3-32bit is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143873" version="1" comment="qt3-x86 is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156669" version="1" comment="quagga is &lt;0.99.15-0.1.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156670" version="1" comment="rsync is &lt;3.0.4-2.33.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156671" version="1" comment="ruby is &lt;1.8.7.p72-5.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156672" version="1" comment="ruby-doc-html is &lt;1.8.7.p72-5.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156673" version="1" comment="ruby-tk is &lt;1.8.7.p72-5.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059011" version="1" comment="squid is &lt;2.7.STABLE5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156674" version="1" comment="star is &lt;1.5final-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058612" version="1" comment="sudo is &lt;1.6.9p17-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156675" version="1" comment="syslog-ng is &lt;2.0.9-27.27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156676" version="1" comment="sysstat is &lt;8.1.5-7.9.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156677" version="1" comment="sysstat-isag is &lt;8.1.5-7.9.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156678" version="1" comment="systemtap is &lt;1.0-0.15.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156679" version="1" comment="systemtap-client is &lt;1.0-0.15.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156680" version="1" comment="systemtap-server is &lt;1.0-0.15.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060021" version="1" comment="tar is &lt;1.20-23.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143901" version="1" comment="unrar is &lt;3.80.2-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156681" version="1" comment="unzip is &lt;5.52-142.23.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156682" version="1" comment="w3m is &lt;0.5.2-132.1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111746" version="1" comment="wget is &lt;1.11.4-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058844" version="1" comment="wireshark is &lt;1.0.5-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143905" version="1" comment="xdg-utils is &lt;1.0.2-36.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156683" version="1" comment="xen is &lt;4.0.0_21091_04-0.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156684" version="1" comment="xen-doc-html is &lt;4.0.0_21091_04-0.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156685" version="1" comment="xen-doc-pdf is &lt;4.0.0_21091_04-0.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156686" version="1" comment="xen-kmp-default is &lt;4.0.0_21091_04_2.6.32.12_0.7-0.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156687" version="1" comment="xen-kmp-pae is &lt;4.0.0_21091_04_2.6.32.12_0.7-0.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156688" version="1" comment="xen-libs is &lt;4.0.0_21091_04-0.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156689" version="1" comment="xen-tools is &lt;4.0.0_21091_04-0.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156690" version="1" comment="xen-tools-domU is &lt;4.0.0_21091_04-0.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156691" version="1" comment="xorg-x11 is &lt;7.4-9.24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156692" version="1" comment="xorg-x11-xauth is &lt;7.4-9.24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156693" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.19.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156694" version="1" comment="xorg-x11-server is &lt;7.4-27.19.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156695" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.19.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054103" version="1" comment="xpdf-tools is &lt;3.02-138.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143924" version="1" comment="xterm is &lt;238-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143927" version="1" comment="zoo is &lt;2.10-911.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073673" version="1" comment="sles-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072845" version="1" comment="MozillaFirefox is &lt;10.0-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072844" version="1" comment="MozillaFirefox-translations is &lt;10.0-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144250" version="1" comment="NetworkManager is &lt;0.7.1_git20090811-3.20.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144251" version="1" comment="NetworkManager-glib is &lt;0.7.1_git20090811-3.20.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143428" version="1" comment="NetworkManager-gnome is &lt;0.7.1-5.22.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144252" version="1" comment="PackageKit is &lt;0.3.14-2.23.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144253" version="1" comment="PackageKit-lang is &lt;0.3.14-2.23.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144254" version="1" comment="hal is &lt;0.5.12-23.58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144255" version="1" comment="hal-32bit is &lt;0.5.12-23.58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144256" version="1" comment="hal-doc is &lt;0.5.12-23.58.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144257" version="1" comment="hal-x86 is &lt;0.5.12-23.58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144258" version="1" comment="libpackagekit-glib10 is &lt;0.3.14-2.23.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144259" version="1" comment="PolicyKit is &lt;0.9-14.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144260" version="1" comment="PolicyKit-32bit is &lt;0.9-14.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143438" version="1" comment="PolicyKit-doc is &lt;0.9-14.39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144261" version="1" comment="PolicyKit-x86 is &lt;0.9-14.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144262" version="1" comment="aaa_base is &lt;11-6.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144263" version="1" comment="acpid is &lt;1.0.6-91.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143442" version="1" comment="amavisd-new is &lt;2.7.0-18.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072163" version="1" comment="apache2 is &lt;2.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072158" version="1" comment="apache2-doc is &lt;2.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072159" version="1" comment="apache2-example-pages is &lt;2.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072160" version="1" comment="apache2-prefork is &lt;2.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072161" version="1" comment="apache2-utils is &lt;2.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072162" version="1" comment="apache2-worker is &lt;2.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076368" version="1" comment="apache2-mod_jk is &lt;1.2.26-1.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068818" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111789" version="1" comment="php5 is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068819" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068820" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068821" version="1" comment="php5-calendar is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068822" version="1" comment="php5-ctype is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068823" version="1" comment="php5-curl is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068824" version="1" comment="php5-dba is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068825" version="1" comment="php5-dbase is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068826" version="1" comment="php5-dom is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068827" version="1" comment="php5-exif is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068828" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068829" version="1" comment="php5-ftp is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068830" version="1" comment="php5-gd is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068831" version="1" comment="php5-gettext is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068832" version="1" comment="php5-gmp is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068833" version="1" comment="php5-hash is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068834" version="1" comment="php5-iconv is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068835" version="1" comment="php5-json is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068836" version="1" comment="php5-ldap is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068837" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068838" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068839" version="1" comment="php5-mysql is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068840" version="1" comment="php5-odbc is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068841" version="1" comment="php5-openssl is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068842" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068843" version="1" comment="php5-pdo is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068844" version="1" comment="php5-pear is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068845" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068846" version="1" comment="php5-pspell is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068847" version="1" comment="php5-shmop is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068848" version="1" comment="php5-snmp is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068849" version="1" comment="php5-soap is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068850" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068851" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068852" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068853" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068854" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068855" version="1" comment="php5-wddx is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068856" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068857" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068858" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068859" version="1" comment="php5-xsl is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068860" version="1" comment="php5-zip is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068861" version="1" comment="php5-zlib is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144264" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144265" version="1" comment="php53 is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144266" version="1" comment="php53-bcmath is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144267" version="1" comment="php53-bz2 is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144268" version="1" comment="php53-calendar is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144269" version="1" comment="php53-ctype is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144270" version="1" comment="php53-curl is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144271" version="1" comment="php53-dba is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144272" version="1" comment="php53-dom is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144273" version="1" comment="php53-exif is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144274" version="1" comment="php53-fastcgi is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144275" version="1" comment="php53-fileinfo is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144276" version="1" comment="php53-ftp is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144277" version="1" comment="php53-gd is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144278" version="1" comment="php53-gettext is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144279" version="1" comment="php53-gmp is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144280" version="1" comment="php53-iconv is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144281" version="1" comment="php53-intl is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144282" version="1" comment="php53-json is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144283" version="1" comment="php53-ldap is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144284" version="1" comment="php53-mbstring is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144285" version="1" comment="php53-mcrypt is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144286" version="1" comment="php53-mysql is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144287" version="1" comment="php53-odbc is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144288" version="1" comment="php53-openssl is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144289" version="1" comment="php53-pcntl is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144290" version="1" comment="php53-pdo is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144291" version="1" comment="php53-pear is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144292" version="1" comment="php53-pgsql is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144293" version="1" comment="php53-pspell is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144294" version="1" comment="php53-shmop is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144295" version="1" comment="php53-snmp is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144296" version="1" comment="php53-soap is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144297" version="1" comment="php53-suhosin is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144298" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144299" version="1" comment="php53-sysvsem is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144300" version="1" comment="php53-sysvshm is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144301" version="1" comment="php53-tokenizer is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144302" version="1" comment="php53-wddx is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144303" version="1" comment="php53-xmlreader is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144304" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144305" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144306" version="1" comment="php53-xsl is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144307" version="1" comment="php53-zip is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144308" version="1" comment="php53-zlib is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144322" version="1" comment="bind is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144323" version="1" comment="bind-chrootenv is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144324" version="1" comment="bind-doc is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144325" version="1" comment="bind-libs is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144326" version="1" comment="bind-libs-32bit is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144327" version="1" comment="bind-libs-x86 is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144328" version="1" comment="bind-utils is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111700" version="1" comment="bzip2 is &lt;1.0.5-34.253.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111701" version="1" comment="bzip2-doc is &lt;1.0.5-34.253.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111702" version="1" comment="libbz2-1 is &lt;1.0.5-34.253.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111748" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.253.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111773" version="1" comment="libbz2-1-x86 is &lt;1.0.5-34.253.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144333" version="1" comment="cifs-utils is &lt;5.1-0.4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071561" version="1" comment="clamav is &lt;0.97.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144334" version="1" comment="cron is &lt;4.1-194.199.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070960" version="1" comment="cups is &lt;1.3.9-8.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070956" version="1" comment="cups-client is &lt;1.3.9-8.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070959" version="1" comment="cups-libs is &lt;1.3.9-8.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070957" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070958" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072828" version="1" comment="curl is &lt;7.19.7-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072831" version="1" comment="libcurl4 is &lt;7.19.7-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072829" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072830" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071558" version="1" comment="cyrus-imapd is &lt;2.3.11-60.65.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071559" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.65.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071560" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.65.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144335" version="1" comment="dbus-1 is &lt;1.2.10-3.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144336" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144337" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144338" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143534" version="1" comment="dbus-1-glib is &lt;0.76-34.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143535" version="1" comment="dbus-1-glib-32bit is &lt;0.76-34.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143536" version="1" comment="dbus-1-glib-x86 is &lt;0.76-34.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144339" version="1" comment="dhcp is &lt;4.2.3.P2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144340" version="1" comment="dhcp-client is &lt;4.2.3.P2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144341" version="1" comment="dhcp-relay is &lt;4.2.3.P2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144342" version="1" comment="dhcp-server is &lt;4.2.3.P2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144343" version="1" comment="dhcpcd is &lt;3.2.3-44.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067078" version="1" comment="dhcpv6 is &lt;1.0.22-3.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144344" version="1" comment="e2fsprogs is &lt;1.41.9-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144345" version="1" comment="libcom_err2 is &lt;1.41.9-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144346" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144347" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144348" version="1" comment="libext2fs2 is &lt;1.41.9-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069763" version="1" comment="ecryptfs-utils is &lt;61-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069761" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069762" version="1" comment="ecryptfs-utils-x86 is &lt;61-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065506" version="1" comment="ed is &lt;0.2-1001.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143546" version="1" comment="emacs is &lt;22.3-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143547" version="1" comment="emacs-el is &lt;22.3-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143548" version="1" comment="emacs-info is &lt;22.3-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143549" version="1" comment="emacs-nox is &lt;22.3-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143550" version="1" comment="emacs-x11 is &lt;22.3-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143551" version="1" comment="enscript is &lt;1.6.4-152.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111794" version="1" comment="evince is &lt;2.28.2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111795" version="1" comment="evince-doc is &lt;2.28.2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111796" version="1" comment="evince-lang is &lt;2.28.2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144349" version="1" comment="evolution-data-server is &lt;2.28.2-0.26.33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144350" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.26.33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144351" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.26.33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144352" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.26.33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070961" version="1" comment="fetchmail is &lt;6.3.8.90-13.20.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070962" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.20.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144353" version="1" comment="file is &lt;4.24-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144354" version="1" comment="file-32bit is &lt;4.24-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144355" version="1" comment="file-x86 is &lt;4.24-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143555" version="1" comment="findutils is &lt;4.4.0-38.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143556" version="1" comment="findutils-locate is &lt;4.4.0-38.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069764" version="1" comment="foomatic-filters is &lt;3.0.2-269.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144356" version="1" comment="freeradius-server is &lt;2.1.1-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072124" version="1" comment="freetype2 is &lt;2.3.7-25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072122" version="1" comment="freetype2-32bit is &lt;2.3.7-25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072123" version="1" comment="freetype2-x86 is &lt;2.3.7-25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066589" version="1" comment="fuse is &lt;2.7.2-61.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066591" version="1" comment="libfuse2 is &lt;2.7.2-61.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061853" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061854" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061855" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061856" version="1" comment="ghostscript-library is &lt;8.62-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061857" version="1" comment="ghostscript-omni is &lt;8.62-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061858" version="1" comment="ghostscript-x11 is &lt;8.62-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061859" version="1" comment="libgimpprint is &lt;4.2.7-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144380" version="1" comment="glibc is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144381" version="1" comment="glibc-32bit is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144382" version="1" comment="glibc-devel is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144383" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144384" version="1" comment="glibc-html is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144385" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144386" version="1" comment="glibc-info is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144387" version="1" comment="glibc-locale is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144388" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144389" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144390" version="1" comment="glibc-profile is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144391" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144392" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144393" version="1" comment="glibc-x86 is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144394" version="1" comment="nscd is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143596" version="1" comment="gmime is &lt;2.2.23-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143598" version="1" comment="gmime-doc is &lt;2.2.23-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143599" version="1" comment="libgmime-2_0-3 is &lt;2.2.23-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144395" version="1" comment="gnome-screensaver is &lt;2.28.3-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144396" version="1" comment="gnome-screensaver-lang is &lt;2.28.3-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072750" version="1" comment="gnutls is &lt;2.4.1-24.39.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072753" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072751" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072752" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144397" version="1" comment="gpg2 is &lt;2.0.9-25.33.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144398" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143605" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143606" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143607" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143608" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143609" version="1" comment="gstreamer-0_10-plugins-base-x86 is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143610" version="1" comment="libgstapp-0_10-0 is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143611" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143612" version="1" comment="libgstapp-0_10-0-x86 is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143613" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143614" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143615" version="1" comment="libgstinterfaces-0_10-0-x86 is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143616" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.30-5.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143617" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.30-5.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143618" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.30-5.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144399" version="1" comment="gtk2 is &lt;2.18.9-0.21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144400" version="1" comment="gtk2-32bit is &lt;2.18.9-0.21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144401" version="1" comment="gtk2-doc is &lt;2.18.9-0.21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144402" version="1" comment="gtk2-lang is &lt;2.18.9-0.21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144403" version="1" comment="gtk2-x86 is &lt;2.18.9-0.21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143623" version="1" comment="gvim is &lt;7.2-8.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143624" version="1" comment="vim is &lt;7.2-8.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143625" version="1" comment="vim-base is &lt;7.2-8.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143626" version="1" comment="vim-data is &lt;7.2-8.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071605" version="1" comment="hplip is &lt;3.11.10-0.6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071604" version="1" comment="hplip-hpijs is &lt;3.11.10-0.6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070093" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070091" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070092" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144404" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr9.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144405" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr9.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144406" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr9.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144407" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr9.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144408" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr9.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143632" version="1" comment="kbd is &lt;1.14.1-16.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144409" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144410" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144411" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144412" version="1" comment="kdm is &lt;4.3.5-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144413" version="1" comment="kwin is &lt;4.3.5-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068608" version="1" comment="kdelibs4 is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068606" version="1" comment="kdelibs4-core is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068607" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068611" version="1" comment="libkde4 is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068609" version="1" comment="libkde4-32bit is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068610" version="1" comment="libkde4-x86 is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068614" version="1" comment="libkdecore4 is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068612" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068613" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065196" version="1" comment="kdenetwork4-filesharing is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065197" version="1" comment="kget is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065198" version="1" comment="kopete is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065199" version="1" comment="krdc is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065200" version="1" comment="krfb is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144414" version="1" comment="kernel-default is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144415" version="1" comment="kernel-default-base is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144416" version="1" comment="kernel-default-devel is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144417" version="1" comment="kernel-default-man is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144418" version="1" comment="kernel-pae is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144419" version="1" comment="kernel-pae-base is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144420" version="1" comment="kernel-pae-devel is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144421" version="1" comment="kernel-ppc64 is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144422" version="1" comment="kernel-ppc64-base is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144423" version="1" comment="kernel-ppc64-devel is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144424" version="1" comment="kernel-source is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144425" version="1" comment="kernel-syms is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144426" version="1" comment="kernel-trace is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144427" version="1" comment="kernel-trace-base is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144428" version="1" comment="kernel-trace-devel is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144429" version="1" comment="kernel-xen is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144430" version="1" comment="kernel-xen-base is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144431" version="1" comment="kernel-xen-devel is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072351" version="1" comment="krb5 is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072345" version="1" comment="krb5-32bit is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072346" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072347" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072348" version="1" comment="krb5-client is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072349" version="1" comment="krb5-server is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072350" version="1" comment="krb5-x86 is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144435" version="1" comment="kvm is &lt;0.15.1-0.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144436" version="1" comment="ldapsmb is &lt;1.34b-12.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144437" version="1" comment="libldb1 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144438" version="1" comment="libsmbclient0 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144439" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144440" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144441" version="1" comment="libtalloc2 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144442" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144443" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144444" version="1" comment="libtdb1 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144445" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144446" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144447" version="1" comment="libtevent0 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144448" version="1" comment="libwbclient0 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144449" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144450" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144451" version="1" comment="samba is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144452" version="1" comment="samba-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144453" version="1" comment="samba-client is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144454" version="1" comment="samba-client-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144455" version="1" comment="samba-client-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144456" version="1" comment="samba-krb-printing is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144457" version="1" comment="samba-winbind is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144458" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144459" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144460" version="1" comment="samba-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144461" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144462" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072598" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072596" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072597" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072611" version="1" comment="libqt4 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072599" version="1" comment="libqt4-32bit is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072602" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072600" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072601" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072606" version="1" comment="libqt4-sql is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072603" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072604" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072605" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072609" version="1" comment="libqt4-x11 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072607" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072608" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072610" version="1" comment="libqt4-x86 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069401" version="1" comment="libapr-util1 is &lt;1.3.4-12.22.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069399" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069403" version="1" comment="libapr1 is &lt;1.3.3-11.18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069402" version="1" comment="libapr1-32bit is &lt;1.3.3-11.18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111803" version="1" comment="libcap-progs is &lt;2.11-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111804" version="1" comment="libcap2 is &lt;2.11-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111826" version="1" comment="libcap2-32bit is &lt;2.11-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111818" version="1" comment="libcap2-x86 is &lt;2.11-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067003" version="1" comment="libcgroup1 is &lt;0.34-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144463" version="1" comment="libdrm is &lt;2.4.27-0.6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144464" version="1" comment="libdrm-32bit is &lt;2.4.27-0.6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144465" version="1" comment="libdrm-x86 is &lt;2.4.27-0.6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072304" version="1" comment="libfreebl3 is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072303" version="1" comment="libfreebl3-32bit is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107302" version="1" comment="libfreebl3-x86 is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072314" version="1" comment="mozilla-nss is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072307" version="1" comment="mozilla-nss-32bit is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072313" version="1" comment="mozilla-nss-tools is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107303" version="1" comment="mozilla-nss-x86 is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143734" version="1" comment="libgdiplus0 is &lt;2.6.7-0.5.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069283" version="1" comment="libgnomesu is &lt;1.0.0-307.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069281" version="1" comment="libgnomesu-lang is &lt;1.0.0-307.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069282" version="1" comment="libgnomesu0 is &lt;1.0.0-307.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072647" version="1" comment="libicu is &lt;4.0-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072645" version="1" comment="libicu-32bit is &lt;4.0-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072646" version="1" comment="libicu-doc is &lt;4.0-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144474" version="1" comment="libmysqlclient15 is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144475" version="1" comment="libmysqlclient15-32bit is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144476" version="1" comment="libmysqlclient15-x86 is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144477" version="1" comment="libmysqlclient_r15 is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144478" version="1" comment="mysql is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144479" version="1" comment="mysql-Max is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144480" version="1" comment="mysql-client is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144481" version="1" comment="mysql-tools is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143743" version="1" comment="libneon27 is &lt;0.29.6-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143744" version="1" comment="libneon27-32bit is &lt;0.29.6-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143745" version="1" comment="libneon27-x86 is &lt;0.29.6-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144482" version="1" comment="libnewt0_52 is &lt;0.52.10-1.35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144483" version="1" comment="newt is &lt;0.52.10-1.35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144484" version="1" comment="python-newt is &lt;0.52.10-1.35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065553" version="1" comment="libopensc2 is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065551" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065552" version="1" comment="libopensc2-x86 is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065556" version="1" comment="opensc is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065554" version="1" comment="opensc-32bit is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065555" version="1" comment="opensc-x86 is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072492" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072490" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072491" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072494" version="1" comment="openssl is &lt;0.9.8j-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072493" version="1" comment="openssl-doc is &lt;0.9.8j-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069807" version="1" comment="libpng12-0 is &lt;1.2.31-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069805" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069806" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064463" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064464" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064465" version="1" comment="libpoppler5 is &lt;0.12.3-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064466" version="1" comment="poppler-tools is &lt;0.12.3-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143749" version="1" comment="libpulse-browse0 is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143750" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143751" version="1" comment="libpulse0 is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143752" version="1" comment="libpulse0-32bit is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143753" version="1" comment="libpulse0-x86 is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143754" version="1" comment="pulseaudio is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143755" version="1" comment="pulseaudio-esound-compat is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143756" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143757" version="1" comment="pulseaudio-lang is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143758" version="1" comment="pulseaudio-module-x11 is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143759" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143760" version="1" comment="pulseaudio-utils is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068531" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068529" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068530" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068535" version="1" comment="python-base is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068533" version="1" comment="python-base-32bit is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068534" version="1" comment="python-base-x86 is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068542" version="1" comment="python-xml is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070883" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070892" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143769" version="1" comment="libtirpc1 is &lt;0.2.1-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070704" version="1" comment="librsvg is &lt;2.26.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070702" version="1" comment="librsvg-32bit is &lt;2.26.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070703" version="1" comment="librsvg-x86 is &lt;2.26.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070705" version="1" comment="rsvg-view is &lt;2.26.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069633" version="1" comment="libsndfile is &lt;1.0.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069631" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069632" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144485" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144486" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144487" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144488" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144489" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144490" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144491" version="1" comment="libsoup-2_4-1 is &lt;2.32.2-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144492" version="1" comment="libsoup-2_4-1-32bit is &lt;2.32.2-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144493" version="1" comment="libsoup-2_4-1-x86 is &lt;2.32.2-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067884" version="1" comment="libtiff3 is &lt;3.8.2-141.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067882" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067883" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067885" version="1" comment="tiff is &lt;3.8.2-141.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144494" version="1" comment="libvirt is &lt;0.9.6-0.13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144495" version="1" comment="libvirt-client is &lt;0.9.6-0.13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144496" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144497" version="1" comment="libvirt-doc is &lt;0.9.6-0.13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144498" version="1" comment="libvirt-python is &lt;0.9.6-0.13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061093" version="1" comment="libvorbis is &lt;1.2.0-79.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061090" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061091" version="1" comment="libvorbis-doc is &lt;1.2.0-79.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061092" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070132" version="1" comment="libxcrypt is &lt;3.0.3-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070130" version="1" comment="libxcrypt-32bit is &lt;3.0.3-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070131" version="1" comment="libxcrypt-x86 is &lt;3.0.3-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143797" version="1" comment="pam-modules is &lt;11-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143798" version="1" comment="pam-modules-32bit is &lt;11-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143799" version="1" comment="pam-modules-x86 is &lt;11-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143800" version="1" comment="pwdutils is &lt;3.2.15-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143801" version="1" comment="pwdutils-plugin-audit is &lt;3.2.15-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072708" version="1" comment="libxml2 is &lt;2.7.6-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072705" version="1" comment="libxml2-32bit is &lt;2.7.6-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072706" version="1" comment="libxml2-doc is &lt;2.7.6-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072707" version="1" comment="libxml2-x86 is &lt;2.7.6-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068337" version="1" comment="libzip1 is &lt;0.9-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068574" version="1" comment="logrotate is &lt;3.7.7-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143803" version="1" comment="logwatch is &lt;7.3.6-65.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144502" version="1" comment="lvm2 is &lt;2.02.84-3.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067854" version="1" comment="mailman is &lt;2.1.14-9.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143807" version="1" comment="mipv6d is &lt;2.0.2.umip.0.4-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143808" version="1" comment="mono-core is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143809" version="1" comment="mono-data is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143810" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143811" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143812" version="1" comment="mono-locale-extras is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143813" version="1" comment="mono-nunit is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143814" version="1" comment="mono-web is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143815" version="1" comment="mono-winforms is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107301" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.24-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107304" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.24-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107299" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.24-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107300" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.24-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107305" version="1" comment="mozilla-xulrunner192-x86 is &lt;1.9.2.24-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144503" version="1" comment="nagios is &lt;3.0.6-1.25.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144504" version="1" comment="nagios-www is &lt;3.0.6-1.25.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144507" version="1" comment="ntp is &lt;4.2.4p8-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144508" version="1" comment="ntp-doc is &lt;4.2.4p8-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144509" version="1" comment="ofed is &lt;1.5.2-0.22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144510" version="1" comment="ofed-doc is &lt;1.5.2-0.22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144511" version="1" comment="ofed-kmp-default is &lt;1.5.2_3.0.13_0.27-0.22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144512" version="1" comment="ofed-kmp-pae is &lt;1.5.2_3.0.13_0.27-0.22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144513" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.2_3.0.13_0.27-0.22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144514" version="1" comment="ofed-kmp-trace is &lt;1.5.2_3.0.13_0.27-0.22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143829" version="1" comment="openslp is &lt;1.2.0-172.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143830" version="1" comment="openslp-32bit is &lt;1.2.0-172.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143831" version="1" comment="openslp-server is &lt;1.2.0-172.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143832" version="1" comment="openslp-x86 is &lt;1.2.0-172.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144515" version="1" comment="openssh is &lt;5.1p1-41.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144516" version="1" comment="openssh-askpass is &lt;5.1p1-41.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072165" version="1" comment="openswan is &lt;2.6.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072164" version="1" comment="openswan-doc is &lt;2.6.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069566" version="1" comment="opie is &lt;2.4-662.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069564" version="1" comment="opie-32bit is &lt;2.4-662.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069565" version="1" comment="opie-x86 is &lt;2.4-662.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143837" version="1" comment="pam is &lt;1.1.5-0.10.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143838" version="1" comment="pam-32bit is &lt;1.1.5-0.10.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143839" version="1" comment="pam-doc is &lt;1.1.5-0.10.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143840" version="1" comment="pam-x86 is &lt;1.1.5-0.10.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066424" version="1" comment="pango is &lt;1.26.2-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066421" version="1" comment="pango-32bit is &lt;1.26.2-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066422" version="1" comment="pango-doc is &lt;1.26.2-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066423" version="1" comment="pango-x86 is &lt;1.26.2-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065684" version="1" comment="pcsc-ccid is &lt;1.3.8-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065687" version="1" comment="pcsc-lite is &lt;1.4.102-1.37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065685" version="1" comment="pcsc-lite-32bit is &lt;1.4.102-1.37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065686" version="1" comment="pcsc-lite-x86 is &lt;1.4.102-1.37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068387" version="1" comment="perl is &lt;5.10.0-64.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068383" version="1" comment="perl-32bit is &lt;5.10.0-64.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068384" version="1" comment="perl-base is &lt;5.10.0-64.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068385" version="1" comment="perl-doc is &lt;5.10.0-64.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068386" version="1" comment="perl-x86 is &lt;5.10.0-64.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143858" version="1" comment="perl-libwww-perl is &lt;5.816-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143859" version="1" comment="perl-spamassassin is &lt;3.3.1-10.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143860" version="1" comment="spamassassin is &lt;3.3.1-10.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066604" version="1" comment="postgresql is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066598" version="1" comment="postgresql-contrib is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066599" version="1" comment="postgresql-docs is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066602" version="1" comment="postgresql-libs is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066600" version="1" comment="postgresql-libs-32bit is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066601" version="1" comment="postgresql-libs-x86 is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066603" version="1" comment="postgresql-server is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144525" version="1" comment="puppet is &lt;2.6.12-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144526" version="1" comment="puppet-server is &lt;2.6.12-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144527" version="1" comment="pure-ftpd is &lt;1.0.22-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068543" version="1" comment="python is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068532" version="1" comment="python-32bit is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068536" version="1" comment="python-curses is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068537" version="1" comment="python-demo is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068538" version="1" comment="python-gdbm is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068539" version="1" comment="python-idle is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068540" version="1" comment="python-tk is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068541" version="1" comment="python-x86 is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144528" version="1" comment="python-sssd-config is &lt;1.5.11-0.9.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144529" version="1" comment="sssd is &lt;1.5.11-0.9.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144530" version="1" comment="sssd-32bit is &lt;1.5.11-0.9.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144531" version="1" comment="sssd-tools is &lt;1.5.11-0.9.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070706" version="1" comment="quagga is &lt;0.99.15-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071831" version="1" comment="radvd is &lt;1.1-1.24.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144532" version="1" comment="rsync is &lt;3.0.4-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144533" version="1" comment="rsyslog is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144534" version="1" comment="rsyslog-diag-tools is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144535" version="1" comment="rsyslog-doc is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144536" version="1" comment="rsyslog-module-gssapi is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144537" version="1" comment="rsyslog-module-gtls is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144538" version="1" comment="rsyslog-module-mysql is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144539" version="1" comment="rsyslog-module-pgsql is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144540" version="1" comment="rsyslog-module-relp is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144541" version="1" comment="rsyslog-module-snmp is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144542" version="1" comment="rsyslog-module-udpspoof is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072842" version="1" comment="ruby is &lt;1.8.7.p357-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072840" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072841" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072757" version="1" comment="squid is &lt;2.7.STABLE5-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072759" version="1" comment="squid3 is &lt;3.1.12-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143886" version="1" comment="squidGuard is &lt;1.4-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143887" version="1" comment="squidGuard-doc is &lt;1.4-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144543" version="1" comment="star is &lt;1.5final-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144544" version="1" comment="sudo is &lt;1.7.6p2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144545" version="1" comment="sysconfig is &lt;0.71.47-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144546" version="1" comment="syslog-ng is &lt;2.0.9-27.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144547" version="1" comment="sysstat is &lt;8.1.5-7.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144548" version="1" comment="sysstat-isag is &lt;8.1.5-7.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072481" version="1" comment="system-config-printer is &lt;1.0.8-9.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072480" version="1" comment="system-config-printer-lang is &lt;1.0.8-9.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144549" version="1" comment="systemtap is &lt;1.5-0.7.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144550" version="1" comment="systemtap-server is &lt;1.5-0.7.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065858" version="1" comment="t1lib is &lt;5.1.1-100.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143897" version="1" comment="tar is &lt;1.26-1.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069328" version="1" comment="tftp is &lt;0.48-101.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144551" version="1" comment="tgt is &lt;0.9.10-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072827" version="1" comment="tomcat6 is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072820" version="1" comment="tomcat6-admin-webapps is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072821" version="1" comment="tomcat6-docs-webapp is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072822" version="1" comment="tomcat6-javadoc is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072823" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072824" version="1" comment="tomcat6-lib is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072825" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072826" version="1" comment="tomcat6-webapps is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143902" version="1" comment="unzip is &lt;6.00-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061711" version="1" comment="vte is &lt;0.22.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061709" version="1" comment="vte-doc is &lt;0.22.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061710" version="1" comment="vte-lang is &lt;0.22.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061666" version="1" comment="w3m is &lt;0.5.2-132.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071923" version="1" comment="wireshark is &lt;1.4.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144552" version="1" comment="xen is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144553" version="1" comment="xen-doc-html is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144554" version="1" comment="xen-doc-pdf is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144555" version="1" comment="xen-kmp-default is &lt;4.1.2_14_3.0.13_0.27-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144556" version="1" comment="xen-kmp-pae is &lt;4.1.2_14_3.0.13_0.27-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144557" version="1" comment="xen-libs is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144558" version="1" comment="xen-libs-32bit is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144559" version="1" comment="xen-tools is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144560" version="1" comment="xen-tools-domU is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144561" version="1" comment="xorg-x11 is &lt;7.4-9.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144562" version="1" comment="xorg-x11-xauth is &lt;7.4-9.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144563" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.60.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144564" version="1" comment="xorg-x11-server is &lt;7.4-27.60.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144565" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.60.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071551" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071549" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071550" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144566" version="1" comment="yast2 is &lt;2.17.119-0.5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144567" version="1" comment="yast2-core is &lt;2.17.44-0.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077550" version="1" comment="sles-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143421" version="1" comment="Mesa is &lt;9.0.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143422" version="1" comment="Mesa-32bit is &lt;9.0.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143423" version="1" comment="Mesa-x86 is &lt;9.0.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143424" version="1" comment="MozillaFirefox is &lt;17.0.4esr-0.10.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143425" version="1" comment="MozillaFirefox-translations is &lt;17.0.4esr-0.10.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143426" version="1" comment="NetworkManager is &lt;0.7.1_git20090811-3.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143427" version="1" comment="NetworkManager-glib is &lt;0.7.1_git20090811-3.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143429" version="1" comment="PackageKit is &lt;0.3.14-2.28.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143430" version="1" comment="PackageKit-lang is &lt;0.3.14-2.28.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143431" version="1" comment="hal is &lt;0.5.12-23.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143432" version="1" comment="hal-32bit is &lt;0.5.12-23.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143433" version="1" comment="hal-doc is &lt;0.5.12-23.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143434" version="1" comment="hal-x86 is &lt;0.5.12-23.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143435" version="1" comment="libpackagekit-glib10 is &lt;0.3.14-2.28.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143436" version="1" comment="PolicyKit is &lt;0.9-14.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143437" version="1" comment="PolicyKit-32bit is &lt;0.9-14.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143439" version="1" comment="PolicyKit-x86 is &lt;0.9-14.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143440" version="1" comment="aaa_base is &lt;11-6.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143441" version="1" comment="acpid is &lt;1.0.6-91.25.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143443" version="1" comment="ant is &lt;1.7.1-20.9.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143444" version="1" comment="ant-trax is &lt;1.7.1-16.9.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077061" version="1" comment="apache2 is &lt;2.2.12-1.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077056" version="1" comment="apache2-doc is &lt;2.2.12-1.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077057" version="1" comment="apache2-example-pages is &lt;2.2.12-1.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077058" version="1" comment="apache2-prefork is &lt;2.2.12-1.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077059" version="1" comment="apache2-utils is &lt;2.2.12-1.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077060" version="1" comment="apache2-worker is &lt;2.2.12-1.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143446" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143447" version="1" comment="php53 is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143448" version="1" comment="php53-bcmath is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143449" version="1" comment="php53-bz2 is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143450" version="1" comment="php53-calendar is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143451" version="1" comment="php53-ctype is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143452" version="1" comment="php53-curl is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143453" version="1" comment="php53-dba is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143454" version="1" comment="php53-dom is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143455" version="1" comment="php53-exif is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143456" version="1" comment="php53-fastcgi is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143457" version="1" comment="php53-fileinfo is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143458" version="1" comment="php53-ftp is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143459" version="1" comment="php53-gd is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143460" version="1" comment="php53-gettext is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143461" version="1" comment="php53-gmp is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143462" version="1" comment="php53-iconv is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143463" version="1" comment="php53-intl is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143464" version="1" comment="php53-json is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143465" version="1" comment="php53-ldap is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143466" version="1" comment="php53-mbstring is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143467" version="1" comment="php53-mcrypt is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143468" version="1" comment="php53-mysql is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143469" version="1" comment="php53-odbc is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143470" version="1" comment="php53-openssl is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143471" version="1" comment="php53-pcntl is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143472" version="1" comment="php53-pdo is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143473" version="1" comment="php53-pear is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143474" version="1" comment="php53-pgsql is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143475" version="1" comment="php53-pspell is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143476" version="1" comment="php53-shmop is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143477" version="1" comment="php53-snmp is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143478" version="1" comment="php53-soap is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143479" version="1" comment="php53-suhosin is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143480" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143481" version="1" comment="php53-sysvsem is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143482" version="1" comment="php53-sysvshm is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143483" version="1" comment="php53-tokenizer is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143484" version="1" comment="php53-wddx is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143485" version="1" comment="php53-xmlreader is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143486" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143487" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143488" version="1" comment="php53-xsl is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143489" version="1" comment="php53-zip is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143490" version="1" comment="php53-zlib is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077067" version="1" comment="apache2-mod_security2 is &lt;2.7.1-0.2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073173" version="1" comment="ark is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073174" version="1" comment="kcalc is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073175" version="1" comment="kcharselect is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073176" version="1" comment="kdessh is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073177" version="1" comment="kdf is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073178" version="1" comment="kfloppy is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073179" version="1" comment="kgpg is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073180" version="1" comment="ktimer is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073181" version="1" comment="kwalletmanager is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073182" version="1" comment="kwikdisk is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073183" version="1" comment="okteta is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143491" version="1" comment="avahi is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143492" version="1" comment="avahi-lang is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143493" version="1" comment="avahi-utils is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143494" version="1" comment="libavahi-client3 is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143495" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143496" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143497" version="1" comment="libavahi-common3 is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143498" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143499" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143500" version="1" comment="libavahi-core5 is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143501" version="1" comment="libdns_sd is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143502" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143503" version="1" comment="libdns_sd-x86 is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143504" version="1" comment="bind is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143505" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143506" version="1" comment="bind-doc is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143507" version="1" comment="bind-libs is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143508" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143509" version="1" comment="bind-libs-x86 is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143510" version="1" comment="bind-utils is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074909" version="1" comment="boost-license is &lt;1.36.0-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074910" version="1" comment="libboost_program_options1_36_0 is &lt;1.36.0-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074917" version="1" comment="libboost_regex1_36_0 is &lt;1.36.0-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074911" version="1" comment="libboost_signals1_36_0 is &lt;1.36.0-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074912" version="1" comment="libboost_thread1_36_0 is &lt;1.36.0-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143511" version="1" comment="cifs-utils is &lt;5.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112218" version="1" comment="clamav is &lt;0.97.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143512" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143513" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143514" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143515" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143516" version="1" comment="openldap2 is &lt;2.4.26-0.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143517" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143518" version="1" comment="openldap2-client is &lt;2.4.26-0.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143520" version="1" comment="cron is &lt;4.1-194.207.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143521" version="1" comment="cups is &lt;1.3.9-8.46.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143522" version="1" comment="cups-client is &lt;1.3.9-8.46.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143523" version="1" comment="cups-libs is &lt;1.3.9-8.46.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143524" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143525" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143526" version="1" comment="curl is &lt;7.19.7-1.26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143527" version="1" comment="libcurl4 is &lt;7.19.7-1.26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143528" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143529" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073075" version="1" comment="cvs is &lt;1.12.12-144.23.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073074" version="1" comment="cvs-doc is &lt;1.12.12-144.23.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143530" version="1" comment="dbus-1 is &lt;1.2.10-3.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143531" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143532" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143533" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143537" version="1" comment="dhcp is &lt;4.2.4.P2-0.16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143538" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143539" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143540" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074692" version="1" comment="dhcpcd is &lt;3.2.3-44.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143541" version="1" comment="e2fsprogs is &lt;1.41.9-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143542" version="1" comment="libcom_err2 is &lt;1.41.9-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143543" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143544" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143545" version="1" comment="libext2fs2 is &lt;1.41.9-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074331" version="1" comment="ecryptfs-utils is &lt;61-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074329" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074330" version="1" comment="ecryptfs-utils-x86 is &lt;61-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075137" version="1" comment="evolution-data-server is &lt;2.28.2-0.29.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075135" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.29.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075136" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.29.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075143" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.29.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074688" version="1" comment="expat is &lt;2.0.1-88.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074691" version="1" comment="libexpat1 is &lt;2.0.1-88.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074689" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074690" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143552" version="1" comment="file is &lt;4.24-43.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143553" version="1" comment="file-32bit is &lt;4.24-43.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143554" version="1" comment="file-x86 is &lt;4.24-43.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112262" version="1" comment="freeradius-server is &lt;2.1.1-7.16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112263" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112264" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112265" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112266" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076460" version="1" comment="freetype2 is &lt;2.3.7-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076458" version="1" comment="freetype2-32bit is &lt;2.3.7-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076471" version="1" comment="freetype2-x86 is &lt;2.3.7-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076461" version="1" comment="ft2demos is &lt;2.3.7-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143557" version="1" comment="fuse is &lt;2.8.7-0.9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143558" version="1" comment="libfuse2 is &lt;2.8.7-0.9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075764" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075765" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075766" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075767" version="1" comment="ghostscript-library is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075768" version="1" comment="ghostscript-omni is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075769" version="1" comment="ghostscript-x11 is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075770" version="1" comment="libgimpprint is &lt;4.2.7-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143563" version="1" comment="glib2 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143564" version="1" comment="glib2-doc is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143565" version="1" comment="glib2-lang is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143566" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143567" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143568" version="1" comment="libgio-2_0-0-x86 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143569" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143570" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143571" version="1" comment="libglib-2_0-0-x86 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143572" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143573" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143574" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143575" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143576" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143577" version="1" comment="libgobject-2_0-0-x86 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143578" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143579" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143580" version="1" comment="libgthread-2_0-0-x86 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143581" version="1" comment="glibc is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143582" version="1" comment="glibc-32bit is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143583" version="1" comment="glibc-devel is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143584" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143585" version="1" comment="glibc-html is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143586" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143587" version="1" comment="glibc-info is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143588" version="1" comment="glibc-locale is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143589" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143590" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143591" version="1" comment="glibc-profile is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143592" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143593" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143594" version="1" comment="glibc-x86 is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143595" version="1" comment="nscd is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143601" version="1" comment="gnome-screensaver is &lt;2.28.3-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143602" version="1" comment="gnome-screensaver-lang is &lt;2.28.3-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077121" version="1" comment="gnutls is &lt;2.4.1-24.39.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077132" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077123" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077122" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077133" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143603" version="1" comment="gpg2 is &lt;2.0.9-25.33.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143604" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074875" version="1" comment="gtk2 is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074872" version="1" comment="gtk2-32bit is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074886" version="1" comment="gtk2-doc is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074874" version="1" comment="gtk2-lang is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074887" version="1" comment="gtk2-x86 is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143619" version="1" comment="guestfs-data is &lt;1.20.4-0.14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143620" version="1" comment="guestfs-tools is &lt;1.20.4-0.14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143621" version="1" comment="guestfsd is &lt;1.20.4-0.14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143622" version="1" comment="libguestfs0 is &lt;1.20.4-0.14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143627" version="1" comment="gzip is &lt;1.3.12-69.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143628" version="1" comment="hyper-v is &lt;5-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143629" version="1" comment="ibutils is &lt;1.5.7-0.7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143630" version="1" comment="ibutils-32bit is &lt;1.5.7-0.7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076985" version="1" comment="jakarta-commons-httpclient3 is &lt;3.0.1-253.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077099" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr13.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077095" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr13.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077096" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr13.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077097" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr13.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077098" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr13.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112815" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr4.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112826" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr4.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112816" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr4.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112827" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr4.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075206" version="1" comment="jpeg is &lt;6b-879.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075208" version="1" comment="libjpeg is &lt;6.2.0-879.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075207" version="1" comment="libjpeg-32bit is &lt;6.2.0-879.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075212" version="1" comment="libjpeg-x86 is &lt;6.2.0-879.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143633" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143635" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143636" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143637" version="1" comment="kdm is &lt;4.3.5-0.12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143638" version="1" comment="kwin is &lt;4.3.5-0.12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143642" version="1" comment="kdelibs4 is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143643" version="1" comment="kdelibs4-core is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143644" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143645" version="1" comment="libkde4 is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143646" version="1" comment="libkde4-32bit is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143647" version="1" comment="libkde4-x86 is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143648" version="1" comment="libkdecore4 is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143649" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143650" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143651" version="1" comment="kernel-default is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143652" version="1" comment="kernel-default-base is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143653" version="1" comment="kernel-default-devel is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143654" version="1" comment="kernel-default-man is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143655" version="1" comment="kernel-pae is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143656" version="1" comment="kernel-pae-base is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143657" version="1" comment="kernel-pae-devel is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143658" version="1" comment="kernel-ppc64 is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143659" version="1" comment="kernel-ppc64-base is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143660" version="1" comment="kernel-ppc64-devel is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143661" version="1" comment="kernel-source is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143662" version="1" comment="kernel-syms is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143663" version="1" comment="kernel-trace is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143664" version="1" comment="kernel-trace-base is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143665" version="1" comment="kernel-trace-devel is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143666" version="1" comment="kernel-xen is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143667" version="1" comment="kernel-xen-base is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143668" version="1" comment="kernel-xen-devel is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112587" version="1" comment="krb5 is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112588" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112589" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112590" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112591" version="1" comment="krb5-client is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112595" version="1" comment="krb5-server is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112812" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112592" version="1" comment="krb5-doc is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112593" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112594" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143669" version="1" comment="kvm is &lt;1.4.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143674" version="1" comment="ldapsmb is &lt;1.34b-12.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143675" version="1" comment="libldb1 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143676" version="1" comment="libsmbclient0 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143677" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143678" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143679" version="1" comment="libtalloc2 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143680" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143681" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143682" version="1" comment="libtdb1 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143683" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143684" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143685" version="1" comment="libtevent0 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143686" version="1" comment="libwbclient0 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143687" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143688" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143689" version="1" comment="samba is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143690" version="1" comment="samba-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143691" version="1" comment="samba-client is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143692" version="1" comment="samba-client-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143693" version="1" comment="samba-client-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143694" version="1" comment="samba-krb-printing is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143695" version="1" comment="samba-winbind is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143696" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143697" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143698" version="1" comment="samba-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077182" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077181" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143699" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143700" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143701" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143702" version="1" comment="libqt4 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143703" version="1" comment="libqt4-32bit is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143704" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143705" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143706" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143707" version="1" comment="libqt4-sql is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143708" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143709" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143710" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143711" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143712" version="1" comment="libqt4-x11 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143713" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143714" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143715" version="1" comment="libqt4-x86 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143716" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072983" version="1" comment="libapr1 is &lt;1.3.3-11.18.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072982" version="1" comment="libapr1-32bit is &lt;1.3.3-11.18.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143719" version="1" comment="libcgroup1 is &lt;0.37.1-5.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143720" version="1" comment="libdrm is &lt;2.4.41-0.8.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143721" version="1" comment="libdrm-32bit is &lt;2.4.41-0.8.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143722" version="1" comment="libdrm-x86 is &lt;2.4.41-0.8.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076988" version="1" comment="libecpg6 is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076990" version="1" comment="libpq5 is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076989" version="1" comment="libpq5-32bit is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076991" version="1" comment="postgresql91 is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076993" version="1" comment="postgresql91-contrib is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076994" version="1" comment="postgresql91-docs is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076995" version="1" comment="postgresql91-server is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075040" version="1" comment="libexif is &lt;0.6.17-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075039" version="1" comment="libexif-32bit is &lt;0.6.17-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075063" version="1" comment="libexif-x86 is &lt;0.6.17-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143724" version="1" comment="libfreebl3 is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143725" version="1" comment="libfreebl3-32bit is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143726" version="1" comment="libfreebl3-x86 is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143727" version="1" comment="libsoftokn3 is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143728" version="1" comment="libsoftokn3-32bit is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143729" version="1" comment="libsoftokn3-x86 is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143730" version="1" comment="mozilla-nss is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143731" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143732" version="1" comment="mozilla-nss-tools is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143733" version="1" comment="mozilla-nss-x86 is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143735" version="1" comment="libgtop is &lt;2.28.0-1.9.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143736" version="1" comment="libgtop-2_0-7 is &lt;2.28.0-1.9.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143737" version="1" comment="libgtop-doc is &lt;2.28.0-1.9.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143738" version="1" comment="libgtop-lang is &lt;2.28.0-1.9.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076347" version="1" comment="libicu is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076348" version="1" comment="libicu-32bit is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076349" version="1" comment="libicu-doc is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076350" version="1" comment="libicu-x86 is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076518" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076517" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076523" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076520" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143740" version="1" comment="mysql is &lt;5.5.31-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143741" version="1" comment="mysql-client is &lt;5.5.31-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143742" version="1" comment="mysql-tools is &lt;5.5.31-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143746" version="1" comment="libnewt0_52 is &lt;0.52.10-1.35.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143747" version="1" comment="newt is &lt;0.52.10-1.35.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143748" version="1" comment="python-newt is &lt;0.52.10-1.35.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076924" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076923" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076935" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076933" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076936" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076925" version="1" comment="openssl is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076937" version="1" comment="openssl-doc is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076091" version="1" comment="libotr2 is &lt;3.2.0-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075195" version="1" comment="libpng12-0 is &lt;1.2.31-5.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075194" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075199" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076958" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076959" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076960" version="1" comment="libpoppler5 is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076961" version="1" comment="poppler-tools is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076276" version="1" comment="libproxy0 is &lt;0.3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076270" version="1" comment="libproxy0-32bit is &lt;0.3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076272" version="1" comment="libproxy0-config-gnome is &lt;0.3.1-2.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076273" version="1" comment="libproxy0-config-kde4 is &lt;0.3.1-2.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076275" version="1" comment="libproxy0-networkmanager is &lt;0.3.1-2.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076277" version="1" comment="libproxy0-x86 is &lt;0.3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143761" version="1" comment="libpython2_6-1_0 is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143762" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143763" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143764" version="1" comment="python-base is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143765" version="1" comment="python-base-32bit is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143766" version="1" comment="python-base-x86 is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143767" version="1" comment="python-xml is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143773" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143774" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143775" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143776" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143777" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143778" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143779" version="1" comment="libsoup-2_4-1 is &lt;2.32.2-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143780" version="1" comment="libsoup-2_4-1-32bit is &lt;2.32.2-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143781" version="1" comment="libsoup-2_4-1-x86 is &lt;2.32.2-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143782" version="1" comment="libsss_idmap0 is &lt;1.9.4-0.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143783" version="1" comment="python-sssd-config is &lt;1.9.4-0.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143784" version="1" comment="sssd is &lt;1.9.4-0.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143785" version="1" comment="sssd-32bit is &lt;1.9.4-0.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143786" version="1" comment="sssd-tools is &lt;1.9.4-0.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077218" version="1" comment="libtiff3 is &lt;3.8.2-141.152.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077217" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.152.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077223" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.152.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077224" version="1" comment="tiff is &lt;3.8.2-141.152.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143787" version="1" comment="libtspi1 is &lt;0.3.10-0.9.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143788" version="1" comment="libtspi1-32bit is &lt;0.3.10-0.9.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143789" version="1" comment="libtspi1-x86 is &lt;0.3.10-0.9.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143790" version="1" comment="trousers is &lt;0.3.10-0.9.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075498" version="1" comment="libupsclient1 is &lt;2.6.2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075500" version="1" comment="nut is &lt;2.6.2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075499" version="1" comment="nut-classic is &lt;2.6.2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111805" version="1" comment="nut-drivers-net is &lt;2.6.2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143791" version="1" comment="libvirt is &lt;1.0.5.1-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143792" version="1" comment="libvirt-client is &lt;1.0.5.1-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143793" version="1" comment="libvirt-client-32bit is &lt;1.0.5.1-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143794" version="1" comment="libvirt-doc is &lt;1.0.5.1-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143795" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.1-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143796" version="1" comment="libvirt-python is &lt;1.0.5.1-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073153" version="1" comment="libvorbis is &lt;1.2.0-79.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073150" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073151" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073152" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077146" version="1" comment="libxml2 is &lt;2.7.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077144" version="1" comment="libxml2-32bit is &lt;2.7.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077151" version="1" comment="libxml2-doc is &lt;2.7.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077152" version="1" comment="libxml2-x86 is &lt;2.7.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077120" version="1" comment="libxslt is &lt;1.1.24-19.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077119" version="1" comment="libxslt-32bit is &lt;1.1.24-19.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077131" version="1" comment="libxslt-x86 is &lt;1.1.24-19.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073168" version="1" comment="logrotate is &lt;3.7.7-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143804" version="1" comment="lvm2 is &lt;2.02.98-0.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143805" version="1" comment="mailman is &lt;2.1.14-9.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073033" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073029" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073030" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073031" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073032" version="1" comment="mozilla-xulrunner192-x86 is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076709" version="1" comment="nagios is &lt;3.0.6-1.25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076708" version="1" comment="nagios-www is &lt;3.0.6-1.25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143816" version="1" comment="nagios-plugins is &lt;1.4.16-0.11.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143817" version="1" comment="nagios-plugins-extras is &lt;1.4.16-0.11.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077277" version="1" comment="nfs-client is &lt;1.2.3-18.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143818" version="1" comment="ntp is &lt;4.2.4p8-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143819" version="1" comment="ntp-doc is &lt;4.2.4p8-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143820" version="1" comment="ofed is &lt;1.5.4.1-0.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143821" version="1" comment="ofed-doc is &lt;1.5.4.1-0.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143822" version="1" comment="ofed-kmp-default is &lt;1.5.4.1_3.0.76_0.11-0.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143823" version="1" comment="ofed-kmp-pae is &lt;1.5.4.1_3.0.76_0.11-0.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143824" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.4.1_3.0.76_0.11-0.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143825" version="1" comment="ofed-kmp-trace is &lt;1.5.4.1_3.0.76_0.11-0.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143826" version="1" comment="openCryptoki is &lt;2.4.2-0.9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143827" version="1" comment="openCryptoki-32bit is &lt;2.4.2-0.9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143828" version="1" comment="openCryptoki-64bit is &lt;2.4.2-0.9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143833" version="1" comment="openssh is &lt;6.2p2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143834" version="1" comment="openssh-askpass is &lt;6.2p2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143835" version="1" comment="openvpn is &lt;2.0.9-143.38.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143836" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.38.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143841" version="1" comment="pam_krb5 is &lt;2.3.1-47.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143842" version="1" comment="pam_krb5-32bit is &lt;2.3.1-47.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143843" version="1" comment="pam_krb5-x86 is &lt;2.3.1-47.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143847" version="1" comment="pam_mount is &lt;0.47-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143848" version="1" comment="pam_mount-32bit is &lt;0.47-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143849" version="1" comment="pam_mount-x86 is &lt;0.47-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143850" version="1" comment="perl is &lt;5.10.0-64.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143851" version="1" comment="perl-32bit is &lt;5.10.0-64.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143852" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143853" version="1" comment="perl-Test-Simple is &lt;0.72-0.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143854" version="1" comment="perl-base is &lt;5.10.0-64.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143855" version="1" comment="perl-doc is &lt;5.10.0-64.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143856" version="1" comment="perl-x86 is &lt;5.10.0-64.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076900" version="1" comment="postgresql is &lt;8.3.23-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076905" version="1" comment="postgresql-contrib is &lt;8.3.23-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076906" version="1" comment="postgresql-docs is &lt;8.3.23-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076907" version="1" comment="postgresql-server is &lt;8.3.23-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076978" version="1" comment="puppet is &lt;2.6.18-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076986" version="1" comment="puppet-server is &lt;2.6.18-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143861" version="1" comment="pure-ftpd is &lt;1.0.22-3.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143862" version="1" comment="python is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143863" version="1" comment="python-32bit is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143864" version="1" comment="python-curses is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143865" version="1" comment="python-demo is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143866" version="1" comment="python-gdbm is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143867" version="1" comment="python-idle is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143868" version="1" comment="python-tk is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143869" version="1" comment="python-x86 is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074309" version="1" comment="python-pam is &lt;0.5.0-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143874" version="1" comment="quagga is &lt;0.99.15-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143875" version="1" comment="rsync is &lt;3.0.4-2.47.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143876" version="1" comment="rsyslog is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143877" version="1" comment="rsyslog-diag-tools is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143878" version="1" comment="rsyslog-doc is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143879" version="1" comment="rsyslog-module-gssapi is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143880" version="1" comment="rsyslog-module-gtls is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143881" version="1" comment="rsyslog-module-mysql is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143882" version="1" comment="rsyslog-module-pgsql is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143883" version="1" comment="rsyslog-module-relp is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143884" version="1" comment="rsyslog-module-snmp is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143885" version="1" comment="rsyslog-module-udpspoof is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076775" version="1" comment="ruby is &lt;1.8.7.p357-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076786" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076787" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075799" version="1" comment="sblim-sfcb is &lt;1.3.11-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074796" version="1" comment="socat is &lt;1.7.0.0-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076602" version="1" comment="squid is &lt;2.7.STABLE5-2.12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076661" version="1" comment="squid3 is &lt;3.1.12-8.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143888" version="1" comment="star is &lt;1.5final-28.23.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143889" version="1" comment="stunnel is &lt;4.54-0.9.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143890" version="1" comment="sudo is &lt;1.7.6p2-0.17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143891" version="1" comment="sysconfig is &lt;0.71.61-0.11.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143892" version="1" comment="syslog-ng is &lt;2.0.9-27.34.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143893" version="1" comment="sysstat is &lt;8.1.5-7.45.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143894" version="1" comment="sysstat-isag is &lt;8.1.5-7.45.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143895" version="1" comment="system-config-printer is &lt;1.0.8-9.23.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143896" version="1" comment="system-config-printer-lang is &lt;1.0.8-9.23.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077055" version="1" comment="systemtap is &lt;1.5-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077054" version="1" comment="systemtap-server is &lt;1.5-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074582" version="1" comment="t1lib is &lt;5.1.1-100.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074585" version="1" comment="taglib is &lt;1.5-19.23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074583" version="1" comment="taglib-32bit is &lt;1.5-19.23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074584" version="1" comment="taglib-x86 is &lt;1.5-19.23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143898" version="1" comment="tftp is &lt;0.48-101.31.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143899" version="1" comment="tgt is &lt;0.9.10-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076487" version="1" comment="tomcat6 is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076480" version="1" comment="tomcat6-admin-webapps is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076481" version="1" comment="tomcat6-docs-webapp is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076482" version="1" comment="tomcat6-javadoc is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076483" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076484" version="1" comment="tomcat6-lib is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076485" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076486" version="1" comment="tomcat6-webapps is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143900" version="1" comment="unixODBC_23 is &lt;2.3.1-0.9.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143903" version="1" comment="virt-utils is &lt;1.2.1-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077108" version="1" comment="wireshark is &lt;1.8.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143904" version="1" comment="x3270 is &lt;3.3.12-517.12.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143906" version="1" comment="xen is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143907" version="1" comment="xen-doc-html is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143908" version="1" comment="xen-doc-pdf is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143909" version="1" comment="xen-kmp-default is &lt;4.2.2_04_3.0.76_0.11-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143910" version="1" comment="xen-kmp-pae is &lt;4.2.2_04_3.0.76_0.11-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143911" version="1" comment="xen-libs is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143912" version="1" comment="xen-libs-32bit is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143913" version="1" comment="xen-tools is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143914" version="1" comment="xen-tools-domU is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143915" version="1" comment="xorg-x11 is &lt;7.4-9.62.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143916" version="1" comment="xorg-x11-xauth is &lt;7.4-9.62.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143917" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.81.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143918" version="1" comment="xorg-x11-server is &lt;7.4-27.81.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143919" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.81.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143920" version="1" comment="xorg-x11-libxcb is &lt;7.4-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143921" version="1" comment="xorg-x11-libxcb-32bit is &lt;7.4-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143922" version="1" comment="xorg-x11-libxcb-x86 is &lt;7.4-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074291" version="1" comment="xorg-x11-server-dmx is &lt;7.3.99-17.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143923" version="1" comment="xorg-x11-server-rdp is &lt;7.3.99-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143925" version="1" comment="yast2 is &lt;2.17.129-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143926" version="1" comment="yast2-core is &lt;2.17.45-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117413" version="1" comment="sles-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143928" version="1" comment="Mesa is &lt;9.0.3-0.28.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143929" version="1" comment="Mesa-32bit is &lt;9.0.3-0.28.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143930" version="1" comment="Mesa-x86 is &lt;9.0.3-0.28.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110027" version="1" comment="MozillaFirefox is &lt;31.7.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110026" version="1" comment="MozillaFirefox-translations is &lt;31.7.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143931" version="1" comment="PackageKit is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143932" version="1" comment="PackageKit-lang is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143933" version="1" comment="hal is &lt;0.5.12-23.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143934" version="1" comment="hal-32bit is &lt;0.5.12-23.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143935" version="1" comment="hal-doc is &lt;0.5.12-23.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143936" version="1" comment="hal-x86 is &lt;0.5.12-23.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143937" version="1" comment="libpackagekit-glib10 is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143938" version="1" comment="PolicyKit is &lt;0.9-14.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143939" version="1" comment="PolicyKit-32bit is &lt;0.9-14.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143940" version="1" comment="PolicyKit-doc is &lt;0.9-14.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143941" version="1" comment="PolicyKit-x86 is &lt;0.9-14.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098629" version="1" comment="a2ps is &lt;4.13-1326.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143942" version="1" comment="aaa_base is &lt;11-6.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143943" version="1" comment="ant is &lt;1.7.1-20.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143944" version="1" comment="ant-trax is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108649" version="1" comment="apache2 is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108644" version="1" comment="apache2-doc is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108645" version="1" comment="apache2-example-pages is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108646" version="1" comment="apache2-prefork is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108647" version="1" comment="apache2-utils is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108648" version="1" comment="apache2-worker is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143945" version="1" comment="apache2-mod_jk is &lt;1.2.40-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143946" version="1" comment="apache2-mod_nss is &lt;1.0.8-0.4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143947" version="1" comment="apache2-mod_perl is &lt;2.0.4-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110219" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112868" version="1" comment="php53 is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110220" version="1" comment="php53-bcmath is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110221" version="1" comment="php53-bz2 is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110222" version="1" comment="php53-calendar is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110223" version="1" comment="php53-ctype is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110224" version="1" comment="php53-curl is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110225" version="1" comment="php53-dba is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110226" version="1" comment="php53-dom is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110227" version="1" comment="php53-exif is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110228" version="1" comment="php53-fastcgi is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110229" version="1" comment="php53-fileinfo is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110230" version="1" comment="php53-ftp is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110231" version="1" comment="php53-gd is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110232" version="1" comment="php53-gettext is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110233" version="1" comment="php53-gmp is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110234" version="1" comment="php53-iconv is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110235" version="1" comment="php53-intl is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110236" version="1" comment="php53-json is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110237" version="1" comment="php53-ldap is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110238" version="1" comment="php53-mbstring is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110239" version="1" comment="php53-mcrypt is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110240" version="1" comment="php53-mysql is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110241" version="1" comment="php53-odbc is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110242" version="1" comment="php53-openssl is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110243" version="1" comment="php53-pcntl is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110244" version="1" comment="php53-pdo is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110245" version="1" comment="php53-pear is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110246" version="1" comment="php53-pgsql is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110247" version="1" comment="php53-pspell is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110248" version="1" comment="php53-shmop is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110249" version="1" comment="php53-snmp is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110250" version="1" comment="php53-soap is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110251" version="1" comment="php53-suhosin is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110252" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110253" version="1" comment="php53-sysvsem is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110254" version="1" comment="php53-sysvshm is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110255" version="1" comment="php53-tokenizer is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110256" version="1" comment="php53-wddx is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110257" version="1" comment="php53-xmlreader is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110258" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110259" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110260" version="1" comment="php53-xsl is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110261" version="1" comment="php53-zip is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110262" version="1" comment="php53-zlib is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099258" version="1" comment="apache2-mod_security2 is &lt;2.7.1-0.2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099535" version="1" comment="augeas is &lt;0.9.0-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099534" version="1" comment="augeas-lenses is &lt;0.9.0-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099536" version="1" comment="libaugeas0 is &lt;0.9.0-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089841" version="1" comment="automake is &lt;1.10.1-4.131.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143948" version="1" comment="avahi is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143949" version="1" comment="avahi-lang is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143950" version="1" comment="avahi-utils is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143951" version="1" comment="libavahi-client3 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143952" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143953" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143954" version="1" comment="libavahi-common3 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143955" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143956" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143957" version="1" comment="libavahi-core5 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143958" version="1" comment="libdns_sd is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143959" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143960" version="1" comment="libdns_sd-x86 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143961" version="1" comment="bash is &lt;3.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143962" version="1" comment="bash-doc is &lt;3.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143963" version="1" comment="bash-x86 is &lt;3.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143964" version="1" comment="libreadline5 is &lt;5.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143965" version="1" comment="libreadline5-32bit is &lt;5.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143966" version="1" comment="libreadline5-x86 is &lt;5.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143967" version="1" comment="readline-doc is &lt;5.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106119" version="1" comment="bind is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106113" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106115" version="1" comment="bind-doc is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106117" version="1" comment="bind-libs is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106116" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103747" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106118" version="1" comment="bind-utils is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143968" version="1" comment="binutils is &lt;2.24-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143969" version="1" comment="boost-license is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143970" version="1" comment="boost-license1_49_0 is &lt;1.49.0-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143971" version="1" comment="libboost_program_options1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143972" version="1" comment="libboost_regex1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143973" version="1" comment="libboost_signals1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143974" version="1" comment="libboost_system1_49_0 is &lt;1.49.0-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143975" version="1" comment="libboost_thread1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143976" version="1" comment="libboost_thread1_49_0 is &lt;1.49.0-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143977" version="1" comment="cifs-utils is &lt;5.1-0.14.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109607" version="1" comment="clamav is &lt;0.98.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109626" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109624" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109623" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109627" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109622" version="1" comment="openldap2 is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109628" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109625" version="1" comment="openldap2-client is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109145" version="1" comment="coreutils is &lt;8.12-6.25.32.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109144" version="1" comment="coreutils-lang is &lt;8.12-6.25.32.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109146" version="1" comment="coreutils-x86 is &lt;8.12-6.25.32.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102978" version="1" comment="cpio is &lt;2.9-75.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102977" version="1" comment="cpio-lang is &lt;2.9-75.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143978" version="1" comment="cron is &lt;4.1-194.211.213.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110279" version="1" comment="cups is &lt;1.3.9-8.46.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110276" version="1" comment="cups-client is &lt;1.3.9-8.46.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110278" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110277" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110280" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109965" version="1" comment="curl is &lt;7.19.7-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109967" version="1" comment="libcurl4 is &lt;7.19.7-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109966" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109968" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143979" version="1" comment="davfs2 is &lt;1.5.2-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100695" version="1" comment="dbus-1 is &lt;1.2.10-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100692" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100693" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100694" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143980" version="1" comment="dhcp is &lt;4.2.4.P2-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143981" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143982" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143983" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143984" version="1" comment="dnsmasq is &lt;2.71-0.14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143985" version="1" comment="e2fsprogs is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143986" version="1" comment="libcom_err2 is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143987" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143988" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143989" version="1" comment="libext2fs2 is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107083" version="1" comment="elfutils is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107084" version="1" comment="libasm1 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107090" version="1" comment="libasm1-32bit is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107086" version="1" comment="libdw1 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107085" version="1" comment="libdw1-32bit is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107091" version="1" comment="libdw1-x86 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107088" version="1" comment="libebl1 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107087" version="1" comment="libebl1-32bit is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107092" version="1" comment="libebl1-x86 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107089" version="1" comment="libelf1 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107082" version="1" comment="libelf1-32bit is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107093" version="1" comment="libelf1-x86 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109215" version="1" comment="emacs is &lt;22.3-4.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109216" version="1" comment="emacs-el is &lt;22.3-4.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109213" version="1" comment="emacs-info is &lt;22.3-4.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109212" version="1" comment="emacs-nox is &lt;22.3-4.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109214" version="1" comment="emacs-x11 is &lt;22.3-4.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102331" version="1" comment="evolution-data-server is &lt;2.28.2-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102329" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102330" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102332" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091213" version="1" comment="fastjar is &lt;0.95-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102013" version="1" comment="file is &lt;4.24-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102012" version="1" comment="file-32bit is &lt;4.24-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102016" version="1" comment="file-x86 is &lt;4.24-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098692" version="1" comment="freeradius-server is &lt;2.1.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098688" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098689" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098690" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098691" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110209" version="1" comment="freetype2 is &lt;2.3.7-25.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110208" version="1" comment="freetype2-32bit is &lt;2.3.7-25.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110211" version="1" comment="freetype2-x86 is &lt;2.3.7-25.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110210" version="1" comment="ft2demos is &lt;2.3.7-25.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110282" version="1" comment="fuse is &lt;2.8.7-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110283" version="1" comment="libfuse2 is &lt;2.8.7-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109218" version="1" comment="gd is &lt;2.0.36.RC1-52.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143990" version="1" comment="glib2 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143991" version="1" comment="glib2-doc is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143992" version="1" comment="glib2-lang is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143993" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143994" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143995" version="1" comment="libgio-2_0-0-x86 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143996" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143997" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143998" version="1" comment="libglib-2_0-0-x86 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143999" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144000" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144001" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144002" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144003" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144004" version="1" comment="libgobject-2_0-0-x86 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144005" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144006" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144007" version="1" comment="libgthread-2_0-0-x86 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144008" version="1" comment="glibc is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144009" version="1" comment="glibc-32bit is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144010" version="1" comment="glibc-devel is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144011" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144012" version="1" comment="glibc-html is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144013" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144014" version="1" comment="glibc-info is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144015" version="1" comment="glibc-locale is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144016" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144017" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144018" version="1" comment="glibc-profile is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144019" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144020" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144021" version="1" comment="glibc-x86 is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144022" version="1" comment="nscd is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144023" version="1" comment="gnome-screensaver is &lt;2.28.3-0.39.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144024" version="1" comment="gnome-screensaver-lang is &lt;2.28.3-0.39.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108436" version="1" comment="gnutls is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108435" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108438" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108437" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108439" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098771" version="1" comment="gpg2 is &lt;2.0.9-25.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098770" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099921" version="1" comment="gpgme is &lt;1.1.6-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099922" version="1" comment="libgpgme11 is &lt;1.1.6-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144025" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.30-5.12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144026" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.30-5.12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144027" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.30-5.12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144028" version="1" comment="guestfs-data is &lt;1.20.12-0.18.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144029" version="1" comment="guestfs-tools is &lt;1.20.12-0.18.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144030" version="1" comment="guestfsd is &lt;1.20.12-0.18.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144031" version="1" comment="libguestfs0 is &lt;1.20.12-0.18.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093256" version="1" comment="hplip is &lt;3.11.10-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093255" version="1" comment="hplip-hpijs is &lt;3.11.10-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144032" version="1" comment="hyper-v is &lt;6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144033" version="1" comment="ibutils is &lt;1.5.7-0.15.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144034" version="1" comment="ibutils-32bit is &lt;1.5.7-0.15.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144035" version="1" comment="ipsec-tools is &lt;0.7.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098503" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098502" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144036" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144037" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144038" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144039" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144040" version="1" comment="kbd is &lt;1.14.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098370" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098371" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.11.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098373" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098372" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098374" version="1" comment="kdm is &lt;4.3.5-0.12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098375" version="1" comment="kwin is &lt;4.3.5-0.12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107756" version="1" comment="kdebase4-runtime is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112896" version="1" comment="kdelibs4 is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112897" version="1" comment="kdelibs4-core is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112898" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112899" version="1" comment="libkde4 is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112900" version="1" comment="libkde4-32bit is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112933" version="1" comment="libkde4-x86 is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112901" version="1" comment="libkdecore4 is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112902" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112934" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098705" version="1" comment="kdirstat is &lt;2.4.4-255.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144041" version="1" comment="kernel-default is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144042" version="1" comment="kernel-default-base is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144043" version="1" comment="kernel-default-devel is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144044" version="1" comment="kernel-default-man is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144045" version="1" comment="kernel-pae is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144046" version="1" comment="kernel-pae-base is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144047" version="1" comment="kernel-pae-devel is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144048" version="1" comment="kernel-ppc64 is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144049" version="1" comment="kernel-ppc64-base is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144050" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144051" version="1" comment="kernel-source is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144052" version="1" comment="kernel-syms is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144053" version="1" comment="kernel-trace is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144054" version="1" comment="kernel-trace-base is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144055" version="1" comment="kernel-trace-devel is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144056" version="1" comment="kernel-xen is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144057" version="1" comment="kernel-xen-base is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144058" version="1" comment="kernel-xen-devel is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107541" version="1" comment="krb5 is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107539" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107542" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107543" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107540" version="1" comment="krb5-client is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107538" version="1" comment="krb5-server is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107547" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107544" version="1" comment="krb5-doc is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107545" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107546" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144059" version="1" comment="kvm is &lt;1.4.2-30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091580" version="1" comment="lcms is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091583" version="1" comment="liblcms1 is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091581" version="1" comment="liblcms1-32bit is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091582" version="1" comment="liblcms1-x86 is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144060" version="1" comment="ldapsmb is &lt;1.34b-12.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144061" version="1" comment="libldb1 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144062" version="1" comment="libsmbclient0 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144063" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144064" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144065" version="1" comment="libtalloc2 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144066" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144067" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144068" version="1" comment="libtdb1 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144069" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144070" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144071" version="1" comment="libtevent0 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144072" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144073" version="1" comment="libwbclient0 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144074" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144075" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144076" version="1" comment="samba is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144077" version="1" comment="samba-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144078" version="1" comment="samba-client is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144079" version="1" comment="samba-client-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144080" version="1" comment="samba-client-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144081" version="1" comment="samba-krb-printing is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144082" version="1" comment="samba-winbind is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144083" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144084" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144085" version="1" comment="samba-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102504" version="1" comment="libFLAC++6 is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102506" version="1" comment="libFLAC8 is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102505" version="1" comment="libFLAC8-32bit is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102507" version="1" comment="libFLAC8-x86 is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102727" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102726" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110009" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109994" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109995" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110019" version="1" comment="libqt4 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110010" version="1" comment="libqt4-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110012" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110011" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110020" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110016" version="1" comment="libqt4-sql is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110013" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110014" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110015" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110021" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110018" version="1" comment="libqt4-x11 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110017" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110022" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110023" version="1" comment="libqt4-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110024" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144086" version="1" comment="libapr-util1 is &lt;1.3.4-12.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144087" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144088" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.3.4-12.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144089" version="1" comment="libapr1 is &lt;1.3.3-11.18.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144090" version="1" comment="libapr1-32bit is &lt;1.3.3-11.18.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144091" version="1" comment="libblkid1 is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144092" version="1" comment="libblkid1-32bit is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144093" version="1" comment="libblkid1-x86 is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144094" version="1" comment="libuuid1 is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144095" version="1" comment="libuuid1-32bit is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144096" version="1" comment="libuuid1-x86 is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144097" version="1" comment="util-linux is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144098" version="1" comment="util-linux-lang is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144099" version="1" comment="uuid-runtime is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144100" version="1" comment="libcgroup1 is &lt;0.41.rc1-2.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144101" version="1" comment="libdrm is &lt;2.4.52-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144102" version="1" comment="libdrm-32bit is &lt;2.4.52-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144103" version="1" comment="libdrm-x86 is &lt;2.4.52-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144104" version="1" comment="libecpg6 is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144105" version="1" comment="libpq5 is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144106" version="1" comment="libpq5-32bit is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144107" version="1" comment="postgresql94 is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144108" version="1" comment="postgresql94-contrib is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144109" version="1" comment="postgresql94-docs is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144110" version="1" comment="postgresql94-server is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112617" version="1" comment="libevent-1_4-2 is &lt;1.4.5-24.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107502" version="1" comment="libfreebl3 is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107501" version="1" comment="libfreebl3-32bit is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107508" version="1" comment="libfreebl3-x86 is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107504" version="1" comment="libsoftokn3 is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107503" version="1" comment="libsoftokn3-32bit is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107509" version="1" comment="libsoftokn3-x86 is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107507" version="1" comment="mozilla-nss is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107505" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107506" version="1" comment="mozilla-nss-tools is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107510" version="1" comment="mozilla-nss-x86 is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144111" version="1" comment="libgcc_s1 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144112" version="1" comment="libgcc_s1-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144113" version="1" comment="libgcc_s1-x86 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144114" version="1" comment="libgfortran3 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144115" version="1" comment="libgomp1 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144116" version="1" comment="libgomp1-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144117" version="1" comment="libquadmath0 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144118" version="1" comment="libstdc++6 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144119" version="1" comment="libstdc++6-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144120" version="1" comment="libstdc++6-x86 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099938" version="1" comment="libgcrypt11 is &lt;1.5.0-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099936" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099937" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144121" version="1" comment="libgtop is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144122" version="1" comment="libgtop-2_0-7 is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144123" version="1" comment="libgtop-doc is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144124" version="1" comment="libgtop-lang is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106033" version="1" comment="libjasper is &lt;1.900.1-134.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106032" version="1" comment="libjasper-32bit is &lt;1.900.1-134.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106034" version="1" comment="libjasper-x86 is &lt;1.900.1-134.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102976" version="1" comment="libksba is &lt;1.0.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098769" version="1" comment="liblzo2-2 is &lt;2.03-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098767" version="1" comment="liblzo2-2-32bit is &lt;2.03-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098768" version="1" comment="liblzo2-2-x86 is &lt;2.03-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144125" version="1" comment="libmpfr1 is &lt;2.3.2-3.118.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144126" version="1" comment="libmpfr1-32bit is &lt;2.3.2-3.118.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112935" version="1" comment="libmpfr1-x86 is &lt;2.3.2-3.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107714" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109861" version="1" comment="libmysql55client18 is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109860" version="1" comment="libmysql55client18-32bit is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109865" version="1" comment="libmysql55client18-x86 is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109862" version="1" comment="libmysql55client_r18 is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109858" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109859" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109864" version="1" comment="mysql is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109863" version="1" comment="mysql-client is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109866" version="1" comment="mysql-tools is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108147" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108146" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108152" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108148" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107900" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107897" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107899" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107898" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107971" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107902" version="1" comment="openssl is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107901" version="1" comment="openssl-doc is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092675" version="1" comment="libpixman-1-0 is &lt;0.24.4-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092673" version="1" comment="libpixman-1-0-32bit is &lt;0.24.4-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092674" version="1" comment="libpixman-1-0-x86 is &lt;0.24.4-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098501" version="1" comment="libpng12-0 is &lt;1.2.31-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098499" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098500" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098332" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098333" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098334" version="1" comment="libpoppler5 is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098335" version="1" comment="poppler-tools is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144127" version="1" comment="libpulse-browse0 is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144128" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144129" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144130" version="1" comment="libpulse-mainloop-glib0-x86 is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144131" version="1" comment="libpulse0 is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144132" version="1" comment="libpulse0-32bit is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144133" version="1" comment="libpulse0-x86 is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144134" version="1" comment="pulseaudio is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144135" version="1" comment="pulseaudio-esound-compat is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144136" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144137" version="1" comment="pulseaudio-lang is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144138" version="1" comment="pulseaudio-module-x11 is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144139" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144140" version="1" comment="pulseaudio-utils is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144141" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144142" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144143" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144144" version="1" comment="python-base is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144145" version="1" comment="python-base-32bit is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144146" version="1" comment="python-base-x86 is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144147" version="1" comment="python-xml is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144148" version="1" comment="libtirpc1 is &lt;0.2.1-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105659" version="1" comment="libsndfile is &lt;1.0.20-2.6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105658" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105660" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100007" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100005" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100006" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100008" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100009" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100010" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108442" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144149" version="1" comment="libsss_idmap0 is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144150" version="1" comment="python-sssd-config is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144151" version="1" comment="sssd is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144152" version="1" comment="sssd-32bit is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144153" version="1" comment="sssd-tools is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109685" version="1" comment="libtasn1 is &lt;1.5-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109684" version="1" comment="libtasn1-3 is &lt;1.5-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109683" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109686" version="1" comment="libtasn1-3-x86 is &lt;1.5-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144154" version="1" comment="libtevent0-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091279" version="1" comment="libtiff3 is &lt;3.8.2-141.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091277" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091278" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091280" version="1" comment="tiff is &lt;3.8.2-141.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144155" version="1" comment="libtspi1 is &lt;0.3.10-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144156" version="1" comment="libtspi1-32bit is &lt;0.3.10-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144157" version="1" comment="libtspi1-x86 is &lt;0.3.10-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144158" version="1" comment="trousers is &lt;0.3.10-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144159" version="1" comment="libvirt is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144160" version="1" comment="libvirt-client is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144161" version="1" comment="libvirt-client-32bit is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144162" version="1" comment="libvirt-doc is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144163" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101875" version="1" comment="libwsman1 is &lt;2.2.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101876" version="1" comment="openwsman-client is &lt;2.2.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101877" version="1" comment="openwsman-server is &lt;2.2.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144164" version="1" comment="suseRegister is &lt;1.4-1.38.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144165" version="1" comment="pam-modules is &lt;11-1.25.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144166" version="1" comment="pam-modules-32bit is &lt;11-1.25.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144167" version="1" comment="pam-modules-x86 is &lt;11-1.25.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144168" version="1" comment="pwdutils is &lt;3.2.15-0.17.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144169" version="1" comment="pwdutils-plugin-audit is &lt;3.2.15-0.17.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101725" version="1" comment="libxml2 is &lt;2.7.6-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101723" version="1" comment="libxml2-32bit is &lt;2.7.6-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101726" version="1" comment="libxml2-doc is &lt;2.7.6-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101727" version="1" comment="libxml2-x86 is &lt;2.7.6-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091329" version="1" comment="libxslt is &lt;1.1.24-19.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091327" version="1" comment="libxslt-32bit is &lt;1.1.24-19.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091328" version="1" comment="libxslt-x86 is &lt;1.1.24-19.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144170" version="1" comment="logrotate is &lt;3.7.7-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144171" version="1" comment="logwatch is &lt;7.3.6-65.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144172" version="1" comment="lvm2 is &lt;2.02.98-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144173" version="1" comment="lxc is &lt;0.8.0-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144174" version="1" comment="mailx is &lt;12.5-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109245" version="1" comment="mono-core is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109251" version="1" comment="mono-data is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109248" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109249" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109255" version="1" comment="mono-locale-extras is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109256" version="1" comment="mono-nunit is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109258" version="1" comment="mono-web is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109259" version="1" comment="mono-winforms is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101265" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101264" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101271" version="1" comment="mozilla-nspr-x86 is &lt;4.10.7-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109091" version="1" comment="mutt is &lt;1.5.17-42.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098667" version="1" comment="nagios is &lt;3.0.6-1.25.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098666" version="1" comment="nagios-www is &lt;3.0.6-1.25.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098716" version="1" comment="nagios-nrpe is &lt;2.12-24.4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098715" version="1" comment="nagios-nrpe-doc is &lt;2.12-24.4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098717" version="1" comment="nagios-plugins-nrpe is &lt;2.12-24.4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101145" version="1" comment="nagios-plugins is &lt;1.4.16-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101144" version="1" comment="nagios-plugins-extras is &lt;1.4.16-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144175" version="1" comment="nfs-client is &lt;1.2.3-18.38.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144176" version="1" comment="nfs-doc is &lt;1.2.3-18.38.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144177" version="1" comment="nfs-kernel-server is &lt;1.2.3-18.38.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144178" version="1" comment="ntp is &lt;4.2.8p2-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144179" version="1" comment="ntp-doc is &lt;4.2.8p2-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144180" version="1" comment="ofed is &lt;1.5.4.1-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144181" version="1" comment="ofed-doc is &lt;1.5.4.1-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144182" version="1" comment="ofed-kmp-default is &lt;1.5.4.1_3.0.101_63-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144183" version="1" comment="ofed-kmp-pae is &lt;1.5.4.1_3.0.101_63-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144184" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.4.1_3.0.101_63-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144185" version="1" comment="ofed-kmp-trace is &lt;1.5.4.1_3.0.101_63-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144186" version="1" comment="openCryptoki is &lt;3.2-0.11.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144187" version="1" comment="openCryptoki-32bit is &lt;3.2-0.11.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144188" version="1" comment="openCryptoki-64bit is &lt;3.2-0.11.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109700" version="1" comment="openslp is &lt;1.2.0-172.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109699" version="1" comment="openslp-32bit is &lt;1.2.0-172.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109698" version="1" comment="openslp-server is &lt;1.2.0-172.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109701" version="1" comment="openslp-x86 is &lt;1.2.0-172.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144189" version="1" comment="openssh is &lt;6.6p1-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144190" version="1" comment="openssh-fips is &lt;6.6p1-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102621" version="1" comment="openvpn is &lt;2.0.9-143.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102622" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144191" version="1" comment="pam is &lt;1.1.5-0.15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144192" version="1" comment="pam-32bit is &lt;1.1.5-0.15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144193" version="1" comment="pam-doc is &lt;1.1.5-0.15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144194" version="1" comment="pam-x86 is &lt;1.1.5-0.15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144195" version="1" comment="perl is &lt;5.10.0-64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144196" version="1" comment="perl-32bit is &lt;5.10.0-64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144197" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144198" version="1" comment="perl-Test-Simple is &lt;0.72-0.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144199" version="1" comment="perl-base is &lt;5.10.0-64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144200" version="1" comment="perl-doc is &lt;5.10.0-64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144201" version="1" comment="perl-x86 is &lt;5.10.0-64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144202" version="1" comment="popt is &lt;1.7-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144203" version="1" comment="popt-32bit is &lt;1.7-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144204" version="1" comment="popt-x86 is &lt;1.7-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144205" version="1" comment="rpm is &lt;4.4.2.3-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144206" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144207" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144208" version="1" comment="powerpc-utils is &lt;1.2.22-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144209" version="1" comment="ppc64-diag is &lt;2.6.7-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099941" version="1" comment="ppp is &lt;2.4.5.git-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100586" version="1" comment="procmail is &lt;3.22-240.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144210" version="1" comment="puppet is &lt;2.7.26-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144211" version="1" comment="puppet-server is &lt;2.7.26-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102493" version="1" comment="pure-ftpd is &lt;1.0.22-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144212" version="1" comment="python is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144213" version="1" comment="python-32bit is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144214" version="1" comment="python-curses is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144215" version="1" comment="python-demo is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144216" version="1" comment="python-gdbm is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144217" version="1" comment="python-idle is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144218" version="1" comment="python-tk is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144219" version="1" comment="python-x86 is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098685" version="1" comment="python-imaging is &lt;1.1.6-168.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100957" version="1" comment="python-lxml is &lt;2.3.6-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144220" version="1" comment="python-pywbem is &lt;0.7-6.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103900" version="1" comment="quagga is &lt;0.99.15-0.14.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144221" version="1" comment="radvd is &lt;1.1-1.24.8.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100967" version="1" comment="rsyslog is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100958" version="1" comment="rsyslog-diag-tools is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100959" version="1" comment="rsyslog-doc is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100960" version="1" comment="rsyslog-module-gssapi is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100961" version="1" comment="rsyslog-module-gtls is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100962" version="1" comment="rsyslog-module-mysql is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100963" version="1" comment="rsyslog-module-pgsql is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100964" version="1" comment="rsyslog-module-relp is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100965" version="1" comment="rsyslog-module-snmp is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100966" version="1" comment="rsyslog-module-udpspoof is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105486" version="1" comment="ruby is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105481" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105485" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144222" version="1" comment="sblim-sfcb is &lt;1.3.11-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098750" version="1" comment="sendmail is &lt;8.14.3-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102690" version="1" comment="shim is &lt;0.7.318.81ee561d-0.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090553" version="1" comment="squid is &lt;2.7.STABLE5-2.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100639" version="1" comment="squid3 is &lt;3.1.12-8.16.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144223" version="1" comment="star is &lt;1.5final-28.23.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098714" version="1" comment="strongswan is &lt;4.4.0-6.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098713" version="1" comment="strongswan-doc is &lt;4.4.0-6.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110042" version="1" comment="sudo is &lt;1.7.6p2-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144224" version="1" comment="sysconfig is &lt;0.71.61-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144225" version="1" comment="sysstat is &lt;8.1.5-7.50.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144226" version="1" comment="sysstat-isag is &lt;8.1.5-7.50.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144227" version="1" comment="tar is &lt;1.26-1.2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108650" version="1" comment="tcpdump is &lt;3.9.8-1.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099545" version="1" comment="tomcat6 is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099538" version="1" comment="tomcat6-admin-webapps is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099539" version="1" comment="tomcat6-docs-webapp is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099540" version="1" comment="tomcat6-javadoc is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099541" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099542" version="1" comment="tomcat6-lib is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099543" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099544" version="1" comment="tomcat6-webapps is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106835" version="1" comment="unzip is &lt;6.00-11.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091215" version="1" comment="vino is &lt;2.28.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091214" version="1" comment="vino-lang is &lt;2.28.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144228" version="1" comment="virt-utils is &lt;1.2.1-10.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144229" version="1" comment="vsftpd is &lt;2.0.7-4.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101160" version="1" comment="wget is &lt;1.11.4-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112696" version="1" comment="wireshark is &lt;1.10.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101152" version="1" comment="wpa_supplicant is &lt;0.7.1-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098512" version="1" comment="xalan-j2 is &lt;2.7.0-217.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144230" version="1" comment="xen is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144231" version="1" comment="xen-doc-html is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144232" version="1" comment="xen-kmp-default is &lt;4.4.2_08_3.0.101_63-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144233" version="1" comment="xen-kmp-pae is &lt;4.4.2_08_3.0.101_63-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144234" version="1" comment="xen-libs is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144235" version="1" comment="xen-libs-32bit is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144236" version="1" comment="xen-tools is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144237" version="1" comment="xen-tools-domU is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098336" version="1" comment="xinetd is &lt;2.3.14-130.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144238" version="1" comment="xorg-x11 is &lt;7.4-9.65.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144239" version="1" comment="xorg-x11-xauth is &lt;7.4-9.65.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110272" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110274" version="1" comment="xorg-x11-server is &lt;7.4-27.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110273" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103948" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103947" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077515" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077723" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077722" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077740" version="1" comment="xorg-x11-libXext-x86 is &lt;7.4-1.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103952" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103951" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077741" version="1" comment="xorg-x11-libXfixes-x86 is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103964" version="1" comment="xorg-x11-libXp is &lt;7.4-1.18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103963" version="1" comment="xorg-x11-libXp-32bit is &lt;7.4-1.18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077523" version="1" comment="xorg-x11-libXp-x86 is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103956" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103955" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077743" version="1" comment="xorg-x11-libXrender-x86 is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103962" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103961" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077745" version="1" comment="xorg-x11-libXt-x86 is &lt;7.4-1.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103958" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103957" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077744" version="1" comment="xorg-x11-libXv-x86 is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108447" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108446" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108448" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144240" version="1" comment="xorg-x11-server-rdp is &lt;7.3.99-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144241" version="1" comment="yast2 is &lt;2.17.140-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144242" version="1" comment="yast2-core is &lt;2.17.46-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077243" version="1" comment="GraphicsMagick is &lt;1.2.5-4.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077244" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077245" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117399" version="1" comment="sle-sdk-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102720" version="1" comment="ImageMagick is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102719" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102721" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102722" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102724" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102723" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102725" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145394" version="1" comment="LibVNCServer-devel is &lt;0.9.1-154.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145395" version="1" comment="Mesa-devel is &lt;9.0.3-0.28.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145396" version="1" comment="Mesa-devel-32bit is &lt;9.0.3-0.28.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110025" version="1" comment="MozillaFirefox-devel is &lt;31.7.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145397" version="1" comment="NetworkManager-devel is &lt;0.7.1_git20090811-3.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054516" version="1" comment="OpenEXR-devel is &lt;1.6.1-83.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145398" version="1" comment="PackageKit-devel is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145399" version="1" comment="hal-devel is &lt;0.5.12-23.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145400" version="1" comment="libpackagekit-glib10-devel is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145401" version="1" comment="libpackagekit-qt10 is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145402" version="1" comment="libpackagekit-qt10-devel is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145403" version="1" comment="PolicyKit-devel is &lt;0.9-14.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054067" version="1" comment="Xerces-c is &lt;2.8.0-29.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054068" version="1" comment="libXerces-c-devel is &lt;2.8.0-29.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054069" version="1" comment="libXerces-c28 is &lt;2.8.0-29.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098881" version="1" comment="a2ps-devel is &lt;4.13-1326.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145404" version="1" comment="ant-antlr is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145405" version="1" comment="ant-apache-bcel is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145406" version="1" comment="ant-apache-bsf is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145407" version="1" comment="ant-apache-log4j is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145408" version="1" comment="ant-apache-oro is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145409" version="1" comment="ant-apache-regexp is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145410" version="1" comment="ant-apache-resolver is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145411" version="1" comment="ant-commons-logging is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145412" version="1" comment="ant-javadoc is &lt;1.7.1-20.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145413" version="1" comment="ant-javamail is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145414" version="1" comment="ant-jdepend is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145415" version="1" comment="ant-jmf is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145416" version="1" comment="ant-junit is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145417" version="1" comment="ant-manual is &lt;1.7.1-20.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145418" version="1" comment="ant-nodeps is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145419" version="1" comment="ant-scripts is &lt;1.7.1-20.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145420" version="1" comment="ant-swing is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108643" version="1" comment="apache2-devel is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091357" version="1" comment="apache2-mod_fcgid is &lt;2.2-31.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145421" version="1" comment="apache2-mod_perl-devel is &lt;2.0.4-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099546" version="1" comment="augeas-devel is &lt;0.9.0-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145422" version="1" comment="avahi-compat-howl-devel is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145423" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145424" version="1" comment="libavahi-devel is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145425" version="1" comment="libhowl0 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145426" version="1" comment="python-avahi is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106114" version="1" comment="bind-devel is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103740" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145427" version="1" comment="binutils-devel is &lt;2.24-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145428" version="1" comment="binutils-devel-32bit is &lt;2.24-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145429" version="1" comment="binutils-gold is &lt;2.24-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145430" version="1" comment="cross-ppc-binutils is &lt;2.24-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145431" version="1" comment="cross-spu-binutils is &lt;2.24-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145432" version="1" comment="boinc-client is &lt;6.2.18-4.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145433" version="1" comment="boinc-client-devel is &lt;6.2.18-4.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145434" version="1" comment="boost-devel is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145435" version="1" comment="boost-devel-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145436" version="1" comment="boost-doc is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145437" version="1" comment="libboost_date_time1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145438" version="1" comment="libboost_date_time1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145439" version="1" comment="libboost_filesystem1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145440" version="1" comment="libboost_filesystem1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145441" version="1" comment="libboost_graph1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145442" version="1" comment="libboost_graph1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145443" version="1" comment="libboost_iostreams1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145444" version="1" comment="libboost_iostreams1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145445" version="1" comment="libboost_math1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145446" version="1" comment="libboost_math1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145447" version="1" comment="libboost_mpi1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145448" version="1" comment="libboost_program_options1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145449" version="1" comment="libboost_python1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145450" version="1" comment="libboost_python1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145451" version="1" comment="libboost_regex1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145452" version="1" comment="libboost_serialization1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145453" version="1" comment="libboost_serialization1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145454" version="1" comment="libboost_signals1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145455" version="1" comment="libboost_system1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145456" version="1" comment="libboost_system1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145457" version="1" comment="libboost_test1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145458" version="1" comment="libboost_test1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145459" version="1" comment="libboost_thread1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145460" version="1" comment="libboost_wave1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145461" version="1" comment="libboost_wave1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145462" version="1" comment="build is &lt;2011.10.10-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109244" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109246" version="1" comment="mono-data-firebird is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109247" version="1" comment="mono-data-oracle is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109250" version="1" comment="mono-data-sybase is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109252" version="1" comment="mono-devel is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109253" version="1" comment="mono-extras is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109254" version="1" comment="mono-jscript is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109257" version="1" comment="mono-wcf is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109260" version="1" comment="mono-winfxcore is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109261" version="1" comment="monodoc-core is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145463" version="1" comment="coolkey-devel is &lt;1.1.0-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145464" version="1" comment="cpp48 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145465" version="1" comment="gcc48 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145466" version="1" comment="gcc48-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145467" version="1" comment="gcc48-c++ is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145468" version="1" comment="gcc48-fortran is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145469" version="1" comment="gcc48-fortran-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145470" version="1" comment="gcc48-info is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145471" version="1" comment="gcc48-locale is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145472" version="1" comment="libasan0 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145473" version="1" comment="libatomic1 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145474" version="1" comment="libgfortran3-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145475" version="1" comment="libitm1 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145476" version="1" comment="libquadmath0-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145477" version="1" comment="libstdc++48-devel is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145478" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145479" version="1" comment="libtsan0 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145480" version="1" comment="cscope is &lt;15.6-95.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098799" version="1" comment="ctdb-devel is &lt;1.0.114.6-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110275" version="1" comment="cups-devel is &lt;1.3.9-8.46.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071590" version="1" comment="cyrus-imapd-devel is &lt;2.3.11-60.65.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100697" version="1" comment="dbus-1-devel is &lt;1.2.10-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100696" version="1" comment="dbus-1-devel-doc is &lt;1.2.10-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145481" version="1" comment="dbus-1-glib-devel is &lt;0.76-34.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145482" version="1" comment="derby is &lt;10.3.1.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145483" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145484" version="1" comment="e2fsprogs-devel is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145485" version="1" comment="libcom_err-devel is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145486" version="1" comment="libcom_err-devel-32bit is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145487" version="1" comment="libext2fs-devel is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145488" version="1" comment="libext2fs-devel-32bit is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145489" version="1" comment="libext2fs2-32bit is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145490" version="1" comment="libext2fs2-x86 is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145491" version="1" comment="empathy is &lt;2.28.2-0.13.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145492" version="1" comment="empathy-devel is &lt;2.28.2-0.13.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145493" version="1" comment="empathy-lang is &lt;2.28.2-0.13.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145494" version="1" comment="evince-devel is &lt;2.28.2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145495" version="1" comment="evolution is &lt;2.28.2-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145496" version="1" comment="evolution-devel is &lt;2.28.2-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145497" version="1" comment="evolution-lang is &lt;2.28.2-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102328" version="1" comment="evolution-data-server-devel is &lt;2.28.2-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102014" version="1" comment="file-devel is &lt;4.24-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145498" version="1" comment="fileshareset is &lt;2.0-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145499" version="1" comment="kdebase3 is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145500" version="1" comment="kdebase3-32bit is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145501" version="1" comment="kdebase3-devel is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145502" version="1" comment="misc-console-font is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102692" version="1" comment="finch is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102691" version="1" comment="finch-devel is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102695" version="1" comment="libpurple is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102693" version="1" comment="libpurple-devel is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102694" version="1" comment="libpurple-lang is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102697" version="1" comment="pidgin is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102696" version="1" comment="pidgin-devel is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102501" version="1" comment="flac-devel is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102502" version="1" comment="libFLAC++6-32bit is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102503" version="1" comment="libFLAC++6-x86 is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098917" version="1" comment="freeradius-server-devel is &lt;2.1.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110207" version="1" comment="freetype2-devel is &lt;2.3.7-25.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110206" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110281" version="1" comment="fuse-devel is &lt;2.8.7-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109217" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074871" version="1" comment="gdk-pixbuf is &lt;0.22.0-294.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074870" version="1" comment="gdk-pixbuf-32bit is &lt;0.22.0-294.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074890" version="1" comment="gdk-pixbuf-devel is &lt;0.22.0-294.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075774" version="1" comment="ghostscript-devel is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075775" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075776" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093459" version="1" comment="gimp is &lt;2.6.2-3.34.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093456" version="1" comment="gimp-devel is &lt;2.6.2-3.34.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093457" version="1" comment="gimp-lang is &lt;2.6.2-3.34.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093458" version="1" comment="gimp-plugins-python is &lt;2.6.2-3.34.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105496" version="1" comment="git is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105488" version="1" comment="git-arch is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105489" version="1" comment="git-core is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105490" version="1" comment="git-cvs is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105491" version="1" comment="git-daemon is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105492" version="1" comment="git-email is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105493" version="1" comment="git-gui is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105494" version="1" comment="git-svn is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105495" version="1" comment="git-web is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105497" version="1" comment="gitk is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145503" version="1" comment="glib2-devel is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145504" version="1" comment="glib2-devel-32bit is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145505" version="1" comment="libgio-fam is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145506" version="1" comment="gmime-2_4-devel is &lt;2.4.8-1.2.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145507" version="1" comment="gmime-devel is &lt;2.2.23-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145508" version="1" comment="gmime-sharp is &lt;2.2.23-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145509" version="1" comment="gnucash is &lt;2.2.7-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145510" version="1" comment="gnucash-devel is &lt;2.2.7-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145511" version="1" comment="gnucash-lang is &lt;2.2.7-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145512" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074873" version="1" comment="gtk2-devel is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074891" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145513" version="1" comment="ibutils-devel is &lt;1.5.7-0.15.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145514" version="1" comment="ibutils-devel-32bit is &lt;1.5.7-0.15.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076346" version="1" comment="icu is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076352" version="1" comment="libicu-devel is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076351" version="1" comment="libicu-devel-32bit is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145515" version="1" comment="imlib is &lt;1.9.14-401.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145516" version="1" comment="imlib-32bit is &lt;1.9.14-401.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145517" version="1" comment="imlib-config is &lt;1.9.14-401.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145518" version="1" comment="imlib-devel is &lt;1.9.14-401.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145519" version="1" comment="imlib-x86 is &lt;1.9.14-401.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145520" version="1" comment="imlib2 is &lt;1.4.2-2.18.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145521" version="1" comment="imlib2-devel is &lt;1.4.2-2.18.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145522" version="1" comment="imlib2-filters is &lt;1.4.2-2.18.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145523" version="1" comment="imlib2-loaders is &lt;1.4.2-2.18.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145524" version="1" comment="inkscape is &lt;0.46-62.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145525" version="1" comment="inkscape-extensions-dia is &lt;0.46-62.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145526" version="1" comment="inkscape-extensions-extra is &lt;0.46-62.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145527" version="1" comment="inkscape-extensions-fig is &lt;0.46-62.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145528" version="1" comment="inkscape-extensions-gimp is &lt;0.46-62.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145529" version="1" comment="inkscape-lang is &lt;0.46-62.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145530" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098798" version="1" comment="kdebase4-workspace-devel is &lt;4.3.5-0.12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056620" version="1" comment="kdelibs3-arts is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056618" version="1" comment="kdelibs3-arts-32bit is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056619" version="1" comment="kdelibs3-arts-x86 is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056621" version="1" comment="kdelibs3-devel is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056622" version="1" comment="kdelibs3-doc is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116235" version="1" comment="libkde4-devel is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116236" version="1" comment="libkdecore4-devel is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145531" version="1" comment="kernel-docs is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065203" version="1" comment="kopete-devel is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107537" version="1" comment="krb5-devel is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107536" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109993" version="1" comment="libQtWebKit-devel is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109998" version="1" comment="libqt4-devel is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109997" version="1" comment="libqt4-devel-doc is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109996" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109999" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110000" version="1" comment="libqt4-sql-mysql-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110003" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110001" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110002" version="1" comment="libqt4-sql-postgresql-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110004" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110005" version="1" comment="libqt4-sql-sqlite-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110008" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110006" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110007" version="1" comment="libqt4-sql-unixODBC-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145532" version="1" comment="libadns-devel is &lt;1.4-73.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145533" version="1" comment="libapr-util1-devel is &lt;1.3.4-12.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145534" version="1" comment="libapr-util1-devel-32bit is &lt;1.3.4-12.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145535" version="1" comment="libapr1-devel is &lt;1.3.3-11.18.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145536" version="1" comment="libapr1-devel-32bit is &lt;1.3.3-11.18.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145537" version="1" comment="libarchive-devel is &lt;2.5.5-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107078" version="1" comment="libasm-devel is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107079" version="1" comment="libdw-devel is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107080" version="1" comment="libebl-devel is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107081" version="1" comment="libelf-devel is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145538" version="1" comment="libblkid-devel is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145539" version="1" comment="libblkid-devel-32bit is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145540" version="1" comment="libuuid-devel is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145541" version="1" comment="libuuid-devel-32bit is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145542" version="1" comment="libbz2-devel is &lt;1.0.5-34.253.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145543" version="1" comment="libcap-devel is &lt;2.11-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145544" version="1" comment="libcgroup-devel is &lt;0.41.rc1-2.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109964" version="1" comment="libcurl-devel is &lt;7.19.7-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067210" version="1" comment="libdhcp6client-1_0-2 is &lt;1.0.22-3.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067211" version="1" comment="libdhcp6client-devel is &lt;1.0.22-3.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145545" version="1" comment="libdrm-devel is &lt;2.4.52-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145546" version="1" comment="libdrm-devel-32bit is &lt;2.4.52-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116240" version="1" comment="libevent-devel is &lt;1.4.5-24.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075065" version="1" comment="libexif-devel is &lt;0.6.17-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145547" version="1" comment="libexiv2-4-32bit is &lt;0.17.1-31.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145548" version="1" comment="libexiv2-4-x86 is &lt;0.17.1-31.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145549" version="1" comment="libexiv2-devel is &lt;0.17.1-31.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074697" version="1" comment="libexpat-devel is &lt;2.0.1-88.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098828" version="1" comment="libgadu is &lt;1.8.2-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098827" version="1" comment="libgadu-devel is &lt;1.8.2-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099940" version="1" comment="libgcrypt-devel is &lt;1.5.0-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099939" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.0-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069324" version="1" comment="libgnomesu-devel is &lt;1.0.0-307.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108433" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108434" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099933" version="1" comment="libgpgme-devel is &lt;1.1.6-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099934" version="1" comment="libgpgme11-32bit is &lt;1.1.6-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099935" version="1" comment="libgpgme11-x86 is &lt;1.1.6-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145550" version="1" comment="libgtop-2_0-7-32bit is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145551" version="1" comment="libgtop-2_0-7-x86 is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145552" version="1" comment="libgtop-devel is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145553" version="1" comment="libguestfs-devel is &lt;1.20.12-0.18.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145554" version="1" comment="libid3tag is &lt;0.15.1b-130.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145555" version="1" comment="libid3tag-devel is &lt;0.15.1b-130.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106031" version="1" comment="libjasper-devel is &lt;1.900.1-134.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075214" version="1" comment="libjpeg-devel is &lt;6.2.0-879.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075213" version="1" comment="libjpeg-devel-32bit is &lt;6.2.0-879.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102975" version="1" comment="libksba-devel is &lt;1.0.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091592" version="1" comment="liblcms-devel is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091591" version="1" comment="liblcms-devel-32bit is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091593" version="1" comment="python-lcms is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145556" version="1" comment="libldb-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145557" version="1" comment="libnetapi-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145558" version="1" comment="libnetapi0 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145559" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145560" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145561" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145562" version="1" comment="libtalloc-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145563" version="1" comment="libtdb-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145564" version="1" comment="libtevent-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145565" version="1" comment="libwbclient-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145566" version="1" comment="samba-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145567" version="1" comment="samba-test is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060145" version="1" comment="libmikmod is &lt;3.1.11a-116.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060144" version="1" comment="libmikmod-devel is &lt;3.1.11a-116.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116243" version="1" comment="mpfr-devel is &lt;2.3.2-3.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116244" version="1" comment="mpfr-devel-32bit is &lt;2.3.2-3.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107713" version="1" comment="libmspack-devel is &lt;0.0.20060920alpha-74.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145568" version="1" comment="libmusicbrainz-devel is &lt;2.1.5-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076526" version="1" comment="libmysqlclient-devel is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108141" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108142" version="1" comment="libmysqlclient_r15-x86 is &lt;5.0.96-0.6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145569" version="1" comment="libneon-devel is &lt;0.29.6-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058601" version="1" comment="libnetpbm-devel is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058600" version="1" comment="libnetpbm-devel-32bit is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145570" version="1" comment="newt-devel is &lt;0.52.10-1.35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145571" version="1" comment="newt-static is &lt;0.52.10-1.35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107896" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076093" version="1" comment="libotr-devel is &lt;3.2.0-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076437" version="1" comment="libpcp3 is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076443" version="1" comment="pcp is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076438" version="1" comment="pcp-devel is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076439" version="1" comment="pcp-import-iostat2pcp is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076440" version="1" comment="pcp-import-mrtg2pcp is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076441" version="1" comment="pcp-import-sar2pcp is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076442" version="1" comment="pcp-import-sheet2pcp is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076444" version="1" comment="perl-PCP-LogImport is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076445" version="1" comment="perl-PCP-LogSummary is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076446" version="1" comment="perl-PCP-MMV is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076447" version="1" comment="perl-PCP-PMDA is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092701" version="1" comment="libpixman-1-0-devel is &lt;0.24.4-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098836" version="1" comment="libpng-devel is &lt;1.2.31-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098835" version="1" comment="libpng-devel-32bit is &lt;1.2.31-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098773" version="1" comment="libpoppler-devel is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098774" version="1" comment="libpoppler-glib-devel is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098775" version="1" comment="libpoppler-qt2 is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098776" version="1" comment="libpoppler-qt3-devel is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098777" version="1" comment="libpoppler-qt4-devel is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076278" version="1" comment="libproxy-devel is &lt;0.3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145572" version="1" comment="libpulse-devel is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145573" version="1" comment="readline-devel is &lt;5.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145574" version="1" comment="readline-devel-32bit is &lt;5.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102439" version="1" comment="libreoffice is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102366" version="1" comment="libreoffice-base is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102364" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102365" version="1" comment="libreoffice-base-extensions is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102369" version="1" comment="libreoffice-calc is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102368" version="1" comment="libreoffice-calc-extensions is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102371" version="1" comment="libreoffice-draw is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102370" version="1" comment="libreoffice-draw-extensions is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102372" version="1" comment="libreoffice-filters-optional is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102373" version="1" comment="libreoffice-gnome is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102397" version="1" comment="libreoffice-impress is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102396" version="1" comment="libreoffice-impress-extensions is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102399" version="1" comment="libreoffice-kde is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102398" version="1" comment="libreoffice-kde4 is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102421" version="1" comment="libreoffice-l10n-prebuilt is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102431" version="1" comment="libreoffice-mailmerge is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102432" version="1" comment="libreoffice-math is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102433" version="1" comment="libreoffice-mono is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102434" version="1" comment="libreoffice-officebean is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102435" version="1" comment="libreoffice-pyuno is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102436" version="1" comment="libreoffice-sdk is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102438" version="1" comment="libreoffice-writer is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102437" version="1" comment="libreoffice-writer-extensions is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102367" version="1" comment="libreoffice-branding-upstream is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102395" version="1" comment="libreoffice-icon-themes is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102400" version="1" comment="libreoffice-l10n-af is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102401" version="1" comment="libreoffice-l10n-ar is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102402" version="1" comment="libreoffice-l10n-ca is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102403" version="1" comment="libreoffice-l10n-cs is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102404" version="1" comment="libreoffice-l10n-da is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102405" version="1" comment="libreoffice-l10n-de is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102406" version="1" comment="libreoffice-l10n-el is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102407" version="1" comment="libreoffice-l10n-en-GB is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102408" version="1" comment="libreoffice-l10n-es is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102409" version="1" comment="libreoffice-l10n-fi is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102410" version="1" comment="libreoffice-l10n-fr is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102411" version="1" comment="libreoffice-l10n-gu-IN is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102412" version="1" comment="libreoffice-l10n-hi-IN is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102413" version="1" comment="libreoffice-l10n-hu is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102414" version="1" comment="libreoffice-l10n-it is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102415" version="1" comment="libreoffice-l10n-ja is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102416" version="1" comment="libreoffice-l10n-ko is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102417" version="1" comment="libreoffice-l10n-nb is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102418" version="1" comment="libreoffice-l10n-nl is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102419" version="1" comment="libreoffice-l10n-nn is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102420" version="1" comment="libreoffice-l10n-pl is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102423" version="1" comment="libreoffice-l10n-pt is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102422" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102424" version="1" comment="libreoffice-l10n-ru is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102425" version="1" comment="libreoffice-l10n-sk is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102426" version="1" comment="libreoffice-l10n-sv is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102427" version="1" comment="libreoffice-l10n-xh is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102428" version="1" comment="libreoffice-l10n-zh-CN is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102429" version="1" comment="libreoffice-l10n-zh-TW is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102430" version="1" comment="libreoffice-l10n-zu is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102374" version="1" comment="libreoffice-help-cs is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102375" version="1" comment="libreoffice-help-da is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102376" version="1" comment="libreoffice-help-de is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102377" version="1" comment="libreoffice-help-en-GB is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102378" version="1" comment="libreoffice-help-en-US is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102379" version="1" comment="libreoffice-help-es is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102380" version="1" comment="libreoffice-help-fr is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102381" version="1" comment="libreoffice-help-gu-IN is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102382" version="1" comment="libreoffice-help-hi-IN is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102383" version="1" comment="libreoffice-help-hu is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102384" version="1" comment="libreoffice-help-it is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102385" version="1" comment="libreoffice-help-ja is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102386" version="1" comment="libreoffice-help-ko is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102387" version="1" comment="libreoffice-help-nl is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102388" version="1" comment="libreoffice-help-pl is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102390" version="1" comment="libreoffice-help-pt is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102389" version="1" comment="libreoffice-help-pt-BR is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102391" version="1" comment="libreoffice-help-ru is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102392" version="1" comment="libreoffice-help-sv is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102393" version="1" comment="libreoffice-help-zh-CN is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102394" version="1" comment="libreoffice-help-zh-TW is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073546" version="1" comment="libreoffice-testtool is &lt;3.4.5.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070840" version="1" comment="librsvg-devel is &lt;2.26.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145575" version="1" comment="libsamplerate-devel is &lt;0.1.4-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065586" version="1" comment="libsmi is &lt;0.4.5-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105657" version="1" comment="libsndfile-devel is &lt;1.0.20-2.6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100015" version="1" comment="net-snmp-devel is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100014" version="1" comment="net-snmp-devel-32bit is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145576" version="1" comment="libsoup-devel is &lt;2.32.2-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145577" version="1" comment="libsoup-devel-32bit is &lt;2.32.2-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098837" version="1" comment="libssh2 is &lt;0.2-5.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108440" version="1" comment="libssh2-1-32bit is &lt;1.2.9-4.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108441" version="1" comment="libssh2-1-x86 is &lt;1.2.9-4.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108443" version="1" comment="libssh2-devel is &lt;1.2.9-4.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145578" version="1" comment="libsss_idmap-devel is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145579" version="1" comment="libsss_sudo-devel is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109682" version="1" comment="libtasn1-devel is &lt;1.5-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145580" version="1" comment="libthai is &lt;0.1.9-9.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145581" version="1" comment="libthai-devel is &lt;0.1.9-9.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091282" version="1" comment="libtiff-devel is &lt;3.8.2-141.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091281" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145582" version="1" comment="libtirpc-devel is &lt;0.2.1-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145583" version="1" comment="libtunepimp is &lt;0.5.3-126.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145584" version="1" comment="libtunepimp-devel is &lt;0.5.3-126.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145585" version="1" comment="libtunepimp5 is &lt;0.5.3-126.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075501" version="1" comment="nut-cgi is &lt;2.6.2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075502" version="1" comment="nut-devel is &lt;2.6.2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145586" version="1" comment="libvirt-devel is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145587" version="1" comment="libvirt-devel-32bit is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073167" version="1" comment="libvorbis-devel is &lt;1.2.0-79.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145588" version="1" comment="libwebkit-1_0-1 is &lt;1.0.1-0.1.141" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145589" version="1" comment="libwebkit-1_0-2 is &lt;1.2.7-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145590" version="1" comment="libwebkit-devel is &lt;1.2.7-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145591" version="1" comment="libwebkit-lang is &lt;1.2.7-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052853" version="1" comment="libwmf is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052847" version="1" comment="libwmf-32bit is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052848" version="1" comment="libwmf-devel is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052851" version="1" comment="libwmf-gnome is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052849" version="1" comment="libwmf-gnome-32bit is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052850" version="1" comment="libwmf-gnome-x86 is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052852" version="1" comment="libwmf-x86 is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145592" version="1" comment="libwpd-0_8-8 is &lt;0.8.14-4.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145593" version="1" comment="libwpd-devel is &lt;0.8.14-4.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145594" version="1" comment="libwpd-devel-doc is &lt;0.8.14-4.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101878" version="1" comment="libwsman-devel is &lt;2.2.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101879" version="1" comment="openwsman-python is &lt;2.2.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070142" version="1" comment="libxcrypt-devel is &lt;3.0.3-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145595" version="1" comment="libxine-devel is &lt;1.1.15-23.3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145596" version="1" comment="libxine1 is &lt;1.1.15-23.3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145597" version="1" comment="libxine1-32bit is &lt;1.1.15-23.3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145598" version="1" comment="libxine1-gnome-vfs is &lt;1.1.15-23.3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145599" version="1" comment="libxine1-pulse is &lt;1.1.15-23.3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145600" version="1" comment="libxml is &lt;1.8.17-481.19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054822" version="1" comment="libxml-32bit is &lt;1.8.17-481.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145601" version="1" comment="libxml-devel is &lt;1.8.17-481.19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101773" version="1" comment="libxml2-devel is &lt;2.7.6-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101772" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091336" version="1" comment="libxslt-devel is &lt;1.1.24-19.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091335" version="1" comment="libxslt-devel-32bit is &lt;1.1.24-19.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105487" version="1" comment="libyaml-devel is &lt;0.1.3-0.10.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098929" version="1" comment="lighttpd is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098923" version="1" comment="lighttpd-mod_cml is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098924" version="1" comment="lighttpd-mod_magnet is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098925" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098926" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098927" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098928" version="1" comment="lighttpd-mod_webdav is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145602" version="1" comment="lxc-devel is &lt;0.8.0-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145603" version="1" comment="lynx is &lt;2.8.6-143.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098943" version="1" comment="lzo-devel is &lt;2.03-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098942" version="1" comment="lzo-devel-32bit is &lt;2.03-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060499" version="1" comment="memcached is &lt;1.2.6-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109208" version="1" comment="mercurial is &lt;2.3.2-0.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101255" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107498" version="1" comment="mozilla-nss-devel is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073046" version="1" comment="mozilla-xulrunner192-devel is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073047" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073053" version="1" comment="mozilla-xulrunner192-translations-32bit is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098907" version="1" comment="nagios-devel is &lt;3.0.6-1.25.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145604" version="1" comment="netatalk is &lt;2.0.3-249.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145605" version="1" comment="netatalk-devel is &lt;2.0.3-249.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052958" version="1" comment="novell-ipsec-tools is &lt;0.7.1-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052957" version="1" comment="novell-ipsec-tools-devel is &lt;0.7.1-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145606" version="1" comment="obex-data-server is &lt;0.4.6-2.7.90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145607" version="1" comment="ofed-devel is &lt;1.5.4.1-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145608" version="1" comment="openCryptoki-devel is &lt;3.2-0.11.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109619" version="1" comment="openldap2-back-perl is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109621" version="1" comment="openldap2-devel is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109620" version="1" comment="openldap2-devel-32bit is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065557" version="1" comment="opensc-devel is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109697" version="1" comment="openslp-devel is &lt;1.2.0-172.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145609" version="1" comment="osc is &lt;0.139.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145610" version="1" comment="pam-devel is &lt;1.1.5-0.15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145611" version="1" comment="pam-devel-32bit is &lt;1.1.5-0.15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066427" version="1" comment="pango-devel is &lt;1.26.2-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066426" version="1" comment="pango-devel-32bit is &lt;1.26.2-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065698" version="1" comment="pcsc-lite-devel is &lt;1.4.102-1.37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074786" version="1" comment="perl-DBD-Pg is &lt;2.10.3-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145612" version="1" comment="perl-Tk-devel is &lt;804.028-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145613" version="1" comment="perl-base-32bit is &lt;5.10.0-64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110212" version="1" comment="php53-devel is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110213" version="1" comment="php53-imap is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110214" version="1" comment="php53-posix is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110215" version="1" comment="php53-readline is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110216" version="1" comment="php53-sockets is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110217" version="1" comment="php53-sqlite is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110218" version="1" comment="php53-tidy is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145614" version="1" comment="popt-devel is &lt;1.7-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145615" version="1" comment="popt-devel-32bit is &lt;1.7-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145616" version="1" comment="rpm-devel is &lt;4.4.2.3-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145617" version="1" comment="rpm-devel-32bit is &lt;4.4.2.3-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145618" version="1" comment="postgresql-devel is &lt;8.3.23-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145619" version="1" comment="postgresql94-devel is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099942" version="1" comment="ppp-devel is &lt;2.4.5.git-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093472" version="1" comment="pwlib is &lt;1.10.10-120.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093471" version="1" comment="pwlib-devel is &lt;1.10.10-120.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107377" version="1" comment="python-crypto is &lt;2.0.1-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145620" version="1" comment="python-devel is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098909" version="1" comment="python-imaging-sane is &lt;1.1.6-168.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093641" version="1" comment="python-logilab-common is &lt;0.56.2-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100969" version="1" comment="python-lxml-doc is &lt;2.3.6-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145621" version="1" comment="python-setuptools is &lt;0.6c11-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075758" version="1" comment="qemu is &lt;0.10.1-0.5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145622" version="1" comment="qt3-devel is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145623" version="1" comment="qt3-devel-32bit is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145624" version="1" comment="qt3-devel-doc is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145625" version="1" comment="qt3-devel-tools is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145626" version="1" comment="qt3-devel-tools-32bit is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090611" version="1" comment="quagga-devel is &lt;0.99.15-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105480" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105482" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105483" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105484" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145627" version="1" comment="rubygem-actionmailer-3_2 is &lt;3.2.12-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145628" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145629" version="1" comment="rubygem-activemodel-3_2 is &lt;3.2.12-0.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145630" version="1" comment="rubygem-activeresource-3_2 is &lt;3.2.12-0.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145631" version="1" comment="rubygem-rails-3_2 is &lt;3.2.12-0.5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145632" version="1" comment="rubygem-railties-3_2 is &lt;3.2.12-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145633" version="1" comment="rubygem-activerecord-3_2 is &lt;3.2.12-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116288" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109143" version="1" comment="rubygem-bundler is &lt;1.7.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094589" version="1" comment="rubygem-i18n-0_6 is &lt;0.6.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077065" version="1" comment="rubygem-json_pure is &lt;1.2.0-0.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077210" version="1" comment="rubygem-rack-1_4 is &lt;1.4.5-0.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098930" version="1" comment="rubygem-rack-ssl is &lt;1.3.2-0.12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076717" version="1" comment="rubygem-rdoc is &lt;3.9.1-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145634" version="1" comment="rubygem-sprockets-2_2 is &lt;2.2.1-0.7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098933" version="1" comment="rxvt-unicode is &lt;9.05-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098941" version="1" comment="sendmail-devel is &lt;8.14.3-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054843" version="1" comment="silc-toolkit is &lt;1.1.7-7.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054842" version="1" comment="silc-toolkit-devel is &lt;1.1.7-7.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109634" version="1" comment="struts is &lt;1.2.9-162.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109632" version="1" comment="struts-javadoc is &lt;1.2.9-162.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109633" version="1" comment="struts-manual is &lt;1.2.9-162.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108673" version="1" comment="subversion is &lt;1.6.17-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108668" version="1" comment="subversion-devel is &lt;1.6.17-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108669" version="1" comment="subversion-perl is &lt;1.6.17-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108670" version="1" comment="subversion-python is &lt;1.6.17-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108671" version="1" comment="subversion-server is &lt;1.6.17-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108672" version="1" comment="subversion-tools is &lt;1.6.17-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074607" version="1" comment="t1lib-devel is &lt;5.1.1-100.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074619" version="1" comment="taglib-devel is &lt;1.5-19.23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077038" version="1" comment="telepathy-gabble is &lt;0.7.10-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145635" version="1" comment="texlive is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145636" version="1" comment="texlive-arab is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145637" version="1" comment="texlive-bin is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145638" version="1" comment="texlive-bin-cjk is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145639" version="1" comment="texlive-bin-devel is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145640" version="1" comment="texlive-bin-dvilj is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145641" version="1" comment="texlive-bin-jadetex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145642" version="1" comment="texlive-bin-latex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145643" version="1" comment="texlive-bin-metapost is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145644" version="1" comment="texlive-bin-musictex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145645" version="1" comment="texlive-bin-omega is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145646" version="1" comment="texlive-bin-tex4ht is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145647" version="1" comment="texlive-bin-tools is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145648" version="1" comment="texlive-bin-xetex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145649" version="1" comment="texlive-bin-xmltex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145650" version="1" comment="texlive-cjk is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145651" version="1" comment="texlive-context is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145652" version="1" comment="texlive-devel is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145653" version="1" comment="texlive-doc is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145654" version="1" comment="texlive-dvilj is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145655" version="1" comment="texlive-jadetex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145656" version="1" comment="texlive-latex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145657" version="1" comment="texlive-latex-doc is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145658" version="1" comment="texlive-metapost is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145659" version="1" comment="texlive-musictex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145660" version="1" comment="texlive-omega is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145661" version="1" comment="texlive-ppower4 is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145662" version="1" comment="texlive-tex4ht is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145663" version="1" comment="texlive-tools is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145664" version="1" comment="texlive-xetex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145665" version="1" comment="texlive-xmltex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145666" version="1" comment="trousers-devel is &lt;0.3.10-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145667" version="1" comment="unixODBC_23-devel is &lt;2.3.1-0.9.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145668" version="1" comment="valgrind is &lt;3.8.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145669" version="1" comment="valgrind-devel is &lt;3.8.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061712" version="1" comment="vte-devel is &lt;0.22.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117365" version="1" comment="wireshark-devel is &lt;1.10.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098849" version="1" comment="xalan-j2-demo is &lt;2.7.0-217.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098850" version="1" comment="xalan-j2-javadoc is &lt;2.7.0-217.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098851" version="1" comment="xalan-j2-manual is &lt;2.7.0-217.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145670" version="1" comment="xen-devel is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108445" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108444" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077487" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077525" version="1" comment="xorg-x11-libX11-devel-32bit is &lt;7.4-5.11.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077747" version="1" comment="xorg-x11-libXext-devel is &lt;7.4-1.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077746" version="1" comment="xorg-x11-libXext-devel-32bit is &lt;7.4-1.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077749" version="1" comment="xorg-x11-libXfixes-devel is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077748" version="1" comment="xorg-x11-libXfixes-devel-32bit is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077510" version="1" comment="xorg-x11-libXp-devel is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077534" version="1" comment="xorg-x11-libXp-devel-32bit is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077753" version="1" comment="xorg-x11-libXrender-devel is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077752" version="1" comment="xorg-x11-libXrender-devel-32bit is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077757" version="1" comment="xorg-x11-libXt-devel is &lt;7.4-1.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077756" version="1" comment="xorg-x11-libXt-devel-32bit is &lt;7.4-1.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077755" version="1" comment="xorg-x11-libXv-devel is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077754" version="1" comment="xorg-x11-libXv-devel-32bit is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145671" version="1" comment="xorg-x11-libxcb-devel is &lt;7.4-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145672" version="1" comment="xorg-x11-libxcb-devel-32bit is &lt;7.4-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110271" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145673" version="1" comment="yast2-core-devel is &lt;2.17.46-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145674" version="1" comment="yast2-devel-doc is &lt;2.17.140-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073773" version="1" comment="sle-sdk-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077179" version="1" comment="ImageMagick is &lt;6.4.3.6-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077192" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077193" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077180" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077183" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077194" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077195" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077532" version="1" comment="Mesa-devel is &lt;7.11.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077531" version="1" comment="Mesa-devel-32bit is &lt;7.11.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090312" version="1" comment="apache2 is &lt;2.2.12-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090313" version="1" comment="apache2-devel is &lt;2.2.12-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090307" version="1" comment="apache2-doc is &lt;2.2.12-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090308" version="1" comment="apache2-example-pages is &lt;2.2.12-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090309" version="1" comment="apache2-prefork is &lt;2.2.12-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090310" version="1" comment="apache2-utils is &lt;2.2.12-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090311" version="1" comment="apache2-worker is &lt;2.2.12-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092775" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111993" version="1" comment="php5 is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092776" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092777" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092778" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092779" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092780" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092781" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092782" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092873" version="1" comment="php5-devel is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092783" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092784" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092785" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092786" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092787" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092788" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092789" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092790" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092791" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092874" version="1" comment="php5-imap is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092792" version="1" comment="php5-json is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092793" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092794" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092795" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092796" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092875" version="1" comment="php5-ncurses is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092797" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092798" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092799" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092800" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092801" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092802" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092876" version="1" comment="php5-posix is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092803" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092877" version="1" comment="php5-readline is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092804" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092805" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092806" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092878" version="1" comment="php5-sockets is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092879" version="1" comment="php5-sqlite is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092807" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092808" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092809" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092810" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092880" version="1" comment="php5-tidy is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092811" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092812" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092813" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092814" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092815" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092816" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092817" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092818" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092881" version="1" comment="php53-devel is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092882" version="1" comment="php53-imap is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092883" version="1" comment="php53-posix is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092884" version="1" comment="php53-readline is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092885" version="1" comment="php53-sockets is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092886" version="1" comment="php53-sqlite is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092887" version="1" comment="php53-tidy is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090372" version="1" comment="apache2-mod_security2 is &lt;2.7.1-0.2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093225" version="1" comment="bind-devel is &lt;9.9.4P2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093224" version="1" comment="bind-devel-32bit is &lt;9.9.4P2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075115" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075117" version="1" comment="mono-core is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075123" version="1" comment="mono-data is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075118" version="1" comment="mono-data-firebird is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075119" version="1" comment="mono-data-oracle is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075120" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075121" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075122" version="1" comment="mono-data-sybase is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075124" version="1" comment="mono-devel is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075125" version="1" comment="mono-extras is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075126" version="1" comment="mono-jscript is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075127" version="1" comment="mono-locale-extras is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075128" version="1" comment="mono-nunit is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075129" version="1" comment="mono-wcf is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075130" version="1" comment="mono-web is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075131" version="1" comment="mono-winforms is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075133" version="1" comment="mono-winfxcore is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075132" version="1" comment="monodoc-core is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092676" version="1" comment="libldb-devel is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092677" version="1" comment="libnetapi-devel is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092678" version="1" comment="libnetapi0 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092679" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092680" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092681" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092682" version="1" comment="libtalloc-devel is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092683" version="1" comment="libtdb-devel is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092684" version="1" comment="libtevent-devel is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092685" version="1" comment="libwbclient-devel is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092686" version="1" comment="samba-devel is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091338" version="1" comment="cups-devel is &lt;1.3.9-8.46.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093223" version="1" comment="libcurl-devel is &lt;7.19.7-1.20.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116192" version="1" comment="dbus-1-devel is &lt;1.2.10-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116193" version="1" comment="dbus-1-devel-doc is &lt;1.2.10-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077066" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.11.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076721" version="1" comment="finch is &lt;2.6.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076743" version="1" comment="finch-devel is &lt;2.6.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076725" version="1" comment="libpurple is &lt;2.6.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076744" version="1" comment="libpurple-devel is &lt;2.6.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076722" version="1" comment="libpurple-lang is &lt;2.6.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076726" version="1" comment="pidgin is &lt;2.6.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076745" version="1" comment="pidgin-devel is &lt;2.6.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116194" version="1" comment="mozilla-nspr-devel is &lt;4.9.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116195" version="1" comment="mozilla-nss-devel is &lt;3.13.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076008" version="1" comment="mozilla-nspr-devel is &lt;4.9.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076123" version="1" comment="mozilla-nss-devel is &lt;3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076344" version="1" comment="mozilla-nspr-devel is &lt;4.9.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076345" version="1" comment="mozilla-nss-devel is &lt;3.14.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076753" version="1" comment="beagle is &lt;0.3.8-56.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076765" version="1" comment="beagle-devel is &lt;0.3.8-56.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076766" version="1" comment="beagle-lang is &lt;0.3.8-56.44.45.129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076767" version="1" comment="mozilla-nspr-devel is &lt;4.9.5-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076768" version="1" comment="mozilla-nss-devel is &lt;3.14.2-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077025" version="1" comment="mozilla-nspr-devel is &lt;4.9.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077026" version="1" comment="mozilla-nss-devel is &lt;3.14.3-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076710" version="1" comment="freeradius-server-devel is &lt;2.1.1-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076705" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076459" version="1" comment="freetype2-devel is &lt;2.3.7-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076474" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076917" version="1" comment="git is &lt;1.7.12.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076909" version="1" comment="git-arch is &lt;1.7.12.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076910" version="1" comment="git-core is &lt;1.7.12.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076911" version="1" comment="git-cvs is &lt;1.7.12.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076912" version="1" comment="git-daemon is &lt;1.7.12.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076913" version="1" comment="git-email is &lt;1.7.12.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076914" version="1" comment="git-gui is &lt;1.7.12.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076915" version="1" comment="git-svn is &lt;1.7.12.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076916" version="1" comment="git-web is &lt;1.7.12.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076918" version="1" comment="gitk is &lt;1.7.12.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091867" version="1" comment="glibc-html is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091869" version="1" comment="glibc-info is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077473" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077474" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077471" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077637" version="1" comment="ibutils is &lt;1.5.4-0.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077636" version="1" comment="ibutils-32bit is &lt;1.5.4-0.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077643" version="1" comment="ibutils-devel is &lt;1.5.4-0.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077642" version="1" comment="ibutils-devel-32bit is &lt;1.5.4-0.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076692" version="1" comment="inkscape is &lt;0.46-62.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076687" version="1" comment="inkscape-extensions-dia is &lt;0.46-62.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076688" version="1" comment="inkscape-extensions-extra is &lt;0.46-62.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076689" version="1" comment="inkscape-extensions-fig is &lt;0.46-62.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076690" version="1" comment="inkscape-extensions-gimp is &lt;0.46-62.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076691" version="1" comment="inkscape-lang is &lt;0.46-62.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075650" version="1" comment="inn is &lt;2.4.2-170.21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075667" version="1" comment="inn-devel is &lt;2.4.2-170.21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076089" version="1" comment="inst-source-utils is &lt;2012.9.13-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077718" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.18-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077719" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.18-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091434" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091441" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091431" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091510" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr6.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091041" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091043" version="1" comment="libkde4-32bit is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091049" version="1" comment="libkde4-devel is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091046" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091050" version="1" comment="libkdecore4-devel is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091973" version="1" comment="krb5-devel is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091972" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091969" version="1" comment="krb5-server is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073966" version="1" comment="libldb-devel is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073967" version="1" comment="libnetapi-devel is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073968" version="1" comment="libnetapi0 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073969" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073970" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073971" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073972" version="1" comment="libtalloc-devel is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073973" version="1" comment="libtdb-devel is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073974" version="1" comment="libtevent-devel is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073975" version="1" comment="libwbclient-devel is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073976" version="1" comment="samba-devel is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076843" version="1" comment="libQtWebKit-devel is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076804" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076837" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076846" version="1" comment="libqt4-devel is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076845" version="1" comment="libqt4-devel-doc is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076844" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076810" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076847" version="1" comment="libqt4-sql-mysql-x86 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076813" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076812" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076848" version="1" comment="libqt4-sql-postgresql-x86 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076814" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076849" version="1" comment="libqt4-sql-sqlite-x86 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076817" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076816" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076850" version="1" comment="libqt4-sql-unixODBC-x86 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076996" version="1" comment="postgresql91-devel is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090230" version="1" comment="libgcrypt-devel is &lt;1.5.0-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090229" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.0-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076519" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076527" version="1" comment="libmysqlclient_r15-x86 is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076944" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092700" version="1" comment="libpixman-1-0-devel is &lt;0.16.0-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076962" version="1" comment="libpoppler-devel is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076963" version="1" comment="libpoppler-glib-devel is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076964" version="1" comment="libpoppler-qt2 is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076965" version="1" comment="libpoppler-qt3-devel is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076966" version="1" comment="libpoppler-qt4-devel is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113144" version="1" comment="libreoffice is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113145" version="1" comment="libreoffice-base is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113146" version="1" comment="libreoffice-base-drivers-postgresql is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113147" version="1" comment="libreoffice-base-extensions is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076009" version="1" comment="libreoffice-branding-upstream is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113148" version="1" comment="libreoffice-calc is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113149" version="1" comment="libreoffice-calc-extensions is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113150" version="1" comment="libreoffice-draw is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113151" version="1" comment="libreoffice-draw-extensions is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113152" version="1" comment="libreoffice-filters-optional is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113153" version="1" comment="libreoffice-gnome is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075930" version="1" comment="libreoffice-help-cs is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075931" version="1" comment="libreoffice-help-da is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075932" version="1" comment="libreoffice-help-de is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075933" version="1" comment="libreoffice-help-en-GB is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075934" version="1" comment="libreoffice-help-en-US is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075935" version="1" comment="libreoffice-help-es is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075936" version="1" comment="libreoffice-help-fr is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075937" version="1" comment="libreoffice-help-gu-IN is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075938" version="1" comment="libreoffice-help-hi-IN is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075939" version="1" comment="libreoffice-help-hu is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075940" version="1" comment="libreoffice-help-it is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075941" version="1" comment="libreoffice-help-ja is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075942" version="1" comment="libreoffice-help-ko is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075943" version="1" comment="libreoffice-help-nl is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075944" version="1" comment="libreoffice-help-pl is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075946" version="1" comment="libreoffice-help-pt is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075945" version="1" comment="libreoffice-help-pt-BR is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075947" version="1" comment="libreoffice-help-ru is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075948" version="1" comment="libreoffice-help-sv is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075949" version="1" comment="libreoffice-help-zh-CN is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075950" version="1" comment="libreoffice-help-zh-TW is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075951" version="1" comment="libreoffice-icon-themes is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113154" version="1" comment="libreoffice-impress is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113155" version="1" comment="libreoffice-impress-extensions is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113156" version="1" comment="libreoffice-kde is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113157" version="1" comment="libreoffice-kde4 is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075952" version="1" comment="libreoffice-l10n-af is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075953" version="1" comment="libreoffice-l10n-ar is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075954" version="1" comment="libreoffice-l10n-ca is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075955" version="1" comment="libreoffice-l10n-cs is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075956" version="1" comment="libreoffice-l10n-da is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075957" version="1" comment="libreoffice-l10n-de is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076010" version="1" comment="libreoffice-l10n-el is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075958" version="1" comment="libreoffice-l10n-en-GB is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075959" version="1" comment="libreoffice-l10n-es is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075960" version="1" comment="libreoffice-l10n-fi is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075961" version="1" comment="libreoffice-l10n-fr is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075962" version="1" comment="libreoffice-l10n-gu-IN is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075963" version="1" comment="libreoffice-l10n-hi-IN is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075964" version="1" comment="libreoffice-l10n-hu is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075965" version="1" comment="libreoffice-l10n-it is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075966" version="1" comment="libreoffice-l10n-ja is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075967" version="1" comment="libreoffice-l10n-ko is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075968" version="1" comment="libreoffice-l10n-nb is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075969" version="1" comment="libreoffice-l10n-nl is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075970" version="1" comment="libreoffice-l10n-nn is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075971" version="1" comment="libreoffice-l10n-pl is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116196" version="1" comment="libreoffice-l10n-prebuilt is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075973" version="1" comment="libreoffice-l10n-pt is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075972" version="1" comment="libreoffice-l10n-pt-BR is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075974" version="1" comment="libreoffice-l10n-ru is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075975" version="1" comment="libreoffice-l10n-sk is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075976" version="1" comment="libreoffice-l10n-sv is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075977" version="1" comment="libreoffice-l10n-xh is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075978" version="1" comment="libreoffice-l10n-zh-CN is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075979" version="1" comment="libreoffice-l10n-zh-TW is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075980" version="1" comment="libreoffice-l10n-zu is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113158" version="1" comment="libreoffice-mailmerge is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113159" version="1" comment="libreoffice-math is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113160" version="1" comment="libreoffice-mono is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113161" version="1" comment="libreoffice-officebean is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113162" version="1" comment="libreoffice-pyuno is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116197" version="1" comment="libreoffice-sdk is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113163" version="1" comment="libreoffice-writer is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113164" version="1" comment="libreoffice-writer-extensions is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074901" version="1" comment="libsoup-devel is &lt;2.32.2-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074900" version="1" comment="libsoup-devel-32bit is &lt;2.32.2-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076082" version="1" comment="libssh2 is &lt;0.2-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091303" version="1" comment="libvirt-devel is &lt;0.9.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091302" version="1" comment="libvirt-devel-32bit is &lt;0.9.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076080" version="1" comment="libvirt-devel is &lt;0.9.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076079" version="1" comment="libvirt-devel-32bit is &lt;0.9.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076137" version="1" comment="libwebkit-1_0-2 is &lt;1.2.7-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076149" version="1" comment="libwebkit-devel is &lt;1.2.7-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076138" version="1" comment="libwebkit-lang is &lt;1.2.7-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093164" version="1" comment="libxml2-devel is &lt;2.7.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093163" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091337" version="1" comment="libxslt-python is &lt;1.1.24-19.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092729" version="1" comment="lighttpd is &lt;1.4.20-2.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092723" version="1" comment="lighttpd-mod_cml is &lt;1.4.20-2.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092724" version="1" comment="lighttpd-mod_magnet is &lt;1.4.20-2.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092725" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.20-2.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092726" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.20-2.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092727" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.20-2.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092728" version="1" comment="lighttpd-mod_webdav is &lt;1.4.20-2.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091413" version="1" comment="mozilla-nspr-devel is &lt;4.10.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091414" version="1" comment="mozilla-nss-devel is &lt;3.15.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093162" version="1" comment="nagios is &lt;3.0.6-1.25.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093166" version="1" comment="nagios-devel is &lt;3.0.6-1.25.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093161" version="1" comment="nagios-www is &lt;3.0.6-1.25.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091794" version="1" comment="mozilla-nspr-devel is &lt;4.10.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091795" version="1" comment="mozilla-nss-devel is &lt;3.15.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116198" version="1" comment="mozilla-nss-devel is &lt;3.15.3.1-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076302" version="1" comment="openCryptoki is &lt;2.4-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076303" version="1" comment="openCryptoki-devel is &lt;2.4-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076788" version="1" comment="perl-base-32bit is &lt;5.10.0-64.61.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076789" version="1" comment="perl-base-x86 is &lt;5.10.0-64.61.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074269" version="1" comment="popt-devel is &lt;1.7-37.50.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074268" version="1" comment="popt-devel-32bit is &lt;1.7-37.50.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074242" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.50.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074271" version="1" comment="rpm-devel is &lt;4.4.2.3-37.50.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074270" version="1" comment="rpm-devel-32bit is &lt;4.4.2.3-37.50.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074243" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.50.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091154" version="1" comment="python-32bit is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091159" version="1" comment="python-demo is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091166" version="1" comment="python-devel is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091160" version="1" comment="python-gdbm is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091161" version="1" comment="python-idle is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091162" version="1" comment="python-tk is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089847" version="1" comment="python-httplib2 is &lt;0.7.4-0.7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090552" version="1" comment="quagga is &lt;0.99.15-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076712" version="1" comment="rubygem-rack-1_3 is &lt;1.3.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076895" version="1" comment="rubygem-rack is &lt;1.1.6-0.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091804" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091801" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091805" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091806" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091807" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091802" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076888" version="1" comment="rubygem-actionmailer-2_3 is &lt;2.3.17-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076889" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076890" version="1" comment="rubygem-activerecord-2_3 is &lt;2.3.17-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076891" version="1" comment="rubygem-activeresource-2_3 is &lt;2.3.17-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076892" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.17-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116199" version="1" comment="rubygem-rails is &lt;2.3.17-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076893" version="1" comment="rubygem-rails-2_3 is &lt;2.3.17-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093165" version="1" comment="rubygem-actionpack-2_1 is &lt;2.1.2-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107491" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-0.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075256" version="1" comment="rubygem-activerecord-2_3 is &lt;2.3.14-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076476" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.14-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093146" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074893" version="1" comment="rubygem-mail-2_3 is &lt;2.3.0-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074894" version="1" comment="rubygem-rack-cache-1_1 is &lt;1.1-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107484" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107485" version="1" comment="rubygem-activerecord-2_3 is &lt;2.3.17-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107486" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.17-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077209" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093108" version="1" comment="subversion is &lt;1.6.17-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093103" version="1" comment="subversion-devel is &lt;1.6.17-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093104" version="1" comment="subversion-perl is &lt;1.6.17-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093105" version="1" comment="subversion-python is &lt;1.6.17-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093106" version="1" comment="subversion-server is &lt;1.6.17-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093107" version="1" comment="subversion-tools is &lt;1.6.17-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093046" version="1" comment="wireshark is &lt;1.8.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093047" version="1" comment="wireshark-devel is &lt;1.8.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076987" version="1" comment="xen-devel is &lt;4.1.4_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075476" version="1" comment="libvirt-devel is &lt;0.9.6-0.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075475" version="1" comment="libvirt-devel-32bit is &lt;0.9.6-0.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075477" version="1" comment="xen-devel is &lt;4.1.2_20-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107396" version="1" comment="xen-devel is &lt;4.1.3_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076030" version="1" comment="xen-devel is &lt;4.1.3_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077485" version="1" comment="xen-devel is &lt;4.1.5_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091505" version="1" comment="xen-devel is &lt;4.1.6_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091937" version="1" comment="xen-devel is &lt;4.1.6_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092888" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.70.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093467" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093466" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077490" version="1" comment="xorg-x11-libXext-devel is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077526" version="1" comment="xorg-x11-libXext-devel-32bit is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077493" version="1" comment="xorg-x11-libXfixes-devel is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077527" version="1" comment="xorg-x11-libXfixes-devel-32bit is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077499" version="1" comment="xorg-x11-libXrender-devel is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077529" version="1" comment="xorg-x11-libXrender-devel-32bit is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077507" version="1" comment="xorg-x11-libXt-devel is &lt;7.4-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077533" version="1" comment="xorg-x11-libXt-devel-32bit is &lt;7.4-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077502" version="1" comment="xorg-x11-libXv-devel is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077530" version="1" comment="xorg-x11-libXv-devel-32bit is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077513" version="1" comment="xorg-x11-libxcb-devel is &lt;7.4-1.22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077535" version="1" comment="xorg-x11-libxcb-devel-32bit is &lt;7.4-1.22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098904" version="1" comment="MozillaFirefox-devel is &lt;24.6.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098905" version="1" comment="mozilla-nspr-devel is &lt;4.10.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098906" version="1" comment="mozilla-nss-devel is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077554" version="1" comment="sle-sdk-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077582" version="1" comment="Mesa-devel is &lt;9.0.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077581" version="1" comment="Mesa-devel-32bit is &lt;9.0.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090791" version="1" comment="MozillaFirefox-devel is &lt;17.0.9esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113528" version="1" comment="MozillaFirefox is &lt;31.8.0esr-0.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116201" version="1" comment="MozillaFirefox-devel is &lt;31.8.0esr-0.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119531" version="1" comment="MozillaFirefox is &lt;38.5.0esr-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119532" version="1" comment="MozillaFirefox-devel is &lt;38.5.0esr-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098900" version="1" comment="MozillaFirefox-devel is &lt;24.5.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098903" version="1" comment="mozilla-nspr-devel is &lt;4.10.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098901" version="1" comment="mozilla-nss-devel is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108674" version="1" comment="MozillaFirefox-devel is &lt;31.6.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111619" version="1" comment="MozillaFirefox is &lt;31.8.0esr-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111621" version="1" comment="MozillaFirefox-devel is &lt;31.8.0esr-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111599" version="1" comment="mozilla-nspr is &lt;4.10.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111601" version="1" comment="mozilla-nspr-devel is &lt;4.10.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111630" version="1" comment="mozilla-nss is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111633" version="1" comment="mozilla-nss-devel is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099256" version="1" comment="apache2 is &lt;2.2.12-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099257" version="1" comment="apache2-devel is &lt;2.2.12-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099251" version="1" comment="apache2-doc is &lt;2.2.12-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099252" version="1" comment="apache2-example-pages is &lt;2.2.12-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099253" version="1" comment="apache2-prefork is &lt;2.2.12-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099254" version="1" comment="apache2-utils is &lt;2.2.12-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099255" version="1" comment="apache2-worker is &lt;2.2.12-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115446" version="1" comment="apache2 is &lt;2.2.12-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116202" version="1" comment="apache2-devel is &lt;2.2.12-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115447" version="1" comment="apache2-doc is &lt;2.2.12-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115448" version="1" comment="apache2-example-pages is &lt;2.2.12-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115449" version="1" comment="apache2-prefork is &lt;2.2.12-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115450" version="1" comment="apache2-utils is &lt;2.2.12-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115451" version="1" comment="apache2-worker is &lt;2.2.12-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101774" version="1" comment="php53-devel is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101775" version="1" comment="php53-imap is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101776" version="1" comment="php53-posix is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101777" version="1" comment="php53-readline is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101778" version="1" comment="php53-sockets is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101779" version="1" comment="php53-sqlite is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101780" version="1" comment="php53-tidy is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115107" version="1" comment="augeas is &lt;0.9.0-3.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116203" version="1" comment="augeas-devel is &lt;0.9.0-3.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100820" version="1" comment="libreadline5 is &lt;5.2-147.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100823" version="1" comment="readline-devel is &lt;5.2-147.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100822" version="1" comment="readline-devel-32bit is &lt;5.2-147.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111608" version="1" comment="bind is &lt;9.9.6P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111610" version="1" comment="bind-devel is &lt;9.9.6P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111617" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114084" version="1" comment="bind is &lt;9.9.6P1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114086" version="1" comment="bind-devel is &lt;9.9.6P1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116204" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119338" version="1" comment="bind is &lt;9.9.6P1-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119339" version="1" comment="bind-devel is &lt;9.9.6P1-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119340" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121664" version="1" comment="bind is &lt;9.9.6P1-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121665" version="1" comment="bind-devel is &lt;9.9.6P1-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121666" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107549" version="1" comment="binutils-devel is &lt;2.23.1-0.23.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107548" version="1" comment="binutils-devel-32bit is &lt;2.23.1-0.23.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107550" version="1" comment="binutils-gold is &lt;2.23.1-0.23.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107551" version="1" comment="cross-ppc-binutils is &lt;2.23.1-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107552" version="1" comment="cross-spu-binutils is &lt;2.23.1-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098856" version="1" comment="libldb-devel is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098857" version="1" comment="libnetapi-devel is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098858" version="1" comment="libnetapi0 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098859" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098860" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098861" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098862" version="1" comment="libtalloc-devel is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098863" version="1" comment="libtdb-devel is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098864" version="1" comment="libtevent-devel is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098865" version="1" comment="libwbclient-devel is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098866" version="1" comment="samba-devel is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099552" version="1" comment="cups-devel is &lt;1.3.9-8.46.52.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098964" version="1" comment="libcurl-devel is &lt;7.19.7-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122351" version="1" comment="curl is &lt;7.19.7-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122352" version="1" comment="libcurl-devel is &lt;7.19.7-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107511" version="1" comment="libcurl-devel is &lt;7.19.7-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122230" version="1" comment="dhcp is &lt;4.2.4.P2-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122231" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113475" version="1" comment="e2fsprogs-devel is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113477" version="1" comment="libblkid-devel is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113476" version="1" comment="libblkid-devel-32bit is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113479" version="1" comment="libcom_err-devel is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113478" version="1" comment="libcom_err-devel-32bit is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113481" version="1" comment="libext2fs-devel is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113480" version="1" comment="libext2fs-devel-32bit is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113482" version="1" comment="libext2fs2-32bit is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113483" version="1" comment="libext2fs2-x86 is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113474" version="1" comment="libuuid-devel is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113484" version="1" comment="libuuid-devel-32bit is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102015" version="1" comment="python-magic is &lt;4.24-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098782" version="1" comment="finch is &lt;2.6.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098781" version="1" comment="finch-devel is &lt;2.6.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098785" version="1" comment="libpurple is &lt;2.6.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098783" version="1" comment="libpurple-devel is &lt;2.6.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098784" version="1" comment="libpurple-lang is &lt;2.6.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098787" version="1" comment="pidgin is &lt;2.6.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098786" version="1" comment="pidgin-devel is &lt;2.6.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077555" version="1" comment="MozillaFirefox-devel is &lt;17.0.7esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091412" version="1" comment="MozillaFirefox-devel is &lt;17.0.10esr-0.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093494" version="1" comment="MozillaFirefox-devel is &lt;24.3.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093495" version="1" comment="mozilla-nss-devel is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098902" version="1" comment="MozillaFirefox-devel is &lt;24.4.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099246" version="1" comment="MozillaFirefox-devel is &lt;24.7.0esr-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099247" version="1" comment="mozilla-nss-devel is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100011" version="1" comment="MozillaFirefox-devel is &lt;24.8.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100012" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100013" version="1" comment="mozilla-nss-devel is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102686" version="1" comment="MozillaFirefox-devel is &lt;31.3.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107497" version="1" comment="MozillaFirefox-devel is &lt;31.4.0esr-0.8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108085" version="1" comment="MozillaFirefox-devel is &lt;31.5.3esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114791" version="1" comment="mozilla-nspr is &lt;4.10.9-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114792" version="1" comment="mozilla-nspr-devel is &lt;4.10.9-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114960" version="1" comment="MozillaFirefox is &lt;38.3.0esr-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116205" version="1" comment="MozillaFirefox-devel is &lt;38.3.0esr-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116206" version="1" comment="MozillaFirefox is &lt;38.4.0esr-25.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116207" version="1" comment="MozillaFirefox-devel is &lt;38.4.0esr-25.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116208" version="1" comment="mozilla-nspr is &lt;4.10.10-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116209" version="1" comment="mozilla-nspr-devel is &lt;4.10.10-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116210" version="1" comment="mozilla-nss is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116211" version="1" comment="mozilla-nss-devel is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092113" version="1" comment="MozillaFirefox-devel is &lt;24.2.0esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092114" version="1" comment="mozilla-nss-devel is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101909" version="1" comment="MozillaFirefox-devel is &lt;31.2.0esr-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101256" version="1" comment="mozilla-nss-devel is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114288" version="1" comment="MozillaFirefox is &lt;38.2.1esr-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116212" version="1" comment="MozillaFirefox-devel is &lt;38.2.1esr-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114295" version="1" comment="mozilla-nss is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116213" version="1" comment="mozilla-nss-devel is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107581" version="1" comment="freetype2-devel is &lt;2.3.7-25.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107580" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121667" version="1" comment="giflib is &lt;4.1.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121668" version="1" comment="giflib-devel is &lt;4.1.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121669" version="1" comment="giflib-devel-32bit is &lt;4.1.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116221" version="1" comment="git is &lt;1.7.12.4-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116222" version="1" comment="git-arch is &lt;1.7.12.4-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116223" version="1" comment="git-core is &lt;1.7.12.4-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116224" version="1" comment="git-cvs is &lt;1.7.12.4-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116225" version="1" comment="git-daemon is &lt;1.7.12.4-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116226" version="1" comment="git-email is &lt;1.7.12.4-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116227" version="1" comment="git-gui is &lt;1.7.12.4-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116228" version="1" comment="git-svn is &lt;1.7.12.4-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116229" version="1" comment="git-web is &lt;1.7.12.4-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116230" version="1" comment="gitk is &lt;1.7.12.4-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100150" version="1" comment="glibc-html is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100152" version="1" comment="glibc-info is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113934" version="1" comment="glibc is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113938" version="1" comment="glibc-html is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113940" version="1" comment="glibc-info is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122353" version="1" comment="glibc is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122354" version="1" comment="glibc-html is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122355" version="1" comment="glibc-info is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098937" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098938" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098742" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114285" version="1" comment="gnutls is &lt;2.4.1-24.39.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116231" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116232" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114298" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119804" version="1" comment="gnutls is &lt;2.4.1-24.39.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119805" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119806" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119807" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115092" version="1" comment="gtk2 is &lt;2.18.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116233" version="1" comment="gtk2-devel is &lt;2.18.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116234" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121161" version="1" comment="gtk2 is &lt;2.18.9-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121162" version="1" comment="gtk2-devel is &lt;2.18.9-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121163" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091200" version="1" comment="libguestfs-devel is &lt;1.20.4-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077639" version="1" comment="ibutils is &lt;1.5.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077638" version="1" comment="ibutils-32bit is &lt;1.5.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077645" version="1" comment="ibutils-devel is &lt;1.5.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077644" version="1" comment="ibutils-devel-32bit is &lt;1.5.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110704" version="1" comment="icu is &lt;4.0-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110705" version="1" comment="libicu-32bit is &lt;4.0-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110707" version="1" comment="libicu-devel is &lt;4.0-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110706" version="1" comment="libicu-devel-32bit is &lt;4.0-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102355" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102353" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102354" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114247" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.7-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114252" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.7-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114249" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.7-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118096" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.15-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118097" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.15-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118098" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.15-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102359" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr8.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113507" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113509" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118311" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.20-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118312" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.20-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107715" version="1" comment="kde4-l10n-de-data is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107716" version="1" comment="kde4-l10n-de-doc is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121509" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121510" version="1" comment="kdebase4-workspace-devel is &lt;4.3.5-0.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117938" version="1" comment="kernel-docs is &lt;3.0.101-0.47.71.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099579" version="1" comment="krb5-devel is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099578" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099575" version="1" comment="krb5-server is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115951" version="1" comment="krb5 is &lt;1.6.3-133.49.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116237" version="1" comment="krb5-devel is &lt;1.6.3-133.49.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116238" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115960" version="1" comment="krb5-server is &lt;1.6.3-133.49.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117939" version="1" comment="krb5 is &lt;1.6.3-133.49.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117940" version="1" comment="krb5-devel is &lt;1.6.3-133.49.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117941" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117942" version="1" comment="krb5-server is &lt;1.6.3-133.49.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101406" version="1" comment="krb5-devel is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101405" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101407" version="1" comment="krb5-server is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111660" version="1" comment="krb5 is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111666" version="1" comment="krb5-devel is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111667" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111668" version="1" comment="krb5-server is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107520" version="1" comment="libvirt-devel is &lt;1.0.5.9-0.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107519" version="1" comment="libvirt-devel-32bit is &lt;1.0.5.9-0.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116239" version="1" comment="liblcms2-devel is &lt;2.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093527" version="1" comment="libQtWebKit-devel is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093509" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093510" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093530" version="1" comment="libqt4-devel is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093529" version="1" comment="libqt4-devel-doc is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093528" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093531" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093532" version="1" comment="libqt4-sql-mysql-x86 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093535" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093533" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093534" version="1" comment="libqt4-sql-postgresql-x86 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093536" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093537" version="1" comment="libqt4-sql-sqlite-x86 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093540" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093538" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093539" version="1" comment="libqt4-sql-unixODBC-x86 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108067" version="1" comment="libblkid-devel is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108066" version="1" comment="libblkid-devel-32bit is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108069" version="1" comment="libuuid-devel is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108068" version="1" comment="libuuid-devel-32bit is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094597" version="1" comment="postgresql91-devel is &lt;9.1.12-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100813" version="1" comment="mozilla-nss-devel is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114501" version="1" comment="libgcrypt is &lt;1.5.0-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116241" version="1" comment="libgcrypt-devel is &lt;1.5.0-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116242" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.0-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117509" version="1" comment="libksba is &lt;1.0.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117510" version="1" comment="libksba-devel is &lt;1.0.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112623" version="1" comment="libmpfr1-32bit is &lt;2.3.2-3.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116245" version="1" comment="libmspack is &lt;0.0.20060920alpha-74.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116246" version="1" comment="libmspack-devel is &lt;0.0.20060920alpha-74.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099923" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.39-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099924" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.39-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099925" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099926" version="1" comment="libmysqlclient_r15-x86 is &lt;5.0.96-0.6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101165" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117943" version="1" comment="libpng-devel is &lt;1.2.31-5.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117944" version="1" comment="libpng-devel-32bit is &lt;1.2.31-5.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117945" version="1" comment="libpng12-0 is &lt;1.2.31-5.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119808" version="1" comment="libpng-devel is &lt;1.2.31-5.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119809" version="1" comment="libpng-devel-32bit is &lt;1.2.31-5.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119810" version="1" comment="libpng12-0 is &lt;1.2.31-5.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099528" version="1" comment="libpulse-devel is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116247" version="1" comment="libQtWebKit-devel is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112908" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112936" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116248" version="1" comment="libqt4-devel is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116249" version="1" comment="libqt4-devel-doc is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116250" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113170" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116251" version="1" comment="libqt4-sql-mysql-x86 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113171" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113172" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116252" version="1" comment="libqt4-sql-postgresql-x86 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113173" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116253" version="1" comment="libqt4-sql-sqlite-x86 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113174" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113175" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116254" version="1" comment="libqt4-sql-unixODBC-x86 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100146" version="1" comment="libreoffice is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100073" version="1" comment="libreoffice-base is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100071" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100072" version="1" comment="libreoffice-base-extensions is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100074" version="1" comment="libreoffice-branding-upstream is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100076" version="1" comment="libreoffice-calc is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100075" version="1" comment="libreoffice-calc-extensions is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100078" version="1" comment="libreoffice-draw is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100077" version="1" comment="libreoffice-draw-extensions is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100079" version="1" comment="libreoffice-filters-optional is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100080" version="1" comment="libreoffice-gnome is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100081" version="1" comment="libreoffice-help-cs is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100082" version="1" comment="libreoffice-help-da is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100083" version="1" comment="libreoffice-help-de is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100084" version="1" comment="libreoffice-help-en-GB is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100085" version="1" comment="libreoffice-help-en-US is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100086" version="1" comment="libreoffice-help-es is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100087" version="1" comment="libreoffice-help-fr is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100088" version="1" comment="libreoffice-help-gu-IN is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100089" version="1" comment="libreoffice-help-hi-IN is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100090" version="1" comment="libreoffice-help-hu is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100091" version="1" comment="libreoffice-help-it is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100092" version="1" comment="libreoffice-help-ja is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100093" version="1" comment="libreoffice-help-ko is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100094" version="1" comment="libreoffice-help-nl is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100095" version="1" comment="libreoffice-help-pl is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100097" version="1" comment="libreoffice-help-pt is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100096" version="1" comment="libreoffice-help-pt-BR is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100098" version="1" comment="libreoffice-help-ru is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100099" version="1" comment="libreoffice-help-sv is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100100" version="1" comment="libreoffice-help-zh-CN is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100101" version="1" comment="libreoffice-help-zh-TW is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100102" version="1" comment="libreoffice-icon-themes is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100104" version="1" comment="libreoffice-impress is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100103" version="1" comment="libreoffice-impress-extensions is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100106" version="1" comment="libreoffice-kde is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100105" version="1" comment="libreoffice-kde4 is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100107" version="1" comment="libreoffice-l10n-af is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100108" version="1" comment="libreoffice-l10n-ar is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100109" version="1" comment="libreoffice-l10n-ca is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100110" version="1" comment="libreoffice-l10n-cs is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100111" version="1" comment="libreoffice-l10n-da is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100112" version="1" comment="libreoffice-l10n-de is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100113" version="1" comment="libreoffice-l10n-el is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100114" version="1" comment="libreoffice-l10n-en-GB is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100115" version="1" comment="libreoffice-l10n-es is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100116" version="1" comment="libreoffice-l10n-fi is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100117" version="1" comment="libreoffice-l10n-fr is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100118" version="1" comment="libreoffice-l10n-gu-IN is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100119" version="1" comment="libreoffice-l10n-hi-IN is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100120" version="1" comment="libreoffice-l10n-hu is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100121" version="1" comment="libreoffice-l10n-it is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100122" version="1" comment="libreoffice-l10n-ja is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100123" version="1" comment="libreoffice-l10n-ko is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100124" version="1" comment="libreoffice-l10n-nb is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100125" version="1" comment="libreoffice-l10n-nl is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100126" version="1" comment="libreoffice-l10n-nn is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100127" version="1" comment="libreoffice-l10n-pl is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100128" version="1" comment="libreoffice-l10n-prebuilt is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100130" version="1" comment="libreoffice-l10n-pt is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100129" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100131" version="1" comment="libreoffice-l10n-ru is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100132" version="1" comment="libreoffice-l10n-sk is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100133" version="1" comment="libreoffice-l10n-sv is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100134" version="1" comment="libreoffice-l10n-xh is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100135" version="1" comment="libreoffice-l10n-zh-CN is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100136" version="1" comment="libreoffice-l10n-zh-TW is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100137" version="1" comment="libreoffice-l10n-zu is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100138" version="1" comment="libreoffice-mailmerge is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100139" version="1" comment="libreoffice-math is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100140" version="1" comment="libreoffice-mono is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100141" version="1" comment="libreoffice-officebean is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100142" version="1" comment="libreoffice-pyuno is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100143" version="1" comment="libreoffice-sdk is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100145" version="1" comment="libreoffice-writer is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100144" version="1" comment="libreoffice-writer-extensions is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115081" version="1" comment="librsvg is &lt;2.26.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116255" version="1" comment="librsvg-devel is &lt;2.26.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116256" version="1" comment="libsndfile is &lt;1.0.20-2.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116257" version="1" comment="libsndfile-devel is &lt;1.0.20-2.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098965" version="1" comment="libtasn1-devel is &lt;1.5-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098826" version="1" comment="libvirt-devel is &lt;1.0.5.9-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098825" version="1" comment="libvirt-devel-32bit is &lt;1.0.5.9-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117511" version="1" comment="LibVNCServer is &lt;0.9.1-156.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117512" version="1" comment="LibVNCServer-devel is &lt;0.9.1-156.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113530" version="1" comment="libwmf is &lt;0.2.8.4-206.29.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116258" version="1" comment="libwmf-32bit is &lt;0.2.8.4-206.29.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116259" version="1" comment="libwmf-devel is &lt;0.2.8.4-206.29.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116260" version="1" comment="libwmf-gnome is &lt;0.2.8.4-206.29.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116261" version="1" comment="libwmf-gnome-32bit is &lt;0.2.8.4-206.29.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116262" version="1" comment="libwmf-gnome-x86 is &lt;0.2.8.4-206.29.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116263" version="1" comment="libwmf-x86 is &lt;0.2.8.4-206.29.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119811" version="1" comment="libxml2 is &lt;2.7.6-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119812" version="1" comment="libxml2-devel is &lt;2.7.6-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119813" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121343" version="1" comment="libxml2 is &lt;2.7.6-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121344" version="1" comment="libxml2-devel is &lt;2.7.6-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121345" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098482" version="1" comment="lxc is &lt;0.8.0-0.21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098824" version="1" comment="lxc-devel is &lt;0.8.0-0.21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115277" version="1" comment="lxc is &lt;0.8.0-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116264" version="1" comment="lxc-devel is &lt;0.8.0-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121803" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121804" version="1" comment="mono-core is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121805" version="1" comment="mono-data is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121806" version="1" comment="mono-data-firebird is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121807" version="1" comment="mono-data-oracle is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121808" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121809" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121810" version="1" comment="mono-data-sybase is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121811" version="1" comment="mono-devel is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121812" version="1" comment="mono-extras is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121813" version="1" comment="mono-jscript is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121814" version="1" comment="mono-locale-extras is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121815" version="1" comment="mono-nunit is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121816" version="1" comment="mono-wcf is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121817" version="1" comment="mono-web is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121818" version="1" comment="mono-winforms is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121819" version="1" comment="mono-winfxcore is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121820" version="1" comment="monodoc-core is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122509" version="1" comment="MozillaFirefox is &lt;38.6.0esr-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122510" version="1" comment="MozillaFirefox-devel is &lt;38.6.0esr-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122511" version="1" comment="mozilla-nss is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122512" version="1" comment="mozilla-nss-devel is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113986" version="1" comment="mozilla-nspr is &lt;4.10.8-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113987" version="1" comment="mozilla-nspr-devel is &lt;4.10.8-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120787" version="1" comment="mozilla-nss is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120788" version="1" comment="mozilla-nss-devel is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091415" version="1" comment="mozilla-nss-devel is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115106" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.45-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115105" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.45-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115099" version="1" comment="mysql is &lt;5.5.45-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118180" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.46-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118181" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.46-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118182" version="1" comment="mysql is &lt;5.5.46-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122356" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.47-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122357" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.47-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122358" version="1" comment="mysql is &lt;5.5.47-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114279" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114281" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116265" version="1" comment="net-snmp-devel is &lt;5.4.2.1-8.12.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116266" version="1" comment="net-snmp-devel-32bit is &lt;5.4.2.1-8.12.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091796" version="1" comment="mozilla-nss-devel is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114132" version="1" comment="openldap2 is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116267" version="1" comment="openldap2-back-perl is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114134" version="1" comment="openldap2-client is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116268" version="1" comment="openldap2-devel is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116269" version="1" comment="openldap2-devel-32bit is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119827" version="1" comment="openldap2 is &lt;2.4.26-0.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119828" version="1" comment="openldap2-back-perl is &lt;2.4.26-0.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119829" version="1" comment="openldap2-client is &lt;2.4.26-0.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119830" version="1" comment="openldap2-devel is &lt;2.4.26-0.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119831" version="1" comment="openldap2-devel-32bit is &lt;2.4.26-0.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118738" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118739" version="1" comment="openssl is &lt;0.9.8j-0.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116270" version="1" comment="osc is &lt;0.152.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098932" version="1" comment="pam-devel is &lt;1.1.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098931" version="1" comment="pam-devel-32bit is &lt;1.1.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116271" version="1" comment="perl-base-32bit is &lt;5.10.0-64.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114005" version="1" comment="php53 is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116272" version="1" comment="php53-devel is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116273" version="1" comment="php53-imap is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116274" version="1" comment="php53-posix is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116275" version="1" comment="php53-readline is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116276" version="1" comment="php53-sockets is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116277" version="1" comment="php53-sqlite is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116278" version="1" comment="php53-tidy is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115152" version="1" comment="php53 is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116279" version="1" comment="php53-devel is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116280" version="1" comment="php53-imap is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116281" version="1" comment="php53-posix is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116282" version="1" comment="php53-readline is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116283" version="1" comment="php53-sockets is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116284" version="1" comment="php53-sqlite is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116285" version="1" comment="php53-tidy is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103181" version="1" comment="popt-devel is &lt;1.7-37.60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103180" version="1" comment="popt-devel-32bit is &lt;1.7-37.60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103182" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103184" version="1" comment="rpm-devel is &lt;4.4.2.3-37.60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103183" version="1" comment="rpm-devel-32bit is &lt;4.4.2.3-37.60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103185" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123270" version="1" comment="postgresql94-devel is &lt;9.4.5-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123271" version="1" comment="postgresql94-libs is &lt;9.4.5-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108213" version="1" comment="postgresql91-devel is &lt;9.1.15-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110597" version="1" comment="postgresql91-devel is &lt;9.1.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121690" version="1" comment="postgresql91-devel is &lt;9.1.19-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121691" version="1" comment="postgresql91-libs is &lt;9.1.19-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102333" version="1" comment="python-32bit is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102334" version="1" comment="python-demo is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102335" version="1" comment="python-devel is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102337" version="1" comment="python-doc is &lt;2.6-8.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102336" version="1" comment="python-doc-pdf is &lt;2.6-8.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102338" version="1" comment="python-gdbm is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102339" version="1" comment="python-idle is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102340" version="1" comment="python-tk is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112676" version="1" comment="python-32bit is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112680" version="1" comment="python-demo is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113176" version="1" comment="python-devel is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112681" version="1" comment="python-doc is &lt;2.6-8.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112682" version="1" comment="python-doc-pdf is &lt;2.6-8.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112683" version="1" comment="python-gdbm is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112684" version="1" comment="python-idle is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112685" version="1" comment="python-tk is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098671" version="1" comment="python-32bit is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098676" version="1" comment="python-demo is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098908" version="1" comment="python-devel is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098678" version="1" comment="python-doc is &lt;2.6-8.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098677" version="1" comment="python-doc-pdf is &lt;2.6-8.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098679" version="1" comment="python-gdbm is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098680" version="1" comment="python-idle is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098681" version="1" comment="python-tk is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099514" version="1" comment="python-32bit is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099519" version="1" comment="python-demo is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099533" version="1" comment="python-devel is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099521" version="1" comment="python-doc is &lt;2.6-8.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099520" version="1" comment="python-doc-pdf is &lt;2.6-8.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099522" version="1" comment="python-gdbm is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099523" version="1" comment="python-idle is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099524" version="1" comment="python-tk is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098793" version="1" comment="python-setuptools is &lt;0.6c8-10.19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114730" version="1" comment="python-setuptools is &lt;0.6c11-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116286" version="1" comment="rubygem-activerecord-2_3 is &lt;2.3.17-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116287" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.17-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098794" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098366" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098795" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098796" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098797" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098367" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098845" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118070" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122427" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116290" version="1" comment="rubygem-mail-2_3 is &lt;2.3.0-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116291" version="1" comment="rubygem-rack is &lt;1.1.6-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116292" version="1" comment="rubygem-rack-1_4 is &lt;1.4.5-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125950" version="1" comment="libldb-devel is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125951" version="1" comment="libnetapi-devel is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125952" version="1" comment="libnetapi0 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125953" version="1" comment="libsmbclient-devel is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125954" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125955" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125956" version="1" comment="libtalloc-devel is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125957" version="1" comment="libtdb-devel is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125958" version="1" comment="libtevent-devel is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125959" version="1" comment="libwbclient-devel is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125960" version="1" comment="samba is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125961" version="1" comment="samba-devel is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125962" version="1" comment="samba-test is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106581" version="1" comment="libldb-devel is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106582" version="1" comment="libnetapi-devel is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106583" version="1" comment="libnetapi0 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106584" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106585" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106586" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106587" version="1" comment="libtalloc-devel is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106588" version="1" comment="libtdb-devel is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106589" version="1" comment="libtevent-devel is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106590" version="1" comment="libwbclient-devel is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106591" version="1" comment="samba-devel is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121346" version="1" comment="libldb-devel is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121347" version="1" comment="libnetapi-devel is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121348" version="1" comment="libnetapi0 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121349" version="1" comment="libsmbclient-devel is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121350" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121351" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121352" version="1" comment="libtalloc-devel is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121353" version="1" comment="libtdb-devel is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121354" version="1" comment="libtevent-devel is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121355" version="1" comment="libwbclient-devel is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121356" version="1" comment="samba is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121357" version="1" comment="samba-devel is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121358" version="1" comment="samba-test is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102689" version="1" comment="gnu-efi is &lt;3.0u-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098848" version="1" comment="struts is &lt;1.2.9-162.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098846" version="1" comment="struts-javadoc is &lt;1.2.9-162.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098847" version="1" comment="struts-manual is &lt;1.2.9-162.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099932" version="1" comment="subversion is &lt;1.6.17-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099927" version="1" comment="subversion-devel is &lt;1.6.17-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099928" version="1" comment="subversion-perl is &lt;1.6.17-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099929" version="1" comment="subversion-python is &lt;1.6.17-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099930" version="1" comment="subversion-server is &lt;1.6.17-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099931" version="1" comment="subversion-tools is &lt;1.6.17-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114303" version="1" comment="libtidy is &lt;1.0-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116293" version="1" comment="libtidy-devel is &lt;1.0-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114304" version="1" comment="tidy is &lt;1.0-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116294" version="1" comment="libtiff-devel is &lt;3.8.2-141.160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116295" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113932" version="1" comment="tiff is &lt;3.8.2-141.160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102352" version="1" comment="wireshark is &lt;1.10.11-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102351" version="1" comment="wireshark-devel is &lt;1.10.11-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114787" version="1" comment="wireshark is &lt;1.12.7-0.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116296" version="1" comment="wireshark-devel is &lt;1.12.7-0.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120995" version="1" comment="wireshark is &lt;1.12.9-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120996" version="1" comment="wireshark-devel is &lt;1.12.9-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109724" version="1" comment="xen-devel is &lt;4.2.5_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103190" version="1" comment="xen-devel is &lt;4.2.5_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114109" version="1" comment="xen is &lt;4.2.5_12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116299" version="1" comment="xen-devel is &lt;4.2.5_12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115412" version="1" comment="xen is &lt;4.2.5_14-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116300" version="1" comment="xen-devel is &lt;4.2.5_14-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089833" version="1" comment="xen-devel is &lt;4.2.2_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091793" version="1" comment="xen-devel is &lt;4.2.3_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092112" version="1" comment="xen-devel is &lt;4.2.3_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094171" version="1" comment="xen-devel is &lt;4.2.4_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101038" version="1" comment="xen-devel is &lt;4.2.4_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108974" version="1" comment="xen-devel is &lt;4.2.5_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110340" version="1" comment="xen-devel is &lt;4.2.5_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118666" version="1" comment="xen is &lt;4.2.5_18-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118667" version="1" comment="xen-devel is &lt;4.2.5_18-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116301" version="1" comment="xfsprogs is &lt;3.1.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116302" version="1" comment="xfsprogs-devel is &lt;3.1.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092730" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098872" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098871" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113218" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116303" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116304" version="1" comment="xorg-x11-libX11-devel-32bit is &lt;7.4-5.11.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155577" version="1" comment="Botan is &lt;1.6.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155578" version="1" comment="libbotan-devel is &lt;1.6.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155621" version="1" comment="Botan is &lt;1.6.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155622" version="1" comment="libbotan-1_6_5 is &lt;1.6.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155623" version="1" comment="libbotan-devel is &lt;1.6.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127454" version="1" comment="GraphicsMagick is &lt;1.2.5-4.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127455" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127456" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128961" version="1" comment="GraphicsMagick is &lt;1.2.5-4.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128962" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128963" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129912" version="1" comment="GraphicsMagick is &lt;1.2.5-4.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129913" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129914" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135265" version="1" comment="GraphicsMagick is &lt;1.2.5-4.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135266" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135267" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135947" version="1" comment="GraphicsMagick is &lt;1.2.5-4.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135948" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135949" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147847" version="1" comment="GraphicsMagick is &lt;1.2.5-4.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147848" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147849" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148682" version="1" comment="GraphicsMagick is &lt;1.2.5-4.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148683" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148684" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150489" version="1" comment="GraphicsMagick is &lt;1.2.5-4.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150490" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150491" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157050" version="1" comment="GraphicsMagick is &lt;1.2.5-4.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157051" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157052" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162275" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162276" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162277" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167027" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167028" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167029" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168925" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168926" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168927" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170047" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170048" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170049" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171118" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171119" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171120" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172283" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172284" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172285" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173018" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173019" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173020" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174129" version="1" comment="GraphicsMagick is &lt;1.2.5-78.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174130" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-78.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174131" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-78.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174721" version="1" comment="GraphicsMagick is &lt;1.2.5-78.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174722" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-78.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174723" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-78.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127457" version="1" comment="ImageMagick is &lt;6.4.3.6-7.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127458" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127459" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127460" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127461" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127462" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127463" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127557" version="1" comment="ImageMagick is &lt;6.4.3.6-7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127558" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127559" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127560" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127561" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127562" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127563" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128964" version="1" comment="ImageMagick is &lt;6.4.3.6-7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128965" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128966" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128967" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128968" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128969" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128970" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129915" version="1" comment="ImageMagick is &lt;6.4.3.6-7.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129916" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129917" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129918" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129919" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129920" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129921" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131967" version="1" comment="ImageMagick is &lt;6.4.3.6-7.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131968" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131969" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131970" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131971" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131972" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131973" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136160" version="1" comment="ImageMagick is &lt;6.4.3.6-7.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136161" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136162" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136163" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136164" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136165" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136166" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145849" version="1" comment="ImageMagick is &lt;6.4.3.6-7.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145850" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145851" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145852" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145853" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145854" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145855" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149081" version="1" comment="ImageMagick is &lt;6.4.3.6-7.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149082" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149083" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149084" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149085" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149086" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149087" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157053" version="1" comment="ImageMagick is &lt;6.4.3.6-7.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157054" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157055" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157056" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157057" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157058" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157059" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161970" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161971" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161972" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161973" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161974" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161975" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161976" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167360" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167361" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167362" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167363" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167364" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167413" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167365" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168735" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168736" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168737" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168738" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168739" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168740" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168741" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169362" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169363" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169364" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169365" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169366" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169367" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169368" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169843" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169844" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169845" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169846" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169847" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169848" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169849" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170879" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170880" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170881" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170882" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170883" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170884" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170885" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172062" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172063" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172064" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172065" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172066" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172067" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172068" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173488" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173489" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173490" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173491" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173492" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173493" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173494" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174178" version="1" comment="ImageMagick is &lt;6.4.3.6-78.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174179" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-78.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174180" version="1" comment="libMagick++-devel is &lt;6.4.3.6-78.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174181" version="1" comment="libMagick++1 is &lt;6.4.3.6-78.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174182" version="1" comment="libMagickWand1 is &lt;6.4.3.6-78.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174183" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-78.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174184" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-78.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146891" version="1" comment="LibVNCServer is &lt;0.9.1-159.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146892" version="1" comment="LibVNCServer-devel is &lt;0.9.1-159.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174185" version="1" comment="LibVNCServer is &lt;0.9.1-160.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174186" version="1" comment="LibVNCServer-devel is &lt;0.9.1-160.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123674" version="1" comment="MozillaFirefox is &lt;38.6.1esr-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123675" version="1" comment="MozillaFirefox-devel is &lt;38.6.1esr-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127922" version="1" comment="MozillaFirefox is &lt;38.8.0esr-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127923" version="1" comment="MozillaFirefox-devel is &lt;38.8.0esr-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127924" version="1" comment="mozilla-nspr is &lt;4.12-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127925" version="1" comment="mozilla-nspr-devel is &lt;4.12-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127926" version="1" comment="mozilla-nss is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127927" version="1" comment="mozilla-nss-devel is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130047" version="1" comment="MozillaFirefox is &lt;45.2.0esr-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130048" version="1" comment="MozillaFirefox-devel is &lt;45.2.0esr-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130049" version="1" comment="firefox-fontconfig is &lt;2.11.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130050" version="1" comment="firefox-fontconfig-devel is &lt;2.11.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130051" version="1" comment="mozilla-nspr is &lt;4.12-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130052" version="1" comment="mozilla-nspr-devel is &lt;4.12-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130053" version="1" comment="mozilla-nss is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130054" version="1" comment="mozilla-nss-devel is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131974" version="1" comment="MozillaFirefox is &lt;45.3.0esr-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131975" version="1" comment="MozillaFirefox-devel is &lt;45.3.0esr-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131976" version="1" comment="MozillaFirefox is &lt;45.4.0esr-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131977" version="1" comment="MozillaFirefox-devel is &lt;45.4.0esr-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144677" version="1" comment="MozillaFirefox is &lt;45.6.0esr-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144678" version="1" comment="MozillaFirefox-devel is &lt;45.6.0esr-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148250" version="1" comment="MozillaFirefox is &lt;45.7.0esr-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148251" version="1" comment="MozillaFirefox-devel is &lt;45.7.0esr-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149642" version="1" comment="MozillaFirefox is &lt;45.8.0esr-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149643" version="1" comment="MozillaFirefox-devel is &lt;45.8.0esr-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155020" version="1" comment="MozillaFirefox is &lt;45.9.0esr-71.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155021" version="1" comment="MozillaFirefox-devel is &lt;45.9.0esr-71.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155022" version="1" comment="mozilla-nspr is &lt;4.13.1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155023" version="1" comment="mozilla-nspr-devel is &lt;4.13.1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155024" version="1" comment="mozilla-nss is &lt;3.29.5-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155025" version="1" comment="mozilla-nss-devel is &lt;3.29.5-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162278" version="1" comment="MozillaFirefox is &lt;52.2.0esr-72.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162279" version="1" comment="MozillaFirefox-devel is &lt;52.2.0esr-72.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162280" version="1" comment="mozilla-nss is &lt;3.29.5-47.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162281" version="1" comment="mozilla-nss-devel is &lt;3.29.5-47.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162540" version="1" comment="MozillaFirefox is &lt;52.3.0esr-72.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162541" version="1" comment="MozillaFirefox-devel is &lt;52.3.0esr-72.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167979" version="1" comment="MozillaFirefox is &lt;52.5.0esr-72.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167980" version="1" comment="MozillaFirefox-devel is &lt;52.5.0esr-72.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170898" version="1" comment="MozillaFirefox is &lt;52.6.0esr-72.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170899" version="1" comment="MozillaFirefox-devel is &lt;52.6.0esr-72.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174300" version="1" comment="MozillaFirefox is &lt;52.7.3esr-72.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174301" version="1" comment="MozillaFirefox-devel is &lt;52.7.3esr-72.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124749" version="1" comment="MozillaFirefox is &lt;38.7.0esr-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124750" version="1" comment="MozillaFirefox-devel is &lt;38.7.0esr-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124751" version="1" comment="mozilla-nspr is &lt;4.12-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124752" version="1" comment="mozilla-nspr-devel is &lt;4.12-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124753" version="1" comment="mozilla-nss is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124754" version="1" comment="mozilla-nss-devel is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172669" version="1" comment="OpenEXR is &lt;1.6.1-83.17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172670" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172671" version="1" comment="OpenEXR-devel is &lt;1.6.1-83.17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113835" version="1" comment="xen is &lt;4.4.2_12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116306" version="1" comment="xen-devel is &lt;4.4.2_12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130453" version="1" comment="apache2 is &lt;2.2.12-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130454" version="1" comment="apache2-devel is &lt;2.2.12-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130455" version="1" comment="apache2-doc is &lt;2.2.12-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130456" version="1" comment="apache2-example-pages is &lt;2.2.12-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130457" version="1" comment="apache2-prefork is &lt;2.2.12-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130458" version="1" comment="apache2-utils is &lt;2.2.12-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130459" version="1" comment="apache2-worker is &lt;2.2.12-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149644" version="1" comment="apache2 is &lt;2.2.12-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149645" version="1" comment="apache2-devel is &lt;2.2.12-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149646" version="1" comment="apache2-doc is &lt;2.2.12-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149647" version="1" comment="apache2-example-pages is &lt;2.2.12-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149648" version="1" comment="apache2-prefork is &lt;2.2.12-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149649" version="1" comment="apache2-utils is &lt;2.2.12-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149650" version="1" comment="apache2-worker is &lt;2.2.12-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159539" version="1" comment="apache2 is &lt;2.2.34-70.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159540" version="1" comment="apache2-devel is &lt;2.2.34-70.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159541" version="1" comment="apache2-doc is &lt;2.2.34-70.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159542" version="1" comment="apache2-example-pages is &lt;2.2.34-70.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159543" version="1" comment="apache2-prefork is &lt;2.2.34-70.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159544" version="1" comment="apache2-utils is &lt;2.2.34-70.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159545" version="1" comment="apache2-worker is &lt;2.2.34-70.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166434" version="1" comment="apache2 is &lt;2.2.34-70.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166435" version="1" comment="apache2-devel is &lt;2.2.34-70.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166436" version="1" comment="apache2-doc is &lt;2.2.34-70.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166437" version="1" comment="apache2-example-pages is &lt;2.2.34-70.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166438" version="1" comment="apache2-prefork is &lt;2.2.34-70.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166439" version="1" comment="apache2-utils is &lt;2.2.34-70.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166440" version="1" comment="apache2-worker is &lt;2.2.34-70.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175117" version="1" comment="apache2 is &lt;2.2.34-70.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175118" version="1" comment="apache2-devel is &lt;2.2.34-70.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175119" version="1" comment="apache2-doc is &lt;2.2.34-70.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175120" version="1" comment="apache2-example-pages is &lt;2.2.34-70.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175121" version="1" comment="apache2-prefork is &lt;2.2.34-70.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175122" version="1" comment="apache2-utils is &lt;2.2.34-70.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175123" version="1" comment="apache2-worker is &lt;2.2.34-70.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130460" version="1" comment="apache2-mod_fcgid is &lt;2.2-31.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155070" version="1" comment="audiofile is &lt;0.2.6-142.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155071" version="1" comment="audiofile-devel is &lt;0.2.6-142.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172863" version="1" comment="augeas is &lt;0.9.0-3.21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172864" version="1" comment="augeas-devel is &lt;0.9.0-3.21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147850" version="1" comment="bash is &lt;3.2-147.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147851" version="1" comment="libreadline5 is &lt;5.2-147.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147852" version="1" comment="readline-devel is &lt;5.2-147.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147853" version="1" comment="readline-devel-32bit is &lt;5.2-147.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155624" version="1" comment="bash is &lt;3.2-147.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155625" version="1" comment="libreadline5 is &lt;5.2-147.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155626" version="1" comment="readline-devel is &lt;5.2-147.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155627" version="1" comment="readline-devel-32bit is &lt;5.2-147.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125041" version="1" comment="bind is &lt;9.9.6P1-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125042" version="1" comment="bind-devel is &lt;9.9.6P1-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125043" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131978" version="1" comment="bind is &lt;9.9.6P1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131979" version="1" comment="bind-devel is &lt;9.9.6P1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131980" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135225" version="1" comment="bind is &lt;9.9.6P1-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135226" version="1" comment="bind-devel is &lt;9.9.6P1-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135227" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146893" version="1" comment="bind is &lt;9.9.6P1-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146894" version="1" comment="bind-devel is &lt;9.9.6P1-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146895" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149112" version="1" comment="bind is &lt;9.9.6P1-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149113" version="1" comment="bind-devel is &lt;9.9.6P1-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149114" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154309" version="1" comment="bind is &lt;9.9.6P1-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154310" version="1" comment="bind-devel is &lt;9.9.6P1-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154311" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154365" version="1" comment="bind is &lt;9.9.6P1-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154366" version="1" comment="bind-devel is &lt;9.9.6P1-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154367" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157746" version="1" comment="bind is &lt;9.9.6P1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157747" version="1" comment="bind-devel is &lt;9.9.6P1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157748" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170900" version="1" comment="bind is &lt;9.9.6P1-0.51.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170901" version="1" comment="bind-devel is &lt;9.9.6P1-0.51.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170902" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.51.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130771" version="1" comment="bsdtar is &lt;2.5.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130772" version="1" comment="libarchive-devel is &lt;2.5.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124483" version="1" comment="bsh2 is &lt;2.0-318.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124484" version="1" comment="bsh2-classgen is &lt;2.0-318.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124485" version="1" comment="bsh2-javadoc is &lt;2.0-318.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169451" version="1" comment="build is &lt;20171128-8.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169452" version="1" comment="osc is &lt;0.162.1-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131981" version="1" comment="cracklib is &lt;2.8.12-56.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131982" version="1" comment="cracklib-devel is &lt;2.8.12-56.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129096" version="1" comment="ctdb is &lt;1.0.114.6-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129097" version="1" comment="ctdb-devel is &lt;1.0.114.6-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131983" version="1" comment="curl is &lt;7.19.7-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131984" version="1" comment="libcurl-devel is &lt;7.19.7-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135234" version="1" comment="curl is &lt;7.19.7-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135235" version="1" comment="libcurl-devel is &lt;7.19.7-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154459" version="1" comment="curl is &lt;7.19.7-1.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154460" version="1" comment="libcurl-devel is &lt;7.19.7-1.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162924" version="1" comment="curl is &lt;7.19.7-1.70.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162925" version="1" comment="libcurl-devel is &lt;7.19.7-1.70.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167432" version="1" comment="curl is &lt;7.19.7-1.70.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167433" version="1" comment="libcurl-devel is &lt;7.19.7-1.70.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170284" version="1" comment="curl is &lt;7.19.7-1.70.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170285" version="1" comment="libcurl-devel is &lt;7.19.7-1.70.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163608" version="1" comment="cvs is &lt;1.12.12-144.23.5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163609" version="1" comment="cvs-doc is &lt;1.12.12-144.23.5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128344" version="1" comment="cyrus-imapd is &lt;2.3.11-60.65.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128345" version="1" comment="cyrus-imapd-devel is &lt;2.3.11-60.65.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128346" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.65.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128347" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.65.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131985" version="1" comment="dhcp is &lt;4.2.4.P2-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131986" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171333" version="1" comment="dhcp is &lt;4.2.4.P2-0.28.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171334" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.28.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173815" version="1" comment="dhcp is &lt;4.2.4.P2-0.28.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173816" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.28.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164512" version="1" comment="emacs is &lt;22.3-42.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164513" version="1" comment="emacs-nox is &lt;22.3-42.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172774" version="1" comment="evince is &lt;2.28.2-0.7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172775" version="1" comment="evince-devel is &lt;2.28.2-0.7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128471" version="1" comment="expat is &lt;2.0.1-88.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128472" version="1" comment="libexpat-devel is &lt;2.0.1-88.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148218" version="1" comment="expat is &lt;2.0.1-88.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148219" version="1" comment="libexpat-devel is &lt;2.0.1-88.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163300" version="1" comment="expat is &lt;2.0.1-88.42.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163301" version="1" comment="libexpat-devel is &lt;2.0.1-88.42.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166143" version="1" comment="MozillaFirefox is &lt;52.4.0esr-72.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166144" version="1" comment="MozillaFirefox-devel is &lt;52.4.0esr-72.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166145" version="1" comment="mozilla-nss is &lt;3.29.5-47.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166146" version="1" comment="mozilla-nss-devel is &lt;3.29.5-47.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131987" version="1" comment="fontconfig is &lt;2.6.0-10.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131988" version="1" comment="fontconfig-devel is &lt;2.6.0-10.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131989" version="1" comment="fontconfig-devel-32bit is &lt;2.6.0-10.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157948" version="1" comment="freeradius-server is &lt;2.1.1-7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157949" version="1" comment="freeradius-server-devel is &lt;2.1.1-7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157950" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162309" version="1" comment="freeradius-server is &lt;2.1.1-7.25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162310" version="1" comment="freeradius-server-devel is &lt;2.1.1-7.25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162311" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126716" version="1" comment="freetype2 is &lt;2.3.7-25.41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126717" version="1" comment="freetype2-devel is &lt;2.3.7-25.41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126718" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171469" version="1" comment="freetype2 is &lt;2.3.7-25.45.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171470" version="1" comment="freetype2-devel is &lt;2.3.7-25.45.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171471" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.45.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174020" version="1" comment="freetype2 is &lt;2.3.7-25.45.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174021" version="1" comment="freetype2-devel is &lt;2.3.7-25.45.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174022" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.45.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170630" version="1" comment="cpp43 is &lt;4.3.4_20091019-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170631" version="1" comment="gcc43 is &lt;4.3.4_20091019-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170632" version="1" comment="gcc43-ada is &lt;4.3.4_20091019-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170633" version="1" comment="gcc43-fortran is &lt;4.3.4_20091019-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170634" version="1" comment="gcc43-fortran-32bit is &lt;4.3.4_20091019-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170635" version="1" comment="gcc43-obj-c++ is &lt;4.3.4_20091019-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170636" version="1" comment="gcc43-objc is &lt;4.3.4_20091019-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170637" version="1" comment="gcc43-objc-32bit is &lt;4.3.4_20091019-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170638" version="1" comment="libada43 is &lt;4.3.4_20091019-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170639" version="1" comment="libobjc43 is &lt;4.3.4_20091019-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170640" version="1" comment="libobjc43-32bit is &lt;4.3.4_20091019-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148054" version="1" comment="cpp48 is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148055" version="1" comment="gcc48 is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148056" version="1" comment="gcc48-32bit is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148057" version="1" comment="gcc48-c++ is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148058" version="1" comment="gcc48-fortran is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148059" version="1" comment="gcc48-fortran-32bit is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148060" version="1" comment="gcc48-info is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148061" version="1" comment="gcc48-locale is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148062" version="1" comment="libasan0 is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148063" version="1" comment="libasan0-32bit is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148064" version="1" comment="libstdc++48-devel is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148065" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163302" version="1" comment="cpp48 is &lt;4.8.5-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163303" version="1" comment="gcc48 is &lt;4.8.5-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163304" version="1" comment="gcc48-32bit is &lt;4.8.5-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163305" version="1" comment="gcc48-c++ is &lt;4.8.5-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163306" version="1" comment="gcc48-fortran is &lt;4.8.5-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163307" version="1" comment="gcc48-fortran-32bit is &lt;4.8.5-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163308" version="1" comment="gcc48-info is &lt;4.8.5-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163309" version="1" comment="gcc48-locale is &lt;4.8.5-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163310" version="1" comment="libasan0 is &lt;4.8.5-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163311" version="1" comment="libasan0-32bit is &lt;4.8.5-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163312" version="1" comment="libstdc++48-devel is &lt;4.8.5-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163313" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125493" version="1" comment="cpp5 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125494" version="1" comment="gcc5 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125495" version="1" comment="gcc5-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125496" version="1" comment="gcc5-c++ is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125497" version="1" comment="gcc5-c++-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125498" version="1" comment="gcc5-fortran is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125499" version="1" comment="gcc5-fortran-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125500" version="1" comment="gcc5-info is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125501" version="1" comment="gcc5-locale is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125502" version="1" comment="libasan2 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125503" version="1" comment="libasan2-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125504" version="1" comment="libatomic1 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125505" version="1" comment="libcilkrts5 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125506" version="1" comment="libcilkrts5-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125507" version="1" comment="libffi-devel-gcc5 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125508" version="1" comment="libffi-devel-gcc5-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125509" version="1" comment="libffi-gcc5 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125510" version="1" comment="libgfortran3 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125511" version="1" comment="libitm1 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125512" version="1" comment="libitm1-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125513" version="1" comment="liblsan0 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125514" version="1" comment="libquadmath0 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125515" version="1" comment="libstdc++6-devel-gcc5 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125516" version="1" comment="libstdc++6-devel-gcc5-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125517" version="1" comment="libtsan0 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125518" version="1" comment="libubsan0 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125519" version="1" comment="libubsan0-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131990" version="1" comment="gd is &lt;2.0.36.RC1-52.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131991" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131992" version="1" comment="gd is &lt;2.0.36.RC1-52.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131993" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145675" version="1" comment="gd is &lt;2.0.36.RC1-52.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145676" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148426" version="1" comment="gd is &lt;2.0.36.RC1-52.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148427" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170286" version="1" comment="gd is &lt;2.0.36.RC1-52.33.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170287" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.33.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135268" version="1" comment="ghostscript-devel is &lt;8.62-32.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135269" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135270" version="1" comment="ghostscript-library is &lt;8.62-32.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135271" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131994" version="1" comment="ghostscript-devel is &lt;8.62-32.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131995" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131996" version="1" comment="ghostscript-library is &lt;8.62-32.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131997" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154948" version="1" comment="ghostscript-devel is &lt;8.62-32.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154949" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154950" version="1" comment="ghostscript-library is &lt;8.62-32.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154951" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155597" version="1" comment="ghostscript-devel is &lt;8.62-32.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155598" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155599" version="1" comment="ghostscript-library is &lt;8.62-32.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155600" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126719" version="1" comment="giflib is &lt;4.1.6-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126720" version="1" comment="giflib-devel is &lt;4.1.6-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126721" version="1" comment="giflib-devel-32bit is &lt;4.1.6-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130463" version="1" comment="gimp is &lt;2.6.2-3.34.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130464" version="1" comment="gimp-devel is &lt;2.6.2-3.34.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130465" version="1" comment="gimp-lang is &lt;2.6.2-3.34.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130466" version="1" comment="gimp-plugins-python is &lt;2.6.2-3.34.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124831" version="1" comment="git is &lt;1.7.12.4-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124832" version="1" comment="git-arch is &lt;1.7.12.4-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124833" version="1" comment="git-core is &lt;1.7.12.4-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124834" version="1" comment="git-cvs is &lt;1.7.12.4-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124835" version="1" comment="git-daemon is &lt;1.7.12.4-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124836" version="1" comment="git-email is &lt;1.7.12.4-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124837" version="1" comment="git-gui is &lt;1.7.12.4-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124838" version="1" comment="git-svn is &lt;1.7.12.4-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124839" version="1" comment="git-web is &lt;1.7.12.4-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124840" version="1" comment="gitk is &lt;1.7.12.4-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156196" version="1" comment="git is &lt;1.7.12.4-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156197" version="1" comment="git-arch is &lt;1.7.12.4-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156198" version="1" comment="git-core is &lt;1.7.12.4-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156199" version="1" comment="git-cvs is &lt;1.7.12.4-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156200" version="1" comment="git-daemon is &lt;1.7.12.4-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156201" version="1" comment="git-email is &lt;1.7.12.4-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156202" version="1" comment="git-gui is &lt;1.7.12.4-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156203" version="1" comment="git-svn is &lt;1.7.12.4-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156204" version="1" comment="git-web is &lt;1.7.12.4-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156205" version="1" comment="gitk is &lt;1.7.12.4-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162208" version="1" comment="git is &lt;1.7.12.4-0.18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162209" version="1" comment="git-arch is &lt;1.7.12.4-0.18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162210" version="1" comment="git-core is &lt;1.7.12.4-0.18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162211" version="1" comment="git-cvs is &lt;1.7.12.4-0.18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162212" version="1" comment="git-daemon is &lt;1.7.12.4-0.18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162213" version="1" comment="git-email is &lt;1.7.12.4-0.18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162214" version="1" comment="git-gui is &lt;1.7.12.4-0.18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162215" version="1" comment="git-svn is &lt;1.7.12.4-0.18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162216" version="1" comment="git-web is &lt;1.7.12.4-0.18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162217" version="1" comment="gitk is &lt;1.7.12.4-0.18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165537" version="1" comment="git is &lt;1.7.12.4-0.18.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165538" version="1" comment="git-arch is &lt;1.7.12.4-0.18.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165539" version="1" comment="git-core is &lt;1.7.12.4-0.18.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165540" version="1" comment="git-cvs is &lt;1.7.12.4-0.18.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165541" version="1" comment="git-daemon is &lt;1.7.12.4-0.18.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165542" version="1" comment="git-email is &lt;1.7.12.4-0.18.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165543" version="1" comment="git-gui is &lt;1.7.12.4-0.18.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165544" version="1" comment="git-svn is &lt;1.7.12.4-0.18.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165545" version="1" comment="git-web is &lt;1.7.12.4-0.18.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165546" version="1" comment="gitk is &lt;1.7.12.4-0.18.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131998" version="1" comment="glibc is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131999" version="1" comment="glibc-html is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132000" version="1" comment="glibc-info is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157120" version="1" comment="glibc is &lt;2.11.3-17.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157121" version="1" comment="glibc-html is &lt;2.11.3-17.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157122" version="1" comment="glibc-info is &lt;2.11.3-17.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169553" version="1" comment="glibc is &lt;2.11.3-17.110.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169554" version="1" comment="glibc-html is &lt;2.11.3-17.110.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169555" version="1" comment="glibc-info is &lt;2.11.3-17.110.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172591" version="1" comment="glibc is &lt;2.11.3-17.110.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172592" version="1" comment="glibc-html is &lt;2.11.3-17.110.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172593" version="1" comment="glibc-info is &lt;2.11.3-17.110.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174187" version="1" comment="glibc is &lt;2.11.3-17.110.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174188" version="1" comment="glibc-html is &lt;2.11.3-17.110.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174189" version="1" comment="glibc-info is &lt;2.11.3-17.110.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147854" version="1" comment="gnutls is &lt;2.4.1-24.39.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147855" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147856" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147857" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158867" version="1" comment="gnutls is &lt;2.4.1-24.39.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158868" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158869" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158870" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147775" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147776" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132001" version="1" comment="gtk2 is &lt;2.18.9-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132002" version="1" comment="gtk2-devel is &lt;2.18.9-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132003" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171472" version="1" comment="gtk2 is &lt;2.18.9-0.45.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171473" version="1" comment="gtk2-devel is &lt;2.18.9-0.45.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171474" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.45.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148163" version="1" comment="guile is &lt;1.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148164" version="1" comment="guile-devel is &lt;1.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115112" version="1" comment="icu is &lt;4.0-7.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115116" version="1" comment="libicu-32bit is &lt;4.0-7.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116307" version="1" comment="libicu-devel is &lt;4.0-7.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116308" version="1" comment="libicu-devel-32bit is &lt;4.0-7.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126437" version="1" comment="icu is &lt;4.0-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126438" version="1" comment="libicu-32bit is &lt;4.0-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126439" version="1" comment="libicu-devel is &lt;4.0-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126440" version="1" comment="libicu-devel-32bit is &lt;4.0-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147458" version="1" comment="icu is &lt;4.0-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147459" version="1" comment="libicu-32bit is &lt;4.0-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147460" version="1" comment="libicu-devel is &lt;4.0-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147461" version="1" comment="libicu-devel-32bit is &lt;4.0-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148462" version="1" comment="icu is &lt;4.0-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148463" version="1" comment="libicu-32bit is &lt;4.0-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148464" version="1" comment="libicu-devel is &lt;4.0-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148465" version="1" comment="libicu-devel-32bit is &lt;4.0-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128394" version="1" comment="imlib2 is &lt;1.4.2-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128395" version="1" comment="imlib2-devel is &lt;1.4.2-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128396" version="1" comment="imlib2-filters is &lt;1.4.2-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128397" version="1" comment="imlib2-loaders is &lt;1.4.2-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135430" version="1" comment="jasper is &lt;1.900.14-134.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135431" version="1" comment="libjasper-devel is &lt;1.900.14-134.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150582" version="1" comment="jasper is &lt;1.900.14-134.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150583" version="1" comment="libjasper-devel is &lt;1.900.14-134.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158915" version="1" comment="jasper is &lt;1.900.14-134.33.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158916" version="1" comment="libjasper-devel is &lt;1.900.14-134.33.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113214" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116309" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118313" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118314" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122513" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.30-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122514" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.30-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127564" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.40-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127565" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.40-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136684" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.60-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136685" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.60-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149651" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149652" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155721" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.5-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155722" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.5-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162456" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.10-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162457" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.10-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168928" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.15-26.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168929" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.15-26.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172763" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.20-26.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172764" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.20-26.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132004" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.50-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132005" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.50-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132006" version="1" comment="kernel-docs is &lt;3.0.101-80.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136294" version="1" comment="kernel-docs is &lt;3.0.101-88.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148271" version="1" comment="kernel-docs is &lt;3.0.101-94.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150492" version="1" comment="kernel-docs is &lt;3.0.101-97.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157170" version="1" comment="kernel-docs is &lt;3.0.101-104.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163363" version="1" comment="kernel-docs is &lt;3.0.101-108.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165547" version="1" comment="kernel-docs is &lt;3.0.101-108.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116310" version="1" comment="kernel-docs is &lt;3.0.101-65.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125520" version="1" comment="kernel-docs is &lt;3.0.101-71.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168208" version="1" comment="kernel-docs is &lt;3.0.101-108.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169100" version="1" comment="kernel-docs is &lt;3.0.101-108.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169850" version="1" comment="kernel-docs is &lt;3.0.101-108.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172492" version="1" comment="kernel-docs is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118621" version="1" comment="kernel-docs is &lt;3.0.101-68.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129234" version="1" comment="kernel-docs is &lt;3.0.101-77.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132007" version="1" comment="kernel-docs is &lt;3.0.101-84.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157367" version="1" comment="kernel-docs is &lt;3.0.101-107.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164547" version="1" comment="kernel-docs is &lt;3.0.101-108.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175124" version="1" comment="kernel-docs is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122515" version="1" comment="krb5 is &lt;1.6.3-133.49.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122516" version="1" comment="krb5-devel is &lt;1.6.3-133.49.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122517" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122518" version="1" comment="krb5-server is &lt;1.6.3-133.49.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126441" version="1" comment="krb5 is &lt;1.6.3-133.49.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126442" version="1" comment="krb5-devel is &lt;1.6.3-133.49.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126443" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126444" version="1" comment="krb5-server is &lt;1.6.3-133.49.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174132" version="1" comment="krb5 is &lt;1.6.3-133.49.113.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174133" version="1" comment="krb5-devel is &lt;1.6.3-133.49.113.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174134" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.113.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174135" version="1" comment="krb5-server is &lt;1.6.3-133.49.113.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170641" version="1" comment="libapr-util1 is &lt;1.3.4-12.22.23.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170642" version="1" comment="libapr-util1-devel is &lt;1.3.4-12.22.23.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170643" version="1" comment="libapr-util1-devel-32bit is &lt;1.3.4-12.22.23.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148066" version="1" comment="libcap-ng is &lt;0.6.3-1.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148067" version="1" comment="libcap-ng-devel is &lt;0.6.3-1.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148068" version="1" comment="python-capng is &lt;0.6.3-1.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146083" version="1" comment="libcares-devel is &lt;1.7.4-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146084" version="1" comment="libcares2 is &lt;1.7.4-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171121" version="1" comment="libdb-4_5 is &lt;4.5.20-97.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171122" version="1" comment="libdb-4_5-devel is &lt;4.5.20-97.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171123" version="1" comment="libdb_java-4_5 is &lt;4.5.20-97.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170644" version="1" comment="libevent is &lt;1.4.5-24.24.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170645" version="1" comment="libevent-devel is &lt;1.4.5-24.24.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170050" version="1" comment="libexif is &lt;0.6.17-2.14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170051" version="1" comment="libexif-devel is &lt;0.6.17-2.14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132008" version="1" comment="libgcrypt is &lt;1.5.0-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132009" version="1" comment="libgcrypt-devel is &lt;1.5.0-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132010" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.0-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158002" version="1" comment="libgcrypt is &lt;1.5.0-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158003" version="1" comment="libgcrypt-devel is &lt;1.5.0-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158004" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.0-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169851" version="1" comment="libical is &lt;0.43-1.10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169852" version="1" comment="libical-devel is &lt;0.43-1.10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169853" version="1" comment="libical0-32bit is &lt;0.43-1.10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173168" version="1" comment="libid3tag is &lt;0.15.1b-132.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173169" version="1" comment="libid3tag-devel is &lt;0.15.1b-132.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132011" version="1" comment="libidn is &lt;1.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132012" version="1" comment="libidn-devel is &lt;1.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174277" version="1" comment="libidn is &lt;1.10-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174278" version="1" comment="libidn-devel is &lt;1.10-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128473" version="1" comment="libksba is &lt;1.0.4-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128474" version="1" comment="libksba-devel is &lt;1.0.4-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155072" version="1" comment="libosip2 is &lt;3.1.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155073" version="1" comment="libosip2-devel is &lt;3.1.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124486" version="1" comment="libotr is &lt;3.2.0-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124487" version="1" comment="libotr-devel is &lt;3.2.0-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150326" version="1" comment="libpng-devel is &lt;1.2.31-5.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150327" version="1" comment="libpng-devel-32bit is &lt;1.2.31-5.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150328" version="1" comment="libpng12-0 is &lt;1.2.31-5.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149422" version="1" comment="libquicktime is &lt;1.0.3-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149423" version="1" comment="libquicktime-devel is &lt;1.0.3-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159546" version="1" comment="libquicktime is &lt;1.0.3-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159547" version="1" comment="libquicktime-devel is &lt;1.0.3-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118388" version="1" comment="google-carlito-fonts is &lt;1.1.03.beta1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121850" version="1" comment="hyphen is &lt;2.8.8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121851" version="1" comment="hyphen-devel is &lt;2.8.8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121852" version="1" comment="libhyphen0 is &lt;2.8.8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118389" version="1" comment="libmythes-1_2-0 is &lt;1.2.4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121853" version="1" comment="libreoffice is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121854" version="1" comment="libreoffice-base is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121855" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121856" version="1" comment="libreoffice-branding-upstream is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121857" version="1" comment="libreoffice-calc is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121858" version="1" comment="libreoffice-calc-extensions is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121859" version="1" comment="libreoffice-draw is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121860" version="1" comment="libreoffice-filters-optional is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121861" version="1" comment="libreoffice-gnome is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122063" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121862" version="1" comment="libreoffice-icon-theme-tango is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121863" version="1" comment="libreoffice-impress is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121864" version="1" comment="libreoffice-kde4 is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121865" version="1" comment="libreoffice-l10n-af is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121866" version="1" comment="libreoffice-l10n-ar is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121867" version="1" comment="libreoffice-l10n-ca is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121868" version="1" comment="libreoffice-l10n-cs is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121869" version="1" comment="libreoffice-l10n-da is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121870" version="1" comment="libreoffice-l10n-de is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121871" version="1" comment="libreoffice-l10n-en is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121872" version="1" comment="libreoffice-l10n-es is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121873" version="1" comment="libreoffice-l10n-fi is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121874" version="1" comment="libreoffice-l10n-fr is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121875" version="1" comment="libreoffice-l10n-gu is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121876" version="1" comment="libreoffice-l10n-hi is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121877" version="1" comment="libreoffice-l10n-hu is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121878" version="1" comment="libreoffice-l10n-it is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121879" version="1" comment="libreoffice-l10n-ja is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121880" version="1" comment="libreoffice-l10n-ko is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121881" version="1" comment="libreoffice-l10n-nb is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121882" version="1" comment="libreoffice-l10n-nl is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121883" version="1" comment="libreoffice-l10n-nn is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121884" version="1" comment="libreoffice-l10n-pl is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121885" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121886" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121887" version="1" comment="libreoffice-l10n-ru is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121888" version="1" comment="libreoffice-l10n-sk is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121889" version="1" comment="libreoffice-l10n-sv is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121890" version="1" comment="libreoffice-l10n-xh is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121891" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121892" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121893" version="1" comment="libreoffice-l10n-zu is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121894" version="1" comment="libreoffice-mailmerge is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121895" version="1" comment="libreoffice-math is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121896" version="1" comment="libreoffice-officebean is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121897" version="1" comment="libreoffice-pyuno is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121898" version="1" comment="libreoffice-sdk is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121899" version="1" comment="libreoffice-voikko is &lt;4.1-2.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121900" version="1" comment="libreoffice-writer is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121901" version="1" comment="libreoffice-writer-extensions is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119448" version="1" comment="libvoikko is &lt;3.7.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119449" version="1" comment="libvoikko-devel is &lt;3.7.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119450" version="1" comment="libvoikko1 is &lt;3.7.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118391" version="1" comment="myspell-af_NA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118392" version="1" comment="myspell-af_ZA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118395" version="1" comment="myspell-ar is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118396" version="1" comment="myspell-ar_AE is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118397" version="1" comment="myspell-ar_BH is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118398" version="1" comment="myspell-ar_DZ is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118399" version="1" comment="myspell-ar_EG is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118400" version="1" comment="myspell-ar_IQ is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118401" version="1" comment="myspell-ar_JO is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118402" version="1" comment="myspell-ar_KW is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118403" version="1" comment="myspell-ar_LB is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118404" version="1" comment="myspell-ar_LY is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118405" version="1" comment="myspell-ar_MA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118406" version="1" comment="myspell-ar_OM is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118407" version="1" comment="myspell-ar_QA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118408" version="1" comment="myspell-ar_SA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118409" version="1" comment="myspell-ar_SD is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118410" version="1" comment="myspell-ar_SY is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118411" version="1" comment="myspell-ar_TN is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118412" version="1" comment="myspell-ar_YE is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118413" version="1" comment="myspell-be_BY is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118414" version="1" comment="myspell-bg_BG is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118415" version="1" comment="myspell-bn_BD is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118416" version="1" comment="myspell-bn_IN is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118418" version="1" comment="myspell-bs is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118419" version="1" comment="myspell-bs_BA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118420" version="1" comment="myspell-ca is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118421" version="1" comment="myspell-ca_AD is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118422" version="1" comment="myspell-ca_ES is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118423" version="1" comment="myspell-ca_ES_valencia is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118424" version="1" comment="myspell-ca_FR is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118425" version="1" comment="myspell-ca_IT is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118426" version="1" comment="myspell-cs_CZ is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118427" version="1" comment="myspell-da_DK is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118428" version="1" comment="myspell-de is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118429" version="1" comment="myspell-de_AT is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118430" version="1" comment="myspell-de_CH is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118431" version="1" comment="myspell-de_DE is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118432" version="1" comment="myspell-dictionaries is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118433" version="1" comment="myspell-el_GR is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118434" version="1" comment="myspell-en is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118435" version="1" comment="myspell-en_AU is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118436" version="1" comment="myspell-en_BS is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118437" version="1" comment="myspell-en_BZ is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118438" version="1" comment="myspell-en_CA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118439" version="1" comment="myspell-en_GB is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118440" version="1" comment="myspell-en_GH is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118441" version="1" comment="myspell-en_IE is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118442" version="1" comment="myspell-en_IN is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118443" version="1" comment="myspell-en_JM is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118444" version="1" comment="myspell-en_MW is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118445" version="1" comment="myspell-en_NA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118446" version="1" comment="myspell-en_NZ is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118447" version="1" comment="myspell-en_PH is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118448" version="1" comment="myspell-en_TT is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118449" version="1" comment="myspell-en_US is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118450" version="1" comment="myspell-en_ZA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118451" version="1" comment="myspell-en_ZW is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118452" version="1" comment="myspell-es is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118453" version="1" comment="myspell-es_AR is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118454" version="1" comment="myspell-es_BO is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118455" version="1" comment="myspell-es_CL is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118456" version="1" comment="myspell-es_CO is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118457" version="1" comment="myspell-es_CR is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118458" version="1" comment="myspell-es_CU is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118459" version="1" comment="myspell-es_DO is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118460" version="1" comment="myspell-es_EC is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118461" version="1" comment="myspell-es_ES is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118462" version="1" comment="myspell-es_GT is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118463" version="1" comment="myspell-es_HN is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118464" version="1" comment="myspell-es_MX is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118465" version="1" comment="myspell-es_NI is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118466" version="1" comment="myspell-es_PA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118467" version="1" comment="myspell-es_PE is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118468" version="1" comment="myspell-es_PR is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118469" version="1" comment="myspell-es_PY is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118470" version="1" comment="myspell-es_SV is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118471" version="1" comment="myspell-es_UY is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118472" version="1" comment="myspell-es_VE is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118473" version="1" comment="myspell-et_EE is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118474" version="1" comment="myspell-fr_BE is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118475" version="1" comment="myspell-fr_CA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118476" version="1" comment="myspell-fr_CH is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118477" version="1" comment="myspell-fr_FR is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118478" version="1" comment="myspell-fr_LU is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118479" version="1" comment="myspell-fr_MC is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118483" version="1" comment="myspell-gu_IN is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118484" version="1" comment="myspell-he_IL is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118485" version="1" comment="myspell-hi_IN is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118486" version="1" comment="myspell-hr_HR is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118487" version="1" comment="myspell-hu_HU is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118490" version="1" comment="myspell-it_IT is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118494" version="1" comment="myspell-lightproof-en is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118495" version="1" comment="myspell-lightproof-hu_HU is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118496" version="1" comment="myspell-lightproof-pt_BR is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118497" version="1" comment="myspell-lightproof-ru_RU is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118498" version="1" comment="myspell-lo_LA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118499" version="1" comment="myspell-lt_LT is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118500" version="1" comment="myspell-lv_LV is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118501" version="1" comment="myspell-nb_NO is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118503" version="1" comment="myspell-nl_BE is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118504" version="1" comment="myspell-nl_NL is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118505" version="1" comment="myspell-nn_NO is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118506" version="1" comment="myspell-no is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118508" version="1" comment="myspell-pl_PL is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118509" version="1" comment="myspell-pt_AO is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118510" version="1" comment="myspell-pt_BR is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118511" version="1" comment="myspell-pt_PT is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118512" version="1" comment="myspell-ro is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118513" version="1" comment="myspell-ro_RO is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118514" version="1" comment="myspell-ru_RU is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118516" version="1" comment="myspell-sk_SK is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118517" version="1" comment="myspell-sl_SI is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118518" version="1" comment="myspell-sr is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118519" version="1" comment="myspell-sr_CS is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118520" version="1" comment="myspell-sr_Latn_CS is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118521" version="1" comment="myspell-sr_Latn_RS is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118522" version="1" comment="myspell-sr_RS is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118523" version="1" comment="myspell-sv_FI is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118524" version="1" comment="myspell-sv_SE is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118526" version="1" comment="myspell-te is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118527" version="1" comment="myspell-te_IN is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118528" version="1" comment="myspell-th_TH is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118530" version="1" comment="myspell-vi is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118531" version="1" comment="myspell-vi_VN is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118532" version="1" comment="myspell-zu_ZA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118533" version="1" comment="mythes is &lt;1.2.4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121902" version="1" comment="mythes-devel is &lt;1.2.4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118534" version="1" comment="python-importlib is &lt;1.0.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154461" version="1" comment="libsamplerate is &lt;0.1.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154462" version="1" comment="libsamplerate-devel is &lt;0.1.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154463" version="1" comment="libsndfile is &lt;1.0.20-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154464" version="1" comment="libsndfile-devel is &lt;1.0.20-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155291" version="1" comment="libsndfile is &lt;1.0.20-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155292" version="1" comment="libsndfile-devel is &lt;1.0.20-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170886" version="1" comment="libsndfile is &lt;1.0.20-2.19.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170887" version="1" comment="libsndfile-devel is &lt;1.0.20-2.19.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123882" version="1" comment="libssh is &lt;0.2-5.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123883" version="1" comment="libssh-devel is &lt;0.2-5.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123884" version="1" comment="libssh-devel-doc is &lt;0.2-5.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123885" version="1" comment="libssh2 is &lt;0.2-5.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124617" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124618" version="1" comment="libssh2-1-32bit is &lt;1.2.9-4.2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124619" version="1" comment="libssh2-1-x86 is &lt;1.2.9-4.2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124620" version="1" comment="libssh2-devel is &lt;1.2.9-4.2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124621" version="1" comment="libssh2_org is &lt;1.2.9-4.2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156324" version="1" comment="libtirpc is &lt;0.2.1-1.12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156325" version="1" comment="libtirpc-devel is &lt;0.2.1-1.12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125645" version="1" comment="libvirt is &lt;1.2.5-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125646" version="1" comment="libvirt-devel is &lt;1.2.5-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125647" version="1" comment="libvirt-devel-32bit is &lt;1.2.5-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130779" version="1" comment="libvirt is &lt;1.2.5-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130780" version="1" comment="libvirt-devel is &lt;1.2.5-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130781" version="1" comment="libvirt-devel-32bit is &lt;1.2.5-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165087" version="1" comment="libvirt is &lt;1.2.5-23.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165088" version="1" comment="libvirt-devel is &lt;1.2.5-23.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165089" version="1" comment="libvirt-devel-32bit is &lt;1.2.5-23.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174023" version="1" comment="libvirt is &lt;1.2.5-23.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174024" version="1" comment="libvirt-devel is &lt;1.2.5-23.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174025" version="1" comment="libvirt-devel-32bit is &lt;1.2.5-23.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169101" version="1" comment="libvorbis is &lt;1.2.0-79.20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169102" version="1" comment="libvorbis-devel is &lt;1.2.0-79.20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173644" version="1" comment="libvorbis is &lt;1.2.0-79.20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173645" version="1" comment="libvorbis-devel is &lt;1.2.0-79.20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127087" version="1" comment="libxml2 is &lt;2.7.6-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127088" version="1" comment="libxml2-devel is &lt;2.7.6-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127089" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128971" version="1" comment="libxml2 is &lt;2.7.6-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128972" version="1" comment="libxml2-devel is &lt;2.7.6-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128973" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132013" version="1" comment="libxml2 is &lt;2.7.6-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132014" version="1" comment="libxml2-devel is &lt;2.7.6-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132015" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146979" version="1" comment="libxml2 is &lt;2.7.6-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146980" version="1" comment="libxml2-devel is &lt;2.7.6-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146981" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156777" version="1" comment="libxml2 is &lt;2.7.6-0.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156778" version="1" comment="libxml2-devel is &lt;2.7.6-0.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156779" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158381" version="1" comment="libxml2 is &lt;2.7.6-0.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158382" version="1" comment="libxml2-devel is &lt;2.7.6-0.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158383" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161631" version="1" comment="libxml2 is &lt;2.7.6-0.77.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161632" version="1" comment="libxml2-devel is &lt;2.7.6-0.77.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161633" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.77.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171018" version="1" comment="libxml2 is &lt;2.7.6-0.77.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171019" version="1" comment="libxml2-devel is &lt;2.7.6-0.77.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171020" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.77.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155424" version="1" comment="libxslt is &lt;1.1.24-19.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155425" version="1" comment="libxslt-devel is &lt;1.1.24-19.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155426" version="1" comment="libxslt-devel-32bit is &lt;1.1.24-19.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155427" version="1" comment="libxslt-python is &lt;1.1.24-19.33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149653" version="1" comment="lighttpd is &lt;1.4.20-2.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149654" version="1" comment="lighttpd-mod_cml is &lt;1.4.20-2.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149655" version="1" comment="lighttpd-mod_magnet is &lt;1.4.20-2.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149656" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.20-2.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149657" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.20-2.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149658" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.20-2.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149659" version="1" comment="lighttpd-mod_webdav is &lt;1.4.20-2.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144568" version="1" comment="kernel-docs is &lt;3.0.101-91.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155428" version="1" comment="kernel-docs is &lt;3.0.101-100.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149126" version="1" comment="lynx is &lt;2.8.6-145.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167434" version="1" comment="lynx is &lt;2.8.6-146.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125963" version="1" comment="mercurial is &lt;2.3.2-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128192" version="1" comment="mercurial is &lt;2.3.2-0.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156780" version="1" comment="mercurial is &lt;2.3.2-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162316" version="1" comment="mercurial is &lt;2.3.2-0.18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169854" version="1" comment="mercurial is &lt;2.3.2-0.18.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142221" version="1" comment="MozillaFirefox is &lt;45.5.1esr-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142222" version="1" comment="MozillaFirefox-devel is &lt;45.5.1esr-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142223" version="1" comment="mozilla-nss is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142224" version="1" comment="mozilla-nss-devel is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136167" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136168" version="1" comment="mono-core is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136169" version="1" comment="mono-data is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136170" version="1" comment="mono-data-firebird is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136171" version="1" comment="mono-data-oracle is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136172" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136173" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136174" version="1" comment="mono-data-sybase is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136175" version="1" comment="mono-devel is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136176" version="1" comment="mono-extras is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136177" version="1" comment="mono-jscript is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136178" version="1" comment="mono-locale-extras is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136179" version="1" comment="mono-nunit is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136180" version="1" comment="mono-wcf is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136181" version="1" comment="mono-web is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136182" version="1" comment="mono-winforms is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136183" version="1" comment="mono-winfxcore is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136184" version="1" comment="monodoc-core is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167030" version="1" comment="libmxml1 is &lt;2.5-24.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167031" version="1" comment="mxml is &lt;2.5-24.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127464" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.49-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127465" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.49-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127466" version="1" comment="mysql is &lt;5.5.49-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128974" version="1" comment="libmysqlclient-devel is &lt;5.0.96-0.8.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128975" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.8.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128976" version="1" comment="libmysqlclient_r15-x86 is &lt;5.0.96-0.8.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128977" version="1" comment="mysql is &lt;5.0.96-0.8.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132016" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.52-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132017" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.52-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132018" version="1" comment="mysql is &lt;5.5.52-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135503" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.53-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135504" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.53-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135505" version="1" comment="mysql is &lt;5.5.53-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148165" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.54-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148166" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.54-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148167" version="1" comment="mysql is &lt;5.5.54-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154810" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.55-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154811" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.55-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154812" version="1" comment="mysql is &lt;5.5.55-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162458" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.57-0.39.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162459" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.57-0.39.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162460" version="1" comment="mysql is &lt;5.5.57-0.39.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166791" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.58-0.39.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166792" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.58-0.39.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166793" version="1" comment="mysql is &lt;5.5.58-0.39.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171215" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.59-0.39.9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171216" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.59-0.39.9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171217" version="1" comment="mysql is &lt;5.5.59-0.39.9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161450" version="1" comment="nasm is &lt;2.03.90-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158005" version="1" comment="ncurses is &lt;5.6-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158006" version="1" comment="ncurses-devel is &lt;5.6-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158007" version="1" comment="ncurses-devel-32bit is &lt;5.6-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158008" version="1" comment="tack is &lt;5.6-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161554" version="1" comment="ncurses is &lt;5.6-93.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161555" version="1" comment="ncurses-devel is &lt;5.6-93.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161556" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161557" version="1" comment="tack is &lt;5.6-93.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167435" version="1" comment="ncurses is &lt;5.6-93.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167436" version="1" comment="ncurses-devel is &lt;5.6-93.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167437" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167438" version="1" comment="tack is &lt;5.6-93.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169978" version="1" comment="ncurses is &lt;5.6-93.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169979" version="1" comment="ncurses-devel is &lt;5.6-93.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169980" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169981" version="1" comment="tack is &lt;5.6-93.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156811" version="1" comment="libnetpbm-devel is &lt;10.26.44-101.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156812" version="1" comment="libnetpbm-devel-32bit is &lt;10.26.44-101.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156813" version="1" comment="netpbm is &lt;10.26.44-101.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128916" version="1" comment="libtasn1 is &lt;1.5-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128917" version="1" comment="libtasn1-devel is &lt;1.5-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132019" version="1" comment="ocaml is &lt;4.02.1-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132020" version="1" comment="ocaml-compiler-libs is &lt;4.02.1-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132021" version="1" comment="ocaml-runtime is &lt;4.02.1-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175125" version="1" comment="ocaml is &lt;4.02.1-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175126" version="1" comment="ocaml-compiler-libs is &lt;4.02.1-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175127" version="1" comment="ocaml-runtime is &lt;4.02.1-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123886" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123887" version="1" comment="openssl is &lt;0.9.8j-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127535" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127536" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127537" version="1" comment="openssl is &lt;0.9.8j-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132022" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132023" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132024" version="1" comment="openssl is &lt;0.9.8j-0.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149088" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149089" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149090" version="1" comment="openssl is &lt;0.9.8j-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174530" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174531" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.106.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174532" version="1" comment="openssl is &lt;0.9.8j-0.106.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129098" version="1" comment="pam is &lt;1.1.5-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129099" version="1" comment="pam-devel is &lt;1.1.5-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129100" version="1" comment="pam-devel-32bit is &lt;1.1.5-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132025" version="1" comment="perl is &lt;5.10.0-64.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132026" version="1" comment="perl-base-32bit is &lt;5.10.0-64.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166697" version="1" comment="perl is &lt;5.10.0-64.81.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166698" version="1" comment="perl-base-32bit is &lt;5.10.0-64.81.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174533" version="1" comment="perl is &lt;5.10.0-64.81.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174534" version="1" comment="perl-base-32bit is &lt;5.10.0-64.81.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146314" version="1" comment="perl-DBD-mysql is &lt;4.008-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146978" version="1" comment="perl-DBD-mysql is &lt;4.008-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136686" version="1" comment="perl-SOAP-Lite is &lt;0.710.08-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126722" version="1" comment="php53 is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126723" version="1" comment="php53-devel is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126724" version="1" comment="php53-imap is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126725" version="1" comment="php53-posix is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126726" version="1" comment="php53-readline is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126727" version="1" comment="php53-sockets is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126728" version="1" comment="php53-sqlite is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126729" version="1" comment="php53-tidy is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127602" version="1" comment="php53 is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127603" version="1" comment="php53-devel is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127604" version="1" comment="php53-imap is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127605" version="1" comment="php53-posix is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127606" version="1" comment="php53-readline is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127607" version="1" comment="php53-sockets is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127608" version="1" comment="php53-sqlite is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127609" version="1" comment="php53-tidy is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128818" version="1" comment="php53 is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128819" version="1" comment="php53-devel is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128820" version="1" comment="php53-imap is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128821" version="1" comment="php53-posix is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128822" version="1" comment="php53-readline is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128823" version="1" comment="php53-sockets is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128824" version="1" comment="php53-sqlite is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128825" version="1" comment="php53-tidy is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132027" version="1" comment="php53 is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132028" version="1" comment="php53-devel is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132029" version="1" comment="php53-imap is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132030" version="1" comment="php53-posix is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132031" version="1" comment="php53-readline is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132032" version="1" comment="php53-sockets is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132033" version="1" comment="php53-sqlite is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132034" version="1" comment="php53-tidy is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132035" version="1" comment="php53 is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132036" version="1" comment="php53-devel is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132037" version="1" comment="php53-imap is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132038" version="1" comment="php53-posix is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132039" version="1" comment="php53-readline is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132040" version="1" comment="php53-sockets is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132041" version="1" comment="php53-sqlite is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132042" version="1" comment="php53-tidy is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132043" version="1" comment="php53 is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132044" version="1" comment="php53-devel is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132045" version="1" comment="php53-imap is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132046" version="1" comment="php53-posix is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132047" version="1" comment="php53-readline is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132048" version="1" comment="php53-sockets is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132049" version="1" comment="php53-sqlite is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132050" version="1" comment="php53-tidy is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132051" version="1" comment="php53 is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132052" version="1" comment="php53-devel is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132053" version="1" comment="php53-imap is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132054" version="1" comment="php53-posix is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132055" version="1" comment="php53-readline is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132056" version="1" comment="php53-sockets is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132057" version="1" comment="php53-sqlite is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132058" version="1" comment="php53-tidy is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146896" version="1" comment="php53 is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146897" version="1" comment="php53-devel is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146898" version="1" comment="php53-imap is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146899" version="1" comment="php53-posix is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146900" version="1" comment="php53-readline is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146901" version="1" comment="php53-sockets is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146902" version="1" comment="php53-sqlite is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146903" version="1" comment="php53-tidy is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148954" version="1" comment="php53 is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148955" version="1" comment="php53-devel is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148956" version="1" comment="php53-imap is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148957" version="1" comment="php53-posix is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148958" version="1" comment="php53-readline is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148959" version="1" comment="php53-sockets is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148960" version="1" comment="php53-sqlite is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148961" version="1" comment="php53-tidy is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156893" version="1" comment="php53 is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156894" version="1" comment="php53-devel is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156895" version="1" comment="php53-imap is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156896" version="1" comment="php53-posix is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156897" version="1" comment="php53-readline is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156898" version="1" comment="php53-sockets is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156899" version="1" comment="php53-sqlite is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156900" version="1" comment="php53-tidy is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157608" version="1" comment="php53 is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157609" version="1" comment="php53-devel is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157610" version="1" comment="php53-imap is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157611" version="1" comment="php53-posix is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157612" version="1" comment="php53-readline is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157613" version="1" comment="php53-sockets is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157614" version="1" comment="php53-sqlite is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157615" version="1" comment="php53-tidy is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164379" version="1" comment="php53 is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164380" version="1" comment="php53-devel is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164381" version="1" comment="php53-imap is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164382" version="1" comment="php53-posix is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164383" version="1" comment="php53-readline is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164384" version="1" comment="php53-sockets is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164385" version="1" comment="php53-sqlite is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164386" version="1" comment="php53-tidy is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168979" version="1" comment="php53 is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168980" version="1" comment="php53-devel is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168981" version="1" comment="php53-imap is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168982" version="1" comment="php53-posix is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168983" version="1" comment="php53-readline is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168984" version="1" comment="php53-sockets is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168985" version="1" comment="php53-sqlite is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168986" version="1" comment="php53-tidy is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173817" version="1" comment="php53 is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173818" version="1" comment="php53-devel is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173819" version="1" comment="php53-imap is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173820" version="1" comment="php53-posix is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173821" version="1" comment="php53-readline is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173822" version="1" comment="php53-sockets is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173823" version="1" comment="php53-sqlite is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173824" version="1" comment="php53-tidy is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132059" version="1" comment="finch is &lt;2.6.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132060" version="1" comment="finch-devel is &lt;2.6.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132061" version="1" comment="libpurple is &lt;2.6.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132062" version="1" comment="libpurple-devel is &lt;2.6.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132063" version="1" comment="libpurple-lang is &lt;2.6.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132064" version="1" comment="pidgin is &lt;2.6.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132065" version="1" comment="pidgin-devel is &lt;2.6.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128647" version="1" comment="libpoppler-devel is &lt;0.12.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128648" version="1" comment="libpoppler-glib-devel is &lt;0.12.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128649" version="1" comment="libpoppler-qt2 is &lt;0.12.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128650" version="1" comment="libpoppler-qt3-devel is &lt;0.12.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128651" version="1" comment="libpoppler-qt4-devel is &lt;0.12.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128652" version="1" comment="poppler is &lt;0.12.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128653" version="1" comment="poppler-tools is &lt;0.12.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124463" version="1" comment="postgresql94-devel is &lt;9.4.6-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124464" version="1" comment="postgresql94-libs is &lt;9.4.6-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132066" version="1" comment="postgresql94-devel is &lt;9.4.9-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132067" version="1" comment="postgresql94-libs is &lt;9.4.9-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157977" version="1" comment="postgresql94-devel is &lt;9.4.12-0.22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157978" version="1" comment="postgresql94-libs is &lt;9.4.12-0.22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162342" version="1" comment="postgresql94-devel is &lt;9.4.13-0.23.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162343" version="1" comment="postgresql94-libs is &lt;9.4.13-0.23.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169556" version="1" comment="postgresql94-devel is &lt;9.4.15-0.23.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169557" version="1" comment="postgresql94-libs is &lt;9.4.15-0.23.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172069" version="1" comment="postgresql94-devel is &lt;9.4.16-0.23.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172070" version="1" comment="postgresql94-libs is &lt;9.4.16-0.23.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173460" version="1" comment="postgresql94-devel is &lt;9.4.17-0.23.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173461" version="1" comment="postgresql94-libs is &lt;9.4.17-0.23.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148466" version="1" comment="ppp is &lt;2.4.5.git-2.31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148467" version="1" comment="ppp-devel is &lt;2.4.5.git-2.31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132068" version="1" comment="python is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132069" version="1" comment="python-32bit is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132070" version="1" comment="python-base is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132071" version="1" comment="python-demo is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132072" version="1" comment="python-devel is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132073" version="1" comment="python-doc is &lt;2.6-8.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132074" version="1" comment="python-doc-pdf is &lt;2.6-8.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132075" version="1" comment="python-gdbm is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132076" version="1" comment="python-idle is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132077" version="1" comment="python-tk is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173495" version="1" comment="python is &lt;2.6.9-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173496" version="1" comment="python-32bit is &lt;2.6.9-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173497" version="1" comment="python-base is &lt;2.6.9-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173498" version="1" comment="python-demo is &lt;2.6.9-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173499" version="1" comment="python-devel is &lt;2.6.9-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173500" version="1" comment="python-doc is &lt;2.6-8.40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173501" version="1" comment="python-doc-pdf is &lt;2.6-8.40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173502" version="1" comment="python-gdbm is &lt;2.6.9-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173503" version="1" comment="python-idle is &lt;2.6.9-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173504" version="1" comment="python-tk is &lt;2.6.9-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125653" version="1" comment="quagga is &lt;0.99.15-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125654" version="1" comment="quagga-devel is &lt;0.99.15-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125679" version="1" comment="quagga is &lt;0.99.15-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125680" version="1" comment="quagga-devel is &lt;0.99.15-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128398" version="1" comment="quagga is &lt;0.99.15-0.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128399" version="1" comment="quagga-devel is &lt;0.99.15-0.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132078" version="1" comment="quagga is &lt;0.99.15-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132079" version="1" comment="quagga-devel is &lt;0.99.15-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171459" version="1" comment="quagga is &lt;0.99.15-0.30.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171460" version="1" comment="quagga-devel is &lt;0.99.15-0.30.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150817" version="1" comment="ruby is &lt;1.8.7.p357-0.9.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150818" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150819" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150820" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150821" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150822" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150823" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122428" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125964" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122429" version="1" comment="rubygem-activerecord-3_2 is &lt;3.2.12-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125965" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121122" version="1" comment="rubygem-mail-2_4 is &lt;2.4.4-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125215" version="1" comment="libldb-devel is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125216" version="1" comment="libnetapi-devel is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125217" version="1" comment="libnetapi0 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125218" version="1" comment="libsmbclient-devel is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125219" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125220" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125221" version="1" comment="libtalloc-devel is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125222" version="1" comment="libtdb-devel is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125223" version="1" comment="libtevent-devel is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125224" version="1" comment="libwbclient-devel is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125225" version="1" comment="samba is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125226" version="1" comment="samba-devel is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125227" version="1" comment="samba-test is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146085" version="1" comment="libldb-devel is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146086" version="1" comment="libnetapi-devel is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146087" version="1" comment="libnetapi0 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146088" version="1" comment="libsmbclient-devel is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146089" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146090" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146091" version="1" comment="libtalloc-devel is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146092" version="1" comment="libtdb-devel is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146093" version="1" comment="libtevent-devel is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146094" version="1" comment="libwbclient-devel is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146095" version="1" comment="samba is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146096" version="1" comment="samba-devel is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146097" version="1" comment="samba-test is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149892" version="1" comment="libldb-devel is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149893" version="1" comment="libnetapi-devel is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149894" version="1" comment="libnetapi0 is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149895" version="1" comment="libsmbclient-devel is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149896" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149897" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149898" version="1" comment="libtalloc-devel is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149899" version="1" comment="libtdb-devel is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149900" version="1" comment="libtevent-devel is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149901" version="1" comment="libwbclient-devel is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149902" version="1" comment="samba is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149903" version="1" comment="samba-devel is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149904" version="1" comment="samba-test is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155090" version="1" comment="libldb-devel is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155091" version="1" comment="libnetapi-devel is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155092" version="1" comment="libnetapi0 is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155093" version="1" comment="libsmbclient-devel is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155094" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155095" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155096" version="1" comment="libtalloc-devel is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155097" version="1" comment="libtdb-devel is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155098" version="1" comment="libtevent-devel is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155099" version="1" comment="libwbclient-devel is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155100" version="1" comment="samba is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155101" version="1" comment="samba-devel is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155102" version="1" comment="samba-test is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155928" version="1" comment="libldb-devel is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155929" version="1" comment="libnetapi-devel is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155930" version="1" comment="libnetapi0 is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155931" version="1" comment="libsmbclient-devel is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155932" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155933" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155934" version="1" comment="libtalloc-devel is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155935" version="1" comment="libtdb-devel is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155936" version="1" comment="libtevent-devel is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155937" version="1" comment="libwbclient-devel is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155938" version="1" comment="samba is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155939" version="1" comment="samba-devel is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155940" version="1" comment="samba-test is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165548" version="1" comment="libldb-devel is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165549" version="1" comment="libnetapi-devel is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165550" version="1" comment="libnetapi0 is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165551" version="1" comment="libsmbclient-devel is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165552" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165553" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165554" version="1" comment="libtalloc-devel is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165555" version="1" comment="libtdb-devel is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165556" version="1" comment="libtevent-devel is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165557" version="1" comment="libwbclient-devel is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165558" version="1" comment="samba is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165559" version="1" comment="samba-devel is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165560" version="1" comment="samba-test is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169103" version="1" comment="libldb-devel is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169104" version="1" comment="libnetapi-devel is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169105" version="1" comment="libnetapi0 is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169106" version="1" comment="libsmbclient-devel is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169107" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169108" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169109" version="1" comment="libtalloc-devel is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169110" version="1" comment="libtdb-devel is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169111" version="1" comment="libtevent-devel is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169112" version="1" comment="libwbclient-devel is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169113" version="1" comment="samba is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169114" version="1" comment="samba-devel is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169115" version="1" comment="samba-test is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173505" version="1" comment="libldb-devel is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173506" version="1" comment="libnetapi-devel is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173507" version="1" comment="libnetapi0 is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173508" version="1" comment="libsmbclient-devel is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173509" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173510" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173511" version="1" comment="libtalloc-devel is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173512" version="1" comment="libtdb-devel is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173513" version="1" comment="libtevent-devel is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173514" version="1" comment="libwbclient-devel is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173515" version="1" comment="samba is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173516" version="1" comment="samba-devel is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173517" version="1" comment="samba-test is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149660" version="1" comment="sane-backends is &lt;1.0.20-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149661" version="1" comment="sane-backends-32bit is &lt;1.0.20-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149662" version="1" comment="sane-backends-autoconfig is &lt;1.0.20-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149663" version="1" comment="sane-backends-x86 is &lt;1.0.20-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127292" version="1" comment="libspice-server-devel is &lt;0.12.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127293" version="1" comment="spice is &lt;0.12.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148168" version="1" comment="libspice-server-devel is &lt;0.12.4-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148169" version="1" comment="spice is &lt;0.12.4-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158443" version="1" comment="libspice-server-devel is &lt;0.12.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158444" version="1" comment="spice is &lt;0.12.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132080" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132081" version="1" comment="sqlite3-devel is &lt;3.7.6.3-1.4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128475" version="1" comment="subversion is &lt;1.6.17-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128476" version="1" comment="subversion-devel is &lt;1.6.17-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128477" version="1" comment="subversion-perl is &lt;1.6.17-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128478" version="1" comment="subversion-python is &lt;1.6.17-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128479" version="1" comment="subversion-server is &lt;1.6.17-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128480" version="1" comment="subversion-tools is &lt;1.6.17-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161909" version="1" comment="subversion is &lt;1.6.17-1.36.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161910" version="1" comment="subversion-devel is &lt;1.6.17-1.36.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161911" version="1" comment="subversion-perl is &lt;1.6.17-1.36.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161912" version="1" comment="subversion-python is &lt;1.6.17-1.36.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161913" version="1" comment="subversion-server is &lt;1.6.17-1.36.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161914" version="1" comment="subversion-tools is &lt;1.6.17-1.36.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122519" version="1" comment="libtiff-devel is &lt;3.8.2-141.163.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122520" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.163.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122521" version="1" comment="tiff is &lt;3.8.2-141.163.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132082" version="1" comment="libtiff-devel is &lt;3.8.2-141.168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132083" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132084" version="1" comment="tiff is &lt;3.8.2-141.168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172705" version="1" comment="wavpack is &lt;4.50.1-1.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172706" version="1" comment="wavpack-devel is &lt;4.50.1-1.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127743" version="1" comment="wireshark is &lt;1.12.11-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127744" version="1" comment="wireshark-devel is &lt;1.12.11-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132085" version="1" comment="wireshark is &lt;1.12.13-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132086" version="1" comment="wireshark-devel is &lt;1.12.13-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155026" version="1" comment="wireshark is &lt;2.0.12-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155027" version="1" comment="wireshark-devel is &lt;2.0.12-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155028" version="1" comment="wireshark-gtk is &lt;2.0.12-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157333" version="1" comment="wireshark is &lt;2.0.13-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157334" version="1" comment="wireshark-devel is &lt;2.0.13-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157335" version="1" comment="wireshark-gtk is &lt;2.0.13-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161396" version="1" comment="wireshark is &lt;2.0.14-40.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161397" version="1" comment="wireshark-devel is &lt;2.0.14-40.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161398" version="1" comment="wireshark-gtk is &lt;2.0.14-40.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169369" version="1" comment="libsmi is &lt;0.4.5-2.7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169370" version="1" comment="libwireshark8 is &lt;2.2.11-40.14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169371" version="1" comment="libwiretap6 is &lt;2.2.11-40.14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169372" version="1" comment="libwscodecs1 is &lt;2.2.11-40.14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169373" version="1" comment="libwsutil7 is &lt;2.2.11-40.14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169374" version="1" comment="portaudio is &lt;19-234.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169375" version="1" comment="portaudio-devel is &lt;19-234.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169376" version="1" comment="wireshark is &lt;2.2.11-40.14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169377" version="1" comment="wireshark-devel is &lt;2.2.11-40.14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169378" version="1" comment="wireshark-gtk is &lt;2.2.11-40.14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169982" version="1" comment="libwireshark8 is &lt;2.2.12-40.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169983" version="1" comment="libwiretap6 is &lt;2.2.12-40.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169984" version="1" comment="libwscodecs1 is &lt;2.2.12-40.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169985" version="1" comment="libwsutil7 is &lt;2.2.12-40.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169986" version="1" comment="wireshark is &lt;2.2.12-40.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169987" version="1" comment="wireshark-devel is &lt;2.2.12-40.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169988" version="1" comment="wireshark-gtk is &lt;2.2.12-40.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174136" version="1" comment="libwireshark8 is &lt;2.2.13-40.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174137" version="1" comment="libwiretap6 is &lt;2.2.13-40.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174138" version="1" comment="libwscodecs1 is &lt;2.2.13-40.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174139" version="1" comment="libwsutil7 is &lt;2.2.13-40.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174140" version="1" comment="wireshark is &lt;2.2.13-40.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174141" version="1" comment="wireshark-devel is &lt;2.2.13-40.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174142" version="1" comment="wireshark-gtk is &lt;2.2.13-40.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174591" version="1" comment="libwireshark8 is &lt;2.2.14-40.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174592" version="1" comment="libwiretap6 is &lt;2.2.14-40.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174593" version="1" comment="libwscodecs1 is &lt;2.2.14-40.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174594" version="1" comment="libwsutil7 is &lt;2.2.14-40.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174595" version="1" comment="wireshark is &lt;2.2.14-40.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174596" version="1" comment="wireshark-devel is &lt;2.2.14-40.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174597" version="1" comment="wireshark-gtk is &lt;2.2.14-40.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111645" version="1" comment="xen is &lt;4.4.2_10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111646" version="1" comment="xen-devel is &lt;4.4.2_10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115962" version="1" comment="xen is &lt;4.4.3_02-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116557" version="1" comment="xen-devel is &lt;4.4.3_02-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125681" version="1" comment="xen is &lt;4.4.4_02-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125682" version="1" comment="xen-devel is &lt;4.4.4_02-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132087" version="1" comment="xen is &lt;4.4.4_07-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132088" version="1" comment="xen-devel is &lt;4.4.4_07-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132089" version="1" comment="xen is &lt;4.4.4_08-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132090" version="1" comment="xen-devel is &lt;4.4.4_08-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143078" version="1" comment="xen is &lt;4.4.4_10-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143079" version="1" comment="xen-devel is &lt;4.4.4_10-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144679" version="1" comment="xen is &lt;4.4.4_12-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144680" version="1" comment="xen-devel is &lt;4.4.4_12-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149426" version="1" comment="xen is &lt;4.4.4_14-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149427" version="1" comment="xen-devel is &lt;4.4.4_14-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154618" version="1" comment="xen is &lt;4.4.4_16-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154619" version="1" comment="xen-devel is &lt;4.4.4_16-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154952" version="1" comment="xen is &lt;4.4.4_18-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154953" version="1" comment="xen-devel is &lt;4.4.4_18-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157951" version="1" comment="xen is &lt;4.4.4_20-60.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157952" version="1" comment="xen-devel is &lt;4.4.4_20-60.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163632" version="1" comment="xen is &lt;4.4.4_22-61.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163633" version="1" comment="xen-devel is &lt;4.4.4_22-61.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165892" version="1" comment="xen is &lt;4.4.4_24-61.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165893" version="1" comment="xen-devel is &lt;4.4.4_24-61.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168013" version="1" comment="xen is &lt;4.4.4_26-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168014" version="1" comment="xen-devel is &lt;4.4.4_26-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172776" version="1" comment="xen is &lt;4.4.4_28-61.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172777" version="1" comment="xen-devel is &lt;4.4.4_28-61.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118668" version="1" comment="xen is &lt;4.4.3_06-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118669" version="1" comment="xen-devel is &lt;4.4.3_06-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165709" version="1" comment="xerces-j2 is &lt;2.8.1-238.29.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165710" version="1" comment="xerces-j2-demo is &lt;2.8.1-238.29.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165711" version="1" comment="xerces-j2-scripts is &lt;2.8.1-238.29.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165712" version="1" comment="xerces-j2-xml-apis is &lt;2.8.1-238.29.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165713" version="1" comment="xerces-j2-xml-resolver is &lt;2.8.1-238.29.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158446" version="1" comment="xorg-x11-libICE is &lt;7.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158447" version="1" comment="xorg-x11-libICE-devel is &lt;7.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158448" version="1" comment="xorg-x11-libICE-devel-32bit is &lt;7.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136687" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136688" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136689" version="1" comment="xorg-x11-libX11-devel-32bit is &lt;7.4-5.11.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149428" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149429" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149430" version="1" comment="xorg-x11-libX11-devel-32bit is &lt;7.4-5.11.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158810" version="1" comment="xorg-x11-libXdmcp is &lt;7.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158811" version="1" comment="xorg-x11-libXdmcp-32bit is &lt;7.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158812" version="1" comment="xorg-x11-libXdmcp-devel is &lt;7.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158813" version="1" comment="xorg-x11-libXdmcp-devel-32bit is &lt;7.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143080" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143081" version="1" comment="xorg-x11-libXfixes-devel is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143082" version="1" comment="xorg-x11-libXfixes-devel-32bit is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148468" version="1" comment="xorg-x11-libXpm is &lt;7.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148469" version="1" comment="xorg-x11-libXpm-devel is &lt;7.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148470" version="1" comment="xorg-x11-libXpm-devel-32bit is &lt;7.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142762" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142763" version="1" comment="xorg-x11-libXrender-devel is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142764" version="1" comment="xorg-x11-libXrender-devel-32bit is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142765" version="1" comment="xorg-x11-libXv is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142766" version="1" comment="xorg-x11-libXv-devel is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142767" version="1" comment="xorg-x11-libXv-devel-32bit is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143083" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143084" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143085" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170288" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.50.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170289" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.50.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170290" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.50.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157783" version="1" comment="xorg-x11-server is &lt;7.4-27.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157784" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158449" version="1" comment="xorg-x11-server is &lt;7.4-27.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158450" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166970" version="1" comment="xorg-x11-server is &lt;7.4-27.122.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166971" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.122.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132091" version="1" comment="yast2-storage is &lt;2.17.161-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132092" version="1" comment="yast2-storage-devel is &lt;2.17.161-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144681" version="1" comment="zlib is &lt;1.2.7-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144682" version="1" comment="zlib-devel is &lt;1.2.7-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144683" version="1" comment="zlib-devel-32bit is &lt;1.2.7-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132093" version="1" comment="curl-openssl1 is &lt;7.19.7-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132094" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132095" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132096" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117400" version="1" comment="sles-release is &gt;=11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135236" version="1" comment="curl-openssl1 is &lt;7.19.7-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135237" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135238" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135239" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154465" version="1" comment="curl-openssl1 is &lt;7.19.7-1.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154466" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154467" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154468" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162926" version="1" comment="curl-openssl1 is &lt;7.19.7-1.70.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162927" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.70.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162928" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.70.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162929" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.70.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167439" version="1" comment="curl-openssl1 is &lt;7.19.7-1.70.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167440" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.70.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167441" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.70.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167442" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.70.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170291" version="1" comment="curl-openssl1 is &lt;7.19.7-1.70.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170292" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.70.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170293" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.70.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107518" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107516" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107517" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101146" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101149" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101147" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101148" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101151" version="1" comment="openssl1 is &lt;1.0.1g-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101150" version="1" comment="openssl1-doc is &lt;1.0.1g-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114126" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114128" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114129" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114127" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109631" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109629" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109630" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119832" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119833" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119834" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119835" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121359" version="1" comment="openssh-openssl1 is &lt;6.6p1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121360" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132097" version="1" comment="openssh-openssl1 is &lt;6.6p1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132098" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157336" version="1" comment="openssh-openssl1 is &lt;6.6p1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157337" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118740" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118741" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118742" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118743" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118744" version="1" comment="openssl1 is &lt;1.0.1g-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118745" version="1" comment="openssl1-doc is &lt;1.0.1g-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123888" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123889" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123890" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123891" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123892" version="1" comment="openssl1 is &lt;1.0.1g-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123893" version="1" comment="openssl1-doc is &lt;1.0.1g-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127090" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127091" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127092" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127093" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127094" version="1" comment="openssl1 is &lt;1.0.1g-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127095" version="1" comment="openssl1-doc is &lt;1.0.1g-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132099" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132100" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132101" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132102" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132103" version="1" comment="openssl1 is &lt;1.0.1g-0.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132104" version="1" comment="openssl1-doc is &lt;1.0.1g-0.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148543" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148544" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148545" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148546" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148547" version="1" comment="openssl1 is &lt;1.0.1g-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148548" version="1" comment="openssl1-doc is &lt;1.0.1g-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166723" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166724" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166725" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166726" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166727" version="1" comment="openssl1 is &lt;1.0.1g-0.58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166728" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174287" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174288" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174289" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174290" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174291" version="1" comment="openssl1 is &lt;1.0.1g-0.58.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174292" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157749" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157750" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167443" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167444" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154342" version="1" comment="sblim-sfcb-openssl1 is &lt;1.3.11-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132105" version="1" comment="wget-openssl1 is &lt;1.11.4-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149833" version="1" comment="wget-openssl1 is &lt;1.11.4-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073771" version="1" comment="sled-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077505" version="1" comment="Mesa is &lt;7.11.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077504" version="1" comment="Mesa-32bit is &lt;7.11.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107483" version="1" comment="MozillaFirefox is &lt;17.0.9esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107482" version="1" comment="MozillaFirefox-translations is &lt;17.0.9esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113125" version="1" comment="acroread is &lt;9.5.5-0.5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113126" version="1" comment="acroread-cmaps is &lt;9.4.6-0.4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113127" version="1" comment="acroread-fonts-ja is &lt;9.4.6-0.4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113128" version="1" comment="acroread-fonts-ko is &lt;9.4.6-0.4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113129" version="1" comment="acroread-fonts-zh_CN is &lt;9.4.6-0.4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113130" version="1" comment="acroread-fonts-zh_TW is &lt;9.4.6-0.4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113131" version="1" comment="acroread_ja is &lt;9.4.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093219" version="1" comment="bind-libs is &lt;9.9.4P2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093217" version="1" comment="bind-libs-32bit is &lt;9.9.4P2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093220" version="1" comment="bind-utils is &lt;9.9.4P2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076206" version="1" comment="bogofilter is &lt;1.1.1-174.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075116" version="1" comment="ibm-data-db2 is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092614" version="1" comment="libldb1 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092687" version="1" comment="libldb1-32bit is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092617" version="1" comment="libsmbclient0 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092615" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092620" version="1" comment="libtalloc1 is &lt;3.4.3-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092618" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092623" version="1" comment="libtalloc2 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092621" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092626" version="1" comment="libtdb1 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092624" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092628" version="1" comment="libtevent0 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092627" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092631" version="1" comment="libwbclient0 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092629" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092642" version="1" comment="samba is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092632" version="1" comment="samba-32bit is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092635" version="1" comment="samba-client is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092633" version="1" comment="samba-client-32bit is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092636" version="1" comment="samba-doc is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092637" version="1" comment="samba-krb-printing is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092640" version="1" comment="samba-winbind is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092638" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073901" version="1" comment="cifs-utils is &lt;5.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077464" version="1" comment="clamav is &lt;0.97.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075544" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075543" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090718" version="1" comment="coreutils is &lt;8.12-6.25.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090716" version="1" comment="coreutils-lang is &lt;8.12-6.25.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091334" version="1" comment="cups is &lt;1.3.9-8.46.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091330" version="1" comment="cups-client is &lt;1.3.9-8.46.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091333" version="1" comment="cups-libs is &lt;1.3.9-8.46.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091331" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093211" version="1" comment="curl is &lt;7.19.7-1.20.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093214" version="1" comment="libcurl4 is &lt;7.19.7-1.20.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093212" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075547" version="1" comment="dbus-1 is &lt;1.2.10-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075545" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075546" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077040" version="1" comment="dhcp is &lt;4.2.4.P2-0.11.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077039" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.11.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076723" version="1" comment="libpurple-meanwhile is &lt;2.6.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076724" version="1" comment="libpurple-tcl is &lt;2.6.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075538" version="1" comment="MozillaFirefox is &lt;10.0.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075537" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112242" version="1" comment="MozillaFirefox-translations is &lt;10.0.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112243" version="1" comment="libfreebl3 is &lt;3.13.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112244" version="1" comment="libfreebl3-32bit is &lt;3.13.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075540" version="1" comment="mozilla-nspr is &lt;4.9.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075539" version="1" comment="mozilla-nspr-32bit is &lt;4.9.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075542" version="1" comment="mozilla-nss is &lt;3.13.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075541" version="1" comment="mozilla-nss-32bit is &lt;3.13.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112245" version="1" comment="mozilla-nss-tools is &lt;3.13.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075847" version="1" comment="MozillaFirefox is &lt;10.0.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075845" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075846" version="1" comment="MozillaFirefox-translations is &lt;10.0.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075927" version="1" comment="MozillaFirefox is &lt;10.0.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075926" version="1" comment="MozillaFirefox-translations is &lt;10.0.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075929" version="1" comment="mozilla-nspr is &lt;4.9.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075928" version="1" comment="mozilla-nspr-32bit is &lt;4.9.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076101" version="1" comment="MozillaFirefox is &lt;10.0.11-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076100" version="1" comment="MozillaFirefox-translations is &lt;10.0.11-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076103" version="1" comment="libfreebl3 is &lt;3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076102" version="1" comment="libfreebl3-32bit is &lt;3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076106" version="1" comment="mozilla-nss is &lt;3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076104" version="1" comment="mozilla-nss-32bit is &lt;3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076105" version="1" comment="mozilla-nss-tools is &lt;3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076328" version="1" comment="MozillaFirefox is &lt;10.0.12-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076327" version="1" comment="MozillaFirefox-translations is &lt;10.0.12-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076330" version="1" comment="libfreebl3 is &lt;3.14.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076329" version="1" comment="libfreebl3-32bit is &lt;3.14.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076332" version="1" comment="mozilla-nspr is &lt;4.9.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076331" version="1" comment="mozilla-nspr-32bit is &lt;4.9.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076335" version="1" comment="mozilla-nss is &lt;3.14.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076333" version="1" comment="mozilla-nss-32bit is &lt;3.14.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076334" version="1" comment="mozilla-nss-tools is &lt;3.14.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076874" version="1" comment="MozillaFirefox is &lt;17.0.4esr-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076746" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076873" version="1" comment="MozillaFirefox-translations is &lt;17.0.4esr-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076749" version="1" comment="beagle-evolution is &lt;0.3.8-56.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076750" version="1" comment="beagle-firefox is &lt;0.3.8-56.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076751" version="1" comment="beagle-gui is &lt;0.3.8-56.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076752" version="1" comment="beagle-lang is &lt;0.3.8-56.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076755" version="1" comment="libfreebl3 is &lt;3.14.2-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076754" version="1" comment="libfreebl3-32bit is &lt;3.14.2-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076756" version="1" comment="mhtml-firefox is &lt;0.5-1.47.51.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076758" version="1" comment="mozilla-nspr is &lt;4.9.5-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076757" version="1" comment="mozilla-nspr-32bit is &lt;4.9.5-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076761" version="1" comment="mozilla-nss is &lt;3.14.2-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076759" version="1" comment="mozilla-nss-32bit is &lt;3.14.2-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076760" version="1" comment="mozilla-nss-tools is &lt;3.14.2-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077009" version="1" comment="MozillaFirefox is &lt;17.0.5esr-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077007" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077008" version="1" comment="MozillaFirefox-translations is &lt;17.0.5esr-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077011" version="1" comment="libfreebl3 is &lt;3.14.3-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077010" version="1" comment="libfreebl3-32bit is &lt;3.14.3-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077013" version="1" comment="mozilla-nspr is &lt;4.9.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077012" version="1" comment="mozilla-nspr-32bit is &lt;4.9.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077016" version="1" comment="mozilla-nss is &lt;3.14.3-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077014" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077015" version="1" comment="mozilla-nss-tools is &lt;3.14.3-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077311" version="1" comment="MozillaFirefox is &lt;17.0.6esr-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077310" version="1" comment="MozillaFirefox-translations is &lt;17.0.6esr-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077545" version="1" comment="MozillaFirefox is &lt;17.0.7esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077543" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077544" version="1" comment="MozillaFirefox-translations is &lt;17.0.7esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091391" version="1" comment="MozillaFirefox is &lt;17.0.10esr-0.4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091389" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091390" version="1" comment="MozillaFirefox-translations is &lt;17.0.10esr-0.4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093470" version="1" comment="flash-player is &lt;11.2.202.336-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093468" version="1" comment="flash-player-gnome is &lt;11.2.202.336-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093469" version="1" comment="flash-player-kde4 is &lt;11.2.202.336-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091877" version="1" comment="glibc is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091864" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091866" version="1" comment="glibc-devel is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091865" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091868" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091872" version="1" comment="glibc-locale is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091870" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091878" version="1" comment="nscd is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077465" version="1" comment="gnutls is &lt;2.4.1-24.39.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077467" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077466" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091118" version="1" comment="gpg2 is &lt;2.0.9-25.33.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091117" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090836" version="1" comment="icedtea-web is &lt;1.4.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091799" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091797" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091798" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091042" version="1" comment="kdelibs4 is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091040" version="1" comment="kdelibs4-core is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091045" version="1" comment="libkde4 is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091048" version="1" comment="libkdecore4 is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112804" version="1" comment="kernel-default is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112805" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112806" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113140" version="1" comment="kernel-default-extra is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112857" version="1" comment="kernel-pae is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112858" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112859" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113141" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112807" version="1" comment="kernel-source is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112808" version="1" comment="kernel-syms is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112809" version="1" comment="kernel-trace is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112810" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112811" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113142" version="1" comment="kernel-trace-extra is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112845" version="1" comment="kernel-xen is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112846" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112847" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113143" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112848" version="1" comment="xen-kmp-default is &lt;4.1.6_04_3.0.101_0.7.17-0.5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112860" version="1" comment="xen-kmp-pae is &lt;4.1.6_04_3.0.101_0.7.17-0.5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112849" version="1" comment="xen-kmp-trace is &lt;4.1.6_04_3.0.101_0.7.17-0.5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091971" version="1" comment="krb5 is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091962" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091965" version="1" comment="krb5-client is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077663" version="1" comment="kvm is &lt;0.15.1-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073929" version="1" comment="libldb1 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073977" version="1" comment="libldb1-32bit is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073932" version="1" comment="libsmbclient0 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073930" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073935" version="1" comment="libtalloc2 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073933" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073938" version="1" comment="libtdb1 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073936" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073939" version="1" comment="libtevent0 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073978" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073942" version="1" comment="libwbclient0 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073940" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073953" version="1" comment="samba is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073943" version="1" comment="samba-32bit is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073946" version="1" comment="samba-client is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073944" version="1" comment="samba-client-32bit is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073947" version="1" comment="samba-doc is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073948" version="1" comment="samba-krb-printing is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073951" version="1" comment="samba-winbind is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073949" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076805" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076821" version="1" comment="libqt4 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076806" version="1" comment="libqt4-32bit is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076808" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076807" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076818" version="1" comment="libqt4-sql is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076809" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076811" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076815" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076820" version="1" comment="libqt4-x11 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076819" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090228" version="1" comment="libgcrypt11 is &lt;1.5.0-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090226" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076522" version="1" comment="mysql is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076521" version="1" comment="mysql-client is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076356" version="1" comment="permissions is &lt;2013.1.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092672" version="1" comment="libpixman-1-0 is &lt;0.16.0-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092670" version="1" comment="libpixman-1-0-32bit is &lt;0.16.0-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076271" version="1" comment="libproxy0-config-gnome-32bit is &lt;0.3.1-2.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076274" version="1" comment="libproxy0-networkmanager-32bit is &lt;0.3.1-2.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074898" version="1" comment="libsoup-2_4-1 is &lt;2.32.2-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074897" version="1" comment="libsoup-2_4-1-32bit is &lt;2.32.2-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091293" version="1" comment="libvirt is &lt;0.9.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091290" version="1" comment="libvirt-client is &lt;0.9.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091289" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091291" version="1" comment="libvirt-doc is &lt;0.9.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091292" version="1" comment="libvirt-python is &lt;0.9.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076056" version="1" comment="libvirt is &lt;0.9.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076053" version="1" comment="libvirt-client is &lt;0.9.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076052" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076054" version="1" comment="libvirt-doc is &lt;0.9.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076055" version="1" comment="libvirt-python is &lt;0.9.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093158" version="1" comment="libxml2 is &lt;2.7.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093154" version="1" comment="libxml2-32bit is &lt;2.7.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093156" version="1" comment="libxml2-python is &lt;2.7.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091394" version="1" comment="libfreebl3 is &lt;3.15.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091392" version="1" comment="libfreebl3-32bit is &lt;3.15.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091397" version="1" comment="mozilla-nspr is &lt;4.10.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091395" version="1" comment="mozilla-nspr-32bit is &lt;4.10.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091401" version="1" comment="mozilla-nss is &lt;3.15.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091398" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091399" version="1" comment="mozilla-nss-tools is &lt;3.15.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091770" version="1" comment="libfreebl3 is &lt;3.15.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091768" version="1" comment="libfreebl3-32bit is &lt;3.15.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091773" version="1" comment="mozilla-nspr is &lt;4.10.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091771" version="1" comment="mozilla-nspr-32bit is &lt;4.10.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091777" version="1" comment="mozilla-nss is &lt;3.15.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091774" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091775" version="1" comment="mozilla-nss-tools is &lt;3.15.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112642" version="1" comment="libfreebl3 is &lt;3.15.3.1-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112643" version="1" comment="libfreebl3-32bit is &lt;3.15.3.1-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112644" version="1" comment="mozilla-nss is &lt;3.15.3.1-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112645" version="1" comment="mozilla-nss-32bit is &lt;3.15.3.1-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112646" version="1" comment="mozilla-nss-tools is &lt;3.15.3.1-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090048" version="1" comment="openssh is &lt;5.1p1-41.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090047" version="1" comment="openssh-askpass is &lt;5.1p1-41.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112656" version="1" comment="openssl-certs is &lt;1.95-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091791" version="1" comment="openvpn is &lt;2.0.9-143.33.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076774" version="1" comment="perl is &lt;5.10.0-64.61.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076771" version="1" comment="perl-32bit is &lt;5.10.0-64.61.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076772" version="1" comment="perl-base is &lt;5.10.0-64.61.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076773" version="1" comment="perl-doc is &lt;5.10.0-64.61.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074241" version="1" comment="popt is &lt;1.7-37.50.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074239" version="1" comment="popt-32bit is &lt;1.7-37.50.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074244" version="1" comment="rpm is &lt;4.4.2.3-37.50.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093160" version="1" comment="puppet is &lt;2.6.18-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091153" version="1" comment="libpython2_6-1_0 is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091151" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091165" version="1" comment="python is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091157" version="1" comment="python-base is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091155" version="1" comment="python-base-32bit is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091158" version="1" comment="python-curses is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091164" version="1" comment="python-xml is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075493" version="1" comment="quota is &lt;3.16-50.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091803" version="1" comment="ruby is &lt;1.8.7.p357-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091936" version="1" comment="strongswan is &lt;4.4.0-6.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091935" version="1" comment="strongswan-doc is &lt;4.4.0-6.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077216" version="1" comment="sudo is &lt;1.7.6p2-0.2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090262" version="1" comment="telepathy-idle is &lt;0.1.5-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073772" version="1" comment="usbmuxd is &lt;1.0.7-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076977" version="1" comment="xen is &lt;4.1.4_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076968" version="1" comment="xen-doc-html is &lt;4.1.4_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076969" version="1" comment="xen-doc-pdf is &lt;4.1.4_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076970" version="1" comment="xen-kmp-default is &lt;4.1.4_02_3.0.58_0.6.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076971" version="1" comment="xen-kmp-pae is &lt;4.1.4_02_3.0.58_0.6.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076972" version="1" comment="xen-kmp-trace is &lt;4.1.4_02_3.0.58_0.6.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076974" version="1" comment="xen-libs is &lt;4.1.4_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076973" version="1" comment="xen-libs-32bit is &lt;4.1.4_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076976" version="1" comment="xen-tools is &lt;4.1.4_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076975" version="1" comment="xen-tools-domU is &lt;4.1.4_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075439" version="1" comment="libvirt is &lt;0.9.6-0.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075436" version="1" comment="libvirt-client is &lt;0.9.6-0.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075435" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075437" version="1" comment="libvirt-doc is &lt;0.9.6-0.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075438" version="1" comment="libvirt-python is &lt;0.9.6-0.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075440" version="1" comment="virt-manager is &lt;0.9.0-3.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075441" version="1" comment="vm-install is &lt;0.5.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075450" version="1" comment="xen is &lt;4.1.2_20-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075442" version="1" comment="xen-doc-html is &lt;4.1.2_20-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075443" version="1" comment="xen-doc-pdf is &lt;4.1.2_20-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075444" version="1" comment="xen-kmp-default is &lt;4.1.2_20_3.0.38_0.5-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075445" version="1" comment="xen-kmp-trace is &lt;4.1.2_20_3.0.38_0.5-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075447" version="1" comment="xen-libs is &lt;4.1.2_20-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075446" version="1" comment="xen-libs-32bit is &lt;4.1.2_20-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075449" version="1" comment="xen-tools is &lt;4.1.2_20-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075448" version="1" comment="xen-tools-domU is &lt;4.1.2_20-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107397" version="1" comment="vm-install is &lt;0.5.12-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107407" version="1" comment="xen is &lt;4.1.3_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107399" version="1" comment="xen-doc-html is &lt;4.1.3_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107400" version="1" comment="xen-doc-pdf is &lt;4.1.3_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107401" version="1" comment="xen-kmp-default is &lt;4.1.3_02_3.0.38_0.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107402" version="1" comment="xen-kmp-trace is &lt;4.1.3_02_3.0.38_0.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107404" version="1" comment="xen-libs is &lt;4.1.3_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107403" version="1" comment="xen-libs-32bit is &lt;4.1.3_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107406" version="1" comment="xen-tools is &lt;4.1.3_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107405" version="1" comment="xen-tools-domU is &lt;4.1.3_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076028" version="1" comment="xen is &lt;4.1.3_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076019" version="1" comment="xen-doc-html is &lt;4.1.3_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076020" version="1" comment="xen-doc-pdf is &lt;4.1.3_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076021" version="1" comment="xen-kmp-default is &lt;4.1.3_04_3.0.42_0.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076022" version="1" comment="xen-kmp-pae is &lt;4.1.3_04_3.0.42_0.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076023" version="1" comment="xen-kmp-trace is &lt;4.1.3_04_3.0.42_0.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076025" version="1" comment="xen-libs is &lt;4.1.3_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076024" version="1" comment="xen-libs-32bit is &lt;4.1.3_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076027" version="1" comment="xen-tools is &lt;4.1.3_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076026" version="1" comment="xen-tools-domU is &lt;4.1.3_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077484" version="1" comment="xen is &lt;4.1.5_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077475" version="1" comment="xen-doc-html is &lt;4.1.5_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077476" version="1" comment="xen-doc-pdf is &lt;4.1.5_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077477" version="1" comment="xen-kmp-default is &lt;4.1.5_02_3.0.74_0.6.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077478" version="1" comment="xen-kmp-pae is &lt;4.1.5_02_3.0.74_0.6.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077479" version="1" comment="xen-kmp-trace is &lt;4.1.5_02_3.0.74_0.6.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077481" version="1" comment="xen-libs is &lt;4.1.5_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077480" version="1" comment="xen-libs-32bit is &lt;4.1.5_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077483" version="1" comment="xen-tools is &lt;4.1.5_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077482" version="1" comment="xen-tools-domU is &lt;4.1.5_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091504" version="1" comment="xen is &lt;4.1.6_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091495" version="1" comment="xen-doc-html is &lt;4.1.6_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091496" version="1" comment="xen-doc-pdf is &lt;4.1.6_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091497" version="1" comment="xen-kmp-default is &lt;4.1.6_02_3.0.93_0.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091498" version="1" comment="xen-kmp-pae is &lt;4.1.6_02_3.0.93_0.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091499" version="1" comment="xen-kmp-trace is &lt;4.1.6_02_3.0.93_0.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091501" version="1" comment="xen-libs is &lt;4.1.6_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091500" version="1" comment="xen-libs-32bit is &lt;4.1.6_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091503" version="1" comment="xen-tools is &lt;4.1.6_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091502" version="1" comment="xen-tools-domU is &lt;4.1.6_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091934" version="1" comment="xen is &lt;4.1.6_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091925" version="1" comment="xen-doc-html is &lt;4.1.6_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091926" version="1" comment="xen-doc-pdf is &lt;4.1.6_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091927" version="1" comment="xen-kmp-default is &lt;4.1.6_04_3.0.101_0.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091928" version="1" comment="xen-kmp-pae is &lt;4.1.6_04_3.0.101_0.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091929" version="1" comment="xen-kmp-trace is &lt;4.1.6_04_3.0.101_0.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091931" version="1" comment="xen-libs is &lt;4.1.6_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091930" version="1" comment="xen-libs-32bit is &lt;4.1.6_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091933" version="1" comment="xen-tools is &lt;4.1.6_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091932" version="1" comment="xen-tools-domU is &lt;4.1.6_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092863" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.70.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092865" version="1" comment="xorg-x11-server is &lt;7.4-27.70.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092864" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.70.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093465" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093463" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077488" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077486" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077491" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077489" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077494" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077492" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077511" version="1" comment="xorg-x11-libXp is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077509" version="1" comment="xorg-x11-libXp-32bit is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077500" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077498" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077508" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077506" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077503" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077501" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077514" version="1" comment="xorg-x11-libxcb is &lt;7.4-1.22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077512" version="1" comment="xorg-x11-libxcb-32bit is &lt;7.4-1.22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074290" version="1" comment="xorg-x11-server-rdp is &lt;7.3.99-3.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112850" version="1" comment="xrdp is &lt;0.4.1-28.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074963" version="1" comment="zypper is &lt;1.6.166-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074962" version="1" comment="zypper-log is &lt;1.6.166-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098652" version="1" comment="MozillaFirefox is &lt;24.6.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098650" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098651" version="1" comment="MozillaFirefox-translations is &lt;24.6.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098655" version="1" comment="libfreebl3 is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098653" version="1" comment="libfreebl3-32bit is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098658" version="1" comment="libsoftokn3 is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098656" version="1" comment="libsoftokn3-32bit is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098661" version="1" comment="mozilla-nspr is &lt;4.10.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098659" version="1" comment="mozilla-nspr-32bit is &lt;4.10.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098665" version="1" comment="mozilla-nss is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098662" version="1" comment="mozilla-nss-32bit is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098663" version="1" comment="mozilla-nss-tools is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077540" version="1" comment="sled-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077577" version="1" comment="Mesa is &lt;9.0.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077576" version="1" comment="Mesa-32bit is &lt;9.0.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090790" version="1" comment="MozillaFirefox is &lt;17.0.9esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090789" version="1" comment="MozillaFirefox-translations is &lt;17.0.9esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113529" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-0.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119546" version="1" comment="MozillaFirefox-translations is &lt;38.5.0esr-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098633" version="1" comment="MozillaFirefox is &lt;24.5.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098631" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098632" version="1" comment="MozillaFirefox-translations is &lt;24.5.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098636" version="1" comment="libfreebl3 is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098634" version="1" comment="libfreebl3-32bit is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098639" version="1" comment="libsoftokn3 is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098637" version="1" comment="libsoftokn3-32bit is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098649" version="1" comment="mozilla-nspr is &lt;4.10.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098647" version="1" comment="mozilla-nspr-32bit is &lt;4.10.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098643" version="1" comment="mozilla-nss is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098640" version="1" comment="mozilla-nss-32bit is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098641" version="1" comment="mozilla-nss-tools is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108676" version="1" comment="MozillaFirefox is &lt;31.6.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108675" version="1" comment="MozillaFirefox-translations is &lt;31.6.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111622" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111624" version="1" comment="libfreebl3 is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111625" version="1" comment="libfreebl3-32bit is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111627" version="1" comment="libsoftokn3 is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111628" version="1" comment="libsoftokn3-32bit is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111598" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111631" version="1" comment="mozilla-nss-32bit is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111634" version="1" comment="mozilla-nss-tools is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115109" version="1" comment="libaugeas0 is &lt;0.9.0-3.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100817" version="1" comment="bash is &lt;3.2-147.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100815" version="1" comment="bash-doc is &lt;3.2-147.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100818" version="1" comment="libreadline5-32bit is &lt;5.2-147.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100821" version="1" comment="readline-doc is &lt;5.2-147.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111613" version="1" comment="bind-libs is &lt;9.9.6P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111612" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111616" version="1" comment="bind-utils is &lt;9.9.6P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114089" version="1" comment="bind-libs is &lt;9.9.6P1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114088" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114090" version="1" comment="bind-utils is &lt;9.9.6P1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119451" version="1" comment="bind-libs is &lt;9.9.6P1-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119452" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119453" version="1" comment="bind-utils is &lt;9.9.6P1-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121670" version="1" comment="bind-libs is &lt;9.9.6P1-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121671" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121672" version="1" comment="bind-utils is &lt;9.9.6P1-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107553" version="1" comment="binutils is &lt;2.23.1-0.23.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109262" version="1" comment="ibm-data-db2 is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098772" version="1" comment="cabextract is &lt;1.2-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116561" version="1" comment="cabextract is &lt;1.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098526" version="1" comment="libldb1 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098867" version="1" comment="libldb1-32bit is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098529" version="1" comment="libsmbclient0 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098527" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098532" version="1" comment="libtalloc2 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098530" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098535" version="1" comment="libtdb1 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098533" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098537" version="1" comment="libtevent0 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098536" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098540" version="1" comment="libwbclient0 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098538" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098551" version="1" comment="samba is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098541" version="1" comment="samba-32bit is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098544" version="1" comment="samba-client is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098542" version="1" comment="samba-client-32bit is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098545" version="1" comment="samba-doc is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098546" version="1" comment="samba-krb-printing is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098549" version="1" comment="samba-winbind is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098547" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112219" version="1" comment="clamav is &lt;0.98.1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110877" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110876" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118746" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118747" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098821" version="1" comment="compat-wireless-kmp-default is &lt;3.13_3.0.101_0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098822" version="1" comment="compat-wireless-kmp-pae is &lt;3.13_3.0.101_0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098823" version="1" comment="compat-wireless-kmp-xen is &lt;3.13_3.0.101_0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099551" version="1" comment="cups is &lt;1.3.9-8.46.52.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099547" version="1" comment="cups-client is &lt;1.3.9-8.46.52.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099550" version="1" comment="cups-libs is &lt;1.3.9-8.46.52.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099548" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.52.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098955" version="1" comment="curl is &lt;7.19.7-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098958" version="1" comment="libcurl4 is &lt;7.19.7-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098956" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122359" version="1" comment="libcurl4 is &lt;7.19.7-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122360" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107512" version="1" comment="curl is &lt;7.19.7-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107514" version="1" comment="libcurl4 is &lt;7.19.7-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107513" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122235" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118699" version="1" comment="dhcpcd is &lt;3.2.3-45.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110199" version="1" comment="dnsmasq is &lt;2.71-0.12.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113462" version="1" comment="e2fsprogs is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113463" version="1" comment="libblkid1 is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113464" version="1" comment="libblkid1-32bit is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113465" version="1" comment="libcom_err2 is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113466" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113467" version="1" comment="libext2fs2 is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113468" version="1" comment="libuuid1 is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113469" version="1" comment="libuuid1-32bit is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113470" version="1" comment="uuid-runtime is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122236" version="1" comment="ecryptfs-utils is &lt;61-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122237" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098788" version="1" comment="libpurple-meanwhile is &lt;2.6.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098789" version="1" comment="libpurple-tcl is &lt;2.6.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077548" version="1" comment="MozillaFirefox is &lt;17.0.7esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077546" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077547" version="1" comment="MozillaFirefox-translations is &lt;17.0.7esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091388" version="1" comment="MozillaFirefox is &lt;17.0.10esr-0.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091386" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.12.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091387" version="1" comment="MozillaFirefox-translations is &lt;17.0.10esr-0.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093482" version="1" comment="MozillaFirefox is &lt;24.3.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093480" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093481" version="1" comment="MozillaFirefox-translations is &lt;24.3.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093485" version="1" comment="libfreebl3 is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093483" version="1" comment="libfreebl3-32bit is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093488" version="1" comment="libsoftokn3 is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093486" version="1" comment="libsoftokn3-32bit is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093492" version="1" comment="mozilla-nss is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093489" version="1" comment="mozilla-nss-32bit is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093490" version="1" comment="mozilla-nss-tools is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098646" version="1" comment="MozillaFirefox is &lt;24.4.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098644" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098645" version="1" comment="MozillaFirefox-translations is &lt;24.4.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099235" version="1" comment="MozillaFirefox is &lt;24.7.0esr-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099234" version="1" comment="MozillaFirefox-translations is &lt;24.7.0esr-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099238" version="1" comment="libfreebl3 is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099236" version="1" comment="libfreebl3-32bit is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099241" version="1" comment="libsoftokn3 is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099239" version="1" comment="libsoftokn3-32bit is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099245" version="1" comment="mozilla-nss is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099242" version="1" comment="mozilla-nss-32bit is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099243" version="1" comment="mozilla-nss-tools is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099991" version="1" comment="MozillaFirefox is &lt;24.8.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099990" version="1" comment="MozillaFirefox-translations is &lt;24.8.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099994" version="1" comment="libfreebl3 is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099992" version="1" comment="libfreebl3-32bit is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099997" version="1" comment="libsoftokn3 is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099995" version="1" comment="libsoftokn3-32bit is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100000" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099998" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100004" version="1" comment="mozilla-nss is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100001" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100002" version="1" comment="mozilla-nss-tools is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102688" version="1" comment="MozillaFirefox is &lt;31.3.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102687" version="1" comment="MozillaFirefox-translations is &lt;31.3.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107500" version="1" comment="MozillaFirefox is &lt;31.4.0esr-0.8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107499" version="1" comment="MozillaFirefox-translations is &lt;31.4.0esr-0.8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108087" version="1" comment="MozillaFirefox is &lt;31.5.3esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108086" version="1" comment="MozillaFirefox-translations is &lt;31.5.3esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114790" version="1" comment="mozilla-nspr-32bit is &lt;4.10.9-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114961" version="1" comment="MozillaFirefox-translations is &lt;38.3.0esr-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116562" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-15.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116563" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-25.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116564" version="1" comment="libfreebl3 is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116565" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116566" version="1" comment="libsoftokn3 is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116567" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116568" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116569" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116570" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092101" version="1" comment="MozillaFirefox is &lt;24.2.0esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092099" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092100" version="1" comment="MozillaFirefox-translations is &lt;24.2.0esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092104" version="1" comment="libfreebl3 is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092102" version="1" comment="libfreebl3-32bit is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092107" version="1" comment="libsoftokn3 is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092105" version="1" comment="libsoftokn3-32bit is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092111" version="1" comment="mozilla-nss is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092108" version="1" comment="mozilla-nss-32bit is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092109" version="1" comment="mozilla-nss-tools is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101908" version="1" comment="MozillaFirefox is &lt;31.2.0esr-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101906" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101907" version="1" comment="MozillaFirefox-translations is &lt;31.2.0esr-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101261" version="1" comment="libfreebl3 is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101260" version="1" comment="libfreebl3-32bit is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101263" version="1" comment="libsoftokn3 is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101262" version="1" comment="libsoftokn3-32bit is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101268" version="1" comment="mozilla-nss is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101266" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101267" version="1" comment="mozilla-nss-tools is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114289" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.12.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114290" version="1" comment="MozillaFirefox-translations is &lt;38.2.1esr-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114291" version="1" comment="libfreebl3 is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114292" version="1" comment="libfreebl3-32bit is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114293" version="1" comment="libsoftokn3 is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114294" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114296" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114297" version="1" comment="mozilla-nss-tools is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101722" version="1" comment="flash-player is &lt;11.2.202.418-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101720" version="1" comment="flash-player-gnome is &lt;11.2.202.418-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101721" version="1" comment="flash-player-kde4 is &lt;11.2.202.418-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111595" version="1" comment="flash-player is &lt;11.2.202.481-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111596" version="1" comment="flash-player-gnome is &lt;11.2.202.481-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111597" version="1" comment="flash-player-kde4 is &lt;11.2.202.481-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111605" version="1" comment="flash-player is &lt;11.2.202.491-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111606" version="1" comment="flash-player-gnome is &lt;11.2.202.491-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111607" version="1" comment="flash-player-kde4 is &lt;11.2.202.491-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113512" version="1" comment="flash-player is &lt;11.2.202.508-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113513" version="1" comment="flash-player-gnome is &lt;11.2.202.508-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113514" version="1" comment="flash-player-kde4 is &lt;11.2.202.508-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114486" version="1" comment="flash-player is &lt;11.2.202.521-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114487" version="1" comment="flash-player-gnome is &lt;11.2.202.521-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114488" version="1" comment="flash-player-kde4 is &lt;11.2.202.521-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115026" version="1" comment="flash-player is &lt;11.2.202.535-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115027" version="1" comment="flash-player-gnome is &lt;11.2.202.535-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115028" version="1" comment="flash-player-kde4 is &lt;11.2.202.535-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115056" version="1" comment="flash-player is &lt;11.2.202.540-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115057" version="1" comment="flash-player-gnome is &lt;11.2.202.540-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115058" version="1" comment="flash-player-kde4 is &lt;11.2.202.540-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116123" version="1" comment="flash-player is &lt;11.2.202.548-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116124" version="1" comment="flash-player-gnome is &lt;11.2.202.548-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116125" version="1" comment="flash-player-kde4 is &lt;11.2.202.548-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118887" version="1" comment="flash-player is &lt;11.2.202.554-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118888" version="1" comment="flash-player-gnome is &lt;11.2.202.554-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118889" version="1" comment="flash-player-kde4 is &lt;11.2.202.554-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120898" version="1" comment="flash-player is &lt;11.2.202.559-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120899" version="1" comment="flash-player-gnome is &lt;11.2.202.559-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120900" version="1" comment="flash-player-kde4 is &lt;11.2.202.559-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119814" version="1" comment="foomatic-filters is &lt;3.0.2-269.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107583" version="1" comment="freetype2 is &lt;2.3.7-25.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107582" version="1" comment="freetype2-32bit is &lt;2.3.7-25.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107584" version="1" comment="ft2demos is &lt;2.3.7-25.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121673" version="1" comment="giflib-32bit is &lt;4.1.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100160" version="1" comment="glibc is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100147" version="1" comment="glibc-32bit is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100149" version="1" comment="glibc-devel is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100148" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100151" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100155" version="1" comment="glibc-locale is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100153" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100161" version="1" comment="nscd is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113935" version="1" comment="glibc-32bit is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113936" version="1" comment="glibc-devel is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113937" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113939" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113941" version="1" comment="glibc-locale is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113942" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113945" version="1" comment="nscd is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122361" version="1" comment="glibc-32bit is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122362" version="1" comment="glibc-devel is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122363" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122364" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122365" version="1" comment="glibc-locale is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122366" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122367" version="1" comment="nscd is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098741" version="1" comment="gnutls is &lt;2.4.1-24.39.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098745" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098743" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114286" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114287" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119815" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119816" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118071" version="1" comment="gpg2 is &lt;2.0.9-25.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118072" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119302" version="1" comment="grub2 is &lt;2.00-0.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119303" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119304" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109703" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109702" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109705" version="1" comment="libgstbasecamerabinsrc-0_10-0 is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109704" version="1" comment="libgstbasecamerabinsrc-0_10-0-32bit is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109707" version="1" comment="libgstbasevideo-0_10-0 is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109706" version="1" comment="libgstbasevideo-0_10-0-32bit is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109709" version="1" comment="libgstphotography-0_10-0 is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109708" version="1" comment="libgstphotography-0_10-0-32bit is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109711" version="1" comment="libgstsignalprocessor-0_10-0 is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109710" version="1" comment="libgstsignalprocessor-0_10-0-32bit is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109713" version="1" comment="libgstvdp-0_10-0 is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109712" version="1" comment="libgstvdp-0_10-0-32bit is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115093" version="1" comment="gtk2-32bit is &lt;2.18.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115095" version="1" comment="gtk2-lang is &lt;2.18.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121164" version="1" comment="gtk2-32bit is &lt;2.18.9-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121165" version="1" comment="gtk2-lang is &lt;2.18.9-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094250" version="1" comment="icedtea-web is &lt;1.4.2-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110708" version="1" comment="libicu is &lt;4.0-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101333" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.71-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101331" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.71-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101332" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.71-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111640" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.85-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111641" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.85-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111642" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.85-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115452" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.91-0.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115453" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.91-0.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115454" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.91-0.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122064" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.95-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122065" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.95-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122066" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.95-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107717" version="1" comment="kde4-l10n-ar is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107718" version="1" comment="kde4-l10n-cs is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107721" version="1" comment="kde4-l10n-da is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107719" version="1" comment="kde4-l10n-da-data is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107720" version="1" comment="kde4-l10n-da-doc is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107722" version="1" comment="kde4-l10n-de is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107723" version="1" comment="kde4-l10n-en_GB is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107726" version="1" comment="kde4-l10n-es is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107724" version="1" comment="kde4-l10n-es-data is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107725" version="1" comment="kde4-l10n-es-doc is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107729" version="1" comment="kde4-l10n-fr is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107727" version="1" comment="kde4-l10n-fr-data is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107728" version="1" comment="kde4-l10n-fr-doc is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107730" version="1" comment="kde4-l10n-hu is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107733" version="1" comment="kde4-l10n-it is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107731" version="1" comment="kde4-l10n-it-data is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107732" version="1" comment="kde4-l10n-it-doc is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107734" version="1" comment="kde4-l10n-ja is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107735" version="1" comment="kde4-l10n-ko is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107736" version="1" comment="kde4-l10n-nb is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107739" version="1" comment="kde4-l10n-nl is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107737" version="1" comment="kde4-l10n-nl-data is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107738" version="1" comment="kde4-l10n-nl-doc is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107742" version="1" comment="kde4-l10n-pl is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107740" version="1" comment="kde4-l10n-pl-data is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107741" version="1" comment="kde4-l10n-pl-doc is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107743" version="1" comment="kde4-l10n-pt is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107746" version="1" comment="kde4-l10n-pt_BR is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107744" version="1" comment="kde4-l10n-pt_BR-data is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107745" version="1" comment="kde4-l10n-pt_BR-doc is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107749" version="1" comment="kde4-l10n-ru is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107747" version="1" comment="kde4-l10n-ru-data is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107748" version="1" comment="kde4-l10n-ru-doc is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107752" version="1" comment="kde4-l10n-sv is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107750" version="1" comment="kde4-l10n-sv-data is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107751" version="1" comment="kde4-l10n-sv-doc is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107753" version="1" comment="kde4-l10n-zh_CN is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107754" version="1" comment="kde4-l10n-zh_TW is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107755" version="1" comment="kdebase4-runtime-xine is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121511" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121512" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121513" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121514" version="1" comment="kdm is &lt;4.3.5-0.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121515" version="1" comment="kwin is &lt;4.3.5-0.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112905" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101000" version="1" comment="kernel-default is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100997" version="1" comment="kernel-default-base is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100998" version="1" comment="kernel-default-devel is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101035" version="1" comment="kernel-default-extra is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101024" version="1" comment="kernel-pae is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101022" version="1" comment="kernel-pae-base is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101023" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101037" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101001" version="1" comment="kernel-source is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101002" version="1" comment="kernel-syms is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101004" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101014" version="1" comment="kernel-xen is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101012" version="1" comment="kernel-xen-base is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101013" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101036" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101015" version="1" comment="xen-kmp-default is &lt;4.2.4_04_3.0.101_0.40-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101025" version="1" comment="xen-kmp-pae is &lt;4.2.4_04_3.0.101_0.40-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114457" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114468" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114459" version="1" comment="kernel-default is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114469" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114470" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114460" version="1" comment="kernel-default-extra is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114465" version="1" comment="kernel-pae is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114483" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114484" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114466" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114474" version="1" comment="kernel-source is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114475" version="1" comment="kernel-syms is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114476" version="1" comment="kernel-trace is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114478" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114461" version="1" comment="kernel-xen is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114479" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114480" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114462" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101018" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117925" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117926" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117902" version="1" comment="kernel-default is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117903" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117904" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117913" version="1" comment="kernel-default-extra is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117914" version="1" comment="kernel-pae is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117915" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117916" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117917" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117908" version="1" comment="kernel-source is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117909" version="1" comment="kernel-syms is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117910" version="1" comment="kernel-trace is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117912" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117918" version="1" comment="kernel-xen is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117919" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117920" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117921" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099577" version="1" comment="krb5 is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099568" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099571" version="1" comment="krb5-client is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115952" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115955" version="1" comment="krb5-client is &lt;1.6.3-133.49.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117946" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117947" version="1" comment="krb5-client is &lt;1.6.3-133.49.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101410" version="1" comment="krb5 is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101408" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101409" version="1" comment="krb5-client is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111661" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111664" version="1" comment="krb5-client is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100956" version="1" comment="kvm is &lt;1.4.2-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114003" version="1" comment="kvm is &lt;1.4.2-0.22.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119547" version="1" comment="kvm is &lt;1.4.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107522" version="1" comment="kvm is &lt;1.4.2-0.21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107527" version="1" comment="libvirt is &lt;1.0.5.9-0.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107524" version="1" comment="libvirt-client is &lt;1.0.5.9-0.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107523" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-0.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107525" version="1" comment="libvirt-doc is &lt;1.0.5.9-0.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107526" version="1" comment="libvirt-python is &lt;1.0.5.9-0.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113168" version="1" comment="lcms2 is &lt;2.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113169" version="1" comment="liblcms2-2 is &lt;2.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093511" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093525" version="1" comment="libqt4 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093512" version="1" comment="libqt4-32bit is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093515" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093513" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093520" version="1" comment="libqt4-sql is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093516" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093517" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093518" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093523" version="1" comment="libqt4-x11 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093521" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108071" version="1" comment="libblkid1 is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108070" version="1" comment="libblkid1-32bit is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108073" version="1" comment="libuuid1 is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108072" version="1" comment="libuuid1-32bit is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108075" version="1" comment="util-linux is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108074" version="1" comment="util-linux-lang is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108076" version="1" comment="uuid-runtime is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094590" version="1" comment="libecpg6 is &lt;9.1.12-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094592" version="1" comment="libpq5 is &lt;9.1.12-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094591" version="1" comment="libpq5-32bit is &lt;9.1.12-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094596" version="1" comment="postgresql91 is &lt;9.1.12-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094594" version="1" comment="postgresql91-docs is &lt;9.1.12-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100804" version="1" comment="libfreebl3 is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100802" version="1" comment="libfreebl3-32bit is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100807" version="1" comment="libsoftokn3 is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100805" version="1" comment="libsoftokn3-32bit is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100811" version="1" comment="mozilla-nss is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100808" version="1" comment="mozilla-nss-32bit is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100809" version="1" comment="mozilla-nss-tools is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114502" version="1" comment="libgcrypt11 is &lt;1.5.0-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114503" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105797" version="1" comment="libjasper is &lt;1.900.1-134.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105796" version="1" comment="libjasper-32bit is &lt;1.900.1-134.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112622" version="1" comment="libmpfr1 is &lt;2.3.2-3.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116579" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099912" version="1" comment="libmysql55client18 is &lt;5.5.39-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099910" version="1" comment="libmysql55client18-32bit is &lt;5.5.39-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099913" version="1" comment="libmysql55client_r18 is &lt;5.5.39-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099916" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099914" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099917" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099920" version="1" comment="mysql is &lt;5.5.39-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099918" version="1" comment="mysql-client is &lt;5.5.39-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101158" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101157" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101159" version="1" comment="openssl is &lt;0.9.8j-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117948" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119817" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099499" version="1" comment="libpulse-browse0 is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099500" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099503" version="1" comment="libpulse0 is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099501" version="1" comment="libpulse0-32bit is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099510" version="1" comment="pulseaudio is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099504" version="1" comment="pulseaudio-esound-compat is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099505" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099506" version="1" comment="pulseaudio-lang is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099529" version="1" comment="pulseaudio-module-bluetooth is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099530" version="1" comment="pulseaudio-module-gconf is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099531" version="1" comment="pulseaudio-module-jack is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099532" version="1" comment="pulseaudio-module-lirc is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099507" version="1" comment="pulseaudio-module-x11 is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099508" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099509" version="1" comment="pulseaudio-utils is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112907" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112909" version="1" comment="libqt4 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112910" version="1" comment="libqt4-32bit is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112911" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112912" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112913" version="1" comment="libqt4-sql is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112914" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112915" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112916" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112917" version="1" comment="libqt4-x11 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112918" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115082" version="1" comment="librsvg-32bit is &lt;2.26.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115083" version="1" comment="rsvg-view is &lt;2.26.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116580" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098962" version="1" comment="libtasn1 is &lt;1.5-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098961" version="1" comment="libtasn1-3 is &lt;1.5-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098959" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116057" version="1" comment="libvdpau is &lt;0.4.1-16.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116058" version="1" comment="libvdpau1 is &lt;0.4.1-16.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116059" version="1" comment="libvdpau1-32bit is &lt;0.4.1-16.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098488" version="1" comment="libvirt is &lt;1.0.5.9-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098484" version="1" comment="libvirt-client is &lt;1.0.5.9-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098483" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098485" version="1" comment="libvirt-doc is &lt;1.0.5.9-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098487" version="1" comment="libvirt-python is &lt;1.0.5.9-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101724" version="1" comment="libxml2-python is &lt;2.7.6-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119818" version="1" comment="libxml2-32bit is &lt;2.7.6-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119819" version="1" comment="libxml2-python is &lt;2.7.6-0.34.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121361" version="1" comment="libxml2-32bit is &lt;2.7.6-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121362" version="1" comment="libxml2-python is &lt;2.7.6-0.37.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103133" version="1" comment="mailx is &lt;12.5-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122522" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-18.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122523" version="1" comment="MozillaFirefox-translations is &lt;38.6.0esr-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122524" version="1" comment="libfreebl3 is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122525" version="1" comment="libfreebl3-32bit is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122526" version="1" comment="libsoftokn3 is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122527" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122528" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122529" version="1" comment="mozilla-nss-tools is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113990" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120789" version="1" comment="libfreebl3 is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120790" version="1" comment="libfreebl3-32bit is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120791" version="1" comment="libsoftokn3 is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120792" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120793" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120794" version="1" comment="mozilla-nss-tools is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091404" version="1" comment="libfreebl3 is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091402" version="1" comment="libfreebl3-32bit is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091407" version="1" comment="libsoftokn3 is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091405" version="1" comment="libsoftokn3-32bit is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091411" version="1" comment="mozilla-nss is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091408" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091409" version="1" comment="mozilla-nss-tools is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098630" version="1" comment="mutt is &lt;1.5.17-42.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115097" version="1" comment="libmysql55client18 is &lt;5.5.45-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115096" version="1" comment="libmysql55client18-32bit is &lt;5.5.45-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115098" version="1" comment="libmysql55client_r18 is &lt;5.5.45-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115100" version="1" comment="mysql-client is &lt;5.5.45-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118183" version="1" comment="libmysql55client18 is &lt;5.5.46-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118184" version="1" comment="libmysql55client18-32bit is &lt;5.5.46-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118185" version="1" comment="libmysql55client_r18 is &lt;5.5.46-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118186" version="1" comment="mysql-client is &lt;5.5.46-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122368" version="1" comment="libmysql55client18 is &lt;5.5.47-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122369" version="1" comment="libmysql55client18-32bit is &lt;5.5.47-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122370" version="1" comment="libmysql55client_r18 is &lt;5.5.47-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122371" version="1" comment="mysql-client is &lt;5.5.47-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114280" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114282" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114283" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098898" version="1" comment="novell-qtgui is &lt;3.0.0-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098897" version="1" comment="novell-qtgui-cli is &lt;3.0.0-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098899" version="1" comment="novell-ui-base is &lt;3.0.0-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091780" version="1" comment="libfreebl3 is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091778" version="1" comment="libfreebl3-32bit is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091783" version="1" comment="libsoftokn3 is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091781" version="1" comment="libsoftokn3-32bit is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091787" version="1" comment="mozilla-nss is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091784" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091785" version="1" comment="mozilla-nss-tools is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099004" version="1" comment="ntp is &lt;4.2.4p8-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099003" version="1" comment="ntp-doc is &lt;4.2.4p8-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114131" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114135" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119836" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119837" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098708" version="1" comment="openssh is &lt;6.2p2-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098707" version="1" comment="openssh-askpass is &lt;6.2p2-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098706" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114381" version="1" comment="openssh is &lt;6.2p2-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114382" version="1" comment="openssh-askpass is &lt;6.2p2-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114383" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121363" version="1" comment="openssh is &lt;6.2p2-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121364" version="1" comment="openssh-askpass is &lt;6.2p2-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121365" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118748" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118749" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112657" version="1" comment="openssl-certs is &lt;1.97-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091789" version="1" comment="openvpn is &lt;2.0.9-143.40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117986" version="1" comment="orca is &lt;2.28.3-0.5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117987" version="1" comment="orca-lang is &lt;2.28.3-0.5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098712" version="1" comment="pam is &lt;1.1.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098709" version="1" comment="pam-32bit is &lt;1.1.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098710" version="1" comment="pam-doc is &lt;1.1.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112920" version="1" comment="perl is &lt;5.10.0-64.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112921" version="1" comment="perl-32bit is &lt;5.10.0-64.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112922" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112923" version="1" comment="perl-Test-Simple is &lt;0.72-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112924" version="1" comment="perl-base is &lt;5.10.0-64.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112925" version="1" comment="perl-doc is &lt;5.10.0-64.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103187" version="1" comment="popt is &lt;1.7-37.60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103186" version="1" comment="popt-32bit is &lt;1.7-37.60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103188" version="1" comment="rpm is &lt;4.4.2.3-37.60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123272" version="1" comment="libecpg6 is &lt;9.4.5-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123273" version="1" comment="libpq5 is &lt;9.4.5-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123274" version="1" comment="libpq5-32bit is &lt;9.4.5-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123275" version="1" comment="postgresql94 is &lt;9.4.5-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123276" version="1" comment="postgresql94-docs is &lt;9.4.5-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108214" version="1" comment="libecpg6 is &lt;9.1.15-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108216" version="1" comment="libpq5 is &lt;9.1.15-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108215" version="1" comment="libpq5-32bit is &lt;9.1.15-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108218" version="1" comment="postgresql91 is &lt;9.1.15-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108217" version="1" comment="postgresql91-docs is &lt;9.1.15-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110599" version="1" comment="postgresql91 is &lt;9.1.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110598" version="1" comment="postgresql91-docs is &lt;9.1.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121792" version="1" comment="postgresql91 is &lt;9.1.19-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121793" version="1" comment="postgresql91-docs is &lt;9.1.19-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098480" version="1" comment="puppet is &lt;2.6.18-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093473" version="1" comment="pwlib-plugins-avc is &lt;1.10.10-120.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093474" version="1" comment="pwlib-plugins-dc is &lt;1.10.10-120.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093475" version="1" comment="pwlib-plugins-v4l2 is &lt;1.10.10-120.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102342" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102341" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102347" version="1" comment="python is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102344" version="1" comment="python-base is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102343" version="1" comment="python-base-32bit is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102345" version="1" comment="python-curses is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102346" version="1" comment="python-xml is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112673" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112674" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112675" version="1" comment="python is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112677" version="1" comment="python-base is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112678" version="1" comment="python-base-32bit is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112679" version="1" comment="python-curses is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112686" version="1" comment="python-xml is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098670" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098668" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098684" version="1" comment="python is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098674" version="1" comment="python-base is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098672" version="1" comment="python-base-32bit is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098675" version="1" comment="python-curses is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098683" version="1" comment="python-xml is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099513" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099511" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099527" version="1" comment="python is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099517" version="1" comment="python-base is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099515" version="1" comment="python-base-32bit is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099518" version="1" comment="python-curses is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099526" version="1" comment="python-xml is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098481" version="1" comment="python-pywbem is &lt;0.7-6.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114959" version="1" comment="rpcbind is &lt;0.1.6+git20080930-6.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121170" version="1" comment="rsync is &lt;3.0.4-2.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098368" version="1" comment="ruby is &lt;1.8.7.p357-0.9.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106593" version="1" comment="libldb1 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106592" version="1" comment="libldb1-32bit is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106595" version="1" comment="libsmbclient0 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106594" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106597" version="1" comment="libtalloc2 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106596" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106599" version="1" comment="libtdb1 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106598" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106601" version="1" comment="libtevent0 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106600" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106603" version="1" comment="libwbclient0 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106602" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106611" version="1" comment="samba is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106604" version="1" comment="samba-32bit is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106606" version="1" comment="samba-client is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106605" version="1" comment="samba-client-32bit is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106607" version="1" comment="samba-doc is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106608" version="1" comment="samba-krb-printing is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106610" version="1" comment="samba-winbind is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106609" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121366" version="1" comment="libldb1 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121367" version="1" comment="libldb1-32bit is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121368" version="1" comment="libsmbclient0 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121369" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121370" version="1" comment="libtalloc2 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121371" version="1" comment="libtalloc2-32bit is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121372" version="1" comment="libtdb1 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121373" version="1" comment="libtdb1-32bit is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121374" version="1" comment="libtevent0 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121375" version="1" comment="libtevent0-32bit is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121376" version="1" comment="libwbclient0 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121377" version="1" comment="libwbclient0-32bit is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121378" version="1" comment="samba-32bit is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121379" version="1" comment="samba-client is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121380" version="1" comment="samba-client-32bit is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121381" version="1" comment="samba-doc is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121382" version="1" comment="samba-krb-printing is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121383" version="1" comment="samba-winbind is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121384" version="1" comment="samba-winbind-32bit is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117857" version="1" comment="sblim-sfcb is &lt;1.3.11-0.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117954" version="1" comment="strongswan is &lt;4.4.0-6.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117955" version="1" comment="strongswan-doc is &lt;4.4.0-6.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098511" version="1" comment="sudo is &lt;1.7.6p2-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103739" version="1" comment="suseRegister is &lt;1.4-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113930" version="1" comment="libtiff3 is &lt;3.8.2-141.160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113931" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115063" version="1" comment="vorbis-tools is &lt;1.1.1-174.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101153" version="1" comment="wpa_supplicant-gui is &lt;0.7.1-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117988" version="1" comment="wpa_supplicant is &lt;0.7.1-6.17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117989" version="1" comment="wpa_supplicant-gui is &lt;0.7.1-6.17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109733" version="1" comment="xen is &lt;4.2.5_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109725" version="1" comment="xen-doc-html is &lt;4.2.5_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109726" version="1" comment="xen-doc-pdf is &lt;4.2.5_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109727" version="1" comment="xen-kmp-default is &lt;4.2.5_06_3.0.101_0.47.52-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109728" version="1" comment="xen-kmp-pae is &lt;4.2.5_06_3.0.101_0.47.52-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109730" version="1" comment="xen-libs is &lt;4.2.5_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109729" version="1" comment="xen-libs-32bit is &lt;4.2.5_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109732" version="1" comment="xen-tools is &lt;4.2.5_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109731" version="1" comment="xen-tools-domU is &lt;4.2.5_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103198" version="1" comment="xen is &lt;4.2.5_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103191" version="1" comment="xen-doc-html is &lt;4.2.5_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103192" version="1" comment="xen-doc-pdf is &lt;4.2.5_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103193" version="1" comment="xen-kmp-default is &lt;4.2.5_02_3.0.101_0.40-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103195" version="1" comment="xen-libs is &lt;4.2.5_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103194" version="1" comment="xen-libs-32bit is &lt;4.2.5_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103197" version="1" comment="xen-tools is &lt;4.2.5_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103196" version="1" comment="xen-tools-domU is &lt;4.2.5_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114110" version="1" comment="xen-doc-html is &lt;4.2.5_12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114111" version="1" comment="xen-doc-pdf is &lt;4.2.5_12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114112" version="1" comment="xen-kmp-default is &lt;4.2.5_12_3.0.101_0.47.55-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114118" version="1" comment="xen-kmp-pae is &lt;4.2.5_12_3.0.101_0.47.55-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114114" version="1" comment="xen-libs is &lt;4.2.5_12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114113" version="1" comment="xen-libs-32bit is &lt;4.2.5_12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114115" version="1" comment="xen-tools is &lt;4.2.5_12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114116" version="1" comment="xen-tools-domU is &lt;4.2.5_12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115413" version="1" comment="xen-doc-html is &lt;4.2.5_14-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115414" version="1" comment="xen-doc-pdf is &lt;4.2.5_14-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115415" version="1" comment="xen-kmp-default is &lt;4.2.5_14_3.0.101_0.47.67-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115420" version="1" comment="xen-kmp-pae is &lt;4.2.5_14_3.0.101_0.47.67-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115417" version="1" comment="xen-libs is &lt;4.2.5_14-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115416" version="1" comment="xen-libs-32bit is &lt;4.2.5_14-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115418" version="1" comment="xen-tools is &lt;4.2.5_14-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115419" version="1" comment="xen-tools-domU is &lt;4.2.5_14-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089685" version="1" comment="xen is &lt;4.2.2_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089677" version="1" comment="xen-doc-html is &lt;4.2.2_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089678" version="1" comment="xen-doc-pdf is &lt;4.2.2_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089679" version="1" comment="xen-kmp-default is &lt;4.2.2_06_3.0.82_0.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089680" version="1" comment="xen-kmp-pae is &lt;4.2.2_06_3.0.82_0.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089682" version="1" comment="xen-libs is &lt;4.2.2_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089681" version="1" comment="xen-libs-32bit is &lt;4.2.2_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089684" version="1" comment="xen-tools is &lt;4.2.2_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089683" version="1" comment="xen-tools-domU is &lt;4.2.2_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091767" version="1" comment="xen is &lt;4.2.3_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091759" version="1" comment="xen-doc-html is &lt;4.2.3_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091760" version="1" comment="xen-doc-pdf is &lt;4.2.3_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091761" version="1" comment="xen-kmp-default is &lt;4.2.3_02_3.0.93_0.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091762" version="1" comment="xen-kmp-pae is &lt;4.2.3_02_3.0.93_0.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091764" version="1" comment="xen-libs is &lt;4.2.3_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091763" version="1" comment="xen-libs-32bit is &lt;4.2.3_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091766" version="1" comment="xen-tools is &lt;4.2.3_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091765" version="1" comment="xen-tools-domU is &lt;4.2.3_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092098" version="1" comment="xen is &lt;4.2.3_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092090" version="1" comment="xen-doc-html is &lt;4.2.3_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092091" version="1" comment="xen-doc-pdf is &lt;4.2.3_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092092" version="1" comment="xen-kmp-default is &lt;4.2.3_08_3.0.101_0.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092093" version="1" comment="xen-kmp-pae is &lt;4.2.3_08_3.0.101_0.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092095" version="1" comment="xen-libs is &lt;4.2.3_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092094" version="1" comment="xen-libs-32bit is &lt;4.2.3_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092097" version="1" comment="xen-tools is &lt;4.2.3_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092096" version="1" comment="xen-tools-domU is &lt;4.2.3_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094170" version="1" comment="xen is &lt;4.2.4_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094162" version="1" comment="xen-doc-html is &lt;4.2.4_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094163" version="1" comment="xen-doc-pdf is &lt;4.2.4_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094164" version="1" comment="xen-kmp-default is &lt;4.2.4_02_3.0.101_0.15-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094165" version="1" comment="xen-kmp-pae is &lt;4.2.4_02_3.0.101_0.15-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094167" version="1" comment="xen-libs is &lt;4.2.4_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094166" version="1" comment="xen-libs-32bit is &lt;4.2.4_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094169" version="1" comment="xen-tools is &lt;4.2.4_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094168" version="1" comment="xen-tools-domU is &lt;4.2.4_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101034" version="1" comment="xen is &lt;4.2.4_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101026" version="1" comment="xen-doc-html is &lt;4.2.4_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101027" version="1" comment="xen-doc-pdf is &lt;4.2.4_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101028" version="1" comment="xen-kmp-default is &lt;4.2.4_04_3.0.101_0.40-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101029" version="1" comment="xen-kmp-pae is &lt;4.2.4_04_3.0.101_0.40-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101031" version="1" comment="xen-libs is &lt;4.2.4_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101030" version="1" comment="xen-libs-32bit is &lt;4.2.4_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101033" version="1" comment="xen-tools is &lt;4.2.4_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101032" version="1" comment="xen-tools-domU is &lt;4.2.4_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108983" version="1" comment="xen is &lt;4.2.5_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108975" version="1" comment="xen-doc-html is &lt;4.2.5_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108976" version="1" comment="xen-doc-pdf is &lt;4.2.5_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108977" version="1" comment="xen-kmp-default is &lt;4.2.5_04_3.0.101_0.47.52-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108978" version="1" comment="xen-kmp-pae is &lt;4.2.5_04_3.0.101_0.47.52-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108980" version="1" comment="xen-libs is &lt;4.2.5_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108979" version="1" comment="xen-libs-32bit is &lt;4.2.5_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108982" version="1" comment="xen-tools is &lt;4.2.5_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108981" version="1" comment="xen-tools-domU is &lt;4.2.5_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110349" version="1" comment="xen is &lt;4.2.5_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110341" version="1" comment="xen-doc-html is &lt;4.2.5_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110342" version="1" comment="xen-doc-pdf is &lt;4.2.5_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110343" version="1" comment="xen-kmp-default is &lt;4.2.5_08_3.0.101_0.47.55-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110344" version="1" comment="xen-kmp-pae is &lt;4.2.5_08_3.0.101_0.47.55-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110346" version="1" comment="xen-libs is &lt;4.2.5_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110345" version="1" comment="xen-libs-32bit is &lt;4.2.5_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110348" version="1" comment="xen-tools is &lt;4.2.5_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110347" version="1" comment="xen-tools-domU is &lt;4.2.5_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118671" version="1" comment="xen-doc-html is &lt;4.2.5_18-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118672" version="1" comment="xen-doc-pdf is &lt;4.2.5_18-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118673" version="1" comment="xen-kmp-default is &lt;4.2.5_18_3.0.101_0.47.71-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118674" version="1" comment="xen-kmp-pae is &lt;4.2.5_18_3.0.101_0.47.71-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118675" version="1" comment="xen-libs is &lt;4.2.5_18-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118676" version="1" comment="xen-libs-32bit is &lt;4.2.5_18-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118677" version="1" comment="xen-tools is &lt;4.2.5_18-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118678" version="1" comment="xen-tools-domU is &lt;4.2.5_18-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092720" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092722" version="1" comment="xorg-x11-server is &lt;7.4-27.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092721" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098577" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098575" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113219" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077725" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077724" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077729" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077728" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077733" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077732" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077731" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077730" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116586" version="1" comment="xscreensaver is &lt;5.07-6.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117401" version="1" comment="sled-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123676" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124755" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124756" version="1" comment="libfreebl3 is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124757" version="1" comment="libfreebl3-32bit is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124758" version="1" comment="libsoftokn3 is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124759" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124760" version="1" comment="mozilla-nspr-32bit is &lt;4.12-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124761" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124762" version="1" comment="mozilla-nss-tools is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113836" version="1" comment="xen-doc-html is &lt;4.4.2_12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113837" version="1" comment="xen-kmp-default is &lt;4.4.2_12_3.0.101_63-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113842" version="1" comment="xen-kmp-pae is &lt;4.4.2_12_3.0.101_63-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113838" version="1" comment="xen-libs is &lt;4.4.2_12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113841" version="1" comment="xen-libs-32bit is &lt;4.4.2_12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113839" version="1" comment="xen-tools is &lt;4.4.2_12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113840" version="1" comment="xen-tools-domU is &lt;4.4.2_12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125044" version="1" comment="bind-libs is &lt;9.9.6P1-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125045" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125046" version="1" comment="bind-utils is &lt;9.9.6P1-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124377" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124378" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125332" version="1" comment="fetchmail is &lt;6.3.8.90-13.20.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123022" version="1" comment="flash-player is &lt;11.2.202.569-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123023" version="1" comment="flash-player-gnome is &lt;11.2.202.569-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123024" version="1" comment="flash-player-kde4 is &lt;11.2.202.569-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124622" version="1" comment="flash-player is &lt;11.2.202.577-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124623" version="1" comment="flash-player-gnome is &lt;11.2.202.577-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124624" version="1" comment="flash-player-kde4 is &lt;11.2.202.577-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125521" version="1" comment="libgcc_s1 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125522" version="1" comment="libgcc_s1-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125523" version="1" comment="libgfortran3-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125524" version="1" comment="libgomp1 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125525" version="1" comment="libgomp1-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125526" version="1" comment="libquadmath0-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125527" version="1" comment="libstdc++6 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125528" version="1" comment="libstdc++6-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125529" version="1" comment="libstdc++6-locale is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119305" version="1" comment="grub2 is &lt;2.00-0.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119306" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119307" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114889" version="1" comment="icedtea-web is &lt;1.5.3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115113" version="1" comment="libicu is &lt;4.0-7.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125683" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.99-0.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125684" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.99-0.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125685" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.99-0.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114777" version="1" comment="kernel-default is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114794" version="1" comment="kernel-default-base is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114795" version="1" comment="kernel-default-devel is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114778" version="1" comment="kernel-default-extra is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114785" version="1" comment="kernel-pae is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114808" version="1" comment="kernel-pae-base is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114809" version="1" comment="kernel-pae-devel is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114786" version="1" comment="kernel-pae-extra is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114796" version="1" comment="kernel-source is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114797" version="1" comment="kernel-syms is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114779" version="1" comment="kernel-trace is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114799" version="1" comment="kernel-trace-devel is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114781" version="1" comment="kernel-xen is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114806" version="1" comment="kernel-xen-base is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114807" version="1" comment="kernel-xen-devel is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114782" version="1" comment="kernel-xen-extra is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125530" version="1" comment="kernel-default is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125531" version="1" comment="kernel-default-base is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125532" version="1" comment="kernel-default-devel is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125533" version="1" comment="kernel-default-extra is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125534" version="1" comment="kernel-pae is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125535" version="1" comment="kernel-pae-base is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125536" version="1" comment="kernel-pae-devel is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125537" version="1" comment="kernel-pae-extra is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125538" version="1" comment="kernel-source is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125539" version="1" comment="kernel-syms is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125540" version="1" comment="kernel-trace is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125541" version="1" comment="kernel-trace-devel is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125542" version="1" comment="kernel-xen is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125543" version="1" comment="kernel-xen-base is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125544" version="1" comment="kernel-xen-devel is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125545" version="1" comment="kernel-xen-extra is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118622" version="1" comment="kernel-default is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118623" version="1" comment="kernel-default-base is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118624" version="1" comment="kernel-default-devel is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118625" version="1" comment="kernel-default-extra is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118626" version="1" comment="kernel-pae is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118627" version="1" comment="kernel-pae-base is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118628" version="1" comment="kernel-pae-devel is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118629" version="1" comment="kernel-pae-extra is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118630" version="1" comment="kernel-source is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118631" version="1" comment="kernel-syms is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118632" version="1" comment="kernel-trace is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118633" version="1" comment="kernel-trace-devel is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118634" version="1" comment="kernel-xen is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118635" version="1" comment="kernel-xen-base is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118636" version="1" comment="kernel-xen-devel is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118637" version="1" comment="kernel-xen-extra is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122530" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122531" version="1" comment="krb5-client is &lt;1.6.3-133.49.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113992" version="1" comment="kvm is &lt;1.4.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119575" version="1" comment="kvm is &lt;1.4.2-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124488" version="1" comment="libotr2 is &lt;3.2.0-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125648" version="1" comment="libvirt-client is &lt;1.2.5-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125649" version="1" comment="libvirt-client-32bit is &lt;1.2.5-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125650" version="1" comment="libvirt-doc is &lt;1.2.5-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121908" version="1" comment="ibm-data-db2 is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116589" version="1" comment="ntp is &lt;4.2.8p4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116590" version="1" comment="ntp-doc is &lt;4.2.8p4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114890" version="1" comment="openssh is &lt;6.6p1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114891" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114893" version="1" comment="openssh-helpers is &lt;6.6p1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121385" version="1" comment="openssh is &lt;6.6p1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121386" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-16.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121387" version="1" comment="openssh-helpers is &lt;6.6p1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123894" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123895" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124465" version="1" comment="libecpg6 is &lt;9.4.6-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124466" version="1" comment="libpq5 is &lt;9.4.6-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124467" version="1" comment="libpq5-32bit is &lt;9.4.6-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124468" version="1" comment="postgresql94 is &lt;9.4.6-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124469" version="1" comment="postgresql94-docs is &lt;9.4.6-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125228" version="1" comment="libldb1 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125229" version="1" comment="libldb1-32bit is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125230" version="1" comment="libsmbclient0 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125231" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125232" version="1" comment="libtalloc2 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125233" version="1" comment="libtalloc2-32bit is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125234" version="1" comment="libtdb1 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125235" version="1" comment="libtdb1-32bit is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125236" version="1" comment="libtevent0 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125237" version="1" comment="libtevent0-32bit is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125238" version="1" comment="libwbclient0 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125239" version="1" comment="libwbclient0-32bit is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125240" version="1" comment="samba-32bit is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125241" version="1" comment="samba-client is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125242" version="1" comment="samba-client-32bit is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125243" version="1" comment="samba-doc is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125244" version="1" comment="samba-krb-printing is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125245" version="1" comment="samba-winbind is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125246" version="1" comment="samba-winbind-32bit is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122780" version="1" comment="socat is &lt;1.7.0.0-1.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122532" version="1" comment="libtiff3 is &lt;3.8.2-141.163.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122533" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.163.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111654" version="1" comment="xen-doc-html is &lt;4.4.2_10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111647" version="1" comment="xen-kmp-default is &lt;4.4.2_10_3.0.101_63-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111648" version="1" comment="xen-kmp-pae is &lt;4.4.2_10_3.0.101_63-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111651" version="1" comment="xen-libs is &lt;4.4.2_10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111650" version="1" comment="xen-libs-32bit is &lt;4.4.2_10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111655" version="1" comment="xen-tools is &lt;4.4.2_10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111653" version="1" comment="xen-tools-domU is &lt;4.4.2_10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115963" version="1" comment="xen-doc-html is &lt;4.4.3_02-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115964" version="1" comment="xen-kmp-default is &lt;4.4.3_02_3.0.101_65-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115969" version="1" comment="xen-kmp-pae is &lt;4.4.3_02_3.0.101_65-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115965" version="1" comment="xen-libs is &lt;4.4.3_02-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115968" version="1" comment="xen-libs-32bit is &lt;4.4.3_02-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115966" version="1" comment="xen-tools is &lt;4.4.3_02-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115967" version="1" comment="xen-tools-domU is &lt;4.4.3_02-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125686" version="1" comment="xen-doc-html is &lt;4.4.4_02-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125687" version="1" comment="xen-kmp-default is &lt;4.4.4_02_3.0.101_68-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125688" version="1" comment="xen-kmp-pae is &lt;4.4.4_02_3.0.101_68-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125689" version="1" comment="xen-libs is &lt;4.4.4_02-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125690" version="1" comment="xen-libs-32bit is &lt;4.4.4_02-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125691" version="1" comment="xen-tools is &lt;4.4.4_02-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125692" version="1" comment="xen-tools-domU is &lt;4.4.4_02-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118679" version="1" comment="xen-doc-html is &lt;4.4.3_06-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118680" version="1" comment="xen-kmp-default is &lt;4.4.3_06_3.0.101_65-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118681" version="1" comment="xen-kmp-pae is &lt;4.4.3_06_3.0.101_65-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118682" version="1" comment="xen-libs is &lt;4.4.3_06-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118683" version="1" comment="xen-libs-32bit is &lt;4.4.3_06-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118684" version="1" comment="xen-tools is &lt;4.4.3_06-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118685" version="1" comment="xen-tools-domU is &lt;4.4.3_06-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116591" version="1" comment="conntrack-tools is &lt;1.0.0-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117402" version="1" comment="sle-hae-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116593" version="1" comment="ctdb is &lt;1.0.114.6-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116594" version="1" comment="hawk is &lt;0.6.1-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116595" version="1" comment="hawk-templates is &lt;0.6.1-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116596" version="1" comment="cluster-network-kmp-bigsmp is &lt;1.4_3.0.101_0.47.55-2.28.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116597" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.40-2.27.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116598" version="1" comment="cluster-network-kmp-pae is &lt;1.4_3.0.101_0.40-2.27.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116599" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.40-2.27.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116600" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.40-2.27.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116601" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_0.40-2.27.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116602" version="1" comment="gfs2-kmp-bigsmp is &lt;2_3.0.101_0.47.55-0.17.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116603" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.40-0.16.104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116604" version="1" comment="gfs2-kmp-pae is &lt;2_3.0.101_0.40-0.16.104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116605" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.40-0.16.104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116606" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.40-0.16.104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116607" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_0.40-0.16.104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116608" version="1" comment="ocfs2-kmp-bigsmp is &lt;1.6_3.0.101_0.47.55-0.21.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116609" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.40-0.20.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116610" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_0.40-0.20.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116611" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.40-0.20.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116612" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.40-0.20.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116613" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_0.40-0.20.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116614" version="1" comment="cluster-network-kmp-bigsmp is &lt;1.4_3.0.101_0.40-2.27.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116615" version="1" comment="drbd-kmp-bigsmp is &lt;8.4.4_3.0.101_0.40-0.22.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116616" version="1" comment="gfs2-kmp-bigsmp is &lt;2_3.0.101_0.40-0.16.104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116617" version="1" comment="ocfs2-kmp-bigsmp is &lt;1.6_3.0.101_0.40-0.20.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117403" version="1" comment="sle-hae-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132106" version="1" comment="hawk is &lt;0.7.0+git.1430140184.8e872c5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132107" version="1" comment="hawk-templates is &lt;0.7.0+git.1430140184.8e872c5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163364" version="1" comment="cluster-network is &lt;1.4-2.32.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163365" version="1" comment="cluster-network-kmp-bigmem is &lt;1.4_3.0.101_108.7-2.32.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163366" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_108.7-2.32.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163367" version="1" comment="cluster-network-kmp-pae is &lt;1.4_3.0.101_108.7-2.32.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163368" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_108.7-2.32.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163369" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_108.7-2.32.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163370" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_108.7-2.32.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163371" version="1" comment="drbd is &lt;8.4.4-0.27.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163372" version="1" comment="drbd-bash-completion is &lt;8.4.4-0.27.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163373" version="1" comment="drbd-heartbeat is &lt;8.4.4-0.27.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163374" version="1" comment="drbd-kmp is &lt;8.4.4-0.27.2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163375" version="1" comment="drbd-kmp-bigmem is &lt;8.4.4_3.0.101_108.7-0.27.2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163376" version="1" comment="drbd-kmp-default is &lt;8.4.4_3.0.101_108.7-0.27.2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163377" version="1" comment="drbd-kmp-pae is &lt;8.4.4_3.0.101_108.7-0.27.2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163378" version="1" comment="drbd-kmp-ppc64 is &lt;8.4.4_3.0.101_108.7-0.27.2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163379" version="1" comment="drbd-kmp-trace is &lt;8.4.4_3.0.101_108.7-0.27.2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163380" version="1" comment="drbd-kmp-xen is &lt;8.4.4_3.0.101_108.7-0.27.2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163381" version="1" comment="drbd-pacemaker is &lt;8.4.4-0.27.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163382" version="1" comment="drbd-udev is &lt;8.4.4-0.27.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163383" version="1" comment="drbd-utils is &lt;8.4.4-0.27.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163384" version="1" comment="drbd-xen is &lt;8.4.4-0.27.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163385" version="1" comment="gfs2 is &lt;2-0.24.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163386" version="1" comment="gfs2-kmp-bigmem is &lt;2_3.0.101_108.7-0.24.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163387" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_108.7-0.24.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163388" version="1" comment="gfs2-kmp-pae is &lt;2_3.0.101_108.7-0.24.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163389" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_108.7-0.24.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163390" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_108.7-0.24.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163391" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_108.7-0.24.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163392" version="1" comment="ocfs2 is &lt;1.6-0.28.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163393" version="1" comment="ocfs2-kmp-bigmem is &lt;1.6_3.0.101_108.7-0.28.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163394" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_108.7-0.28.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163395" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_108.7-0.28.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163396" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_108.7-0.28.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163397" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_108.7-0.28.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163398" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_108.7-0.28.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172493" version="1" comment="cluster-network is &lt;1.4-2.32.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172494" version="1" comment="cluster-network-kmp-bigmem is &lt;1.4_3.0.101_108.35-2.32.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172495" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_108.35-2.32.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172496" version="1" comment="cluster-network-kmp-pae is &lt;1.4_3.0.101_108.35-2.32.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172497" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_108.35-2.32.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172498" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_108.35-2.32.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172499" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_108.35-2.32.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172500" version="1" comment="drbd is &lt;8.4.4-0.27.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172501" version="1" comment="drbd-bash-completion is &lt;8.4.4-0.27.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172502" version="1" comment="drbd-heartbeat is &lt;8.4.4-0.27.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172503" version="1" comment="drbd-kmp is &lt;8.4.4-0.27.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172504" version="1" comment="drbd-kmp-bigmem is &lt;8.4.4_3.0.101_108.35-0.27.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172505" version="1" comment="drbd-kmp-default is &lt;8.4.4_3.0.101_108.35-0.27.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172506" version="1" comment="drbd-kmp-pae is &lt;8.4.4_3.0.101_108.35-0.27.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172507" version="1" comment="drbd-kmp-ppc64 is &lt;8.4.4_3.0.101_108.35-0.27.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172508" version="1" comment="drbd-kmp-trace is &lt;8.4.4_3.0.101_108.35-0.27.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172509" version="1" comment="drbd-kmp-xen is &lt;8.4.4_3.0.101_108.35-0.27.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172510" version="1" comment="drbd-pacemaker is &lt;8.4.4-0.27.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172511" version="1" comment="drbd-udev is &lt;8.4.4-0.27.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172512" version="1" comment="drbd-utils is &lt;8.4.4-0.27.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172513" version="1" comment="drbd-xen is &lt;8.4.4-0.27.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172514" version="1" comment="gfs2 is &lt;2-0.24.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172515" version="1" comment="gfs2-kmp-bigmem is &lt;2_3.0.101_108.35-0.24.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172516" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_108.35-0.24.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172517" version="1" comment="gfs2-kmp-pae is &lt;2_3.0.101_108.35-0.24.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172518" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_108.35-0.24.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172519" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_108.35-0.24.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172520" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_108.35-0.24.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172521" version="1" comment="ocfs2 is &lt;1.6-0.28.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172522" version="1" comment="ocfs2-kmp-bigmem is &lt;1.6_3.0.101_108.35-0.28.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172523" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_108.35-0.28.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172524" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_108.35-0.28.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172525" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_108.35-0.28.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172526" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_108.35-0.28.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172527" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_108.35-0.28.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143046" version="1" comment="libpacemaker-devel is &lt;1.1.12-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143047" version="1" comment="libpacemaker3 is &lt;1.1.12-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143048" version="1" comment="pacemaker is &lt;1.1.12-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143049" version="1" comment="pacemaker-cli is &lt;1.1.12-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143050" version="1" comment="pacemaker-remote is &lt;1.1.12-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117404" version="1" comment="sle-pos-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130055" version="1" comment="MozillaFirefox-branding-SLED is &lt;45.0-23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130056" version="1" comment="MozillaFirefox-translations is &lt;45.2.0esr-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130057" version="1" comment="libfreebl3 is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130058" version="1" comment="libsoftokn3 is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130059" version="1" comment="mozilla-nss-tools is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117405" version="1" comment="sle-pos-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132108" version="1" comment="MozillaFirefox-translations is &lt;45.3.0esr-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132109" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144684" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148252" version="1" comment="MozillaFirefox-translations is &lt;45.7.0esr-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149664" version="1" comment="MozillaFirefox-translations is &lt;45.8.0esr-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155029" version="1" comment="MozillaFirefox-translations is &lt;45.9.0esr-71.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155030" version="1" comment="libfreebl3 is &lt;3.29.5-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155031" version="1" comment="libsoftokn3 is &lt;3.29.5-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155032" version="1" comment="mozilla-nss-tools is &lt;3.29.5-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162282" version="1" comment="MozillaFirefox-branding-SLED is &lt;52-24.3.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162283" version="1" comment="MozillaFirefox-translations is &lt;52.2.0esr-72.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162284" version="1" comment="firefox-gcc5 is &lt;5.3.1+r233831-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162285" version="1" comment="firefox-libffi-gcc5 is &lt;5.3.1+r233831-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162286" version="1" comment="firefox-libffi4 is &lt;5.3.1+r233831-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162287" version="1" comment="firefox-libstdc++6 is &lt;5.3.1+r233831-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162288" version="1" comment="libfreebl3 is &lt;3.29.5-47.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162289" version="1" comment="libsoftokn3 is &lt;3.29.5-47.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162290" version="1" comment="mozilla-nss-tools is &lt;3.29.5-47.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162542" version="1" comment="MozillaFirefox-branding-SLED is &lt;52-24.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162543" version="1" comment="MozillaFirefox-translations is &lt;52.3.0esr-72.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167981" version="1" comment="MozillaFirefox-translations is &lt;52.5.0esr-72.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170903" version="1" comment="MozillaFirefox-translations is &lt;52.6.0esr-72.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174302" version="1" comment="MozillaFirefox-translations is &lt;52.7.3esr-72.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132110" version="1" comment="POS_Image-Minimal3 is &lt;3.4.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132111" version="1" comment="POS_Image-Netboot-hooks is &lt;3.4.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132112" version="1" comment="POS_Image-Tools is &lt;3.4.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132113" version="1" comment="POS_Image3 is &lt;3.5.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132114" version="1" comment="POS_Migration is &lt;3.5.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132115" version="1" comment="POS_Server-Admin3 is &lt;3.5.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132116" version="1" comment="POS_Server-AdminGUI is &lt;3.5.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132117" version="1" comment="POS_Server-AdminTools3 is &lt;3.5.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132118" version="1" comment="POS_Server-BranchTools3 is &lt;3.5.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132119" version="1" comment="POS_Server-Modules3 is &lt;3.5.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132120" version="1" comment="POS_Server3 is &lt;3.5.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132121" version="1" comment="admind is &lt;1.9-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132122" version="1" comment="admind-client is &lt;1.9-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132123" version="1" comment="posbios is &lt;1.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132124" version="1" comment="apache2-mod_nss is &lt;1.0.14-0.4.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132125" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132126" version="1" comment="bind-doc is &lt;9.9.6P1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132127" version="1" comment="bind-libs is &lt;9.9.6P1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132128" version="1" comment="bind-utils is &lt;9.9.6P1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135228" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135229" version="1" comment="bind-doc is &lt;9.9.6P1-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135230" version="1" comment="bind-libs is &lt;9.9.6P1-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135231" version="1" comment="bind-utils is &lt;9.9.6P1-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146904" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146905" version="1" comment="bind-doc is &lt;9.9.6P1-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146906" version="1" comment="bind-libs is &lt;9.9.6P1-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146907" version="1" comment="bind-utils is &lt;9.9.6P1-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149115" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149116" version="1" comment="bind-doc is &lt;9.9.6P1-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149117" version="1" comment="bind-libs is &lt;9.9.6P1-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149118" version="1" comment="bind-utils is &lt;9.9.6P1-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154312" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154313" version="1" comment="bind-doc is &lt;9.9.6P1-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154314" version="1" comment="bind-libs is &lt;9.9.6P1-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154315" version="1" comment="bind-utils is &lt;9.9.6P1-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154368" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154369" version="1" comment="bind-doc is &lt;9.9.6P1-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154370" version="1" comment="bind-libs is &lt;9.9.6P1-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154371" version="1" comment="bind-utils is &lt;9.9.6P1-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157751" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157752" version="1" comment="bind-doc is &lt;9.9.6P1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157753" version="1" comment="bind-libs is &lt;9.9.6P1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157754" version="1" comment="bind-utils is &lt;9.9.6P1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170904" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170905" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170906" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170907" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130773" version="1" comment="libarchive2 is &lt;2.5.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157850" version="1" comment="clamav is &lt;0.99.2-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170432" version="1" comment="clamav is &lt;0.99.3-0.20.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174143" version="1" comment="clamav is &lt;0.99.4-0.20.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132129" version="1" comment="libcurl4 is &lt;7.19.7-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132130" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132131" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132132" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164848" version="1" comment="dnsmasq is &lt;2.78-0.16.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164514" version="1" comment="emacs-el is &lt;22.3-42.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164515" version="1" comment="emacs-info is &lt;22.3-42.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164516" version="1" comment="emacs-x11 is &lt;22.3-42.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166147" version="1" comment="MozillaFirefox-translations is &lt;52.4.0esr-72.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166148" version="1" comment="libfreebl3 is &lt;3.29.5-47.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166149" version="1" comment="libsoftokn3 is &lt;3.29.5-47.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166150" version="1" comment="mozilla-nss-tools is &lt;3.29.5-47.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170646" version="1" comment="gcc43-c++ is &lt;4.3.4_20091019-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170647" version="1" comment="gcc43-info is &lt;4.3.4_20091019-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170648" version="1" comment="gcc43-locale is &lt;4.3.4_20091019-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170649" version="1" comment="libstdc++43-devel is &lt;4.3.4_20091019-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132133" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132134" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132135" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132136" version="1" comment="ghostscript-omni is &lt;8.62-32.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132137" version="1" comment="ghostscript-x11 is &lt;8.62-32.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132138" version="1" comment="libgimpprint is &lt;4.2.7-32.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155601" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155602" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155603" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155604" version="1" comment="ghostscript-omni is &lt;8.62-32.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155605" version="1" comment="ghostscript-x11 is &lt;8.62-32.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155606" version="1" comment="libgimpprint is &lt;4.2.7-32.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157123" version="1" comment="glibc-devel is &lt;2.11.3-17.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157124" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157125" version="1" comment="glibc-locale is &lt;2.11.3-17.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157126" version="1" comment="glibc-profile is &lt;2.11.3-17.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157127" version="1" comment="nscd is &lt;2.11.3-17.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169558" version="1" comment="glibc-devel is &lt;2.11.3-17.110.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169559" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169560" version="1" comment="glibc-locale is &lt;2.11.3-17.110.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169561" version="1" comment="glibc-profile is &lt;2.11.3-17.110.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169562" version="1" comment="nscd is &lt;2.11.3-17.110.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172594" version="1" comment="glibc-devel is &lt;2.11.3-17.110.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172595" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172596" version="1" comment="glibc-locale is &lt;2.11.3-17.110.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172597" version="1" comment="glibc-profile is &lt;2.11.3-17.110.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172598" version="1" comment="nscd is &lt;2.11.3-17.110.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132139" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.30-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132140" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.30-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132141" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.30-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132142" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.30-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132143" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.30-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132144" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.30-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136690" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.35-78.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136691" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.35-78.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136692" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.35-78.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136693" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.35-78.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136694" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.35-78.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136695" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.35-78.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156254" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.45-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156255" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.45-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156256" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.45-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156257" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.45-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156258" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.45-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156259" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.45-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168617" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.50-85.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168618" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.50-85.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168619" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.50-85.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168620" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.50-85.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168621" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.50-85.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168622" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.50-85.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132145" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.50-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132146" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.50-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132147" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.50-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132148" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.50-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132149" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.50-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142160" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.60-58.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142161" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.60-58.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142162" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.60-58.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142163" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.60-58.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142164" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.60-58.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149665" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149666" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149667" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149668" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149669" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155723" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.5-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155724" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.5-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155725" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.5-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155726" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.5-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155727" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.5-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169453" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.15-65.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169454" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.15-65.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169455" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.15-65.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169456" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.15-65.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169457" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.15-65.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172865" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.20-65.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172866" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.20-65.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172867" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.20-65.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172868" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.20-65.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172869" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.20-65.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132150" version="1" comment="kernel-default is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132151" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132152" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132153" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132154" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132155" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132156" version="1" comment="kernel-pae is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132157" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132158" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132159" version="1" comment="kernel-source is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132160" version="1" comment="kernel-syms is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132161" version="1" comment="kernel-trace is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132162" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132163" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132164" version="1" comment="kernel-xen is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132165" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132166" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145677" version="1" comment="kernel-default is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145678" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145679" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145680" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145681" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145682" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145683" version="1" comment="kernel-pae is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145684" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145685" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145686" version="1" comment="kernel-source is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145687" version="1" comment="kernel-syms is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145688" version="1" comment="kernel-trace is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145689" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145690" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145691" version="1" comment="kernel-xen is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145692" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145693" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150493" version="1" comment="kernel-default is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150494" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150495" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150496" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150497" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150498" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150499" version="1" comment="kernel-pae is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150500" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150501" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150502" version="1" comment="kernel-source is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150503" version="1" comment="kernel-syms is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150504" version="1" comment="kernel-trace is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150505" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150506" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150507" version="1" comment="kernel-xen is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150508" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150509" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157060" version="1" comment="kernel-default is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157061" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157062" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157063" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157064" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157065" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157066" version="1" comment="kernel-pae is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157067" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157068" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157069" version="1" comment="kernel-source is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157070" version="1" comment="kernel-syms is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157071" version="1" comment="kernel-trace is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157072" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157073" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157074" version="1" comment="kernel-xen is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157075" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157076" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157423" version="1" comment="kernel-default is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157424" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157425" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157426" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157427" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157428" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157429" version="1" comment="kernel-pae is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157430" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157431" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157432" version="1" comment="kernel-source is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157433" version="1" comment="kernel-syms is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157434" version="1" comment="kernel-trace is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157435" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157436" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157437" version="1" comment="kernel-xen is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157438" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157439" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165561" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165562" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165563" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165564" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165565" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165566" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165567" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165568" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165569" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165570" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165571" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165572" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165573" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165574" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165575" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165576" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165577" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169316" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169317" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169318" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169319" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169320" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169321" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169322" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169323" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169324" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169325" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169326" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169327" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169328" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169329" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169330" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169331" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169332" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172962" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172963" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172964" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172965" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172966" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172967" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172968" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172969" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172970" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172971" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172972" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172973" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172974" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172975" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172976" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172977" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172978" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132167" version="1" comment="kernel-default is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132168" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132169" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132170" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132171" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132172" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132173" version="1" comment="kernel-pae is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132174" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132175" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132176" version="1" comment="kernel-source is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132177" version="1" comment="kernel-syms is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132178" version="1" comment="kernel-trace is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132179" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132180" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132181" version="1" comment="kernel-xen is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132182" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132183" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164468" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164469" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164470" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164471" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164472" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164473" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164474" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164475" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164476" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164477" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164478" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164479" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164480" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164481" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164482" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164483" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164484" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167139" version="1" comment="kvm is &lt;1.4.2-53.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169333" version="1" comment="kvm is &lt;1.4.2-53.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156326" version="1" comment="libtirpc1 is &lt;0.2.1-1.12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156327" version="1" comment="rpcbind is &lt;0.1.6+git20080930-6.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156781" version="1" comment="libxml2-doc is &lt;2.7.6-0.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156782" version="1" comment="libxml2-python is &lt;2.7.6-0.69.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148549" version="1" comment="kernel-default is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148550" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148551" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148552" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148553" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148554" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148555" version="1" comment="kernel-pae is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148556" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148557" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148558" version="1" comment="kernel-source is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148559" version="1" comment="kernel-syms is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148560" version="1" comment="kernel-trace is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148561" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148562" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148563" version="1" comment="kernel-xen is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148564" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148565" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142225" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142226" version="1" comment="libfreebl3 is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142227" version="1" comment="libsoftokn3 is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142228" version="1" comment="mozilla-nss-tools is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169458" version="1" comment="microcode_ctl is &lt;1.17-102.83.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173170" version="1" comment="microcode_ctl is &lt;1.17-102.83.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132184" version="1" comment="libmysql55client18 is &lt;5.5.52-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132185" version="1" comment="libmysql55client_r18 is &lt;5.5.52-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132186" version="1" comment="mysql-client is &lt;5.5.52-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132187" version="1" comment="mysql-tools is &lt;5.5.52-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148170" version="1" comment="libmysql55client18 is &lt;5.5.54-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148171" version="1" comment="libmysql55client_r18 is &lt;5.5.54-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148172" version="1" comment="mysql-client is &lt;5.5.54-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148173" version="1" comment="mysql-tools is &lt;5.5.54-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166794" version="1" comment="libmysql55client18 is &lt;5.5.58-0.39.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166795" version="1" comment="libmysql55client_r18 is &lt;5.5.58-0.39.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166796" version="1" comment="mysql-client is &lt;5.5.58-0.39.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166797" version="1" comment="mysql-tools is &lt;5.5.58-0.39.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147462" version="1" comment="ntp is &lt;4.2.8p9-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147463" version="1" comment="ntp-doc is &lt;4.2.8p9-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132188" version="1" comment="openssh is &lt;6.2p2-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132189" version="1" comment="openssh-askpass is &lt;6.2p2-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132190" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.33.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149140" version="1" comment="openssh is &lt;6.2p2-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149141" version="1" comment="openssh-askpass is &lt;6.2p2-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149142" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132191" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132192" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132193" version="1" comment="openssl-doc is &lt;0.9.8j-0.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149091" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149092" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149093" version="1" comment="openssl-doc is &lt;0.9.8j-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157219" version="1" comment="openvpn is &lt;2.0.9-143.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157220" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166000" version="1" comment="openvpn is &lt;2.0.9-143.47.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166001" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.47.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169962" version="1" comment="perl-XML-LibXML is &lt;1.66-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132194" version="1" comment="apache2-mod_php53 is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132195" version="1" comment="php53-bcmath is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132196" version="1" comment="php53-bz2 is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132197" version="1" comment="php53-calendar is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132198" version="1" comment="php53-ctype is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132199" version="1" comment="php53-curl is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132200" version="1" comment="php53-dba is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132201" version="1" comment="php53-dom is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132202" version="1" comment="php53-exif is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132203" version="1" comment="php53-fastcgi is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132204" version="1" comment="php53-fileinfo is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132205" version="1" comment="php53-ftp is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132206" version="1" comment="php53-gd is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132207" version="1" comment="php53-gettext is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132208" version="1" comment="php53-gmp is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132209" version="1" comment="php53-iconv is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132210" version="1" comment="php53-intl is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132211" version="1" comment="php53-json is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132212" version="1" comment="php53-ldap is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132213" version="1" comment="php53-mbstring is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132214" version="1" comment="php53-mcrypt is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132215" version="1" comment="php53-mysql is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132216" version="1" comment="php53-odbc is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132217" version="1" comment="php53-openssl is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132218" version="1" comment="php53-pcntl is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132219" version="1" comment="php53-pdo is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132220" version="1" comment="php53-pear is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132221" version="1" comment="php53-pgsql is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132222" version="1" comment="php53-pspell is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132223" version="1" comment="php53-shmop is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132224" version="1" comment="php53-snmp is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132225" version="1" comment="php53-soap is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132226" version="1" comment="php53-suhosin is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132227" version="1" comment="php53-sysvmsg is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132228" version="1" comment="php53-sysvsem is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132229" version="1" comment="php53-sysvshm is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132230" version="1" comment="php53-tokenizer is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132231" version="1" comment="php53-wddx is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132232" version="1" comment="php53-xmlreader is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132233" version="1" comment="php53-xmlrpc is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132234" version="1" comment="php53-xmlwriter is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132235" version="1" comment="php53-xsl is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132236" version="1" comment="php53-zip is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132237" version="1" comment="php53-zlib is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148962" version="1" comment="apache2-mod_php53 is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148963" version="1" comment="php53-bcmath is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148964" version="1" comment="php53-bz2 is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148965" version="1" comment="php53-calendar is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148966" version="1" comment="php53-ctype is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148967" version="1" comment="php53-curl is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148968" version="1" comment="php53-dba is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148969" version="1" comment="php53-dom is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148970" version="1" comment="php53-exif is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148971" version="1" comment="php53-fastcgi is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148972" version="1" comment="php53-fileinfo is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148973" version="1" comment="php53-ftp is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148974" version="1" comment="php53-gd is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148975" version="1" comment="php53-gettext is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148976" version="1" comment="php53-gmp is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148977" version="1" comment="php53-iconv is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148978" version="1" comment="php53-intl is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148979" version="1" comment="php53-json is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148980" version="1" comment="php53-ldap is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148981" version="1" comment="php53-mbstring is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148982" version="1" comment="php53-mcrypt is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148983" version="1" comment="php53-mysql is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148984" version="1" comment="php53-odbc is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148985" version="1" comment="php53-openssl is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148986" version="1" comment="php53-pcntl is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148987" version="1" comment="php53-pdo is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148988" version="1" comment="php53-pear is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148989" version="1" comment="php53-pgsql is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148990" version="1" comment="php53-pspell is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148991" version="1" comment="php53-shmop is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148992" version="1" comment="php53-snmp is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148993" version="1" comment="php53-soap is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148994" version="1" comment="php53-suhosin is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148995" version="1" comment="php53-sysvmsg is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148996" version="1" comment="php53-sysvsem is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148997" version="1" comment="php53-sysvshm is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148998" version="1" comment="php53-tokenizer is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148999" version="1" comment="php53-wddx is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149000" version="1" comment="php53-xmlreader is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149001" version="1" comment="php53-xmlrpc is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149002" version="1" comment="php53-xmlwriter is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149003" version="1" comment="php53-xsl is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149004" version="1" comment="php53-zip is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149005" version="1" comment="php53-zlib is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173825" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173826" version="1" comment="php53-bcmath is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173827" version="1" comment="php53-bz2 is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173828" version="1" comment="php53-calendar is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173829" version="1" comment="php53-ctype is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173830" version="1" comment="php53-curl is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173831" version="1" comment="php53-dba is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173832" version="1" comment="php53-dom is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173833" version="1" comment="php53-exif is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173834" version="1" comment="php53-fastcgi is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173835" version="1" comment="php53-fileinfo is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173836" version="1" comment="php53-ftp is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173837" version="1" comment="php53-gd is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173838" version="1" comment="php53-gettext is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173839" version="1" comment="php53-gmp is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173840" version="1" comment="php53-iconv is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173841" version="1" comment="php53-intl is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173842" version="1" comment="php53-json is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173843" version="1" comment="php53-ldap is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173844" version="1" comment="php53-mbstring is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173845" version="1" comment="php53-mcrypt is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173846" version="1" comment="php53-mysql is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173847" version="1" comment="php53-odbc is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173848" version="1" comment="php53-openssl is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173849" version="1" comment="php53-pcntl is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173850" version="1" comment="php53-pdo is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173851" version="1" comment="php53-pear is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173852" version="1" comment="php53-pgsql is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173853" version="1" comment="php53-pspell is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173854" version="1" comment="php53-shmop is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173855" version="1" comment="php53-snmp is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173856" version="1" comment="php53-soap is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173857" version="1" comment="php53-suhosin is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173858" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173859" version="1" comment="php53-sysvsem is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173860" version="1" comment="php53-sysvshm is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173861" version="1" comment="php53-tokenizer is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173862" version="1" comment="php53-wddx is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173863" version="1" comment="php53-xmlreader is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173864" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173865" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173866" version="1" comment="php53-xsl is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173867" version="1" comment="php53-zip is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173868" version="1" comment="php53-zlib is &lt;5.3.17-112.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162344" version="1" comment="libecpg6 is &lt;9.4.13-0.23.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162345" version="1" comment="libpq5 is &lt;9.4.13-0.23.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162346" version="1" comment="postgresql94 is &lt;9.4.13-0.23.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162347" version="1" comment="postgresql94-contrib is &lt;9.4.13-0.23.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162348" version="1" comment="postgresql94-docs is &lt;9.4.13-0.23.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162349" version="1" comment="postgresql94-server is &lt;9.4.13-0.23.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146098" version="1" comment="ldapsmb is &lt;1.34b-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146099" version="1" comment="libldb1 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146100" version="1" comment="libsmbclient0 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146101" version="1" comment="libtalloc2 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146102" version="1" comment="libtdb1 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146103" version="1" comment="libtevent0 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146104" version="1" comment="libwbclient0 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146105" version="1" comment="samba-client is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146106" version="1" comment="samba-doc is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146107" version="1" comment="samba-krb-printing is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146108" version="1" comment="samba-winbind is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155103" version="1" comment="ldapsmb is &lt;1.34b-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155104" version="1" comment="libldb1 is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155105" version="1" comment="libsmbclient0 is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155106" version="1" comment="libtalloc2 is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155107" version="1" comment="libtdb1 is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155108" version="1" comment="libtevent0 is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155109" version="1" comment="libwbclient0 is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155110" version="1" comment="samba-client is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155111" version="1" comment="samba-doc is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155112" version="1" comment="samba-krb-printing is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155113" version="1" comment="samba-winbind is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155941" version="1" comment="ldapsmb is &lt;1.34b-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155942" version="1" comment="libldb1 is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155943" version="1" comment="libsmbclient0 is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155944" version="1" comment="libtalloc2 is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155945" version="1" comment="libtdb1 is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155946" version="1" comment="libtevent0 is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155947" version="1" comment="libwbclient0 is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155948" version="1" comment="samba-client is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155949" version="1" comment="samba-doc is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155950" version="1" comment="samba-krb-printing is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155951" version="1" comment="samba-winbind is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165578" version="1" comment="ldapsmb is &lt;1.34b-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165579" version="1" comment="libldb1 is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165580" version="1" comment="libsmbclient0 is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165581" version="1" comment="libtalloc2 is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165582" version="1" comment="libtdb1 is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165583" version="1" comment="libtevent0 is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165584" version="1" comment="libwbclient0 is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165585" version="1" comment="samba-client is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165586" version="1" comment="samba-doc is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165587" version="1" comment="samba-krb-printing is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165588" version="1" comment="samba-winbind is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169116" version="1" comment="ldapsmb is &lt;1.34b-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169117" version="1" comment="libldb1 is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169118" version="1" comment="libsmbclient0 is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169119" version="1" comment="libtalloc2 is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169120" version="1" comment="libtdb1 is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169121" version="1" comment="libtevent0 is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169122" version="1" comment="libwbclient0 is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169123" version="1" comment="samba-client is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169124" version="1" comment="samba-doc is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169125" version="1" comment="samba-krb-printing is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169126" version="1" comment="samba-winbind is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157221" version="1" comment="tomcat6 is &lt;6.0.53-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157222" version="1" comment="tomcat6-admin-webapps is &lt;6.0.53-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157223" version="1" comment="tomcat6-docs-webapp is &lt;6.0.53-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157224" version="1" comment="tomcat6-javadoc is &lt;6.0.53-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157225" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.53-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157226" version="1" comment="tomcat6-lib is &lt;6.0.53-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157227" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.53-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157228" version="1" comment="tomcat6-webapps is &lt;6.0.53-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157851" version="1" comment="unrar is &lt;3.80.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132238" version="1" comment="wget is &lt;1.11.4-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165714" version="1" comment="wpa_supplicant is &lt;0.7.1-6.18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135272" version="1" comment="xen is &lt;4.2.5_21-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135273" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.86-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135274" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.86-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135275" version="1" comment="xen-libs is &lt;4.2.5_21-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135276" version="1" comment="xen-tools-domU is &lt;4.2.5_21-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145985" version="1" comment="xen is &lt;4.2.5_21-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145986" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.90-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145987" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.90-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145988" version="1" comment="xen-libs is &lt;4.2.5_21-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145989" version="1" comment="xen-tools-domU is &lt;4.2.5_21-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149670" version="1" comment="xen is &lt;4.2.5_21-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149671" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.96-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149672" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.96-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149673" version="1" comment="xen-libs is &lt;4.2.5_21-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149674" version="1" comment="xen-tools-domU is &lt;4.2.5_21-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154469" version="1" comment="xen is &lt;4.2.5_21-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154470" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.99-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154471" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.99-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154472" version="1" comment="xen-libs is &lt;4.2.5_21-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154473" version="1" comment="xen-tools-domU is &lt;4.2.5_21-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154954" version="1" comment="xen is &lt;4.2.5_21-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154955" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.99-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154956" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.99-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154957" version="1" comment="xen-libs is &lt;4.2.5_21-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154958" version="1" comment="xen-tools-domU is &lt;4.2.5_21-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157755" version="1" comment="xen is &lt;4.2.5_21-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157756" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.102-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157757" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.102-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157758" version="1" comment="xen-libs is &lt;4.2.5_21-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157759" version="1" comment="xen-tools-domU is &lt;4.2.5_21-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162974" version="1" comment="xen is &lt;4.2.5_21-45.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162975" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.105-45.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162976" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.105-45.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162977" version="1" comment="xen-libs is &lt;4.2.5_21-45.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162978" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164387" version="1" comment="xen is &lt;4.2.5_21-45.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164388" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.105-45.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164389" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.105-45.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164390" version="1" comment="xen-libs is &lt;4.2.5_21-45.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164391" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165894" version="1" comment="xen is &lt;4.2.5_21-45.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165895" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.5-45.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165896" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.5-45.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165897" version="1" comment="xen-libs is &lt;4.2.5_21-45.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165898" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167795" version="1" comment="xen is &lt;4.2.5_21-45.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167796" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.8-45.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167797" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.8-45.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167798" version="1" comment="xen-libs is &lt;4.2.5_21-45.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167799" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173021" version="1" comment="xen is &lt;4.2.5_21-45.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173022" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.14-45.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173023" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.14-45.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173024" version="1" comment="xen-libs is &lt;4.2.5_21-45.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173025" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158451" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158452" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116621" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.19_2.6.33.5_rt23_0.4-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117406" version="1" comment="SUSE-Linux-Enterprise-RT-release is ==11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116623" version="1" comment="brocade-bna-kmp-rt is &lt;2.1.0.0_2.6.33.20_rt31_0.5-0.2.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116624" version="1" comment="cluster-network-kmp-rt is &lt;1.4_2.6.33.20_rt31_0.5-2.5.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116625" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_2.6.33.20_rt31_0.5-2.5.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116626" version="1" comment="drbd-kmp-rt is &lt;8.3.11_2.6.33.20_rt31_0.5-0.3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116627" version="1" comment="drbd-kmp-rt_trace is &lt;8.3.11_2.6.33.20_rt31_0.5-0.3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116628" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.19_2.6.33.20_rt31_0.5-0.9.11.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116629" version="1" comment="kernel-rt is &lt;2.6.33.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116630" version="1" comment="kernel-rt-base is &lt;2.6.33.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116631" version="1" comment="kernel-rt-devel is &lt;2.6.33.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116632" version="1" comment="kernel-rt_trace is &lt;2.6.33.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116633" version="1" comment="kernel-rt_trace-base is &lt;2.6.33.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116634" version="1" comment="kernel-rt_trace-devel is &lt;2.6.33.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116635" version="1" comment="kernel-source-rt is &lt;2.6.33.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116636" version="1" comment="kernel-syms-rt is &lt;2.6.33.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116637" version="1" comment="ocfs2-kmp-rt is &lt;1.6_2.6.33.20_rt31_0.5-0.4.2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116638" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_2.6.33.20_rt31_0.5-0.4.2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116639" version="1" comment="ofed-kmp-rt is &lt;1.5.2_2.6.33.20_rt31_0.5-0.9.13.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116640" version="1" comment="ofed-kmp-rt is &lt;1.5.2_2.6.33.18_rt31_0.3-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116641" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.7.9-2.18.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116642" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.7.9-2.18.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116643" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.101_rt130_0.7.9-0.6.6.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116644" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.101_rt130_0.7.9-0.6.6.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116645" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.7.9-0.25.25.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116646" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.7.9-0.25.25.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116647" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116648" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116649" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116650" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116651" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116652" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116653" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116654" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116655" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.101_rt130_0.7.9-0.9.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116656" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.101_rt130_0.7.9-0.9.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116657" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.7.9-0.11.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116658" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.7.9-0.11.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116659" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.101_rt130_0.7.9-0.28.28.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116660" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.101_rt130_0.7.9-0.28.28.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117407" version="1" comment="SUSE-Linux-Enterprise-RT-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116662" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.28-2.27.99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116663" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.28-2.27.99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116664" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.28-0.22.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116665" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.28-0.22.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116666" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.28-0.38.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116667" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.28-0.38.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116668" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116669" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116670" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116671" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116672" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116673" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116674" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116675" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116676" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.28-0.11.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116677" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.28-0.11.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116678" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.28-0.20.99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116679" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.28-0.20.99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116680" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.28-0.13.90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116681" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.28-0.13.90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117408" version="1" comment="SUSE-Linux-Enterprise-RT-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116683" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.33.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116684" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.33.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116685" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.33.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116686" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.33.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116687" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.33.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116688" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.33.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116689" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.33.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116690" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.33.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121311" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.33.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121312" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.33.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121313" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.33.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121314" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.33.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121315" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.33.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121316" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.33.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119755" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.33.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119756" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.33.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154704" version="1" comment="kernel-rt is &lt;3.0.101.rt130-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154705" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154706" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154707" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154708" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154709" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154710" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154711" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118646" version="1" comment="SUSE-Linux-Enterprise-RT-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163399" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_68-2.32.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163400" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_68-2.32.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163401" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_68-0.27.2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163402" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_68-0.27.2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163403" version="1" comment="gfs2-kmp-rt is &lt;2_3.0.101_rt130_68-0.24.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163404" version="1" comment="gfs2-kmp-rt_trace is &lt;2_3.0.101_rt130_68-0.24.2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163405" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_68-0.28.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163406" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_68-0.28.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126460" version="1" comment="kernel-rt is &lt;3.0.101.rt130-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126461" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126462" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126463" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126464" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126465" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126466" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126467" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172528" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_69.14-2.32.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172529" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_69.14-2.32.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172530" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_69.14-0.27.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172531" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_69.14-0.27.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172532" version="1" comment="gfs2-kmp-rt is &lt;2_3.0.101_rt130_69.14-0.24.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172533" version="1" comment="gfs2-kmp-rt_trace is &lt;2_3.0.101_rt130_69.14-0.24.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172534" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_69.14-0.28.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172535" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_69.14-0.28.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129438" version="1" comment="kernel-rt is &lt;3.0.101.rt130-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129439" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129440" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129441" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129442" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129443" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129444" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129445" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162979" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162980" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162981" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162982" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162983" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162984" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162985" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162986" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118638" version="1" comment="kernel-rt is &lt;3.0.101.rt130-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118639" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118640" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118641" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118642" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118643" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118644" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118645" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118708" version="1" comment="kernel-rt is &lt;3.0.101.rt130-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118709" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118710" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118711" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118712" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118713" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118714" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118715" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167414" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167415" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167416" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167417" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167418" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167419" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167420" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167421" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169989" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169990" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169991" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169992" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169993" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169994" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169995" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169996" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174026" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174027" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174028" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174029" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174030" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174031" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174032" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174033" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142165" version="1" comment="kernel-rt is &lt;3.0.101.rt130-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142166" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142167" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142168" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142169" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142170" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142171" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142172" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130920" version="1" comment="kernel-rt is &lt;3.0.101.rt130-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130921" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130922" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130923" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130924" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130925" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130926" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130927" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165190" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165191" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165192" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165193" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165194" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165195" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165196" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165197" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117409" version="1" comment="SUSE_SLES_SAP-release is ==11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116692" version="1" comment="java-1_4_2-ibm-sap is &lt;1.4.2_sr13.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116693" version="1" comment="java-1_4_2-ibm-sap-devel is &lt;1.4.2_sr13.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117410" version="1" comment="SUSE_SLES_SAP-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116695" version="1" comment="sap_suse_cluster_connector is &lt;1.0.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117411" version="1" comment="SUSE_SLES_SAP-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127147" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127148" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132239" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132240" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120998" version="1" comment="clamsap is &lt;0.98.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118750" version="1" comment="SUSE_SLES_SAP-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149127" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149128" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111832" version="1" comment="rhn-virtualization-common is &lt;5.4.15-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111833" version="1" comment="rhn-virtualization-host is &lt;5.4.15-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111834" version="1" comment="rhncfg is &lt;5.9.33-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111835" version="1" comment="rhncfg-actions is &lt;5.9.33-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111836" version="1" comment="rhncfg-client is &lt;5.9.33-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111837" version="1" comment="rhncfg-management is &lt;5.9.33-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111842" version="1" comment="koan is &lt;2.0.10-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111838" version="1" comment="rhnmd is &lt;5.3.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111839" version="1" comment="spacewalk-backend-libs is &lt;1.2.74-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111840" version="1" comment="spacewalk-certs-tools is &lt;1.2.2-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111843" version="1" comment="spacewalk-backend-libs is &lt;1.2.74-0.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155628" version="1" comment="rhnlib is &lt;2.5.84.4-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155629" version="1" comment="spacecmd is &lt;2.5.5.5-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155630" version="1" comment="spacewalk-backend is &lt;2.5.24.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155631" version="1" comment="spacewalk-backend-libs is &lt;2.5.24.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155632" version="1" comment="spacewalk-check is &lt;2.5.13.8-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155633" version="1" comment="spacewalk-client-setup is &lt;2.5.13.8-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155634" version="1" comment="spacewalk-client-tools is &lt;2.5.13.8-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157785" version="1" comment="python-pycrypto is &lt;2.6.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165090" version="1" comment="salt is &lt;2016.11.4-43.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165091" version="1" comment="salt-doc is &lt;2016.11.4-43.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165092" version="1" comment="salt-minion is &lt;2016.11.4-43.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168742" version="1" comment="salt is &lt;2016.11.4-43.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168743" version="1" comment="salt-doc is &lt;2016.11.4-43.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168744" version="1" comment="salt-minion is &lt;2016.11.4-43.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156901" version="1" comment="salt is &lt;2016.11.4-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156902" version="1" comment="salt-doc is &lt;2016.11.4-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156903" version="1" comment="salt-minion is &lt;2016.11.4-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116698" version="1" comment="hawk is &lt;0.5.2-0.38.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116699" version="1" comment="hawk-templates is &lt;0.5.2-0.38.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117412" version="1" comment="sle-hae-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116701" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.7.17-2.18.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116702" version="1" comment="cluster-network-kmp-pae is &lt;1.4_3.0.101_0.7.17-2.18.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116703" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.7.17-2.18.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116704" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.7.17-2.18.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116705" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_0.7.17-2.18.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116706" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.7.17-0.7.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116707" version="1" comment="gfs2-kmp-pae is &lt;2_3.0.101_0.7.17-0.7.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116708" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.7.17-0.7.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116709" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.7.17-0.7.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116710" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_0.7.17-0.7.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116711" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.7.17-0.11.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116712" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_0.7.17-0.11.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116713" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.7.17-0.11.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116714" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.7.17-0.11.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116715" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_0.7.17-0.11.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032400" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032399" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032105" version="1" comment="sles-release is ==11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032368" version="1" comment="MozillaFirefox is &lt;3.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055070" version="1" comment="MozillaFirefox-branding-SLED is &lt;3.5-1.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032367" version="1" comment="MozillaFirefox-translations is &lt;3.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053948" version="1" comment="gconf2 is &lt;2.24.0-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053946" version="1" comment="gconf2-32bit is &lt;2.24.0-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053947" version="1" comment="gconf2-x86 is &lt;2.24.0-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055075" version="1" comment="libfreebl3 is &lt;3.12.3.1-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055073" version="1" comment="libfreebl3-32bit is &lt;3.12.3.1-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055074" version="1" comment="libfreebl3-x86 is &lt;3.12.3.1-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053951" version="1" comment="libidl is &lt;0.8.11-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053949" version="1" comment="libidl-32bit is &lt;0.8.11-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053950" version="1" comment="libidl-x86 is &lt;0.8.11-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055078" version="1" comment="mozilla-nspr is &lt;4.8-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055076" version="1" comment="mozilla-nspr-32bit is &lt;4.8-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055077" version="1" comment="mozilla-nspr-x86 is &lt;4.8-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055082" version="1" comment="mozilla-nss is &lt;3.12.3.1-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055079" version="1" comment="mozilla-nss-32bit is &lt;3.12.3.1-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055080" version="1" comment="mozilla-nss-tools is &lt;3.12.3.1-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055081" version="1" comment="mozilla-nss-x86 is &lt;3.12.3.1-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032373" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032369" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032370" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032371" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032372" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061814" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061810" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061811" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061812" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061813" version="1" comment="mozilla-xulrunner191-x86 is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064221" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.12-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064217" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.12-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064218" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.12-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064219" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.12-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064220" version="1" comment="mozilla-xulrunner192-x86 is &lt;1.9.2.12-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053959" version="1" comment="orbit2 is &lt;2.14.16-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053957" version="1" comment="orbit2-32bit is &lt;2.14.16-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053958" version="1" comment="orbit2-x86 is &lt;2.14.16-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032229" version="1" comment="NetworkManager is &lt;0.7.0.r4359-15.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032228" version="1" comment="NetworkManager-glib is &lt;0.7.0.r4359-15.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057532" version="1" comment="NetworkManager-gnome is &lt;0.7.0.r1053-11.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111685" version="1" comment="procps is &lt;3.2.7-151.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057533" version="1" comment="acl is &lt;2.2.47-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057536" version="1" comment="libacl is &lt;2.2.47-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057534" version="1" comment="libacl-32bit is &lt;2.2.47-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057535" version="1" comment="libacl-x86 is &lt;2.2.47-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059869" version="1" comment="apache2 is &lt;2.2.10-2.23.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059864" version="1" comment="apache2-doc is &lt;2.2.10-2.23.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059865" version="1" comment="apache2-example-pages is &lt;2.2.10-2.23.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059866" version="1" comment="apache2-prefork is &lt;2.2.10-2.23.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059867" version="1" comment="apache2-utils is &lt;2.2.10-2.23.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059868" version="1" comment="apache2-worker is &lt;2.2.10-2.23.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032146" version="1" comment="apache2-mod_php5 is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111691" version="1" comment="php5 is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032147" version="1" comment="php5-bcmath is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032148" version="1" comment="php5-bz2 is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032149" version="1" comment="php5-calendar is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032150" version="1" comment="php5-ctype is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032151" version="1" comment="php5-curl is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032152" version="1" comment="php5-dba is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032153" version="1" comment="php5-dbase is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032154" version="1" comment="php5-dom is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032155" version="1" comment="php5-exif is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032156" version="1" comment="php5-fastcgi is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032157" version="1" comment="php5-ftp is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032158" version="1" comment="php5-gd is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032159" version="1" comment="php5-gettext is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032160" version="1" comment="php5-gmp is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032161" version="1" comment="php5-hash is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032162" version="1" comment="php5-iconv is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032163" version="1" comment="php5-json is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032164" version="1" comment="php5-ldap is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032165" version="1" comment="php5-mbstring is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032166" version="1" comment="php5-mcrypt is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032167" version="1" comment="php5-mysql is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032168" version="1" comment="php5-odbc is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032169" version="1" comment="php5-openssl is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032170" version="1" comment="php5-pcntl is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032171" version="1" comment="php5-pdo is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032172" version="1" comment="php5-pear is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032173" version="1" comment="php5-pgsql is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032174" version="1" comment="php5-pspell is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032175" version="1" comment="php5-shmop is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032176" version="1" comment="php5-snmp is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032177" version="1" comment="php5-soap is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032178" version="1" comment="php5-suhosin is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032179" version="1" comment="php5-sysvmsg is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032180" version="1" comment="php5-sysvsem is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032181" version="1" comment="php5-sysvshm is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032182" version="1" comment="php5-tokenizer is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032183" version="1" comment="php5-wddx is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032184" version="1" comment="php5-xmlreader is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032185" version="1" comment="php5-xmlrpc is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032186" version="1" comment="php5-xmlwriter is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032187" version="1" comment="php5-xsl is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032188" version="1" comment="php5-zip is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032189" version="1" comment="php5-zlib is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057521" version="1" comment="avahi is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057520" version="1" comment="avahi-lang is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057524" version="1" comment="libavahi-client3 is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057522" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057523" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057527" version="1" comment="libavahi-common3 is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057525" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057526" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057528" version="1" comment="libavahi-core5 is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057531" version="1" comment="libdns_sd is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057529" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057530" version="1" comment="libdns_sd-x86 is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060801" version="1" comment="mono-core is &lt;2.0.1-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060804" version="1" comment="mono-data is &lt;2.0.1-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060802" version="1" comment="mono-data-postgresql is &lt;2.0.1-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060803" version="1" comment="mono-data-sqlite is &lt;2.0.1-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060805" version="1" comment="mono-locale-extras is &lt;2.0.1-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060806" version="1" comment="mono-nunit is &lt;2.0.1-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060807" version="1" comment="mono-web is &lt;2.0.1-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060808" version="1" comment="mono-winforms is &lt;2.0.1-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062890" version="1" comment="cifs-mount is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062891" version="1" comment="ldapsmb is &lt;1.34b-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062894" version="1" comment="libsmbclient0 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062892" version="1" comment="libsmbclient0-32bit is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062893" version="1" comment="libsmbclient0-x86 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062897" version="1" comment="libtalloc1 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062895" version="1" comment="libtalloc1-32bit is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062896" version="1" comment="libtalloc1-x86 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062900" version="1" comment="libtdb1 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062898" version="1" comment="libtdb1-32bit is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062899" version="1" comment="libtdb1-x86 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062903" version="1" comment="libwbclient0 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062901" version="1" comment="libwbclient0-32bit is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062902" version="1" comment="libwbclient0-x86 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062913" version="1" comment="samba is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062904" version="1" comment="samba-32bit is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062907" version="1" comment="samba-client is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062905" version="1" comment="samba-client-32bit is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062906" version="1" comment="samba-client-x86 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062908" version="1" comment="samba-krb-printing is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062911" version="1" comment="samba-winbind is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062909" version="1" comment="samba-winbind-32bit is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062910" version="1" comment="samba-winbind-x86 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062912" version="1" comment="samba-x86 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052857" version="1" comment="clamav is &lt;0.95.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107270" version="1" comment="libgcc43 is &lt;4.3.3_20081022-11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107269" version="1" comment="libgcc43-32bit is &lt;4.3.3_20081022-11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107271" version="1" comment="libgcc43-x86 is &lt;4.3.3_20081022-11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111704" version="1" comment="libstdc++43 is &lt;4.3.3_20081022-11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111749" version="1" comment="libstdc++43-32bit is &lt;4.3.3_20081022-11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111774" version="1" comment="libstdc++43-x86 is &lt;4.3.3_20081022-11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060051" version="1" comment="cpio is &lt;2.9-75.27.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060050" version="1" comment="cpio-lang is &lt;2.9-75.27.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058917" version="1" comment="cron is &lt;4.1-194.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032215" version="1" comment="cups is &lt;1.3.9-8.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032211" version="1" comment="cups-client is &lt;1.3.9-8.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032214" version="1" comment="cups-libs is &lt;1.3.9-8.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032212" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032213" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032191" version="1" comment="curl is &lt;7.19.0-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053899" version="1" comment="keyutils-libs is &lt;1.2-107.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053897" version="1" comment="keyutils-libs-32bit is &lt;1.2-107.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053898" version="1" comment="keyutils-libs-x86 is &lt;1.2-107.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032194" version="1" comment="libcurl4 is &lt;7.19.0-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032192" version="1" comment="libcurl4-32bit is &lt;7.19.0-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032193" version="1" comment="libcurl4-x86 is &lt;7.19.0-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053905" version="1" comment="libidn is &lt;1.10-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053903" version="1" comment="libidn-32bit is &lt;1.10-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053904" version="1" comment="libidn-x86 is &lt;1.10-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032308" version="1" comment="cyrus-sasl is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032293" version="1" comment="cyrus-sasl-32bit is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032296" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032294" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032295" version="1" comment="cyrus-sasl-crammd5-x86 is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032297" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032300" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032298" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032299" version="1" comment="cyrus-sasl-gssapi-x86 is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032303" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032301" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032302" version="1" comment="cyrus-sasl-otp-x86 is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032306" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032304" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032305" version="1" comment="cyrus-sasl-plain-x86 is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032307" version="1" comment="cyrus-sasl-x86 is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032118" version="1" comment="dbus-1 is &lt;1.2.10-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032116" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032117" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111705" version="1" comment="dbus-1-glib is &lt;0.76-34.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111750" version="1" comment="dbus-1-glib-32bit is &lt;0.76-34.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111775" version="1" comment="dbus-1-glib-x86 is &lt;0.76-34.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053395" version="1" comment="dhcp-client is &lt;3.1.1-7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054813" version="1" comment="dnsmasq is &lt;2.45-12.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054498" version="1" comment="wireshark is &lt;1.0.5-1.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032244" version="1" comment="evolution-data-server is &lt;2.24.1.1-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032241" version="1" comment="evolution-data-server-32bit is &lt;2.24.1.1-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032242" version="1" comment="evolution-data-server-lang is &lt;2.24.1.1-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032243" version="1" comment="evolution-data-server-x86 is &lt;2.24.1.1-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032246" version="1" comment="gtkhtml2 is &lt;3.24.1.1-3.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032245" version="1" comment="gtkhtml2-lang is &lt;3.24.1.1-3.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058660" version="1" comment="evolution-data-server is &lt;2.24.1.1-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058657" version="1" comment="evolution-data-server-32bit is &lt;2.24.1.1-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058658" version="1" comment="evolution-data-server-lang is &lt;2.24.1.1-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058659" version="1" comment="evolution-data-server-x86 is &lt;2.24.1.1-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056526" version="1" comment="cdparanoia is &lt;IIIalpha9.8-691.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056524" version="1" comment="cdparanoia-32bit is &lt;IIIalpha9.8-691.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056525" version="1" comment="cdparanoia-x86 is &lt;IIIalpha9.8-691.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056527" version="1" comment="desktop-file-utils is &lt;0.15-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056530" version="1" comment="fam is &lt;2.7.0-130.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056528" version="1" comment="fam-32bit is &lt;2.7.0-130.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056529" version="1" comment="fam-x86 is &lt;2.7.0-130.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056533" version="1" comment="gnome-vfs2 is &lt;2.24.0-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056531" version="1" comment="gnome-vfs2-32bit is &lt;2.24.0-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056532" version="1" comment="gnome-vfs2-x86 is &lt;2.24.0-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056534" version="1" comment="gstreamer-0_10 is &lt;0.10.21-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056537" version="1" comment="libogg0 is &lt;1.1.3-87.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056535" version="1" comment="libogg0-32bit is &lt;1.1.3-87.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056536" version="1" comment="libogg0-x86 is &lt;1.1.3-87.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056540" version="1" comment="liboil is &lt;0.3.15-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056538" version="1" comment="liboil-32bit is &lt;0.3.15-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056539" version="1" comment="liboil-x86 is &lt;0.3.15-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032329" version="1" comment="freetype2 is &lt;2.3.7-25.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032327" version="1" comment="freetype2-32bit is &lt;2.3.7-25.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032328" version="1" comment="freetype2-x86 is &lt;2.3.7-25.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064418" version="1" comment="gdm is &lt;2.24.0-24.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064416" version="1" comment="gdm-branding-upstream is &lt;2.24.0-24.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064417" version="1" comment="gdm-lang is &lt;2.24.0-24.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032106" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032107" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032108" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032109" version="1" comment="ghostscript-library is &lt;8.62-32.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032110" version="1" comment="ghostscript-omni is &lt;8.62-32.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032111" version="1" comment="ghostscript-x11 is &lt;8.62-32.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032112" version="1" comment="libgimpprint is &lt;4.2.7-32.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032121" version="1" comment="glib2 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032119" version="1" comment="glib2-doc is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032120" version="1" comment="glib2-lang is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032124" version="1" comment="libgio-2_0-0 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032122" version="1" comment="libgio-2_0-0-32bit is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032123" version="1" comment="libgio-2_0-0-x86 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032127" version="1" comment="libglib-2_0-0 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032125" version="1" comment="libglib-2_0-0-32bit is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032126" version="1" comment="libglib-2_0-0-x86 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032130" version="1" comment="libgmodule-2_0-0 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032128" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032129" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032133" version="1" comment="libgobject-2_0-0 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032131" version="1" comment="libgobject-2_0-0-32bit is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032132" version="1" comment="libgobject-2_0-0-x86 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032136" version="1" comment="libgthread-2_0-0 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032134" version="1" comment="libgthread-2_0-0-32bit is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032135" version="1" comment="libgthread-2_0-0-x86 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064043" version="1" comment="glibc is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064033" version="1" comment="glibc-32bit is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064035" version="1" comment="glibc-devel is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064034" version="1" comment="glibc-devel-32bit is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064036" version="1" comment="glibc-html is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064037" version="1" comment="glibc-i18ndata is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064038" version="1" comment="glibc-info is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064040" version="1" comment="glibc-locale is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064039" version="1" comment="glibc-locale-32bit is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107250" version="1" comment="glibc-locale-x86 is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064042" version="1" comment="glibc-profile is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064041" version="1" comment="glibc-profile-32bit is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107251" version="1" comment="glibc-profile-x86 is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107252" version="1" comment="glibc-x86 is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064044" version="1" comment="nscd is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059226" version="1" comment="gnome-screensaver is &lt;2.24.0-14.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059225" version="1" comment="gnome-screensaver-lang is &lt;2.24.0-14.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032137" version="1" comment="gnutls is &lt;2.4.1-24.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032140" version="1" comment="libgnutls26 is &lt;2.4.1-24.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032138" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032139" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061952" version="1" comment="gpg2 is &lt;2.0.9-25.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061951" version="1" comment="gpg2-lang is &lt;2.0.9-25.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061955" version="1" comment="libgcrypt11 is &lt;1.4.1-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061953" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061954" version="1" comment="libgcrypt11-x86 is &lt;1.4.1-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111706" version="1" comment="libgpg-error0 is &lt;1.6-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111751" version="1" comment="libgpg-error0-32bit is &lt;1.6-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111776" version="1" comment="libgpg-error0-x86 is &lt;1.6-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111707" version="1" comment="libksba is &lt;1.0.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032258" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.21-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032254" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.21-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032255" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.21-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032256" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.21-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032257" version="1" comment="gstreamer-0_10-plugins-base-x86 is &lt;0.10.21-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032261" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.21-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032259" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.21-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032260" version="1" comment="libgstinterfaces-0_10-0-x86 is &lt;0.10.21-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053081" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.10-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053079" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.10-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053080" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.10-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053693" version="1" comment="libicu is &lt;4.0-7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053691" version="1" comment="libicu-32bit is &lt;4.0-7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053692" version="1" comment="libicu-doc is &lt;4.0-7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032397" version="1" comment="ipsec-tools is &lt;0.7.1-10.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062382" version="1" comment="iscsitarget is &lt;0.4.15-94.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062377" version="1" comment="iscsitarget-kmp-default is &lt;0.4.15_2.6.27.48_0.6-94.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062378" version="1" comment="iscsitarget-kmp-pae is &lt;0.4.15_2.6.27.48_0.6-94.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062379" version="1" comment="iscsitarget-kmp-ppc64 is &lt;0.4.15_2.6.27.48_0.6-94.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062380" version="1" comment="iscsitarget-kmp-vmi is &lt;0.4.15_2.6.27.48_0.6-94.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062381" version="1" comment="iscsitarget-kmp-xen is &lt;0.4.15_2.6.27.48_0.6-94.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032115" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032113" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032114" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111777" version="1" comment="java-1_5_0-bea is &lt;1.5.0.13.1.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111778" version="1" comment="java-1_5_0-bea-console is &lt;1.5.0.13.1.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111779" version="1" comment="java-1_5_0-bea-fonts is &lt;1.5.0.13.1.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111780" version="1" comment="java-1_5_0-bea-jdbc is &lt;1.5.0.13.1.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032145" version="1" comment="java-1_6_0-ibm is &lt;1.6.0-124.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032141" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0-124.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053022" version="1" comment="java-1_6_0-ibm-alsa-x86 is &lt;1.6.0-124.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032142" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0-124.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032143" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0-124.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032144" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0-124.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053027" version="1" comment="java-1_6_0-ibm-x86 is &lt;1.6.0-124.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111753" version="1" comment="kde4-akonadi is &lt;4.1.3-9.14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111754" version="1" comment="kde4-akregator is &lt;4.1.3-9.14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111755" version="1" comment="kde4-kaddressbook is &lt;4.1.3-9.14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111756" version="1" comment="kde4-kalarm is &lt;4.1.3-9.14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111757" version="1" comment="kde4-kjots is &lt;4.1.3-9.14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111758" version="1" comment="kde4-kmail is &lt;4.1.3-9.14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111759" version="1" comment="kde4-knode is &lt;4.1.3-9.14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111760" version="1" comment="kde4-knotes is &lt;4.1.3-9.14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111761" version="1" comment="kde4-kontact is &lt;4.1.3-9.14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111762" version="1" comment="kde4-korganizer is &lt;4.1.3-9.14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111763" version="1" comment="kde4-ktimetracker is &lt;4.1.3-9.14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111764" version="1" comment="kde4-ktnef is &lt;4.1.3-9.14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111765" version="1" comment="kdepim4 is &lt;4.1.3-9.14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111766" version="1" comment="kdepim4-wizards is &lt;4.1.3-9.14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111722" version="1" comment="kdepimlibs4 is &lt;4.1.3-9.28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111723" version="1" comment="libakonadi4 is &lt;4.1.3-9.28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111767" version="1" comment="libkdepim4 is &lt;4.1.3-9.14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111725" version="1" comment="libkdepimlibs4 is &lt;4.1.3-9.28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063238" version="1" comment="kde4-gwenview is &lt;4.1.3-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063239" version="1" comment="kde4-kcolorchooser is &lt;4.1.3-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063240" version="1" comment="kde4-kruler is &lt;4.1.3-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063241" version="1" comment="kde4-ksnapshot is &lt;4.1.3-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063242" version="1" comment="kde4-okular is &lt;4.1.3-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063243" version="1" comment="libkipi5 is &lt;4.1.3-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059657" version="1" comment="kde4-kdm is &lt;4.1.3-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059658" version="1" comment="kde4-kgreeter-plugins is &lt;4.1.3-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059659" version="1" comment="kde4-kwin is &lt;4.1.3-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059661" version="1" comment="kdebase4-workspace is &lt;4.1.3-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059660" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.1.3-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065165" version="1" comment="kde4-kget is &lt;4.1.3-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065166" version="1" comment="kde4-knewsticker is &lt;4.1.3-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065167" version="1" comment="kde4-kopete is &lt;4.1.3-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065168" version="1" comment="kde4-krdc is &lt;4.1.3-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065169" version="1" comment="kde4-krfb is &lt;4.1.3-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065170" version="1" comment="kdenetwork4-filesharing is &lt;4.1.3-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064868" version="1" comment="kdelibs3 is &lt;3.5.10-23.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064863" version="1" comment="kdelibs3-32bit is &lt;3.5.10-23.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064866" version="1" comment="kdelibs3-default-style is &lt;3.5.10-23.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064864" version="1" comment="kdelibs3-default-style-32bit is &lt;3.5.10-23.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064865" version="1" comment="kdelibs3-default-style-x86 is &lt;3.5.10-23.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064867" version="1" comment="kdelibs3-x86 is &lt;3.5.10-23.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064870" version="1" comment="kdelibs4 is &lt;4.1.3-8.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064869" version="1" comment="kdelibs4-core is &lt;4.1.3-8.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064873" version="1" comment="libkde4 is &lt;4.1.3-8.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064871" version="1" comment="libkde4-32bit is &lt;4.1.3-8.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064872" version="1" comment="libkde4-x86 is &lt;4.1.3-8.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064876" version="1" comment="libkdecore4 is &lt;4.1.3-8.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064874" version="1" comment="libkdecore4-32bit is &lt;4.1.3-8.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064875" version="1" comment="libkdecore4-x86 is &lt;4.1.3-8.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057159" version="1" comment="kdelibs4 is &lt;4.1.3-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057158" version="1" comment="kdelibs4-core is &lt;4.1.3-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057162" version="1" comment="libkde4 is &lt;4.1.3-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057160" version="1" comment="libkde4-32bit is &lt;4.1.3-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057161" version="1" comment="libkde4-x86 is &lt;4.1.3-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057165" version="1" comment="libkdecore4 is &lt;4.1.3-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057163" version="1" comment="libkdecore4-32bit is &lt;4.1.3-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057164" version="1" comment="libkdecore4-x86 is &lt;4.1.3-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057168" version="1" comment="utempter is &lt;0.5.5-106.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057166" version="1" comment="utempter-32bit is &lt;0.5.5-106.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057167" version="1" comment="utempter-x86 is &lt;0.5.5-106.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032343" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.23_0.1-7.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032353" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.27.23_0.1-7.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032344" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.23_0.1-7.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032354" version="1" comment="ext4dev-kmp-vmi is &lt;0_2.6.27.23_0.1-7.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032355" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.27.23_0.1-7.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063861" version="1" comment="iscsitarget-kmp-default is &lt;0.4.15_2.6.27.54_0.2-94.14.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032346" version="1" comment="kernel-default is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032345" version="1" comment="kernel-default-base is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032352" version="1" comment="kernel-default-man is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032347" version="1" comment="kernel-kdump is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032357" version="1" comment="kernel-pae is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032356" version="1" comment="kernel-pae-base is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032349" version="1" comment="kernel-ppc64 is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032348" version="1" comment="kernel-ppc64-base is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032350" version="1" comment="kernel-source is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032351" version="1" comment="kernel-syms is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032359" version="1" comment="kernel-vmi is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032358" version="1" comment="kernel-vmi-base is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032361" version="1" comment="kernel-xen is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032360" version="1" comment="kernel-xen-base is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063863" version="1" comment="oracleasm-kmp-default is &lt;2.0.5_2.6.27.54_0.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032319" version="1" comment="krb5 is &lt;1.6.3-133.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032313" version="1" comment="krb5-32bit is &lt;1.6.3-133.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032314" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032315" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032316" version="1" comment="krb5-client is &lt;1.6.3-133.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032317" version="1" comment="krb5-server is &lt;1.6.3-133.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032318" version="1" comment="krb5-x86 is &lt;1.6.3-133.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056326" version="1" comment="kvm is &lt;78.0.10.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056324" version="1" comment="kvm-kmp-default is &lt;78.2.6.30.1_2.6.27.37_0.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056325" version="1" comment="kvm-kmp-pae is &lt;78.2.6.30.1_2.6.27.37_0.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032237" version="1" comment="lcms is &lt;1.17-77.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032240" version="1" comment="liblcms1 is &lt;1.17-77.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032238" version="1" comment="liblcms1-32bit is &lt;1.17-77.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032239" version="1" comment="liblcms1-x86 is &lt;1.17-77.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063457" version="1" comment="libHX13 is &lt;1.23-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063455" version="1" comment="libHX13-32bit is &lt;1.23-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063456" version="1" comment="libHX13-x86 is &lt;1.23-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053394" version="1" comment="libapr-util1 is &lt;1.3.4-12.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053393" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060265" version="1" comment="libesmtp is &lt;1.0.4-157.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064224" version="1" comment="libfreebl3 is &lt;3.12.8-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064222" version="1" comment="libfreebl3-32bit is &lt;3.12.8-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064223" version="1" comment="libfreebl3-x86 is &lt;3.12.8-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064227" version="1" comment="mozilla-nspr is &lt;4.8.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064225" version="1" comment="mozilla-nspr-32bit is &lt;4.8.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064226" version="1" comment="mozilla-nspr-x86 is &lt;4.8.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064231" version="1" comment="mozilla-nss is &lt;3.12.8-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064228" version="1" comment="mozilla-nss-32bit is &lt;3.12.8-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064229" version="1" comment="mozilla-nss-tools is &lt;3.12.8-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064230" version="1" comment="mozilla-nss-x86 is &lt;3.12.8-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059424" version="1" comment="zlib is &lt;1.2.3-106.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059422" version="1" comment="zlib-32bit is &lt;1.2.3-106.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059423" version="1" comment="zlib-x86 is &lt;1.2.3-106.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063122" version="1" comment="libgdiplus0 is &lt;2.0-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062039" version="1" comment="libldap-2_4-2 is &lt;2.4.12-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062037" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.12-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062038" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.12-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062042" version="1" comment="openldap2 is &lt;2.4.12-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062040" version="1" comment="openldap2-back-meta is &lt;2.4.12-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062041" version="1" comment="openldap2-client is &lt;2.4.12-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063485" version="1" comment="libmysqlclient15 is &lt;5.0.67-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063483" version="1" comment="libmysqlclient15-32bit is &lt;5.0.67-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063484" version="1" comment="libmysqlclient15-x86 is &lt;5.0.67-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063486" version="1" comment="libmysqlclient_r15 is &lt;5.0.67-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063489" version="1" comment="mysql is &lt;5.0.67-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063487" version="1" comment="mysql-Max is &lt;5.0.67-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063488" version="1" comment="mysql-client is &lt;5.0.67-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032376" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032374" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032375" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032378" version="1" comment="openssl is &lt;0.9.8h-30.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032377" version="1" comment="openssl-doc is &lt;0.9.8h-30.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032197" version="1" comment="libpng12-0 is &lt;1.2.31-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032195" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032196" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062260" version="1" comment="libpng12-0 is &lt;1.2.31-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062258" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062259" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064459" version="1" comment="libpoppler-glib4 is &lt;0.10.1-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064460" version="1" comment="libpoppler-qt4-3 is &lt;0.10.1-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064461" version="1" comment="libpoppler4 is &lt;0.10.1-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064462" version="1" comment="poppler-tools is &lt;0.10.1-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032208" version="1" comment="libpoppler4 is &lt;0.10.1-1.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064999" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064997" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064998" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.0-8.8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065011" version="1" comment="python is &lt;2.6.0-8.9.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065000" version="1" comment="python-32bit is &lt;2.6.0-8.9.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065003" version="1" comment="python-base is &lt;2.6.0-8.8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065001" version="1" comment="python-base-32bit is &lt;2.6.0-8.8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065002" version="1" comment="python-base-x86 is &lt;2.6.0-8.8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065004" version="1" comment="python-curses is &lt;2.6.0-8.9.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065005" version="1" comment="python-demo is &lt;2.6.0-8.9.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065006" version="1" comment="python-gdbm is &lt;2.6.0-8.9.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065007" version="1" comment="python-idle is &lt;2.6.0-8.9.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065008" version="1" comment="python-tk is &lt;2.6.0-8.9.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065009" version="1" comment="python-x86 is &lt;2.6.0-8.9.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065010" version="1" comment="python-xml is &lt;2.6.0-8.8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056149" version="1" comment="libqt4 is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056137" version="1" comment="libqt4-32bit is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056140" version="1" comment="libqt4-qt3support is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056138" version="1" comment="libqt4-qt3support-32bit is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056139" version="1" comment="libqt4-qt3support-x86 is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056144" version="1" comment="libqt4-sql is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056141" version="1" comment="libqt4-sql-32bit is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056142" version="1" comment="libqt4-sql-sqlite is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056143" version="1" comment="libqt4-sql-x86 is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056147" version="1" comment="libqt4-x11 is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056145" version="1" comment="libqt4-x11-32bit is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056146" version="1" comment="libqt4-x11-x86 is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056148" version="1" comment="libqt4-x86 is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053460" version="1" comment="libsndfile is &lt;1.0.17-172.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053458" version="1" comment="libsndfile-32bit is &lt;1.0.17-172.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053459" version="1" comment="libsndfile-x86 is &lt;1.0.17-172.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059266" version="1" comment="libtheora0 is &lt;1.0.beta2-6.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059264" version="1" comment="libtheora0-32bit is &lt;1.0.beta2-6.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059265" version="1" comment="libtheora0-x86 is &lt;1.0.beta2-6.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053721" version="1" comment="libtiff3 is &lt;3.8.2-141.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053719" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053720" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032337" version="1" comment="libvolume_id1 is &lt;128-13.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032338" version="1" comment="udev is &lt;128-13.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062641" version="1" comment="libvirt is &lt;0.4.6-14.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062639" version="1" comment="libvirt-doc is &lt;0.4.6-14.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062640" version="1" comment="libvirt-python is &lt;0.4.6-14.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064572" version="1" comment="libxml2 is &lt;2.7.1-10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064569" version="1" comment="libxml2-32bit is &lt;2.7.1-10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064570" version="1" comment="libxml2-doc is &lt;2.7.1-10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064571" version="1" comment="libxml2-x86 is &lt;2.7.1-10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062642" version="1" comment="lvm2 is &lt;2.02.39-18.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063774" version="1" comment="mipv6d is &lt;2.0.2-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056067" version="1" comment="mozilla-nspr is &lt;4.8.2-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056065" version="1" comment="mozilla-nspr-32bit is &lt;4.8.2-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056066" version="1" comment="mozilla-nspr-x86 is &lt;4.8.2-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032273" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032269" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032270" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032271" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032272" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064195" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064190" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064192" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064194" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070693" version="1" comment="mozilla-xulrunner191-x86 is &lt;1.9.1.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032210" version="1" comment="ntp is &lt;4.2.4p6-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032209" version="1" comment="ntp-doc is &lt;4.2.4p6-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054839" version="1" comment="open-iscsi is &lt;2.0.870-26.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064525" version="1" comment="openslp is &lt;1.2.0-172.10.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064522" version="1" comment="openslp-32bit is &lt;1.2.0-172.10.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064523" version="1" comment="openslp-server is &lt;1.2.0-172.10.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064524" version="1" comment="openslp-x86 is &lt;1.2.0-172.10.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032381" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032379" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032380" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032383" version="1" comment="openssl is &lt;0.9.8h-30.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032382" version="1" comment="openssl-doc is &lt;0.9.8h-30.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057436" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057434" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057435" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057438" version="1" comment="openssl is &lt;0.9.8h-30.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057437" version="1" comment="openssl-doc is &lt;0.9.8h-30.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032310" version="1" comment="openswan is &lt;2.6.16-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032309" version="1" comment="openswan-doc is &lt;2.6.16-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032365" version="1" comment="pango is &lt;1.22.1-3.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032362" version="1" comment="pango-32bit is &lt;1.22.1-3.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032363" version="1" comment="pango-doc is &lt;1.22.1-3.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032364" version="1" comment="pango-x86 is &lt;1.22.1-3.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062629" version="1" comment="pcsc-lite is &lt;1.4.102-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062627" version="1" comment="pcsc-lite-32bit is &lt;1.4.102-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062628" version="1" comment="pcsc-lite-x86 is &lt;1.4.102-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032388" version="1" comment="perl is &lt;5.10.0-64.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032384" version="1" comment="perl-32bit is &lt;5.10.0-64.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032385" version="1" comment="perl-base is &lt;5.10.0-64.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032386" version="1" comment="perl-doc is &lt;5.10.0-64.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032387" version="1" comment="perl-x86 is &lt;5.10.0-64.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054781" version="1" comment="perl-IO-Socket-SSL is &lt;1.16-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062632" version="1" comment="popt is &lt;1.7-37.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062630" version="1" comment="popt-32bit is &lt;1.7-37.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062631" version="1" comment="popt-x86 is &lt;1.7-37.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062635" version="1" comment="rpm is &lt;4.4.2.3-37.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062633" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062634" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032326" version="1" comment="postgresql is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032320" version="1" comment="postgresql-contrib is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032321" version="1" comment="postgresql-docs is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032324" version="1" comment="postgresql-libs is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032322" version="1" comment="postgresql-libs-32bit is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032323" version="1" comment="postgresql-libs-x86 is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032325" version="1" comment="postgresql-server is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060820" version="1" comment="puppet is &lt;0.24.5-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060819" version="1" comment="puppet-server is &lt;0.24.5-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056872" version="1" comment="pyxml is &lt;0.8.4-194.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032396" version="1" comment="quagga is &lt;0.99.10-17.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058473" version="1" comment="sendmail is &lt;8.14.3-50.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053194" version="1" comment="ruby is &lt;1.8.7.p72-5.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053192" version="1" comment="ruby-doc-html is &lt;1.8.7.p72-5.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053193" version="1" comment="ruby-tk is &lt;1.8.7.p72-5.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032402" version="1" comment="strongswan is &lt;4.2.8-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032401" version="1" comment="strongswan-doc is &lt;4.2.8-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061867" version="1" comment="systemtap is &lt;0.7.1-42.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062375" version="1" comment="tgt is &lt;0.9.0-1.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061665" version="1" comment="w3m is &lt;0.5.2-128.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053169" version="1" comment="websphere-as_ce is &lt;2.1.1.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032366" version="1" comment="wireshark is &lt;1.0.5-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060673" version="1" comment="libcmpiutil is &lt;0.5-15.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060677" version="1" comment="libvirt is &lt;0.4.6-14.60.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060674" version="1" comment="libvirt-cim is &lt;0.5.2-8.47.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060675" version="1" comment="libvirt-doc is &lt;0.4.6-14.60.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060676" version="1" comment="libvirt-python is &lt;0.4.6-14.60.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060678" version="1" comment="virt-manager is &lt;0.5.3-66.42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060679" version="1" comment="virt-viewer is &lt;0.0.3-3.57.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060680" version="1" comment="vm-install is &lt;0.3.27-0.1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060688" version="1" comment="xen is &lt;3.3.1_18546_24-0.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060681" version="1" comment="xen-doc-html is &lt;3.3.1_18546_24-0.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060682" version="1" comment="xen-doc-pdf is &lt;3.3.1_18546_24-0.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060683" version="1" comment="xen-kmp-default is &lt;3.3.1_18546_24_2.6.27.45_0.3-0.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060684" version="1" comment="xen-kmp-pae is &lt;3.3.1_18546_24_2.6.27.45_0.3-0.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060685" version="1" comment="xen-libs is &lt;3.3.1_18546_24-0.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060687" version="1" comment="xen-tools is &lt;3.3.1_18546_24-0.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060686" version="1" comment="xen-tools-domU is &lt;3.3.1_18546_24-0.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054298" version="1" comment="xerces-j2 is &lt;2.8.1-238.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054296" version="1" comment="xerces-j2-xml-apis is &lt;2.8.1-238.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054297" version="1" comment="xerces-j2-xml-resolver is &lt;2.8.1-238.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032398" version="1" comment="yast2-ldap-server is &lt;2.17.21-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068810" version="1" comment="ConsoleKit is &lt;0.2.10-64.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068807" version="1" comment="ConsoleKit-32bit is &lt;0.2.10-64.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068808" version="1" comment="ConsoleKit-x11 is &lt;0.2.10-64.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068809" version="1" comment="ConsoleKit-x86 is &lt;0.2.10-64.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104180" version="1" comment="MozillaFirefox is &lt;24.6.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104178" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.4.10.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104179" version="1" comment="MozillaFirefox-translations is &lt;24.6.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104182" version="1" comment="libfreebl3 is &lt;3.16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104181" version="1" comment="libfreebl3-32bit is &lt;3.16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104185" version="1" comment="mozilla-nss is &lt;3.16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104183" version="1" comment="mozilla-nss-32bit is &lt;3.16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104184" version="1" comment="mozilla-nss-tools is &lt;3.16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074670" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074669" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103960" version="1" comment="Mesa is &lt;7.7-5.12.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103959" version="1" comment="Mesa-32bit is &lt;7.7-5.12.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074632" version="1" comment="MozillaFirefox is &lt;10.0.5-0.3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074631" version="1" comment="MozillaFirefox-translations is &lt;10.0.5-0.3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074635" version="1" comment="libfreebl3 is &lt;3.13.5-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074633" version="1" comment="libfreebl3-32bit is &lt;3.13.5-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074634" version="1" comment="libfreebl3-x86 is &lt;3.13.5-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074638" version="1" comment="mozilla-nspr is &lt;4.9.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074636" version="1" comment="mozilla-nspr-32bit is &lt;4.9.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074637" version="1" comment="mozilla-nspr-x86 is &lt;4.9.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074642" version="1" comment="mozilla-nss is &lt;3.13.5-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074639" version="1" comment="mozilla-nss-32bit is &lt;3.13.5-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074640" version="1" comment="mozilla-nss-tools is &lt;3.13.5-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074641" version="1" comment="mozilla-nss-x86 is &lt;3.13.5-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104171" version="1" comment="MozillaFirefox is &lt;24.5.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104169" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.4.10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104170" version="1" comment="MozillaFirefox-translations is &lt;24.5.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104173" version="1" comment="libfreebl3 is &lt;3.16-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104172" version="1" comment="libfreebl3-32bit is &lt;3.16-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104176" version="1" comment="mozilla-nss is &lt;3.16-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104174" version="1" comment="mozilla-nss-32bit is &lt;3.16-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104175" version="1" comment="mozilla-nss-tools is &lt;3.16-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071990" version="1" comment="NetworkManager is &lt;0.7.1_git20090811-3.9.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071988" version="1" comment="NetworkManager-glib is &lt;0.7.1_git20090811-3.9.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071989" version="1" comment="NetworkManager-gnome is &lt;0.7.1-5.15.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071991" version="1" comment="wpa_supplicant is &lt;0.6.9-4.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072967" version="1" comment="NetworkManager-gnome is &lt;0.7.1-5.15.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068388" version="1" comment="aaa_base is &lt;11-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072981" version="1" comment="apache2 is &lt;2.2.12-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072976" version="1" comment="apache2-doc is &lt;2.2.12-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072977" version="1" comment="apache2-example-pages is &lt;2.2.12-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072978" version="1" comment="apache2-prefork is &lt;2.2.12-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072979" version="1" comment="apache2-utils is &lt;2.2.12-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072980" version="1" comment="apache2-worker is &lt;2.2.12-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075365" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111793" version="1" comment="php5 is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075366" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075367" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075368" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075369" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075370" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075371" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075372" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075373" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075374" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075375" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075376" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075377" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075378" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075379" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075380" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075381" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075382" version="1" comment="php5-json is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075383" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075384" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075385" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075386" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075387" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075388" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075389" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075390" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075391" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075392" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075393" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075394" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075395" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075396" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075397" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075398" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075399" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075400" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075401" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075402" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075403" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075404" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075405" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075406" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075407" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075408" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075179" version="1" comment="apache2-mod_python is &lt;3.3.1-147.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075180" version="1" comment="arpwatch is &lt;2.1a15-131.23.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075166" version="1" comment="bash is &lt;3.2-147.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075165" version="1" comment="bash-doc is &lt;3.2-147.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075181" version="1" comment="bash-x86 is &lt;3.2-147.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075168" version="1" comment="libreadline5 is &lt;5.2-147.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075167" version="1" comment="libreadline5-32bit is &lt;5.2-147.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075182" version="1" comment="libreadline5-x86 is &lt;5.2-147.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075169" version="1" comment="readline-doc is &lt;5.2-147.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075470" version="1" comment="bind is &lt;9.6ESVR7P2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075467" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075468" version="1" comment="bind-doc is &lt;9.6ESVR7P2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075459" version="1" comment="bind-libs is &lt;9.6ESVR7P2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075458" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075469" version="1" comment="bind-libs-x86 is &lt;9.6ESVR7P2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075460" version="1" comment="bind-utils is &lt;9.6ESVR7P2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111673" version="1" comment="bind is &lt;9.6ESVR11W1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111674" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111675" version="1" comment="bind-devel is &lt;9.6ESVR11W1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111676" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111678" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111677" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111681" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114164" version="1" comment="bind is &lt;9.6ESVR11W1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114165" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114166" version="1" comment="bind-devel is &lt;9.6ESVR11W1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114167" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114168" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114170" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114169" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067793" version="1" comment="mono-core is &lt;2.0.1-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067796" version="1" comment="mono-data is &lt;2.0.1-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067794" version="1" comment="mono-data-postgresql is &lt;2.0.1-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067795" version="1" comment="mono-data-sqlite is &lt;2.0.1-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067797" version="1" comment="mono-locale-extras is &lt;2.0.1-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067798" version="1" comment="mono-nunit is &lt;2.0.1-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067799" version="1" comment="mono-web is &lt;2.0.1-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067800" version="1" comment="mono-winforms is &lt;2.0.1-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073902" version="1" comment="cifs-mount is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073903" version="1" comment="ldapsmb is &lt;1.34b-11.28.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073906" version="1" comment="libsmbclient0 is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073904" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073905" version="1" comment="libsmbclient0-x86 is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073909" version="1" comment="libtalloc1 is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073907" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073908" version="1" comment="libtalloc1-x86 is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073912" version="1" comment="libtdb1 is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073910" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073911" version="1" comment="libtdb1-x86 is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073915" version="1" comment="libwbclient0 is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073913" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073914" version="1" comment="libwbclient0-x86 is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073926" version="1" comment="samba is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073916" version="1" comment="samba-32bit is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073919" version="1" comment="samba-client is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073917" version="1" comment="samba-client-32bit is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073918" version="1" comment="samba-client-x86 is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073920" version="1" comment="samba-doc is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073921" version="1" comment="samba-krb-printing is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073924" version="1" comment="samba-winbind is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073922" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073923" version="1" comment="samba-winbind-x86 is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073925" version="1" comment="samba-x86 is &lt;3.4.3-1.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074896" version="1" comment="clamav is &lt;0.97.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067732" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067734" version="1" comment="openldap2 is &lt;2.4.20-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067733" version="1" comment="openldap2-back-meta is &lt;2.4.20-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072290" version="1" comment="coreutils is &lt;6.12-32.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072288" version="1" comment="coreutils-lang is &lt;6.12-32.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072289" version="1" comment="coreutils-x86 is &lt;6.12-32.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107488" version="1" comment="curl is &lt;7.19.7-1.20.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107490" version="1" comment="libcurl4 is &lt;7.19.7-1.20.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107489" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069422" version="1" comment="dbus-1 is &lt;1.2.10-3.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069420" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067851" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069421" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063823" version="1" comment="dbus-1-glib is &lt;0.76-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063821" version="1" comment="dbus-1-glib-32bit is &lt;0.76-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063822" version="1" comment="dbus-1-glib-x86 is &lt;0.76-34.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075240" version="1" comment="dhcp is &lt;3.1.3.ESV-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075239" version="1" comment="dhcp-client is &lt;3.1.3.ESV-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075253" version="1" comment="dhcp-relay is &lt;3.1.3.ESV-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075254" version="1" comment="dhcp-server is &lt;3.1.3.ESV-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072843" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072846" version="1" comment="mozilla-kde4-integration is &lt;0.6.3-5.6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073980" version="1" comment="MozillaFirefox is &lt;10.0.4-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073979" version="1" comment="MozillaFirefox-translations is &lt;10.0.4-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073983" version="1" comment="libfreebl3 is &lt;3.13.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073981" version="1" comment="libfreebl3-32bit is &lt;3.13.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073982" version="1" comment="libfreebl3-x86 is &lt;3.13.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073987" version="1" comment="mozilla-nss is &lt;3.13.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073984" version="1" comment="mozilla-nss-32bit is &lt;3.13.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073985" version="1" comment="mozilla-nss-tools is &lt;3.13.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073986" version="1" comment="mozilla-nss-x86 is &lt;3.13.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075008" version="1" comment="MozillaFirefox is &lt;10.0.6-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075006" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075007" version="1" comment="MozillaFirefox-translations is &lt;10.0.6-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103839" version="1" comment="MozillaFirefox is &lt;10.0.12-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103837" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103838" version="1" comment="MozillaFirefox-translations is &lt;10.0.12-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103901" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103916" version="1" comment="MozillaFirefox is &lt;17.0.10esr-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103914" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103915" version="1" comment="MozillaFirefox-translations is &lt;17.0.10esr-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103904" version="1" comment="MozillaFirefox is &lt;24.3.0esr-0.4.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103902" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.4.10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103903" version="1" comment="MozillaFirefox-translations is &lt;24.3.0esr-0.4.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103905" version="1" comment="firefox-libgcc_s1 is &lt;4.7.2_20130108-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103906" version="1" comment="firefox-libstdc++6 is &lt;4.7.2_20130108-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103908" version="1" comment="libfreebl3 is &lt;3.15.4-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103907" version="1" comment="libfreebl3-32bit is &lt;3.15.4-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103910" version="1" comment="mozilla-nspr is &lt;4.10.2-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103909" version="1" comment="mozilla-nspr-32bit is &lt;4.10.2-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103913" version="1" comment="mozilla-nss is &lt;3.15.4-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103911" version="1" comment="mozilla-nss-32bit is &lt;3.15.4-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103912" version="1" comment="mozilla-nss-tools is &lt;3.15.4-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104188" version="1" comment="MozillaFirefox is &lt;24.7.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104187" version="1" comment="MozillaFirefox-translations is &lt;24.7.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104190" version="1" comment="libfreebl3 is &lt;3.16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104189" version="1" comment="libfreebl3-32bit is &lt;3.16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104194" version="1" comment="mozilla-nss is &lt;3.16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104191" version="1" comment="mozilla-nss-32bit is &lt;3.16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104193" version="1" comment="mozilla-nss-tools is &lt;3.16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104196" version="1" comment="MozillaFirefox is &lt;24.8.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104195" version="1" comment="MozillaFirefox-translations is &lt;24.8.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104198" version="1" comment="libfreebl3 is &lt;3.16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104197" version="1" comment="libfreebl3-32bit is &lt;3.16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104201" version="1" comment="mozilla-nss is &lt;3.16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104199" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104200" version="1" comment="mozilla-nss-tools is &lt;3.16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104222" version="1" comment="MozillaFirefox is &lt;31.3.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104221" version="1" comment="MozillaFirefox-translations is &lt;31.3.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105639" version="1" comment="MozillaFirefox is &lt;31.4.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105638" version="1" comment="MozillaFirefox-translations is &lt;31.4.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105641" version="1" comment="libfreebl3 is &lt;3.17.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105640" version="1" comment="libfreebl3-32bit is &lt;3.17.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105645" version="1" comment="mozilla-nss is &lt;3.17.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105642" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105644" version="1" comment="mozilla-nss-tools is &lt;3.17.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108157" version="1" comment="MozillaFirefox is &lt;31.5.3esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108156" version="1" comment="MozillaFirefox-translations is &lt;31.5.3esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114230" version="1" comment="MozillaFirefox is &lt;38.2.1esr-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114231" version="1" comment="MozillaFirefox-translations is &lt;38.2.1esr-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104211" version="1" comment="MozillaFirefox is &lt;31.2.0esr-0.11.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104209" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104210" version="1" comment="MozillaFirefox-translations is &lt;31.2.0esr-0.11.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104213" version="1" comment="libfreebl3 is &lt;3.17.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104212" version="1" comment="libfreebl3-32bit is &lt;3.17.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104216" version="1" comment="mozilla-nss is &lt;3.17.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104214" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104215" version="1" comment="mozilla-nss-tools is &lt;3.17.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073468" version="1" comment="freetype2 is &lt;2.3.7-25.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073466" version="1" comment="freetype2-32bit is &lt;2.3.7-25.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073467" version="1" comment="freetype2-x86 is &lt;2.3.7-25.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073469" version="1" comment="ft2demos is &lt;2.3.7-25.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064415" version="1" comment="gdm is &lt;2.24.0-24.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064413" version="1" comment="gdm-branding-upstream is &lt;2.24.0-24.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064414" version="1" comment="gdm-lang is &lt;2.24.0-24.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107261" version="1" comment="glibc is &lt;2.11.1-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107255" version="1" comment="glibc-32bit is &lt;2.11.1-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107257" version="1" comment="glibc-devel is &lt;2.11.1-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107256" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107253" version="1" comment="glibc-html is &lt;2.11.1-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107258" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107254" version="1" comment="glibc-info is &lt;2.11.1-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107260" version="1" comment="glibc-locale is &lt;2.11.1-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107259" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107263" version="1" comment="glibc-locale-x86 is &lt;2.11.1-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107266" version="1" comment="glibc-profile is &lt;2.11.1-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107264" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107265" version="1" comment="glibc-profile-x86 is &lt;2.11.1-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107267" version="1" comment="glibc-x86 is &lt;2.11.1-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107262" version="1" comment="nscd is &lt;2.11.1-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069853" version="1" comment="glibc is &lt;2.11.1-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069840" version="1" comment="glibc-32bit is &lt;2.11.1-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069842" version="1" comment="glibc-devel is &lt;2.11.1-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069841" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069843" version="1" comment="glibc-html is &lt;2.11.1-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069844" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069845" version="1" comment="glibc-info is &lt;2.11.1-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069848" version="1" comment="glibc-locale is &lt;2.11.1-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069846" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069847" version="1" comment="glibc-locale-x86 is &lt;2.11.1-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069851" version="1" comment="glibc-profile is &lt;2.11.1-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069849" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069850" version="1" comment="glibc-profile-x86 is &lt;2.11.1-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069852" version="1" comment="glibc-x86 is &lt;2.11.1-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069856" version="1" comment="libxcrypt is &lt;3.0.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069854" version="1" comment="libxcrypt-32bit is &lt;3.0.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069855" version="1" comment="libxcrypt-x86 is &lt;3.0.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069857" version="1" comment="nscd is &lt;2.11.1-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069860" version="1" comment="pam-modules is &lt;11-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069858" version="1" comment="pam-modules-32bit is &lt;11-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069859" version="1" comment="pam-modules-x86 is &lt;11-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069862" version="1" comment="pwdutils is &lt;3.2.8-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069861" version="1" comment="pwdutils-plugin-audit is &lt;3.2.8-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074805" version="1" comment="gnutls is &lt;2.4.1-24.39.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074808" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074807" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074806" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074809" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074879" version="1" comment="gtk2 is &lt;2.18.9-0.20.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074876" version="1" comment="gtk2-32bit is &lt;2.18.9-0.20.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074888" version="1" comment="gtk2-doc is &lt;2.18.9-0.20.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074878" version="1" comment="gtk2-lang is &lt;2.18.9-0.20.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074889" version="1" comment="gtk2-x86 is &lt;2.18.9-0.20.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063244" version="1" comment="gwenview is &lt;4.3.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063245" version="1" comment="kcolorchooser is &lt;4.3.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063246" version="1" comment="kruler is &lt;4.3.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063247" version="1" comment="ksnapshot is &lt;4.3.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063248" version="1" comment="libkexiv2-7 is &lt;4.3.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063249" version="1" comment="libkipi6 is &lt;4.3.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063250" version="1" comment="okular is &lt;4.3.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111797" version="1" comment="iscsitarget is &lt;1.4.19-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111798" version="1" comment="iscsitarget-kmp-default is &lt;1.4.19_2.6.32.19_0.2-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111799" version="1" comment="iscsitarget-kmp-pae is &lt;1.4.19_2.6.32.19_0.2-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111831" version="1" comment="iscsitarget-kmp-ppc64 is &lt;1.4.19_2.6.32.19_0.2-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111800" version="1" comment="iscsitarget-kmp-xen is &lt;1.4.19_2.6.32.19_0.2-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072188" version="1" comment="libjasper is &lt;1.900.1-134.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072186" version="1" comment="libjasper-32bit is &lt;1.900.1-134.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072187" version="1" comment="libjasper-x86 is &lt;1.900.1-134.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074567" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074565" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074566" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074121" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr10.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074117" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr10.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074118" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr10.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074119" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr10.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074120" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr10.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114248" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.7-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114250" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.7-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114251" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.7-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067731" version="1" comment="kbd is &lt;1.14.1-16.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074197" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.59_0.3-0.3.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074223" version="1" comment="btrfs-kmp-pae is &lt;0_2.6.32.59_0.3-0.3.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074198" version="1" comment="btrfs-kmp-xen is &lt;0_2.6.32.59_0.3-0.3.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074199" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.59_0.3-7.9.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074224" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.32.59_0.3-7.9.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074219" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.59_0.3-7.9.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074200" version="1" comment="ext4dev-kmp-trace is &lt;0_2.6.32.59_0.3-7.9.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074201" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.32.59_0.3-7.9.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074202" version="1" comment="hyper-v-kmp-default is &lt;0_2.6.32.59_0.3-0.18.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074225" version="1" comment="hyper-v-kmp-pae is &lt;0_2.6.32.59_0.3-0.18.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074203" version="1" comment="hyper-v-kmp-trace is &lt;0_2.6.32.59_0.3-0.18.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062840" version="1" comment="iscsitarget-kmp-default is &lt;1.4.19_2.6.32.19_0.3-0.7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075026" version="1" comment="kernel-default is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075023" version="1" comment="kernel-default-base is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075024" version="1" comment="kernel-default-devel is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075062" version="1" comment="kernel-default-man is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074209" version="1" comment="kernel-ec2 is &lt;2.6.32.59-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074207" version="1" comment="kernel-ec2-base is &lt;2.6.32.59-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075060" version="1" comment="kernel-ec2-devel is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075031" version="1" comment="kernel-pae is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075028" version="1" comment="kernel-pae-base is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075029" version="1" comment="kernel-pae-devel is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075053" version="1" comment="kernel-ppc64 is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075051" version="1" comment="kernel-ppc64-base is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075052" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075032" version="1" comment="kernel-source is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075033" version="1" comment="kernel-syms is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075055" version="1" comment="kernel-trace is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075054" version="1" comment="kernel-trace-base is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075034" version="1" comment="kernel-trace-devel is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075038" version="1" comment="kernel-xen is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075035" version="1" comment="kernel-xen-base is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075036" version="1" comment="kernel-xen-devel is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062842" version="1" comment="oracleasm-kmp-default is &lt;2.0.5_2.6.32.19_0.3-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103932" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_16_2.6.32.59_0.15-0.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103937" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_16_2.6.32.59_0.15-0.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103933" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_16_2.6.32.59_0.15-0.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064259" version="1" comment="kernel-ec2 is &lt;2.6.32.24-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064258" version="1" comment="kernel-ec2-base is &lt;2.6.32.24-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072758" version="1" comment="kvm is &lt;0.12.5-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113862" version="1" comment="kvm is &lt;0.12.5-1.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103998" version="1" comment="libgcrypt11 is &lt;1.4.1-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103997" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074790" version="1" comment="libgssglue1 is &lt;0.1-20.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062033" version="1" comment="libldap-2_4-2 is &lt;2.4.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062031" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062032" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062036" version="1" comment="openldap2 is &lt;2.4.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062034" version="1" comment="openldap2-back-meta is &lt;2.4.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062035" version="1" comment="openldap2-client is &lt;2.4.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075160" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075159" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075176" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075162" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075164" version="1" comment="mysql is &lt;5.0.96-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075177" version="1" comment="mysql-Max is &lt;5.0.96-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075163" version="1" comment="mysql-client is &lt;5.0.96-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075178" version="1" comment="mysql-tools is &lt;5.0.96-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074947" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074946" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074951" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074949" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074950" version="1" comment="libopenssl0_9_8-hmac-x86 is &lt;0.9.8j-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074952" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074948" version="1" comment="openssl is &lt;0.9.8j-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074953" version="1" comment="openssl-doc is &lt;0.9.8j-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070542" version="1" comment="libpciaccess0 is &lt;7.4-8.26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070540" version="1" comment="libpciaccess0-32bit is &lt;7.4-8.26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070541" version="1" comment="libpciaccess0-x86 is &lt;7.4-8.26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070545" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070543" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070544" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060502" version="1" comment="libpng12-0 is &lt;1.2.31-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060500" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060501" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073301" version="1" comment="libraptor1 is &lt;1.4.18-28.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070965" version="1" comment="libneon27 is &lt;0.29.6-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070964" version="1" comment="libneon27-32bit is &lt;0.29.6-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074966" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074965" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074982" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074967" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074968" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074969" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069742" version="1" comment="libsoup-2_4-1 is &lt;2.28.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069740" version="1" comment="libsoup-2_4-1-32bit is &lt;2.28.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069741" version="1" comment="libsoup-2_4-1-x86 is &lt;2.28.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075106" version="1" comment="libtiff3 is &lt;3.8.2-141.148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075105" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075111" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075112" version="1" comment="tiff is &lt;3.8.2-141.148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069540" version="1" comment="libvirt is &lt;0.7.6-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069538" version="1" comment="libvirt-doc is &lt;0.7.6-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069539" version="1" comment="libvirt-python is &lt;0.7.6-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075504" version="1" comment="libxml2 is &lt;2.7.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075503" version="1" comment="libxml2-32bit is &lt;2.7.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075505" version="1" comment="libxml2-doc is &lt;2.7.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075506" version="1" comment="libxml2-x86 is &lt;2.7.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075042" version="1" comment="libxslt is &lt;1.1.24-19.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075041" version="1" comment="libxslt-32bit is &lt;1.1.24-19.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075064" version="1" comment="libxslt-x86 is &lt;1.1.24-19.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066605" version="1" comment="logwatch is &lt;7.3.6-65.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062643" version="1" comment="lvm2 is &lt;2.02.39-18.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070133" version="1" comment="man-pages is &lt;3.15-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113976" version="1" comment="MozillaFirefox is &lt;38.2.0esr-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113977" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.5.7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113978" version="1" comment="MozillaFirefox-translations is &lt;38.2.0esr-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113979" version="1" comment="firefox-gcc47 is &lt;4.7.2_20130108-0.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113980" version="1" comment="firefox-libgcc_s1 is &lt;4.7.2_20130108-0.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113981" version="1" comment="firefox-libstdc++6 is &lt;4.7.2_20130108-0.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113982" version="1" comment="libfreebl3 is &lt;3.19.2.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113988" version="1" comment="libfreebl3-32bit is &lt;3.19.2.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113983" version="1" comment="mozilla-nss is &lt;3.19.2.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113989" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113984" version="1" comment="mozilla-nss-devel is &lt;3.19.2.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113985" version="1" comment="mozilla-nss-tools is &lt;3.19.2.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068228" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068224" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068225" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068226" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068227" version="1" comment="mozilla-xulrunner191-x86 is &lt;1.9.1.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069405" version="1" comment="nagios is &lt;3.0.6-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069404" version="1" comment="nagios-www is &lt;3.0.6-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069347" version="1" comment="nfs-client is &lt;1.2.1-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069348" version="1" comment="nfs-doc is &lt;1.2.1-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069349" version="1" comment="nfs-kernel-server is &lt;1.2.1-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111809" version="1" comment="libfreebl3 is &lt;3.12.11-3.2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111828" version="1" comment="libfreebl3-32bit is &lt;3.12.11-3.2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111820" version="1" comment="libfreebl3-x86 is &lt;3.12.11-3.2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111810" version="1" comment="mozilla-nspr is &lt;4.8.9-1.2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111829" version="1" comment="mozilla-nspr-32bit is &lt;4.8.9-1.2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111821" version="1" comment="mozilla-nspr-x86 is &lt;4.8.9-1.2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111811" version="1" comment="mozilla-nss is &lt;3.12.11-3.2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111830" version="1" comment="mozilla-nss-32bit is &lt;3.12.11-3.2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111812" version="1" comment="mozilla-nss-tools is &lt;3.12.11-3.2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111822" version="1" comment="mozilla-nss-x86 is &lt;3.12.11-3.2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106036" version="1" comment="ntp is &lt;4.2.4p8-1.29.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106035" version="1" comment="ntp-doc is &lt;4.2.4p8-1.29.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072017" version="1" comment="cxgb3-firmware is &lt;1.5.2-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072022" version="1" comment="ofed is &lt;1.5.2-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072018" version="1" comment="ofed-doc is &lt;1.5.2-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072019" version="1" comment="ofed-kmp-default is &lt;1.5.2_2.6.32.46_0.3-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072020" version="1" comment="ofed-kmp-pae is &lt;1.5.2_2.6.32.46_0.3-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072021" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.2_2.6.32.46_0.3-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064529" version="1" comment="openslp is &lt;1.2.0-172.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064526" version="1" comment="openslp-32bit is &lt;1.2.0-172.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064527" version="1" comment="openslp-server is &lt;1.2.0-172.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064528" version="1" comment="openslp-x86 is &lt;1.2.0-172.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075434" version="1" comment="openssh is &lt;5.1p1-41.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075433" version="1" comment="openssh-askpass is &lt;5.1p1-41.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111813" version="1" comment="openssl-certs is &lt;0.9.8h-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069567" version="1" comment="permissions is &lt;2011.6.28-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071643" version="1" comment="pam is &lt;1.0.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071640" version="1" comment="pam-32bit is &lt;1.0.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071641" version="1" comment="pam-doc is &lt;1.0.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071642" version="1" comment="pam-x86 is &lt;1.0.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063350" version="1" comment="pcsc-lite is &lt;1.4.102-1.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070661" version="1" comment="pcsc-lite-32bit is &lt;1.4.102-1.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070662" version="1" comment="pcsc-lite-x86 is &lt;1.4.102-1.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071924" version="1" comment="perf is &lt;2.6.32.46-2.5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111814" version="1" comment="perl-Config-General is &lt;2.33-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068620" version="1" comment="perl-libwww-perl is &lt;5.816-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074235" version="1" comment="popt is &lt;1.7-37.29.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074233" version="1" comment="popt-32bit is &lt;1.7-37.29.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074234" version="1" comment="popt-x86 is &lt;1.7-37.29.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074238" version="1" comment="rpm is &lt;4.4.2.3-37.29.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074236" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.29.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074237" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.29.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068349" version="1" comment="postfix is &lt;2.5.6-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068347" version="1" comment="postfix-doc is &lt;2.5.6-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068348" version="1" comment="postfix-mysql is &lt;2.5.6-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075262" version="1" comment="postgresql is &lt;8.3.20-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075263" version="1" comment="postgresql-contrib is &lt;8.3.20-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075264" version="1" comment="postgresql-docs is &lt;8.3.20-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075261" version="1" comment="postgresql-init is &lt;9.1-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074390" version="1" comment="postgresql-libs is &lt;8.3.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074388" version="1" comment="postgresql-libs-32bit is &lt;8.3.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074389" version="1" comment="postgresql-libs-x86 is &lt;8.3.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075265" version="1" comment="postgresql-server is &lt;8.3.20-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075170" version="1" comment="puppet is &lt;2.6.17-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075183" version="1" comment="puppet-server is &lt;2.6.17-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070504" version="1" comment="pure-ftpd is &lt;1.0.22-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074294" version="1" comment="libpython2_6-1_0 is &lt;2.6.8-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074292" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.8-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074293" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.8-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074308" version="1" comment="python is &lt;2.6.8-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074295" version="1" comment="python-32bit is &lt;2.6.8-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074298" version="1" comment="python-base is &lt;2.6.8-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074296" version="1" comment="python-base-32bit is &lt;2.6.8-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074297" version="1" comment="python-base-x86 is &lt;2.6.8-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074299" version="1" comment="python-curses is &lt;2.6.8-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074300" version="1" comment="python-demo is &lt;2.6.8-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074302" version="1" comment="python-doc is &lt;2.6-8.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074301" version="1" comment="python-doc-pdf is &lt;2.6-8.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074303" version="1" comment="python-gdbm is &lt;2.6.8-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074304" version="1" comment="python-idle is &lt;2.6.8-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074305" version="1" comment="python-tk is &lt;2.6.8-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074306" version="1" comment="python-x86 is &lt;2.6.8-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074307" version="1" comment="python-xml is &lt;2.6.8-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074404" version="1" comment="quagga is &lt;0.99.15-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075494" version="1" comment="quota is &lt;3.16-50.36.36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075496" version="1" comment="quota-nfs is &lt;3.16-50.36.36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068328" version="1" comment="rsync is &lt;3.0.4-2.36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068619" version="1" comment="ruby is &lt;1.8.7.p72-5.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068617" version="1" comment="ruby-doc-html is &lt;1.8.7.p72-5.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068618" version="1" comment="ruby-tk is &lt;1.8.7.p72-5.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074354" version="1" comment="strongswan is &lt;4.4.0-6.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074353" version="1" comment="strongswan-doc is &lt;4.4.0-6.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074310" version="1" comment="sudo is &lt;1.7.6p2-0.2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065452" version="1" comment="supportutils is &lt;1.20-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072612" version="1" comment="sysconfig is &lt;0.71.31-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067886" version="1" comment="tgt is &lt;0.9.10-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066590" version="1" comment="libblkid1 is &lt;2.16-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066594" version="1" comment="libuuid1 is &lt;2.16-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066592" version="1" comment="libuuid1-32bit is &lt;2.16-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066593" version="1" comment="libuuid1-x86 is &lt;2.16-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066596" version="1" comment="util-linux is &lt;2.16-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066595" version="1" comment="util-linux-lang is &lt;2.16-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066597" version="1" comment="uuid-runtime is &lt;2.16-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068404" version="1" comment="vino is &lt;2.28.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068403" version="1" comment="vino-lang is &lt;2.28.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068327" version="1" comment="vsftpd is &lt;2.0.7-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074775" version="1" comment="wireshark is &lt;1.4.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109886" version="1" comment="xen is &lt;4.0.3_21548_18-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109878" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109879" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109880" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109881" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109882" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109883" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109885" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109884" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113921" version="1" comment="xen is &lt;4.0.3_21548_18-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113922" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113923" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113924" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.19-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113925" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113926" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.19-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113927" version="1" comment="xen-libs is &lt;4.0.3_21548_18-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113928" version="1" comment="xen-tools is &lt;4.0.3_21548_18-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113929" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068655" version="1" comment="libvirt is &lt;0.7.6-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068653" version="1" comment="libvirt-doc is &lt;0.7.6-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068654" version="1" comment="libvirt-python is &lt;0.7.6-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068656" version="1" comment="vm-install is &lt;0.4.30-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068664" version="1" comment="xen is &lt;4.0.1_21326_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068657" version="1" comment="xen-doc-html is &lt;4.0.1_21326_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068658" version="1" comment="xen-doc-pdf is &lt;4.0.1_21326_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068659" version="1" comment="xen-kmp-default is &lt;4.0.1_21326_08_2.6.32.36_0.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068660" version="1" comment="xen-kmp-pae is &lt;4.0.1_21326_08_2.6.32.36_0.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068661" version="1" comment="xen-libs is &lt;4.0.1_21326_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068663" version="1" comment="xen-tools is &lt;4.0.1_21326_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068662" version="1" comment="xen-tools-domU is &lt;4.0.1_21326_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070018" version="1" comment="vm-install is &lt;0.4.31-0.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070026" version="1" comment="xen is &lt;4.0.2_21511_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070019" version="1" comment="xen-doc-html is &lt;4.0.2_21511_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070020" version="1" comment="xen-doc-pdf is &lt;4.0.2_21511_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070021" version="1" comment="xen-kmp-default is &lt;4.0.2_21511_02_2.6.32.43_0.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070022" version="1" comment="xen-kmp-pae is &lt;4.0.2_21511_02_2.6.32.43_0.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070023" version="1" comment="xen-libs is &lt;4.0.2_21511_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070025" version="1" comment="xen-tools is &lt;4.0.2_21511_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070024" version="1" comment="xen-tools-domU is &lt;4.0.2_21511_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073270" version="1" comment="libvirt is &lt;0.7.6-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073268" version="1" comment="libvirt-doc is &lt;0.7.6-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073269" version="1" comment="libvirt-python is &lt;0.7.6-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073271" version="1" comment="virt-utils is &lt;1.1.3-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073280" version="1" comment="xen is &lt;4.0.3_21548_02-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073272" version="1" comment="xen-doc-html is &lt;4.0.3_21548_02-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073273" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_02-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073274" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_02_2.6.32.54_0.3-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073275" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_02_2.6.32.54_0.3-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073276" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_02_2.6.32.54_0.3-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073277" version="1" comment="xen-libs is &lt;4.0.3_21548_02-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073279" version="1" comment="xen-tools is &lt;4.0.3_21548_02-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073278" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_02-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074539" version="1" comment="xen is &lt;4.0.3_21548_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074531" version="1" comment="xen-doc-html is &lt;4.0.3_21548_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074532" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074533" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_04_2.6.32.59_0.5-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074534" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_04_2.6.32.59_0.5-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074535" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_04_2.6.32.59_0.5-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074536" version="1" comment="xen-libs is &lt;4.0.3_21548_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074538" version="1" comment="xen-tools is &lt;4.0.3_21548_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074537" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075451" version="1" comment="vm-install is &lt;0.4.34-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075457" version="1" comment="xen is &lt;4.0.3_21548_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075464" version="1" comment="xen-doc-html is &lt;4.0.3_21548_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075465" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075452" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_08_2.6.32.59_0.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075453" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_08_2.6.32.59_0.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075466" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_08_2.6.32.59_0.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075454" version="1" comment="xen-libs is &lt;4.0.3_21548_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075456" version="1" comment="xen-tools is &lt;4.0.3_21548_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075455" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103806" version="1" comment="xen is &lt;4.0.3_21548_10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103798" version="1" comment="xen-doc-html is &lt;4.0.3_21548_10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103799" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103800" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_10_2.6.32.59_0.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103801" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_10_2.6.32.59_0.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103802" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_10_2.6.32.59_0.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103803" version="1" comment="xen-libs is &lt;4.0.3_21548_10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103805" version="1" comment="xen-tools is &lt;4.0.3_21548_10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103804" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103757" version="1" comment="xen is &lt;4.0.3_21548_16-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103749" version="1" comment="xen-doc-html is &lt;4.0.3_21548_16-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103750" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_16-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103751" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_16_2.6.32.59_0.9-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103752" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_16_2.6.32.59_0.9-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103753" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_16_2.6.32.59_0.9-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103754" version="1" comment="xen-libs is &lt;4.0.3_21548_16-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103756" version="1" comment="xen-tools is &lt;4.0.3_21548_16-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103755" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_16-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108973" version="1" comment="xen is &lt;4.0.3_21548_18-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108965" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108966" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108967" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108968" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108969" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108970" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108972" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108971" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110771" version="1" comment="xen is &lt;4.0.3_21548_18-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110763" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110764" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110765" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110766" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110767" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110768" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110770" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110769" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066953" version="1" comment="xorg-x11 is &lt;7.4-9.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066952" version="1" comment="xorg-x11-xauth is &lt;7.4-9.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072040" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072042" version="1" comment="xorg-x11-server is &lt;7.4-27.40.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072041" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103954" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.42.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103953" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.42.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103950" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103949" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103966" version="1" comment="xorg-x11-libxcb is &lt;7.4-1.22.5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103965" version="1" comment="xorg-x11-libxcb-32bit is &lt;7.4-1.22.5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071547" version="1" comment="libpciaccess0 is &lt;7.4_0.11.0-0.4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071545" version="1" comment="libpciaccess0-32bit is &lt;7.4_0.11.0-0.4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071546" version="1" comment="libpciaccess0-x86 is &lt;7.4_0.11.0-0.4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071548" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071553" version="1" comment="xorg-x11-server is &lt;7.4-27.40.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071552" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065287" version="1" comment="xpdf-tools is &lt;3.02-138.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111816" version="1" comment="xpdf-tools is &lt;3.02-138.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070146" version="1" comment="yast2-core is &lt;2.17.35.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074964" version="1" comment="zypper is &lt;1.3.21-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073028" version="1" comment="MozillaFirefox is &lt;10.0.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073027" version="1" comment="MozillaFirefox-translations is &lt;10.0.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073120" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr10.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073116" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr10.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073117" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr10.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073118" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr10.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073119" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr10.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072986" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072984" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072985" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072988" version="1" comment="openssl is &lt;0.9.8j-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072987" version="1" comment="openssl-doc is &lt;0.9.8j-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073115" version="1" comment="libpng12-0 is &lt;1.2.31-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073113" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073114" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073170" version="1" comment="puppet is &lt;2.6.12-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073169" version="1" comment="puppet-server is &lt;2.6.12-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104186" version="1" comment="mozilla-nss-devel is &lt;3.16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127467" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127468" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127566" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127567" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128978" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128979" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077521" version="1" comment="Mesa-x86 is &lt;7.11.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127745" version="1" comment="MozillaFirefox is &lt;38.8.0esr-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127746" version="1" comment="MozillaFirefox-translations is &lt;38.8.0esr-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132243" version="1" comment="MozillaFirefox is &lt;45.3.0esr-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132244" version="1" comment="MozillaFirefox-branding-SLED is &lt;45.0-20.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132245" version="1" comment="MozillaFirefox-translations is &lt;45.3.0esr-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132246" version="1" comment="firefox-fontconfig is &lt;2.11.0-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132247" version="1" comment="libfreebl3 is &lt;3.21.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132248" version="1" comment="libfreebl3-32bit is &lt;3.21.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132249" version="1" comment="mozilla-nspr is &lt;4.12-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132250" version="1" comment="mozilla-nspr-32bit is &lt;4.12-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132251" version="1" comment="mozilla-nspr-devel is &lt;4.12-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132252" version="1" comment="mozilla-nss is &lt;3.21.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132253" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132254" version="1" comment="mozilla-nss-devel is &lt;3.21.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132255" version="1" comment="mozilla-nss-tools is &lt;3.21.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132256" version="1" comment="MozillaFirefox is &lt;45.4.0esr-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132257" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144685" version="1" comment="MozillaFirefox is &lt;45.6.0esr-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144686" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104177" version="1" comment="mozilla-nss-devel is &lt;3.16-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113843" version="1" comment="xen is &lt;4.1.6_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113844" version="1" comment="xen-devel is &lt;4.1.6_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113845" version="1" comment="xen-doc-html is &lt;4.1.6_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113846" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113847" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113853" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.29-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113848" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113850" version="1" comment="xen-libs is &lt;4.1.6_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113849" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113851" version="1" comment="xen-tools is &lt;4.1.6_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113852" version="1" comment="xen-tools-domU is &lt;4.1.6_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092207" version="1" comment="apache2-mod_nss is &lt;1.0.8-0.4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092819" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112794" version="1" comment="php53 is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092820" version="1" comment="php53-bcmath is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092821" version="1" comment="php53-bz2 is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092822" version="1" comment="php53-calendar is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092823" version="1" comment="php53-ctype is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092824" version="1" comment="php53-curl is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092825" version="1" comment="php53-dba is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092826" version="1" comment="php53-dom is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092827" version="1" comment="php53-exif is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092828" version="1" comment="php53-fastcgi is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092829" version="1" comment="php53-fileinfo is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092830" version="1" comment="php53-ftp is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092831" version="1" comment="php53-gd is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092832" version="1" comment="php53-gettext is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092833" version="1" comment="php53-gmp is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092834" version="1" comment="php53-iconv is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092835" version="1" comment="php53-intl is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092836" version="1" comment="php53-json is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092837" version="1" comment="php53-ldap is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092838" version="1" comment="php53-mbstring is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092839" version="1" comment="php53-mcrypt is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092840" version="1" comment="php53-mysql is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092841" version="1" comment="php53-odbc is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092842" version="1" comment="php53-openssl is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092843" version="1" comment="php53-pcntl is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092844" version="1" comment="php53-pdo is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092845" version="1" comment="php53-pear is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092846" version="1" comment="php53-pgsql is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092847" version="1" comment="php53-pspell is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092848" version="1" comment="php53-shmop is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092849" version="1" comment="php53-snmp is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092850" version="1" comment="php53-soap is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092851" version="1" comment="php53-suhosin is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092852" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092853" version="1" comment="php53-sysvsem is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092854" version="1" comment="php53-sysvshm is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092855" version="1" comment="php53-tokenizer is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092856" version="1" comment="php53-wddx is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092857" version="1" comment="php53-xmlreader is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092858" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092859" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092860" version="1" comment="php53-xsl is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092861" version="1" comment="php53-zip is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092862" version="1" comment="php53-zlib is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104260" version="1" comment="bash is &lt;3.2-147.14.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104259" version="1" comment="bash-doc is &lt;3.2-147.14.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104262" version="1" comment="libreadline5 is &lt;5.2-147.14.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104261" version="1" comment="libreadline5-32bit is &lt;5.2-147.14.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104263" version="1" comment="readline-doc is &lt;5.2-147.14.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093221" version="1" comment="bind is &lt;9.9.4P2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093215" version="1" comment="bind-chrootenv is &lt;9.9.4P2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093216" version="1" comment="bind-doc is &lt;9.9.4P2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093218" version="1" comment="bind-libs-x86 is &lt;9.9.4P2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111609" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111611" version="1" comment="bind-doc is &lt;9.9.6P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114085" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114087" version="1" comment="bind-doc is &lt;9.9.6P1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119474" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119475" version="1" comment="bind-doc is &lt;9.9.6P1-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121674" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121675" version="1" comment="bind-doc is &lt;9.9.6P1-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125047" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125048" version="1" comment="bind-doc is &lt;9.9.6P1-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132258" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135232" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146908" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092613" version="1" comment="ldapsmb is &lt;1.34b-12.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092616" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092619" version="1" comment="libtalloc1-x86 is &lt;3.4.3-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092622" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092625" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092630" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092634" version="1" comment="samba-client-x86 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092639" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092641" version="1" comment="samba-x86 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090717" version="1" comment="coreutils-x86 is &lt;8.12-6.25.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091332" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093213" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.20.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075651" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077062" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.11.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077063" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.11.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129735" version="1" comment="dhcp is &lt;4.2.4.P2-0.11.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129736" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.11.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129737" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.11.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129738" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.11.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112795" version="1" comment="libfreebl3-x86 is &lt;3.13.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075648" version="1" comment="mozilla-nspr-x86 is &lt;4.9.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075649" version="1" comment="mozilla-nss-x86 is &lt;3.13.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076002" version="1" comment="mozilla-nspr-x86 is &lt;4.9.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076121" version="1" comment="libfreebl3-x86 is &lt;3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076122" version="1" comment="mozilla-nss-x86 is &lt;3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076341" version="1" comment="libfreebl3-x86 is &lt;3.14.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076342" version="1" comment="mozilla-nspr-x86 is &lt;4.9.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076343" version="1" comment="mozilla-nss-x86 is &lt;3.14.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076762" version="1" comment="libfreebl3-x86 is &lt;3.14.2-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076763" version="1" comment="mozilla-nspr-x86 is &lt;4.9.5-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076764" version="1" comment="mozilla-nss-x86 is &lt;3.14.2-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077022" version="1" comment="libfreebl3-x86 is &lt;3.14.3-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077023" version="1" comment="mozilla-nspr-x86 is &lt;4.9.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077024" version="1" comment="mozilla-nss-x86 is &lt;3.14.3-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104192" version="1" comment="mozilla-nss-devel is &lt;3.16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104202" version="1" comment="mozilla-nss-devel is &lt;3.16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105643" version="1" comment="mozilla-nss-devel is &lt;3.17.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114788" version="1" comment="MozillaFirefox is &lt;38.3.0esr-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114789" version="1" comment="MozillaFirefox-translations is &lt;38.3.0esr-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116718" version="1" comment="MozillaFirefox is &lt;38.4.0esr-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116719" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-12.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116720" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116721" version="1" comment="libfreebl3 is &lt;3.19.2.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116722" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116723" version="1" comment="mozilla-nss is &lt;3.19.2.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116724" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116725" version="1" comment="mozilla-nss-devel is &lt;3.19.2.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116726" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125476" version="1" comment="MozillaFirefox is &lt;38.7.0esr-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125477" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125478" version="1" comment="libfreebl3 is &lt;3.20.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125546" version="1" comment="libfreebl3-32bit is &lt;3.20.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125479" version="1" comment="mozilla-nspr is &lt;4.12-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125547" version="1" comment="mozilla-nspr-32bit is &lt;4.12-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125480" version="1" comment="mozilla-nspr-devel is &lt;4.12-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125481" version="1" comment="mozilla-nss is &lt;3.20.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125548" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125482" version="1" comment="mozilla-nss-devel is &lt;3.20.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125483" version="1" comment="mozilla-nss-tools is &lt;3.20.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104217" version="1" comment="mozilla-nss-devel is &lt;3.17.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076707" version="1" comment="freeradius-server is &lt;2.1.1-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076703" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076704" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076706" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091871" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091875" version="1" comment="glibc-profile is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091873" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091874" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091876" version="1" comment="glibc-x86 is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122372" version="1" comment="glibc is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122373" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122374" version="1" comment="glibc-devel is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122375" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122376" version="1" comment="glibc-html is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122377" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122378" version="1" comment="glibc-info is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122379" version="1" comment="glibc-locale is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122380" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122381" version="1" comment="glibc-profile is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122382" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122383" version="1" comment="nscd is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077472" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074810" version="1" comment="hyper-v is &lt;3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091341" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091340" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077716" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.18-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077717" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.18-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091430" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098829" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091432" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091433" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122534" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.20-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122535" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.20-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122536" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.20-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122537" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.20-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122538" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.20-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122539" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.20-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127928" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.25-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127929" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.25-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127930" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.25-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127931" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.25-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127932" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.25-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127933" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.25-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118099" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.15-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118100" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.15-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118101" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.15-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091509" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr6.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091506" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr6.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098830" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr7.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091507" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr6.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091508" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr6.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113508" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113510" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113511" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118315" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.20-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118316" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.20-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118317" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.20-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122540" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.30-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122541" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.30-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122542" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.30-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122543" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.30-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122544" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.30-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127934" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.40-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127935" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.40-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127936" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.40-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127937" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.40-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127938" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.40-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091044" version="1" comment="libkde4-x86 is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091047" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112819" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112842" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112843" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112844" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112823" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112824" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112825" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145694" version="1" comment="kernel-default is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145695" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145696" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145697" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145698" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145699" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145700" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145701" version="1" comment="kernel-pae is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145702" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145703" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145704" version="1" comment="kernel-source is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145705" version="1" comment="kernel-syms is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145706" version="1" comment="kernel-trace is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145707" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145708" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145709" version="1" comment="kernel-xen is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145710" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145711" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147937" version="1" comment="kernel-default is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147938" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147939" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147940" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147941" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147942" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147943" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147944" version="1" comment="kernel-pae is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147945" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147946" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147947" version="1" comment="kernel-source is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147948" version="1" comment="kernel-syms is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147949" version="1" comment="kernel-trace is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147950" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147951" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147952" version="1" comment="kernel-xen is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147953" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147954" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114091" version="1" comment="kernel-default is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114092" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114093" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114108" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114094" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114095" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114096" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114105" version="1" comment="kernel-pae is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114106" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114107" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114097" version="1" comment="kernel-source is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114098" version="1" comment="kernel-syms is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114099" version="1" comment="kernel-trace is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114100" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114101" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114102" version="1" comment="kernel-xen is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114103" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114104" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132259" version="1" comment="kernel-default is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132260" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132261" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132262" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132263" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132264" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132265" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132266" version="1" comment="kernel-pae is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132267" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132268" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132269" version="1" comment="kernel-source is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132270" version="1" comment="kernel-syms is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132271" version="1" comment="kernel-trace is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132272" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132273" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132274" version="1" comment="kernel-xen is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132275" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132276" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132277" version="1" comment="kernel-default is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132278" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132279" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132280" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132281" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132282" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132283" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132284" version="1" comment="kernel-pae is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132285" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132286" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132287" version="1" comment="kernel-source is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132288" version="1" comment="kernel-syms is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132289" version="1" comment="kernel-trace is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132290" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132291" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132292" version="1" comment="kernel-xen is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132293" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132294" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091963" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091964" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091966" version="1" comment="krb5-doc is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091967" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091968" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091970" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113933" version="1" comment="kvm is &lt;0.15.1-0.32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073928" version="1" comment="ldapsmb is &lt;1.34b-12.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073931" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073934" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073937" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073941" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073945" version="1" comment="samba-client-x86 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073950" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073952" version="1" comment="samba-x86 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076838" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076839" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076840" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076841" version="1" comment="libqt4-x86 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076842" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076992" version="1" comment="libpq5-x86 is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104204" version="1" comment="libfreebl3 is &lt;3.16.5-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104203" version="1" comment="libfreebl3-32bit is &lt;3.16.5-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104207" version="1" comment="mozilla-nss is &lt;3.16.5-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104205" version="1" comment="mozilla-nss-32bit is &lt;3.16.5-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104208" version="1" comment="mozilla-nss-devel is &lt;3.16.5-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104206" version="1" comment="mozilla-nss-tools is &lt;3.16.5-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090227" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076524" version="1" comment="mysql-Max is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076525" version="1" comment="mysql-tools is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076934" version="1" comment="libopenssl0_9_8-hmac-x86 is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092671" version="1" comment="libpixman-1-0-x86 is &lt;0.16.0-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074899" version="1" comment="libsoup-2_4-1-x86 is &lt;2.32.2-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093155" version="1" comment="libxml2-doc is &lt;2.7.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093157" version="1" comment="libxml2-x86 is &lt;2.7.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128980" version="1" comment="libxml2-32bit is &lt;2.7.6-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128981" version="1" comment="libxml2-doc is &lt;2.7.6-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128982" version="1" comment="libxml2-python is &lt;2.7.6-0.44.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142768" version="1" comment="MozillaFirefox is &lt;45.5.1esr-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142769" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142770" version="1" comment="libfreebl3 is &lt;3.21.3-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142771" version="1" comment="libfreebl3-32bit is &lt;3.21.3-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142772" version="1" comment="mozilla-nss is &lt;3.21.3-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142773" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142774" version="1" comment="mozilla-nss-devel is &lt;3.21.3-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142775" version="1" comment="mozilla-nss-tools is &lt;3.21.3-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123686" version="1" comment="MozillaFirefox is &lt;38.6.1esr-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123687" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-15.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123688" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123689" version="1" comment="libfreebl3 is &lt;3.20.2-17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123690" version="1" comment="libfreebl3-32bit is &lt;3.20.2-17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123691" version="1" comment="mozilla-nss is &lt;3.20.2-17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123692" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123693" version="1" comment="mozilla-nss-devel is &lt;3.20.2-17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123694" version="1" comment="mozilla-nss-tools is &lt;3.20.2-17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091393" version="1" comment="libfreebl3-x86 is &lt;3.15.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091396" version="1" comment="mozilla-nspr-x86 is &lt;4.10.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091400" version="1" comment="mozilla-nss-x86 is &lt;3.15.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077665" version="1" comment="nagios-nrpe is &lt;2.12-24.4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077664" version="1" comment="nagios-nrpe-doc is &lt;2.12-24.4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077666" version="1" comment="nagios-plugins-nrpe is &lt;2.12-24.4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091769" version="1" comment="libfreebl3-x86 is &lt;3.15.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091772" version="1" comment="mozilla-nspr-x86 is &lt;4.10.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091776" version="1" comment="mozilla-nss-x86 is &lt;3.15.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112813" version="1" comment="libfreebl3-x86 is &lt;3.15.3.1-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112814" version="1" comment="mozilla-nss-x86 is &lt;3.15.3.1-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127610" version="1" comment="ntp is &lt;4.2.8p6-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127611" version="1" comment="ntp-doc is &lt;4.2.8p6-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127612" version="1" comment="yast2-ntp-client is &lt;2.17.14.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128348" version="1" comment="ntp is &lt;4.2.8p7-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128349" version="1" comment="ntp-doc is &lt;4.2.8p7-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128983" version="1" comment="ntp is &lt;4.2.8p8-47.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128984" version="1" comment="ntp-doc is &lt;4.2.8p8-47.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076300" version="1" comment="openCryptoki-32bit is &lt;2.4-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076301" version="1" comment="openCryptoki-64bit is &lt;2.4-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115378" version="1" comment="openssh is &lt;5.1p1-41.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115379" version="1" comment="openssh-askpass is &lt;5.1p1-41.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115380" version="1" comment="openssh-askpass-gnome is &lt;5.1p1-41.69.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118751" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118752" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118753" version="1" comment="openssl-doc is &lt;0.9.8j-0.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123896" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123897" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123898" version="1" comment="openssl-doc is &lt;0.9.8j-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127538" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127539" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127540" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127541" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127542" version="1" comment="openssl-doc is &lt;0.9.8j-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132295" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132296" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093210" version="1" comment="openswan is &lt;2.6.16-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093209" version="1" comment="openswan-doc is &lt;2.6.16-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091790" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.33.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076781" version="1" comment="perl-x86 is &lt;5.10.0-64.61.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114900" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114901" version="1" comment="php5 is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114902" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114903" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114904" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114905" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114906" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114907" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114908" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114909" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114910" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114911" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114912" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114913" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114914" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114915" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114916" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114917" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114918" version="1" comment="php5-json is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114919" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114920" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114921" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114922" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114923" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114924" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114925" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114926" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114927" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114928" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114929" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114930" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114931" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114932" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114933" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114934" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114935" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114936" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114937" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114938" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114939" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114940" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114941" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114942" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114943" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114944" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132297" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132298" version="1" comment="php5 is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132299" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132300" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132301" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132302" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132303" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132304" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132305" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132306" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132307" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132308" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132309" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132310" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132311" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132312" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132313" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132314" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132315" version="1" comment="php5-json is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132316" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132317" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132318" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132319" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132320" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132321" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132322" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132323" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132324" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132325" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132326" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132327" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132328" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132329" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132330" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132331" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132332" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132333" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132334" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132335" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132336" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132337" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132338" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132339" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132340" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132341" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129101" version="1" comment="apache2-mod_php53 is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129102" version="1" comment="php53 is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129103" version="1" comment="php53-bcmath is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129104" version="1" comment="php53-bz2 is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129105" version="1" comment="php53-calendar is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129106" version="1" comment="php53-ctype is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129107" version="1" comment="php53-curl is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129108" version="1" comment="php53-dba is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129109" version="1" comment="php53-dom is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129110" version="1" comment="php53-exif is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129111" version="1" comment="php53-fastcgi is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129112" version="1" comment="php53-fileinfo is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129113" version="1" comment="php53-ftp is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129114" version="1" comment="php53-gd is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129115" version="1" comment="php53-gettext is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129116" version="1" comment="php53-gmp is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129117" version="1" comment="php53-iconv is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129118" version="1" comment="php53-intl is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129119" version="1" comment="php53-json is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129120" version="1" comment="php53-ldap is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129121" version="1" comment="php53-mbstring is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129122" version="1" comment="php53-mcrypt is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129123" version="1" comment="php53-mysql is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129124" version="1" comment="php53-odbc is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129125" version="1" comment="php53-openssl is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129126" version="1" comment="php53-pcntl is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129127" version="1" comment="php53-pdo is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129128" version="1" comment="php53-pear is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129129" version="1" comment="php53-pgsql is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129130" version="1" comment="php53-pspell is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129131" version="1" comment="php53-shmop is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129132" version="1" comment="php53-snmp is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129133" version="1" comment="php53-soap is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129134" version="1" comment="php53-suhosin is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129135" version="1" comment="php53-sysvmsg is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129136" version="1" comment="php53-sysvsem is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129137" version="1" comment="php53-sysvshm is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129138" version="1" comment="php53-tokenizer is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129139" version="1" comment="php53-wddx is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129140" version="1" comment="php53-xmlreader is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129141" version="1" comment="php53-xmlrpc is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129142" version="1" comment="php53-xmlwriter is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129143" version="1" comment="php53-xsl is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129144" version="1" comment="php53-zip is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129145" version="1" comment="php53-zlib is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132342" version="1" comment="apache2-mod_php53 is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132343" version="1" comment="php53 is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132344" version="1" comment="php53-bcmath is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132345" version="1" comment="php53-bz2 is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132346" version="1" comment="php53-calendar is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132347" version="1" comment="php53-ctype is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132348" version="1" comment="php53-curl is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132349" version="1" comment="php53-dba is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132350" version="1" comment="php53-dom is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132351" version="1" comment="php53-exif is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132352" version="1" comment="php53-fastcgi is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132353" version="1" comment="php53-fileinfo is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132354" version="1" comment="php53-ftp is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132355" version="1" comment="php53-gd is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132356" version="1" comment="php53-gettext is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132357" version="1" comment="php53-gmp is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132358" version="1" comment="php53-iconv is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132359" version="1" comment="php53-intl is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132360" version="1" comment="php53-json is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132361" version="1" comment="php53-ldap is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132362" version="1" comment="php53-mbstring is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132363" version="1" comment="php53-mcrypt is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132364" version="1" comment="php53-mysql is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132365" version="1" comment="php53-odbc is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132366" version="1" comment="php53-openssl is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132367" version="1" comment="php53-pcntl is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132368" version="1" comment="php53-pdo is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132369" version="1" comment="php53-pear is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132370" version="1" comment="php53-pgsql is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132371" version="1" comment="php53-pspell is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132372" version="1" comment="php53-shmop is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132373" version="1" comment="php53-snmp is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132374" version="1" comment="php53-soap is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132375" version="1" comment="php53-suhosin is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132376" version="1" comment="php53-sysvmsg is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132377" version="1" comment="php53-sysvsem is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132378" version="1" comment="php53-sysvshm is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132379" version="1" comment="php53-tokenizer is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132380" version="1" comment="php53-wddx is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132381" version="1" comment="php53-xmlreader is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132382" version="1" comment="php53-xmlrpc is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132383" version="1" comment="php53-xmlwriter is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132384" version="1" comment="php53-xsl is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132385" version="1" comment="php53-zip is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132386" version="1" comment="php53-zlib is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132387" version="1" comment="apache2-mod_php53 is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132388" version="1" comment="php53 is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132389" version="1" comment="php53-bcmath is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132390" version="1" comment="php53-bz2 is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132391" version="1" comment="php53-calendar is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132392" version="1" comment="php53-ctype is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132393" version="1" comment="php53-curl is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132394" version="1" comment="php53-dba is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132395" version="1" comment="php53-dom is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132396" version="1" comment="php53-exif is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132397" version="1" comment="php53-fastcgi is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132398" version="1" comment="php53-fileinfo is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132399" version="1" comment="php53-ftp is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132400" version="1" comment="php53-gd is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132401" version="1" comment="php53-gettext is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132402" version="1" comment="php53-gmp is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132403" version="1" comment="php53-iconv is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132404" version="1" comment="php53-intl is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132405" version="1" comment="php53-json is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132406" version="1" comment="php53-ldap is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132407" version="1" comment="php53-mbstring is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132408" version="1" comment="php53-mcrypt is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132409" version="1" comment="php53-mysql is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132410" version="1" comment="php53-odbc is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132411" version="1" comment="php53-openssl is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132412" version="1" comment="php53-pcntl is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132413" version="1" comment="php53-pdo is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132414" version="1" comment="php53-pear is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132415" version="1" comment="php53-pgsql is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132416" version="1" comment="php53-pspell is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132417" version="1" comment="php53-shmop is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132418" version="1" comment="php53-snmp is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132419" version="1" comment="php53-soap is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132420" version="1" comment="php53-suhosin is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132421" version="1" comment="php53-sysvmsg is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132422" version="1" comment="php53-sysvsem is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132423" version="1" comment="php53-sysvshm is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132424" version="1" comment="php53-tokenizer is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132425" version="1" comment="php53-wddx is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132426" version="1" comment="php53-xmlreader is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132427" version="1" comment="php53-xmlrpc is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132428" version="1" comment="php53-xmlwriter is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132429" version="1" comment="php53-xsl is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132430" version="1" comment="php53-zip is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132431" version="1" comment="php53-zlib is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074240" version="1" comment="popt-x86 is &lt;1.7-37.50.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093159" version="1" comment="puppet-server is &lt;2.6.18-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091152" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091156" version="1" comment="python-base-x86 is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091163" version="1" comment="python-x86 is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075495" version="1" comment="quota-nfs is &lt;3.16-50.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119838" version="1" comment="ldapsmb is &lt;1.34b-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119839" version="1" comment="libldb1 is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119840" version="1" comment="libsmbclient0 is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119841" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119842" version="1" comment="libtalloc2 is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119843" version="1" comment="libtalloc2-32bit is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119844" version="1" comment="libtdb1 is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119845" version="1" comment="libtdb1-32bit is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119846" version="1" comment="libtevent0 is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119847" version="1" comment="libtevent0-32bit is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119848" version="1" comment="libwbclient0 is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119849" version="1" comment="libwbclient0-32bit is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119850" version="1" comment="samba is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119851" version="1" comment="samba-32bit is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119852" version="1" comment="samba-client is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119853" version="1" comment="samba-client-32bit is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119854" version="1" comment="samba-doc is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119855" version="1" comment="samba-krb-printing is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119856" version="1" comment="samba-winbind is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119857" version="1" comment="samba-winbind-32bit is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125333" version="1" comment="ldapsmb is &lt;1.34b-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125334" version="1" comment="libldb1 is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125335" version="1" comment="libsmbclient0 is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125484" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125336" version="1" comment="libtalloc2 is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125485" version="1" comment="libtalloc2-32bit is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125337" version="1" comment="libtdb1 is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125486" version="1" comment="libtdb1-32bit is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125338" version="1" comment="libtevent0 is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125487" version="1" comment="libtevent0-32bit is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125339" version="1" comment="libwbclient0 is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125488" version="1" comment="libwbclient0-32bit is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125340" version="1" comment="samba is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125489" version="1" comment="samba-32bit is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125341" version="1" comment="samba-client is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125490" version="1" comment="samba-client-32bit is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125342" version="1" comment="samba-doc is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125343" version="1" comment="samba-krb-printing is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125344" version="1" comment="samba-winbind is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125491" version="1" comment="samba-winbind-32bit is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126095" version="1" comment="ldapsmb is &lt;1.34b-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126096" version="1" comment="libldb1 is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126097" version="1" comment="libsmbclient0 is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126098" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126099" version="1" comment="libtalloc2 is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126100" version="1" comment="libtalloc2-32bit is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126101" version="1" comment="libtdb1 is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126102" version="1" comment="libtdb1-32bit is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126103" version="1" comment="libtevent0 is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126104" version="1" comment="libtevent0-32bit is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126105" version="1" comment="libwbclient0 is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126106" version="1" comment="libwbclient0-32bit is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126107" version="1" comment="samba is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126108" version="1" comment="samba-32bit is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126109" version="1" comment="samba-client is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126110" version="1" comment="samba-client-32bit is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126111" version="1" comment="samba-doc is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126112" version="1" comment="samba-krb-printing is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126113" version="1" comment="samba-winbind is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126114" version="1" comment="samba-winbind-32bit is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146109" version="1" comment="ldapsmb is &lt;1.34b-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146110" version="1" comment="libldb1 is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146111" version="1" comment="libsmbclient0 is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146112" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146113" version="1" comment="libtalloc2 is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146114" version="1" comment="libtalloc2-32bit is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146115" version="1" comment="libtdb1 is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146116" version="1" comment="libtdb1-32bit is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146117" version="1" comment="libtevent0 is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146118" version="1" comment="libtevent0-32bit is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146119" version="1" comment="libwbclient0 is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146120" version="1" comment="libwbclient0-32bit is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146121" version="1" comment="samba is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146122" version="1" comment="samba-32bit is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146123" version="1" comment="samba-client is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146124" version="1" comment="samba-client-32bit is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146125" version="1" comment="samba-doc is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146126" version="1" comment="samba-krb-printing is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146127" version="1" comment="samba-winbind is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146128" version="1" comment="samba-winbind-32bit is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077103" version="1" comment="stunnel is &lt;4.36-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090300" version="1" comment="tomcat6 is &lt;6.0.18-20.35.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090293" version="1" comment="tomcat6-admin-webapps is &lt;6.0.18-20.35.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090294" version="1" comment="tomcat6-docs-webapp is &lt;6.0.18-20.35.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090295" version="1" comment="tomcat6-javadoc is &lt;6.0.18-20.35.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090296" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.18-20.35.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090297" version="1" comment="tomcat6-lib is &lt;6.0.18-20.35.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090298" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.18-20.35.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090299" version="1" comment="tomcat6-webapps is &lt;6.0.18-20.35.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109867" version="1" comment="xen-devel is &lt;4.1.6_08-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103996" version="1" comment="xen is &lt;4.1.6_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103986" version="1" comment="xen-devel is &lt;4.1.6_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103987" version="1" comment="xen-doc-html is &lt;4.1.6_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103988" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103989" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.23-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103990" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.23-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103991" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.23-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103993" version="1" comment="xen-libs is &lt;4.1.6_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103992" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103995" version="1" comment="xen-tools is &lt;4.1.6_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103994" version="1" comment="xen-tools-domU is &lt;4.1.6_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116109" version="1" comment="xen is &lt;4.1.6_08-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116110" version="1" comment="xen-devel is &lt;4.1.6_08-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116111" version="1" comment="xen-doc-html is &lt;4.1.6_08-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116112" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116113" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.37-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116119" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.37-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116114" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.37-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116116" version="1" comment="xen-libs is &lt;4.1.6_08-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116115" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116117" version="1" comment="xen-tools is &lt;4.1.6_08-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116118" version="1" comment="xen-tools-domU is &lt;4.1.6_08-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126781" version="1" comment="xen is &lt;4.1.6_08-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126782" version="1" comment="xen-devel is &lt;4.1.6_08-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126783" version="1" comment="xen-doc-html is &lt;4.1.6_08-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126784" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126785" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.37-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126786" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.37-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126787" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.37-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126788" version="1" comment="xen-libs is &lt;4.1.6_08-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126789" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126790" version="1" comment="xen-tools is &lt;4.1.6_08-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126791" version="1" comment="xen-tools-domU is &lt;4.1.6_08-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132432" version="1" comment="xen is &lt;4.1.6_08-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132433" version="1" comment="xen-devel is &lt;4.1.6_08-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132434" version="1" comment="xen-doc-html is &lt;4.1.6_08-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132435" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132436" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.40-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132437" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.40-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132438" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.40-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132439" version="1" comment="xen-libs is &lt;4.1.6_08-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132440" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132441" version="1" comment="xen-tools is &lt;4.1.6_08-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132442" version="1" comment="xen-tools-domU is &lt;4.1.6_08-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136696" version="1" comment="xen is &lt;4.1.6_08-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136697" version="1" comment="xen-devel is &lt;4.1.6_08-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136698" version="1" comment="xen-doc-html is &lt;4.1.6_08-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136699" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136700" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.44-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136701" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.44-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136702" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.44-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136703" version="1" comment="xen-libs is &lt;4.1.6_08-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136704" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136705" version="1" comment="xen-tools is &lt;4.1.6_08-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136706" version="1" comment="xen-tools-domU is &lt;4.1.6_08-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103976" version="1" comment="xen is &lt;4.1.6_06-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112864" version="1" comment="xen-devel is &lt;4.1.6_06-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103967" version="1" comment="xen-doc-html is &lt;4.1.6_06-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103968" version="1" comment="xen-doc-pdf is &lt;4.1.6_06-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103969" version="1" comment="xen-kmp-default is &lt;4.1.6_06_3.0.101_0.7.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103970" version="1" comment="xen-kmp-pae is &lt;4.1.6_06_3.0.101_0.7.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103971" version="1" comment="xen-kmp-trace is &lt;4.1.6_06_3.0.101_0.7.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103973" version="1" comment="xen-libs is &lt;4.1.6_06-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103972" version="1" comment="xen-libs-32bit is &lt;4.1.6_06-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103975" version="1" comment="xen-tools is &lt;4.1.6_06-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103974" version="1" comment="xen-tools-domU is &lt;4.1.6_06-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108964" version="1" comment="xen is &lt;4.1.6_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108954" version="1" comment="xen-devel is &lt;4.1.6_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108955" version="1" comment="xen-doc-html is &lt;4.1.6_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108956" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108957" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108958" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.29-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108959" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108961" version="1" comment="xen-libs is &lt;4.1.6_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108960" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108963" version="1" comment="xen-tools is &lt;4.1.6_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108962" version="1" comment="xen-tools-domU is &lt;4.1.6_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110782" version="1" comment="xen is &lt;4.1.6_08-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110772" version="1" comment="xen-devel is &lt;4.1.6_08-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110773" version="1" comment="xen-doc-html is &lt;4.1.6_08-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110774" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110775" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110776" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.29-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110777" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110779" version="1" comment="xen-libs is &lt;4.1.6_08-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110778" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110781" version="1" comment="xen-tools is &lt;4.1.6_08-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110780" version="1" comment="xen-tools-domU is &lt;4.1.6_08-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118590" version="1" comment="xen is &lt;4.1.6_08-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118591" version="1" comment="xen-devel is &lt;4.1.6_08-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118592" version="1" comment="xen-doc-html is &lt;4.1.6_08-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118593" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118594" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.37-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118595" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.37-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118596" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.37-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118597" version="1" comment="xen-libs is &lt;4.1.6_08-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118598" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118599" version="1" comment="xen-tools is &lt;4.1.6_08-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118600" version="1" comment="xen-tools-domU is &lt;4.1.6_08-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093464" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077516" version="1" comment="xorg-x11-libXext-x86 is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077517" version="1" comment="xorg-x11-libXfixes-x86 is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077519" version="1" comment="xorg-x11-libXrender-x86 is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077522" version="1" comment="xorg-x11-libXt-x86 is &lt;7.4-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077520" version="1" comment="xorg-x11-libXv-x86 is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077524" version="1" comment="xorg-x11-libxcb-x86 is &lt;7.4-1.22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098654" version="1" comment="libfreebl3-x86 is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098657" version="1" comment="libsoftokn3-x86 is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098660" version="1" comment="mozilla-nspr-x86 is &lt;4.10.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098664" version="1" comment="mozilla-nss-x86 is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077580" version="1" comment="Mesa-x86 is &lt;9.0.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127939" version="1" comment="MozillaFirefox-translations is &lt;38.8.0esr-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127940" version="1" comment="libfreebl3 is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127941" version="1" comment="libfreebl3-32bit is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127942" version="1" comment="libsoftokn3 is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127943" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127944" version="1" comment="mozilla-nspr-32bit is &lt;4.12-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127945" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127946" version="1" comment="mozilla-nss-tools is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130060" version="1" comment="libfreebl3-32bit is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130061" version="1" comment="libsoftokn3-32bit is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130062" version="1" comment="mozilla-nspr-32bit is &lt;4.12-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130063" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155033" version="1" comment="libfreebl3-32bit is &lt;3.29.5-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155034" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155035" version="1" comment="mozilla-nspr-32bit is &lt;4.13.1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155036" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162291" version="1" comment="libfreebl3-32bit is &lt;3.29.5-47.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162292" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-47.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162293" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-47.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098635" version="1" comment="libfreebl3-x86 is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098638" version="1" comment="libsoftokn3-x86 is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098648" version="1" comment="mozilla-nspr-x86 is &lt;4.10.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098642" version="1" comment="mozilla-nss-x86 is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111626" version="1" comment="libfreebl3-x86 is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111629" version="1" comment="libsoftokn3-x86 is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111602" version="1" comment="mozilla-nspr-x86 is &lt;4.10.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111635" version="1" comment="mozilla-nss-x86 is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101728" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112875" version="1" comment="php53 is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101729" version="1" comment="php53-bcmath is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101730" version="1" comment="php53-bz2 is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101731" version="1" comment="php53-calendar is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101732" version="1" comment="php53-ctype is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101733" version="1" comment="php53-curl is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101734" version="1" comment="php53-dba is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101735" version="1" comment="php53-dom is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101736" version="1" comment="php53-exif is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101737" version="1" comment="php53-fastcgi is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101738" version="1" comment="php53-fileinfo is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101739" version="1" comment="php53-ftp is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101740" version="1" comment="php53-gd is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101741" version="1" comment="php53-gettext is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101742" version="1" comment="php53-gmp is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101743" version="1" comment="php53-iconv is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101744" version="1" comment="php53-intl is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101745" version="1" comment="php53-json is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101746" version="1" comment="php53-ldap is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101747" version="1" comment="php53-mbstring is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101748" version="1" comment="php53-mcrypt is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101749" version="1" comment="php53-mysql is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101750" version="1" comment="php53-odbc is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101751" version="1" comment="php53-openssl is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101752" version="1" comment="php53-pcntl is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101753" version="1" comment="php53-pdo is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101754" version="1" comment="php53-pear is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101755" version="1" comment="php53-pgsql is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101756" version="1" comment="php53-pspell is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101757" version="1" comment="php53-shmop is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101758" version="1" comment="php53-snmp is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101759" version="1" comment="php53-soap is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101760" version="1" comment="php53-suhosin is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101761" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101762" version="1" comment="php53-sysvsem is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101763" version="1" comment="php53-sysvshm is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101764" version="1" comment="php53-tokenizer is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101765" version="1" comment="php53-wddx is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101766" version="1" comment="php53-xmlreader is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101767" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101768" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101769" version="1" comment="php53-xsl is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101770" version="1" comment="php53-zip is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101771" version="1" comment="php53-zlib is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115108" version="1" comment="augeas-lenses is &lt;0.9.0-3.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100816" version="1" comment="bash-x86 is &lt;3.2-147.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100819" version="1" comment="libreadline5-x86 is &lt;5.2-147.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111614" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114117" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119496" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121676" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149119" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154316" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154372" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157760" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170908" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098525" version="1" comment="ldapsmb is &lt;1.34b-12.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098528" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098531" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098534" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098539" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098543" version="1" comment="samba-client-x86 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098548" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098550" version="1" comment="samba-x86 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099549" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.52.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098957" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122384" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132444" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107515" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122257" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122258" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113471" version="1" comment="libblkid1-x86 is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113472" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113473" version="1" comment="libuuid1-x86 is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122259" version="1" comment="ecryptfs-utils-x86 is &lt;61-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093484" version="1" comment="libfreebl3-x86 is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093487" version="1" comment="libsoftokn3-x86 is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093491" version="1" comment="mozilla-nss-x86 is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099237" version="1" comment="libfreebl3-x86 is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099240" version="1" comment="libsoftokn3-x86 is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099244" version="1" comment="mozilla-nss-x86 is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099993" version="1" comment="libfreebl3-x86 is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099996" version="1" comment="libsoftokn3-x86 is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099999" version="1" comment="mozilla-nspr-x86 is &lt;4.10.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100003" version="1" comment="mozilla-nss-x86 is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114793" version="1" comment="mozilla-nspr-x86 is &lt;4.10.9-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116728" version="1" comment="MozillaFirefox-branding-SLES-for-VMware is &lt;38-10.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116729" version="1" comment="libfreebl3-x86 is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116730" version="1" comment="libsoftokn3-x86 is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116731" version="1" comment="mozilla-nspr-x86 is &lt;4.10.10-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116732" version="1" comment="mozilla-nss-x86 is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166151" version="1" comment="libfreebl3-32bit is &lt;3.29.5-47.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166152" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-47.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166153" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-47.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092103" version="1" comment="libfreebl3-x86 is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092106" version="1" comment="libsoftokn3-x86 is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092110" version="1" comment="mozilla-nss-x86 is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116733" version="1" comment="MozillaFirefox-branding-SLES-for-VMware is &lt;31.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101269" version="1" comment="libfreebl3-x86 is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101270" version="1" comment="libsoftokn3-x86 is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101272" version="1" comment="mozilla-nss-x86 is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116734" version="1" comment="MozillaFirefox-branding-SLES-for-VMware is &lt;31.0-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114299" version="1" comment="libfreebl3-x86 is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114300" version="1" comment="libsoftokn3-x86 is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114301" version="1" comment="mozilla-nss-x86 is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107585" version="1" comment="freetype2-x86 is &lt;2.3.7-25.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170650" version="1" comment="gcc43-32bit is &lt;4.3.4_20091019-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170651" version="1" comment="libstdc++43-devel-32bit is &lt;4.3.4_20091019-37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121677" version="1" comment="giflib-progs is &lt;4.1.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121678" version="1" comment="giflib-x86 is &lt;4.1.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100154" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100158" version="1" comment="glibc-profile is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100156" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100157" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100159" version="1" comment="glibc-x86 is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113947" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113943" version="1" comment="glibc-profile is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113944" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113948" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113949" version="1" comment="glibc-x86 is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122385" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122386" version="1" comment="glibc-profile is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122387" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122388" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122389" version="1" comment="glibc-x86 is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157128" version="1" comment="glibc-32bit is &lt;2.11.3-17.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157129" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157130" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157131" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169563" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169564" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169565" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169566" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172599" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172600" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172601" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172602" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098744" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114302" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119820" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115094" version="1" comment="gtk2-doc is &lt;2.18.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115102" version="1" comment="gtk2-x86 is &lt;2.18.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121166" version="1" comment="gtk2-doc is &lt;2.18.9-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121167" version="1" comment="gtk2-x86 is &lt;2.18.9-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091196" version="1" comment="guestfs-data is &lt;1.20.4-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091197" version="1" comment="guestfs-tools is &lt;1.20.4-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091198" version="1" comment="guestfsd is &lt;1.20.4-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091199" version="1" comment="libguestfs0 is &lt;1.20.4-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110709" version="1" comment="libicu-doc is &lt;4.0-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110710" version="1" comment="libicu-x86 is &lt;4.0-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113485" version="1" comment="ipsec-tools is &lt;0.7.3-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121118" version="1" comment="jakarta-commons-collections is &lt;3.2.2-88.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121119" version="1" comment="jakarta-commons-collections-javadoc is &lt;3.2.2-88.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121120" version="1" comment="jakarta-commons-collections-tomcat5 is &lt;3.2.2-88.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102356" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102357" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102358" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124763" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.20-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124764" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.20-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124765" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.20-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124766" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.20-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124767" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.20-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124768" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.20-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102363" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr8.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102360" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr8.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102361" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr8.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102362" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr8.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124379" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.30-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124380" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.30-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124381" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.30-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124382" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.30-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107757" version="1" comment="kde4-l10n-bg is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107758" version="1" comment="kde4-l10n-ca is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107759" version="1" comment="kde4-l10n-csb is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107760" version="1" comment="kde4-l10n-el is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107761" version="1" comment="kde4-l10n-et is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107762" version="1" comment="kde4-l10n-eu is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107763" version="1" comment="kde4-l10n-fi is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107764" version="1" comment="kde4-l10n-ga is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107765" version="1" comment="kde4-l10n-gl is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107766" version="1" comment="kde4-l10n-hi is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107767" version="1" comment="kde4-l10n-is is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107768" version="1" comment="kde4-l10n-kk is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107769" version="1" comment="kde4-l10n-km is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107770" version="1" comment="kde4-l10n-ku is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107771" version="1" comment="kde4-l10n-lt is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107772" version="1" comment="kde4-l10n-lv is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107773" version="1" comment="kde4-l10n-mk is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107774" version="1" comment="kde4-l10n-ml is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107775" version="1" comment="kde4-l10n-nds is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107776" version="1" comment="kde4-l10n-nn is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107777" version="1" comment="kde4-l10n-pa is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107778" version="1" comment="kde4-l10n-ro is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107779" version="1" comment="kde4-l10n-sl is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107780" version="1" comment="kde4-l10n-th is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107781" version="1" comment="kde4-l10n-tr is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107782" version="1" comment="kde4-l10n-uk is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107783" version="1" comment="kde4-l10n-wa is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112903" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112904" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100999" version="1" comment="kernel-default-man is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101011" version="1" comment="kernel-ec2 is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101009" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101010" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101008" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101006" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101007" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101005" version="1" comment="kernel-trace is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101003" version="1" comment="kernel-trace-base is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132445" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132446" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132447" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132448" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145712" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145713" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145714" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145715" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150510" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150511" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150512" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150513" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157077" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157078" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157079" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157080" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157440" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157441" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157442" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157443" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165589" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165590" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165591" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165592" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114467" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114485" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114471" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114472" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114473" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114463" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114481" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114482" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114477" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127096" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127097" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127098" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127099" version="1" comment="kernel-default is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127100" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127101" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127102" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127103" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127104" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127105" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127106" version="1" comment="kernel-pae is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127107" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127108" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127109" version="1" comment="kernel-source is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127110" version="1" comment="kernel-syms is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127111" version="1" comment="kernel-trace is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127112" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127113" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127114" version="1" comment="kernel-xen is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127115" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127116" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169334" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169335" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169336" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169337" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169963" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169964" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169965" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169966" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169967" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169968" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169969" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169970" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169971" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172979" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172980" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172981" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172982" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101016" version="1" comment="iscsitarget-kmp-bigsmp is &lt;1.4.20_3.0.101_0.40-0.38.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101019" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101017" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101020" version="1" comment="ofed-kmp-bigsmp is &lt;1.5.4.1_3.0.101_0.40-0.13.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101021" version="1" comment="oracleasm-kmp-bigsmp is &lt;2.0.5_3.0.101_0.40-7.39.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117927" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117949" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117922" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117923" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117924" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117905" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117906" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117907" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117911" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132449" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132450" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132451" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132452" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164485" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164486" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164487" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164488" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099569" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099570" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099572" version="1" comment="krb5-doc is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099573" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099574" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099576" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115953" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115954" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115956" version="1" comment="krb5-doc is &lt;1.6.3-133.49.97.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115957" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.97.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115958" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.97.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115959" version="1" comment="krb5-plugins is &lt;1.6.3-133.49.97.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115961" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117950" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117951" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117952" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101411" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101412" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101413" version="1" comment="krb5-doc is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101414" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101415" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101416" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111662" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111663" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111656" version="1" comment="krb5-doc is &lt;1.6.3-133.49.68.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111657" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111658" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111659" version="1" comment="krb5-plugins is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111669" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129364" version="1" comment="kvm is &lt;1.4.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107532" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-0.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093514" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093519" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093522" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093524" version="1" comment="libqt4-x86 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093526" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108077" version="1" comment="libblkid1-x86 is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108078" version="1" comment="libuuid1-x86 is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094593" version="1" comment="postgresql91-contrib is &lt;9.1.12-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094595" version="1" comment="postgresql91-server is &lt;9.1.12-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100803" version="1" comment="libfreebl3-x86 is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100806" version="1" comment="libsoftokn3-x86 is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100810" version="1" comment="mozilla-nss-x86 is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114504" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105798" version="1" comment="libjasper-x86 is &lt;1.900.1-134.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099911" version="1" comment="libmysql55client18-x86 is &lt;5.5.39-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099915" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099919" version="1" comment="mysql-tools is &lt;5.5.39-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101162" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101161" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101163" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101164" version="1" comment="openssl-doc is &lt;0.9.8j-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117953" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119821" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099502" version="1" comment="libpulse0-x86 is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112937" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112938" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112939" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112940" version="1" comment="libqt4-x86 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112919" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115104" version="1" comment="librsvg-x86 is &lt;2.26.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116736" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098960" version="1" comment="libtasn1-3-x86 is &lt;1.5-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098486" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156783" version="1" comment="libxml2-32bit is &lt;2.7.6-0.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119822" version="1" comment="libxml2-doc is &lt;2.7.6-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119823" version="1" comment="libxml2-x86 is &lt;2.7.6-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121388" version="1" comment="libxml2-doc is &lt;2.7.6-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121389" version="1" comment="libxml2-x86 is &lt;2.7.6-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148566" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148567" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148568" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148569" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142229" version="1" comment="libfreebl3-32bit is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142230" version="1" comment="libsoftokn3-32bit is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142231" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122554" version="1" comment="libfreebl3-x86 is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122555" version="1" comment="libsoftokn3-x86 is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122556" version="1" comment="mozilla-nss-x86 is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113991" version="1" comment="mozilla-nspr-x86 is &lt;4.10.8-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120795" version="1" comment="libfreebl3-x86 is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120796" version="1" comment="libsoftokn3-x86 is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120797" version="1" comment="mozilla-nss-x86 is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091403" version="1" comment="libfreebl3-x86 is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091406" version="1" comment="libsoftokn3-x86 is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091410" version="1" comment="mozilla-nss-x86 is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115103" version="1" comment="libmysql55client18-x86 is &lt;5.5.45-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115101" version="1" comment="mysql-tools is &lt;5.5.45-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118187" version="1" comment="libmysql55client18-x86 is &lt;5.5.46-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118188" version="1" comment="mysql-tools is &lt;5.5.46-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122390" version="1" comment="libmysql55client18-x86 is &lt;5.5.47-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122391" version="1" comment="mysql-tools is &lt;5.5.47-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132453" version="1" comment="libmysql55client18-32bit is &lt;5.5.52-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148174" version="1" comment="libmysql55client18-32bit is &lt;5.5.54-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166798" version="1" comment="libmysql55client18-32bit is &lt;5.5.58-0.39.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114284" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091779" version="1" comment="libfreebl3-x86 is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091782" version="1" comment="libsoftokn3-x86 is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091786" version="1" comment="mozilla-nss-x86 is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114130" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114136" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114133" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119858" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119859" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119860" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118754" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149094" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149095" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091788" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098711" version="1" comment="pam-x86 is &lt;1.1.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112941" version="1" comment="perl-x86 is &lt;5.10.0-64.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114004" version="1" comment="apache2-mod_php53 is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114006" version="1" comment="php53-bcmath is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114007" version="1" comment="php53-bz2 is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114008" version="1" comment="php53-calendar is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114009" version="1" comment="php53-ctype is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114010" version="1" comment="php53-curl is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114011" version="1" comment="php53-dba is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114012" version="1" comment="php53-dom is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114013" version="1" comment="php53-exif is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114014" version="1" comment="php53-fastcgi is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114015" version="1" comment="php53-fileinfo is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114016" version="1" comment="php53-ftp is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114017" version="1" comment="php53-gd is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114018" version="1" comment="php53-gettext is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114019" version="1" comment="php53-gmp is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114020" version="1" comment="php53-iconv is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114021" version="1" comment="php53-intl is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114022" version="1" comment="php53-json is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114023" version="1" comment="php53-ldap is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114024" version="1" comment="php53-mbstring is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114025" version="1" comment="php53-mcrypt is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114026" version="1" comment="php53-mysql is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114027" version="1" comment="php53-odbc is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114028" version="1" comment="php53-openssl is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114029" version="1" comment="php53-pcntl is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114030" version="1" comment="php53-pdo is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114031" version="1" comment="php53-pear is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114032" version="1" comment="php53-pgsql is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114033" version="1" comment="php53-pspell is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114034" version="1" comment="php53-shmop is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114035" version="1" comment="php53-snmp is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114036" version="1" comment="php53-soap is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114037" version="1" comment="php53-suhosin is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114038" version="1" comment="php53-sysvmsg is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114039" version="1" comment="php53-sysvsem is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114040" version="1" comment="php53-sysvshm is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114041" version="1" comment="php53-tokenizer is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114042" version="1" comment="php53-wddx is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114043" version="1" comment="php53-xmlreader is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114044" version="1" comment="php53-xmlrpc is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114045" version="1" comment="php53-xmlwriter is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114046" version="1" comment="php53-xsl is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114047" version="1" comment="php53-zip is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114048" version="1" comment="php53-zlib is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115151" version="1" comment="apache2-mod_php53 is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115153" version="1" comment="php53-bcmath is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115154" version="1" comment="php53-bz2 is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115155" version="1" comment="php53-calendar is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115156" version="1" comment="php53-ctype is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115157" version="1" comment="php53-curl is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115158" version="1" comment="php53-dba is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115159" version="1" comment="php53-dom is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115160" version="1" comment="php53-exif is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115161" version="1" comment="php53-fastcgi is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115162" version="1" comment="php53-fileinfo is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115163" version="1" comment="php53-ftp is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115164" version="1" comment="php53-gd is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115165" version="1" comment="php53-gettext is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115166" version="1" comment="php53-gmp is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115167" version="1" comment="php53-iconv is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115168" version="1" comment="php53-intl is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115169" version="1" comment="php53-json is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115170" version="1" comment="php53-ldap is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115171" version="1" comment="php53-mbstring is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115172" version="1" comment="php53-mcrypt is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115173" version="1" comment="php53-mysql is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115174" version="1" comment="php53-odbc is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115175" version="1" comment="php53-openssl is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115176" version="1" comment="php53-pcntl is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115177" version="1" comment="php53-pdo is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115178" version="1" comment="php53-pear is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115179" version="1" comment="php53-pgsql is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115180" version="1" comment="php53-pspell is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115181" version="1" comment="php53-shmop is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115182" version="1" comment="php53-snmp is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115183" version="1" comment="php53-soap is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115184" version="1" comment="php53-suhosin is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115185" version="1" comment="php53-sysvmsg is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115186" version="1" comment="php53-sysvsem is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115187" version="1" comment="php53-sysvshm is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115188" version="1" comment="php53-tokenizer is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115189" version="1" comment="php53-wddx is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115190" version="1" comment="php53-xmlreader is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115191" version="1" comment="php53-xmlrpc is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115192" version="1" comment="php53-xmlwriter is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115193" version="1" comment="php53-xsl is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115194" version="1" comment="php53-zip is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115195" version="1" comment="php53-zlib is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128826" version="1" comment="apache2-mod_php53 is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128827" version="1" comment="php53-bcmath is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128828" version="1" comment="php53-bz2 is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128829" version="1" comment="php53-calendar is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128830" version="1" comment="php53-ctype is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128831" version="1" comment="php53-curl is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128832" version="1" comment="php53-dba is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128833" version="1" comment="php53-dom is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128834" version="1" comment="php53-exif is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128835" version="1" comment="php53-fastcgi is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128836" version="1" comment="php53-fileinfo is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128837" version="1" comment="php53-ftp is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128838" version="1" comment="php53-gd is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128839" version="1" comment="php53-gettext is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128840" version="1" comment="php53-gmp is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128841" version="1" comment="php53-iconv is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128842" version="1" comment="php53-intl is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128843" version="1" comment="php53-json is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128844" version="1" comment="php53-ldap is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128845" version="1" comment="php53-mbstring is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128846" version="1" comment="php53-mcrypt is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128847" version="1" comment="php53-mysql is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128848" version="1" comment="php53-odbc is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128849" version="1" comment="php53-openssl is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128850" version="1" comment="php53-pcntl is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128851" version="1" comment="php53-pdo is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128852" version="1" comment="php53-pear is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128853" version="1" comment="php53-pgsql is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128854" version="1" comment="php53-pspell is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128855" version="1" comment="php53-shmop is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128856" version="1" comment="php53-snmp is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128857" version="1" comment="php53-soap is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128858" version="1" comment="php53-suhosin is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128859" version="1" comment="php53-sysvmsg is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128860" version="1" comment="php53-sysvsem is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128861" version="1" comment="php53-sysvshm is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128862" version="1" comment="php53-tokenizer is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128863" version="1" comment="php53-wddx is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128864" version="1" comment="php53-xmlreader is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128865" version="1" comment="php53-xmlrpc is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128866" version="1" comment="php53-xmlwriter is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128867" version="1" comment="php53-xsl is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128868" version="1" comment="php53-zip is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128869" version="1" comment="php53-zlib is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103189" version="1" comment="popt-x86 is &lt;1.7-37.60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123277" version="1" comment="postgresql94-contrib is &lt;9.4.5-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123278" version="1" comment="postgresql94-server is &lt;9.4.5-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108219" version="1" comment="postgresql91-contrib is &lt;9.1.15-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108220" version="1" comment="postgresql91-server is &lt;9.1.15-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110600" version="1" comment="postgresql91-contrib is &lt;9.1.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110601" version="1" comment="postgresql91-server is &lt;9.1.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121796" version="1" comment="postgresql91-contrib is &lt;9.1.19-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121797" version="1" comment="postgresql91-server is &lt;9.1.19-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162350" version="1" comment="libpq5-32bit is &lt;9.4.13-0.23.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100731" version="1" comment="powerpc-utils is &lt;1.2.16-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098751" version="1" comment="ppc64-diag is &lt;2.6.1-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098479" version="1" comment="puppet-server is &lt;2.6.18-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102348" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102349" version="1" comment="python-base-x86 is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102350" version="1" comment="python-x86 is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112942" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112943" version="1" comment="python-base-x86 is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112944" version="1" comment="python-x86 is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098669" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098673" version="1" comment="python-base-x86 is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098682" version="1" comment="python-x86 is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099512" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099516" version="1" comment="python-base-x86 is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099525" version="1" comment="python-x86 is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125966" version="1" comment="ldapsmb is &lt;1.34b-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125967" version="1" comment="libldb1 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125968" version="1" comment="libsmbclient0 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125969" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125970" version="1" comment="libtalloc2 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125971" version="1" comment="libtalloc2-32bit is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125972" version="1" comment="libtdb1 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125973" version="1" comment="libtdb1-32bit is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125974" version="1" comment="libtevent0 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125975" version="1" comment="libtevent0-32bit is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125976" version="1" comment="libwbclient0 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125977" version="1" comment="libwbclient0-32bit is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125978" version="1" comment="samba-32bit is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125979" version="1" comment="samba-client is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125980" version="1" comment="samba-client-32bit is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125981" version="1" comment="samba-doc is &lt;3.6.3-76.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125982" version="1" comment="samba-krb-printing is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125983" version="1" comment="samba-winbind is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125984" version="1" comment="samba-winbind-32bit is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146129" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146130" version="1" comment="libtalloc2-32bit is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146131" version="1" comment="libtdb1-32bit is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146132" version="1" comment="libtevent0-32bit is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146133" version="1" comment="libwbclient0-32bit is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146134" version="1" comment="samba-32bit is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146135" version="1" comment="samba-client-32bit is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146136" version="1" comment="samba-winbind-32bit is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155114" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155115" version="1" comment="libtalloc2-32bit is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155116" version="1" comment="libtdb1-32bit is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155117" version="1" comment="libtevent0-32bit is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155118" version="1" comment="libwbclient0-32bit is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155119" version="1" comment="samba-32bit is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155120" version="1" comment="samba-client-32bit is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155121" version="1" comment="samba-winbind-32bit is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155952" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155953" version="1" comment="libtalloc2-32bit is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155954" version="1" comment="libtdb1-32bit is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155955" version="1" comment="libtevent0-32bit is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155956" version="1" comment="libwbclient0-32bit is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155957" version="1" comment="samba-32bit is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155958" version="1" comment="samba-client-32bit is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155959" version="1" comment="samba-winbind-32bit is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165593" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165594" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165595" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165596" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165597" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165598" version="1" comment="samba-32bit is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165599" version="1" comment="samba-client-32bit is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165600" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169127" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169128" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169129" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169130" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169131" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169132" version="1" comment="samba-32bit is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169133" version="1" comment="samba-client-32bit is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169134" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106612" version="1" comment="ldapsmb is &lt;1.34b-12.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106613" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106614" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106615" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106616" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106617" version="1" comment="samba-client-x86 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106618" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106619" version="1" comment="samba-x86 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121390" version="1" comment="ldapsmb is &lt;1.34b-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121391" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121392" version="1" comment="libtalloc2-x86 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121393" version="1" comment="libtdb1-x86 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121394" version="1" comment="libwbclient0-x86 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121395" version="1" comment="samba-client-x86 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121396" version="1" comment="samba-winbind-x86 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121397" version="1" comment="samba-x86 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116737" version="1" comment="squid is &lt;2.7.STABLE5-2.12.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113946" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099537" version="1" comment="libtcnative-1-0 is &lt;1.3.3-12.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106937" version="1" comment="vsftpd is &lt;2.0.7-4.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129753" version="1" comment="xen is &lt;4.2.5_20-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129754" version="1" comment="xen-doc-html is &lt;4.2.5_20-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129755" version="1" comment="xen-doc-pdf is &lt;4.2.5_20-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129756" version="1" comment="xen-kmp-default is &lt;4.2.5_20_3.0.101_0.47.79-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129757" version="1" comment="xen-kmp-pae is &lt;4.2.5_20_3.0.101_0.47.79-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129758" version="1" comment="xen-libs is &lt;4.2.5_20-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129759" version="1" comment="xen-libs-32bit is &lt;4.2.5_20-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129760" version="1" comment="xen-tools is &lt;4.2.5_20-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129761" version="1" comment="xen-tools-domU is &lt;4.2.5_20-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135277" version="1" comment="xen-doc-html is &lt;4.2.5_21-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135278" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135279" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135280" version="1" comment="xen-tools is &lt;4.2.5_21-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145990" version="1" comment="xen-doc-html is &lt;4.2.5_21-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145991" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145992" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145993" version="1" comment="xen-tools is &lt;4.2.5_21-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149675" version="1" comment="xen-doc-html is &lt;4.2.5_21-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149676" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149677" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149678" version="1" comment="xen-tools is &lt;4.2.5_21-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154474" version="1" comment="xen-doc-html is &lt;4.2.5_21-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154475" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154476" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154477" version="1" comment="xen-tools is &lt;4.2.5_21-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154959" version="1" comment="xen-doc-html is &lt;4.2.5_21-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154960" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154961" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154962" version="1" comment="xen-tools is &lt;4.2.5_21-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157761" version="1" comment="xen-doc-html is &lt;4.2.5_21-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157762" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157763" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157764" version="1" comment="xen-tools is &lt;4.2.5_21-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162987" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162988" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162989" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162990" version="1" comment="xen-tools is &lt;4.2.5_21-45.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164392" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164393" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164394" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164395" version="1" comment="xen-tools is &lt;4.2.5_21-45.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165899" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165900" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165901" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165902" version="1" comment="xen-tools is &lt;4.2.5_21-45.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167800" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167801" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167802" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167803" version="1" comment="xen-tools is &lt;4.2.5_21-45.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173026" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173027" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173028" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173029" version="1" comment="xen-tools is &lt;4.2.5_21-45.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098576" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113241" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129922" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129923" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132454" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132455" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136185" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136186" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145856" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145857" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149096" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149097" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157081" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157082" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161977" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161978" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167422" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167423" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168745" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168746" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169379" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169380" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169855" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169856" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170888" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170889" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172071" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172072" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173518" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173519" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174190" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174191" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127947" version="1" comment="libfreebl3-x86 is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127948" version="1" comment="libsoftokn3-x86 is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127949" version="1" comment="mozilla-nspr-x86 is &lt;4.12-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127950" version="1" comment="mozilla-nss-x86 is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130064" version="1" comment="libfreebl3-x86 is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130065" version="1" comment="libsoftokn3-x86 is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130066" version="1" comment="mozilla-nspr-x86 is &lt;4.12-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130067" version="1" comment="mozilla-nss-x86 is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155037" version="1" comment="libfreebl3-x86 is &lt;3.29.5-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155038" version="1" comment="libsoftokn3-x86 is &lt;3.29.5-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155039" version="1" comment="mozilla-nspr-x86 is &lt;4.13.1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155040" version="1" comment="mozilla-nss-x86 is &lt;3.29.5-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162294" version="1" comment="libfreebl3-x86 is &lt;3.29.5-47.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162295" version="1" comment="libsoftokn3-x86 is &lt;3.29.5-47.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162296" version="1" comment="mozilla-nss-x86 is &lt;3.29.5-47.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124769" version="1" comment="libfreebl3-x86 is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124770" version="1" comment="libsoftokn3-x86 is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124771" version="1" comment="mozilla-nspr-x86 is &lt;4.12-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124772" version="1" comment="mozilla-nss-x86 is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128350" version="1" comment="NetworkManager-kde4 is &lt;0.9.svn1043876-1.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128351" version="1" comment="NetworkManager-kde4-lang is &lt;0.9.svn1043876-1.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128352" version="1" comment="NetworkManager-kde4-libs is &lt;0.9.svn1043876-1.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128353" version="1" comment="NetworkManager-openvpn-kde4 is &lt;0.9.svn1043876-1.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128354" version="1" comment="NetworkManager-pptp-kde4 is &lt;0.9.svn1043876-1.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128355" version="1" comment="plasmoid-networkmanagement is &lt;0.9.svn1043876-1.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172672" version="1" comment="OpenEXR-x86 is &lt;1.6.1-83.17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166492" version="1" comment="SuSEfirewall2 is &lt;3.6_SVNr208-2.18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159398" version="1" comment="apport is &lt;0.114-12.8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159399" version="1" comment="apport-crashdb-sle is &lt;0.114-0.8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159400" version="1" comment="apport-gtk is &lt;0.114-12.8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155074" version="1" comment="audiofile-32bit is &lt;0.2.6-142.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155075" version="1" comment="audiofile-x86 is &lt;0.2.6-142.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172870" version="1" comment="augeas-lenses is &lt;0.9.0-3.21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172871" version="1" comment="libaugeas0 is &lt;0.9.0-3.21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147858" version="1" comment="bash-doc is &lt;3.2-147.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147859" version="1" comment="bash-x86 is &lt;3.2-147.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147860" version="1" comment="libreadline5-32bit is &lt;5.2-147.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147861" version="1" comment="libreadline5-x86 is &lt;5.2-147.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147862" version="1" comment="readline-doc is &lt;5.2-147.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155635" version="1" comment="bash-doc is &lt;3.2-147.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155636" version="1" comment="bash-x86 is &lt;3.2-147.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155637" version="1" comment="libreadline5-32bit is &lt;5.2-147.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155638" version="1" comment="libreadline5-x86 is &lt;5.2-147.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155639" version="1" comment="readline-doc is &lt;5.2-147.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125049" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132456" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135233" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146909" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149120" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154317" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154373" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157765" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127857" version="1" comment="rhnlib is &lt;2.5.69.8-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127858" version="1" comment="suseRegisterInfo is &lt;2.1.12-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174144" version="1" comment="coreutils is &lt;8.12-6.25.33.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174145" version="1" comment="coreutils-lang is &lt;8.12-6.25.33.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174146" version="1" comment="coreutils-x86 is &lt;8.12-6.25.33.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132457" version="1" comment="cracklib-32bit is &lt;2.8.12-56.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132458" version="1" comment="cracklib-x86 is &lt;2.8.12-56.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132459" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135240" version="1" comment="libcurl4 is &lt;7.19.7-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135241" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135242" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154478" version="1" comment="libcurl4 is &lt;7.19.7-1.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154479" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154480" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162930" version="1" comment="libcurl4 is &lt;7.19.7-1.70.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162931" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.70.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162932" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.70.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167445" version="1" comment="libcurl4 is &lt;7.19.7-1.70.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167446" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.70.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167447" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.70.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170294" version="1" comment="libcurl4 is &lt;7.19.7-1.70.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170295" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.70.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171335" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.28.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171336" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.28.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171337" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.28.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173869" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.28.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173870" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.28.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173871" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.28.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144569" version="1" comment="dnsmasq is &lt;2.71-0.16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164849" version="1" comment="dnsmasq is &lt;2.78-0.17.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132460" version="1" comment="dosfstools is &lt;3.0.26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172778" version="1" comment="evince-doc is &lt;2.28.2-0.7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172779" version="1" comment="evince-lang is &lt;2.28.2-0.7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128481" version="1" comment="libexpat1 is &lt;2.0.1-88.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128482" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128483" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148220" version="1" comment="libexpat1 is &lt;2.0.1-88.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148221" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148222" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163314" version="1" comment="libexpat1 is &lt;2.0.1-88.42.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163315" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163316" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.42.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125345" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.20.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166154" version="1" comment="libfreebl3-x86 is &lt;3.29.5-47.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166155" version="1" comment="libsoftokn3-x86 is &lt;3.29.5-47.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166156" version="1" comment="mozilla-nss-x86 is &lt;3.29.5-47.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132461" version="1" comment="fontconfig-32bit is &lt;2.6.0-10.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132462" version="1" comment="fontconfig-x86 is &lt;2.6.0-10.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157953" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157954" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157955" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162312" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162313" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162314" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126730" version="1" comment="freetype2-32bit is &lt;2.3.7-25.41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126731" version="1" comment="freetype2-x86 is &lt;2.3.7-25.41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126732" version="1" comment="ft2demos is &lt;2.3.7-25.41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171475" version="1" comment="freetype2-32bit is &lt;2.3.7-25.45.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171476" version="1" comment="freetype2-x86 is &lt;2.3.7-25.45.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171477" version="1" comment="ft2demos is &lt;2.3.7-25.45.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174034" version="1" comment="freetype2-32bit is &lt;2.3.7-25.45.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174035" version="1" comment="freetype2-x86 is &lt;2.3.7-25.45.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174036" version="1" comment="ft2demos is &lt;2.3.7-25.45.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125549" version="1" comment="libatomic1-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125550" version="1" comment="libffi4 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125551" version="1" comment="libffi4-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135281" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135282" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135283" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135284" version="1" comment="ghostscript-omni is &lt;8.62-32.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135285" version="1" comment="ghostscript-x11 is &lt;8.62-32.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135286" version="1" comment="libgimpprint is &lt;4.2.7-32.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154963" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154964" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154965" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154966" version="1" comment="ghostscript-omni is &lt;8.62-32.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154967" version="1" comment="ghostscript-x11 is &lt;8.62-32.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154968" version="1" comment="libgimpprint is &lt;4.2.7-32.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126733" version="1" comment="giflib-32bit is &lt;4.1.6-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126734" version="1" comment="giflib-progs is &lt;4.1.6-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126735" version="1" comment="giflib-x86 is &lt;4.1.6-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132463" version="1" comment="glibc-32bit is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132464" version="1" comment="glibc-devel is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132465" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132466" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132467" version="1" comment="glibc-locale is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132468" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132469" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132470" version="1" comment="glibc-profile is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132471" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132472" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132473" version="1" comment="glibc-x86 is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132474" version="1" comment="nscd is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157132" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157133" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157134" version="1" comment="glibc-x86 is &lt;2.11.3-17.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169567" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169568" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169569" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172603" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172604" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172605" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174192" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174193" version="1" comment="glibc-devel is &lt;2.11.3-17.110.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174194" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174195" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174196" version="1" comment="glibc-locale is &lt;2.11.3-17.110.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174197" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174198" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174199" version="1" comment="glibc-profile is &lt;2.11.3-17.110.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174200" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174201" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174202" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174203" version="1" comment="nscd is &lt;2.11.3-17.110.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161979" version="1" comment="gnome-session is &lt;2.28.0-3.11.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161980" version="1" comment="gnome-session-lang is &lt;2.28.0-3.11.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147863" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147864" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147865" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158871" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158872" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158873" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147777" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147778" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147779" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147780" version="1" comment="gstreamer-0_10-plugins-base-x86 is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147781" version="1" comment="libgstapp-0_10-0 is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147782" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147783" version="1" comment="libgstapp-0_10-0-x86 is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147784" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147785" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147786" version="1" comment="libgstinterfaces-0_10-0-x86 is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147437" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.30-5.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147438" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.30-5.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147439" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.30-5.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132475" version="1" comment="gtk2-32bit is &lt;2.18.9-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132476" version="1" comment="gtk2-doc is &lt;2.18.9-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132477" version="1" comment="gtk2-lang is &lt;2.18.9-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132478" version="1" comment="gtk2-x86 is &lt;2.18.9-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171478" version="1" comment="gtk2-32bit is &lt;2.18.9-0.45.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171479" version="1" comment="gtk2-doc is &lt;2.18.9-0.45.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171480" version="1" comment="gtk2-lang is &lt;2.18.9-0.45.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171481" version="1" comment="gtk2-x86 is &lt;2.18.9-0.45.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115114" version="1" comment="libicu-doc is &lt;4.0-7.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115115" version="1" comment="libicu-x86 is &lt;4.0-7.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126445" version="1" comment="libicu is &lt;4.0-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126446" version="1" comment="libicu-doc is &lt;4.0-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126447" version="1" comment="libicu-x86 is &lt;4.0-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147464" version="1" comment="libicu is &lt;4.0-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147465" version="1" comment="libicu-doc is &lt;4.0-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147466" version="1" comment="libicu-x86 is &lt;4.0-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148471" version="1" comment="libicu is &lt;4.0-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148472" version="1" comment="libicu-doc is &lt;4.0-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148473" version="1" comment="libicu-x86 is &lt;4.0-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168474" version="1" comment="intel-SINIT is &lt;1-0.81.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171218" version="1" comment="ipsec-tools is &lt;0.7.3-1.38.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157368" version="1" comment="jakarta-taglibs-standard is &lt;1.1.1-234.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157369" version="1" comment="jakarta-taglibs-standard-javadoc is &lt;1.1.1-234.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135432" version="1" comment="libjasper is &lt;1.900.14-134.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135433" version="1" comment="libjasper-32bit is &lt;1.900.14-134.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135434" version="1" comment="libjasper-x86 is &lt;1.900.14-134.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150584" version="1" comment="libjasper is &lt;1.900.14-134.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150585" version="1" comment="libjasper-32bit is &lt;1.900.14-134.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150586" version="1" comment="libjasper-x86 is &lt;1.900.14-134.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158917" version="1" comment="libjasper is &lt;1.900.14-134.33.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158918" version="1" comment="libjasper-32bit is &lt;1.900.14-134.33.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158919" version="1" comment="libjasper-x86 is &lt;1.900.14-134.33.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113216" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113215" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113217" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118318" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118319" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118320" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122557" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.30-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122558" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.30-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122559" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.30-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127568" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.40-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127569" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.40-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127570" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.40-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136707" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.60-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136708" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.60-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136709" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.60-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149679" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149680" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149681" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155728" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.5-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155729" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.5-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155730" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.5-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162461" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.10-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162462" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.10-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162463" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.10-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168930" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.15-26.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168931" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.15-26.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168932" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.15-26.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172765" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.20-26.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172766" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.20-26.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172767" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.20-26.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132479" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.50-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132480" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.50-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132481" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.50-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132482" version="1" comment="kernel-default is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132483" version="1" comment="kernel-default-base is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132484" version="1" comment="kernel-default-devel is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132485" version="1" comment="kernel-default-man is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132486" version="1" comment="kernel-ec2 is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132487" version="1" comment="kernel-ec2-base is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132488" version="1" comment="kernel-ec2-devel is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132489" version="1" comment="kernel-pae is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132490" version="1" comment="kernel-pae-base is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132491" version="1" comment="kernel-pae-devel is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132492" version="1" comment="kernel-ppc64 is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132493" version="1" comment="kernel-ppc64-base is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132494" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132495" version="1" comment="kernel-source is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132496" version="1" comment="kernel-syms is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132497" version="1" comment="kernel-trace is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132498" version="1" comment="kernel-trace-base is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132499" version="1" comment="kernel-trace-devel is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132500" version="1" comment="kernel-xen is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132501" version="1" comment="kernel-xen-base is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132502" version="1" comment="kernel-xen-devel is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136295" version="1" comment="kernel-bigmem is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136296" version="1" comment="kernel-bigmem-base is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136297" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136298" version="1" comment="kernel-default is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136299" version="1" comment="kernel-default-base is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136300" version="1" comment="kernel-default-devel is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136301" version="1" comment="kernel-default-man is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136302" version="1" comment="kernel-ec2 is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136303" version="1" comment="kernel-ec2-base is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136304" version="1" comment="kernel-ec2-devel is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136305" version="1" comment="kernel-pae is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136306" version="1" comment="kernel-pae-base is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136307" version="1" comment="kernel-pae-devel is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136308" version="1" comment="kernel-ppc64 is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136309" version="1" comment="kernel-ppc64-base is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136310" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136311" version="1" comment="kernel-source is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136312" version="1" comment="kernel-syms is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136313" version="1" comment="kernel-trace is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136314" version="1" comment="kernel-trace-base is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136315" version="1" comment="kernel-trace-devel is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136316" version="1" comment="kernel-xen is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136317" version="1" comment="kernel-xen-base is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136318" version="1" comment="kernel-xen-devel is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148272" version="1" comment="kernel-bigmem is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148273" version="1" comment="kernel-bigmem-base is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148274" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148275" version="1" comment="kernel-default is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148276" version="1" comment="kernel-default-base is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148277" version="1" comment="kernel-default-devel is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148278" version="1" comment="kernel-default-man is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148279" version="1" comment="kernel-ec2 is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148280" version="1" comment="kernel-ec2-base is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148281" version="1" comment="kernel-ec2-devel is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148282" version="1" comment="kernel-pae is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148283" version="1" comment="kernel-pae-base is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148284" version="1" comment="kernel-pae-devel is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148285" version="1" comment="kernel-ppc64 is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148286" version="1" comment="kernel-ppc64-base is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148287" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148288" version="1" comment="kernel-source is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148289" version="1" comment="kernel-syms is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148290" version="1" comment="kernel-trace is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148291" version="1" comment="kernel-trace-base is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148292" version="1" comment="kernel-trace-devel is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148293" version="1" comment="kernel-xen is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148294" version="1" comment="kernel-xen-base is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148295" version="1" comment="kernel-xen-devel is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150514" version="1" comment="kernel-bigmem is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150515" version="1" comment="kernel-bigmem-base is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150516" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150517" version="1" comment="kernel-default is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150518" version="1" comment="kernel-default-base is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150519" version="1" comment="kernel-default-devel is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150520" version="1" comment="kernel-default-man is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150521" version="1" comment="kernel-ec2 is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150522" version="1" comment="kernel-ec2-base is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150523" version="1" comment="kernel-ec2-devel is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150524" version="1" comment="kernel-pae is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150525" version="1" comment="kernel-pae-base is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150526" version="1" comment="kernel-pae-devel is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150527" version="1" comment="kernel-ppc64 is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150528" version="1" comment="kernel-ppc64-base is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150529" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150530" version="1" comment="kernel-source is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150531" version="1" comment="kernel-syms is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150532" version="1" comment="kernel-trace is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150533" version="1" comment="kernel-trace-base is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150534" version="1" comment="kernel-trace-devel is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150535" version="1" comment="kernel-xen is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150536" version="1" comment="kernel-xen-base is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150537" version="1" comment="kernel-xen-devel is &lt;3.0.101-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157171" version="1" comment="kernel-bigmem is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157172" version="1" comment="kernel-bigmem-base is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157173" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157174" version="1" comment="kernel-default is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157175" version="1" comment="kernel-default-base is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157176" version="1" comment="kernel-default-devel is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157177" version="1" comment="kernel-default-man is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157178" version="1" comment="kernel-ec2 is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157179" version="1" comment="kernel-ec2-base is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157180" version="1" comment="kernel-ec2-devel is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157181" version="1" comment="kernel-pae is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157182" version="1" comment="kernel-pae-base is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157183" version="1" comment="kernel-pae-devel is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157184" version="1" comment="kernel-ppc64 is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157185" version="1" comment="kernel-ppc64-base is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157186" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157187" version="1" comment="kernel-source is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157188" version="1" comment="kernel-syms is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157189" version="1" comment="kernel-trace is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157190" version="1" comment="kernel-trace-base is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157191" version="1" comment="kernel-trace-devel is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157192" version="1" comment="kernel-xen is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157193" version="1" comment="kernel-xen-base is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157194" version="1" comment="kernel-xen-devel is &lt;3.0.101-104.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163407" version="1" comment="kernel-bigmem is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163408" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163409" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163410" version="1" comment="kernel-default is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163411" version="1" comment="kernel-default-base is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163412" version="1" comment="kernel-default-devel is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163413" version="1" comment="kernel-default-man is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163414" version="1" comment="kernel-ec2 is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163415" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163416" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163417" version="1" comment="kernel-pae is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163418" version="1" comment="kernel-pae-base is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163419" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163420" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163421" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163422" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163423" version="1" comment="kernel-source is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163424" version="1" comment="kernel-syms is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163425" version="1" comment="kernel-trace is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163426" version="1" comment="kernel-trace-base is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163427" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163428" version="1" comment="kernel-xen is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163429" version="1" comment="kernel-xen-base is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163430" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165601" version="1" comment="kernel-bigmem is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165602" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165603" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165604" version="1" comment="kernel-default is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165605" version="1" comment="kernel-default-base is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165606" version="1" comment="kernel-default-devel is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165607" version="1" comment="kernel-default-man is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165608" version="1" comment="kernel-ec2 is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165609" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165610" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165611" version="1" comment="kernel-pae is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165612" version="1" comment="kernel-pae-base is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165613" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165614" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165615" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165616" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165617" version="1" comment="kernel-source is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165618" version="1" comment="kernel-syms is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165619" version="1" comment="kernel-trace is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165620" version="1" comment="kernel-trace-base is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165621" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165622" version="1" comment="kernel-xen is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165623" version="1" comment="kernel-xen-base is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165624" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114802" version="1" comment="kernel-default-man is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114803" version="1" comment="kernel-ec2 is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114804" version="1" comment="kernel-ec2-base is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114805" version="1" comment="kernel-ec2-devel is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114783" version="1" comment="kernel-ppc64 is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114800" version="1" comment="kernel-ppc64-base is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114801" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114798" version="1" comment="kernel-trace-base is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125552" version="1" comment="kernel-default-man is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125553" version="1" comment="kernel-ec2 is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125554" version="1" comment="kernel-ec2-base is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125555" version="1" comment="kernel-ec2-devel is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125556" version="1" comment="kernel-ppc64 is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125557" version="1" comment="kernel-ppc64-base is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125558" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125559" version="1" comment="kernel-trace-base is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168209" version="1" comment="kernel-bigmem is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168210" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168211" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168212" version="1" comment="kernel-default is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168213" version="1" comment="kernel-default-base is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168214" version="1" comment="kernel-default-devel is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168215" version="1" comment="kernel-default-man is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168216" version="1" comment="kernel-ec2 is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168217" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168218" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168219" version="1" comment="kernel-pae is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168220" version="1" comment="kernel-pae-base is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168221" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168222" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168223" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168224" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168225" version="1" comment="kernel-source is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168226" version="1" comment="kernel-syms is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168227" version="1" comment="kernel-trace is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168228" version="1" comment="kernel-trace-base is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168229" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168230" version="1" comment="kernel-xen is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168231" version="1" comment="kernel-xen-base is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168232" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169135" version="1" comment="kernel-bigmem is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169136" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169137" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169138" version="1" comment="kernel-default is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169139" version="1" comment="kernel-default-base is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169140" version="1" comment="kernel-default-devel is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169141" version="1" comment="kernel-default-man is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169142" version="1" comment="kernel-ec2 is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169143" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169144" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169145" version="1" comment="kernel-pae is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169146" version="1" comment="kernel-pae-base is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169147" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169148" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169149" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169150" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169151" version="1" comment="kernel-source is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169152" version="1" comment="kernel-syms is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169153" version="1" comment="kernel-trace is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169154" version="1" comment="kernel-trace-base is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169155" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169156" version="1" comment="kernel-xen is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169157" version="1" comment="kernel-xen-base is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169158" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169857" version="1" comment="kernel-default is &lt;3.0.101-108.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169858" version="1" comment="kernel-default-base is &lt;3.0.101-108.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169859" version="1" comment="kernel-default-devel is &lt;3.0.101-108.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169860" version="1" comment="kernel-default-man is &lt;3.0.101-108.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169861" version="1" comment="kernel-source is &lt;3.0.101-108.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169862" version="1" comment="kernel-syms is &lt;3.0.101-108.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169863" version="1" comment="kernel-trace is &lt;3.0.101-108.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169864" version="1" comment="kernel-trace-base is &lt;3.0.101-108.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169865" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172536" version="1" comment="kernel-bigmem is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172537" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172538" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172539" version="1" comment="kernel-default is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172540" version="1" comment="kernel-default-base is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172541" version="1" comment="kernel-default-devel is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172542" version="1" comment="kernel-default-man is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172543" version="1" comment="kernel-ec2 is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172544" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172545" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172546" version="1" comment="kernel-pae is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172547" version="1" comment="kernel-pae-base is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172548" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172549" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172550" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172551" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172552" version="1" comment="kernel-source is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172553" version="1" comment="kernel-syms is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172554" version="1" comment="kernel-trace is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172555" version="1" comment="kernel-trace-base is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172556" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172557" version="1" comment="kernel-xen is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172558" version="1" comment="kernel-xen-base is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172559" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173030" version="1" comment="kernel-firmware is &lt;20110923-0.59.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118647" version="1" comment="kernel-default-man is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118648" version="1" comment="kernel-ec2 is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118649" version="1" comment="kernel-ec2-base is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118650" version="1" comment="kernel-ec2-devel is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118651" version="1" comment="kernel-ppc64 is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118652" version="1" comment="kernel-ppc64-base is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118653" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118654" version="1" comment="kernel-trace-base is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129235" version="1" comment="kernel-default is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129236" version="1" comment="kernel-default-base is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129237" version="1" comment="kernel-default-devel is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129238" version="1" comment="kernel-default-man is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129239" version="1" comment="kernel-ec2 is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129240" version="1" comment="kernel-ec2-base is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129241" version="1" comment="kernel-ec2-devel is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129242" version="1" comment="kernel-pae is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129243" version="1" comment="kernel-pae-base is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129244" version="1" comment="kernel-pae-devel is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129245" version="1" comment="kernel-ppc64 is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129246" version="1" comment="kernel-ppc64-base is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129247" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129248" version="1" comment="kernel-source is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129249" version="1" comment="kernel-syms is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129250" version="1" comment="kernel-trace is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129251" version="1" comment="kernel-trace-base is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129252" version="1" comment="kernel-trace-devel is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129253" version="1" comment="kernel-xen is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129254" version="1" comment="kernel-xen-base is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129255" version="1" comment="kernel-xen-devel is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132503" version="1" comment="kernel-default is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132504" version="1" comment="kernel-default-base is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132505" version="1" comment="kernel-default-devel is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132506" version="1" comment="kernel-default-man is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132507" version="1" comment="kernel-ec2 is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132508" version="1" comment="kernel-ec2-base is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132509" version="1" comment="kernel-ec2-devel is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132510" version="1" comment="kernel-pae is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132511" version="1" comment="kernel-pae-base is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132512" version="1" comment="kernel-pae-devel is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132513" version="1" comment="kernel-ppc64 is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132514" version="1" comment="kernel-ppc64-base is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132515" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132516" version="1" comment="kernel-source is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132517" version="1" comment="kernel-syms is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132518" version="1" comment="kernel-trace is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132519" version="1" comment="kernel-trace-base is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132520" version="1" comment="kernel-trace-devel is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132521" version="1" comment="kernel-xen is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132522" version="1" comment="kernel-xen-base is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132523" version="1" comment="kernel-xen-devel is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157370" version="1" comment="kernel-bigmem is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157371" version="1" comment="kernel-bigmem-base is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157372" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157373" version="1" comment="kernel-default is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157374" version="1" comment="kernel-default-base is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157375" version="1" comment="kernel-default-devel is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157376" version="1" comment="kernel-default-man is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157377" version="1" comment="kernel-ec2 is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157378" version="1" comment="kernel-ec2-base is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157379" version="1" comment="kernel-ec2-devel is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157380" version="1" comment="kernel-pae is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157381" version="1" comment="kernel-pae-base is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157382" version="1" comment="kernel-pae-devel is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157383" version="1" comment="kernel-ppc64 is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157384" version="1" comment="kernel-ppc64-base is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157385" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157386" version="1" comment="kernel-source is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157387" version="1" comment="kernel-syms is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157388" version="1" comment="kernel-trace is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157389" version="1" comment="kernel-trace-base is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157390" version="1" comment="kernel-trace-devel is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157391" version="1" comment="kernel-xen is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157392" version="1" comment="kernel-xen-base is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157393" version="1" comment="kernel-xen-devel is &lt;3.0.101-107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164548" version="1" comment="kernel-bigmem is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164549" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164550" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164551" version="1" comment="kernel-default is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164552" version="1" comment="kernel-default-base is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164553" version="1" comment="kernel-default-devel is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164554" version="1" comment="kernel-default-man is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164555" version="1" comment="kernel-ec2 is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164556" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164557" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164558" version="1" comment="kernel-pae is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164559" version="1" comment="kernel-pae-base is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164560" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164561" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164562" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164563" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164564" version="1" comment="kernel-source is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164565" version="1" comment="kernel-syms is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164566" version="1" comment="kernel-trace is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164567" version="1" comment="kernel-trace-base is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164568" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164569" version="1" comment="kernel-xen is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164570" version="1" comment="kernel-xen-base is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164571" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175128" version="1" comment="kernel-bigmem is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175129" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175130" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175131" version="1" comment="kernel-default is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175132" version="1" comment="kernel-default-base is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175133" version="1" comment="kernel-default-devel is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175134" version="1" comment="kernel-default-man is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175135" version="1" comment="kernel-ec2 is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175136" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175137" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175138" version="1" comment="kernel-pae is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175139" version="1" comment="kernel-pae-base is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175140" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175141" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175142" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175143" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175144" version="1" comment="kernel-source is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175145" version="1" comment="kernel-syms is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175146" version="1" comment="kernel-trace is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175147" version="1" comment="kernel-trace-base is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175148" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175149" version="1" comment="kernel-xen is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175150" version="1" comment="kernel-xen-base is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175151" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122560" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122561" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122562" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126448" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126449" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126450" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126451" version="1" comment="krb5-client is &lt;1.6.3-133.49.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126452" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174147" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.113.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174148" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.113.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174149" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.113.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174150" version="1" comment="krb5-client is &lt;1.6.3-133.49.113.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174151" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.113.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129924" version="1" comment="kvm is &lt;1.4.2-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132524" version="1" comment="kvm is &lt;1.4.2-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135950" version="1" comment="kvm is &lt;1.4.2-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154813" version="1" comment="kvm is &lt;1.4.2-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166729" version="1" comment="kvm is &lt;1.4.2-60.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169159" version="1" comment="kvm is &lt;1.4.2-60.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175152" version="1" comment="kvm is &lt;1.4.2-60.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130722" version="1" comment="lha is &lt;1.14.0.894-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170652" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.22.23.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170653" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.3.4-12.22.23.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148069" version="1" comment="libcap-ng-utils is &lt;0.6.3-1.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148070" version="1" comment="libcap-ng0 is &lt;0.6.3-1.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148071" version="1" comment="libcap-ng0-32bit is &lt;0.6.3-1.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171124" version="1" comment="db-doc is &lt;4.5.20-97.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171125" version="1" comment="db-utils is &lt;4.5.20-97.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171126" version="1" comment="db-utils-doc is &lt;4.5.20-97.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171127" version="1" comment="libdb-4_5-32bit is &lt;4.5.20-97.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171128" version="1" comment="libdb-4_5-x86 is &lt;4.5.20-97.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170654" version="1" comment="libevent-1_4-2 is &lt;1.4.5-24.24.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170052" version="1" comment="libexif-32bit is &lt;0.6.17-2.14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170053" version="1" comment="libexif-x86 is &lt;0.6.17-2.14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132525" version="1" comment="libgcrypt11 is &lt;1.5.0-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132526" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132527" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158009" version="1" comment="libgcrypt11 is &lt;1.5.0-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158010" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158011" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169866" version="1" comment="libical0 is &lt;0.43-1.10.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132528" version="1" comment="libidn-32bit is &lt;1.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132529" version="1" comment="libidn-x86 is &lt;1.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174279" version="1" comment="libidn-32bit is &lt;1.10-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174280" version="1" comment="libidn-x86 is &lt;1.10-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164769" version="1" comment="liblouis is &lt;1.7.0-1.3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164770" version="1" comment="liblouis0 is &lt;1.7.0-1.3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164771" version="1" comment="python-louis is &lt;1.7.0-1.3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167140" version="1" comment="liblouis is &lt;1.7.0-1.3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167141" version="1" comment="liblouis0 is &lt;1.7.0-1.3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167142" version="1" comment="python-louis is &lt;1.7.0-1.3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150329" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150330" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154481" version="1" comment="libsamplerate-32bit is &lt;0.1.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154482" version="1" comment="libsamplerate-x86 is &lt;0.1.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154483" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154484" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155293" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155294" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170890" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.19.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170891" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.19.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132530" version="1" comment="libtcnative-1-0 is &lt;1.3.3-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125651" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130782" version="1" comment="libvirt-client is &lt;1.2.5-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130783" version="1" comment="libvirt-client-32bit is &lt;1.2.5-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130784" version="1" comment="libvirt-doc is &lt;1.2.5-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130785" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130786" version="1" comment="perl-Sys-Virt is &lt;1.2.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165093" version="1" comment="libvirt-client is &lt;1.2.5-23.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165094" version="1" comment="libvirt-client-32bit is &lt;1.2.5-23.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165095" version="1" comment="libvirt-doc is &lt;1.2.5-23.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165096" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-23.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174037" version="1" comment="libvirt-client is &lt;1.2.5-23.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174038" version="1" comment="libvirt-client-32bit is &lt;1.2.5-23.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174039" version="1" comment="libvirt-doc is &lt;1.2.5-23.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174040" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-23.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169160" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169161" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169162" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173646" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173647" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173648" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127117" version="1" comment="libxml2-32bit is &lt;2.7.6-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127118" version="1" comment="libxml2-doc is &lt;2.7.6-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127119" version="1" comment="libxml2-python is &lt;2.7.6-0.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127120" version="1" comment="libxml2-x86 is &lt;2.7.6-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128985" version="1" comment="libxml2-x86 is &lt;2.7.6-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132531" version="1" comment="libxml2-32bit is &lt;2.7.6-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132532" version="1" comment="libxml2-doc is &lt;2.7.6-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132533" version="1" comment="libxml2-python is &lt;2.7.6-0.50.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132534" version="1" comment="libxml2-x86 is &lt;2.7.6-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146982" version="1" comment="libxml2-32bit is &lt;2.7.6-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146983" version="1" comment="libxml2-doc is &lt;2.7.6-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146984" version="1" comment="libxml2-python is &lt;2.7.6-0.64.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146985" version="1" comment="libxml2-x86 is &lt;2.7.6-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156784" version="1" comment="libxml2-x86 is &lt;2.7.6-0.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158384" version="1" comment="libxml2-32bit is &lt;2.7.6-0.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158385" version="1" comment="libxml2-doc is &lt;2.7.6-0.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158386" version="1" comment="libxml2-python is &lt;2.7.6-0.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158387" version="1" comment="libxml2-x86 is &lt;2.7.6-0.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161634" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161635" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161636" version="1" comment="libxml2-python is &lt;2.7.6-0.77.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161637" version="1" comment="libxml2-x86 is &lt;2.7.6-0.77.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171021" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171022" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171023" version="1" comment="libxml2-python is &lt;2.7.6-0.77.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171024" version="1" comment="libxml2-x86 is &lt;2.7.6-0.77.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155429" version="1" comment="libxslt-32bit is &lt;1.1.24-19.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155430" version="1" comment="libxslt-x86 is &lt;1.1.24-19.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144570" version="1" comment="kernel-bigmem is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144571" version="1" comment="kernel-bigmem-base is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144572" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144573" version="1" comment="kernel-default is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144574" version="1" comment="kernel-default-base is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144575" version="1" comment="kernel-default-devel is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144576" version="1" comment="kernel-default-man is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144577" version="1" comment="kernel-ec2 is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144578" version="1" comment="kernel-ec2-base is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144579" version="1" comment="kernel-ec2-devel is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144580" version="1" comment="kernel-pae is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144581" version="1" comment="kernel-pae-base is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144582" version="1" comment="kernel-pae-devel is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144583" version="1" comment="kernel-ppc64 is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144584" version="1" comment="kernel-ppc64-base is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144585" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144586" version="1" comment="kernel-source is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144587" version="1" comment="kernel-syms is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144588" version="1" comment="kernel-trace is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144589" version="1" comment="kernel-trace-base is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144590" version="1" comment="kernel-trace-devel is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144591" version="1" comment="kernel-xen is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144592" version="1" comment="kernel-xen-base is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144593" version="1" comment="kernel-xen-devel is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155431" version="1" comment="kernel-bigmem is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155432" version="1" comment="kernel-bigmem-base is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155433" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155434" version="1" comment="kernel-default is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155435" version="1" comment="kernel-default-base is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155436" version="1" comment="kernel-default-devel is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155437" version="1" comment="kernel-default-man is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155438" version="1" comment="kernel-ec2 is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155439" version="1" comment="kernel-ec2-base is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155440" version="1" comment="kernel-ec2-devel is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155441" version="1" comment="kernel-pae is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155442" version="1" comment="kernel-pae-base is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155443" version="1" comment="kernel-pae-devel is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155444" version="1" comment="kernel-ppc64 is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155445" version="1" comment="kernel-ppc64-base is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155446" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155447" version="1" comment="kernel-source is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155448" version="1" comment="kernel-syms is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155449" version="1" comment="kernel-trace is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155450" version="1" comment="kernel-trace-base is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155451" version="1" comment="kernel-trace-devel is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155452" version="1" comment="kernel-xen is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155453" version="1" comment="kernel-xen-base is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155454" version="1" comment="kernel-xen-devel is &lt;3.0.101-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142232" version="1" comment="libfreebl3-x86 is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142233" version="1" comment="libsoftokn3-x86 is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142234" version="1" comment="mozilla-nss-x86 is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154814" version="1" comment="minicom is &lt;2.3-27.24.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127469" version="1" comment="libmysql55client18 is &lt;5.5.49-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127470" version="1" comment="libmysql55client18-32bit is &lt;5.5.49-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127471" version="1" comment="libmysql55client18-x86 is &lt;5.5.49-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127472" version="1" comment="libmysql55client_r18 is &lt;5.5.49-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127473" version="1" comment="mysql-client is &lt;5.5.49-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127474" version="1" comment="mysql-tools is &lt;5.5.49-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128986" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.8.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128987" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.8.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128988" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.8.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128989" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.8.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132535" version="1" comment="libmysql55client18-x86 is &lt;5.5.52-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135506" version="1" comment="libmysql55client18 is &lt;5.5.53-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135507" version="1" comment="libmysql55client18-32bit is &lt;5.5.53-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135508" version="1" comment="libmysql55client18-x86 is &lt;5.5.53-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135509" version="1" comment="libmysql55client_r18 is &lt;5.5.53-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135510" version="1" comment="mysql-client is &lt;5.5.53-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135511" version="1" comment="mysql-tools is &lt;5.5.53-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148175" version="1" comment="libmysql55client18-x86 is &lt;5.5.54-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154815" version="1" comment="libmysql55client18 is &lt;5.5.55-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154816" version="1" comment="libmysql55client18-32bit is &lt;5.5.55-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154817" version="1" comment="libmysql55client18-x86 is &lt;5.5.55-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154818" version="1" comment="libmysql55client_r18 is &lt;5.5.55-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154819" version="1" comment="mysql-client is &lt;5.5.55-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154820" version="1" comment="mysql-tools is &lt;5.5.55-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162464" version="1" comment="libmysql55client18 is &lt;5.5.57-0.39.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162465" version="1" comment="libmysql55client18-32bit is &lt;5.5.57-0.39.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162466" version="1" comment="libmysql55client18-x86 is &lt;5.5.57-0.39.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162467" version="1" comment="libmysql55client_r18 is &lt;5.5.57-0.39.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162468" version="1" comment="mysql-client is &lt;5.5.57-0.39.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162469" version="1" comment="mysql-tools is &lt;5.5.57-0.39.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166799" version="1" comment="libmysql55client18-x86 is &lt;5.5.58-0.39.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171219" version="1" comment="libmysql55client18 is &lt;5.5.59-0.39.9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171220" version="1" comment="libmysql55client18-32bit is &lt;5.5.59-0.39.9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171221" version="1" comment="libmysql55client18-x86 is &lt;5.5.59-0.39.9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171222" version="1" comment="libmysql55client_r18 is &lt;5.5.59-0.39.9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171223" version="1" comment="mysql-client is &lt;5.5.59-0.39.9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171224" version="1" comment="mysql-tools is &lt;5.5.59-0.39.9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158012" version="1" comment="libncurses5 is &lt;5.6-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158013" version="1" comment="libncurses5-32bit is &lt;5.6-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158014" version="1" comment="libncurses5-x86 is &lt;5.6-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158015" version="1" comment="libncurses6 is &lt;5.6-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158016" version="1" comment="libncurses6-32bit is &lt;5.6-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158017" version="1" comment="libncurses6-x86 is &lt;5.6-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158018" version="1" comment="ncurses-utils is &lt;5.6-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158019" version="1" comment="terminfo is &lt;5.6-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158020" version="1" comment="terminfo-base is &lt;5.6-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161558" version="1" comment="libncurses5 is &lt;5.6-93.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161559" version="1" comment="libncurses5-32bit is &lt;5.6-93.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161560" version="1" comment="libncurses5-x86 is &lt;5.6-93.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161561" version="1" comment="libncurses6 is &lt;5.6-93.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161562" version="1" comment="libncurses6-32bit is &lt;5.6-93.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161563" version="1" comment="libncurses6-x86 is &lt;5.6-93.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161564" version="1" comment="ncurses-utils is &lt;5.6-93.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161565" version="1" comment="terminfo is &lt;5.6-93.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161566" version="1" comment="terminfo-base is &lt;5.6-93.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167448" version="1" comment="libncurses5 is &lt;5.6-93.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167449" version="1" comment="libncurses5-32bit is &lt;5.6-93.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167450" version="1" comment="libncurses5-x86 is &lt;5.6-93.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167451" version="1" comment="libncurses6 is &lt;5.6-93.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167452" version="1" comment="libncurses6-32bit is &lt;5.6-93.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167453" version="1" comment="libncurses6-x86 is &lt;5.6-93.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167454" version="1" comment="ncurses-utils is &lt;5.6-93.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167455" version="1" comment="terminfo is &lt;5.6-93.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167456" version="1" comment="terminfo-base is &lt;5.6-93.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169997" version="1" comment="libncurses5 is &lt;5.6-93.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169998" version="1" comment="libncurses5-32bit is &lt;5.6-93.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169999" version="1" comment="libncurses5-x86 is &lt;5.6-93.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170000" version="1" comment="libncurses6 is &lt;5.6-93.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170001" version="1" comment="libncurses6-32bit is &lt;5.6-93.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170002" version="1" comment="libncurses6-x86 is &lt;5.6-93.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170003" version="1" comment="ncurses-utils is &lt;5.6-93.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170004" version="1" comment="terminfo is &lt;5.6-93.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170005" version="1" comment="terminfo-base is &lt;5.6-93.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156814" version="1" comment="libnetpbm10 is &lt;10.26.44-101.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156815" version="1" comment="libnetpbm10-32bit is &lt;10.26.44-101.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156816" version="1" comment="libnetpbm10-x86 is &lt;10.26.44-101.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128918" version="1" comment="libtasn1-3 is &lt;1.5-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128919" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128920" version="1" comment="libtasn1-3-x86 is &lt;1.5-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144243" version="1" comment="ntp is &lt;4.2.8p9-57.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144244" version="1" comment="ntp-doc is &lt;4.2.8p9-57.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154485" version="1" comment="ntp is &lt;4.2.8p10-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154486" version="1" comment="ntp-doc is &lt;4.2.8p10-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173872" version="1" comment="ntp is &lt;4.2.8p11-64.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173873" version="1" comment="ntp-doc is &lt;4.2.8p11-64.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149586" version="1" comment="libvmtools0 is &lt;10.1.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149587" version="1" comment="open-vm-tools is &lt;10.1.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149588" version="1" comment="open-vm-tools-desktop is &lt;10.1.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114892" version="1" comment="openssh-fips is &lt;6.6p1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128490" version="1" comment="openssh is &lt;6.6p1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128491" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128492" version="1" comment="openssh-fips is &lt;6.6p1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128493" version="1" comment="openssh-helpers is &lt;6.6p1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132536" version="1" comment="openssh is &lt;6.6p1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132537" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132538" version="1" comment="openssh-fips is &lt;6.6p1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132539" version="1" comment="openssh-helpers is &lt;6.6p1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149129" version="1" comment="openssh is &lt;6.6p1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149130" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-35.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149131" version="1" comment="openssh-fips is &lt;6.6p1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149132" version="1" comment="openssh-helpers is &lt;6.6p1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121398" version="1" comment="openssh-fips is &lt;6.6p1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123899" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127543" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132540" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149098" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174535" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174536" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174537" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174538" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174539" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.106.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174540" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129146" version="1" comment="pam-32bit is &lt;1.1.5-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129147" version="1" comment="pam-doc is &lt;1.1.5-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129148" version="1" comment="pam-x86 is &lt;1.1.5-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132541" version="1" comment="perl-32bit is &lt;5.10.0-64.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132542" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132543" version="1" comment="perl-Test-Simple is &lt;0.72-0.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132544" version="1" comment="perl-base is &lt;5.10.0-64.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132545" version="1" comment="perl-doc is &lt;5.10.0-64.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132546" version="1" comment="perl-x86 is &lt;5.10.0-64.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166699" version="1" comment="perl-32bit is &lt;5.10.0-64.81.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166700" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.81.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166701" version="1" comment="perl-Test-Simple is &lt;0.72-0.81.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166702" version="1" comment="perl-base is &lt;5.10.0-64.81.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166703" version="1" comment="perl-doc is &lt;5.10.0-64.81.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166704" version="1" comment="perl-x86 is &lt;5.10.0-64.81.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174541" version="1" comment="perl-32bit is &lt;5.10.0-64.81.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174542" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.81.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174543" version="1" comment="perl-Test-Simple is &lt;0.72-0.81.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174544" version="1" comment="perl-base is &lt;5.10.0-64.81.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174545" version="1" comment="perl-doc is &lt;5.10.0-64.81.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174546" version="1" comment="perl-x86 is &lt;5.10.0-64.81.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126736" version="1" comment="apache2-mod_php53 is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126737" version="1" comment="php53-bcmath is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126738" version="1" comment="php53-bz2 is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126739" version="1" comment="php53-calendar is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126740" version="1" comment="php53-ctype is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126741" version="1" comment="php53-curl is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126742" version="1" comment="php53-dba is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126743" version="1" comment="php53-dom is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126744" version="1" comment="php53-exif is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126745" version="1" comment="php53-fastcgi is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126746" version="1" comment="php53-fileinfo is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126747" version="1" comment="php53-ftp is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126748" version="1" comment="php53-gd is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126749" version="1" comment="php53-gettext is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126750" version="1" comment="php53-gmp is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126751" version="1" comment="php53-iconv is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126752" version="1" comment="php53-intl is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126753" version="1" comment="php53-json is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126754" version="1" comment="php53-ldap is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126755" version="1" comment="php53-mbstring is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126756" version="1" comment="php53-mcrypt is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126757" version="1" comment="php53-mysql is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126758" version="1" comment="php53-odbc is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126759" version="1" comment="php53-openssl is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126760" version="1" comment="php53-pcntl is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126761" version="1" comment="php53-pdo is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126762" version="1" comment="php53-pear is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126763" version="1" comment="php53-pgsql is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126764" version="1" comment="php53-pspell is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126765" version="1" comment="php53-shmop is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126766" version="1" comment="php53-snmp is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126767" version="1" comment="php53-soap is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126768" version="1" comment="php53-suhosin is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126769" version="1" comment="php53-sysvmsg is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126770" version="1" comment="php53-sysvsem is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126771" version="1" comment="php53-sysvshm is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126772" version="1" comment="php53-tokenizer is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126773" version="1" comment="php53-wddx is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126774" version="1" comment="php53-xmlreader is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126775" version="1" comment="php53-xmlrpc is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126776" version="1" comment="php53-xmlwriter is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126777" version="1" comment="php53-xsl is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126778" version="1" comment="php53-zip is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126779" version="1" comment="php53-zlib is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127613" version="1" comment="apache2-mod_php53 is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127614" version="1" comment="php53-bcmath is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127615" version="1" comment="php53-bz2 is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127616" version="1" comment="php53-calendar is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127617" version="1" comment="php53-ctype is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127618" version="1" comment="php53-curl is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127619" version="1" comment="php53-dba is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127620" version="1" comment="php53-dom is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127621" version="1" comment="php53-exif is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127622" version="1" comment="php53-fastcgi is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127623" version="1" comment="php53-fileinfo is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127624" version="1" comment="php53-ftp is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127625" version="1" comment="php53-gd is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127626" version="1" comment="php53-gettext is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127627" version="1" comment="php53-gmp is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127628" version="1" comment="php53-iconv is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127629" version="1" comment="php53-intl is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127630" version="1" comment="php53-json is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127631" version="1" comment="php53-ldap is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127632" version="1" comment="php53-mbstring is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127633" version="1" comment="php53-mcrypt is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127634" version="1" comment="php53-mysql is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127635" version="1" comment="php53-odbc is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127636" version="1" comment="php53-openssl is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127637" version="1" comment="php53-pcntl is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127638" version="1" comment="php53-pdo is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127639" version="1" comment="php53-pear is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127640" version="1" comment="php53-pgsql is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127641" version="1" comment="php53-pspell is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127642" version="1" comment="php53-shmop is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127643" version="1" comment="php53-snmp is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127644" version="1" comment="php53-soap is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127645" version="1" comment="php53-suhosin is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127646" version="1" comment="php53-sysvmsg is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127647" version="1" comment="php53-sysvsem is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127648" version="1" comment="php53-sysvshm is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127649" version="1" comment="php53-tokenizer is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127650" version="1" comment="php53-wddx is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127651" version="1" comment="php53-xmlreader is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127652" version="1" comment="php53-xmlrpc is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127653" version="1" comment="php53-xmlwriter is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127654" version="1" comment="php53-xsl is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127655" version="1" comment="php53-zip is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127656" version="1" comment="php53-zlib is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132547" version="1" comment="apache2-mod_php53 is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132548" version="1" comment="php53-bcmath is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132549" version="1" comment="php53-bz2 is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132550" version="1" comment="php53-calendar is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132551" version="1" comment="php53-ctype is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132552" version="1" comment="php53-curl is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132553" version="1" comment="php53-dba is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132554" version="1" comment="php53-dom is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132555" version="1" comment="php53-exif is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132556" version="1" comment="php53-fastcgi is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132557" version="1" comment="php53-fileinfo is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132558" version="1" comment="php53-ftp is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132559" version="1" comment="php53-gd is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132560" version="1" comment="php53-gettext is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132561" version="1" comment="php53-gmp is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132562" version="1" comment="php53-iconv is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132563" version="1" comment="php53-intl is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132564" version="1" comment="php53-json is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132565" version="1" comment="php53-ldap is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132566" version="1" comment="php53-mbstring is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132567" version="1" comment="php53-mcrypt is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132568" version="1" comment="php53-mysql is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132569" version="1" comment="php53-odbc is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132570" version="1" comment="php53-openssl is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132571" version="1" comment="php53-pcntl is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132572" version="1" comment="php53-pdo is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132573" version="1" comment="php53-pear is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132574" version="1" comment="php53-pgsql is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132575" version="1" comment="php53-pspell is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132576" version="1" comment="php53-shmop is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132577" version="1" comment="php53-snmp is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132578" version="1" comment="php53-soap is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132579" version="1" comment="php53-suhosin is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132580" version="1" comment="php53-sysvmsg is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132581" version="1" comment="php53-sysvsem is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132582" version="1" comment="php53-sysvshm is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132583" version="1" comment="php53-tokenizer is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132584" version="1" comment="php53-wddx is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132585" version="1" comment="php53-xmlreader is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132586" version="1" comment="php53-xmlrpc is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132587" version="1" comment="php53-xmlwriter is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132588" version="1" comment="php53-xsl is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132589" version="1" comment="php53-zip is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132590" version="1" comment="php53-zlib is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132591" version="1" comment="apache2-mod_php53 is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132592" version="1" comment="php53-bcmath is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132593" version="1" comment="php53-bz2 is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132594" version="1" comment="php53-calendar is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132595" version="1" comment="php53-ctype is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132596" version="1" comment="php53-curl is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132597" version="1" comment="php53-dba is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132598" version="1" comment="php53-dom is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132599" version="1" comment="php53-exif is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132600" version="1" comment="php53-fastcgi is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132601" version="1" comment="php53-fileinfo is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132602" version="1" comment="php53-ftp is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132603" version="1" comment="php53-gd is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132604" version="1" comment="php53-gettext is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132605" version="1" comment="php53-gmp is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132606" version="1" comment="php53-iconv is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132607" version="1" comment="php53-intl is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132608" version="1" comment="php53-json is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132609" version="1" comment="php53-ldap is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132610" version="1" comment="php53-mbstring is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132611" version="1" comment="php53-mcrypt is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132612" version="1" comment="php53-mysql is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132613" version="1" comment="php53-odbc is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132614" version="1" comment="php53-openssl is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132615" version="1" comment="php53-pcntl is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132616" version="1" comment="php53-pdo is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132617" version="1" comment="php53-pear is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132618" version="1" comment="php53-pgsql is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132619" version="1" comment="php53-pspell is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132620" version="1" comment="php53-shmop is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132621" version="1" comment="php53-snmp is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132622" version="1" comment="php53-soap is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132623" version="1" comment="php53-suhosin is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132624" version="1" comment="php53-sysvmsg is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132625" version="1" comment="php53-sysvsem is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132626" version="1" comment="php53-sysvshm is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132627" version="1" comment="php53-tokenizer is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132628" version="1" comment="php53-wddx is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132629" version="1" comment="php53-xmlreader is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132630" version="1" comment="php53-xmlrpc is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132631" version="1" comment="php53-xmlwriter is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132632" version="1" comment="php53-xsl is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132633" version="1" comment="php53-zip is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132634" version="1" comment="php53-zlib is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132635" version="1" comment="apache2-mod_php53 is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132636" version="1" comment="php53-bcmath is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132637" version="1" comment="php53-bz2 is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132638" version="1" comment="php53-calendar is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132639" version="1" comment="php53-ctype is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132640" version="1" comment="php53-curl is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132641" version="1" comment="php53-dba is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132642" version="1" comment="php53-dom is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132643" version="1" comment="php53-exif is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132644" version="1" comment="php53-fastcgi is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132645" version="1" comment="php53-fileinfo is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132646" version="1" comment="php53-ftp is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132647" version="1" comment="php53-gd is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132648" version="1" comment="php53-gettext is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132649" version="1" comment="php53-gmp is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132650" version="1" comment="php53-iconv is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132651" version="1" comment="php53-intl is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132652" version="1" comment="php53-json is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132653" version="1" comment="php53-ldap is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132654" version="1" comment="php53-mbstring is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132655" version="1" comment="php53-mcrypt is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132656" version="1" comment="php53-mysql is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132657" version="1" comment="php53-odbc is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132658" version="1" comment="php53-openssl is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132659" version="1" comment="php53-pcntl is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132660" version="1" comment="php53-pdo is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132661" version="1" comment="php53-pear is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132662" version="1" comment="php53-pgsql is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132663" version="1" comment="php53-pspell is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132664" version="1" comment="php53-shmop is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132665" version="1" comment="php53-snmp is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132666" version="1" comment="php53-soap is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132667" version="1" comment="php53-suhosin is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132668" version="1" comment="php53-sysvmsg is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132669" version="1" comment="php53-sysvsem is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132670" version="1" comment="php53-sysvshm is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132671" version="1" comment="php53-tokenizer is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132672" version="1" comment="php53-wddx is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132673" version="1" comment="php53-xmlreader is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132674" version="1" comment="php53-xmlrpc is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132675" version="1" comment="php53-xmlwriter is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132676" version="1" comment="php53-xsl is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132677" version="1" comment="php53-zip is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132678" version="1" comment="php53-zlib is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146910" version="1" comment="apache2-mod_php53 is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146911" version="1" comment="php53-bcmath is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146912" version="1" comment="php53-bz2 is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146913" version="1" comment="php53-calendar is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146914" version="1" comment="php53-ctype is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146915" version="1" comment="php53-curl is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146916" version="1" comment="php53-dba is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146917" version="1" comment="php53-dom is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146918" version="1" comment="php53-exif is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146919" version="1" comment="php53-fastcgi is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146920" version="1" comment="php53-fileinfo is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146921" version="1" comment="php53-ftp is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146922" version="1" comment="php53-gd is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146923" version="1" comment="php53-gettext is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146924" version="1" comment="php53-gmp is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146925" version="1" comment="php53-iconv is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146926" version="1" comment="php53-intl is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146927" version="1" comment="php53-json is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146928" version="1" comment="php53-ldap is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146929" version="1" comment="php53-mbstring is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146930" version="1" comment="php53-mcrypt is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146931" version="1" comment="php53-mysql is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146932" version="1" comment="php53-odbc is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146933" version="1" comment="php53-openssl is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146934" version="1" comment="php53-pcntl is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146935" version="1" comment="php53-pdo is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146936" version="1" comment="php53-pear is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146937" version="1" comment="php53-pgsql is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146938" version="1" comment="php53-pspell is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146939" version="1" comment="php53-shmop is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146940" version="1" comment="php53-snmp is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146941" version="1" comment="php53-soap is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146942" version="1" comment="php53-suhosin is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146943" version="1" comment="php53-sysvmsg is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146944" version="1" comment="php53-sysvsem is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146945" version="1" comment="php53-sysvshm is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146946" version="1" comment="php53-tokenizer is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146947" version="1" comment="php53-wddx is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146948" version="1" comment="php53-xmlreader is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146949" version="1" comment="php53-xmlrpc is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146950" version="1" comment="php53-xmlwriter is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146951" version="1" comment="php53-xsl is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146952" version="1" comment="php53-zip is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146953" version="1" comment="php53-zlib is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156904" version="1" comment="apache2-mod_php53 is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156905" version="1" comment="php53-bcmath is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156906" version="1" comment="php53-bz2 is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156907" version="1" comment="php53-calendar is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156908" version="1" comment="php53-ctype is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156909" version="1" comment="php53-curl is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156910" version="1" comment="php53-dba is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156911" version="1" comment="php53-dom is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156912" version="1" comment="php53-exif is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156913" version="1" comment="php53-fastcgi is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156914" version="1" comment="php53-fileinfo is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156915" version="1" comment="php53-ftp is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156916" version="1" comment="php53-gd is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156917" version="1" comment="php53-gettext is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156918" version="1" comment="php53-gmp is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156919" version="1" comment="php53-iconv is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156920" version="1" comment="php53-intl is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156921" version="1" comment="php53-json is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156922" version="1" comment="php53-ldap is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156923" version="1" comment="php53-mbstring is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156924" version="1" comment="php53-mcrypt is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156925" version="1" comment="php53-mysql is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156926" version="1" comment="php53-odbc is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156927" version="1" comment="php53-openssl is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156928" version="1" comment="php53-pcntl is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156929" version="1" comment="php53-pdo is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156930" version="1" comment="php53-pear is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156931" version="1" comment="php53-pgsql is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156932" version="1" comment="php53-pspell is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156933" version="1" comment="php53-shmop is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156934" version="1" comment="php53-snmp is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156935" version="1" comment="php53-soap is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156936" version="1" comment="php53-suhosin is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156937" version="1" comment="php53-sysvmsg is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156938" version="1" comment="php53-sysvsem is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156939" version="1" comment="php53-sysvshm is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156940" version="1" comment="php53-tokenizer is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156941" version="1" comment="php53-wddx is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156942" version="1" comment="php53-xmlreader is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156943" version="1" comment="php53-xmlrpc is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156944" version="1" comment="php53-xmlwriter is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156945" version="1" comment="php53-xsl is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156946" version="1" comment="php53-zip is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156947" version="1" comment="php53-zlib is &lt;5.3.17-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157616" version="1" comment="apache2-mod_php53 is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157617" version="1" comment="php53-bcmath is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157618" version="1" comment="php53-bz2 is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157619" version="1" comment="php53-calendar is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157620" version="1" comment="php53-ctype is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157621" version="1" comment="php53-curl is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157622" version="1" comment="php53-dba is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157623" version="1" comment="php53-dom is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157624" version="1" comment="php53-exif is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157625" version="1" comment="php53-fastcgi is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157626" version="1" comment="php53-fileinfo is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157627" version="1" comment="php53-ftp is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157628" version="1" comment="php53-gd is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157629" version="1" comment="php53-gettext is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157630" version="1" comment="php53-gmp is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157631" version="1" comment="php53-iconv is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157632" version="1" comment="php53-intl is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157633" version="1" comment="php53-json is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157634" version="1" comment="php53-ldap is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157635" version="1" comment="php53-mbstring is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157636" version="1" comment="php53-mcrypt is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157637" version="1" comment="php53-mysql is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157638" version="1" comment="php53-odbc is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157639" version="1" comment="php53-openssl is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157640" version="1" comment="php53-pcntl is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157641" version="1" comment="php53-pdo is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157642" version="1" comment="php53-pear is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157643" version="1" comment="php53-pgsql is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157644" version="1" comment="php53-pspell is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157645" version="1" comment="php53-shmop is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157646" version="1" comment="php53-snmp is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157647" version="1" comment="php53-soap is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157648" version="1" comment="php53-suhosin is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157649" version="1" comment="php53-sysvmsg is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157650" version="1" comment="php53-sysvsem is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157651" version="1" comment="php53-sysvshm is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157652" version="1" comment="php53-tokenizer is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157653" version="1" comment="php53-wddx is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157654" version="1" comment="php53-xmlreader is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157655" version="1" comment="php53-xmlrpc is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157656" version="1" comment="php53-xmlwriter is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157657" version="1" comment="php53-xsl is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157658" version="1" comment="php53-zip is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157659" version="1" comment="php53-zlib is &lt;5.3.17-111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164396" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164397" version="1" comment="php53-bcmath is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164398" version="1" comment="php53-bz2 is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164399" version="1" comment="php53-calendar is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164400" version="1" comment="php53-ctype is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164401" version="1" comment="php53-curl is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164402" version="1" comment="php53-dba is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164403" version="1" comment="php53-dom is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164404" version="1" comment="php53-exif is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164405" version="1" comment="php53-fastcgi is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164406" version="1" comment="php53-fileinfo is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164407" version="1" comment="php53-ftp is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164408" version="1" comment="php53-gd is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164409" version="1" comment="php53-gettext is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164410" version="1" comment="php53-gmp is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164411" version="1" comment="php53-iconv is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164412" version="1" comment="php53-intl is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164413" version="1" comment="php53-json is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164414" version="1" comment="php53-ldap is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164415" version="1" comment="php53-mbstring is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164416" version="1" comment="php53-mcrypt is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164417" version="1" comment="php53-mysql is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164418" version="1" comment="php53-odbc is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164419" version="1" comment="php53-openssl is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164420" version="1" comment="php53-pcntl is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164421" version="1" comment="php53-pdo is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164422" version="1" comment="php53-pear is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164423" version="1" comment="php53-pgsql is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164424" version="1" comment="php53-pspell is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164425" version="1" comment="php53-shmop is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164426" version="1" comment="php53-snmp is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164427" version="1" comment="php53-soap is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164428" version="1" comment="php53-suhosin is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164429" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164430" version="1" comment="php53-sysvsem is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164431" version="1" comment="php53-sysvshm is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164432" version="1" comment="php53-tokenizer is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164433" version="1" comment="php53-wddx is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164434" version="1" comment="php53-xmlreader is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164435" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164436" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164437" version="1" comment="php53-xsl is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164438" version="1" comment="php53-zip is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164439" version="1" comment="php53-zlib is &lt;5.3.17-112.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168988" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168989" version="1" comment="php53-bcmath is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168990" version="1" comment="php53-bz2 is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168991" version="1" comment="php53-calendar is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168992" version="1" comment="php53-ctype is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168993" version="1" comment="php53-curl is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168994" version="1" comment="php53-dba is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168995" version="1" comment="php53-dom is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168996" version="1" comment="php53-exif is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168997" version="1" comment="php53-fastcgi is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168998" version="1" comment="php53-fileinfo is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168999" version="1" comment="php53-ftp is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169000" version="1" comment="php53-gd is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169001" version="1" comment="php53-gettext is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169002" version="1" comment="php53-gmp is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169003" version="1" comment="php53-iconv is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169004" version="1" comment="php53-intl is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169005" version="1" comment="php53-json is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169006" version="1" comment="php53-ldap is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169007" version="1" comment="php53-mbstring is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169008" version="1" comment="php53-mcrypt is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169009" version="1" comment="php53-mysql is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169010" version="1" comment="php53-odbc is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169011" version="1" comment="php53-openssl is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169012" version="1" comment="php53-pcntl is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169013" version="1" comment="php53-pdo is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169014" version="1" comment="php53-pear is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169015" version="1" comment="php53-pgsql is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169016" version="1" comment="php53-pspell is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169017" version="1" comment="php53-shmop is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169018" version="1" comment="php53-snmp is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169019" version="1" comment="php53-soap is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169020" version="1" comment="php53-suhosin is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169021" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169022" version="1" comment="php53-sysvsem is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169023" version="1" comment="php53-sysvshm is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169024" version="1" comment="php53-tokenizer is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169025" version="1" comment="php53-wddx is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169026" version="1" comment="php53-xmlreader is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169027" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169028" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169029" version="1" comment="php53-xsl is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169030" version="1" comment="php53-zip is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169031" version="1" comment="php53-zlib is &lt;5.3.17-112.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147974" version="1" comment="policycoreutils is &lt;2.0.79-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174363" version="1" comment="policycoreutils is &lt;2.0.79-4.9.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128654" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128655" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128656" version="1" comment="libpoppler5 is &lt;0.12.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167236" version="1" comment="postgresql-init is &lt;9.4-0.5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124470" version="1" comment="postgresql94-contrib is &lt;9.4.6-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124471" version="1" comment="postgresql94-server is &lt;9.4.6-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132679" version="1" comment="libecpg6 is &lt;9.4.9-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132680" version="1" comment="libpq5 is &lt;9.4.9-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132681" version="1" comment="libpq5-32bit is &lt;9.4.9-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132682" version="1" comment="postgresql94 is &lt;9.4.9-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132683" version="1" comment="postgresql94-contrib is &lt;9.4.9-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132684" version="1" comment="postgresql94-docs is &lt;9.4.9-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132685" version="1" comment="postgresql94-server is &lt;9.4.9-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157979" version="1" comment="libecpg6 is &lt;9.4.12-0.22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157980" version="1" comment="libpq5 is &lt;9.4.12-0.22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157981" version="1" comment="libpq5-32bit is &lt;9.4.12-0.22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157982" version="1" comment="postgresql94 is &lt;9.4.12-0.22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157983" version="1" comment="postgresql94-contrib is &lt;9.4.12-0.22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157984" version="1" comment="postgresql94-docs is &lt;9.4.12-0.22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157985" version="1" comment="postgresql94-server is &lt;9.4.12-0.22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169570" version="1" comment="libecpg6 is &lt;9.4.15-0.23.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169571" version="1" comment="libpq5 is &lt;9.4.15-0.23.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169572" version="1" comment="libpq5-32bit is &lt;9.4.15-0.23.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169573" version="1" comment="postgresql94 is &lt;9.4.15-0.23.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169574" version="1" comment="postgresql94-contrib is &lt;9.4.15-0.23.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169575" version="1" comment="postgresql94-docs is &lt;9.4.15-0.23.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169576" version="1" comment="postgresql94-server is &lt;9.4.15-0.23.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172073" version="1" comment="libecpg6 is &lt;9.4.16-0.23.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172074" version="1" comment="libpq5 is &lt;9.4.16-0.23.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172075" version="1" comment="libpq5-32bit is &lt;9.4.16-0.23.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172076" version="1" comment="postgresql94 is &lt;9.4.16-0.23.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172077" version="1" comment="postgresql94-contrib is &lt;9.4.16-0.23.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172078" version="1" comment="postgresql94-docs is &lt;9.4.16-0.23.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172079" version="1" comment="postgresql94-server is &lt;9.4.16-0.23.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173462" version="1" comment="libecpg6 is &lt;9.4.17-0.23.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173463" version="1" comment="libpq5 is &lt;9.4.17-0.23.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173464" version="1" comment="libpq5-32bit is &lt;9.4.17-0.23.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173465" version="1" comment="postgresql94 is &lt;9.4.17-0.23.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173466" version="1" comment="postgresql94-contrib is &lt;9.4.17-0.23.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173467" version="1" comment="postgresql94-docs is &lt;9.4.17-0.23.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173468" version="1" comment="postgresql94-server is &lt;9.4.17-0.23.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167982" version="1" comment="procmail is &lt;3.22-240.8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172707" version="1" comment="puppet is &lt;2.7.26-0.5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172708" version="1" comment="puppet-server is &lt;2.7.26-0.5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132686" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132687" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132688" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132689" version="1" comment="python-base-32bit is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132690" version="1" comment="python-base-x86 is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132691" version="1" comment="python-curses is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132692" version="1" comment="python-x86 is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132693" version="1" comment="python-xml is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173520" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173521" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173522" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173523" version="1" comment="python-base-32bit is &lt;2.6.9-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173524" version="1" comment="python-base-x86 is &lt;2.6.9-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173525" version="1" comment="python-curses is &lt;2.6.9-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173526" version="1" comment="python-x86 is &lt;2.6.9-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173527" version="1" comment="python-xml is &lt;2.6.9-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130659" version="1" comment="rsync is &lt;3.0.4-2.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169867" version="1" comment="rsync is &lt;3.0.4-2.53.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169972" version="1" comment="rsync is &lt;3.0.4-2.53.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174875" version="1" comment="rzsz is &lt;0.12.21~rc-936.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125247" version="1" comment="ldapsmb is &lt;1.34b-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125248" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125249" version="1" comment="libtalloc2-x86 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125250" version="1" comment="libtdb1-x86 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125251" version="1" comment="libtevent0-x86 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125252" version="1" comment="libwbclient0-x86 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125253" version="1" comment="samba-client-x86 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125254" version="1" comment="samba-winbind-x86 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125255" version="1" comment="samba-x86 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125985" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125986" version="1" comment="libtalloc2-x86 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125987" version="1" comment="libtdb1-x86 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125988" version="1" comment="libtevent0-x86 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125989" version="1" comment="libwbclient0-x86 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125990" version="1" comment="samba-client-x86 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125991" version="1" comment="samba-winbind-x86 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125992" version="1" comment="samba-x86 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146137" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146138" version="1" comment="libtalloc2-x86 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146139" version="1" comment="libtdb1-x86 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146140" version="1" comment="libtevent0-x86 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146141" version="1" comment="libwbclient0-x86 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146142" version="1" comment="samba-client-x86 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146143" version="1" comment="samba-winbind-x86 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146144" version="1" comment="samba-x86 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149905" version="1" comment="ldapsmb is &lt;1.34b-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149906" version="1" comment="libldb1 is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149907" version="1" comment="libsmbclient0 is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149908" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149909" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149910" version="1" comment="libtalloc2 is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149911" version="1" comment="libtalloc2-32bit is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149912" version="1" comment="libtalloc2-x86 is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149913" version="1" comment="libtdb1 is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149914" version="1" comment="libtdb1-32bit is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149915" version="1" comment="libtdb1-x86 is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149916" version="1" comment="libtevent0 is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149917" version="1" comment="libtevent0-32bit is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149918" version="1" comment="libtevent0-x86 is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149919" version="1" comment="libwbclient0 is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149920" version="1" comment="libwbclient0-32bit is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149921" version="1" comment="libwbclient0-x86 is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149922" version="1" comment="samba-32bit is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149923" version="1" comment="samba-client is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149924" version="1" comment="samba-client-32bit is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149925" version="1" comment="samba-client-x86 is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149926" version="1" comment="samba-doc is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149927" version="1" comment="samba-krb-printing is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149928" version="1" comment="samba-winbind is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149929" version="1" comment="samba-winbind-32bit is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149930" version="1" comment="samba-winbind-x86 is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149931" version="1" comment="samba-x86 is &lt;3.6.3-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155122" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155123" version="1" comment="libtalloc2-x86 is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155124" version="1" comment="libtdb1-x86 is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155125" version="1" comment="libtevent0-x86 is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155126" version="1" comment="libwbclient0-x86 is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155127" version="1" comment="samba-client-x86 is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155128" version="1" comment="samba-winbind-x86 is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155129" version="1" comment="samba-x86 is &lt;3.6.3-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155960" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155961" version="1" comment="libtalloc2-x86 is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155962" version="1" comment="libtdb1-x86 is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155963" version="1" comment="libtevent0-x86 is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155964" version="1" comment="libwbclient0-x86 is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155965" version="1" comment="samba-client-x86 is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155966" version="1" comment="samba-winbind-x86 is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155967" version="1" comment="samba-x86 is &lt;3.6.3-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165625" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165626" version="1" comment="libtalloc2-x86 is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165627" version="1" comment="libtdb1-x86 is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165628" version="1" comment="libtevent0-x86 is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165629" version="1" comment="libwbclient0-x86 is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165630" version="1" comment="samba-client-x86 is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165631" version="1" comment="samba-winbind-x86 is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165632" version="1" comment="samba-x86 is &lt;3.6.3-94.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169163" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169164" version="1" comment="libtalloc2-x86 is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169165" version="1" comment="libtdb1-x86 is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169166" version="1" comment="libtevent0-x86 is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169167" version="1" comment="libwbclient0-x86 is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169168" version="1" comment="samba-client-x86 is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169169" version="1" comment="samba-winbind-x86 is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169170" version="1" comment="samba-x86 is &lt;3.6.3-94.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173528" version="1" comment="ldapsmb is &lt;1.34b-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173529" version="1" comment="libldb1 is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173530" version="1" comment="libsmbclient0 is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173531" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173649" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173532" version="1" comment="libtalloc2 is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173533" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173650" version="1" comment="libtalloc2-x86 is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173534" version="1" comment="libtdb1 is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173535" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173651" version="1" comment="libtdb1-x86 is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173536" version="1" comment="libtevent0 is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173537" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173652" version="1" comment="libtevent0-x86 is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173538" version="1" comment="libwbclient0 is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173539" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173653" version="1" comment="libwbclient0-x86 is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173540" version="1" comment="samba-32bit is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173541" version="1" comment="samba-client is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173542" version="1" comment="samba-client-32bit is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173654" version="1" comment="samba-client-x86 is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173543" version="1" comment="samba-doc is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173544" version="1" comment="samba-krb-printing is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173545" version="1" comment="samba-winbind is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173546" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173655" version="1" comment="samba-winbind-x86 is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173656" version="1" comment="samba-x86 is &lt;3.6.3-94.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121399" version="1" comment="libtevent0-x86 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154343" version="1" comment="sblim-sfcb is &lt;1.3.11-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127294" version="1" comment="libspice-server1 is &lt;0.12.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148176" version="1" comment="libspice-server1 is &lt;0.12.4-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158445" version="1" comment="libspice-server1 is &lt;0.12.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132694" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132695" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132696" version="1" comment="libsqlite3-0-x86 is &lt;3.7.6.3-1.4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132697" version="1" comment="squid is &lt;2.7.STABLE5-2.12.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132698" version="1" comment="squid3 is &lt;3.1.23-8.16.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146954" version="1" comment="squid3 is &lt;3.1.23-8.16.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173469" version="1" comment="squid3 is &lt;3.1.23-8.16.37.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132699" version="1" comment="squidGuard is &lt;1.4-13.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132700" version="1" comment="squidGuard-doc is &lt;1.4-13.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115110" version="1" comment="strongswan is &lt;4.4.0-6.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115111" version="1" comment="strongswan-doc is &lt;4.4.0-6.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156346" version="1" comment="strongswan is &lt;4.4.0-6.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156347" version="1" comment="strongswan-doc is &lt;4.4.0-6.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162470" version="1" comment="strongswan is &lt;4.4.0-6.36.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162471" version="1" comment="strongswan-doc is &lt;4.4.0-6.36.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135935" version="1" comment="sudo is &lt;1.7.6p2-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128484" version="1" comment="supportutils is &lt;1.20-121.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135951" version="1" comment="tar is &lt;1.26-1.2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167366" version="1" comment="tboot is &lt;20120115_1.7.0-0.5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149461" version="1" comment="tcpdump is &lt;3.9.8-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165198" version="1" comment="tcpdump is &lt;3.9.8-1.30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122563" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.163.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132701" version="1" comment="libtiff3 is &lt;3.8.2-141.168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132702" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132703" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132704" version="1" comment="tomcat6 is &lt;6.0.45-0.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132705" version="1" comment="tomcat6-admin-webapps is &lt;6.0.45-0.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132706" version="1" comment="tomcat6-docs-webapp is &lt;6.0.45-0.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132707" version="1" comment="tomcat6-javadoc is &lt;6.0.45-0.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132708" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.45-0.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132709" version="1" comment="tomcat6-lib is &lt;6.0.45-0.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132710" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.45-0.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132711" version="1" comment="tomcat6-webapps is &lt;6.0.45-0.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114343" version="1" comment="tomcat6 is &lt;6.0.41-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114344" version="1" comment="tomcat6-admin-webapps is &lt;6.0.41-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114345" version="1" comment="tomcat6-docs-webapp is &lt;6.0.41-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114346" version="1" comment="tomcat6-javadoc is &lt;6.0.41-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114347" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.41-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114348" version="1" comment="tomcat6-lib is &lt;6.0.41-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114349" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.41-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114350" version="1" comment="tomcat6-webapps is &lt;6.0.41-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125256" version="1" comment="tomcat6 is &lt;6.0.45-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125257" version="1" comment="tomcat6-admin-webapps is &lt;6.0.45-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125258" version="1" comment="tomcat6-docs-webapp is &lt;6.0.45-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125259" version="1" comment="tomcat6-javadoc is &lt;6.0.45-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125260" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.45-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125261" version="1" comment="tomcat6-lib is &lt;6.0.45-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125262" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.45-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125263" version="1" comment="tomcat6-webapps is &lt;6.0.45-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170296" version="1" comment="transfig is &lt;3.2.5-160.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174152" version="1" comment="unrar is &lt;5.6.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149143" version="1" comment="unzip is &lt;6.00-11.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171482" version="1" comment="unzip is &lt;6.00-11.18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136127" version="1" comment="gvim is &lt;7.2-8.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136128" version="1" comment="vim is &lt;7.2-8.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136129" version="1" comment="vim-base is &lt;7.2-8.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136130" version="1" comment="vim-data is &lt;7.2-8.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157956" version="1" comment="gvim is &lt;7.2-8.20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157957" version="1" comment="vim is &lt;7.2-8.20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157958" version="1" comment="vim-base is &lt;7.2-8.20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157959" version="1" comment="vim-data is &lt;7.2-8.20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136710" version="1" comment="w3m is &lt;0.5.3.git20161120-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172709" version="1" comment="libwavpack1 is &lt;4.50.1-1.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149834" version="1" comment="wget is &lt;1.11.4-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132712" version="1" comment="xen-doc-html is &lt;4.4.4_07-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132713" version="1" comment="xen-kmp-default is &lt;4.4.4_07_3.0.101_77-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132714" version="1" comment="xen-kmp-pae is &lt;4.4.4_07_3.0.101_77-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132715" version="1" comment="xen-libs is &lt;4.4.4_07-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132716" version="1" comment="xen-libs-32bit is &lt;4.4.4_07-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132717" version="1" comment="xen-tools is &lt;4.4.4_07-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132718" version="1" comment="xen-tools-domU is &lt;4.4.4_07-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132719" version="1" comment="xen-doc-html is &lt;4.4.4_08-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132720" version="1" comment="xen-kmp-default is &lt;4.4.4_08_3.0.101_80-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132721" version="1" comment="xen-kmp-pae is &lt;4.4.4_08_3.0.101_80-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132722" version="1" comment="xen-libs is &lt;4.4.4_08-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132723" version="1" comment="xen-libs-32bit is &lt;4.4.4_08-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132724" version="1" comment="xen-tools is &lt;4.4.4_08-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132725" version="1" comment="xen-tools-domU is &lt;4.4.4_08-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143086" version="1" comment="xen-doc-html is &lt;4.4.4_10-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143087" version="1" comment="xen-kmp-default is &lt;4.4.4_10_3.0.101_88-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143088" version="1" comment="xen-kmp-pae is &lt;4.4.4_10_3.0.101_88-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143089" version="1" comment="xen-libs is &lt;4.4.4_10-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143090" version="1" comment="xen-libs-32bit is &lt;4.4.4_10-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143091" version="1" comment="xen-tools is &lt;4.4.4_10-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143092" version="1" comment="xen-tools-domU is &lt;4.4.4_10-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144687" version="1" comment="xen-doc-html is &lt;4.4.4_12-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144688" version="1" comment="xen-kmp-default is &lt;4.4.4_12_3.0.101_91-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144689" version="1" comment="xen-kmp-pae is &lt;4.4.4_12_3.0.101_91-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144690" version="1" comment="xen-libs is &lt;4.4.4_12-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144691" version="1" comment="xen-libs-32bit is &lt;4.4.4_12-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144692" version="1" comment="xen-tools is &lt;4.4.4_12-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144693" version="1" comment="xen-tools-domU is &lt;4.4.4_12-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149431" version="1" comment="xen-doc-html is &lt;4.4.4_14-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149432" version="1" comment="xen-kmp-default is &lt;4.4.4_14_3.0.101_94-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149433" version="1" comment="xen-kmp-pae is &lt;4.4.4_14_3.0.101_94-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149434" version="1" comment="xen-libs is &lt;4.4.4_14-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149435" version="1" comment="xen-libs-32bit is &lt;4.4.4_14-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149436" version="1" comment="xen-tools is &lt;4.4.4_14-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149437" version="1" comment="xen-tools-domU is &lt;4.4.4_14-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154620" version="1" comment="xen-doc-html is &lt;4.4.4_16-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154621" version="1" comment="xen-kmp-default is &lt;4.4.4_16_3.0.101_97-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154622" version="1" comment="xen-kmp-pae is &lt;4.4.4_16_3.0.101_97-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154623" version="1" comment="xen-libs is &lt;4.4.4_16-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154624" version="1" comment="xen-libs-32bit is &lt;4.4.4_16-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154625" version="1" comment="xen-tools is &lt;4.4.4_16-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154626" version="1" comment="xen-tools-domU is &lt;4.4.4_16-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154969" version="1" comment="xen-doc-html is &lt;4.4.4_18-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154970" version="1" comment="xen-kmp-default is &lt;4.4.4_18_3.0.101_97-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154971" version="1" comment="xen-kmp-pae is &lt;4.4.4_18_3.0.101_97-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154972" version="1" comment="xen-libs is &lt;4.4.4_18-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154973" version="1" comment="xen-libs-32bit is &lt;4.4.4_18-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154974" version="1" comment="xen-tools is &lt;4.4.4_18-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154975" version="1" comment="xen-tools-domU is &lt;4.4.4_18-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157960" version="1" comment="xen-doc-html is &lt;4.4.4_20-60.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157961" version="1" comment="xen-kmp-default is &lt;4.4.4_20_3.0.101_104-60.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157962" version="1" comment="xen-kmp-pae is &lt;4.4.4_20_3.0.101_104-60.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157963" version="1" comment="xen-libs is &lt;4.4.4_20-60.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157964" version="1" comment="xen-libs-32bit is &lt;4.4.4_20-60.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157965" version="1" comment="xen-tools is &lt;4.4.4_20-60.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157966" version="1" comment="xen-tools-domU is &lt;4.4.4_20-60.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163634" version="1" comment="xen-doc-html is &lt;4.4.4_22-61.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163635" version="1" comment="xen-kmp-default is &lt;4.4.4_22_3.0.101_108.7-61.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163636" version="1" comment="xen-kmp-pae is &lt;4.4.4_22_3.0.101_108.7-61.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163637" version="1" comment="xen-libs is &lt;4.4.4_22-61.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163638" version="1" comment="xen-libs-32bit is &lt;4.4.4_22-61.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163639" version="1" comment="xen-tools is &lt;4.4.4_22-61.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163640" version="1" comment="xen-tools-domU is &lt;4.4.4_22-61.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165903" version="1" comment="xen-doc-html is &lt;4.4.4_24-61.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165904" version="1" comment="xen-kmp-default is &lt;4.4.4_24_3.0.101_108.10-61.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165905" version="1" comment="xen-kmp-pae is &lt;4.4.4_24_3.0.101_108.10-61.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165906" version="1" comment="xen-libs is &lt;4.4.4_24-61.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165907" version="1" comment="xen-libs-32bit is &lt;4.4.4_24-61.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165908" version="1" comment="xen-tools is &lt;4.4.4_24-61.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165909" version="1" comment="xen-tools-domU is &lt;4.4.4_24-61.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168015" version="1" comment="xen-doc-html is &lt;4.4.4_26-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168016" version="1" comment="xen-kmp-default is &lt;4.4.4_26_3.0.101_108.13-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168017" version="1" comment="xen-kmp-pae is &lt;4.4.4_26_3.0.101_108.13-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168018" version="1" comment="xen-libs is &lt;4.4.4_26-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168019" version="1" comment="xen-libs-32bit is &lt;4.4.4_26-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168020" version="1" comment="xen-tools is &lt;4.4.4_26-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168021" version="1" comment="xen-tools-domU is &lt;4.4.4_26-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172780" version="1" comment="xen-doc-html is &lt;4.4.4_28-61.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172781" version="1" comment="xen-kmp-default is &lt;4.4.4_28_3.0.101_108.35-61.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172782" version="1" comment="xen-kmp-pae is &lt;4.4.4_28_3.0.101_108.35-61.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172783" version="1" comment="xen-libs is &lt;4.4.4_28-61.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172784" version="1" comment="xen-libs-32bit is &lt;4.4.4_28-61.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172785" version="1" comment="xen-tools is &lt;4.4.4_28-61.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172786" version="1" comment="xen-tools-domU is &lt;4.4.4_28-61.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158453" version="1" comment="xorg-x11-libICE-32bit is &lt;7.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158454" version="1" comment="xorg-x11-libICE-x86 is &lt;7.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136711" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136712" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149438" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149439" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158814" version="1" comment="xorg-x11-libXdmcp-x86 is &lt;7.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143093" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143094" version="1" comment="xorg-x11-libXfixes-x86 is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148474" version="1" comment="xorg-x11-libXpm-32bit is &lt;7.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148475" version="1" comment="xorg-x11-libXpm-x86 is &lt;7.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142776" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142777" version="1" comment="xorg-x11-libXrender-x86 is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142778" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142779" version="1" comment="xorg-x11-libXv-x86 is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143095" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143096" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170297" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.50.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170298" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.50.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157786" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157787" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166972" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166973" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132726" version="1" comment="yast2-storage-lib is &lt;2.17.161-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144694" version="1" comment="zlib-32bit is &lt;1.2.7-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144695" version="1" comment="zlib-x86 is &lt;1.2.7-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174724" version="1" comment="zsh is &lt;4.3.6-67.9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077618" version="1" comment="krb5 is &lt;1.6.3-133.49.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077616" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077617" version="1" comment="krb5-client is &lt;1.6.3-133.49.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077632" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077633" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077634" version="1" comment="krb5-server is &lt;1.6.3-133.49.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077641" version="1" comment="krb5-devel is &lt;1.6.3-133.49.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077640" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070057" version="1" comment="hplip is &lt;3.9.8-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070056" version="1" comment="hplip-hpijs is &lt;3.9.8-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056505" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.39_0.3-7.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056513" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.39_0.3-7.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056508" version="1" comment="kernel-default is &lt;2.6.27.39-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056507" version="1" comment="kernel-default-base is &lt;2.6.27.39-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056514" version="1" comment="kernel-kdump is &lt;2.6.27.39-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056516" version="1" comment="kernel-ppc64 is &lt;2.6.27.39-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056515" version="1" comment="kernel-ppc64-base is &lt;2.6.27.39-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056509" version="1" comment="kernel-source is &lt;2.6.27.39-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056510" version="1" comment="kernel-syms is &lt;2.6.27.39-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073447" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073445" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073449" version="1" comment="openssl is &lt;0.9.8j-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073448" version="1" comment="openssl-doc is &lt;0.9.8j-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054288" version="1" comment="libmysqlclient15 is &lt;5.0.67-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054286" version="1" comment="libmysqlclient15-32bit is &lt;5.0.67-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054289" version="1" comment="libmysqlclient_r15 is &lt;5.0.67-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054292" version="1" comment="mysql is &lt;5.0.67-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054290" version="1" comment="mysql-Max is &lt;5.0.67-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054291" version="1" comment="mysql-client is &lt;5.0.67-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055060" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061192" version="1" comment="MozillaFirefox is &lt;3.5.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061668" version="1" comment="MozillaFirefox-translations is &lt;3.5.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053956" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.13-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053952" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.13-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053953" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.13-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053954" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.13-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061670" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070643" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070644" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061669" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107298" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.24-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032199" version="1" comment="MozillaFirefox is &lt;3.0.7-1.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032198" version="1" comment="MozillaFirefox-translations is &lt;3.0.7-1.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032204" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.7-1.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032200" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.7-1.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032201" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.7-1.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032202" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.7-1.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032218" version="1" comment="libsndfile is &lt;1.0.17-172.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032216" version="1" comment="libsndfile-32bit is &lt;1.0.17-172.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057188" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr7.0-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057185" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr7.0-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057186" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr7.0-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032247" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032248" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032249" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032250" version="1" comment="ghostscript-library is &lt;8.62-32.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032251" version="1" comment="ghostscript-omni is &lt;8.62-32.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032252" version="1" comment="ghostscript-x11 is &lt;8.62-32.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032253" version="1" comment="libgimpprint is &lt;4.2.7-32.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032264" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032262" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032266" version="1" comment="openssl is &lt;0.9.8h-30.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032265" version="1" comment="openssl-doc is &lt;0.9.8h-30.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032268" version="1" comment="MozillaFirefox is &lt;3.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032267" version="1" comment="MozillaFirefox-translations is &lt;3.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032274" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.21_0.1-7.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032275" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.21_0.1-7.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032277" version="1" comment="kernel-default is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032276" version="1" comment="kernel-default-base is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032278" version="1" comment="kernel-kdump is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032280" version="1" comment="kernel-ppc64 is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032279" version="1" comment="kernel-ppc64-base is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032281" version="1" comment="kernel-source is &lt;2.6.27.21-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032282" version="1" comment="kernel-syms is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053626" version="1" comment="bind is &lt;9.5.0P2-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053620" version="1" comment="bind-chrootenv is &lt;9.5.0P2-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053621" version="1" comment="bind-doc is &lt;9.5.0P2-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053624" version="1" comment="bind-libs is &lt;9.5.0P2-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053622" version="1" comment="bind-libs-32bit is &lt;9.5.0P2-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053625" version="1" comment="bind-utils is &lt;9.5.0P2-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032312" version="1" comment="strongswan is &lt;4.2.8-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032311" version="1" comment="strongswan-doc is &lt;4.2.8-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057042" version="1" comment="libpoppler-glib4 is &lt;0.10.1-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057043" version="1" comment="libpoppler-qt4-3 is &lt;0.10.1-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057044" version="1" comment="libpoppler4 is &lt;0.10.1-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057045" version="1" comment="poppler-tools is &lt;0.10.1-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032331" version="1" comment="MozillaFirefox is &lt;3.0.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032330" version="1" comment="MozillaFirefox-translations is &lt;3.0.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032336" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032332" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032333" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032334" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053028" version="1" comment="java-1_6_0-ibm is &lt;1.6.0-124.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053024" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0-124.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053025" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0-124.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056371" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053590" version="1" comment="MozillaFirefox is &lt;3.0.12-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053589" version="1" comment="MozillaFirefox-translations is &lt;3.0.12-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053595" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.12-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053591" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.12-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053592" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.12-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053593" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.12-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055711" version="1" comment="apache2 is &lt;2.2.10-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055706" version="1" comment="apache2-doc is &lt;2.2.10-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055707" version="1" comment="apache2-example-pages is &lt;2.2.10-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055708" version="1" comment="apache2-prefork is &lt;2.2.10-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055709" version="1" comment="apache2-utils is &lt;2.2.10-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055710" version="1" comment="apache2-worker is &lt;2.2.10-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032190" version="1" comment="clamav is &lt;0.95-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053035" version="1" comment="apache2-mod_php5 is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111686" version="1" comment="php5 is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053036" version="1" comment="php5-bcmath is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053037" version="1" comment="php5-bz2 is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053038" version="1" comment="php5-calendar is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053039" version="1" comment="php5-ctype is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053040" version="1" comment="php5-curl is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053041" version="1" comment="php5-dba is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053042" version="1" comment="php5-dbase is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053043" version="1" comment="php5-dom is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053044" version="1" comment="php5-exif is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053045" version="1" comment="php5-fastcgi is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053046" version="1" comment="php5-ftp is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053047" version="1" comment="php5-gd is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053048" version="1" comment="php5-gettext is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053049" version="1" comment="php5-gmp is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053050" version="1" comment="php5-hash is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053051" version="1" comment="php5-iconv is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053052" version="1" comment="php5-json is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053053" version="1" comment="php5-ldap is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053054" version="1" comment="php5-mbstring is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053055" version="1" comment="php5-mcrypt is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053056" version="1" comment="php5-mysql is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053057" version="1" comment="php5-odbc is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053058" version="1" comment="php5-openssl is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053059" version="1" comment="php5-pcntl is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053060" version="1" comment="php5-pdo is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053061" version="1" comment="php5-pear is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053062" version="1" comment="php5-pgsql is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053063" version="1" comment="php5-pspell is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053064" version="1" comment="php5-shmop is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053065" version="1" comment="php5-snmp is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053066" version="1" comment="php5-soap is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053067" version="1" comment="php5-suhosin is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053068" version="1" comment="php5-sysvmsg is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053069" version="1" comment="php5-sysvsem is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053070" version="1" comment="php5-sysvshm is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053071" version="1" comment="php5-tokenizer is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053072" version="1" comment="php5-wddx is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053073" version="1" comment="php5-xmlreader is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053074" version="1" comment="php5-xmlrpc is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053075" version="1" comment="php5-xmlwriter is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053076" version="1" comment="php5-xsl is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053077" version="1" comment="php5-zip is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053078" version="1" comment="php5-zlib is &lt;5.2.6-50.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053521" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.25_0.1-7.1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053530" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.25_0.1-7.1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053524" version="1" comment="kernel-default is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053523" version="1" comment="kernel-default-base is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053531" version="1" comment="kernel-kdump is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053533" version="1" comment="kernel-ppc64 is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053532" version="1" comment="kernel-ppc64-base is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053525" version="1" comment="kernel-source is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053526" version="1" comment="kernel-syms is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061701" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.48_0.1-7.1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061702" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.48_0.1-7.1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061676" version="1" comment="kernel-default is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061674" version="1" comment="kernel-default-base is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061678" version="1" comment="kernel-kdump is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061684" version="1" comment="kernel-ppc64 is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061682" version="1" comment="kernel-ppc64-base is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061686" version="1" comment="kernel-source is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061687" version="1" comment="kernel-syms is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032390" version="1" comment="MozillaFirefox is &lt;3.0.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032389" version="1" comment="MozillaFirefox-translations is &lt;3.0.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032395" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.11-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032391" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.11-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032392" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.11-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032393" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.11-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055946" version="1" comment="MozillaFirefox is &lt;3.5.4-1.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055945" version="1" comment="MozillaFirefox-translations is &lt;3.5.4-1.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055944" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.15-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055940" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.15-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055941" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.15-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055942" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.15-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055951" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.4-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055947" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.4-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055948" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.4-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055949" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.4-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058352" version="1" comment="MozillaFirefox is &lt;3.5.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058351" version="1" comment="MozillaFirefox-translations is &lt;3.5.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058362" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058358" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058359" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058360" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058357" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058353" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058354" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058355" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053220" version="1" comment="cifs-mount is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053221" version="1" comment="ldapsmb is &lt;1.34b-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053224" version="1" comment="libsmbclient0 is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053222" version="1" comment="libsmbclient0-32bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053227" version="1" comment="libtalloc1 is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053225" version="1" comment="libtalloc1-32bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053230" version="1" comment="libtdb1 is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053228" version="1" comment="libtdb1-32bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053233" version="1" comment="libwbclient0 is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053231" version="1" comment="libwbclient0-32bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053243" version="1" comment="samba is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053234" version="1" comment="samba-32bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053237" version="1" comment="samba-client is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053235" version="1" comment="samba-client-32bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053238" version="1" comment="samba-krb-printing is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053241" version="1" comment="samba-winbind is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053239" version="1" comment="samba-winbind-32bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053446" version="1" comment="openswan is &lt;2.6.16-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053445" version="1" comment="openswan-doc is &lt;2.6.16-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052417" version="1" comment="strongswan is &lt;4.2.8-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052416" version="1" comment="strongswan-doc is &lt;4.2.8-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054850" version="1" comment="kvm is &lt;78.0.10.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054848" version="1" comment="kvm-kmp-default is &lt;78.2.6.30.1_2.6.27.25_0.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053939" version="1" comment="libfreebl3 is &lt;3.12.3.1-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053937" version="1" comment="libfreebl3-32bit is &lt;3.12.3.1-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053943" version="1" comment="mozilla-nss is &lt;3.12.3.1-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053940" version="1" comment="mozilla-nss-32bit is &lt;3.12.3.1-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053941" version="1" comment="mozilla-nss-tools is &lt;3.12.3.1-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054104" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.29_0.1-7.1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054118" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.29_0.1-7.1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054109" version="1" comment="kernel-default is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054108" version="1" comment="kernel-default-base is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054119" version="1" comment="kernel-kdump is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054121" version="1" comment="kernel-ppc64 is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054120" version="1" comment="kernel-ppc64-base is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054112" version="1" comment="kernel-source is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054113" version="1" comment="kernel-syms is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054904" version="1" comment="libldap-2_4-2 is &lt;2.4.12-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054902" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.12-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054909" version="1" comment="mutt is &lt;1.5.17-42.32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054907" version="1" comment="openldap2 is &lt;2.4.12-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054905" version="1" comment="openldap2-back-meta is &lt;2.4.12-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054906" version="1" comment="openldap2-client is &lt;2.4.12-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053782" version="1" comment="libxml2 is &lt;2.7.1-10.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053779" version="1" comment="libxml2-32bit is &lt;2.7.1-10.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053780" version="1" comment="libxml2-doc is &lt;2.7.1-10.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053896" version="1" comment="curl is &lt;7.19.0-11.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053902" version="1" comment="libcurl4 is &lt;7.19.0-11.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053900" version="1" comment="libcurl4-32bit is &lt;7.19.0-11.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056023" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056020" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056021" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056792" version="1" comment="wireshark is &lt;1.0.5-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060327" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.8.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060325" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.8.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060339" version="1" comment="python is &lt;2.6.0-8.9.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060328" version="1" comment="python-32bit is &lt;2.6.0-8.9.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060331" version="1" comment="python-base is &lt;2.6.0-8.8.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060329" version="1" comment="python-base-32bit is &lt;2.6.0-8.8.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060332" version="1" comment="python-curses is &lt;2.6.0-8.9.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060333" version="1" comment="python-demo is &lt;2.6.0-8.9.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060334" version="1" comment="python-gdbm is &lt;2.6.0-8.9.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060335" version="1" comment="python-idle is &lt;2.6.0-8.9.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060336" version="1" comment="python-tk is &lt;2.6.0-8.9.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060338" version="1" comment="python-xml is &lt;2.6.0-8.8.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053945" version="1" comment="MozillaFirefox is &lt;3.0.13-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053944" version="1" comment="MozillaFirefox-translations is &lt;3.0.13-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054911" version="1" comment="strongswan is &lt;4.2.8-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054910" version="1" comment="strongswan-doc is &lt;4.2.8-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055145" version="1" comment="apache2-mod_php5 is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111687" version="1" comment="php5 is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055146" version="1" comment="php5-bcmath is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055147" version="1" comment="php5-bz2 is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055148" version="1" comment="php5-calendar is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055149" version="1" comment="php5-ctype is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055150" version="1" comment="php5-curl is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055151" version="1" comment="php5-dba is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055152" version="1" comment="php5-dbase is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055153" version="1" comment="php5-dom is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055154" version="1" comment="php5-exif is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055155" version="1" comment="php5-fastcgi is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055156" version="1" comment="php5-ftp is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055157" version="1" comment="php5-gd is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055158" version="1" comment="php5-gettext is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055159" version="1" comment="php5-gmp is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055160" version="1" comment="php5-hash is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055161" version="1" comment="php5-iconv is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055162" version="1" comment="php5-json is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055163" version="1" comment="php5-ldap is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055164" version="1" comment="php5-mbstring is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055165" version="1" comment="php5-mcrypt is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055166" version="1" comment="php5-mysql is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055167" version="1" comment="php5-odbc is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055168" version="1" comment="php5-openssl is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055169" version="1" comment="php5-pcntl is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055170" version="1" comment="php5-pdo is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055171" version="1" comment="php5-pear is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055172" version="1" comment="php5-pgsql is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055173" version="1" comment="php5-pspell is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055174" version="1" comment="php5-shmop is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055175" version="1" comment="php5-snmp is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055176" version="1" comment="php5-soap is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055177" version="1" comment="php5-suhosin is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055178" version="1" comment="php5-sysvmsg is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055179" version="1" comment="php5-sysvsem is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055180" version="1" comment="php5-sysvshm is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055181" version="1" comment="php5-tokenizer is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055182" version="1" comment="php5-wddx is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055183" version="1" comment="php5-xmlreader is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055184" version="1" comment="php5-xmlrpc is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055185" version="1" comment="php5-xmlwriter is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055186" version="1" comment="php5-xsl is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055187" version="1" comment="php5-zip is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055188" version="1" comment="php5-zlib is &lt;5.2.6-50.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055477" version="1" comment="cifs-mount is &lt;3.2.7-11.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055478" version="1" comment="ldapsmb is &lt;1.34b-11.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055481" version="1" comment="libsmbclient0 is &lt;3.2.7-11.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055479" version="1" comment="libsmbclient0-32bit is &lt;3.2.7-11.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055484" version="1" comment="libtalloc1 is &lt;3.2.7-11.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055482" version="1" comment="libtalloc1-32bit is &lt;3.2.7-11.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055487" version="1" comment="libtdb1 is &lt;3.2.7-11.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055485" version="1" comment="libtdb1-32bit is &lt;3.2.7-11.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055490" version="1" comment="libwbclient0 is &lt;3.2.7-11.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055488" version="1" comment="libwbclient0-32bit is &lt;3.2.7-11.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055500" version="1" comment="samba is &lt;3.2.7-11.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055491" version="1" comment="samba-32bit is &lt;3.2.7-11.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055494" version="1" comment="samba-client is &lt;3.2.7-11.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055492" version="1" comment="samba-client-32bit is &lt;3.2.7-11.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055495" version="1" comment="samba-krb-printing is &lt;3.2.7-11.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055498" version="1" comment="samba-winbind is &lt;3.2.7-11.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055496" version="1" comment="samba-winbind-32bit is &lt;3.2.7-11.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056123" version="1" comment="cups is &lt;1.3.9-8.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056119" version="1" comment="cups-client is &lt;1.3.9-8.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056122" version="1" comment="cups-libs is &lt;1.3.9-8.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056120" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055900" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.37_0.1-7.1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055907" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.37_0.1-7.1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055846" version="1" comment="kernel-default is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055844" version="1" comment="kernel-default-base is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055851" version="1" comment="kernel-kdump is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055857" version="1" comment="kernel-ppc64 is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055855" version="1" comment="kernel-ppc64-base is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055859" version="1" comment="kernel-source is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055860" version="1" comment="kernel-syms is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055072" version="1" comment="MozillaFirefox is &lt;3.5.3-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055071" version="1" comment="MozillaFirefox-translations is &lt;3.5.3-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055068" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.14-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055061" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.14-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055063" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.14-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055065" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.14-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055087" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.3-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055083" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.3-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055084" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.3-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055085" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.3-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059470" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.42_0.1-7.1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111768" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.42_0.1-7.1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057216" version="1" comment="kernel-default is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057214" version="1" comment="kernel-default-base is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057218" version="1" comment="kernel-kdump is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057224" version="1" comment="kernel-ppc64 is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057222" version="1" comment="kernel-ppc64-base is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057226" version="1" comment="kernel-source is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057227" version="1" comment="kernel-syms is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055026" version="1" comment="postgresql is &lt;8.3.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055020" version="1" comment="postgresql-contrib is &lt;8.3.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055021" version="1" comment="postgresql-docs is &lt;8.3.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055024" version="1" comment="postgresql-libs is &lt;8.3.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055022" version="1" comment="postgresql-libs-32bit is &lt;8.3.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055025" version="1" comment="postgresql-server is &lt;8.3.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059250" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059248" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059252" version="1" comment="openssl is &lt;0.9.8h-30.22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059251" version="1" comment="openssl-doc is &lt;0.9.8h-30.22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059848" version="1" comment="glib2 is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059846" version="1" comment="glib2-doc is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059847" version="1" comment="glib2-lang is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059851" version="1" comment="libgio-2_0-0 is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059849" version="1" comment="libgio-2_0-0-32bit is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059854" version="1" comment="libglib-2_0-0 is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059852" version="1" comment="libglib-2_0-0-32bit is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059857" version="1" comment="libgmodule-2_0-0 is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059855" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059860" version="1" comment="libgobject-2_0-0 is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059858" version="1" comment="libgobject-2_0-0-32bit is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059863" version="1" comment="libgthread-2_0-0 is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059861" version="1" comment="libgthread-2_0-0-32bit is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057344" version="1" comment="krb5 is &lt;1.6.3-133.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057338" version="1" comment="krb5-32bit is &lt;1.6.3-133.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057339" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057340" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057341" version="1" comment="krb5-client is &lt;1.6.3-133.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057342" version="1" comment="krb5-server is &lt;1.6.3-133.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057690" version="1" comment="fuse is &lt;2.7.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057691" version="1" comment="libfuse2 is &lt;2.7.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056887" version="1" comment="MozillaFirefox is &lt;3.5.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056886" version="1" comment="MozillaFirefox-translations is &lt;3.5.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056892" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056888" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056889" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056890" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065171" version="1" comment="gnutls is &lt;2.4.1-24.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060827" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.4-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059417" version="1" comment="libfreebl3 is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059415" version="1" comment="libfreebl3-32bit is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065174" version="1" comment="libgnutls26 is &lt;2.4.1-24.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065172" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059421" version="1" comment="mozilla-nss is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059418" version="1" comment="mozilla-nss-32bit is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059419" version="1" comment="mozilla-nss-tools is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059488" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.9-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059484" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.9-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059485" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.9-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059486" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.9-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065192" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.6-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065626" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr9.0-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065623" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr9.0-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065624" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr9.0-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057190" version="1" comment="ntp is &lt;4.2.4p6-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057189" version="1" comment="ntp-doc is &lt;4.2.4p6-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056327" version="1" comment="expat is &lt;2.0.1-88.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056330" version="1" comment="libexpat1 is &lt;2.0.1-88.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056328" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058491" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.45_0.1-7.1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058506" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.45_0.1-7.1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058493" version="1" comment="kernel-default is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058492" version="1" comment="kernel-default-base is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058507" version="1" comment="kernel-kdump is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058509" version="1" comment="kernel-ppc64 is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058508" version="1" comment="kernel-ppc64-base is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058494" version="1" comment="kernel-source is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058495" version="1" comment="kernel-syms is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056897" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056893" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056894" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056895" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056417" version="1" comment="bind is &lt;9.5.0P2-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056411" version="1" comment="bind-chrootenv is &lt;9.5.0P2-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056412" version="1" comment="bind-doc is &lt;9.5.0P2-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056415" version="1" comment="bind-libs is &lt;9.5.0P2-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056413" version="1" comment="bind-libs-32bit is &lt;9.5.0P2-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056416" version="1" comment="bind-utils is &lt;9.5.0P2-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061860" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061861" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061862" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061863" version="1" comment="ghostscript-library is &lt;8.62-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061864" version="1" comment="ghostscript-omni is &lt;8.62-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061865" version="1" comment="ghostscript-x11 is &lt;8.62-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061866" version="1" comment="libgimpprint is &lt;4.2.7-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093925" version="1" comment="gnutls is &lt;2.4.1-24.39.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093929" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093927" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093926" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093936" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093937" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069111" version="1" comment="glibc is &lt;2.11.1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069098" version="1" comment="glibc-32bit is &lt;2.11.1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069100" version="1" comment="glibc-devel is &lt;2.11.1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069099" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069101" version="1" comment="glibc-html is &lt;2.11.1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069102" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069103" version="1" comment="glibc-info is &lt;2.11.1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069106" version="1" comment="glibc-locale is &lt;2.11.1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069104" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069109" version="1" comment="glibc-profile is &lt;2.11.1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069107" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069112" version="1" comment="nscd is &lt;2.11.1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062169" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.5-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061087" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr8.0-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061084" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr8.0-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061085" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr8.0-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061082" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr8.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061079" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr8.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061080" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr8.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065330" version="1" comment="MozillaFirefox is &lt;3.6.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065329" version="1" comment="MozillaFirefox-translations is &lt;3.6.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065256" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065250" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065253" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065336" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065335" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.13-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065331" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.13-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065332" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.13-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065333" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.13-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057543" version="1" comment="MozillaFirefox is &lt;3.5.7-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057542" version="1" comment="MozillaFirefox-translations is &lt;3.5.7-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057541" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.17-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057537" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.17-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057538" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.17-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057539" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.17-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057548" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.7-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057544" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.7-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057545" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.7-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057546" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.7-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070659" version="1" comment="glibc is &lt;2.11.1-0.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070646" version="1" comment="glibc-32bit is &lt;2.11.1-0.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070648" version="1" comment="glibc-devel is &lt;2.11.1-0.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070647" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070649" version="1" comment="glibc-html is &lt;2.11.1-0.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070650" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070651" version="1" comment="glibc-info is &lt;2.11.1-0.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070654" version="1" comment="glibc-locale is &lt;2.11.1-0.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070652" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070657" version="1" comment="glibc-profile is &lt;2.11.1-0.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070655" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070660" version="1" comment="nscd is &lt;2.11.1-0.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062323" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111689" version="1" comment="php5 is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062324" version="1" comment="php5-bcmath is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062325" version="1" comment="php5-bz2 is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062326" version="1" comment="php5-calendar is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062327" version="1" comment="php5-ctype is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062328" version="1" comment="php5-curl is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062329" version="1" comment="php5-dba is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062330" version="1" comment="php5-dbase is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062331" version="1" comment="php5-dom is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062332" version="1" comment="php5-exif is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062333" version="1" comment="php5-fastcgi is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062334" version="1" comment="php5-ftp is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062335" version="1" comment="php5-gd is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062336" version="1" comment="php5-gettext is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062337" version="1" comment="php5-gmp is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062338" version="1" comment="php5-hash is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062339" version="1" comment="php5-iconv is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062340" version="1" comment="php5-json is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062341" version="1" comment="php5-ldap is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062342" version="1" comment="php5-mbstring is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062343" version="1" comment="php5-mcrypt is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062344" version="1" comment="php5-mysql is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062345" version="1" comment="php5-odbc is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062346" version="1" comment="php5-openssl is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062347" version="1" comment="php5-pcntl is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062348" version="1" comment="php5-pdo is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062349" version="1" comment="php5-pear is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062350" version="1" comment="php5-pgsql is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062351" version="1" comment="php5-pspell is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062352" version="1" comment="php5-shmop is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062353" version="1" comment="php5-snmp is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062354" version="1" comment="php5-soap is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062355" version="1" comment="php5-suhosin is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062356" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062357" version="1" comment="php5-sysvsem is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062358" version="1" comment="php5-sysvshm is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062359" version="1" comment="php5-tokenizer is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062360" version="1" comment="php5-wddx is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062361" version="1" comment="php5-xmlreader is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062362" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062363" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062364" version="1" comment="php5-xsl is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062365" version="1" comment="php5-zip is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062366" version="1" comment="php5-zlib is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064780" version="1" comment="cups is &lt;1.3.9-8.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064776" version="1" comment="cups-client is &lt;1.3.9-8.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064779" version="1" comment="cups-libs is &lt;1.3.9-8.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064777" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059012" version="1" comment="cifs-mount is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059013" version="1" comment="ldapsmb is &lt;1.34b-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059016" version="1" comment="libsmbclient0 is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059014" version="1" comment="libsmbclient0-32bit is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059019" version="1" comment="libtalloc1 is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059017" version="1" comment="libtalloc1-32bit is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059022" version="1" comment="libtdb1 is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059020" version="1" comment="libtdb1-32bit is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059025" version="1" comment="libwbclient0 is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059023" version="1" comment="libwbclient0-32bit is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059035" version="1" comment="samba is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059026" version="1" comment="samba-32bit is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059029" version="1" comment="samba-client is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059027" version="1" comment="samba-client-32bit is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059030" version="1" comment="samba-krb-printing is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059033" version="1" comment="samba-winbind is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059031" version="1" comment="samba-winbind-32bit is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061809" version="1" comment="MozillaFirefox is &lt;3.5.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061808" version="1" comment="MozillaFirefox-translations is &lt;3.5.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061277" version="1" comment="postgresql is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061271" version="1" comment="postgresql-contrib is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061272" version="1" comment="postgresql-docs is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061275" version="1" comment="postgresql-libs is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061273" version="1" comment="postgresql-libs-32bit is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061276" version="1" comment="postgresql-server is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062376" version="1" comment="tgt is &lt;0.9.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062007" version="1" comment="perl is &lt;5.10.0-64.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062003" version="1" comment="perl-32bit is &lt;5.10.0-64.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062004" version="1" comment="perl-base is &lt;5.10.0-64.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062005" version="1" comment="perl-doc is &lt;5.10.0-64.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062002" version="1" comment="perl is &lt;5.10.0-64.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061998" version="1" comment="perl-32bit is &lt;5.10.0-64.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061999" version="1" comment="perl-base is &lt;5.10.0-64.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062000" version="1" comment="perl-doc is &lt;5.10.0-64.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064046" version="1" comment="NetworkManager is &lt;0.7.0.r4359-15.20.10.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064045" version="1" comment="NetworkManager-glib is &lt;0.7.0.r4359-15.20.10.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070664" version="1" comment="NetworkManager is &lt;0.7.0.r4359-15.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070663" version="1" comment="NetworkManager-glib is &lt;0.7.0.r4359-15.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070665" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.13_0.4-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075019" version="1" comment="btrfs-kmp-pae is &lt;0_2.6.32.59_0.7-0.3.107" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075020" version="1" comment="btrfs-kmp-xen is &lt;0_2.6.32.59_0.7-0.3.107" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070666" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.13_0.4-7.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075056" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.32.59_0.7-7.9.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070688" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.13_0.4-7.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075050" version="1" comment="ext4dev-kmp-trace is &lt;0_2.6.32.59_0.7-7.9.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075057" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.32.59_0.7-7.9.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075021" version="1" comment="hyper-v-kmp-default is &lt;0_2.6.32.59_0.7-0.18.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075022" version="1" comment="hyper-v-kmp-pae is &lt;0_2.6.32.59_0.7-0.18.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075058" version="1" comment="hyper-v-kmp-trace is &lt;0_2.6.32.59_0.7-0.18.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070670" version="1" comment="kernel-default is &lt;2.6.32.13-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070667" version="1" comment="kernel-default-base is &lt;2.6.32.13-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070668" version="1" comment="kernel-default-devel is &lt;2.6.32.13-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075061" version="1" comment="kernel-ec2 is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075059" version="1" comment="kernel-ec2-base is &lt;2.6.32.59-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070691" version="1" comment="kernel-ppc64 is &lt;2.6.32.13-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070689" version="1" comment="kernel-ppc64-base is &lt;2.6.32.13-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070690" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.13-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070671" version="1" comment="kernel-source is &lt;2.6.32.13-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070672" version="1" comment="kernel-syms is &lt;2.6.32.13-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070675" version="1" comment="kernel-trace is &lt;2.6.32.13-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070673" version="1" comment="kernel-trace-base is &lt;2.6.32.13-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070674" version="1" comment="kernel-trace-devel is &lt;2.6.32.13-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060716" version="1" comment="krb5 is &lt;1.6.3-133.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060710" version="1" comment="krb5-32bit is &lt;1.6.3-133.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060711" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060712" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060713" version="1" comment="krb5-client is &lt;1.6.3-133.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060714" version="1" comment="krb5-server is &lt;1.6.3-133.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066021" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.8-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116742" version="1" comment="java-1_4_2-ibm-sap is &lt;1.4.2_sr13.8-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116743" version="1" comment="java-1_4_2-ibm-sap-devel is &lt;1.4.2_sr13.8-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064613" version="1" comment="krb5 is &lt;1.6.3-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064607" version="1" comment="krb5-32bit is &lt;1.6.3-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064608" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064609" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064610" version="1" comment="krb5-client is &lt;1.6.3-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064611" version="1" comment="krb5-server is &lt;1.6.3-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070292" version="1" comment="apache2 is &lt;2.2.10-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070287" version="1" comment="apache2-doc is &lt;2.2.10-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070288" version="1" comment="apache2-example-pages is &lt;2.2.10-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070289" version="1" comment="apache2-prefork is &lt;2.2.10-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070290" version="1" comment="apache2-utils is &lt;2.2.10-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070291" version="1" comment="apache2-worker is &lt;2.2.10-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066948" version="1" comment="wireshark is &lt;1.4.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066068" version="1" comment="MozillaFirefox is &lt;3.6.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066067" version="1" comment="MozillaFirefox-translations is &lt;3.6.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066066" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066062" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066063" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066064" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066073" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066069" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066070" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066071" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065014" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065012" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065026" version="1" comment="python is &lt;2.6.0-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065015" version="1" comment="python-32bit is &lt;2.6.0-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065018" version="1" comment="python-base is &lt;2.6.0-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065016" version="1" comment="python-base-32bit is &lt;2.6.0-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065019" version="1" comment="python-curses is &lt;2.6.0-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065020" version="1" comment="python-demo is &lt;2.6.0-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065021" version="1" comment="python-gdbm is &lt;2.6.0-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065022" version="1" comment="python-idle is &lt;2.6.0-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065023" version="1" comment="python-tk is &lt;2.6.0-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065025" version="1" comment="python-xml is &lt;2.6.0-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061754" version="1" comment="clamav is &lt;0.96.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061868" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.13_0.5-0.3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061870" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.13_0.5-7.3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061885" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.13_0.5-7.3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061875" version="1" comment="kernel-default is &lt;2.6.32.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061873" version="1" comment="kernel-default-base is &lt;2.6.32.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061874" version="1" comment="kernel-default-devel is &lt;2.6.32.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061888" version="1" comment="kernel-ppc64 is &lt;2.6.32.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061886" version="1" comment="kernel-ppc64-base is &lt;2.6.32.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061887" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061876" version="1" comment="kernel-source is &lt;2.6.32.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061877" version="1" comment="kernel-syms is &lt;2.6.32.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061880" version="1" comment="kernel-trace is &lt;2.6.32.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061878" version="1" comment="kernel-trace-base is &lt;2.6.32.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061879" version="1" comment="kernel-trace-devel is &lt;2.6.32.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066668" version="1" comment="quagga is &lt;0.99.15-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062065" version="1" comment="freetype2 is &lt;2.3.7-25.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062063" version="1" comment="freetype2-32bit is &lt;2.3.7-25.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064946" version="1" comment="popt is &lt;1.7-37.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064944" version="1" comment="popt-32bit is &lt;1.7-37.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064949" version="1" comment="rpm is &lt;4.4.2.3-37.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064947" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060901" version="1" comment="cifs-mount is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060902" version="1" comment="ldapsmb is &lt;1.34b-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060905" version="1" comment="libsmbclient0 is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060903" version="1" comment="libsmbclient0-32bit is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060908" version="1" comment="libtalloc1 is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060906" version="1" comment="libtalloc1-32bit is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060911" version="1" comment="libtdb1 is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060909" version="1" comment="libtdb1-32bit is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060914" version="1" comment="libwbclient0 is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060912" version="1" comment="libwbclient0-32bit is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060924" version="1" comment="samba is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060915" version="1" comment="samba-32bit is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060918" version="1" comment="samba-client is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060916" version="1" comment="samba-client-32bit is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060919" version="1" comment="samba-krb-printing is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060922" version="1" comment="samba-winbind is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060920" version="1" comment="samba-winbind-32bit is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116744" version="1" comment="brocade-bna-kmp-rt is &lt;2.1.0.0_2.6.33.7.2_rt30_0.3-0.2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116745" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.19_2.6.33.7.2_rt30_0.3-0.7.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116746" version="1" comment="kernel-rt is &lt;2.6.33.7.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116747" version="1" comment="kernel-rt-base is &lt;2.6.33.7.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116748" version="1" comment="kernel-rt-devel is &lt;2.6.33.7.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116749" version="1" comment="kernel-rt_trace is &lt;2.6.33.7.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116750" version="1" comment="kernel-rt_trace-base is &lt;2.6.33.7.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116751" version="1" comment="kernel-rt_trace-devel is &lt;2.6.33.7.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116752" version="1" comment="kernel-source-rt is &lt;2.6.33.7.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116753" version="1" comment="kernel-syms-rt is &lt;2.6.33.7.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116754" version="1" comment="ofed-kmp-rt is &lt;1.4.2_2.6.33.7.2_rt30_0.3-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062638" version="1" comment="libvirt is &lt;0.7.6-1.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062636" version="1" comment="libvirt-doc is &lt;0.7.6-1.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062637" version="1" comment="libvirt-python is &lt;0.7.6-1.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063235" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063237" version="1" comment="xorg-x11-server is &lt;7.4-27.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063236" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062388" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.19_0.2-0.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062390" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.19_0.2-7.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062404" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.19_0.2-7.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062395" version="1" comment="kernel-default is &lt;2.6.32.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062393" version="1" comment="kernel-default-base is &lt;2.6.32.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062394" version="1" comment="kernel-default-devel is &lt;2.6.32.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062407" version="1" comment="kernel-ppc64 is &lt;2.6.32.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062405" version="1" comment="kernel-ppc64-base is &lt;2.6.32.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062406" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062396" version="1" comment="kernel-source is &lt;2.6.32.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062397" version="1" comment="kernel-syms is &lt;2.6.32.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062400" version="1" comment="kernel-trace is &lt;2.6.32.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062398" version="1" comment="kernel-trace-base is &lt;2.6.32.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062399" version="1" comment="kernel-trace-devel is &lt;2.6.32.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070877" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070875" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070891" version="1" comment="libqt4 is &lt;4.6.3-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070878" version="1" comment="libqt4-32bit is &lt;4.6.3-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070881" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070879" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070886" version="1" comment="libqt4-sql is &lt;4.6.3-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070882" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070884" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070889" version="1" comment="libqt4-x11 is &lt;4.6.3-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070887" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061964" version="1" comment="strongswan is &lt;4.3.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061963" version="1" comment="strongswan-doc is &lt;4.3.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065543" version="1" comment="evince is &lt;2.28.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065541" version="1" comment="evince-doc is &lt;2.28.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065542" version="1" comment="evince-lang is &lt;2.28.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063387" version="1" comment="MozillaFirefox is &lt;3.6.10-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063386" version="1" comment="MozillaFirefox-translations is &lt;3.6.10-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063392" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063388" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063389" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063390" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065593" version="1" comment="perl is &lt;5.10.0-64.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065589" version="1" comment="perl-32bit is &lt;5.10.0-64.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065590" version="1" comment="perl-base is &lt;5.10.0-64.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065591" version="1" comment="perl-doc is &lt;5.10.0-64.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063839" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.54_0.2-7.1.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063857" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.54_0.2-7.1.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063844" version="1" comment="kernel-default is &lt;2.6.27.54-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063843" version="1" comment="kernel-default-base is &lt;2.6.27.54-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063858" version="1" comment="kernel-kdump is &lt;2.6.27.54-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063860" version="1" comment="kernel-ppc64 is &lt;2.6.27.54-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063859" version="1" comment="kernel-ppc64-base is &lt;2.6.27.54-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063847" version="1" comment="kernel-source is &lt;2.6.27.54-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063848" version="1" comment="kernel-syms is &lt;2.6.27.54-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064300" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.22.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064298" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.22.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064302" version="1" comment="openssl is &lt;0.9.8h-30.22.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064301" version="1" comment="openssl-doc is &lt;0.9.8h-30.22.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064305" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064303" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064307" version="1" comment="openssl is &lt;0.9.8h-30.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064306" version="1" comment="openssl-doc is &lt;0.9.8h-30.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065986" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.29_0.3-0.3.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065987" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.29_0.3-7.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065997" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.29_0.3-7.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065991" version="1" comment="kernel-default is &lt;2.6.32.29-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065988" version="1" comment="kernel-default-base is &lt;2.6.32.29-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065989" version="1" comment="kernel-default-devel is &lt;2.6.32.29-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066000" version="1" comment="kernel-ppc64 is &lt;2.6.32.29-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065998" version="1" comment="kernel-ppc64-base is &lt;2.6.32.29-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065999" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.29-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065992" version="1" comment="kernel-source is &lt;2.6.32.29-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065993" version="1" comment="kernel-syms is &lt;2.6.32.29-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065996" version="1" comment="kernel-trace is &lt;2.6.32.29-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065994" version="1" comment="kernel-trace-base is &lt;2.6.32.29-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065995" version="1" comment="kernel-trace-devel is &lt;2.6.32.29-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064508" version="1" comment="quagga is &lt;0.99.10-17.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064507" version="1" comment="quagga is &lt;0.99.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063425" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.23_0.3-0.3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063427" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.23_0.3-7.3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063465" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.23_0.3-7.3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063432" version="1" comment="kernel-default is &lt;2.6.32.23-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063430" version="1" comment="kernel-default-base is &lt;2.6.32.23-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063431" version="1" comment="kernel-default-devel is &lt;2.6.32.23-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063468" version="1" comment="kernel-ppc64 is &lt;2.6.32.23-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063466" version="1" comment="kernel-ppc64-base is &lt;2.6.32.23-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063467" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.23-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063436" version="1" comment="kernel-source is &lt;2.6.32.23-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063437" version="1" comment="kernel-syms is &lt;2.6.32.23-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063440" version="1" comment="kernel-trace is &lt;2.6.32.23-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063438" version="1" comment="kernel-trace-base is &lt;2.6.32.23-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063439" version="1" comment="kernel-trace-devel is &lt;2.6.32.23-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062814" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.19_0.3-0.3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062815" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.19_0.3-7.3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062836" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.19_0.3-7.3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062818" version="1" comment="kernel-default is &lt;2.6.32.19-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062816" version="1" comment="kernel-default-base is &lt;2.6.32.19-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062817" version="1" comment="kernel-default-devel is &lt;2.6.32.19-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062839" version="1" comment="kernel-ppc64 is &lt;2.6.32.19-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062837" version="1" comment="kernel-ppc64-base is &lt;2.6.32.19-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062838" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.19-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062819" version="1" comment="kernel-source is &lt;2.6.32.19-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062820" version="1" comment="kernel-syms is &lt;2.6.32.19-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062823" version="1" comment="kernel-trace is &lt;2.6.32.19-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062821" version="1" comment="kernel-trace-base is &lt;2.6.32.19-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062822" version="1" comment="kernel-trace-devel is &lt;2.6.32.19-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062843" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.48_0.12-7.1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062851" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.48_0.12-7.1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062846" version="1" comment="kernel-default is &lt;2.6.27.48-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062844" version="1" comment="kernel-default-base is &lt;2.6.27.48-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062852" version="1" comment="kernel-kdump is &lt;2.6.27.48-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062854" version="1" comment="kernel-ppc64 is &lt;2.6.27.48-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062853" version="1" comment="kernel-ppc64-base is &lt;2.6.27.48-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062847" version="1" comment="kernel-source is &lt;2.6.27.48-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062848" version="1" comment="kernel-syms is &lt;2.6.27.48-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064260" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.24_0.2-0.3.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064263" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.24_0.2-7.3.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064283" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.24_0.2-7.3.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064270" version="1" comment="kernel-default is &lt;2.6.32.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064268" version="1" comment="kernel-default-base is &lt;2.6.32.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064269" version="1" comment="kernel-default-devel is &lt;2.6.32.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064286" version="1" comment="kernel-ppc64 is &lt;2.6.32.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064284" version="1" comment="kernel-ppc64-base is &lt;2.6.32.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064285" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064274" version="1" comment="kernel-source is &lt;2.6.32.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064275" version="1" comment="kernel-syms is &lt;2.6.32.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064278" version="1" comment="kernel-trace is &lt;2.6.32.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064276" version="1" comment="kernel-trace-base is &lt;2.6.32.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064277" version="1" comment="kernel-trace-devel is &lt;2.6.32.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063353" version="1" comment="freetype2 is &lt;2.3.7-25.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063351" version="1" comment="freetype2-32bit is &lt;2.3.7-25.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062866" version="1" comment="cifs-mount is &lt;3.4.3-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062867" version="1" comment="ldapsmb is &lt;1.34b-11.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062870" version="1" comment="libsmbclient0 is &lt;3.4.3-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062868" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062873" version="1" comment="libtalloc1 is &lt;3.4.3-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062871" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062876" version="1" comment="libtdb1 is &lt;3.4.3-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062874" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062879" version="1" comment="libwbclient0 is &lt;3.4.3-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062877" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062889" version="1" comment="samba is &lt;3.4.3-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062880" version="1" comment="samba-32bit is &lt;3.4.3-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062883" version="1" comment="samba-client is &lt;3.4.3-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062881" version="1" comment="samba-client-32bit is &lt;3.4.3-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062884" version="1" comment="samba-krb-printing is &lt;3.4.3-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062887" version="1" comment="samba-winbind is &lt;3.4.3-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062885" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064216" version="1" comment="MozillaFirefox is &lt;3.6.12-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064215" version="1" comment="MozillaFirefox-translations is &lt;3.6.12-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064214" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.11-0.1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064210" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.11-0.1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064211" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.11-0.1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064212" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.11-0.1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064521" version="1" comment="clamav is &lt;0.96.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065507" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.27_0.2-0.3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065510" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.27_0.2-7.3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065531" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.27_0.2-7.3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065517" version="1" comment="kernel-default is &lt;2.6.32.27-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065515" version="1" comment="kernel-default-base is &lt;2.6.32.27-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065516" version="1" comment="kernel-default-devel is &lt;2.6.32.27-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065534" version="1" comment="kernel-ppc64 is &lt;2.6.32.27-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065532" version="1" comment="kernel-ppc64-base is &lt;2.6.32.27-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065533" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.27-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065523" version="1" comment="kernel-source is &lt;2.6.32.27-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065524" version="1" comment="kernel-syms is &lt;2.6.32.27-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065527" version="1" comment="kernel-trace is &lt;2.6.32.27-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065525" version="1" comment="kernel-trace-base is &lt;2.6.32.27-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065526" version="1" comment="kernel-trace-devel is &lt;2.6.32.27-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064614" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111690" version="1" comment="php5 is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064615" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064616" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064617" version="1" comment="php5-calendar is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064618" version="1" comment="php5-ctype is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064619" version="1" comment="php5-curl is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064620" version="1" comment="php5-dba is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064621" version="1" comment="php5-dbase is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064622" version="1" comment="php5-dom is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064623" version="1" comment="php5-exif is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064624" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064625" version="1" comment="php5-ftp is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064626" version="1" comment="php5-gd is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064627" version="1" comment="php5-gettext is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064628" version="1" comment="php5-gmp is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064629" version="1" comment="php5-hash is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064630" version="1" comment="php5-iconv is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064631" version="1" comment="php5-json is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064632" version="1" comment="php5-ldap is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064633" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064634" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064635" version="1" comment="php5-mysql is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064636" version="1" comment="php5-odbc is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064637" version="1" comment="php5-openssl is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064638" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064639" version="1" comment="php5-pdo is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064640" version="1" comment="php5-pear is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064641" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064642" version="1" comment="php5-pspell is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064643" version="1" comment="php5-shmop is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064644" version="1" comment="php5-snmp is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064645" version="1" comment="php5-soap is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064646" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064647" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064648" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064649" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064650" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064651" version="1" comment="php5-wddx is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064652" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064653" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064654" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064655" version="1" comment="php5-xsl is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064656" version="1" comment="php5-zip is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064657" version="1" comment="php5-zlib is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066951" version="1" comment="freetype2 is &lt;2.3.7-25.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066949" version="1" comment="freetype2-32bit is &lt;2.3.7-25.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071899" version="1" comment="libmysqlclient15 is &lt;5.0.94-0.2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071897" version="1" comment="libmysqlclient15-32bit is &lt;5.0.94-0.2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071900" version="1" comment="libmysqlclient_r15 is &lt;5.0.94-0.2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071903" version="1" comment="mysql is &lt;5.0.94-0.2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071901" version="1" comment="mysql-Max is &lt;5.0.94-0.2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071902" version="1" comment="mysql-client is &lt;5.0.94-0.2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063882" version="1" comment="glibc is &lt;2.11.1-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063869" version="1" comment="glibc-32bit is &lt;2.11.1-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063871" version="1" comment="glibc-devel is &lt;2.11.1-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063870" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063872" version="1" comment="glibc-html is &lt;2.11.1-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063873" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063874" version="1" comment="glibc-info is &lt;2.11.1-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063877" version="1" comment="glibc-locale is &lt;2.11.1-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063875" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063880" version="1" comment="glibc-profile is &lt;2.11.1-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063878" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063883" version="1" comment="nscd is &lt;2.11.1-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064395" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.22.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064393" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.22.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064397" version="1" comment="openssl is &lt;0.9.8h-30.22.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064396" version="1" comment="openssl-doc is &lt;0.9.8h-30.22.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064400" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064398" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064402" version="1" comment="openssl is &lt;0.9.8h-30.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064401" version="1" comment="openssl-doc is &lt;0.9.8h-30.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116755" version="1" comment="brocade-bna-kmp-rt is &lt;2.1.0.0_2.6.33.20_rt31_0.3-0.2.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116756" version="1" comment="cluster-network-kmp-rt is &lt;1.4_2.6.33.20_rt31_0.3-2.5.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116757" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_2.6.33.20_rt31_0.3-2.5.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116758" version="1" comment="drbd-kmp-rt is &lt;8.3.11_2.6.33.20_rt31_0.3-0.3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116759" version="1" comment="drbd-kmp-rt_trace is &lt;8.3.11_2.6.33.20_rt31_0.3-0.3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116760" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.19_2.6.33.20_rt31_0.3-0.9.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116761" version="1" comment="kernel-rt is &lt;2.6.33.20-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116762" version="1" comment="kernel-rt-base is &lt;2.6.33.20-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116763" version="1" comment="kernel-rt-devel is &lt;2.6.33.20-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116764" version="1" comment="kernel-rt_trace is &lt;2.6.33.20-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116765" version="1" comment="kernel-rt_trace-base is &lt;2.6.33.20-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116766" version="1" comment="kernel-rt_trace-devel is &lt;2.6.33.20-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116767" version="1" comment="kernel-source-rt is &lt;2.6.33.20-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116768" version="1" comment="kernel-syms-rt is &lt;2.6.33.20-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116769" version="1" comment="ocfs2-kmp-rt is &lt;1.6_2.6.33.20_rt31_0.3-0.4.2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116770" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_2.6.33.20_rt31_0.3-0.4.2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116771" version="1" comment="ofed-kmp-rt is &lt;1.5.2_2.6.33.20_rt31_0.3-0.9.13.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116772" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.74_rt98_0.6.2-2.18.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116773" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.74_rt98_0.6.2-2.18.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116774" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.74_rt98_0.6.2-0.6.6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116775" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.74_rt98_0.6.2-0.6.6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116776" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.74_rt98_0.6.2-0.23.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116777" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.74_rt98_0.6.2-0.23.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116778" version="1" comment="kernel-rt is &lt;3.0.74.rt98-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116779" version="1" comment="kernel-rt-base is &lt;3.0.74.rt98-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116780" version="1" comment="kernel-rt-devel is &lt;3.0.74.rt98-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116781" version="1" comment="kernel-rt_trace is &lt;3.0.74.rt98-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116782" version="1" comment="kernel-rt_trace-base is &lt;3.0.74.rt98-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116783" version="1" comment="kernel-rt_trace-devel is &lt;3.0.74.rt98-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116784" version="1" comment="kernel-source-rt is &lt;3.0.74.rt98-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116785" version="1" comment="kernel-syms-rt is &lt;3.0.74.rt98-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116786" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.74_rt98_0.6.2-0.7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116787" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.74_rt98_0.6.2-0.7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116788" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.74_rt98_0.6.2-0.11.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116789" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.74_rt98_0.6.2-0.11.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116790" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.74_rt98_0.6.2-0.28.28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116791" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.74_rt98_0.6.2-0.28.28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072789" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.54_0.3-0.3.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072791" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.54_0.3-7.9.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072815" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.54_0.3-7.9.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072792" version="1" comment="ext4dev-kmp-trace is &lt;0_2.6.32.54_0.3-7.9.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072798" version="1" comment="kernel-default is &lt;2.6.32.54-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072796" version="1" comment="kernel-default-base is &lt;2.6.32.54-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072797" version="1" comment="kernel-default-devel is &lt;2.6.32.54-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072818" version="1" comment="kernel-ppc64 is &lt;2.6.32.54-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072816" version="1" comment="kernel-ppc64-base is &lt;2.6.32.54-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072817" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.54-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072801" version="1" comment="kernel-source is &lt;2.6.32.54-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072802" version="1" comment="kernel-syms is &lt;2.6.32.54-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072805" version="1" comment="kernel-trace is &lt;2.6.32.54-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072803" version="1" comment="kernel-trace-base is &lt;2.6.32.54-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072804" version="1" comment="kernel-trace-devel is &lt;2.6.32.54-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067855" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.36_0.5-0.3.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067857" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.36_0.5-7.9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067872" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.36_0.5-7.9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067861" version="1" comment="kernel-default is &lt;2.6.32.36-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067859" version="1" comment="kernel-default-base is &lt;2.6.32.36-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067860" version="1" comment="kernel-default-devel is &lt;2.6.32.36-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067875" version="1" comment="kernel-ppc64 is &lt;2.6.32.36-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067873" version="1" comment="kernel-ppc64-base is &lt;2.6.32.36-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067874" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.36-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067864" version="1" comment="kernel-source is &lt;2.6.32.36-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067865" version="1" comment="kernel-syms is &lt;2.6.32.36-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067868" version="1" comment="kernel-trace is &lt;2.6.32.36-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067866" version="1" comment="kernel-trace-base is &lt;2.6.32.36-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067867" version="1" comment="kernel-trace-devel is &lt;2.6.32.36-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116792" version="1" comment="brocade-bna-kmp-rt is &lt;2.1.0.0_2.6.33.18_rt31_0.3-0.2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116793" version="1" comment="cluster-network-kmp-rt is &lt;1.4_2.6.33.18_rt31_0.3-2.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116794" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_2.6.33.18_rt31_0.3-2.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116795" version="1" comment="drbd-kmp-rt is &lt;8.3.11_2.6.33.18_rt31_0.3-0.3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116796" version="1" comment="drbd-kmp-rt_trace is &lt;8.3.11_2.6.33.18_rt31_0.3-0.3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116797" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.19_2.6.33.18_rt31_0.3-0.7.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116798" version="1" comment="kernel-rt is &lt;2.6.33.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116799" version="1" comment="kernel-rt-base is &lt;2.6.33.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116800" version="1" comment="kernel-rt-devel is &lt;2.6.33.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116801" version="1" comment="kernel-rt_trace is &lt;2.6.33.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116802" version="1" comment="kernel-rt_trace-base is &lt;2.6.33.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116803" version="1" comment="kernel-rt_trace-devel is &lt;2.6.33.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116804" version="1" comment="kernel-source-rt is &lt;2.6.33.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116805" version="1" comment="kernel-syms-rt is &lt;2.6.33.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116806" version="1" comment="ocfs2-kmp-rt is &lt;1.6_2.6.33.18_rt31_0.3-0.4.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116807" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_2.6.33.18_rt31_0.3-0.4.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070213" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.45_0.3-0.3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070214" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.45_0.3-7.9.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070694" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.45_0.3-7.9.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070218" version="1" comment="kernel-default is &lt;2.6.32.45-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070215" version="1" comment="kernel-default-base is &lt;2.6.32.45-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070216" version="1" comment="kernel-default-devel is &lt;2.6.32.45-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070697" version="1" comment="kernel-ppc64 is &lt;2.6.32.45-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070695" version="1" comment="kernel-ppc64-base is &lt;2.6.32.45-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070696" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.45-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070219" version="1" comment="kernel-source is &lt;2.6.32.45-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070220" version="1" comment="kernel-syms is &lt;2.6.32.45-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070223" version="1" comment="kernel-trace is &lt;2.6.32.45-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070221" version="1" comment="kernel-trace-base is &lt;2.6.32.45-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070222" version="1" comment="kernel-trace-devel is &lt;2.6.32.45-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064576" version="1" comment="libxml2 is &lt;2.7.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064573" version="1" comment="libxml2-32bit is &lt;2.7.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064574" version="1" comment="libxml2-doc is &lt;2.7.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066717" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111788" version="1" comment="php5 is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066718" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066719" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066720" version="1" comment="php5-calendar is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066721" version="1" comment="php5-ctype is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066722" version="1" comment="php5-curl is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066723" version="1" comment="php5-dba is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066724" version="1" comment="php5-dbase is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066725" version="1" comment="php5-dom is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066726" version="1" comment="php5-exif is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066727" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066728" version="1" comment="php5-ftp is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066729" version="1" comment="php5-gd is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066730" version="1" comment="php5-gettext is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066731" version="1" comment="php5-gmp is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066732" version="1" comment="php5-hash is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066733" version="1" comment="php5-iconv is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066734" version="1" comment="php5-json is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066735" version="1" comment="php5-ldap is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066736" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066737" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066738" version="1" comment="php5-mysql is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066739" version="1" comment="php5-odbc is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066740" version="1" comment="php5-openssl is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066741" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066742" version="1" comment="php5-pdo is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066743" version="1" comment="php5-pear is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066744" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066745" version="1" comment="php5-pspell is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066746" version="1" comment="php5-shmop is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066747" version="1" comment="php5-snmp is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066748" version="1" comment="php5-soap is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066749" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066750" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066751" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066752" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066753" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066754" version="1" comment="php5-wddx is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066755" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066756" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066757" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066758" version="1" comment="php5-xsl is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066759" version="1" comment="php5-zip is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066760" version="1" comment="php5-zlib is &lt;5.2.14-0.7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065427" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065425" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065429" version="1" comment="openssl is &lt;0.9.8h-30.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065428" version="1" comment="openssl-doc is &lt;0.9.8h-30.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065612" version="1" comment="hplip is &lt;3.9.8-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065610" version="1" comment="hplip-hpijs is &lt;3.9.8-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067853" version="1" comment="dbus-1 is &lt;1.2.10-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067850" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066408" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr9.1-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066405" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr9.1-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066406" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr9.1-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068382" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.9-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116808" version="1" comment="java-1_4_2-ibm-sap is &lt;1.4.2_sr13.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116809" version="1" comment="java-1_4_2-ibm-sap-devel is &lt;1.4.2_sr13.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066672" version="1" comment="libxml2 is &lt;2.7.6-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066669" version="1" comment="libxml2-32bit is &lt;2.7.6-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066670" version="1" comment="libxml2-doc is &lt;2.7.6-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103768" version="1" comment="glibc is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103758" version="1" comment="glibc-32bit is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103760" version="1" comment="glibc-devel is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103759" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103761" version="1" comment="glibc-html is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103762" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103763" version="1" comment="glibc-info is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103765" version="1" comment="glibc-locale is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103764" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103767" version="1" comment="glibc-profile is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103766" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103769" version="1" comment="nscd is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103860" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.59_0.13-0.3.163" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103861" version="1" comment="btrfs-kmp-pae is &lt;0_2.6.32.59_0.13-0.3.163" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103862" version="1" comment="btrfs-kmp-xen is &lt;0_2.6.32.59_0.13-0.3.163" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103863" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.59_0.13-7.9.130" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103864" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.32.59_0.13-7.9.130" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103865" version="1" comment="ext4dev-kmp-trace is &lt;0_2.6.32.59_0.13-7.9.130" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103866" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.32.59_0.13-7.9.130" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103867" version="1" comment="hyper-v-kmp-default is &lt;0_2.6.32.59_0.13-0.18.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103868" version="1" comment="hyper-v-kmp-pae is &lt;0_2.6.32.59_0.13-0.18.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103869" version="1" comment="hyper-v-kmp-trace is &lt;0_2.6.32.59_0.13-0.18.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108339" version="1" comment="kernel-default is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108337" version="1" comment="kernel-default-base is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108338" version="1" comment="kernel-default-devel is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107487" version="1" comment="kernel-default-man is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108342" version="1" comment="kernel-ec2 is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108340" version="1" comment="kernel-ec2-base is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108341" version="1" comment="kernel-ec2-devel is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103936" version="1" comment="kernel-pae is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103934" version="1" comment="kernel-pae-base is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103935" version="1" comment="kernel-pae-devel is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108346" version="1" comment="kernel-source is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108347" version="1" comment="kernel-syms is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108350" version="1" comment="kernel-trace is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108348" version="1" comment="kernel-trace-base is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108349" version="1" comment="kernel-trace-devel is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108353" version="1" comment="kernel-xen is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108351" version="1" comment="kernel-xen-base is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108352" version="1" comment="kernel-xen-devel is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108354" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108356" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066555" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066553" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066557" version="1" comment="openssl is &lt;0.9.8h-30.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066556" version="1" comment="openssl-doc is &lt;0.9.8h-30.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068230" version="1" comment="MozillaFirefox is &lt;3.6.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068229" version="1" comment="MozillaFirefox-translations is &lt;3.6.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068235" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.17-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068231" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.17-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068232" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.17-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068233" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.17-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069275" version="1" comment="MozillaFirefox is &lt;3.6.18-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069274" version="1" comment="MozillaFirefox-translations is &lt;3.6.18-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069280" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.18-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069276" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.18-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069277" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.18-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069278" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.18-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070071" version="1" comment="MozillaFirefox is &lt;3.6.20-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070088" version="1" comment="MozillaFirefox-translations is &lt;3.6.20-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070083" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.20-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070074" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.20-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070078" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.20-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070089" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.20-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066168" version="1" comment="libtiff3 is &lt;3.8.2-141.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066166" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066169" version="1" comment="tiff is &lt;3.8.2-141.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069563" version="1" comment="freetype2 is &lt;2.3.7-25.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069561" version="1" comment="freetype2-32bit is &lt;2.3.7-25.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065743" version="1" comment="krb5 is &lt;1.6.3-133.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065737" version="1" comment="krb5-32bit is &lt;1.6.3-133.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065738" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065739" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065740" version="1" comment="krb5-client is &lt;1.6.3-133.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065741" version="1" comment="krb5-server is &lt;1.6.3-133.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067803" version="1" comment="postfix is &lt;2.5.6-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067801" version="1" comment="postfix-doc is &lt;2.5.6-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067802" version="1" comment="postfix-mysql is &lt;2.5.6-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067887" version="1" comment="cifs-mount is &lt;3.4.3-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067890" version="1" comment="libsmbclient0 is &lt;3.4.3-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067888" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067893" version="1" comment="libtalloc1 is &lt;3.4.3-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067891" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067896" version="1" comment="libtdb1 is &lt;3.4.3-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067894" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067899" version="1" comment="libwbclient0 is &lt;3.4.3-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067897" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067909" version="1" comment="samba is &lt;3.4.3-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067900" version="1" comment="samba-32bit is &lt;3.4.3-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067903" version="1" comment="samba-client is &lt;3.4.3-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067901" version="1" comment="samba-client-32bit is &lt;3.4.3-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067904" version="1" comment="samba-krb-printing is &lt;3.4.3-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067907" version="1" comment="samba-winbind is &lt;3.4.3-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067905" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069441" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr9.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069438" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr9.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069439" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr9.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116810" version="1" comment="java-1_4_2-ibm-sap is &lt;1.4.2_sr13.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116811" version="1" comment="java-1_4_2-ibm-sap-devel is &lt;1.4.2_sr13.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067765" version="1" comment="dhcpcd is &lt;3.2.3-44.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067002" version="1" comment="dhcp is &lt;3.1.3.ESV-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066999" version="1" comment="dhcp-client is &lt;3.1.3.ESV-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067000" version="1" comment="dhcp-relay is &lt;3.1.3.ESV-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067001" version="1" comment="dhcp-server is &lt;3.1.3.ESV-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066415" version="1" comment="clamav is &lt;0.97-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069491" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.43_0.4-0.3.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069493" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.43_0.4-7.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069515" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.43_0.4-7.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069498" version="1" comment="kernel-default is &lt;2.6.32.43-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069496" version="1" comment="kernel-default-base is &lt;2.6.32.43-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069497" version="1" comment="kernel-default-devel is &lt;2.6.32.43-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069518" version="1" comment="kernel-ppc64 is &lt;2.6.32.43-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069516" version="1" comment="kernel-ppc64-base is &lt;2.6.32.43-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069517" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.43-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069501" version="1" comment="kernel-source is &lt;2.6.32.43-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069502" version="1" comment="kernel-syms is &lt;2.6.32.43-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069505" version="1" comment="kernel-trace is &lt;2.6.32.43-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069503" version="1" comment="kernel-trace-base is &lt;2.6.32.43-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069504" version="1" comment="kernel-trace-devel is &lt;2.6.32.43-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073560" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111790" version="1" comment="php5 is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073561" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073562" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073563" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073564" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073565" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073566" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073567" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073568" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073569" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073570" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073571" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073572" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073573" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073574" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073575" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073576" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073577" version="1" comment="php5-json is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073578" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073579" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073580" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073581" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073582" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073583" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073584" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073585" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073586" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073587" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073588" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073589" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073590" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073591" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073592" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073593" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073594" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073595" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073596" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073597" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073598" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073599" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073600" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073601" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073602" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073603" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073836" version="1" comment="kernel-default is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073833" version="1" comment="kernel-default-base is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073834" version="1" comment="kernel-default-devel is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073854" version="1" comment="kernel-default-extra is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073837" version="1" comment="kernel-source is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073838" version="1" comment="kernel-syms is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073841" version="1" comment="kernel-trace is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073839" version="1" comment="kernel-trace-base is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073840" version="1" comment="kernel-trace-devel is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073855" version="1" comment="kernel-trace-extra is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073850" version="1" comment="kernel-xen is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073848" version="1" comment="kernel-xen-base is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073849" version="1" comment="kernel-xen-devel is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073856" version="1" comment="kernel-xen-extra is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116812" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.26_0.7-2.10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116813" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.26_0.7-2.10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116814" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.26_0.7-2.10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116815" version="1" comment="gfs2-kmp-default is &lt;2_3.0.26_0.7-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116816" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.26_0.7-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116817" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.26_0.7-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116818" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.26_0.7-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116819" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.26_0.7-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116820" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.26_0.7-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074206" version="1" comment="kernel-default is &lt;2.6.32.59-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074204" version="1" comment="kernel-default-base is &lt;2.6.32.59-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074205" version="1" comment="kernel-default-devel is &lt;2.6.32.59-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074222" version="1" comment="kernel-ppc64 is &lt;2.6.32.59-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074220" version="1" comment="kernel-ppc64-base is &lt;2.6.32.59-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074221" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.59-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074210" version="1" comment="kernel-source is &lt;2.6.32.59-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074211" version="1" comment="kernel-syms is &lt;2.6.32.59-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074214" version="1" comment="kernel-trace is &lt;2.6.32.59-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074212" version="1" comment="kernel-trace-base is &lt;2.6.32.59-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074213" version="1" comment="kernel-trace-devel is &lt;2.6.32.59-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103770" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.59_0.9-0.3.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103771" version="1" comment="btrfs-kmp-xen is &lt;0_2.6.32.59_0.9-0.3.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103772" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.59_0.9-7.9.118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103773" version="1" comment="ext4dev-kmp-trace is &lt;0_2.6.32.59_0.9-7.9.118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103774" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.32.59_0.9-7.9.118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103775" version="1" comment="hyper-v-kmp-default is &lt;0_2.6.32.59_0.9-0.18.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103776" version="1" comment="hyper-v-kmp-trace is &lt;0_2.6.32.59_0.9-0.18.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103779" version="1" comment="kernel-default is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103777" version="1" comment="kernel-default-base is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103778" version="1" comment="kernel-default-devel is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103782" version="1" comment="kernel-ec2 is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103780" version="1" comment="kernel-ec2-base is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103781" version="1" comment="kernel-ec2-devel is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103783" version="1" comment="kernel-source is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103784" version="1" comment="kernel-syms is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103787" version="1" comment="kernel-trace is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103785" version="1" comment="kernel-trace-base is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103786" version="1" comment="kernel-trace-devel is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103790" version="1" comment="kernel-xen is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103788" version="1" comment="kernel-xen-base is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103789" version="1" comment="kernel-xen-devel is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066766" version="1" comment="kdelibs4 is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066764" version="1" comment="kdelibs4-core is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066765" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066769" version="1" comment="libkde4 is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066767" version="1" comment="libkde4-32bit is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066772" version="1" comment="libkdecore4 is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066770" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075560" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075604" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111992" version="1" comment="php5 is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075561" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075562" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075563" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075564" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075565" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075566" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075567" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075568" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075569" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075570" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075571" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075572" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075573" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075574" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075575" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075576" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075577" version="1" comment="php5-json is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075578" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075579" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075580" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075581" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075582" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075583" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075584" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075585" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075586" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075587" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075588" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075589" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075590" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075591" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075592" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075593" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075594" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075595" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075596" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075597" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075598" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075599" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075600" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075601" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075602" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075603" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112792" version="1" comment="php53 is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075605" version="1" comment="php53-bcmath is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075606" version="1" comment="php53-bz2 is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075607" version="1" comment="php53-calendar is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075608" version="1" comment="php53-ctype is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075609" version="1" comment="php53-curl is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075610" version="1" comment="php53-dba is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075611" version="1" comment="php53-dom is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075612" version="1" comment="php53-exif is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075613" version="1" comment="php53-fastcgi is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075614" version="1" comment="php53-fileinfo is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075615" version="1" comment="php53-ftp is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075616" version="1" comment="php53-gd is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075617" version="1" comment="php53-gettext is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075618" version="1" comment="php53-gmp is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075619" version="1" comment="php53-iconv is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075620" version="1" comment="php53-intl is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075621" version="1" comment="php53-json is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075622" version="1" comment="php53-ldap is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075623" version="1" comment="php53-mbstring is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075624" version="1" comment="php53-mcrypt is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075625" version="1" comment="php53-mysql is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075626" version="1" comment="php53-odbc is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075627" version="1" comment="php53-openssl is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075628" version="1" comment="php53-pcntl is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075629" version="1" comment="php53-pdo is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075630" version="1" comment="php53-pear is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075631" version="1" comment="php53-pgsql is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075632" version="1" comment="php53-pspell is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075633" version="1" comment="php53-shmop is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075634" version="1" comment="php53-snmp is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075635" version="1" comment="php53-soap is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075636" version="1" comment="php53-suhosin is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075637" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075638" version="1" comment="php53-sysvsem is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075639" version="1" comment="php53-sysvshm is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075640" version="1" comment="php53-tokenizer is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075641" version="1" comment="php53-wddx is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075642" version="1" comment="php53-xmlreader is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075643" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075644" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075645" version="1" comment="php53-xsl is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075646" version="1" comment="php53-zip is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075647" version="1" comment="php53-zlib is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075652" version="1" comment="php5-devel is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075653" version="1" comment="php5-imap is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075654" version="1" comment="php5-ncurses is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075655" version="1" comment="php5-posix is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075656" version="1" comment="php5-readline is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075657" version="1" comment="php5-sockets is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075658" version="1" comment="php5-sqlite is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075659" version="1" comment="php5-tidy is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075660" version="1" comment="php53-devel is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075661" version="1" comment="php53-imap is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075662" version="1" comment="php53-posix is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075663" version="1" comment="php53-readline is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075664" version="1" comment="php53-sockets is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075665" version="1" comment="php53-sqlite is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075666" version="1" comment="php53-tidy is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068573" version="1" comment="pure-ftpd is &lt;1.0.22-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072193" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.49_0.3-0.3.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072195" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.49_0.3-7.9.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072196" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.49_0.3-7.9.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072197" version="1" comment="ext4dev-kmp-trace is &lt;0_2.6.32.49_0.3-7.9.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072200" version="1" comment="kernel-default is &lt;2.6.32.49-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072198" version="1" comment="kernel-default-base is &lt;2.6.32.49-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072199" version="1" comment="kernel-default-devel is &lt;2.6.32.49-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072203" version="1" comment="kernel-ppc64 is &lt;2.6.32.49-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072201" version="1" comment="kernel-ppc64-base is &lt;2.6.32.49-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072202" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.49-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072204" version="1" comment="kernel-source is &lt;2.6.32.49-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072205" version="1" comment="kernel-syms is &lt;2.6.32.49-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072208" version="1" comment="kernel-trace is &lt;2.6.32.49-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072206" version="1" comment="kernel-trace-base is &lt;2.6.32.49-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072207" version="1" comment="kernel-trace-devel is &lt;2.6.32.49-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068718" version="1" comment="wireshark is &lt;1.4.4-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068544" version="1" comment="kvm is &lt;0.12.5-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069442" version="1" comment="cyrus-imapd is &lt;2.3.11-60.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069443" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069444" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069537" version="1" comment="libxml2 is &lt;2.7.6-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069534" version="1" comment="libxml2-32bit is &lt;2.7.6-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069535" version="1" comment="libxml2-doc is &lt;2.7.6-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068761" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068759" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068763" version="1" comment="openssl is &lt;0.9.8h-30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068762" version="1" comment="openssl-doc is &lt;0.9.8h-30.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070963" version="1" comment="wireshark is &lt;1.4.4-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069445" version="1" comment="kvm is &lt;0.12.5-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107297" version="1" comment="MozillaFirefox is &lt;3.6.24-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107296" version="1" comment="MozillaFirefox-translations is &lt;3.6.24-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069346" version="1" comment="bind is &lt;9.6ESVR4P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069340" version="1" comment="bind-chrootenv is &lt;9.6ESVR4P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069341" version="1" comment="bind-doc is &lt;9.6ESVR4P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069344" version="1" comment="bind-libs is &lt;9.6ESVR4P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069342" version="1" comment="bind-libs-32bit is &lt;9.6ESVR4P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069345" version="1" comment="bind-utils is &lt;9.6ESVR4P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073847" version="1" comment="kernel-ec2 is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073845" version="1" comment="kernel-ec2-base is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073846" version="1" comment="kernel-ec2-devel is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070293" version="1" comment="cifs-mount is &lt;3.4.3-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070294" version="1" comment="ldapsmb is &lt;1.34b-11.27.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070297" version="1" comment="libsmbclient0 is &lt;3.4.3-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070295" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070300" version="1" comment="libtalloc1 is &lt;3.4.3-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070298" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070303" version="1" comment="libtdb1 is &lt;3.4.3-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070301" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070306" version="1" comment="libwbclient0 is &lt;3.4.3-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070304" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070316" version="1" comment="samba is &lt;3.4.3-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070307" version="1" comment="samba-32bit is &lt;3.4.3-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070310" version="1" comment="samba-client is &lt;3.4.3-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070308" version="1" comment="samba-client-32bit is &lt;3.4.3-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070311" version="1" comment="samba-krb-printing is &lt;3.4.3-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070314" version="1" comment="samba-winbind is &lt;3.4.3-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070312" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070027" version="1" comment="clamav is &lt;0.97.2-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070453" version="1" comment="dhcp is &lt;3.1.3.ESV-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070450" version="1" comment="dhcp-client is &lt;3.1.3.ESV-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070451" version="1" comment="dhcp-relay is &lt;3.1.3.ESV-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070452" version="1" comment="dhcp-server is &lt;3.1.3.ESV-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072467" version="1" comment="libxml2 is &lt;2.7.6-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072464" version="1" comment="libxml2-32bit is &lt;2.7.6-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072465" version="1" comment="libxml2-doc is &lt;2.7.6-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070842" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.46_0.3-0.3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070843" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.46_0.3-7.9.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070867" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.46_0.3-7.9.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070846" version="1" comment="kernel-default is &lt;2.6.32.46-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070844" version="1" comment="kernel-default-base is &lt;2.6.32.46-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070845" version="1" comment="kernel-default-devel is &lt;2.6.32.46-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070870" version="1" comment="kernel-ppc64 is &lt;2.6.32.46-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070868" version="1" comment="kernel-ppc64-base is &lt;2.6.32.46-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070869" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.46-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070847" version="1" comment="kernel-source is &lt;2.6.32.46-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070848" version="1" comment="kernel-syms is &lt;2.6.32.46-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070851" version="1" comment="kernel-trace is &lt;2.6.32.46-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070849" version="1" comment="kernel-trace-base is &lt;2.6.32.46-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070850" version="1" comment="kernel-trace-devel is &lt;2.6.32.46-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070699" version="1" comment="MozillaFirefox is &lt;3.6.23-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070698" version="1" comment="MozillaFirefox-translations is &lt;3.6.23-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070615" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.23-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070606" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.23-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070610" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.23-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070700" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.23-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074564" version="1" comment="libpng12-0 is &lt;1.2.31-5.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074562" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074774" version="1" comment="libxml2 is &lt;2.7.6-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074771" version="1" comment="libxml2-32bit is &lt;2.7.6-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074772" version="1" comment="libxml2-doc is &lt;2.7.6-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071701" version="1" comment="apache2 is &lt;2.2.12-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071696" version="1" comment="apache2-doc is &lt;2.2.12-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071697" version="1" comment="apache2-example-pages is &lt;2.2.12-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071698" version="1" comment="apache2-prefork is &lt;2.2.12-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071699" version="1" comment="apache2-utils is &lt;2.2.12-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071700" version="1" comment="apache2-worker is &lt;2.2.12-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070454" version="1" comment="squid3 is &lt;3.1.12-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070532" version="1" comment="cyrus-imapd is &lt;2.3.11-60.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070533" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070534" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070968" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070966" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070970" version="1" comment="openssl is &lt;0.9.8h-30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070969" version="1" comment="openssl-doc is &lt;0.9.8h-30.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070973" version="1" comment="popt is &lt;1.7-37.29.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070971" version="1" comment="popt-32bit is &lt;1.7-37.29.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070976" version="1" comment="rpm is &lt;4.4.2.3-37.29.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070974" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.29.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073019" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.11-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116821" version="1" comment="java-1_4_2-ibm-sap is &lt;1.4.2_sr13.11-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116822" version="1" comment="java-1_4_2-ibm-sap-devel is &lt;1.4.2_sr13.11-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156744" version="1" comment="java-1_4_2-ibm-sap is &lt;1.4.2_sr13.12-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156745" version="1" comment="java-1_4_2-ibm-sap-devel is &lt;1.4.2_sr13.12-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072852" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.26-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072848" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.26-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072849" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.26-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072850" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.26-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072024" version="1" comment="puppet is &lt;2.6.12-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072023" version="1" comment="puppet-server is &lt;2.6.12-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073434" version="1" comment="libxslt is &lt;1.1.24-19.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073432" version="1" comment="libxslt-32bit is &lt;1.1.24-19.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073675" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112788" version="1" comment="php53 is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073676" version="1" comment="php53-bcmath is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073677" version="1" comment="php53-bz2 is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073678" version="1" comment="php53-calendar is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073679" version="1" comment="php53-ctype is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073680" version="1" comment="php53-curl is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073681" version="1" comment="php53-dba is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073682" version="1" comment="php53-dom is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073683" version="1" comment="php53-exif is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073684" version="1" comment="php53-fastcgi is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073685" version="1" comment="php53-fileinfo is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073686" version="1" comment="php53-ftp is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073687" version="1" comment="php53-gd is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073688" version="1" comment="php53-gettext is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073689" version="1" comment="php53-gmp is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073690" version="1" comment="php53-iconv is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073691" version="1" comment="php53-intl is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073692" version="1" comment="php53-json is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073693" version="1" comment="php53-ldap is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073694" version="1" comment="php53-mbstring is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073695" version="1" comment="php53-mcrypt is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073696" version="1" comment="php53-mysql is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073697" version="1" comment="php53-odbc is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073698" version="1" comment="php53-openssl is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073699" version="1" comment="php53-pcntl is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073700" version="1" comment="php53-pdo is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073701" version="1" comment="php53-pear is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073702" version="1" comment="php53-pgsql is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073703" version="1" comment="php53-pspell is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073704" version="1" comment="php53-shmop is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073705" version="1" comment="php53-snmp is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073706" version="1" comment="php53-soap is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073707" version="1" comment="php53-suhosin is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073708" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073709" version="1" comment="php53-sysvsem is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073710" version="1" comment="php53-sysvshm is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073711" version="1" comment="php53-tokenizer is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073712" version="1" comment="php53-wddx is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073713" version="1" comment="php53-xmlreader is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073714" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073715" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073716" version="1" comment="php53-xsl is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073717" version="1" comment="php53-zip is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073718" version="1" comment="php53-zlib is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116823" version="1" comment="php53-devel is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116824" version="1" comment="php53-imap is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116825" version="1" comment="php53-posix is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116826" version="1" comment="php53-readline is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116827" version="1" comment="php53-sockets is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116828" version="1" comment="php53-sqlite is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116829" version="1" comment="php53-tidy is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071975" version="1" comment="bind is &lt;9.6ESVR5P1-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071969" version="1" comment="bind-chrootenv is &lt;9.6ESVR5P1-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071970" version="1" comment="bind-doc is &lt;9.6ESVR5P1-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071973" version="1" comment="bind-libs is &lt;9.6ESVR5P1-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071971" version="1" comment="bind-libs-32bit is &lt;9.6ESVR5P1-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071974" version="1" comment="bind-utils is &lt;9.6ESVR5P1-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116830" version="1" comment="lighttpd is &lt;1.4.20-2.46.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111841" version="1" comment="koan is &lt;2.0.10-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076741" version="1" comment="apache2 is &lt;2.2.12-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076736" version="1" comment="apache2-doc is &lt;2.2.12-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076737" version="1" comment="apache2-example-pages is &lt;2.2.12-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076738" version="1" comment="apache2-prefork is &lt;2.2.12-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076739" version="1" comment="apache2-utils is &lt;2.2.12-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076740" version="1" comment="apache2-worker is &lt;2.2.12-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076742" version="1" comment="apache2-devel is &lt;2.2.12-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073020" version="1" comment="wireshark is &lt;1.4.11-0.2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073355" version="1" comment="MozillaFirefox is &lt;10.0.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073354" version="1" comment="MozillaFirefox-translations is &lt;10.0.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073358" version="1" comment="libfreebl3 is &lt;3.13.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073356" version="1" comment="libfreebl3-32bit is &lt;3.13.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073361" version="1" comment="mozilla-nspr is &lt;4.9.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073359" version="1" comment="mozilla-nspr-32bit is &lt;4.9.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073365" version="1" comment="mozilla-nss is &lt;3.13.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073362" version="1" comment="mozilla-nss-32bit is &lt;3.13.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073363" version="1" comment="mozilla-nss-tools is &lt;3.13.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072969" version="1" comment="MozillaFirefox is &lt;10.0.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072968" version="1" comment="MozillaFirefox-translations is &lt;10.0.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075536" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b24.1.11.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075534" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b24.1.11.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075535" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b24.1.11.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075780" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr2.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075778" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr2.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075779" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr2.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075781" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr2.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075797" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr11.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075794" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr11.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075795" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr11.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075796" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr11.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075798" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr11.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073746" version="1" comment="libldb1 is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073798" version="1" comment="libldb1-32bit is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073749" version="1" comment="libsmbclient0 is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073747" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073752" version="1" comment="libtalloc2 is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073750" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073755" version="1" comment="libtdb1 is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073753" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073756" version="1" comment="libtevent0 is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073799" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073759" version="1" comment="libwbclient0 is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073757" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073770" version="1" comment="samba is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073760" version="1" comment="samba-32bit is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073763" version="1" comment="samba-client is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073761" version="1" comment="samba-client-32bit is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073764" version="1" comment="samba-doc is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073765" version="1" comment="samba-krb-printing is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073768" version="1" comment="samba-winbind is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073766" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073745" version="1" comment="ldapsmb is &lt;1.34b-12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073787" version="1" comment="libldb-devel is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073788" version="1" comment="libnetapi-devel is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073789" version="1" comment="libnetapi0 is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073790" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073791" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073792" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073793" version="1" comment="libtalloc-devel is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073794" version="1" comment="libtdb-devel is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073795" version="1" comment="libtevent-devel is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073796" version="1" comment="libwbclient-devel is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073797" version="1" comment="samba-devel is &lt;3.6.3-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074248" version="1" comment="libxml2 is &lt;2.7.6-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074245" version="1" comment="libxml2-32bit is &lt;2.7.6-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074246" version="1" comment="libxml2-doc is &lt;2.7.6-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074392" version="1" comment="postgresql is &lt;8.3.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074386" version="1" comment="postgresql-contrib is &lt;8.3.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074387" version="1" comment="postgresql-docs is &lt;8.3.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074391" version="1" comment="postgresql-server is &lt;8.3.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076493" version="1" comment="kernel-default is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076490" version="1" comment="kernel-default-base is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076491" version="1" comment="kernel-default-devel is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076492" version="1" comment="kernel-default-extra is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076494" version="1" comment="kernel-source is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076495" version="1" comment="kernel-syms is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076499" version="1" comment="kernel-trace is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076496" version="1" comment="kernel-trace-base is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076497" version="1" comment="kernel-trace-devel is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076498" version="1" comment="kernel-trace-extra is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076503" version="1" comment="kernel-xen is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076500" version="1" comment="kernel-xen-base is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076501" version="1" comment="kernel-xen-devel is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076502" version="1" comment="kernel-xen-extra is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076504" version="1" comment="xen-kmp-default is &lt;4.1.3_06_3.0.58_0.6.2-0.7.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076505" version="1" comment="xen-kmp-trace is &lt;4.1.3_06_3.0.58_0.6.2-0.7.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116831" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.58_0.6.2-2.18.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116832" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.58_0.6.2-2.18.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116833" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.58_0.6.2-2.18.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116834" version="1" comment="gfs2-kmp-default is &lt;2_3.0.58_0.6.2-0.7.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116835" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.58_0.6.2-0.7.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116836" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.58_0.6.2-0.7.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116837" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.58_0.6.2-0.11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116838" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.58_0.6.2-0.11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116839" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.58_0.6.2-0.11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076513" version="1" comment="kernel-ec2 is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076511" version="1" comment="kernel-ec2-base is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076512" version="1" comment="kernel-ec2-devel is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073990" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111791" version="1" comment="php5 is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073991" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073992" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073993" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073994" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073995" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073996" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073997" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073998" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073999" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074000" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074001" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074002" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074003" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074004" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074005" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074006" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074007" version="1" comment="php5-json is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074008" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074009" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074010" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074011" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074012" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074013" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074014" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074015" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074016" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074017" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074018" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074019" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074020" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074021" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074022" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074023" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074024" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074025" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074026" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074027" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074028" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074029" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074030" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074031" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074032" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074033" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074122" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112789" version="1" comment="php53 is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074123" version="1" comment="php53-bcmath is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074124" version="1" comment="php53-bz2 is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074125" version="1" comment="php53-calendar is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074126" version="1" comment="php53-ctype is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074127" version="1" comment="php53-curl is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074128" version="1" comment="php53-dba is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074129" version="1" comment="php53-dom is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074130" version="1" comment="php53-exif is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074131" version="1" comment="php53-fastcgi is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074132" version="1" comment="php53-fileinfo is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074133" version="1" comment="php53-ftp is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074134" version="1" comment="php53-gd is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074135" version="1" comment="php53-gettext is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074136" version="1" comment="php53-gmp is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074137" version="1" comment="php53-iconv is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074138" version="1" comment="php53-intl is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074139" version="1" comment="php53-json is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074140" version="1" comment="php53-ldap is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074141" version="1" comment="php53-mbstring is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074142" version="1" comment="php53-mcrypt is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074143" version="1" comment="php53-mysql is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074144" version="1" comment="php53-odbc is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074145" version="1" comment="php53-openssl is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074146" version="1" comment="php53-pcntl is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074147" version="1" comment="php53-pdo is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074148" version="1" comment="php53-pear is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074149" version="1" comment="php53-pgsql is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074150" version="1" comment="php53-pspell is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074151" version="1" comment="php53-shmop is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074152" version="1" comment="php53-snmp is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074153" version="1" comment="php53-soap is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074154" version="1" comment="php53-suhosin is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074155" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074156" version="1" comment="php53-sysvsem is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074157" version="1" comment="php53-sysvshm is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074158" version="1" comment="php53-tokenizer is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074159" version="1" comment="php53-wddx is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074160" version="1" comment="php53-xmlreader is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074161" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074162" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074163" version="1" comment="php53-xsl is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074164" version="1" comment="php53-zip is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074165" version="1" comment="php53-zlib is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074190" version="1" comment="php53-devel is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074191" version="1" comment="php53-imap is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074192" version="1" comment="php53-posix is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074193" version="1" comment="php53-readline is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074194" version="1" comment="php53-sockets is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074195" version="1" comment="php53-sqlite is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074196" version="1" comment="php53-tidy is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073802" version="1" comment="libtiff3 is &lt;3.8.2-141.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073800" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073803" version="1" comment="tiff is &lt;3.8.2-141.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073612" version="1" comment="cifs-mount is &lt;3.4.3-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073613" version="1" comment="ldapsmb is &lt;1.34b-11.28.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073616" version="1" comment="libsmbclient0 is &lt;3.4.3-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073614" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073619" version="1" comment="libtalloc1 is &lt;3.4.3-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073617" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073622" version="1" comment="libtdb1 is &lt;3.4.3-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073620" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073625" version="1" comment="libwbclient0 is &lt;3.4.3-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073623" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073636" version="1" comment="samba is &lt;3.4.3-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073626" version="1" comment="samba-32bit is &lt;3.4.3-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073629" version="1" comment="samba-client is &lt;3.4.3-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073627" version="1" comment="samba-client-32bit is &lt;3.4.3-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073630" version="1" comment="samba-doc is &lt;3.4.3-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073631" version="1" comment="samba-krb-printing is &lt;3.4.3-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073634" version="1" comment="samba-winbind is &lt;3.4.3-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073632" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076317" version="1" comment="acroread is &lt;9.5.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076312" version="1" comment="acroread-cmaps is &lt;9.4.6-0.4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076313" version="1" comment="acroread-fonts-ja is &lt;9.4.6-0.4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076314" version="1" comment="acroread-fonts-ko is &lt;9.4.6-0.4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076315" version="1" comment="acroread-fonts-zh_CN is &lt;9.4.6-0.4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076316" version="1" comment="acroread-fonts-zh_TW is &lt;9.4.6-0.4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075862" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b24.1.11.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075860" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b24.1.11.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075861" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b24.1.11.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076077" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076148" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr12.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076145" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr12.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076146" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr12.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076147" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr12.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076086" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr3.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076084" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr3.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076085" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr3.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076078" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076150" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr12.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076087" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr3.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076886" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr13.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098489" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076883" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr13.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076884" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr13.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076885" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr13.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076785" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr4.0-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076783" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr4.0-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076784" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr4.0-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076887" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr13.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076790" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr4.0-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073927" version="1" comment="wireshark is &lt;1.4.12-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076249" version="1" comment="kernel-default is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076246" version="1" comment="kernel-default-base is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076247" version="1" comment="kernel-default-devel is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076248" version="1" comment="kernel-default-extra is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076254" version="1" comment="kernel-source is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076255" version="1" comment="kernel-syms is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076259" version="1" comment="kernel-trace is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076256" version="1" comment="kernel-trace-base is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076257" version="1" comment="kernel-trace-devel is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076258" version="1" comment="kernel-trace-extra is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076263" version="1" comment="kernel-xen is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076260" version="1" comment="kernel-xen-base is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076261" version="1" comment="kernel-xen-devel is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076262" version="1" comment="kernel-xen-extra is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116840" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.51_0.7.9-2.18.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116841" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.51_0.7.9-2.18.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116842" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.51_0.7.9-2.18.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116843" version="1" comment="gfs2-kmp-default is &lt;2_3.0.51_0.7.9-0.7.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116844" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.51_0.7.9-0.7.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116845" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.51_0.7.9-0.7.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116846" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.51_0.7.9-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116847" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.51_0.7.9-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116848" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.51_0.7.9-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076269" version="1" comment="kernel-ec2 is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076267" version="1" comment="kernel-ec2-base is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076268" version="1" comment="kernel-ec2-devel is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074604" version="1" comment="bind-libs is &lt;9.6ESVR7P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074602" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074605" version="1" comment="bind-utils is &lt;9.6ESVR7P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074599" version="1" comment="bind is &lt;9.6ESVR7P1-0.2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074593" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P1-0.2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074594" version="1" comment="bind-doc is &lt;9.6ESVR7P1-0.2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074597" version="1" comment="bind-libs is &lt;9.6ESVR7P1-0.2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074595" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P1-0.2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074598" version="1" comment="bind-utils is &lt;9.6ESVR7P1-0.2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074606" version="1" comment="bind is &lt;9.6ESVR7P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074600" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074601" version="1" comment="bind-doc is &lt;9.6ESVR7P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074630" version="1" comment="bind-devel is &lt;9.6ESVR7P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075674" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075675" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074687" version="1" comment="puppet is &lt;2.6.12-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074686" version="1" comment="puppet-server is &lt;2.6.12-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074992" version="1" comment="libtiff3 is &lt;3.8.2-141.146.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074991" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.146.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074998" version="1" comment="tiff is &lt;3.8.2-141.146.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074251" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074249" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074253" version="1" comment="openssl is &lt;0.9.8j-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074252" version="1" comment="openssl-doc is &lt;0.9.8j-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074755" version="1" comment="kernel-default is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074753" version="1" comment="kernel-default-base is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074754" version="1" comment="kernel-default-devel is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113132" version="1" comment="kernel-default-extra is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074759" version="1" comment="kernel-source is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074760" version="1" comment="kernel-syms is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074763" version="1" comment="kernel-trace is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074761" version="1" comment="kernel-trace-base is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074762" version="1" comment="kernel-trace-devel is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113134" version="1" comment="kernel-trace-extra is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112831" version="1" comment="kernel-xen is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112832" version="1" comment="kernel-xen-base is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112833" version="1" comment="kernel-xen-devel is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113135" version="1" comment="kernel-xen-extra is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116849" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.34_0.7-2.10.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116850" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.34_0.7-2.10.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116851" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.34_0.7-2.10.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116852" version="1" comment="gfs2-kmp-default is &lt;2_3.0.34_0.7-0.7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116853" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.34_0.7-0.7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116854" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.34_0.7-0.7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116855" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.34_0.7-0.7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116856" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.34_0.7-0.7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116857" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.34_0.7-0.7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112828" version="1" comment="kernel-ec2 is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112829" version="1" comment="kernel-ec2-base is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112830" version="1" comment="kernel-ec2-devel is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075018" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.59_0.7-0.3.107" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075048" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.59_0.7-7.9.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075049" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.59_0.7-7.9.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074334" version="1" comment="kernel-default is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074332" version="1" comment="kernel-default-base is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074333" version="1" comment="kernel-default-devel is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074380" version="1" comment="kernel-default-extra is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074341" version="1" comment="kernel-source is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074342" version="1" comment="kernel-syms is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074345" version="1" comment="kernel-trace is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074343" version="1" comment="kernel-trace-base is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074344" version="1" comment="kernel-trace-devel is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074382" version="1" comment="kernel-trace-extra is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074348" version="1" comment="kernel-xen is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074346" version="1" comment="kernel-xen-base is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074347" version="1" comment="kernel-xen-devel is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074383" version="1" comment="kernel-xen-extra is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116858" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.31_0.9-2.10.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116859" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.31_0.9-2.10.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116860" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.31_0.9-2.10.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116861" version="1" comment="gfs2-kmp-default is &lt;2_3.0.31_0.9-0.7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116862" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.31_0.9-0.7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116863" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.31_0.9-0.7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116864" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.31_0.9-0.7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116865" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.31_0.9-0.7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116866" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.31_0.9-0.7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074337" version="1" comment="kernel-ec2 is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074335" version="1" comment="kernel-ec2-base is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074336" version="1" comment="kernel-ec2-devel is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077162" version="1" comment="kernel-default is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077159" version="1" comment="kernel-default-base is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077160" version="1" comment="kernel-default-devel is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077161" version="1" comment="kernel-default-extra is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077163" version="1" comment="kernel-source is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077164" version="1" comment="kernel-syms is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077168" version="1" comment="kernel-trace is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077165" version="1" comment="kernel-trace-base is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077166" version="1" comment="kernel-trace-devel is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077167" version="1" comment="kernel-trace-extra is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077172" version="1" comment="kernel-xen is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077169" version="1" comment="kernel-xen-base is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077170" version="1" comment="kernel-xen-devel is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077171" version="1" comment="kernel-xen-extra is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077173" version="1" comment="xen-kmp-default is &lt;4.1.4_02_3.0.74_0.6.6-0.5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077174" version="1" comment="xen-kmp-trace is &lt;4.1.4_02_3.0.74_0.6.6-0.5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116867" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.74_0.6.6-2.18.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116868" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.74_0.6.6-2.18.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116869" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.74_0.6.6-2.18.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116870" version="1" comment="gfs2-kmp-default is &lt;2_3.0.74_0.6.6-0.7.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116871" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.74_0.6.6-0.7.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116872" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.74_0.6.6-0.7.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116873" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.74_0.6.6-0.11.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116874" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.74_0.6.6-0.11.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116875" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.74_0.6.6-0.11.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077187" version="1" comment="kernel-ec2 is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077185" version="1" comment="kernel-ec2-base is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077186" version="1" comment="kernel-ec2-devel is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074813" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112790" version="1" comment="php53 is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074814" version="1" comment="php53-bcmath is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074815" version="1" comment="php53-bz2 is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074816" version="1" comment="php53-calendar is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074817" version="1" comment="php53-ctype is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074818" version="1" comment="php53-curl is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074819" version="1" comment="php53-dba is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074820" version="1" comment="php53-dom is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074821" version="1" comment="php53-exif is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074822" version="1" comment="php53-fastcgi is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074823" version="1" comment="php53-fileinfo is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074824" version="1" comment="php53-ftp is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074825" version="1" comment="php53-gd is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074826" version="1" comment="php53-gettext is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074827" version="1" comment="php53-gmp is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074828" version="1" comment="php53-iconv is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074829" version="1" comment="php53-intl is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074830" version="1" comment="php53-json is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074831" version="1" comment="php53-ldap is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074832" version="1" comment="php53-mbstring is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074833" version="1" comment="php53-mcrypt is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074834" version="1" comment="php53-mysql is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074835" version="1" comment="php53-odbc is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074836" version="1" comment="php53-openssl is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074837" version="1" comment="php53-pcntl is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074838" version="1" comment="php53-pdo is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074839" version="1" comment="php53-pear is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074840" version="1" comment="php53-pgsql is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074841" version="1" comment="php53-pspell is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074842" version="1" comment="php53-shmop is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074843" version="1" comment="php53-snmp is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074844" version="1" comment="php53-soap is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074845" version="1" comment="php53-suhosin is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074846" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074847" version="1" comment="php53-sysvsem is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074848" version="1" comment="php53-sysvshm is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074849" version="1" comment="php53-tokenizer is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074850" version="1" comment="php53-wddx is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074851" version="1" comment="php53-xmlreader is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074852" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074853" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074854" version="1" comment="php53-xsl is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074855" version="1" comment="php53-zip is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074856" version="1" comment="php53-zlib is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074857" version="1" comment="php53-devel is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074858" version="1" comment="php53-imap is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074859" version="1" comment="php53-posix is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074860" version="1" comment="php53-readline is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074861" version="1" comment="php53-sockets is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074862" version="1" comment="php53-sqlite is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074863" version="1" comment="php53-tidy is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074317" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074315" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074319" version="1" comment="openssl is &lt;0.9.8j-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074318" version="1" comment="openssl-doc is &lt;0.9.8j-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074408" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111792" version="1" comment="php5 is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074409" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074410" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074411" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074412" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074413" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074414" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074415" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074416" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074417" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074418" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074419" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074420" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074421" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074422" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074423" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074424" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074425" version="1" comment="php5-json is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074426" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074427" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074428" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074429" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074430" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074431" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074432" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074433" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074434" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074435" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074436" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074437" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074438" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074439" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074440" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074441" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074442" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074443" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074444" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074445" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074446" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074447" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074448" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074449" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074450" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074451" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098339" version="1" comment="kernel-default is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098337" version="1" comment="kernel-default-base is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098338" version="1" comment="kernel-default-devel is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098778" version="1" comment="kernel-default-extra is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098346" version="1" comment="kernel-source is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098347" version="1" comment="kernel-syms is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098349" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098353" version="1" comment="kernel-xen is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098351" version="1" comment="kernel-xen-base is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098352" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098780" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098354" version="1" comment="xen-kmp-default is &lt;4.2.4_02_3.0.101_0.35-0.7.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116876" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.35-2.27.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132745" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.35-2.27.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116877" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.35-2.27.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116879" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.35-0.16.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132746" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.35-0.16.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116880" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.35-0.16.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116882" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.35-0.20.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132747" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.35-0.20.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116883" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.35-0.20.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116885" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.61_rt85_0.7-2.18.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116886" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.61_rt85_0.7-2.18.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116887" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.61_rt85_0.7-0.6.6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116888" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.61_rt85_0.7-0.6.6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116889" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.61_rt85_0.7-0.23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116890" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.61_rt85_0.7-0.23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116891" version="1" comment="kernel-rt is &lt;3.0.61.rt85-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116892" version="1" comment="kernel-rt-base is &lt;3.0.61.rt85-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116893" version="1" comment="kernel-rt-devel is &lt;3.0.61.rt85-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116894" version="1" comment="kernel-rt_trace is &lt;3.0.61.rt85-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116895" version="1" comment="kernel-rt_trace-base is &lt;3.0.61.rt85-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116896" version="1" comment="kernel-rt_trace-devel is &lt;3.0.61.rt85-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116897" version="1" comment="kernel-source-rt is &lt;3.0.61.rt85-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116898" version="1" comment="kernel-syms-rt is &lt;3.0.61.rt85-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116899" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.61_rt85_0.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116900" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.61_rt85_0.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116901" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.61_rt85_0.7-0.11.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116902" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.61_rt85_0.7-0.11.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116903" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.61_rt85_0.7-0.26.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116904" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.61_rt85_0.7-0.26.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116905" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.24-2.27.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116906" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.24-2.27.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116907" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.24-0.22.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116908" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.24-0.22.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116909" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.24-0.38.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116910" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.24-0.38.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116911" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116912" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116913" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116914" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116915" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116916" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116917" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116918" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116919" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.24-0.11.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116920" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.24-0.11.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116921" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.24-0.20.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116922" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.24-0.20.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116923" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.24-0.13.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116924" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.24-0.13.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098342" version="1" comment="kernel-ec2 is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098340" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098341" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098350" version="1" comment="kernel-trace is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098348" version="1" comment="kernel-trace-base is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075255" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.14-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075321" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112791" version="1" comment="php53 is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075322" version="1" comment="php53-bcmath is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075323" version="1" comment="php53-bz2 is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075324" version="1" comment="php53-calendar is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075325" version="1" comment="php53-ctype is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075326" version="1" comment="php53-curl is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075327" version="1" comment="php53-dba is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075328" version="1" comment="php53-dom is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075329" version="1" comment="php53-exif is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075330" version="1" comment="php53-fastcgi is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075331" version="1" comment="php53-fileinfo is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075332" version="1" comment="php53-ftp is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075333" version="1" comment="php53-gd is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075334" version="1" comment="php53-gettext is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075335" version="1" comment="php53-gmp is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075336" version="1" comment="php53-iconv is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075337" version="1" comment="php53-intl is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075338" version="1" comment="php53-json is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075339" version="1" comment="php53-ldap is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075340" version="1" comment="php53-mbstring is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075341" version="1" comment="php53-mcrypt is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075342" version="1" comment="php53-mysql is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075343" version="1" comment="php53-odbc is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075344" version="1" comment="php53-openssl is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075345" version="1" comment="php53-pcntl is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075346" version="1" comment="php53-pdo is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075347" version="1" comment="php53-pear is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075348" version="1" comment="php53-pgsql is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075349" version="1" comment="php53-pspell is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075350" version="1" comment="php53-shmop is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075351" version="1" comment="php53-snmp is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075352" version="1" comment="php53-soap is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075353" version="1" comment="php53-suhosin is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075354" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075355" version="1" comment="php53-sysvsem is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075356" version="1" comment="php53-sysvshm is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075357" version="1" comment="php53-tokenizer is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075358" version="1" comment="php53-wddx is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075359" version="1" comment="php53-xmlreader is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075360" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075361" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075362" version="1" comment="php53-xsl is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075363" version="1" comment="php53-zip is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075364" version="1" comment="php53-zlib is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075409" version="1" comment="php53-devel is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075410" version="1" comment="php53-imap is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075411" version="1" comment="php53-posix is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075412" version="1" comment="php53-readline is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075413" version="1" comment="php53-sockets is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075414" version="1" comment="php53-sqlite is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075415" version="1" comment="php53-tidy is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075820" version="1" comment="kernel-default is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075817" version="1" comment="kernel-default-base is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075818" version="1" comment="kernel-default-devel is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075819" version="1" comment="kernel-default-extra is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075825" version="1" comment="kernel-source is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075826" version="1" comment="kernel-syms is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075830" version="1" comment="kernel-trace is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075827" version="1" comment="kernel-trace-base is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075828" version="1" comment="kernel-trace-devel is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075829" version="1" comment="kernel-trace-extra is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075834" version="1" comment="kernel-xen is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075831" version="1" comment="kernel-xen-base is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075832" version="1" comment="kernel-xen-devel is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075833" version="1" comment="kernel-xen-extra is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116925" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.42_0.7-2.18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116926" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.42_0.7-2.18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116927" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.42_0.7-2.18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116928" version="1" comment="gfs2-kmp-default is &lt;2_3.0.42_0.7-0.7.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116929" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.42_0.7-0.7.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116930" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.42_0.7-0.7.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116931" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.42_0.7-0.11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116932" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.42_0.7-0.11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116933" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.42_0.7-0.11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075837" version="1" comment="kernel-ec2 is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075835" version="1" comment="kernel-ec2-base is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075836" version="1" comment="kernel-ec2-devel is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075222" version="1" comment="kernel-default is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075219" version="1" comment="kernel-default-base is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075220" version="1" comment="kernel-default-devel is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075221" version="1" comment="kernel-default-extra is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075223" version="1" comment="kernel-source is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075224" version="1" comment="kernel-syms is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075228" version="1" comment="kernel-trace is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075225" version="1" comment="kernel-trace-base is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075226" version="1" comment="kernel-trace-devel is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075227" version="1" comment="kernel-trace-extra is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075232" version="1" comment="kernel-xen is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075229" version="1" comment="kernel-xen-base is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075230" version="1" comment="kernel-xen-devel is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075231" version="1" comment="kernel-xen-extra is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116934" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.38_0.5-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116935" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.38_0.5-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116936" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.38_0.5-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116937" version="1" comment="gfs2-kmp-default is &lt;2_3.0.38_0.5-0.7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116938" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.38_0.5-0.7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116939" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.38_0.5-0.7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116940" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.38_0.5-0.7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116941" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.38_0.5-0.7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116942" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.38_0.5-0.7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075250" version="1" comment="kernel-ec2 is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075248" version="1" comment="kernel-ec2-base is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075249" version="1" comment="kernel-ec2-devel is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076223" version="1" comment="glibc is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076217" version="1" comment="glibc-32bit is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076219" version="1" comment="glibc-devel is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076218" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076220" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076222" version="1" comment="glibc-locale is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076221" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076224" version="1" comment="nscd is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076239" version="1" comment="glibc-html is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076240" version="1" comment="glibc-info is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076244" version="1" comment="glibc-profile is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076242" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077328" version="1" comment="icedtea-web is &lt;1.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077575" version="1" comment="icedtea-web is &lt;1.4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076475" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077064" version="1" comment="apache2-devel is &lt;2.2.12-1.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075706" version="1" comment="kvm is &lt;0.15.1-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103809" version="1" comment="dbus-1 is &lt;1.2.10-3.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103807" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103808" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075238" version="1" comment="dhcp is &lt;4.2.4.P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075237" version="1" comment="dhcp-client is &lt;4.2.4.P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075251" version="1" comment="dhcp-relay is &lt;4.2.4.P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075252" version="1" comment="dhcp-server is &lt;4.2.4.P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075259" version="1" comment="dhcp-devel is &lt;4.2.4.P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075462" version="1" comment="bind-libs is &lt;9.6ESVR7P2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075461" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075463" version="1" comment="bind-utils is &lt;9.6ESVR7P2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075474" version="1" comment="bind is &lt;9.6ESVR7P2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075471" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075472" version="1" comment="bind-doc is &lt;9.6ESVR7P2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075482" version="1" comment="bind-devel is &lt;9.6ESVR7P2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075802" version="1" comment="dhcp is &lt;4.2.4.P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075801" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075803" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075804" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075805" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075548" version="1" comment="wireshark is &lt;1.4.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116943" version="1" comment="wireshark-devel is &lt;1.4.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075680" version="1" comment="bind-libs is &lt;9.6ESVR7P3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075679" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075681" version="1" comment="bind-utils is &lt;9.6ESVR7P3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103815" version="1" comment="bind is &lt;9.6ESVR7P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103810" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103811" version="1" comment="bind-doc is &lt;9.6ESVR7P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103813" version="1" comment="bind-libs is &lt;9.6ESVR7P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103812" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103814" version="1" comment="bind-utils is &lt;9.6ESVR7P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075692" version="1" comment="bind is &lt;9.6ESVR7P3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075689" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075690" version="1" comment="bind-doc is &lt;9.6ESVR7P3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075694" version="1" comment="bind-devel is &lt;9.6ESVR7P3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103160" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103164" version="1" comment="kernel-default is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103161" version="1" comment="kernel-default-base is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103162" version="1" comment="kernel-default-devel is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103163" version="1" comment="kernel-default-extra is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103165" version="1" comment="kernel-source is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103166" version="1" comment="kernel-syms is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103167" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103171" version="1" comment="kernel-xen is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103168" version="1" comment="kernel-xen-base is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103169" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103170" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103172" version="1" comment="xen-kmp-default is &lt;4.2.5_02_3.0.101_0.46-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132754" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.42-2.27.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132755" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.42-2.27.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132756" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.42-2.27.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132757" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.42-0.16.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132758" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.42-0.16.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132759" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.42-0.16.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132760" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.42-0.20.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132761" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.42-0.20.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132762" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.42-0.20.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116956" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.32-2.27.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116957" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.32-2.27.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116958" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.32-0.22.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116959" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.32-0.22.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116960" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.32-0.38.106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116961" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.32-0.38.106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116962" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116963" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116964" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116965" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116966" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116967" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116968" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116969" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116970" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.32-0.11.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116971" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.32-0.11.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116972" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.32-0.20.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116973" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.32-0.20.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116974" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.32-0.13.112" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116975" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.32-0.13.112" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107632" version="1" comment="kernel-default is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107629" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107630" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104060" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107640" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107638" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107639" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104059" version="1" comment="kernel-pae is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104057" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104058" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107633" version="1" comment="kernel-source is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107634" version="1" comment="kernel-syms is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107637" version="1" comment="kernel-trace is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107635" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107636" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107643" version="1" comment="kernel-xen is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107641" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107642" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107644" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-0.5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112865" version="1" comment="xen-kmp-pae is &lt;4.1.6_06_3.0.101_0.7.23-0.5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107645" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-0.5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103174" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103173" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103177" version="1" comment="kernel-ec2 is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103175" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103176" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103179" version="1" comment="kernel-trace is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103178" version="1" comment="kernel-trace-base is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091862" version="1" comment="glibc is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091849" version="1" comment="glibc-32bit is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091851" version="1" comment="glibc-devel is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091850" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091853" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091857" version="1" comment="glibc-locale is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091855" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091863" version="1" comment="nscd is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103832" version="1" comment="glibc is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103822" version="1" comment="glibc-32bit is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103824" version="1" comment="glibc-devel is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103823" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103825" version="1" comment="glibc-html is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103826" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103827" version="1" comment="glibc-info is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103829" version="1" comment="glibc-locale is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103828" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103831" version="1" comment="glibc-profile is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103830" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103833" version="1" comment="nscd is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091852" version="1" comment="glibc-html is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091854" version="1" comment="glibc-info is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091860" version="1" comment="glibc-profile is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091858" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076457" version="1" comment="libtiff3 is &lt;3.8.2-141.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076456" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076470" version="1" comment="tiff is &lt;3.8.2-141.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076473" version="1" comment="libtiff-devel is &lt;3.8.2-141.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076472" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103836" version="1" comment="ruby is &lt;1.8.7.p357-0.9.15.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103834" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.15.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103835" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.15.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076791" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076792" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076793" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076794" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090837" version="1" comment="icedtea-web is &lt;1.4.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075982" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075981" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075998" version="1" comment="libqt4 is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075983" version="1" comment="libqt4-32bit is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075985" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075984" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075995" version="1" comment="libqt4-sql is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075986" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075988" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075987" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075990" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075989" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075992" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075991" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075994" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075993" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075997" version="1" comment="libqt4-x11 is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075996" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076011" version="1" comment="libQtWebKit-devel is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076013" version="1" comment="libqt4-devel is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076012" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076169" version="1" comment="libxml2 is &lt;2.7.6-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076167" version="1" comment="libxml2-32bit is &lt;2.7.6-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076168" version="1" comment="libxml2-python is &lt;2.7.6-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076183" version="1" comment="libxml2-doc is &lt;2.7.6-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076203" version="1" comment="libxml2-devel is &lt;2.7.6-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076202" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075864" version="1" comment="bind-libs is &lt;9.6ESVR7P4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075863" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075865" version="1" comment="bind-utils is &lt;9.6ESVR7P4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103821" version="1" comment="bind is &lt;9.6ESVR7P4-0.2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103816" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P4-0.2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103817" version="1" comment="bind-doc is &lt;9.6ESVR7P4-0.2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103819" version="1" comment="bind-libs is &lt;9.6ESVR7P4-0.2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103818" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P4-0.2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103820" version="1" comment="bind-utils is &lt;9.6ESVR7P4-0.2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075884" version="1" comment="bind is &lt;9.6ESVR7P4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075881" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075882" version="1" comment="bind-doc is &lt;9.6ESVR7P4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075886" version="1" comment="bind-devel is &lt;9.6ESVR7P4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075809" version="1" comment="flash-player is &lt;11.2.202.243-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076029" version="1" comment="flash-player is &lt;11.2.202.251-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076160" version="1" comment="xen is &lt;4.1.3_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076152" version="1" comment="xen-doc-html is &lt;4.1.3_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076153" version="1" comment="xen-doc-pdf is &lt;4.1.3_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076154" version="1" comment="xen-kmp-default is &lt;4.1.3_06_3.0.51_0.7.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076155" version="1" comment="xen-kmp-trace is &lt;4.1.3_06_3.0.51_0.7.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076157" version="1" comment="xen-libs is &lt;4.1.3_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076156" version="1" comment="xen-libs-32bit is &lt;4.1.3_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076159" version="1" comment="xen-tools is &lt;4.1.3_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076158" version="1" comment="xen-tools-domU is &lt;4.1.3_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076161" version="1" comment="xen-devel is &lt;4.1.3_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076488" version="1" comment="wireshark is &lt;1.8.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076489" version="1" comment="wireshark-devel is &lt;1.8.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108144" version="1" comment="libmysql55client18 is &lt;5.5.42-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108143" version="1" comment="libmysql55client18-32bit is &lt;5.5.42-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108145" version="1" comment="libmysql55client_r18 is &lt;5.5.42-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108139" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.42-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108150" version="1" comment="mysql is &lt;5.5.42-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108149" version="1" comment="mysql-client is &lt;5.5.42-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108153" version="1" comment="mysql-tools is &lt;5.5.42-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076205" version="1" comment="flash-player is &lt;11.2.202.258-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077463" version="1" comment="gpg2 is &lt;2.0.9-25.33.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077462" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077542" version="1" comment="gpg2 is &lt;2.0.9-25.33.33.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077541" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.33.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103841" version="1" comment="gpg2 is &lt;2.0.9-25.33.37.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103840" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.37.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076711" version="1" comment="nagios-devel is &lt;3.0.6-1.25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092644" version="1" comment="libldb1 is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092699" version="1" comment="libldb1-32bit is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092647" version="1" comment="libsmbclient0 is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092645" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092650" version="1" comment="libtalloc2 is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092648" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092653" version="1" comment="libtdb1 is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092651" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092655" version="1" comment="libtevent0 is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092654" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092658" version="1" comment="libwbclient0 is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092656" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092669" version="1" comment="samba is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092659" version="1" comment="samba-32bit is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092662" version="1" comment="samba-client is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092660" version="1" comment="samba-client-32bit is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092663" version="1" comment="samba-doc is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092664" version="1" comment="samba-krb-printing is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092667" version="1" comment="samba-winbind is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092665" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103842" version="1" comment="cifs-mount is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103843" version="1" comment="ldapsmb is &lt;1.34b-11.28.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103845" version="1" comment="libsmbclient0 is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103844" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103847" version="1" comment="libtalloc1 is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103846" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103849" version="1" comment="libtdb1 is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103848" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103851" version="1" comment="libwbclient0 is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103850" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103859" version="1" comment="samba is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103852" version="1" comment="samba-32bit is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103854" version="1" comment="samba-client is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103853" version="1" comment="samba-client-32bit is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103855" version="1" comment="samba-doc is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103856" version="1" comment="samba-krb-printing is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103858" version="1" comment="samba-winbind is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103857" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092643" version="1" comment="ldapsmb is &lt;1.34b-12.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092688" version="1" comment="libldb-devel is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092689" version="1" comment="libnetapi-devel is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092690" version="1" comment="libnetapi0 is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092691" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092692" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092693" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092694" version="1" comment="libtalloc-devel is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092695" version="1" comment="libtdb-devel is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092696" version="1" comment="libtevent-devel is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092697" version="1" comment="libwbclient-devel is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092698" version="1" comment="samba-devel is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103872" version="1" comment="kernel-default is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103870" version="1" comment="kernel-default-base is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103871" version="1" comment="kernel-default-devel is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103875" version="1" comment="kernel-ec2 is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103873" version="1" comment="kernel-ec2-base is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103874" version="1" comment="kernel-ec2-devel is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103879" version="1" comment="kernel-source is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103880" version="1" comment="kernel-syms is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103883" version="1" comment="kernel-trace is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103881" version="1" comment="kernel-trace-base is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103882" version="1" comment="kernel-trace-devel is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103886" version="1" comment="kernel-xen is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103884" version="1" comment="kernel-xen-base is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103885" version="1" comment="kernel-xen-devel is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106024" version="1" comment="glibc is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106018" version="1" comment="glibc-32bit is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106020" version="1" comment="glibc-devel is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106019" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106021" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106023" version="1" comment="glibc-locale is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106022" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106025" version="1" comment="nscd is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105612" version="1" comment="glibc is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105602" version="1" comment="glibc-32bit is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105604" version="1" comment="glibc-devel is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105603" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105605" version="1" comment="glibc-html is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105606" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105607" version="1" comment="glibc-info is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105609" version="1" comment="glibc-locale is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105608" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105611" version="1" comment="glibc-profile is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105610" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105613" version="1" comment="nscd is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103898" version="1" comment="glibc is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103888" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103890" version="1" comment="glibc-devel is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103889" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103891" version="1" comment="glibc-html is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103892" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103893" version="1" comment="glibc-info is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103895" version="1" comment="glibc-locale is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103894" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103897" version="1" comment="glibc-profile is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103896" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103899" version="1" comment="nscd is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106016" version="1" comment="glibc-html is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106017" version="1" comment="glibc-info is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106029" version="1" comment="glibc-profile is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106027" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077426" version="1" comment="kernel-default is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077423" version="1" comment="kernel-default-base is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077424" version="1" comment="kernel-default-devel is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077425" version="1" comment="kernel-default-extra is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077427" version="1" comment="kernel-source is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077428" version="1" comment="kernel-syms is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077432" version="1" comment="kernel-trace is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077429" version="1" comment="kernel-trace-base is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077430" version="1" comment="kernel-trace-devel is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077431" version="1" comment="kernel-trace-extra is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077436" version="1" comment="kernel-xen is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077433" version="1" comment="kernel-xen-base is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077434" version="1" comment="kernel-xen-devel is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077435" version="1" comment="kernel-xen-extra is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077437" version="1" comment="xen-kmp-default is &lt;4.1.5_02_3.0.80_0.5-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077438" version="1" comment="xen-kmp-trace is &lt;4.1.5_02_3.0.80_0.5-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107459" version="1" comment="kernel-default is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107457" version="1" comment="kernel-default-base is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107458" version="1" comment="kernel-default-devel is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107469" version="1" comment="kernel-default-extra is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107463" version="1" comment="kernel-source is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107464" version="1" comment="kernel-syms is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107466" version="1" comment="kernel-trace-devel is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107473" version="1" comment="kernel-xen is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107470" version="1" comment="kernel-xen-base is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107471" version="1" comment="kernel-xen-devel is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107472" version="1" comment="kernel-xen-extra is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107474" version="1" comment="xen-kmp-default is &lt;4.2.2_04_3.0.82_0.7-0.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116976" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.80_0.5-2.18.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116977" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.80_0.5-2.18.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116978" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.80_0.5-2.18.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116979" version="1" comment="gfs2-kmp-default is &lt;2_3.0.80_0.5-0.7.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116980" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.80_0.5-0.7.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116981" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.80_0.5-0.7.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116982" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.80_0.5-0.11.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116983" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.80_0.5-0.11.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116984" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.80_0.5-0.11.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116985" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.82_0.7-2.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132766" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.82_0.7-2.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116986" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.82_0.7-2.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116988" version="1" comment="gfs2-kmp-default is &lt;2_3.0.82_0.7-0.16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132767" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.82_0.7-0.16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116989" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.82_0.7-0.16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116991" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.82_0.7-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132768" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.82_0.7-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116992" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.82_0.7-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116994" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.80_rt108_0.5-2.18.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116995" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.80_rt108_0.5-2.18.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116996" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.80_rt108_0.5-0.6.6.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116997" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.80_rt108_0.5-0.6.6.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116998" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.80_rt108_0.5-0.23.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116999" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.80_rt108_0.5-0.23.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117000" version="1" comment="kernel-rt is &lt;3.0.80.rt108-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117001" version="1" comment="kernel-rt-base is &lt;3.0.80.rt108-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117002" version="1" comment="kernel-rt-devel is &lt;3.0.80.rt108-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117003" version="1" comment="kernel-rt_trace is &lt;3.0.80.rt108-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117004" version="1" comment="kernel-rt_trace-base is &lt;3.0.80.rt108-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117005" version="1" comment="kernel-rt_trace-devel is &lt;3.0.80.rt108-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117006" version="1" comment="kernel-source-rt is &lt;3.0.80.rt108-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117007" version="1" comment="kernel-syms-rt is &lt;3.0.80.rt108-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117008" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.80_rt108_0.5-0.7.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117009" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.80_rt108_0.5-0.7.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117010" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.80_rt108_0.5-0.11.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117011" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.80_rt108_0.5-0.11.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117012" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.80_rt108_0.5-0.28.28.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117013" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.80_rt108_0.5-0.28.28.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077446" version="1" comment="kernel-ec2 is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077444" version="1" comment="kernel-ec2-base is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077445" version="1" comment="kernel-ec2-devel is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107477" version="1" comment="kernel-ec2 is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107475" version="1" comment="kernel-ec2-base is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107476" version="1" comment="kernel-ec2-devel is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107467" version="1" comment="kernel-trace is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107465" version="1" comment="kernel-trace-base is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113166" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113167" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110861" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107953" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107952" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076567" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076565" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076566" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077104" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr13.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156746" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr4.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076544" version="1" comment="libvirt is &lt;0.9.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076541" version="1" comment="libvirt-client is &lt;0.9.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076540" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076542" version="1" comment="libvirt-doc is &lt;0.9.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076543" version="1" comment="libvirt-python is &lt;0.9.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076548" version="1" comment="libvirt-devel is &lt;0.9.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076547" version="1" comment="libvirt-devel-32bit is &lt;0.9.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076569" version="1" comment="libldb1 is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076568" version="1" comment="libldb1-32bit is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076571" version="1" comment="libsmbclient0 is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076570" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076573" version="1" comment="libtalloc1 is &lt;3.4.3-1.42.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076572" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.42.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076575" version="1" comment="libtalloc2 is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076574" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076577" version="1" comment="libtdb1 is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076576" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076579" version="1" comment="libtevent0 is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076578" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076581" version="1" comment="libwbclient0 is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076580" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076588" version="1" comment="samba is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076582" version="1" comment="samba-32bit is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076584" version="1" comment="samba-client is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076583" version="1" comment="samba-client-32bit is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076585" version="1" comment="samba-krb-printing is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076587" version="1" comment="samba-winbind is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076586" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076603" version="1" comment="ldapsmb is &lt;1.34b-12.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076612" version="1" comment="libldb-devel is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076613" version="1" comment="libnetapi-devel is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076614" version="1" comment="libnetapi0 is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076615" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076616" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076617" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076618" version="1" comment="libtalloc-devel is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076619" version="1" comment="libtdb-devel is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076620" version="1" comment="libtevent-devel is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076621" version="1" comment="libwbclient-devel is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076622" version="1" comment="samba-devel is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076896" version="1" comment="libecpg6 is &lt;9.1.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076898" version="1" comment="libpq5 is &lt;9.1.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076897" version="1" comment="libpq5-32bit is &lt;9.1.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076899" version="1" comment="postgresql91 is &lt;9.1.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076902" version="1" comment="postgresql91-contrib is &lt;9.1.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076903" version="1" comment="postgresql91-docs is &lt;9.1.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076904" version="1" comment="postgresql91-server is &lt;9.1.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076908" version="1" comment="postgresql91-devel is &lt;9.1.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077145" version="1" comment="libxml2-python is &lt;2.7.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077154" version="1" comment="libxml2-devel is &lt;2.7.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077153" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077248" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077246" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077247" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077300" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr13.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077297" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr13.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077298" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr13.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077299" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr13.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077417" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr4.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077414" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr4.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077415" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr4.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077416" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr4.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077301" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr13.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077421" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr4.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076538" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.2-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076536" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.2-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076537" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.2-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076801" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.15-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076802" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.15-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077102" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.16-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077105" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.16-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076716" version="1" comment="flash-player is &lt;11.2.202.273-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076714" version="1" comment="flash-player-gnome is &lt;11.2.202.273-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076715" version="1" comment="flash-player-kde4 is &lt;11.2.202.273-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076305" version="1" comment="flash-player is &lt;11.2.202.261-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076531" version="1" comment="flash-player is &lt;11.2.202.262-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076529" version="1" comment="flash-player-gnome is &lt;11.2.202.262-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076530" version="1" comment="flash-player-kde4 is &lt;11.2.202.262-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076535" version="1" comment="flash-player is &lt;11.2.202.270-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076533" version="1" comment="flash-player-gnome is &lt;11.2.202.270-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076534" version="1" comment="flash-player-kde4 is &lt;11.2.202.270-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076698" version="1" comment="acroread is &lt;9.5.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076693" version="1" comment="acroread-cmaps is &lt;9.4.6-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076694" version="1" comment="acroread-fonts-ja is &lt;9.4.6-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076695" version="1" comment="acroread-fonts-ko is &lt;9.4.6-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076696" version="1" comment="acroread-fonts-zh_CN is &lt;9.4.6-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076697" version="1" comment="acroread-fonts-zh_TW is &lt;9.4.6-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076825" version="1" comment="flash-player is &lt;11.2.202.275-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076823" version="1" comment="flash-player-gnome is &lt;11.2.202.275-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076824" version="1" comment="flash-player-kde4 is &lt;11.2.202.275-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076748" version="1" comment="MozillaFirefox is &lt;17.0.3esr-0.4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076747" version="1" comment="MozillaFirefox-translations is &lt;17.0.3esr-0.4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076778" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076776" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076777" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076644" version="1" comment="kernel-default is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076641" version="1" comment="kernel-default-base is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076642" version="1" comment="kernel-default-devel is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076643" version="1" comment="kernel-default-extra is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076649" version="1" comment="kernel-source is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076650" version="1" comment="kernel-syms is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076654" version="1" comment="kernel-trace is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076651" version="1" comment="kernel-trace-base is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076652" version="1" comment="kernel-trace-devel is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076653" version="1" comment="kernel-trace-extra is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076658" version="1" comment="kernel-xen is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076655" version="1" comment="kernel-xen-base is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076656" version="1" comment="kernel-xen-devel is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076657" version="1" comment="kernel-xen-extra is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076659" version="1" comment="xen-kmp-default is &lt;4.1.3_06_3.0.58_0.6.6-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076660" version="1" comment="xen-kmp-trace is &lt;4.1.3_06_3.0.58_0.6.6-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117014" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.58_0.6.6-2.18.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117015" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.58_0.6.6-2.18.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117016" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.58_0.6.6-2.18.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117017" version="1" comment="gfs2-kmp-default is &lt;2_3.0.58_0.6.6-0.7.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117018" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.58_0.6.6-0.7.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117019" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.58_0.6.6-0.7.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117020" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.58_0.6.6-0.11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117021" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.58_0.6.6-0.11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117022" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.58_0.6.6-0.11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076672" version="1" comment="kernel-ec2 is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076670" version="1" comment="kernel-ec2-base is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076671" version="1" comment="kernel-ec2-devel is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090646" version="1" comment="kernel-default is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090644" version="1" comment="kernel-default-base is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090645" version="1" comment="kernel-default-devel is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090683" version="1" comment="kernel-default-extra is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090650" version="1" comment="kernel-source is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090651" version="1" comment="kernel-syms is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090654" version="1" comment="kernel-trace is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090652" version="1" comment="kernel-trace-base is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090653" version="1" comment="kernel-trace-devel is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090684" version="1" comment="kernel-trace-extra is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090657" version="1" comment="kernel-xen is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090655" version="1" comment="kernel-xen-base is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090656" version="1" comment="kernel-xen-devel is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090685" version="1" comment="kernel-xen-extra is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090658" version="1" comment="xen-kmp-default is &lt;4.1.5_02_3.0.93_0.5-0.5.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090659" version="1" comment="xen-kmp-trace is &lt;4.1.5_02_3.0.93_0.5-0.5.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090638" version="1" comment="kernel-default is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090636" version="1" comment="kernel-default-base is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090637" version="1" comment="kernel-default-devel is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090686" version="1" comment="kernel-default-extra is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090639" version="1" comment="kernel-source is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090640" version="1" comment="kernel-syms is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090642" version="1" comment="kernel-trace-devel is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090670" version="1" comment="kernel-xen is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090668" version="1" comment="kernel-xen-base is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090669" version="1" comment="kernel-xen-devel is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090687" version="1" comment="kernel-xen-extra is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090671" version="1" comment="xen-kmp-default is &lt;4.2.2_06_3.0.93_0.8-0.7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117023" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.93_0.5-2.18.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117024" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.93_0.5-2.18.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117025" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.93_0.5-2.18.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117026" version="1" comment="gfs2-kmp-default is &lt;2_3.0.93_0.5-0.7.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117027" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.93_0.5-0.7.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117028" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.93_0.5-0.7.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117029" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.93_0.5-0.11.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117030" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.93_0.5-0.11.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117031" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.93_0.5-0.11.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117032" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.93_0.8-2.27.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132775" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.93_0.8-2.27.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117033" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.93_0.8-2.27.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117035" version="1" comment="gfs2-kmp-default is &lt;2_3.0.93_0.8-0.16.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132776" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.93_0.8-0.16.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117036" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.93_0.8-0.16.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117038" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.93_0.8-0.20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132777" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.93_0.8-0.20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117039" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.93_0.8-0.20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117041" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.93_rt117_0.5-2.18.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117042" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.93_rt117_0.5-2.18.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117043" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.93_rt117_0.5-0.6.6.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117044" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.93_rt117_0.5-0.6.6.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117045" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.93_rt117_0.5-0.25.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117046" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.93_rt117_0.5-0.25.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117047" version="1" comment="kernel-rt is &lt;3.0.93.rt117-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117048" version="1" comment="kernel-rt-base is &lt;3.0.93.rt117-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117049" version="1" comment="kernel-rt-devel is &lt;3.0.93.rt117-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117050" version="1" comment="kernel-rt_trace is &lt;3.0.93.rt117-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117051" version="1" comment="kernel-rt_trace-base is &lt;3.0.93.rt117-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117052" version="1" comment="kernel-rt_trace-devel is &lt;3.0.93.rt117-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117053" version="1" comment="kernel-source-rt is &lt;3.0.93.rt117-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117054" version="1" comment="kernel-syms-rt is &lt;3.0.93.rt117-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117055" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.93_rt117_0.5-0.7.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117056" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.93_rt117_0.5-0.7.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117057" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.93_rt117_0.5-0.11.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117058" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.93_rt117_0.5-0.11.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117059" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.93_rt117_0.5-0.28.28.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117060" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.93_rt117_0.5-0.28.28.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117061" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.93_rt117_0.9-2.27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117062" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.93_rt117_0.9-2.27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117063" version="1" comment="drbd-kmp-rt is &lt;8.4.3_3.0.93_rt117_0.9-0.19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117064" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.3_3.0.93_rt117_0.9-0.19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117065" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.93_rt117_0.9-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117066" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.93_rt117_0.9-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117067" version="1" comment="kernel-rt is &lt;3.0.93.rt117-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117068" version="1" comment="kernel-rt-base is &lt;3.0.93.rt117-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117069" version="1" comment="kernel-rt-devel is &lt;3.0.93.rt117-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117070" version="1" comment="kernel-rt_trace is &lt;3.0.93.rt117-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117071" version="1" comment="kernel-rt_trace-base is &lt;3.0.93.rt117-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117072" version="1" comment="kernel-rt_trace-devel is &lt;3.0.93.rt117-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117073" version="1" comment="kernel-source-rt is &lt;3.0.93.rt117-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117074" version="1" comment="kernel-syms-rt is &lt;3.0.93.rt117-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117075" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.93_rt117_0.9-0.11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117076" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.93_rt117_0.9-0.11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117077" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.93_rt117_0.9-0.20.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117078" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.93_rt117_0.9-0.20.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117079" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.93_rt117_0.9-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117080" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.93_rt117_0.9-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090649" version="1" comment="kernel-ec2 is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090647" version="1" comment="kernel-ec2-base is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090648" version="1" comment="kernel-ec2-devel is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090667" version="1" comment="kernel-ec2 is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090665" version="1" comment="kernel-ec2-base is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090666" version="1" comment="kernel-ec2-devel is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090643" version="1" comment="kernel-trace is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090641" version="1" comment="kernel-trace-base is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077037" version="1" comment="flash-player is &lt;11.2.202.280-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077035" version="1" comment="flash-player-gnome is &lt;11.2.202.280-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077036" version="1" comment="flash-player-kde4 is &lt;11.2.202.280-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156747" version="1" comment="krb5-devel is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156748" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077420" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077422" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077669" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077667" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077668" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077676" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-0.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077674" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-0.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077675" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-0.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077692" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr14.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077689" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr14.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077690" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr14.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077691" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr14.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077696" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr5.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077693" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr5.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077694" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr5.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077695" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr5.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077697" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr14.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077698" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr5.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076545" version="1" comment="wireshark is &lt;1.8.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076549" version="1" comment="wireshark-devel is &lt;1.8.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090303" version="1" comment="libpixman-1-0 is &lt;0.24.4-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090301" version="1" comment="libpixman-1-0-32bit is &lt;0.24.4-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090304" version="1" comment="libpixman-1-0-devel is &lt;0.24.4-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077137" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077138" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089686" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089730" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111844" version="1" comment="php5 is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089687" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089688" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089689" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089690" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089691" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089692" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089693" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089694" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089695" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089696" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089697" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089698" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089699" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089700" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089701" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089702" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089703" version="1" comment="php5-json is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089704" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089705" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089706" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089707" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089708" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089709" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089710" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089711" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089712" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089713" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089714" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089715" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089716" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089717" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089718" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089719" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089720" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089721" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089722" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089723" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089724" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089725" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089726" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089727" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089728" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089729" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112793" version="1" comment="php53 is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089731" version="1" comment="php53-bcmath is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089732" version="1" comment="php53-bz2 is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089733" version="1" comment="php53-calendar is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089734" version="1" comment="php53-ctype is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089735" version="1" comment="php53-curl is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089736" version="1" comment="php53-dba is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089737" version="1" comment="php53-dom is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089738" version="1" comment="php53-exif is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089739" version="1" comment="php53-fastcgi is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089740" version="1" comment="php53-fileinfo is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089741" version="1" comment="php53-ftp is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089742" version="1" comment="php53-gd is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089743" version="1" comment="php53-gettext is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089744" version="1" comment="php53-gmp is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089745" version="1" comment="php53-iconv is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089746" version="1" comment="php53-intl is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089747" version="1" comment="php53-json is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089748" version="1" comment="php53-ldap is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089749" version="1" comment="php53-mbstring is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089750" version="1" comment="php53-mcrypt is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089751" version="1" comment="php53-mysql is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089752" version="1" comment="php53-odbc is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089753" version="1" comment="php53-openssl is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089754" version="1" comment="php53-pcntl is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089755" version="1" comment="php53-pdo is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089756" version="1" comment="php53-pear is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089757" version="1" comment="php53-pgsql is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089758" version="1" comment="php53-pspell is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089759" version="1" comment="php53-shmop is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089760" version="1" comment="php53-snmp is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089761" version="1" comment="php53-soap is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089762" version="1" comment="php53-suhosin is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089763" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089764" version="1" comment="php53-sysvsem is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089765" version="1" comment="php53-sysvshm is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089766" version="1" comment="php53-tokenizer is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089767" version="1" comment="php53-wddx is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089768" version="1" comment="php53-xmlreader is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089769" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089770" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089771" version="1" comment="php53-xsl is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089772" version="1" comment="php53-zip is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089773" version="1" comment="php53-zlib is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089818" version="1" comment="php5-devel is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089819" version="1" comment="php5-imap is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089820" version="1" comment="php5-ncurses is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089821" version="1" comment="php5-posix is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089822" version="1" comment="php5-readline is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089823" version="1" comment="php5-sockets is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089824" version="1" comment="php5-sqlite is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089825" version="1" comment="php5-tidy is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089826" version="1" comment="php53-devel is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089827" version="1" comment="php53-imap is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089828" version="1" comment="php53-posix is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089829" version="1" comment="php53-readline is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089830" version="1" comment="php53-sockets is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089831" version="1" comment="php53-sqlite is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089832" version="1" comment="php53-tidy is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089845" version="1" comment="MozillaFirefox is &lt;17.0.8esr-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089844" version="1" comment="MozillaFirefox-translations is &lt;17.0.8esr-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089843" version="1" comment="MozillaFirefox is &lt;17.0.8esr-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089842" version="1" comment="MozillaFirefox-translations is &lt;17.0.8esr-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089846" version="1" comment="MozillaFirefox-devel is &lt;17.0.8esr-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103917" version="1" comment="sudo is &lt;1.7.6p2-0.2.12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077307" version="1" comment="subversion is &lt;1.6.17-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077302" version="1" comment="subversion-devel is &lt;1.6.17-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077303" version="1" comment="subversion-perl is &lt;1.6.17-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077304" version="1" comment="subversion-python is &lt;1.6.17-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077305" version="1" comment="subversion-server is &lt;1.6.17-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077306" version="1" comment="subversion-tools is &lt;1.6.17-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103920" version="1" comment="kernel-default is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103918" version="1" comment="kernel-default-base is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103919" version="1" comment="kernel-default-devel is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103923" version="1" comment="kernel-ec2 is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103921" version="1" comment="kernel-ec2-base is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103922" version="1" comment="kernel-ec2-devel is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103924" version="1" comment="kernel-source is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103925" version="1" comment="kernel-syms is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103928" version="1" comment="kernel-trace is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103926" version="1" comment="kernel-trace-base is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103927" version="1" comment="kernel-trace-devel is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103931" version="1" comment="kernel-xen is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103929" version="1" comment="kernel-xen-base is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103930" version="1" comment="kernel-xen-devel is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090953" version="1" comment="libmysql55client18 is &lt;5.5.33-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090951" version="1" comment="libmysql55client18-32bit is &lt;5.5.33-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090954" version="1" comment="libmysql55client_r18 is &lt;5.5.33-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090958" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.33-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090320" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090318" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090321" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090327" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090957" version="1" comment="mysql is &lt;5.5.33-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090955" version="1" comment="mysql-client is &lt;5.5.33-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090956" version="1" comment="mysql-tools is &lt;5.5.33-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103943" version="1" comment="apache2 is &lt;2.2.12-1.40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103938" version="1" comment="apache2-doc is &lt;2.2.12-1.40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103939" version="1" comment="apache2-example-pages is &lt;2.2.12-1.40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103940" version="1" comment="apache2-prefork is &lt;2.2.12-1.40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103941" version="1" comment="apache2-utils is &lt;2.2.12-1.40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103942" version="1" comment="apache2-worker is &lt;2.2.12-1.40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077381" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.70.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077383" version="1" comment="xorg-x11-server is &lt;7.4-27.70.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077382" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.70.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103944" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103946" version="1" comment="xorg-x11-server is &lt;7.4-27.40.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103945" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077397" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.70.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077201" version="1" comment="curl is &lt;7.19.7-1.20.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077203" version="1" comment="libcurl4 is &lt;7.19.7-1.20.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077202" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077211" version="1" comment="libcurl-devel is &lt;7.19.7-1.20.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077226" version="1" comment="libtiff-devel is &lt;3.8.2-141.152.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077225" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.152.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077662" version="1" comment="subversion is &lt;1.6.17-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077657" version="1" comment="subversion-devel is &lt;1.6.17-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077658" version="1" comment="subversion-perl is &lt;1.6.17-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077659" version="1" comment="subversion-python is &lt;1.6.17-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077660" version="1" comment="subversion-server is &lt;1.6.17-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077661" version="1" comment="subversion-tools is &lt;1.6.17-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077495" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077497" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077496" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077727" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077726" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077528" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077751" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077750" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098369" version="1" comment="kvm is &lt;1.4.2-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077553" version="1" comment="openswan is &lt;2.6.16-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077552" version="1" comment="openswan-doc is &lt;2.6.16-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077252" version="1" comment="kernel-default is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077249" version="1" comment="kernel-default-base is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077250" version="1" comment="kernel-default-devel is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077251" version="1" comment="kernel-default-extra is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077253" version="1" comment="kernel-source is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077254" version="1" comment="kernel-syms is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077258" version="1" comment="kernel-trace is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077255" version="1" comment="kernel-trace-base is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077256" version="1" comment="kernel-trace-devel is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077257" version="1" comment="kernel-trace-extra is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077262" version="1" comment="kernel-xen is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077259" version="1" comment="kernel-xen-base is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077260" version="1" comment="kernel-xen-devel is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077261" version="1" comment="kernel-xen-extra is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077263" version="1" comment="xen-kmp-default is &lt;4.1.4_02_3.0.74_0.6.8-0.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077264" version="1" comment="xen-kmp-trace is &lt;4.1.4_02_3.0.74_0.6.8-0.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117081" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.74_0.6.8-2.18.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117082" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.74_0.6.8-2.18.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117083" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.74_0.6.8-2.18.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117084" version="1" comment="gfs2-kmp-default is &lt;2_3.0.74_0.6.8-0.7.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117085" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.74_0.6.8-0.7.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117086" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.74_0.6.8-0.7.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117087" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.74_0.6.8-0.11.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117088" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.74_0.6.8-0.11.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117089" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.74_0.6.8-0.11.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117090" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.74_rt98_0.6.4-2.18.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117091" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.74_rt98_0.6.4-2.18.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117092" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.74_rt98_0.6.4-0.6.6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117093" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.74_rt98_0.6.4-0.6.6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117094" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.74_rt98_0.6.4-0.23.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117095" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.74_rt98_0.6.4-0.23.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117096" version="1" comment="kernel-rt is &lt;3.0.74.rt98-0.6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117097" version="1" comment="kernel-rt-base is &lt;3.0.74.rt98-0.6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117098" version="1" comment="kernel-rt-devel is &lt;3.0.74.rt98-0.6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117099" version="1" comment="kernel-rt_trace is &lt;3.0.74.rt98-0.6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117100" version="1" comment="kernel-rt_trace-base is &lt;3.0.74.rt98-0.6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117101" version="1" comment="kernel-rt_trace-devel is &lt;3.0.74.rt98-0.6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117102" version="1" comment="kernel-source-rt is &lt;3.0.74.rt98-0.6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117103" version="1" comment="kernel-syms-rt is &lt;3.0.74.rt98-0.6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117104" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.74_rt98_0.6.4-0.7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117105" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.74_rt98_0.6.4-0.7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117106" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.74_rt98_0.6.4-0.11.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117107" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.74_rt98_0.6.4-0.11.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117108" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.74_rt98_0.6.4-0.28.28.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117109" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.74_rt98_0.6.4-0.28.28.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077271" version="1" comment="kernel-ec2 is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077269" version="1" comment="kernel-ec2-base is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077270" version="1" comment="kernel-ec2-devel is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093260" version="1" comment="kernel-default is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093257" version="1" comment="kernel-default-base is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093258" version="1" comment="kernel-default-devel is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093280" version="1" comment="kernel-default-extra is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093261" version="1" comment="kernel-source is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093262" version="1" comment="kernel-syms is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093264" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093271" version="1" comment="kernel-xen is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093269" version="1" comment="kernel-xen-base is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093270" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093281" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093272" version="1" comment="xen-kmp-default is &lt;4.2.3_08_3.0.101_0.15-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117110" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.15-2.27.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132781" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.15-2.27.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117111" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.15-2.27.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117113" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.15-0.16.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132782" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.15-0.16.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117114" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.15-0.16.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117116" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.15-0.20.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132783" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.15-0.20.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117117" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.15-0.20.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117119" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.10-2.27.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117120" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.10-2.27.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117121" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.10-0.22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117122" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.10-0.22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117123" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.10-0.38.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117124" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.10-0.38.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117125" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117126" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117127" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117128" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117129" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117130" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117131" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117132" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117133" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.10-0.11.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117134" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.10-0.11.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117135" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.10-0.20.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117136" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.10-0.20.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117137" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.10-0.13.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117138" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.10-0.13.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093268" version="1" comment="kernel-ec2 is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093266" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093267" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093265" version="1" comment="kernel-trace is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093263" version="1" comment="kernel-trace-base is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077560" version="1" comment="curl is &lt;7.19.7-1.20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077562" version="1" comment="libcurl4 is &lt;7.19.7-1.20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077561" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077563" version="1" comment="curl is &lt;7.19.7-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077565" version="1" comment="libcurl4 is &lt;7.19.7-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077564" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077570" version="1" comment="libcurl-devel is &lt;7.19.7-1.20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077571" version="1" comment="libcurl-devel is &lt;7.19.7-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091555" version="1" comment="kernel-default is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091552" version="1" comment="kernel-default-base is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091553" version="1" comment="kernel-default-devel is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091587" version="1" comment="kernel-default-extra is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091556" version="1" comment="kernel-source is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091557" version="1" comment="kernel-syms is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091560" version="1" comment="kernel-trace is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091558" version="1" comment="kernel-trace-base is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091559" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091588" version="1" comment="kernel-trace-extra is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091569" version="1" comment="kernel-xen is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091567" version="1" comment="kernel-xen-base is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091568" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091589" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091570" version="1" comment="xen-kmp-default is &lt;4.1.6_02_3.0.101_0.5-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091571" version="1" comment="xen-kmp-trace is &lt;4.1.6_02_3.0.101_0.5-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091535" version="1" comment="kernel-default is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091533" version="1" comment="kernel-default-base is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091534" version="1" comment="kernel-default-devel is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091584" version="1" comment="kernel-default-extra is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091542" version="1" comment="kernel-source is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091543" version="1" comment="kernel-syms is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091545" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091549" version="1" comment="kernel-xen is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091547" version="1" comment="kernel-xen-base is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091548" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091586" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091550" version="1" comment="xen-kmp-default is &lt;4.2.3_02_3.0.101_0.8-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117139" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.5-2.18.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117140" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.5-2.18.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117141" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_0.5-2.18.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117142" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.5-0.7.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117143" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.5-0.7.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117144" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_0.5-0.7.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117145" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.5-0.11.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117146" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.5-0.11.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117147" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_0.5-0.11.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117148" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.8-2.27.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132787" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.8-2.27.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117149" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.8-2.27.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117151" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.8-0.16.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132788" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.8-0.16.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117152" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.8-0.16.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117154" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.8-0.20.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132789" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.8-0.20.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117155" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.8-0.20.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117157" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.5-2.18.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117158" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.5-2.18.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117159" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.101_rt130_0.5-0.6.6.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117160" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.101_rt130_0.5-0.6.6.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117161" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.5-0.25.25.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117162" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.5-0.25.25.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117163" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117164" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117165" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117166" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117167" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117168" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117169" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117170" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117171" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.101_rt130_0.5-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117172" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.101_rt130_0.5-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117173" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.5-0.11.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117174" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.5-0.11.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117175" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.101_rt130_0.5-0.28.28.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117176" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.101_rt130_0.5-0.28.28.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117177" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.8-2.27.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117178" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.8-2.27.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117179" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.8-0.18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117180" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.8-0.18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117181" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.8-0.38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117182" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.8-0.38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117183" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117184" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117185" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117186" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117187" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117188" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117189" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117190" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117191" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.8-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117192" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.8-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117193" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.8-0.20.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117194" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.8-0.20.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117195" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.8-0.13.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117196" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.8-0.13.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091566" version="1" comment="kernel-ec2 is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091564" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091565" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091538" version="1" comment="kernel-ec2 is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091536" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091537" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091546" version="1" comment="kernel-trace is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091544" version="1" comment="kernel-trace-base is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077110" version="1" comment="wireshark-devel is &lt;1.8.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077710" version="1" comment="wireshark is &lt;1.8.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077720" version="1" comment="wireshark-devel is &lt;1.8.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077242" version="1" comment="acroread is &lt;9.5.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077237" version="1" comment="acroread-cmaps is &lt;9.4.6-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077238" version="1" comment="acroread-fonts-ja is &lt;9.4.6-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077239" version="1" comment="acroread-fonts-ko is &lt;9.4.6-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077240" version="1" comment="acroread-fonts-zh_CN is &lt;9.4.6-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077241" version="1" comment="acroread-fonts-zh_TW is &lt;9.4.6-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077230" version="1" comment="flash-player is &lt;11.2.202.285-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077228" version="1" comment="flash-player-gnome is &lt;11.2.202.285-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077229" version="1" comment="flash-player-kde4 is &lt;11.2.202.285-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077332" version="1" comment="kernel-default is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077329" version="1" comment="kernel-default-base is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077330" version="1" comment="kernel-default-devel is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077331" version="1" comment="kernel-default-extra is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077333" version="1" comment="kernel-source is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077334" version="1" comment="kernel-syms is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077338" version="1" comment="kernel-trace is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077335" version="1" comment="kernel-trace-base is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077336" version="1" comment="kernel-trace-devel is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077337" version="1" comment="kernel-trace-extra is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077342" version="1" comment="kernel-xen is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077339" version="1" comment="kernel-xen-base is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077340" version="1" comment="kernel-xen-devel is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077341" version="1" comment="kernel-xen-extra is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077343" version="1" comment="xen-kmp-default is &lt;4.1.4_02_3.0.74_0.6.10-0.5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077344" version="1" comment="xen-kmp-trace is &lt;4.1.4_02_3.0.74_0.6.10-0.5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117197" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.74_0.6.10-2.18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117198" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.74_0.6.10-2.18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117199" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.74_0.6.10-2.18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117200" version="1" comment="gfs2-kmp-default is &lt;2_3.0.74_0.6.10-0.7.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117201" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.74_0.6.10-0.7.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117202" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.74_0.6.10-0.7.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117203" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.74_0.6.10-0.11.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117204" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.74_0.6.10-0.11.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117205" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.74_0.6.10-0.11.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117206" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.74_rt98_0.6.6-2.18.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117207" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.74_rt98_0.6.6-2.18.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117208" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.74_rt98_0.6.6-0.6.6.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117209" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.74_rt98_0.6.6-0.6.6.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117210" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.74_rt98_0.6.6-0.23.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117211" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.74_rt98_0.6.6-0.23.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117212" version="1" comment="kernel-rt is &lt;3.0.74.rt98-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117213" version="1" comment="kernel-rt-base is &lt;3.0.74.rt98-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117214" version="1" comment="kernel-rt-devel is &lt;3.0.74.rt98-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117215" version="1" comment="kernel-rt_trace is &lt;3.0.74.rt98-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117216" version="1" comment="kernel-rt_trace-base is &lt;3.0.74.rt98-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117217" version="1" comment="kernel-rt_trace-devel is &lt;3.0.74.rt98-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117218" version="1" comment="kernel-source-rt is &lt;3.0.74.rt98-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117219" version="1" comment="kernel-syms-rt is &lt;3.0.74.rt98-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117220" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.74_rt98_0.6.6-0.7.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117221" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.74_rt98_0.6.6-0.7.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117222" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.74_rt98_0.6.6-0.11.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117223" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.74_rt98_0.6.6-0.11.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117224" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.74_rt98_0.6.6-0.28.28.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117225" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.74_rt98_0.6.6-0.28.28.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077355" version="1" comment="kernel-ec2 is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077353" version="1" comment="kernel-ec2-base is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077354" version="1" comment="kernel-ec2-devel is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077671" version="1" comment="strongswan is &lt;4.4.0-6.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077670" version="1" comment="strongswan-doc is &lt;4.4.0-6.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077818" version="1" comment="strongswan is &lt;4.4.0-6.17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077817" version="1" comment="strongswan-doc is &lt;4.4.0-6.17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077454" version="1" comment="flash-player is &lt;11.2.202.291-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077452" version="1" comment="flash-player-gnome is &lt;11.2.202.291-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077453" version="1" comment="flash-player-kde4 is &lt;11.2.202.291-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077651" version="1" comment="flash-player is &lt;11.2.202.297-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077649" version="1" comment="flash-player-gnome is &lt;11.2.202.297-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077650" version="1" comment="flash-player-kde4 is &lt;11.2.202.297-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090551" version="1" comment="flash-player is &lt;11.2.202.310-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090549" version="1" comment="flash-player-gnome is &lt;11.2.202.310-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090550" version="1" comment="flash-player-kde4 is &lt;11.2.202.310-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103985" version="1" comment="xen is &lt;4.0.3_21548_18-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103977" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103978" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103979" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.15-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103981" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.15-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103982" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103984" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103983" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077819" version="1" comment="puppet is &lt;2.6.18-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077820" version="1" comment="puppet-server is &lt;2.6.18-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091356" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091354" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091355" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077759" version="1" comment="ruby is &lt;1.8.7.p357-0.9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077761" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077762" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077763" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077764" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077765" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077766" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089774" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112870" version="1" comment="php53 is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089775" version="1" comment="php53-bcmath is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089776" version="1" comment="php53-bz2 is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089777" version="1" comment="php53-calendar is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089778" version="1" comment="php53-ctype is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089779" version="1" comment="php53-curl is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089780" version="1" comment="php53-dba is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089781" version="1" comment="php53-dom is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089782" version="1" comment="php53-exif is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089783" version="1" comment="php53-fastcgi is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089784" version="1" comment="php53-fileinfo is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089785" version="1" comment="php53-ftp is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089786" version="1" comment="php53-gd is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089787" version="1" comment="php53-gettext is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089788" version="1" comment="php53-gmp is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089789" version="1" comment="php53-iconv is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089790" version="1" comment="php53-intl is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089791" version="1" comment="php53-json is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089792" version="1" comment="php53-ldap is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089793" version="1" comment="php53-mbstring is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089794" version="1" comment="php53-mcrypt is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089795" version="1" comment="php53-mysql is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089796" version="1" comment="php53-odbc is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089797" version="1" comment="php53-openssl is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089798" version="1" comment="php53-pcntl is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089799" version="1" comment="php53-pdo is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089800" version="1" comment="php53-pear is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089801" version="1" comment="php53-pgsql is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089802" version="1" comment="php53-pspell is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089803" version="1" comment="php53-shmop is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089804" version="1" comment="php53-snmp is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089805" version="1" comment="php53-soap is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089806" version="1" comment="php53-suhosin is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089807" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089808" version="1" comment="php53-sysvsem is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089809" version="1" comment="php53-sysvshm is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089810" version="1" comment="php53-tokenizer is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089811" version="1" comment="php53-wddx is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089812" version="1" comment="php53-xmlreader is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089813" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089814" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089815" version="1" comment="php53-xsl is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089816" version="1" comment="php53-zip is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089817" version="1" comment="php53-zlib is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089834" version="1" comment="php53-devel is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089835" version="1" comment="php53-imap is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089836" version="1" comment="php53-posix is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089837" version="1" comment="php53-readline is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089838" version="1" comment="php53-sockets is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089839" version="1" comment="php53-sqlite is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089840" version="1" comment="php53-tidy is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090582" version="1" comment="libldb1 is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090635" version="1" comment="libldb1-32bit is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090585" version="1" comment="libsmbclient0 is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090583" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090588" version="1" comment="libtalloc1 is &lt;3.4.3-1.46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090586" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090591" version="1" comment="libtalloc2 is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090589" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090594" version="1" comment="libtdb1 is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090592" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090596" version="1" comment="libtevent0 is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090595" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090599" version="1" comment="libwbclient0 is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090597" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090610" version="1" comment="samba is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090600" version="1" comment="samba-32bit is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090603" version="1" comment="samba-client is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090601" version="1" comment="samba-client-32bit is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090604" version="1" comment="samba-doc is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090605" version="1" comment="samba-krb-printing is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090608" version="1" comment="samba-winbind is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090606" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112877" version="1" comment="libldb1 is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113165" version="1" comment="libldb1-32bit is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112878" version="1" comment="libsmbclient0 is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112879" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112880" version="1" comment="libtalloc2 is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112881" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112882" version="1" comment="libtdb1 is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112883" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112884" version="1" comment="libtevent0 is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112885" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112886" version="1" comment="libwbclient0 is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112887" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112888" version="1" comment="samba is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112889" version="1" comment="samba-32bit is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112890" version="1" comment="samba-client is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112891" version="1" comment="samba-client-32bit is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112892" version="1" comment="samba-doc is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112893" version="1" comment="samba-krb-printing is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112894" version="1" comment="samba-winbind is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112895" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090581" version="1" comment="ldapsmb is &lt;1.34b-12.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112876" version="1" comment="ldapsmb is &lt;1.34b-12.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090624" version="1" comment="libldb-devel is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090625" version="1" comment="libnetapi-devel is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090626" version="1" comment="libnetapi0 is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090627" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090628" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090629" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090630" version="1" comment="libtalloc-devel is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090631" version="1" comment="libtdb-devel is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090632" version="1" comment="libtevent-devel is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090633" version="1" comment="libwbclient-devel is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090634" version="1" comment="samba-devel is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117226" version="1" comment="libldb-devel is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117227" version="1" comment="libnetapi-devel is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117228" version="1" comment="libnetapi0 is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117229" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117230" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117231" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117232" version="1" comment="libtalloc-devel is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117233" version="1" comment="libtdb-devel is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117234" version="1" comment="libtevent-devel is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117235" version="1" comment="libwbclient-devel is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117236" version="1" comment="samba-devel is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103999" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111845" version="1" comment="php5 is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104000" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104001" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104002" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104003" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104004" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104005" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104006" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104007" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104008" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104009" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104010" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104011" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104012" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104013" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104014" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104015" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104016" version="1" comment="php5-json is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104017" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104018" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104019" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104020" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104021" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104022" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104023" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104024" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104025" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104026" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104027" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104028" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104029" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104030" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104031" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104032" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104033" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104034" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104035" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104036" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104037" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104038" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104039" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104040" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104041" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104042" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092731" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112871" version="1" comment="php53 is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092732" version="1" comment="php53-bcmath is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092733" version="1" comment="php53-bz2 is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092734" version="1" comment="php53-calendar is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092735" version="1" comment="php53-ctype is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092736" version="1" comment="php53-curl is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092737" version="1" comment="php53-dba is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092738" version="1" comment="php53-dom is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092739" version="1" comment="php53-exif is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092740" version="1" comment="php53-fastcgi is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092741" version="1" comment="php53-fileinfo is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092742" version="1" comment="php53-ftp is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092743" version="1" comment="php53-gd is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092744" version="1" comment="php53-gettext is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092745" version="1" comment="php53-gmp is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092746" version="1" comment="php53-iconv is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092747" version="1" comment="php53-intl is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092748" version="1" comment="php53-json is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092749" version="1" comment="php53-ldap is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092750" version="1" comment="php53-mbstring is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092751" version="1" comment="php53-mcrypt is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092752" version="1" comment="php53-mysql is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092753" version="1" comment="php53-odbc is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092754" version="1" comment="php53-openssl is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092755" version="1" comment="php53-pcntl is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092756" version="1" comment="php53-pdo is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092757" version="1" comment="php53-pear is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092758" version="1" comment="php53-pgsql is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092759" version="1" comment="php53-pspell is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092760" version="1" comment="php53-shmop is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092761" version="1" comment="php53-snmp is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092762" version="1" comment="php53-soap is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092763" version="1" comment="php53-suhosin is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092764" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092765" version="1" comment="php53-sysvsem is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092766" version="1" comment="php53-sysvshm is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092767" version="1" comment="php53-tokenizer is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092768" version="1" comment="php53-wddx is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092769" version="1" comment="php53-xmlreader is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092770" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092771" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092772" version="1" comment="php53-xsl is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092773" version="1" comment="php53-zip is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092774" version="1" comment="php53-zlib is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092866" version="1" comment="php53-devel is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092867" version="1" comment="php53-imap is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092868" version="1" comment="php53-posix is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092869" version="1" comment="php53-readline is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092870" version="1" comment="php53-sockets is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092871" version="1" comment="php53-sqlite is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092872" version="1" comment="php53-tidy is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091299" version="1" comment="subversion is &lt;1.6.17-1.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091294" version="1" comment="subversion-devel is &lt;1.6.17-1.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091295" version="1" comment="subversion-perl is &lt;1.6.17-1.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091296" version="1" comment="subversion-python is &lt;1.6.17-1.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091297" version="1" comment="subversion-server is &lt;1.6.17-1.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091298" version="1" comment="subversion-tools is &lt;1.6.17-1.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091288" version="1" comment="libvirt is &lt;1.0.5.6-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091284" version="1" comment="libvirt-client is &lt;1.0.5.6-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091283" version="1" comment="libvirt-client-32bit is &lt;1.0.5.6-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091285" version="1" comment="libvirt-doc is &lt;1.0.5.6-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091287" version="1" comment="libvirt-python is &lt;1.0.5.6-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091286" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.6-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091301" version="1" comment="libvirt-devel is &lt;1.0.5.6-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091300" version="1" comment="libvirt-devel-32bit is &lt;1.0.5.6-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104045" version="1" comment="kernel-default is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104043" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104044" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104048" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104046" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104047" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104049" version="1" comment="kernel-source is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104050" version="1" comment="kernel-syms is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104053" version="1" comment="kernel-trace is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104051" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104052" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104056" version="1" comment="kernel-xen is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104054" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104055" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112862" version="1" comment="xen-kmp-default is &lt;4.1.6_06_3.0.101_0.7.23-0.5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112863" version="1" comment="xen-kmp-trace is &lt;4.1.6_06_3.0.101_0.7.23-0.5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098379" version="1" comment="libmysql55client18 is &lt;5.5.37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098377" version="1" comment="libmysql55client18-32bit is &lt;5.5.37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098380" version="1" comment="libmysql55client_r18 is &lt;5.5.37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098800" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098383" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098381" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098384" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098802" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098387" version="1" comment="mysql is &lt;5.5.37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098385" version="1" comment="mysql-client is &lt;5.5.37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098386" version="1" comment="mysql-tools is &lt;5.5.37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093120" version="1" comment="kernel-default is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093118" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093119" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093142" version="1" comment="kernel-default-extra is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093124" version="1" comment="kernel-source is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093125" version="1" comment="kernel-syms is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093128" version="1" comment="kernel-trace is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093126" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093127" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093144" version="1" comment="kernel-trace-extra is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093137" version="1" comment="kernel-xen is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093135" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093136" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093145" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093138" version="1" comment="xen-kmp-default is &lt;4.1.6_04_3.0.101_0.7.15-0.5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093140" version="1" comment="xen-kmp-trace is &lt;4.1.6_04_3.0.101_0.7.15-0.5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117237" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.7.15-2.18.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117238" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.7.15-2.18.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117239" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_0.7.15-2.18.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117240" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.7.15-0.7.107" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117241" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.7.15-0.7.107" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117242" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_0.7.15-0.7.107" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117243" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.7.15-0.11.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117244" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.7.15-0.11.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117245" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_0.7.15-0.11.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093131" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093129" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093130" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098401" version="1" comment="glibc is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098388" version="1" comment="glibc-32bit is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098390" version="1" comment="glibc-devel is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098389" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098392" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098396" version="1" comment="glibc-locale is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098394" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098402" version="1" comment="nscd is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098391" version="1" comment="glibc-html is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098393" version="1" comment="glibc-info is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098399" version="1" comment="glibc-profile is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098397" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091438" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.70.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091440" version="1" comment="xorg-x11-server is &lt;7.4-27.70.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091439" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.70.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091435" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091437" version="1" comment="xorg-x11-server is &lt;7.4-27.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091436" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091443" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.70.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091442" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098405" version="1" comment="kernel-default is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098403" version="1" comment="kernel-default-base is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098404" version="1" comment="kernel-default-devel is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098804" version="1" comment="kernel-default-extra is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098412" version="1" comment="kernel-source is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098413" version="1" comment="kernel-syms is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098415" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098419" version="1" comment="kernel-xen is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098417" version="1" comment="kernel-xen-base is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098418" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098806" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098420" version="1" comment="xen-kmp-default is &lt;4.2.4_02_3.0.101_0.21-0.7.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117246" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.21-2.27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132796" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.21-2.27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117247" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.21-2.27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117249" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.21-0.16.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132797" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.21-0.16.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117250" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.21-0.16.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117252" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.21-0.20.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132798" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.21-0.20.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117253" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.21-0.20.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117255" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.14-2.27.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117256" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.14-2.27.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117257" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.14-0.22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117258" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.14-0.22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117259" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.14-0.38.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117260" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.14-0.38.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117261" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117262" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117263" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117264" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117265" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117266" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117267" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117268" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117269" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.14-0.11.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117270" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.14-0.11.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117271" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.14-0.20.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117272" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.14-0.20.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117273" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.14-0.13.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117274" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.14-0.13.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104063" version="1" comment="kernel-default is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104061" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104062" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104066" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104064" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104065" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104070" version="1" comment="kernel-source is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104071" version="1" comment="kernel-syms is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104074" version="1" comment="kernel-trace is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104072" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104073" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104077" version="1" comment="kernel-xen is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104075" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104076" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098408" version="1" comment="kernel-ec2 is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098406" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098407" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098416" version="1" comment="kernel-trace is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098414" version="1" comment="kernel-trace-base is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104079" version="1" comment="cifs-mount is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104080" version="1" comment="ldapsmb is &lt;1.34b-11.28.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104082" version="1" comment="libsmbclient0 is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104081" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104084" version="1" comment="libtalloc1 is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104083" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104086" version="1" comment="libtdb1 is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104085" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104088" version="1" comment="libwbclient0 is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104087" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104096" version="1" comment="samba is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104089" version="1" comment="samba-32bit is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104091" version="1" comment="samba-client is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104090" version="1" comment="samba-client-32bit is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104092" version="1" comment="samba-doc is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104093" version="1" comment="samba-krb-printing is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104095" version="1" comment="samba-winbind is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104094" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098451" version="1" comment="libldb1 is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098820" version="1" comment="libldb1-32bit is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098454" version="1" comment="libsmbclient0 is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098452" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098457" version="1" comment="libtalloc2 is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098455" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098460" version="1" comment="libtdb1 is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098458" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098462" version="1" comment="libtevent0 is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098461" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098465" version="1" comment="libwbclient0 is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098463" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098476" version="1" comment="samba is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098466" version="1" comment="samba-32bit is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098469" version="1" comment="samba-client is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098467" version="1" comment="samba-client-32bit is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098470" version="1" comment="samba-doc is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098471" version="1" comment="samba-krb-printing is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098474" version="1" comment="samba-winbind is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098472" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104097" version="1" comment="ldapsmb is &lt;1.34b-12.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104098" version="1" comment="libldb1 is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104100" version="1" comment="libsmbclient0 is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104099" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104102" version="1" comment="libtalloc1 is &lt;3.4.3-1.54.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104101" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.54.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104104" version="1" comment="libtalloc2 is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104103" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104106" version="1" comment="libtdb1 is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104105" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104108" version="1" comment="libtevent0 is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104107" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104110" version="1" comment="libwbclient0 is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104109" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104118" version="1" comment="samba is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104111" version="1" comment="samba-32bit is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104113" version="1" comment="samba-client is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104112" version="1" comment="samba-client-32bit is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104114" version="1" comment="samba-doc is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104115" version="1" comment="samba-krb-printing is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104117" version="1" comment="samba-winbind is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104116" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098450" version="1" comment="ldapsmb is &lt;1.34b-12.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098809" version="1" comment="libldb-devel is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098810" version="1" comment="libnetapi-devel is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098811" version="1" comment="libnetapi0 is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098812" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098813" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098814" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098815" version="1" comment="libtalloc-devel is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098816" version="1" comment="libtdb-devel is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098817" version="1" comment="libtevent-devel is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098818" version="1" comment="libwbclient-devel is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098819" version="1" comment="samba-devel is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107493" version="1" comment="curl is &lt;7.19.7-1.20.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107495" version="1" comment="libcurl4 is &lt;7.19.7-1.20.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107494" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092508" version="1" comment="curl is &lt;7.19.7-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092511" version="1" comment="libcurl4 is &lt;7.19.7-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092509" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107492" version="1" comment="libcurl-devel is &lt;7.19.7-1.20.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092512" version="1" comment="libcurl-devel is &lt;7.19.7-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098478" version="1" comment="puppet is &lt;2.6.18-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098477" version="1" comment="puppet-server is &lt;2.6.18-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083224" version="1" comment="bind-libs is &lt;9.9.3P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083223" version="1" comment="bind-libs-32bit is &lt;9.9.3P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083225" version="1" comment="bind-utils is &lt;9.9.3P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083229" version="1" comment="bind is &lt;9.9.3P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083226" version="1" comment="bind-chrootenv is &lt;9.9.3P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083227" version="1" comment="bind-doc is &lt;9.9.3P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083231" version="1" comment="bind-devel is &lt;9.9.3P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090547" version="1" comment="wireshark is &lt;1.8.9-0.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090548" version="1" comment="wireshark-devel is &lt;1.8.9-0.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091427" version="1" comment="flash-player is &lt;11.2.202.327-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091425" version="1" comment="flash-player-gnome is &lt;11.2.202.327-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091426" version="1" comment="flash-player-kde4 is &lt;11.2.202.327-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092001" version="1" comment="flash-player is &lt;11.2.202.332-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091999" version="1" comment="flash-player-gnome is &lt;11.2.202.332-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092000" version="1" comment="flash-player-kde4 is &lt;11.2.202.332-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093462" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093460" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093461" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093632" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr15.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093629" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr15.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093630" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr15.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093631" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr15.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093633" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr15.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093479" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr6.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093476" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr6.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110665" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093477" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr6.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093478" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr6.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093493" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr6.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091792" version="1" comment="wireshark is &lt;1.8.11-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091800" version="1" comment="wireshark-devel is &lt;1.8.11-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093167" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093173" version="1" comment="libvirt is &lt;1.0.5.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093169" version="1" comment="libvirt-client is &lt;1.0.5.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093168" version="1" comment="libvirt-client-32bit is &lt;1.0.5.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093170" version="1" comment="libvirt-doc is &lt;1.0.5.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093172" version="1" comment="libvirt-python is &lt;1.0.5.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093171" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093175" version="1" comment="libvirt-devel is &lt;1.0.5.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093174" version="1" comment="libvirt-devel-32bit is &lt;1.0.5.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104124" version="1" comment="apache2 is &lt;2.2.12-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104119" version="1" comment="apache2-doc is &lt;2.2.12-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104120" version="1" comment="apache2-example-pages is &lt;2.2.12-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104121" version="1" comment="apache2-prefork is &lt;2.2.12-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104122" version="1" comment="apache2-utils is &lt;2.2.12-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104123" version="1" comment="apache2-worker is &lt;2.2.12-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093935" version="1" comment="libvirt is &lt;1.0.5.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093931" version="1" comment="libvirt-client is &lt;1.0.5.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093930" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093932" version="1" comment="libvirt-doc is &lt;1.0.5.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093934" version="1" comment="libvirt-python is &lt;1.0.5.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093933" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093939" version="1" comment="libvirt-devel is &lt;1.0.5.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093938" version="1" comment="libvirt-devel-32bit is &lt;1.0.5.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102500" version="1" comment="clamav is &lt;0.98.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107019" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112867" version="1" comment="php53 is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107020" version="1" comment="php53-bcmath is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107021" version="1" comment="php53-bz2 is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107022" version="1" comment="php53-calendar is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107023" version="1" comment="php53-ctype is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107024" version="1" comment="php53-curl is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107025" version="1" comment="php53-dba is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107026" version="1" comment="php53-dom is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107027" version="1" comment="php53-exif is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107028" version="1" comment="php53-fastcgi is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107029" version="1" comment="php53-fileinfo is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107030" version="1" comment="php53-ftp is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107031" version="1" comment="php53-gd is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107032" version="1" comment="php53-gettext is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107033" version="1" comment="php53-gmp is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107034" version="1" comment="php53-iconv is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107035" version="1" comment="php53-intl is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107036" version="1" comment="php53-json is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107037" version="1" comment="php53-ldap is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107038" version="1" comment="php53-mbstring is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107039" version="1" comment="php53-mcrypt is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107040" version="1" comment="php53-mysql is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107041" version="1" comment="php53-odbc is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107042" version="1" comment="php53-openssl is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107043" version="1" comment="php53-pcntl is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107044" version="1" comment="php53-pdo is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107045" version="1" comment="php53-pear is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107046" version="1" comment="php53-pgsql is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107047" version="1" comment="php53-pspell is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107048" version="1" comment="php53-shmop is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107049" version="1" comment="php53-snmp is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107050" version="1" comment="php53-soap is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107051" version="1" comment="php53-suhosin is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107052" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107053" version="1" comment="php53-sysvsem is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107054" version="1" comment="php53-sysvshm is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107055" version="1" comment="php53-tokenizer is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107056" version="1" comment="php53-wddx is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107057" version="1" comment="php53-xmlreader is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107058" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107059" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107060" version="1" comment="php53-xsl is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107061" version="1" comment="php53-zip is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107062" version="1" comment="php53-zlib is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107012" version="1" comment="php53-devel is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107013" version="1" comment="php53-imap is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107014" version="1" comment="php53-posix is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107015" version="1" comment="php53-readline is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107016" version="1" comment="php53-sockets is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107017" version="1" comment="php53-sqlite is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107018" version="1" comment="php53-tidy is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098833" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098831" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098832" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098493" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098490" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098491" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098492" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098497" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr7.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098494" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr7.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098495" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr7.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098496" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr7.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098498" version="1" comment="wireshark is &lt;1.8.12-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098834" version="1" comment="wireshark-devel is &lt;1.8.12-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107071" version="1" comment="glibc is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107065" version="1" comment="glibc-32bit is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107067" version="1" comment="glibc-devel is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107066" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107068" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107070" version="1" comment="glibc-locale is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107069" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107072" version="1" comment="nscd is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107925" version="1" comment="glibc is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107915" version="1" comment="glibc-32bit is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107917" version="1" comment="glibc-devel is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107916" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107918" version="1" comment="glibc-html is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107919" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107920" version="1" comment="glibc-info is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107922" version="1" comment="glibc-locale is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107921" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107924" version="1" comment="glibc-profile is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107923" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107926" version="1" comment="nscd is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107913" version="1" comment="glibc is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107903" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107905" version="1" comment="glibc-devel is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107904" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107906" version="1" comment="glibc-html is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107907" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107908" version="1" comment="glibc-info is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107910" version="1" comment="glibc-locale is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107909" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107912" version="1" comment="glibc-profile is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107911" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107914" version="1" comment="nscd is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107063" version="1" comment="glibc-html is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107064" version="1" comment="glibc-info is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107076" version="1" comment="glibc-profile is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107074" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093369" version="1" comment="curl is &lt;7.19.7-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093372" version="1" comment="libcurl4 is &lt;7.19.7-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093370" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093373" version="1" comment="libcurl-devel is &lt;7.19.7-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098843" version="1" comment="subversion is &lt;1.6.17-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098838" version="1" comment="subversion-devel is &lt;1.6.17-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098839" version="1" comment="subversion-perl is &lt;1.6.17-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098840" version="1" comment="subversion-python is &lt;1.6.17-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098841" version="1" comment="subversion-server is &lt;1.6.17-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098842" version="1" comment="subversion-tools is &lt;1.6.17-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098508" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098504" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098510" version="1" comment="openssl is &lt;0.9.8j-0.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098582" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098578" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098580" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098579" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098584" version="1" comment="openssl is &lt;0.9.8j-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098583" version="1" comment="openssl-doc is &lt;0.9.8j-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098506" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098505" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098509" version="1" comment="openssl-doc is &lt;0.9.8j-0.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098844" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098513" version="1" comment="squid3 is &lt;3.1.12-8.16.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098376" version="1" comment="kvm is &lt;1.4.2-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108063" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108040" version="1" comment="kernel-default is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108037" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108038" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108039" version="1" comment="kernel-default-extra is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108045" version="1" comment="kernel-source is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108046" version="1" comment="kernel-syms is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108047" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108051" version="1" comment="kernel-xen is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108048" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108049" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108050" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108052" version="1" comment="xen-kmp-default is &lt;4.2.5_04_3.0.101_0.47.50-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117276" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.47.50-2.28.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132799" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.47.50-2.28.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117277" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.47.50-2.28.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117280" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.47.50-0.17.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132800" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.47.50-0.17.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117281" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.47.50-0.17.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117284" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.47.50-0.21.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132801" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.47.50-0.21.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117285" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.47.50-0.21.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117287" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.33.36-2.28.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117288" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.33.36-2.28.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117289" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.33.36-0.23.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117290" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.33.36-0.23.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117291" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.33.36-0.39.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117292" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.33.36-0.39.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117293" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.33.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117294" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.33.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117295" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.33.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117296" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.33.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117297" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.33.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117298" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.33.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117299" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.33.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117300" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.33.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117301" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.33.36-0.12.1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117302" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.33.36-0.12.1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117303" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.33.36-0.21.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117304" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.33.36-0.21.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117305" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.33.36-0.14.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117306" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.33.36-0.14.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108065" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108064" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108056" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108054" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108055" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108058" version="1" comment="kernel-trace is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108057" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100668" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100671" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100669" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100673" version="1" comment="openssl1 is &lt;1.0.1g-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100672" version="1" comment="openssl1-doc is &lt;1.0.1g-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098555" version="1" comment="kernel-default is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098552" version="1" comment="kernel-default-base is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098553" version="1" comment="kernel-default-devel is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098868" version="1" comment="kernel-default-extra is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098556" version="1" comment="kernel-source is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098557" version="1" comment="kernel-syms is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098559" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098572" version="1" comment="kernel-xen is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098570" version="1" comment="kernel-xen-base is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098571" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098870" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098573" version="1" comment="xen-kmp-default is &lt;4.2.4_02_3.0.101_0.29-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117307" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.29-2.27.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132802" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.29-2.27.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117308" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.29-2.27.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117310" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.29-0.16.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132803" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.29-0.16.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117311" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.29-0.16.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117313" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.29-0.20.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132804" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.29-0.20.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117314" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.29-0.20.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117316" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.16-2.27.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117317" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.16-2.27.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117318" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.16-0.22.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117319" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.16-0.22.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117320" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.16-0.38.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117321" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.16-0.38.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117322" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117323" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117324" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117325" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117326" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117327" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117328" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117329" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117330" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.16-0.11.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117331" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.16-0.11.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117332" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.16-0.20.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117333" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.16-0.20.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117334" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.16-0.13.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117335" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.16-0.13.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098566" version="1" comment="kernel-ec2 is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098564" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098565" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098560" version="1" comment="kernel-trace is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098558" version="1" comment="kernel-trace-base is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099005" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112873" version="1" comment="php53 is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099006" version="1" comment="php53-bcmath is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099007" version="1" comment="php53-bz2 is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099008" version="1" comment="php53-calendar is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099009" version="1" comment="php53-ctype is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099010" version="1" comment="php53-curl is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099011" version="1" comment="php53-dba is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099012" version="1" comment="php53-dom is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099013" version="1" comment="php53-exif is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099014" version="1" comment="php53-fastcgi is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099015" version="1" comment="php53-fileinfo is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099016" version="1" comment="php53-ftp is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099017" version="1" comment="php53-gd is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099018" version="1" comment="php53-gettext is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099019" version="1" comment="php53-gmp is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099020" version="1" comment="php53-iconv is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099021" version="1" comment="php53-intl is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099022" version="1" comment="php53-json is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099023" version="1" comment="php53-ldap is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099024" version="1" comment="php53-mbstring is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099025" version="1" comment="php53-mcrypt is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099026" version="1" comment="php53-mysql is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099027" version="1" comment="php53-odbc is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099028" version="1" comment="php53-openssl is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099029" version="1" comment="php53-pcntl is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099030" version="1" comment="php53-pdo is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099031" version="1" comment="php53-pear is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099032" version="1" comment="php53-pgsql is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099033" version="1" comment="php53-pspell is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099034" version="1" comment="php53-shmop is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099035" version="1" comment="php53-snmp is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099036" version="1" comment="php53-soap is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099037" version="1" comment="php53-suhosin is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099038" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099039" version="1" comment="php53-sysvsem is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099040" version="1" comment="php53-sysvshm is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099041" version="1" comment="php53-tokenizer is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099042" version="1" comment="php53-wddx is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099043" version="1" comment="php53-xmlreader is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099044" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099045" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099046" version="1" comment="php53-xsl is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099047" version="1" comment="php53-zip is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099048" version="1" comment="php53-zlib is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099049" version="1" comment="php53-devel is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099050" version="1" comment="php53-imap is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099051" version="1" comment="php53-posix is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099052" version="1" comment="php53-readline is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099053" version="1" comment="php53-sockets is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099054" version="1" comment="php53-sqlite is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099055" version="1" comment="php53-tidy is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098873" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109723" version="1" comment="kvm is &lt;0.12.5-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113249" version="1" comment="tomcat6 is &lt;6.0.41-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113242" version="1" comment="tomcat6-admin-webapps is &lt;6.0.41-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113243" version="1" comment="tomcat6-docs-webapp is &lt;6.0.41-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113244" version="1" comment="tomcat6-javadoc is &lt;6.0.41-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113245" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.41-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113246" version="1" comment="tomcat6-lib is &lt;6.0.41-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113247" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.41-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113248" version="1" comment="tomcat6-webapps is &lt;6.0.41-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104125" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112861" version="1" comment="php53 is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104126" version="1" comment="php53-bcmath is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104127" version="1" comment="php53-bz2 is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104128" version="1" comment="php53-calendar is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104129" version="1" comment="php53-ctype is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104130" version="1" comment="php53-curl is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104131" version="1" comment="php53-dba is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104132" version="1" comment="php53-dom is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104133" version="1" comment="php53-exif is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104134" version="1" comment="php53-fastcgi is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104135" version="1" comment="php53-fileinfo is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104136" version="1" comment="php53-ftp is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104137" version="1" comment="php53-gd is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104138" version="1" comment="php53-gettext is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104139" version="1" comment="php53-gmp is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104140" version="1" comment="php53-iconv is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104141" version="1" comment="php53-intl is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104142" version="1" comment="php53-json is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104143" version="1" comment="php53-ldap is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104144" version="1" comment="php53-mbstring is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104145" version="1" comment="php53-mcrypt is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104146" version="1" comment="php53-mysql is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104147" version="1" comment="php53-odbc is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104148" version="1" comment="php53-openssl is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104149" version="1" comment="php53-pcntl is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104150" version="1" comment="php53-pdo is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104151" version="1" comment="php53-pear is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104152" version="1" comment="php53-pgsql is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104153" version="1" comment="php53-pspell is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104154" version="1" comment="php53-shmop is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104155" version="1" comment="php53-snmp is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104156" version="1" comment="php53-soap is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104157" version="1" comment="php53-suhosin is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104158" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104159" version="1" comment="php53-sysvsem is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104160" version="1" comment="php53-sysvshm is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104161" version="1" comment="php53-tokenizer is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104162" version="1" comment="php53-wddx is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104163" version="1" comment="php53-xmlreader is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104164" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104165" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104166" version="1" comment="php53-xsl is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104167" version="1" comment="php53-zip is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104168" version="1" comment="php53-zlib is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098585" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112872" version="1" comment="php53 is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098586" version="1" comment="php53-bcmath is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098587" version="1" comment="php53-bz2 is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098588" version="1" comment="php53-calendar is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098589" version="1" comment="php53-ctype is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098590" version="1" comment="php53-curl is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098591" version="1" comment="php53-dba is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098592" version="1" comment="php53-dom is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098593" version="1" comment="php53-exif is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098594" version="1" comment="php53-fastcgi is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098595" version="1" comment="php53-fileinfo is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098596" version="1" comment="php53-ftp is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098597" version="1" comment="php53-gd is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098598" version="1" comment="php53-gettext is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098599" version="1" comment="php53-gmp is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098600" version="1" comment="php53-iconv is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098601" version="1" comment="php53-intl is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098602" version="1" comment="php53-json is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098603" version="1" comment="php53-ldap is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098604" version="1" comment="php53-mbstring is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098605" version="1" comment="php53-mcrypt is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098606" version="1" comment="php53-mysql is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098607" version="1" comment="php53-odbc is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098608" version="1" comment="php53-openssl is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098609" version="1" comment="php53-pcntl is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098610" version="1" comment="php53-pdo is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098611" version="1" comment="php53-pear is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098612" version="1" comment="php53-pgsql is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098613" version="1" comment="php53-pspell is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098614" version="1" comment="php53-shmop is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098615" version="1" comment="php53-snmp is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098616" version="1" comment="php53-soap is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098617" version="1" comment="php53-suhosin is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098618" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098619" version="1" comment="php53-sysvsem is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098620" version="1" comment="php53-sysvshm is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098621" version="1" comment="php53-tokenizer is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098622" version="1" comment="php53-wddx is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098623" version="1" comment="php53-xmlreader is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098624" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098625" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098626" version="1" comment="php53-xsl is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098627" version="1" comment="php53-zip is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098628" version="1" comment="php53-zlib is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098874" version="1" comment="php53-devel is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098875" version="1" comment="php53-imap is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098876" version="1" comment="php53-posix is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098877" version="1" comment="php53-readline is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098878" version="1" comment="php53-sockets is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098879" version="1" comment="php53-sqlite is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098880" version="1" comment="php53-tidy is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099566" version="1" comment="glibc is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099553" version="1" comment="glibc-32bit is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099555" version="1" comment="glibc-devel is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099554" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099557" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099561" version="1" comment="glibc-locale is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099559" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099567" version="1" comment="nscd is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099556" version="1" comment="glibc-html is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099558" version="1" comment="glibc-info is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099564" version="1" comment="glibc-profile is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099562" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093050" version="1" comment="flash-player is &lt;11.2.202.335-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093048" version="1" comment="flash-player-gnome is &lt;11.2.202.335-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093049" version="1" comment="flash-player-kde4 is &lt;11.2.202.335-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093636" version="1" comment="flash-player is &lt;11.2.202.341-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093634" version="1" comment="flash-player-gnome is &lt;11.2.202.341-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093635" version="1" comment="flash-player-kde4 is &lt;11.2.202.341-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098792" version="1" comment="flash-player is &lt;11.2.202.346-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098790" version="1" comment="flash-player-gnome is &lt;11.2.202.346-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098791" version="1" comment="flash-player-kde4 is &lt;11.2.202.346-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098884" version="1" comment="flash-player is &lt;11.2.202.350-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098882" version="1" comment="flash-player-gnome is &lt;11.2.202.350-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098883" version="1" comment="flash-player-kde4 is &lt;11.2.202.350-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098887" version="1" comment="flash-player is &lt;11.2.202.359-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098885" version="1" comment="flash-player-gnome is &lt;11.2.202.359-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098886" version="1" comment="flash-player-kde4 is &lt;11.2.202.359-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098890" version="1" comment="flash-player is &lt;11.2.202.356-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098888" version="1" comment="flash-player-gnome is &lt;11.2.202.356-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098889" version="1" comment="flash-player-kde4 is &lt;11.2.202.356-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098893" version="1" comment="flash-player is &lt;11.2.202.378-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098891" version="1" comment="flash-player-gnome is &lt;11.2.202.378-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098892" version="1" comment="flash-player-kde4 is &lt;11.2.202.378-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098896" version="1" comment="flash-player is &lt;11.2.202.394-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098894" version="1" comment="flash-player-gnome is &lt;11.2.202.394-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098895" version="1" comment="flash-player-kde4 is &lt;11.2.202.394-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099582" version="1" comment="flash-player is &lt;11.2.202.400-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099580" version="1" comment="flash-player-gnome is &lt;11.2.202.400-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099581" version="1" comment="flash-player-kde4 is &lt;11.2.202.400-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100164" version="1" comment="flash-player is &lt;11.2.202.406-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100162" version="1" comment="flash-player-gnome is &lt;11.2.202.406-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100163" version="1" comment="flash-player-kde4 is &lt;11.2.202.406-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101156" version="1" comment="flash-player is &lt;11.2.202.411-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101154" version="1" comment="flash-player-gnome is &lt;11.2.202.411-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101155" version="1" comment="flash-player-kde4 is &lt;11.2.202.411-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102900" version="1" comment="flash-player is &lt;11.2.202.425-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102898" version="1" comment="flash-player-gnome is &lt;11.2.202.425-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102899" version="1" comment="flash-player-kde4 is &lt;11.2.202.425-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107655" version="1" comment="bind is &lt;9.6ESVR11W1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107650" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107651" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107653" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107652" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107654" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098911" version="1" comment="ImageMagick is &lt;6.4.3.6-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098913" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098687" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098686" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098915" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098910" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098912" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098914" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098916" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098695" version="1" comment="file is &lt;4.24-43.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098693" version="1" comment="file-32bit is &lt;4.24-43.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098918" version="1" comment="file-devel is &lt;4.24-43.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098919" version="1" comment="python-magic is &lt;4.24-43.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098696" version="1" comment="wireshark is &lt;1.8.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098920" version="1" comment="wireshark-devel is &lt;1.8.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098699" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098697" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098700" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098701" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098702" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098922" version="1" comment="net-snmp-devel is &lt;5.4.2.1-8.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098704" version="1" comment="strongswan is &lt;4.4.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098703" version="1" comment="strongswan-doc is &lt;4.4.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099250" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.65-0.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099248" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.65-0.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099249" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.65-0.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104225" version="1" comment="kernel-default is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104223" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104224" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104228" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104226" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104227" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104229" version="1" comment="kernel-source is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104230" version="1" comment="kernel-syms is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104233" version="1" comment="kernel-trace is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104231" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104232" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104236" version="1" comment="kernel-xen is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104234" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104235" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104237" version="1" comment="xen-kmp-default is &lt;4.1.6_06_3.0.101_0.7.21-0.5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104238" version="1" comment="xen-kmp-trace is &lt;4.1.6_06_3.0.101_0.7.21-0.5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104244" version="1" comment="gnutls is &lt;2.4.1-24.39.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104245" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104247" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104246" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098749" version="1" comment="dbus-1 is &lt;1.2.10-3.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098746" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098747" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098940" version="1" comment="dbus-1-devel is &lt;1.2.10-3.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098939" version="1" comment="dbus-1-devel-doc is &lt;1.2.10-3.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099800" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099796" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099802" version="1" comment="openssl is &lt;0.9.8j-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104251" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104248" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104250" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104249" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104253" version="1" comment="openssl is &lt;0.9.8j-0.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104252" version="1" comment="openssl-doc is &lt;0.9.8j-0.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099798" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099797" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099801" version="1" comment="openssl-doc is &lt;0.9.8j-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100674" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100677" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100675" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100679" version="1" comment="openssl1 is &lt;1.0.1g-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100678" version="1" comment="openssl1-doc is &lt;1.0.1g-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099803" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106319" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.75-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106317" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.75-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106318" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.75-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105676" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105675" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105667" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105666" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105668" version="1" comment="openssl is &lt;0.9.8j-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105665" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105670" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105669" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105672" version="1" comment="openssl-doc is &lt;0.9.8j-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105677" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105680" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105678" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105682" version="1" comment="openssl1 is &lt;1.0.1g-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105681" version="1" comment="openssl1-doc is &lt;1.0.1g-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105479" version="1" comment="subversion is &lt;1.6.17-1.31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105474" version="1" comment="subversion-devel is &lt;1.6.17-1.31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105475" version="1" comment="subversion-perl is &lt;1.6.17-1.31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105476" version="1" comment="subversion-python is &lt;1.6.17-1.31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105477" version="1" comment="subversion-server is &lt;1.6.17-1.31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105478" version="1" comment="subversion-tools is &lt;1.6.17-1.31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102698" version="1" comment="libpurple-meanwhile is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102699" version="1" comment="libpurple-tcl is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098765" version="1" comment="glibc is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098752" version="1" comment="glibc-32bit is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098754" version="1" comment="glibc-devel is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098753" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098756" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098760" version="1" comment="glibc-locale is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098758" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098766" version="1" comment="nscd is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098755" version="1" comment="glibc-html is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098757" version="1" comment="glibc-info is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098763" version="1" comment="glibc-profile is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098761" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100595" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112874" version="1" comment="php53 is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100596" version="1" comment="php53-bcmath is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100597" version="1" comment="php53-bz2 is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100598" version="1" comment="php53-calendar is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100599" version="1" comment="php53-ctype is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100600" version="1" comment="php53-curl is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100601" version="1" comment="php53-dba is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100602" version="1" comment="php53-dom is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100603" version="1" comment="php53-exif is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100604" version="1" comment="php53-fastcgi is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100605" version="1" comment="php53-fileinfo is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100606" version="1" comment="php53-ftp is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100607" version="1" comment="php53-gd is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100608" version="1" comment="php53-gettext is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100609" version="1" comment="php53-gmp is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100610" version="1" comment="php53-iconv is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100611" version="1" comment="php53-intl is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100612" version="1" comment="php53-json is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100613" version="1" comment="php53-ldap is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100614" version="1" comment="php53-mbstring is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100615" version="1" comment="php53-mcrypt is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100616" version="1" comment="php53-mysql is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100617" version="1" comment="php53-odbc is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100618" version="1" comment="php53-openssl is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100619" version="1" comment="php53-pcntl is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100620" version="1" comment="php53-pdo is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100621" version="1" comment="php53-pear is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100622" version="1" comment="php53-pgsql is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100623" version="1" comment="php53-pspell is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100624" version="1" comment="php53-shmop is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100625" version="1" comment="php53-snmp is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100626" version="1" comment="php53-soap is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100627" version="1" comment="php53-suhosin is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100628" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100629" version="1" comment="php53-sysvsem is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100630" version="1" comment="php53-sysvshm is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100631" version="1" comment="php53-tokenizer is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100632" version="1" comment="php53-wddx is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100633" version="1" comment="php53-xmlreader is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100634" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100635" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100636" version="1" comment="php53-xsl is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100637" version="1" comment="php53-zip is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100638" version="1" comment="php53-zlib is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100640" version="1" comment="php53-devel is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100641" version="1" comment="php53-imap is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100642" version="1" comment="php53-posix is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100643" version="1" comment="php53-readline is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100644" version="1" comment="php53-sockets is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100645" version="1" comment="php53-sqlite is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100646" version="1" comment="php53-tidy is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099586" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr7.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099583" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr7.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099584" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr7.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099585" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr7.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099587" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr7.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099849" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099846" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099847" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099848" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099850" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099395" version="1" comment="krb5 is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099386" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099389" version="1" comment="krb5-client is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099387" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099388" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099390" version="1" comment="krb5-doc is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099391" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099392" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099393" version="1" comment="krb5-server is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099397" version="1" comment="krb5-devel is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099396" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100726" version="1" comment="bash is &lt;3.2-147.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100724" version="1" comment="bash-doc is &lt;3.2-147.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100729" version="1" comment="libreadline5 is &lt;5.2-147.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100727" version="1" comment="libreadline5-32bit is &lt;5.2-147.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100730" version="1" comment="readline-doc is &lt;5.2-147.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104255" version="1" comment="bash is &lt;3.2-147.14.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104254" version="1" comment="bash-doc is &lt;3.2-147.14.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104257" version="1" comment="libreadline5 is &lt;5.2-147.14.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104256" version="1" comment="libreadline5-32bit is &lt;5.2-147.14.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104258" version="1" comment="readline-doc is &lt;5.2-147.14.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100733" version="1" comment="readline-devel is &lt;5.2-147.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100732" version="1" comment="readline-devel-32bit is &lt;5.2-147.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100812" version="1" comment="wireshark is &lt;1.10.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100814" version="1" comment="wireshark-devel is &lt;1.10.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110806" version="1" comment="kernel-default is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110804" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110805" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110816" version="1" comment="kernel-default-extra is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110807" version="1" comment="kernel-source is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110808" version="1" comment="kernel-syms is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110810" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110824" version="1" comment="kernel-xen is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110821" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110822" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110823" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110825" version="1" comment="xen-kmp-default is &lt;4.2.5_08_3.0.101_0.47.55-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117336" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.47.55-2.28.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132805" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.47.55-2.28.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117337" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.47.55-2.28.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117339" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.47.55-0.17.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132806" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.47.55-0.17.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117340" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.47.55-0.17.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117342" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.47.55-0.21.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132807" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.47.55-0.21.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117343" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.47.55-0.21.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117345" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.33.38-2.28.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117346" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.33.38-2.28.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117347" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.33.38-0.23.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117348" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.33.38-0.23.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117349" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.33.38-0.39.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117350" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.33.38-0.39.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117351" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.33.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117352" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.33.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117353" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.33.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117354" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.33.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117355" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.33.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117356" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.33.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117357" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.33.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117358" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.33.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117359" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.33.38-0.12.1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117360" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.33.38-0.12.1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117361" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.33.38-0.21.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117362" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.33.38-0.21.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117363" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.33.38-0.14.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117364" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.33.38-0.14.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110829" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110827" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110828" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110811" version="1" comment="kernel-trace is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110809" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105126" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105128" version="1" comment="xorg-x11-server is &lt;7.4-27.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105127" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105125" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104266" version="1" comment="kernel-default is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104264" version="1" comment="kernel-default-base is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104265" version="1" comment="kernel-default-devel is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104269" version="1" comment="kernel-ec2 is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104267" version="1" comment="kernel-ec2-base is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104268" version="1" comment="kernel-ec2-devel is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104270" version="1" comment="kernel-source is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104271" version="1" comment="kernel-syms is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104274" version="1" comment="kernel-trace is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104272" version="1" comment="kernel-trace-base is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104273" version="1" comment="kernel-trace-devel is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104277" version="1" comment="kernel-xen is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104275" version="1" comment="kernel-xen-base is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104276" version="1" comment="kernel-xen-devel is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104278" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.17-0.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104279" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.17-0.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104282" version="1" comment="kernel-default is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104280" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104281" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104285" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104283" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104284" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104286" version="1" comment="kernel-source is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104287" version="1" comment="kernel-syms is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104290" version="1" comment="kernel-trace is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104288" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104289" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104293" version="1" comment="kernel-xen is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104291" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104292" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104294" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.27-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104295" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.27-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105170" version="1" comment="unzip is &lt;6.00-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106537" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112866" version="1" comment="php53 is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106538" version="1" comment="php53-bcmath is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106539" version="1" comment="php53-bz2 is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106540" version="1" comment="php53-calendar is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106541" version="1" comment="php53-ctype is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106542" version="1" comment="php53-curl is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106543" version="1" comment="php53-dba is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106544" version="1" comment="php53-dom is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106545" version="1" comment="php53-exif is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106546" version="1" comment="php53-fastcgi is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106547" version="1" comment="php53-fileinfo is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106548" version="1" comment="php53-ftp is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106549" version="1" comment="php53-gd is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106550" version="1" comment="php53-gettext is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106551" version="1" comment="php53-gmp is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106552" version="1" comment="php53-iconv is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106553" version="1" comment="php53-intl is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106554" version="1" comment="php53-json is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106555" version="1" comment="php53-ldap is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106556" version="1" comment="php53-mbstring is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106557" version="1" comment="php53-mcrypt is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106558" version="1" comment="php53-mysql is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106559" version="1" comment="php53-odbc is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106560" version="1" comment="php53-openssl is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106561" version="1" comment="php53-pcntl is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106562" version="1" comment="php53-pdo is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106563" version="1" comment="php53-pear is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106564" version="1" comment="php53-pgsql is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106565" version="1" comment="php53-pspell is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106566" version="1" comment="php53-shmop is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106567" version="1" comment="php53-snmp is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106568" version="1" comment="php53-soap is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106569" version="1" comment="php53-suhosin is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106570" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106571" version="1" comment="php53-sysvsem is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106572" version="1" comment="php53-sysvshm is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106573" version="1" comment="php53-tokenizer is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106574" version="1" comment="php53-wddx is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106575" version="1" comment="php53-xmlreader is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106576" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106577" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106578" version="1" comment="php53-xsl is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106579" version="1" comment="php53-zip is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106580" version="1" comment="php53-zlib is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106530" version="1" comment="php53-devel is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106531" version="1" comment="php53-imap is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106532" version="1" comment="php53-posix is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106533" version="1" comment="php53-readline is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106534" version="1" comment="php53-sockets is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106535" version="1" comment="php53-sqlite is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106536" version="1" comment="php53-tidy is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110855" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110858" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110856" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110860" version="1" comment="openssl1 is &lt;1.0.1g-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110859" version="1" comment="openssl1-doc is &lt;1.0.1g-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102442" version="1" comment="flash-player is &lt;11.2.202.424-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102440" version="1" comment="flash-player-gnome is &lt;11.2.202.424-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102441" version="1" comment="flash-player-kde4 is &lt;11.2.202.424-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103743" version="1" comment="bind-libs is &lt;9.9.6P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103742" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103744" version="1" comment="bind-utils is &lt;9.9.6P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103748" version="1" comment="bind is &lt;9.9.6P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103745" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103746" version="1" comment="bind-doc is &lt;9.9.6P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103741" version="1" comment="bind-devel is &lt;9.9.6P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103199" version="1" comment="tcpdump is &lt;3.9.8-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106877" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.3-0.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106874" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.3-0.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106875" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.3-0.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106876" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.3-0.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106873" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.3-0.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106305" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr8.10-0.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106299" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr8.10-0.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106300" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr8.10-0.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106302" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr8.10-0.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106304" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr8.10-0.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106327" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106326" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106329" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106330" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106324" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr8.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106321" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr8.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106322" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr8.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106323" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr8.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106325" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106320" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr8.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103121" version="1" comment="ntp is &lt;4.2.4p8-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103120" version="1" comment="ntp-doc is &lt;4.2.4p8-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107554" version="1" comment="clamav is &lt;0.98.6-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108083" version="1" comment="cups is &lt;1.3.9-8.46.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108080" version="1" comment="cups-client is &lt;1.3.9-8.46.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108082" version="1" comment="cups-libs is &lt;1.3.9-8.46.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108081" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108079" version="1" comment="cups-devel is &lt;1.3.9-8.46.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110595" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110592" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110593" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110594" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110596" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110668" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110664" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110666" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110667" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107939" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107942" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107940" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107944" version="1" comment="openssl1 is &lt;1.0.1g-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107943" version="1" comment="openssl1-doc is &lt;1.0.1g-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105518" version="1" comment="glibc is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105512" version="1" comment="glibc-32bit is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105514" version="1" comment="glibc-devel is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105513" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105515" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105517" version="1" comment="glibc-locale is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105516" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105519" version="1" comment="nscd is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105547" version="1" comment="glibc is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105537" version="1" comment="glibc-32bit is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105539" version="1" comment="glibc-devel is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105538" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105540" version="1" comment="glibc-html is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105541" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105542" version="1" comment="glibc-info is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105544" version="1" comment="glibc-locale is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105543" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105546" version="1" comment="glibc-profile is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105545" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105548" version="1" comment="nscd is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105508" version="1" comment="glibc is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105498" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105500" version="1" comment="glibc-devel is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105499" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105501" version="1" comment="glibc-html is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105502" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105503" version="1" comment="glibc-info is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105505" version="1" comment="glibc-locale is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105504" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105507" version="1" comment="glibc-profile is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105506" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105509" version="1" comment="nscd is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105510" version="1" comment="glibc-html is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105511" version="1" comment="glibc-info is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105523" version="1" comment="glibc-profile is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105521" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106850" version="1" comment="ldapsmb is &lt;1.34b-12.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106851" version="1" comment="libldb1 is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106853" version="1" comment="libsmbclient0 is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106852" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106855" version="1" comment="libtalloc1 is &lt;3.4.3-1.54.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106854" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.54.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106857" version="1" comment="libtalloc2 is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106856" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106859" version="1" comment="libtdb1 is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106858" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106861" version="1" comment="libtevent0 is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106860" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106863" version="1" comment="libwbclient0 is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106862" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106871" version="1" comment="samba is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106864" version="1" comment="samba-32bit is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106866" version="1" comment="samba-client is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106865" version="1" comment="samba-client-32bit is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106867" version="1" comment="samba-doc is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106868" version="1" comment="samba-krb-printing is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106870" version="1" comment="samba-winbind is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106869" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107005" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107007" version="1" comment="xorg-x11-server is &lt;7.4-27.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107006" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107004" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105131" version="1" comment="flash-player is &lt;11.2.202.429-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105129" version="1" comment="flash-player-gnome is &lt;11.2.202.429-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105130" version="1" comment="flash-player-kde4 is &lt;11.2.202.429-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105307" version="1" comment="flash-player is &lt;11.2.202.438-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105305" version="1" comment="flash-player-gnome is &lt;11.2.202.438-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105306" version="1" comment="flash-player-kde4 is &lt;11.2.202.438-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105663" version="1" comment="flash-player is &lt;11.2.202.440-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105661" version="1" comment="flash-player-gnome is &lt;11.2.202.440-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105662" version="1" comment="flash-player-kde4 is &lt;11.2.202.440-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105930" version="1" comment="flash-player is &lt;11.2.202.442-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105928" version="1" comment="flash-player-gnome is &lt;11.2.202.442-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105929" version="1" comment="flash-player-kde4 is &lt;11.2.202.442-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107676" version="1" comment="flash-player is &lt;11.2.202.451-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107674" version="1" comment="flash-player-gnome is &lt;11.2.202.451-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107675" version="1" comment="flash-player-kde4 is &lt;11.2.202.451-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108882" version="1" comment="flash-player is &lt;11.2.202.457-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108880" version="1" comment="flash-player-gnome is &lt;11.2.202.457-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108881" version="1" comment="flash-player-kde4 is &lt;11.2.202.457-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109221" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.75-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109219" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.75-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109220" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.75-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107009" version="1" comment="wireshark is &lt;1.10.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107008" version="1" comment="wireshark-devel is &lt;1.10.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107558" version="1" comment="MozillaFirefox is &lt;31.5.0esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107557" version="1" comment="MozillaFirefox-translations is &lt;31.5.0esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107220" version="1" comment="MozillaFirefox is &lt;31.5.0esr-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107219" version="1" comment="MozillaFirefox-translations is &lt;31.5.0esr-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107556" version="1" comment="MozillaFirefox-devel is &lt;31.5.0esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111035" version="1" comment="bind-libs is &lt;9.9.6P1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111034" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111036" version="1" comment="bind-utils is &lt;9.9.6P1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111040" version="1" comment="bind is &lt;9.9.6P1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111037" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111038" version="1" comment="bind-doc is &lt;9.9.6P1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111033" version="1" comment="bind-devel is &lt;9.9.6P1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109606" version="1" comment="kvm is &lt;1.4.2-0.22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110865" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110862" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110867" version="1" comment="openssl is &lt;0.9.8j-0.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110864" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110863" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110866" version="1" comment="openssl-doc is &lt;0.9.8j-0.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110831" version="1" comment="ntp is &lt;4.2.4p8-1.29.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110830" version="1" comment="ntp-doc is &lt;4.2.4p8-1.29.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109613" version="1" comment="flash-player is &lt;11.2.202.460-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109611" version="1" comment="flash-player-gnome is &lt;11.2.202.460-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109612" version="1" comment="flash-player-kde4 is &lt;11.2.202.460-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110497" version="1" comment="flash-player is &lt;11.2.202.466-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110495" version="1" comment="flash-player-gnome is &lt;11.2.202.466-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110496" version="1" comment="flash-player-kde4 is &lt;11.2.202.466-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110681" version="1" comment="flash-player is &lt;11.2.202.468-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110679" version="1" comment="flash-player-gnome is &lt;11.2.202.468-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110680" version="1" comment="flash-player-kde4 is &lt;11.2.202.468-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112906" version="1" comment="kvm is &lt;1.4.2-0.22.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109877" version="1" comment="xen is &lt;4.1.6_08-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109868" version="1" comment="xen-doc-html is &lt;4.1.6_08-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109869" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109870" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109871" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.29-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109872" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109874" version="1" comment="xen-libs is &lt;4.1.6_08-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109873" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109876" version="1" comment="xen-tools is &lt;4.1.6_08-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109875" version="1" comment="xen-tools-domU is &lt;4.1.6_08-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111232" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112869" version="1" comment="php53 is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111233" version="1" comment="php53-bcmath is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111234" version="1" comment="php53-bz2 is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111235" version="1" comment="php53-calendar is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111236" version="1" comment="php53-ctype is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111237" version="1" comment="php53-curl is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111238" version="1" comment="php53-dba is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111239" version="1" comment="php53-dom is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111240" version="1" comment="php53-exif is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111241" version="1" comment="php53-fastcgi is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111242" version="1" comment="php53-fileinfo is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111243" version="1" comment="php53-ftp is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111244" version="1" comment="php53-gd is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111245" version="1" comment="php53-gettext is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111246" version="1" comment="php53-gmp is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111247" version="1" comment="php53-iconv is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111248" version="1" comment="php53-intl is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111249" version="1" comment="php53-json is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111250" version="1" comment="php53-ldap is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111251" version="1" comment="php53-mbstring is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111252" version="1" comment="php53-mcrypt is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111253" version="1" comment="php53-mysql is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111254" version="1" comment="php53-odbc is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111255" version="1" comment="php53-openssl is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111256" version="1" comment="php53-pcntl is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111257" version="1" comment="php53-pdo is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111258" version="1" comment="php53-pear is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111259" version="1" comment="php53-pgsql is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111260" version="1" comment="php53-pspell is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111261" version="1" comment="php53-shmop is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111262" version="1" comment="php53-snmp is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111263" version="1" comment="php53-soap is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111264" version="1" comment="php53-suhosin is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111265" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111266" version="1" comment="php53-sysvsem is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111267" version="1" comment="php53-sysvshm is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111268" version="1" comment="php53-tokenizer is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111269" version="1" comment="php53-wddx is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111270" version="1" comment="php53-xmlreader is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111271" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111272" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111273" version="1" comment="php53-xsl is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111274" version="1" comment="php53-zip is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111275" version="1" comment="php53-zlib is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111225" version="1" comment="php53-devel is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111226" version="1" comment="php53-imap is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111227" version="1" comment="php53-posix is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111228" version="1" comment="php53-readline is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111229" version="1" comment="php53-sockets is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111230" version="1" comment="php53-sqlite is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111231" version="1" comment="php53-tidy is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109635" version="1" comment="kvm is &lt;1.4.2-0.22.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109905" version="1" comment="kvm is &lt;0.15.1-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110628" version="1" comment="wireshark is &lt;1.10.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110627" version="1" comment="wireshark-devel is &lt;1.10.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110837" version="1" comment="libmysql55client18 is &lt;5.5.43-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110836" version="1" comment="libmysql55client18-32bit is &lt;5.5.43-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110838" version="1" comment="libmysql55client_r18 is &lt;5.5.43-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110832" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.43-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110840" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110839" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110841" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110834" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110843" version="1" comment="mysql is &lt;5.5.43-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110842" version="1" comment="mysql-client is &lt;5.5.43-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111119" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.8.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111118" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.8.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111120" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.8.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111124" version="1" comment="mysql is &lt;5.0.96-0.8.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111121" version="1" comment="mysql-Max is &lt;5.0.96-0.8.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111122" version="1" comment="mysql-client is &lt;5.0.96-0.8.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111123" version="1" comment="mysql-tools is &lt;5.0.96-0.8.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110846" version="1" comment="mysql-tools is &lt;5.5.43-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111126" version="1" comment="strongswan is &lt;4.4.0-6.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111125" version="1" comment="strongswan-doc is &lt;4.4.0-6.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118193" version="1" comment="suse-cloud-release is ==5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128657" version="1" comment="bind is &lt;9.9.6P1-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128658" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128659" version="1" comment="bind-doc is &lt;9.9.6P1-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128660" version="1" comment="bind-libs is &lt;9.9.6P1-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128661" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128662" version="1" comment="bind-utils is &lt;9.9.6P1-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136713" version="1" comment="crowbar-barclamp-trove is &lt;1.9+git.1473844105.932298f-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118194" version="1" comment="haproxy is &lt;1.5.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118195" version="1" comment="haproxy is &lt;1.5.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118196" version="1" comment="mongodb is &lt;2.4.3-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118197" version="1" comment="crowbar-barclamp-neutron is &lt;1.9+git.1443859419.95e948a-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118198" version="1" comment="openstack-neutron is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118199" version="1" comment="openstack-neutron-dhcp-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118200" version="1" comment="openstack-neutron-doc is &lt;2014.2.4~a0~dev103-16.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118201" version="1" comment="openstack-neutron-ha-tool is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118202" version="1" comment="openstack-neutron-ibm-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118203" version="1" comment="openstack-neutron-l3-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118204" version="1" comment="openstack-neutron-lbaas-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118205" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118206" version="1" comment="openstack-neutron-metadata-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118207" version="1" comment="openstack-neutron-metering-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118208" version="1" comment="openstack-neutron-mlnx-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118209" version="1" comment="openstack-neutron-nec-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118210" version="1" comment="openstack-neutron-nvsd-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118211" version="1" comment="openstack-neutron-openvswitch-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118212" version="1" comment="openstack-neutron-plugin-cisco is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118213" version="1" comment="openstack-neutron-restproxy-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118214" version="1" comment="openstack-neutron-ryu-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118215" version="1" comment="openstack-neutron-server is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118216" version="1" comment="openstack-neutron-vpn-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118217" version="1" comment="python-neutron is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118218" version="1" comment="novnc is &lt;0.4-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126236" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126237" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126238" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126239" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126240" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126241" version="1" comment="openssl is &lt;0.9.8j-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126242" version="1" comment="openssl-doc is &lt;0.9.8j-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118219" version="1" comment="openstack-ceilometer is &lt;2014.2.4.dev18-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118220" version="1" comment="openstack-ceilometer-agent-central is &lt;2014.2.4.dev18-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118221" version="1" comment="openstack-ceilometer-agent-compute is &lt;2014.2.4.dev18-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118222" version="1" comment="openstack-ceilometer-agent-ipmi is &lt;2014.2.4.dev18-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118223" version="1" comment="openstack-ceilometer-agent-notification is &lt;2014.2.4.dev18-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118224" version="1" comment="openstack-ceilometer-alarm-evaluator is &lt;2014.2.4.dev18-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118225" version="1" comment="openstack-ceilometer-alarm-notifier is &lt;2014.2.4.dev18-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118226" version="1" comment="openstack-ceilometer-api is &lt;2014.2.4.dev18-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118227" version="1" comment="openstack-ceilometer-collector is &lt;2014.2.4.dev18-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118228" version="1" comment="openstack-ceilometer-doc is &lt;2014.2.4.dev18-9.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118229" version="1" comment="openstack-cinder is &lt;2014.2.4.dev19-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118230" version="1" comment="openstack-cinder-api is &lt;2014.2.4.dev19-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118231" version="1" comment="openstack-cinder-backup is &lt;2014.2.4.dev19-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118232" version="1" comment="openstack-cinder-doc is &lt;2014.2.4.dev19-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118233" version="1" comment="openstack-cinder-scheduler is &lt;2014.2.4.dev19-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118234" version="1" comment="openstack-cinder-volume is &lt;2014.2.4.dev19-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118235" version="1" comment="openstack-glance is &lt;2014.2.4.dev5-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118236" version="1" comment="openstack-glance-doc is &lt;2014.2.4.dev5-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118237" version="1" comment="openstack-heat is &lt;2014.2.4.dev13-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118238" version="1" comment="openstack-heat-api is &lt;2014.2.4.dev13-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118239" version="1" comment="openstack-heat-api-cfn is &lt;2014.2.4.dev13-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118240" version="1" comment="openstack-heat-api-cloudwatch is &lt;2014.2.4.dev13-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118241" version="1" comment="openstack-heat-doc is &lt;2014.2.4.dev13-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118242" version="1" comment="openstack-heat-engine is &lt;2014.2.4.dev13-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118243" version="1" comment="openstack-keystone is &lt;2014.2.4.dev5-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118244" version="1" comment="openstack-keystone-doc is &lt;2014.2.4.dev5-11.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118245" version="1" comment="openstack-sahara is &lt;2014.2.4.dev3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118246" version="1" comment="openstack-sahara-api is &lt;2014.2.4.dev3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118247" version="1" comment="openstack-sahara-doc is &lt;2014.2.4.dev3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118248" version="1" comment="openstack-sahara-engine is &lt;2014.2.4.dev3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118249" version="1" comment="openstack-suse is &lt;2014.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118250" version="1" comment="openstack-suse-sudo is &lt;2014.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118251" version="1" comment="python-ceilometer is &lt;2014.2.4.dev18-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118252" version="1" comment="python-cinder is &lt;2014.2.4.dev19-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118253" version="1" comment="python-glance is &lt;2014.2.4.dev5-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118254" version="1" comment="python-heat is &lt;2014.2.4.dev13-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118255" version="1" comment="python-keystone is &lt;2014.2.4.dev5-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118256" version="1" comment="python-oslo.i18n is &lt;1.3.1-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118257" version="1" comment="python-oslo.utils is &lt;1.4.0-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118258" version="1" comment="python-oslotest is &lt;1.2.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118259" version="1" comment="python-sahara is &lt;2014.2.4.dev3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118260" version="1" comment="python-six is &lt;1.9.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118261" version="1" comment="crowbar-barclamp-nova_dashboard is &lt;1.9+git.1443622531.b2b2939-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118262" version="1" comment="openstack-dashboard is &lt;2014.2.4~a0~dev12-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118263" version="1" comment="python-django_openstack_auth is &lt;1.1.7-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118264" version="1" comment="python-horizon is &lt;2014.2.4~a0~dev12-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119003" version="1" comment="openstack-glance is &lt;2014.2.4.juno-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119004" version="1" comment="openstack-glance-doc is &lt;2014.2.4.juno-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119005" version="1" comment="python-glance is &lt;2014.2.4.juno-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132808" version="1" comment="openstack-keystone is &lt;2014.2.4.juno-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132809" version="1" comment="openstack-keystone-doc is &lt;2014.2.4.juno-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132810" version="1" comment="openstack-nova is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132811" version="1" comment="openstack-nova-api is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132812" version="1" comment="openstack-nova-cells is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132813" version="1" comment="openstack-nova-cert is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132814" version="1" comment="openstack-nova-compute is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132815" version="1" comment="openstack-nova-conductor is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132816" version="1" comment="openstack-nova-console is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132817" version="1" comment="openstack-nova-consoleauth is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132818" version="1" comment="openstack-nova-doc is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132819" version="1" comment="openstack-nova-novncproxy is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132820" version="1" comment="openstack-nova-objectstore is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132821" version="1" comment="openstack-nova-scheduler is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132822" version="1" comment="openstack-nova-serialproxy is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132823" version="1" comment="openstack-nova-vncproxy is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132824" version="1" comment="openstack-swift is &lt;2.1.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132825" version="1" comment="openstack-swift-account is &lt;2.1.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132826" version="1" comment="openstack-swift-container is &lt;2.1.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132827" version="1" comment="openstack-swift-doc is &lt;2.1.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132828" version="1" comment="openstack-swift-object is &lt;2.1.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132829" version="1" comment="openstack-swift-proxy is &lt;2.1.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132830" version="1" comment="python-keystone is &lt;2014.2.4.juno-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132831" version="1" comment="python-nova is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132832" version="1" comment="python-swift is &lt;2.1.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118268" version="1" comment="openstack-nova is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118269" version="1" comment="openstack-nova-api is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118270" version="1" comment="openstack-nova-cells is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118271" version="1" comment="openstack-nova-cert is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118272" version="1" comment="openstack-nova-compute is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118273" version="1" comment="openstack-nova-conductor is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118274" version="1" comment="openstack-nova-console is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118275" version="1" comment="openstack-nova-consoleauth is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118276" version="1" comment="openstack-nova-doc is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118277" version="1" comment="openstack-nova-novncproxy is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118278" version="1" comment="openstack-nova-objectstore is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118279" version="1" comment="openstack-nova-scheduler is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118280" version="1" comment="openstack-nova-serialproxy is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118281" version="1" comment="openstack-nova-vncproxy is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118282" version="1" comment="python-nova is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118283" version="1" comment="openstack-swift is &lt;2.1.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118284" version="1" comment="openstack-swift-account is &lt;2.1.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118285" version="1" comment="openstack-swift-container is &lt;2.1.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118286" version="1" comment="openstack-swift-doc is &lt;2.1.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118287" version="1" comment="openstack-swift-object is &lt;2.1.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118288" version="1" comment="openstack-swift-proxy is &lt;2.1.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118289" version="1" comment="python-swift is &lt;2.1.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123026" version="1" comment="openstack-trove is &lt;2014.2.4.juno-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123027" version="1" comment="openstack-trove-api is &lt;2014.2.4.juno-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123028" version="1" comment="openstack-trove-conductor is &lt;2014.2.4.juno-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123029" version="1" comment="openstack-trove-doc is &lt;2014.2.4.juno-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123030" version="1" comment="openstack-trove-guestagent is &lt;2014.2.4.juno-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123031" version="1" comment="openstack-trove-taskmanager is &lt;2014.2.4.juno-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123032" version="1" comment="python-trove is &lt;2014.2.4.juno-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118290" version="1" comment="python-Django is &lt;1.6.11-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118291" version="1" comment="python-Django is &lt;1.6.11-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118655" version="1" comment="python-Django is &lt;1.6.11-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118292" version="1" comment="python-Pillow is &lt;2.7.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125629" version="1" comment="python-Pillow is &lt;2.7.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118293" version="1" comment="python-PyYAML is &lt;3.10-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118294" version="1" comment="python-glanceclient is &lt;0.15.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118295" version="1" comment="python-keystoneclient is &lt;1.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118296" version="1" comment="python-keystoneclient-doc is &lt;1.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118297" version="1" comment="python-keystonemiddleware is &lt;1.2.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118298" version="1" comment="python-novaclient is &lt;2.20.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118299" version="1" comment="python-novaclient-doc is &lt;2.20.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118300" version="1" comment="python-openstackclient is &lt;0.4.1-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118301" version="1" comment="python-requests is &lt;2.3.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118302" version="1" comment="ruby2.1-rubygem-sprockets-2_11 is &lt;2.11.0-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122441" version="1" comment="ruby2.1-rubygem-actionpack-4_1 is &lt;4.1.9-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122442" version="1" comment="rubygem-actionpack-4_1 is &lt;4.1.9-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122443" version="1" comment="ruby2.1-rubygem-actionview-4_1 is &lt;4.1.9-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122444" version="1" comment="rubygem-actionview-4_1 is &lt;4.1.9-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125291" version="1" comment="ruby2.1-rubygem-actionview-4_1 is &lt;4.1.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125292" version="1" comment="rubygem-actionview-4_1 is &lt;4.1.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122445" version="1" comment="ruby2.1-rubygem-activemodel-4_1 is &lt;4.1.9-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122446" version="1" comment="rubygem-activemodel-4_1 is &lt;4.1.9-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122447" version="1" comment="ruby2.1-rubygem-activerecord-4_1 is &lt;4.1.9-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122448" version="1" comment="rubygem-activerecord-4_1 is &lt;4.1.9-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119824" version="1" comment="ruby2.1-rubygem-activesupport-4_1 is &lt;4.1.9-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119825" version="1" comment="rubygem-activesupport-4_1 is &lt;4.1.9-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122449" version="1" comment="ruby2.1-rubygem-activesupport-4_1 is &lt;4.1.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122450" version="1" comment="rubygem-activesupport-4_1 is &lt;4.1.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125293" version="1" comment="ruby2.1-rubygem-activesupport-4_1 is &lt;4.1.9-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125294" version="1" comment="rubygem-activesupport-4_1 is &lt;4.1.9-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132833" version="1" comment="ruby2.1-rubygem-bson-1_11 is &lt;1.11.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132834" version="1" comment="ruby2.1-rubygem-easy_diff is &lt;0.0.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132835" version="1" comment="ruby2.1-rubygem-redcarpet is &lt;3.2.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132836" version="1" comment="ruby2.1-rubygem-sprockets-2_11 is &lt;2.11.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132837" version="1" comment="rubygem-bson-1_11 is &lt;1.11.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132838" version="1" comment="rubygem-easy_diff is &lt;0.0.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132839" version="1" comment="rubygem-redcarpet is &lt;3.2.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132840" version="1" comment="rubygem-sprockets-2_11 is &lt;2.11.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118303" version="1" comment="ruby2.1-rubygem-rack is &lt;1.5.2-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118304" version="1" comment="rubygem-rack is &lt;1.5.2-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147643" version="1" comment="apache2-mod_wsgi is &lt;4.4.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125305" version="1" comment="suse-openstack-cloud-release is ==6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147644" version="1" comment="couchdb is &lt;1.6.1-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147645" version="1" comment="crowbar-openstack is &lt;3.0+git.1456169766.1e60d19-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147646" version="1" comment="dnsmasq-utils is &lt;2.71-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147647" version="1" comment="docker is &lt;1.9.1-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147648" version="1" comment="haproxy is &lt;1.5.14-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147649" version="1" comment="memcached is &lt;1.4.15-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147650" version="1" comment="mongodb is &lt;2.4.14-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147651" version="1" comment="openstack-cinder is &lt;7.0.2~a0~dev1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147652" version="1" comment="openstack-cinder-api is &lt;7.0.2~a0~dev1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147653" version="1" comment="openstack-cinder-backup is &lt;7.0.2~a0~dev1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147654" version="1" comment="openstack-cinder-scheduler is &lt;7.0.2~a0~dev1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147655" version="1" comment="openstack-cinder-volume is &lt;7.0.2~a0~dev1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147656" version="1" comment="python-cinder is &lt;7.0.2~a0~dev1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147657" version="1" comment="openstack-dashboard is &lt;8.0.2~a0~dev7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147658" version="1" comment="python-horizon is &lt;8.0.2~a0~dev7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147659" version="1" comment="openstack-glance is &lt;11.0.2~a0~dev2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147660" version="1" comment="python-glance is &lt;11.0.2~a0~dev2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147661" version="1" comment="openstack-heat is &lt;5.0.2~a0~dev9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147662" version="1" comment="openstack-heat-api is &lt;5.0.2~a0~dev9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147663" version="1" comment="openstack-heat-api-cfn is &lt;5.0.2~a0~dev9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147664" version="1" comment="openstack-heat-api-cloudwatch is &lt;5.0.2~a0~dev9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147665" version="1" comment="openstack-heat-engine is &lt;5.0.2~a0~dev9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147666" version="1" comment="openstack-heat-plugin-heat_docker is &lt;5.0.2~a0~dev9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147667" version="1" comment="python-heat is &lt;5.0.2~a0~dev9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147668" version="1" comment="openstack-heat-templates is &lt;0.0.0+git.1452795102.e53f5d3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147669" version="1" comment="openstack-ironic is &lt;4.2.3~a0~dev14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147670" version="1" comment="openstack-ironic-api is &lt;4.2.3~a0~dev14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147671" version="1" comment="openstack-ironic-conductor is &lt;4.2.3~a0~dev14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147672" version="1" comment="python-ironic is &lt;4.2.3~a0~dev14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147673" version="1" comment="openstack-keystone is &lt;8.0.2~a0~dev8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147674" version="1" comment="python-keystone is &lt;8.0.2~a0~dev8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147675" version="1" comment="openstack-neutron is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147676" version="1" comment="openstack-neutron-dhcp-agent is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147677" version="1" comment="openstack-neutron-ha-tool is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147678" version="1" comment="openstack-neutron-l3-agent is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147679" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147680" version="1" comment="openstack-neutron-metadata-agent is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147681" version="1" comment="openstack-neutron-metering-agent is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147682" version="1" comment="openstack-neutron-mlnx-agent is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147683" version="1" comment="openstack-neutron-nvsd-agent is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147684" version="1" comment="openstack-neutron-openvswitch-agent is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147685" version="1" comment="openstack-neutron-plugin-cisco is &lt;7.0.2~a0~dev63-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147686" version="1" comment="openstack-neutron-restproxy-agent is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147687" version="1" comment="openstack-neutron-server is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147688" version="1" comment="python-neutron is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147689" version="1" comment="openstack-nova is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147690" version="1" comment="openstack-nova-api is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147691" version="1" comment="openstack-nova-cells is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147692" version="1" comment="openstack-nova-cert is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147693" version="1" comment="openstack-nova-compute is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147694" version="1" comment="openstack-nova-conductor is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147695" version="1" comment="openstack-nova-console is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147696" version="1" comment="openstack-nova-consoleauth is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147697" version="1" comment="openstack-nova-novncproxy is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147698" version="1" comment="openstack-nova-objectstore is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147699" version="1" comment="openstack-nova-scheduler is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147700" version="1" comment="openstack-nova-serialproxy is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147701" version="1" comment="openstack-nova-vncproxy is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147702" version="1" comment="python-nova is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147703" version="1" comment="openstack-swift is &lt;2.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147704" version="1" comment="openstack-swift-account is &lt;2.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147705" version="1" comment="openstack-swift-container is &lt;2.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147706" version="1" comment="openstack-swift-object is &lt;2.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147707" version="1" comment="openstack-swift-proxy is &lt;2.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147708" version="1" comment="python-swift is &lt;2.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147709" version="1" comment="openstack-trove is &lt;4.0.1~a0~dev2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147710" version="1" comment="openstack-trove-api is &lt;4.0.1~a0~dev2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147711" version="1" comment="openstack-trove-conductor is &lt;4.0.1~a0~dev2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147712" version="1" comment="openstack-trove-guestagent is &lt;4.0.1~a0~dev2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147713" version="1" comment="openstack-trove-taskmanager is &lt;4.0.1~a0~dev2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147714" version="1" comment="python-trove is &lt;4.0.1~a0~dev2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147715" version="1" comment="python-Beaker is &lt;1.6.4-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147716" version="1" comment="python-Django is &lt;1.8.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147717" version="1" comment="python-Jinja2 is &lt;2.7.3-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147718" version="1" comment="python-Pillow is &lt;2.7.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147719" version="1" comment="python-keystoneclient is &lt;1.7.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147720" version="1" comment="python-keystoneclient-doc is &lt;1.7.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147721" version="1" comment="python-keystonemiddleware is &lt;2.3.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147722" version="1" comment="python-pycrypto is &lt;2.6.1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147723" version="1" comment="python-pymongo is &lt;3.0.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147724" version="1" comment="rabbitmq-server is &lt;3.4.4-2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147725" version="1" comment="rabbitmq-server-plugins is &lt;3.4.4-2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147726" version="1" comment="ruby2.1-rubygem-actionpack-4_2 is &lt;4.2.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147727" version="1" comment="ruby2.1-rubygem-actionview-4_2 is &lt;4.2.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147728" version="1" comment="ruby2.1-rubygem-activemodel-4_2 is &lt;4.2.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147729" version="1" comment="ruby2.1-rubygem-activerecord-4_2 is &lt;4.2.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147730" version="1" comment="ruby2.1-rubygem-activesupport-4_2 is &lt;4.2.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147731" version="1" comment="ruby2.1-rubygem-bson-1_11 is &lt;1.11.1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147732" version="1" comment="ruby2.1-rubygem-chef is &lt;10.32.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147733" version="1" comment="ruby2.1-rubygem-chef-expander is &lt;10.32.2-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147734" version="1" comment="ruby2.1-rubygem-chef-server is &lt;10.32.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147735" version="1" comment="ruby2.1-rubygem-chef-server-api is &lt;10.32.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147736" version="1" comment="ruby2.1-rubygem-chef-solr is &lt;10.32.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147737" version="1" comment="rubygem-chef is &lt;10.32.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147738" version="1" comment="rubygem-chef-expander is &lt;10.32.2-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147739" version="1" comment="rubygem-chef-server-api is &lt;10.32.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147740" version="1" comment="rubygem-chef-solr is &lt;10.32.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147741" version="1" comment="ruby2.1-rubygem-extlib is &lt;0.9.16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147742" version="1" comment="ruby2.1-rubygem-multi_xml is &lt;0.5.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147743" version="1" comment="ruby2.1-rubygem-rack is &lt;1.6.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147744" version="1" comment="ruby2.1-rubygem-rails-html-sanitizer is &lt;1.0.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147745" version="1" comment="ruby2.1-rubygem-railties-4_2 is &lt;4.2.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147746" version="1" comment="ruby2.1-rubygem-sprockets-2_11 is &lt;2.11.3-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130832" version="1" comment="openstack-designate is &lt;1.0.3~a0~dev10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130833" version="1" comment="openstack-designate-agent is &lt;1.0.3~a0~dev10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130834" version="1" comment="openstack-designate-api is &lt;1.0.3~a0~dev10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130835" version="1" comment="openstack-designate-central is &lt;1.0.3~a0~dev10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130836" version="1" comment="openstack-designate-doc is &lt;1.0.3~a0~dev10-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130837" version="1" comment="openstack-designate-sink is &lt;1.0.3~a0~dev10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130838" version="1" comment="openstack-ironic is &lt;4.2.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130839" version="1" comment="openstack-ironic-api is &lt;4.2.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130840" version="1" comment="openstack-ironic-conductor is &lt;4.2.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130841" version="1" comment="openstack-ironic-doc is &lt;4.2.5-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130842" version="1" comment="openstack-neutron-vpn-agent is &lt;7.0.5~a0~dev3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130843" version="1" comment="openstack-neutron-vpnaas is &lt;7.0.5~a0~dev3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130844" version="1" comment="openstack-neutron-vpnaas-doc is &lt;7.0.5~a0~dev3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130845" version="1" comment="openstack-nova-docker is &lt;0.0.1~a0~dev238-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130846" version="1" comment="openstack-sahara is &lt;3.0.3~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130847" version="1" comment="openstack-sahara-api is &lt;3.0.3~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130848" version="1" comment="openstack-sahara-doc is &lt;3.0.3~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130849" version="1" comment="openstack-sahara-engine is &lt;3.0.3~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130850" version="1" comment="openstack-tempest is &lt;7.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130851" version="1" comment="openstack-tempest-test is &lt;7.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130852" version="1" comment="openstack-trove is &lt;4.0.1~a0~dev19-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130853" version="1" comment="openstack-trove-api is &lt;4.0.1~a0~dev19-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130854" version="1" comment="openstack-trove-conductor is &lt;4.0.1~a0~dev19-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130855" version="1" comment="openstack-trove-doc is &lt;4.0.1~a0~dev19-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130856" version="1" comment="openstack-trove-guestagent is &lt;4.0.1~a0~dev19-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130857" version="1" comment="openstack-trove-taskmanager is &lt;4.0.1~a0~dev19-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130858" version="1" comment="python-designate is &lt;1.0.3~a0~dev10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130859" version="1" comment="python-ironic is &lt;4.2.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130860" version="1" comment="python-neutron-vpnaas is &lt;7.0.5~a0~dev3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130861" version="1" comment="python-sahara is &lt;3.0.3~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130862" version="1" comment="python-tempest is &lt;7.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130863" version="1" comment="python-trove is &lt;4.0.1~a0~dev19-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132841" version="1" comment="openstack-ceilometer is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132842" version="1" comment="openstack-ceilometer-agent-central is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132843" version="1" comment="openstack-ceilometer-agent-compute is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132844" version="1" comment="openstack-ceilometer-agent-ipmi is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132845" version="1" comment="openstack-ceilometer-agent-notification is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132846" version="1" comment="openstack-ceilometer-alarm-evaluator is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132847" version="1" comment="openstack-ceilometer-alarm-notifier is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132848" version="1" comment="openstack-ceilometer-api is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132849" version="1" comment="openstack-ceilometer-collector is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132850" version="1" comment="openstack-ceilometer-doc is &lt;5.0.4~a0~dev6-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132851" version="1" comment="openstack-ceilometer-polling is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132852" version="1" comment="openstack-cinder is &lt;7.0.3~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132853" version="1" comment="openstack-cinder-api is &lt;7.0.3~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132854" version="1" comment="openstack-cinder-backup is &lt;7.0.3~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132855" version="1" comment="openstack-cinder-doc is &lt;7.0.3~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132856" version="1" comment="openstack-cinder-scheduler is &lt;7.0.3~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132857" version="1" comment="openstack-cinder-volume is &lt;7.0.3~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132858" version="1" comment="openstack-dashboard is &lt;8.0.2~a0~dev34-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132859" version="1" comment="openstack-glance is &lt;11.0.2~a0~dev13-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132860" version="1" comment="openstack-glance-doc is &lt;11.0.2~a0~dev13-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132861" version="1" comment="openstack-heat is &lt;5.0.2~a0~dev93-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132862" version="1" comment="openstack-heat-api is &lt;5.0.2~a0~dev93-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132863" version="1" comment="openstack-heat-api-cfn is &lt;5.0.2~a0~dev93-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132864" version="1" comment="openstack-heat-api-cloudwatch is &lt;5.0.2~a0~dev93-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132865" version="1" comment="openstack-heat-doc is &lt;5.0.2~a0~dev93-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132866" version="1" comment="openstack-heat-engine is &lt;5.0.2~a0~dev93-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132867" version="1" comment="openstack-heat-plugin-heat_docker is &lt;5.0.2~a0~dev93-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132868" version="1" comment="openstack-keystone is &lt;8.1.1~a0~dev13-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132869" version="1" comment="openstack-keystone-doc is &lt;8.1.1~a0~dev13-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132870" version="1" comment="openstack-manila is &lt;1.0.2~a0~dev11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132871" version="1" comment="openstack-manila-api is &lt;1.0.2~a0~dev11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132872" version="1" comment="openstack-manila-doc is &lt;1.0.2~a0~dev11-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132873" version="1" comment="openstack-manila-scheduler is &lt;1.0.2~a0~dev11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132874" version="1" comment="openstack-manila-share is &lt;1.0.2~a0~dev11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132875" version="1" comment="openstack-neutron is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132876" version="1" comment="openstack-neutron-dhcp-agent is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132877" version="1" comment="openstack-neutron-doc is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132878" version="1" comment="openstack-neutron-fwaas is &lt;7.1.2~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132879" version="1" comment="openstack-neutron-fwaas-doc is &lt;7.1.2~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132880" version="1" comment="openstack-neutron-ha-tool is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132881" version="1" comment="openstack-neutron-l3-agent is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132882" version="1" comment="openstack-neutron-lbaas is &lt;7.1.2~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132883" version="1" comment="openstack-neutron-lbaas-agent is &lt;7.1.2~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132884" version="1" comment="openstack-neutron-lbaas-doc is &lt;7.1.2~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132885" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132886" version="1" comment="openstack-neutron-metadata-agent is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132887" version="1" comment="openstack-neutron-metering-agent is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132888" version="1" comment="openstack-neutron-mlnx-agent is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132889" version="1" comment="openstack-neutron-nvsd-agent is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132890" version="1" comment="openstack-neutron-openvswitch-agent is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132891" version="1" comment="openstack-neutron-restproxy-agent is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132892" version="1" comment="openstack-neutron-server is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132893" version="1" comment="openstack-nova is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132894" version="1" comment="openstack-nova-api is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132895" version="1" comment="openstack-nova-cells is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132896" version="1" comment="openstack-nova-cert is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132897" version="1" comment="openstack-nova-compute is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132898" version="1" comment="openstack-nova-conductor is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132899" version="1" comment="openstack-nova-console is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132900" version="1" comment="openstack-nova-consoleauth is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132901" version="1" comment="openstack-nova-doc is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132902" version="1" comment="openstack-nova-novncproxy is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132903" version="1" comment="openstack-nova-objectstore is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132904" version="1" comment="openstack-nova-scheduler is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132905" version="1" comment="openstack-nova-serialproxy is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132906" version="1" comment="openstack-nova-vncproxy is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132907" version="1" comment="openstack-resource-agents is &lt;1.0+git.1467079370.4f2c49d-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132908" version="1" comment="python-ceilometer is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132909" version="1" comment="python-cinder is &lt;7.0.3~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132910" version="1" comment="python-glance is &lt;11.0.2~a0~dev13-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132911" version="1" comment="python-heat is &lt;5.0.2~a0~dev93-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132912" version="1" comment="python-horizon is &lt;8.0.2~a0~dev34-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132913" version="1" comment="python-keystone is &lt;8.1.1~a0~dev13-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132914" version="1" comment="python-manila is &lt;1.0.2~a0~dev11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132915" version="1" comment="python-networking-cisco is &lt;2.1.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132916" version="1" comment="python-neutron is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132917" version="1" comment="python-neutron-fwaas is &lt;7.1.2~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132918" version="1" comment="python-neutron-lbaas is &lt;7.1.2~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132919" version="1" comment="python-nova is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132920" version="1" comment="python-openstackclient is &lt;1.7.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132921" version="1" comment="openstack-horizon-plugin-manila-ui is &lt;1.2.1~a0~dev2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132922" version="1" comment="python-horizon-plugin-manila-ui is &lt;1.2.1~a0~dev2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134765" version="1" comment="python-suds-jurko is &lt;0.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145858" version="1" comment="dnsmasq-utils is &lt;2.71-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125303" version="1" comment="ruby2.1-rubygem-actionview-4_2 is &lt;4.2.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125304" version="1" comment="rubygem-actionview-4_2 is &lt;4.2.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125652" version="1" comment="python-Pillow is &lt;2.7.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163140" version="1" comment="python-paramiko is &lt;1.15.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164850" version="1" comment="dnsmasq-utils is &lt;2.78-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165633" version="1" comment="ruby2.1-rubygem-actionmailer-4_2 is &lt;4.2.9-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165634" version="1" comment="ruby2.1-rubygem-actionpack-4_2 is &lt;4.2.9-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165635" version="1" comment="ruby2.1-rubygem-actionview-4_2 is &lt;4.2.9-9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165636" version="1" comment="ruby2.1-rubygem-activejob-4_2 is &lt;4.2.9-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165637" version="1" comment="ruby2.1-rubygem-activemodel-4_2 is &lt;4.2.9-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165638" version="1" comment="ruby2.1-rubygem-activerecord-4_2 is &lt;4.2.9-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165639" version="1" comment="ruby2.1-rubygem-activesupport-4_2 is &lt;4.2.9-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165640" version="1" comment="ruby2.1-rubygem-rails-4_2 is &lt;4.2.9-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165641" version="1" comment="ruby2.1-rubygem-rails-html-sanitizer is &lt;1.0.3-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165642" version="1" comment="ruby2.1-rubygem-railties-4_2 is &lt;4.2.9-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165643" version="1" comment="rubygem-actionmailer-4_2 is &lt;4.2.9-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165644" version="1" comment="rubygem-actionpack-4_2 is &lt;4.2.9-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165645" version="1" comment="rubygem-actionview-4_2 is &lt;4.2.9-9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165646" version="1" comment="rubygem-activejob-4_2 is &lt;4.2.9-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165647" version="1" comment="rubygem-activemodel-4_2 is &lt;4.2.9-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165648" version="1" comment="rubygem-activerecord-4_2 is &lt;4.2.9-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165649" version="1" comment="rubygem-activesupport-4_2 is &lt;4.2.9-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165650" version="1" comment="rubygem-rails-4_2 is &lt;4.2.9-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165651" version="1" comment="rubygem-rails-html-sanitizer is &lt;1.0.3-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165652" version="1" comment="rubygem-railties-4_2 is &lt;4.2.9-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149006" version="1" comment="python-defusedxml is &lt;0.4.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149007" version="1" comment="python-pysaml2 is &lt;2.4.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150252" version="1" comment="python-oslo.middleware is &lt;2.8.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172080" version="1" comment="openvswitch is &lt;2.5.1-6.4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172081" version="1" comment="openvswitch-kmp-default is &lt;2.5.1_k3.12.74_60.64.69-6.4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172082" version="1" comment="openvswitch-kmp-xen is &lt;2.5.1_k3.12.74_60.64.69-6.4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172083" version="1" comment="openvswitch-switch is &lt;2.5.1-6.4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173874" version="1" comment="memcached is &lt;1.4.39-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175162" version="1" comment="python-Django is &lt;1.8.19-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175163" version="1" comment="crowbar-openstack is &lt;3.0+git.1521471181.2b39130da-39.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147747" version="1" comment="openstack-cinder is &lt;7.0.2~a0~dev30-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147748" version="1" comment="openstack-cinder-api is &lt;7.0.2~a0~dev30-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147749" version="1" comment="openstack-cinder-backup is &lt;7.0.2~a0~dev30-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147750" version="1" comment="openstack-cinder-scheduler is &lt;7.0.2~a0~dev30-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147751" version="1" comment="openstack-cinder-volume is &lt;7.0.2~a0~dev30-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147752" version="1" comment="python-cinder is &lt;7.0.2~a0~dev30-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147753" version="1" comment="openstack-keystone is &lt;8.0.2~a0~dev34-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147754" version="1" comment="python-keystone is &lt;8.0.2~a0~dev34-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147755" version="1" comment="ruby2.1-rubygem-actionpack-4_2 is &lt;4.2.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147756" version="1" comment="ruby2.1-rubygem-activesupport-4_2 is &lt;4.2.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147757" version="1" comment="openstack-glance is &lt;11.0.2~a0~dev7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147758" version="1" comment="python-glance is &lt;11.0.2~a0~dev7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154488" version="1" comment="suse-openstack-cloud-release is ==7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163141" version="1" comment="python-XStatic-jquery-ui is &lt;1.11.0.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164851" version="1" comment="openstack-glance is &lt;13.0.1~a0~dev6-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164852" version="1" comment="openstack-glance-api is &lt;13.0.1~a0~dev6-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164853" version="1" comment="openstack-glance-doc is &lt;13.0.1~a0~dev6-4.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164854" version="1" comment="openstack-glance-glare is &lt;13.0.1~a0~dev6-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164855" version="1" comment="openstack-glance-registry is &lt;13.0.1~a0~dev6-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164856" version="1" comment="python-glance is &lt;13.0.1~a0~dev6-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164857" version="1" comment="openstack-aodh is &lt;3.0.4~a0~dev1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164858" version="1" comment="openstack-aodh-api is &lt;3.0.4~a0~dev1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164859" version="1" comment="openstack-aodh-doc is &lt;3.0.4~a0~dev1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164860" version="1" comment="openstack-aodh-evaluator is &lt;3.0.4~a0~dev1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164861" version="1" comment="openstack-aodh-expirer is &lt;3.0.4~a0~dev1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164862" version="1" comment="openstack-aodh-listener is &lt;3.0.4~a0~dev1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164863" version="1" comment="openstack-aodh-notifier is &lt;3.0.4~a0~dev1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164864" version="1" comment="python-aodh is &lt;3.0.4~a0~dev1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166986" version="1" comment="ansible is &lt;2.2.3.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166987" version="1" comment="monasca-installer is &lt;20170912_10.45-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166929" version="1" comment="storm is &lt;1.0.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166930" version="1" comment="storm-nimbus is &lt;1.0.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166931" version="1" comment="storm-supervisor is &lt;1.0.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167143" version="1" comment="openstack-nova is &lt;14.0.10~dev13-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167144" version="1" comment="openstack-nova-api is &lt;14.0.10~dev13-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167145" version="1" comment="openstack-nova-cells is &lt;14.0.10~dev13-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167146" version="1" comment="openstack-nova-cert is &lt;14.0.10~dev13-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167147" version="1" comment="openstack-nova-compute is &lt;14.0.10~dev13-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167148" version="1" comment="openstack-nova-conductor is &lt;14.0.10~dev13-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167149" version="1" comment="openstack-nova-console is &lt;14.0.10~dev13-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167150" version="1" comment="openstack-nova-consoleauth is &lt;14.0.10~dev13-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167151" version="1" comment="openstack-nova-doc is &lt;14.0.10~dev13-4.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167152" version="1" comment="openstack-nova-novncproxy is &lt;14.0.10~dev13-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167153" version="1" comment="openstack-nova-placement-api is &lt;14.0.10~dev13-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167154" version="1" comment="openstack-nova-scheduler is &lt;14.0.10~dev13-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167155" version="1" comment="openstack-nova-serialproxy is &lt;14.0.10~dev13-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167156" version="1" comment="openstack-nova-vncproxy is &lt;14.0.10~dev13-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167157" version="1" comment="python-nova is &lt;14.0.10~dev13-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154487" version="1" comment="python-oslo.middleware is &lt;3.19.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155295" version="1" comment="openstack-magnum is &lt;3.1.2~a0~dev20-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155296" version="1" comment="openstack-magnum-api is &lt;3.1.2~a0~dev20-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155297" version="1" comment="openstack-magnum-conductor is &lt;3.1.2~a0~dev20-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155298" version="1" comment="openstack-magnum-doc is &lt;3.1.2~a0~dev20-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155299" version="1" comment="python-magnum is &lt;3.1.2~a0~dev20-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156260" version="1" comment="openstack-ceilometer is &lt;7.0.4~a0~dev7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156261" version="1" comment="openstack-ceilometer-agent-central is &lt;7.0.4~a0~dev7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156262" version="1" comment="openstack-ceilometer-agent-compute is &lt;7.0.4~a0~dev7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156263" version="1" comment="openstack-ceilometer-agent-ipmi is &lt;7.0.4~a0~dev7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156264" version="1" comment="openstack-ceilometer-agent-notification is &lt;7.0.4~a0~dev7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156265" version="1" comment="openstack-ceilometer-api is &lt;7.0.4~a0~dev7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156266" version="1" comment="openstack-ceilometer-collector is &lt;7.0.4~a0~dev7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156267" version="1" comment="openstack-ceilometer-doc is &lt;7.0.4~a0~dev7-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156268" version="1" comment="openstack-ceilometer-polling is &lt;7.0.4~a0~dev7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156269" version="1" comment="openstack-cinder is &lt;9.1.5~a0~dev1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156270" version="1" comment="openstack-cinder-api is &lt;9.1.5~a0~dev1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156271" version="1" comment="openstack-cinder-backup is &lt;9.1.5~a0~dev1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156272" version="1" comment="openstack-cinder-doc is &lt;9.1.5~a0~dev1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156273" version="1" comment="openstack-cinder-scheduler is &lt;9.1.5~a0~dev1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156274" version="1" comment="openstack-cinder-volume is &lt;9.1.5~a0~dev1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156275" version="1" comment="openstack-dashboard is &lt;10.0.4~a0~dev2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156276" version="1" comment="openstack-glance is &lt;13.0.1~a0~dev6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156277" version="1" comment="openstack-glance-api is &lt;13.0.1~a0~dev6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156278" version="1" comment="openstack-glance-doc is &lt;13.0.1~a0~dev6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156279" version="1" comment="openstack-glance-glare is &lt;13.0.1~a0~dev6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156280" version="1" comment="openstack-glance-registry is &lt;13.0.1~a0~dev6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156281" version="1" comment="openstack-heat is &lt;7.0.4~a0~dev4-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156282" version="1" comment="openstack-heat-api is &lt;7.0.4~a0~dev4-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156283" version="1" comment="openstack-heat-api-cfn is &lt;7.0.4~a0~dev4-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156284" version="1" comment="openstack-heat-api-cloudwatch is &lt;7.0.4~a0~dev4-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156285" version="1" comment="openstack-heat-doc is &lt;7.0.4~a0~dev4-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156286" version="1" comment="openstack-heat-engine is &lt;7.0.4~a0~dev4-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156287" version="1" comment="openstack-heat-plugin-heat_docker is &lt;7.0.4~a0~dev4-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156288" version="1" comment="openstack-heat-test is &lt;7.0.4~a0~dev4-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156289" version="1" comment="openstack-keystone is &lt;10.0.2~a0~dev2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156290" version="1" comment="openstack-keystone-doc is &lt;10.0.2~a0~dev2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156291" version="1" comment="openstack-magnum is &lt;3.1.2~a0~dev22-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156292" version="1" comment="openstack-magnum-api is &lt;3.1.2~a0~dev22-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156293" version="1" comment="openstack-magnum-conductor is &lt;3.1.2~a0~dev22-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156294" version="1" comment="openstack-magnum-doc is &lt;3.1.2~a0~dev22-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156295" version="1" comment="openstack-manila is &lt;3.0.1~a0~dev27-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156296" version="1" comment="openstack-manila-api is &lt;3.0.1~a0~dev27-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156297" version="1" comment="openstack-manila-data is &lt;3.0.1~a0~dev27-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156298" version="1" comment="openstack-manila-doc is &lt;3.0.1~a0~dev27-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156299" version="1" comment="openstack-manila-scheduler is &lt;3.0.1~a0~dev27-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156300" version="1" comment="openstack-manila-share is &lt;3.0.1~a0~dev27-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156301" version="1" comment="openstack-nova is &lt;14.0.6~a0~dev16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156302" version="1" comment="openstack-nova-api is &lt;14.0.6~a0~dev16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156303" version="1" comment="openstack-nova-cells is &lt;14.0.6~a0~dev16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156304" version="1" comment="openstack-nova-cert is &lt;14.0.6~a0~dev16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156305" version="1" comment="openstack-nova-compute is &lt;14.0.6~a0~dev16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156306" version="1" comment="openstack-nova-conductor is &lt;14.0.6~a0~dev16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156307" version="1" comment="openstack-nova-console is &lt;14.0.6~a0~dev16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156308" version="1" comment="openstack-nova-consoleauth is &lt;14.0.6~a0~dev16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156309" version="1" comment="openstack-nova-doc is &lt;14.0.6~a0~dev16-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156310" version="1" comment="openstack-nova-novncproxy is &lt;14.0.6~a0~dev16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156311" version="1" comment="openstack-nova-placement-api is &lt;14.0.6~a0~dev16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156312" version="1" comment="openstack-nova-scheduler is &lt;14.0.6~a0~dev16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156313" version="1" comment="openstack-nova-serialproxy is &lt;14.0.6~a0~dev16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156314" version="1" comment="openstack-nova-vncproxy is &lt;14.0.6~a0~dev16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156315" version="1" comment="python-ceilometer is &lt;7.0.4~a0~dev7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156316" version="1" comment="python-cinder is &lt;9.1.5~a0~dev1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156317" version="1" comment="python-glance is &lt;13.0.1~a0~dev6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156318" version="1" comment="python-heat is &lt;7.0.4~a0~dev4-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156319" version="1" comment="python-horizon is &lt;10.0.4~a0~dev2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156320" version="1" comment="python-keystone is &lt;10.0.2~a0~dev2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156321" version="1" comment="python-magnum is &lt;3.1.2~a0~dev22-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156322" version="1" comment="python-manila is &lt;3.0.1~a0~dev27-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156323" version="1" comment="python-nova is &lt;14.0.6~a0~dev16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172710" version="1" comment="ansible is &lt;2.2.3.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173547" version="1" comment="memcached is &lt;1.4.39-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174041" version="1" comment="python-paramiko is &lt;2.0.8-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174547" version="1" comment="erlang is &lt;17.5.6-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174548" version="1" comment="erlang-epmd is &lt;17.5.6-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174549" version="1" comment="python-Django is &lt;1.8.19-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009054221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123900" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123901" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123902" version="1" comment="libQt5Concurrent-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123903" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123904" version="1" comment="libQt5Concurrent5 is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123905" version="1" comment="libQt5Concurrent5-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123906" version="1" comment="libQt5Core-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123907" version="1" comment="libQt5Core-devel-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123908" version="1" comment="libQt5Core-private-headers-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123909" version="1" comment="libQt5Core5 is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123910" version="1" comment="libQt5Core5-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123911" version="1" comment="libQt5DBus-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123912" version="1" comment="libQt5DBus-devel-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123913" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123914" version="1" comment="libQt5DBus5 is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123915" version="1" comment="libQt5DBus5-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123916" version="1" comment="libQt5Gui-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123917" version="1" comment="libQt5Gui-devel-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123918" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123919" version="1" comment="libQt5Gui5 is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123920" version="1" comment="libQt5Gui5-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123921" version="1" comment="libQt5Network-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123922" version="1" comment="libQt5Network-devel-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123923" version="1" comment="libQt5Network-private-headers-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123924" version="1" comment="libQt5Network5 is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123925" version="1" comment="libQt5Network5-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123926" version="1" comment="libQt5OpenGL-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123927" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123928" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123929" version="1" comment="libQt5OpenGL5 is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123930" version="1" comment="libQt5OpenGL5-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123931" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123932" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123933" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123934" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123935" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123936" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123937" version="1" comment="libQt5PrintSupport-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123938" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123939" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123940" version="1" comment="libQt5PrintSupport5 is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123941" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123942" version="1" comment="libQt5Sql-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123943" version="1" comment="libQt5Sql-devel-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123944" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123945" version="1" comment="libQt5Sql5 is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123946" version="1" comment="libQt5Sql5-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123947" version="1" comment="libQt5Sql5-mysql is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123948" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123949" version="1" comment="libQt5Sql5-postgresql is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123950" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123951" version="1" comment="libQt5Sql5-sqlite is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123952" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123953" version="1" comment="libQt5Sql5-unixODBC is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123954" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123955" version="1" comment="libQt5Test-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123956" version="1" comment="libQt5Test-devel-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123957" version="1" comment="libQt5Test-private-headers-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123958" version="1" comment="libQt5Test5 is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123959" version="1" comment="libQt5Test5-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123960" version="1" comment="libQt5Widgets-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123961" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123962" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123963" version="1" comment="libQt5Widgets5 is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123964" version="1" comment="libQt5Widgets5-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123965" version="1" comment="libQt5Xml-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123966" version="1" comment="libQt5Xml-devel-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123967" version="1" comment="libQt5Xml5 is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123968" version="1" comment="libQt5Xml5-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123969" version="1" comment="libqt5-qtbase is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123970" version="1" comment="libqt5-qtbase-common-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123971" version="1" comment="libqt5-qtbase-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123972" version="1" comment="libqt5-qtbase-doc is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123973" version="1" comment="libqt5-qtbase-examples is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123974" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123975" version="1" comment="libqt5-qtbase-platformtheme-gtk2 is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123976" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117743" version="1" comment="openSUSE-release is ==42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124458" version="1" comment="chromedriver is &lt;49.0.2623.75-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124459" version="1" comment="chromium is &lt;49.0.2623.75-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124460" version="1" comment="chromium-desktop-gnome is &lt;49.0.2623.75-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124461" version="1" comment="chromium-desktop-kde is &lt;49.0.2623.75-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124462" version="1" comment="chromium-ffmpegsumo is &lt;49.0.2623.75-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125266" version="1" comment="shotwell is &lt;0.22.0+git.20160103-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125267" version="1" comment="shotwell-lang is &lt;0.22.0+git.20160103-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126355" version="1" comment="chromedriver is &lt;50.0.2661.75-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126356" version="1" comment="chromium is &lt;50.0.2661.75-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126357" version="1" comment="chromium-desktop-gnome is &lt;50.0.2661.75-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126358" version="1" comment="chromium-desktop-kde is &lt;50.0.2661.75-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126359" version="1" comment="chromium-ffmpegsumo is &lt;50.0.2661.75-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128400" version="1" comment="chromedriver is &lt;51.0.2704.79-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128401" version="1" comment="chromium is &lt;51.0.2704.79-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128402" version="1" comment="chromium-desktop-gnome is &lt;51.0.2704.79-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128403" version="1" comment="chromium-desktop-kde is &lt;51.0.2704.79-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128404" version="1" comment="chromium-ffmpegsumo is &lt;51.0.2704.79-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133250" version="1" comment="MozillaFirefox is &lt;49.0.2-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133251" version="1" comment="MozillaFirefox-branding-upstream is &lt;49.0.2-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133252" version="1" comment="MozillaFirefox-buildsymbols is &lt;49.0.2-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133253" version="1" comment="MozillaFirefox-devel is &lt;49.0.2-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133254" version="1" comment="MozillaFirefox-translations-common is &lt;49.0.2-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133255" version="1" comment="MozillaFirefox-translations-other is &lt;49.0.2-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138029" version="1" comment="FastCGI is &lt;2.4.0-170.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138030" version="1" comment="perl-FastCGI is &lt;2.4.0-170.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138031" version="1" comment="GraphicsMagick-devel is &lt;1.3.21-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138032" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.21-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138033" version="1" comment="libGraphicsMagick3-config is &lt;1.3.21-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138034" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.21-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138035" version="1" comment="ImageMagick is &lt;6.8.8.1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138036" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138037" version="1" comment="ImageMagick-doc is &lt;6.8.8.1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138038" version="1" comment="ImageMagick-extra is &lt;6.8.8.1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138039" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138040" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138041" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138042" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138043" version="1" comment="MozillaFirefox is &lt;41.0.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138044" version="1" comment="MozillaFirefox-translations-common is &lt;41.0.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138045" version="1" comment="MozillaThunderbird is &lt;38.3.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138046" version="1" comment="MozillaThunderbird-translations-common is &lt;38.3.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138047" version="1" comment="NetworkManager is &lt;1.0.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138048" version="1" comment="NetworkManager-devel is &lt;1.0.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138049" version="1" comment="NetworkManager-lang is &lt;1.0.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138050" version="1" comment="libnm-glib-vpn1 is &lt;1.0.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138051" version="1" comment="libnm-glib4 is &lt;1.0.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138052" version="1" comment="libnm-util2 is &lt;1.0.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138053" version="1" comment="libnm0 is &lt;1.0.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138054" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.0.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138055" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.0.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138056" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.0.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138057" version="1" comment="a2ps is &lt;4.14-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138058" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138059" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138060" version="1" comment="accountsservice is &lt;0.6.40-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138061" version="1" comment="accountsservice-lang is &lt;0.6.40-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138062" version="1" comment="libaccountsservice0 is &lt;0.6.40-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138063" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.40-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138064" version="1" comment="alsa is &lt;1.0.29-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138065" version="1" comment="alsa-devel is &lt;1.0.29-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138066" version="1" comment="libasound2 is &lt;1.0.29-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138067" version="1" comment="libasound2-32bit is &lt;1.0.29-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138068" version="1" comment="android-tools is &lt;5.1.1_r8-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138069" version="1" comment="ant is &lt;1.9.4-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138070" version="1" comment="ant-jmf is &lt;1.9.4-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138071" version="1" comment="ant-junit is &lt;1.9.4-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138072" version="1" comment="ant-scripts is &lt;1.9.4-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138073" version="1" comment="ant-swing is &lt;1.9.4-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138074" version="1" comment="apache-commons-beanutils is &lt;1.9.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138075" version="1" comment="apache-commons-daemon is &lt;1.0.15-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138076" version="1" comment="apache-commons-httpclient is &lt;3.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138077" version="1" comment="apache2-mod_perl is &lt;2.0.9-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138078" version="1" comment="apache2-mod_php5 is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138079" version="1" comment="php5 is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138080" version="1" comment="php5-bcmath is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138081" version="1" comment="php5-bz2 is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138082" version="1" comment="php5-calendar is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138083" version="1" comment="php5-ctype is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138084" version="1" comment="php5-curl is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138085" version="1" comment="php5-dba is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138086" version="1" comment="php5-devel is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138087" version="1" comment="php5-dom is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138088" version="1" comment="php5-exif is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138089" version="1" comment="php5-fastcgi is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138090" version="1" comment="php5-ftp is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138091" version="1" comment="php5-gd is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138092" version="1" comment="php5-gettext is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138093" version="1" comment="php5-gmp is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138094" version="1" comment="php5-iconv is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138095" version="1" comment="php5-imap is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138096" version="1" comment="php5-json is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138097" version="1" comment="php5-ldap is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138098" version="1" comment="php5-mbstring is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138099" version="1" comment="php5-mcrypt is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138100" version="1" comment="php5-mysql is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138101" version="1" comment="php5-odbc is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138102" version="1" comment="php5-openssl is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138103" version="1" comment="php5-pdo is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138104" version="1" comment="php5-pear is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138105" version="1" comment="php5-pgsql is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138106" version="1" comment="php5-shmop is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138107" version="1" comment="php5-snmp is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138108" version="1" comment="php5-sockets is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138109" version="1" comment="php5-sqlite is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138110" version="1" comment="php5-suhosin is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138111" version="1" comment="php5-sysvsem is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138112" version="1" comment="php5-sysvshm is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138113" version="1" comment="php5-tidy is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138114" version="1" comment="php5-tokenizer is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138115" version="1" comment="php5-wddx is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138116" version="1" comment="php5-xmlreader is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138117" version="1" comment="php5-xmlwriter is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138118" version="1" comment="php5-xsl is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138119" version="1" comment="php5-zip is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138120" version="1" comment="php5-zlib is &lt;5.5.14-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138121" version="1" comment="argyllcms is &lt;1.6.3-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138122" version="1" comment="aria2 is &lt;1.19.0-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138123" version="1" comment="aria2-lang is &lt;1.19.0-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138124" version="1" comment="augeas-lenses is &lt;1.2.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138125" version="1" comment="libaugeas0 is &lt;1.2.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138126" version="1" comment="autofs is &lt;5.0.9-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138127" version="1" comment="automake is &lt;1.13.4-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138128" version="1" comment="m4 is &lt;1.4.16-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138129" version="1" comment="avahi is &lt;0.6.31-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138130" version="1" comment="avahi-autoipd is &lt;0.6.31-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138131" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.31-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138132" version="1" comment="avahi-lang is &lt;0.6.31-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138133" version="1" comment="libavahi-client3 is &lt;0.6.31-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138134" version="1" comment="libavahi-client3-32bit is &lt;0.6.31-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138135" version="1" comment="libavahi-common3 is &lt;0.6.31-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138136" version="1" comment="libavahi-common3-32bit is &lt;0.6.31-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138137" version="1" comment="libavahi-core7 is &lt;0.6.31-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138138" version="1" comment="libavahi-devel is &lt;0.6.31-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138139" version="1" comment="libdns_sd is &lt;0.6.31-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138140" version="1" comment="bash is &lt;4.2-76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138141" version="1" comment="bash-doc is &lt;4.2-76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138142" version="1" comment="bash-lang is &lt;4.2-76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138143" version="1" comment="libreadline6 is &lt;6.2-76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138144" version="1" comment="readline-devel is &lt;6.2-76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138145" version="1" comment="readline-doc is &lt;6.2-76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138146" version="1" comment="bind is &lt;9.9.6P1-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138147" version="1" comment="bind-chrootenv is &lt;9.9.6P1-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138148" version="1" comment="bind-doc is &lt;9.9.6P1-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138149" version="1" comment="bind-libs is &lt;9.9.6P1-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138150" version="1" comment="bind-utils is &lt;9.9.6P1-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138151" version="1" comment="binutils is &lt;2.25.0-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138152" version="1" comment="binutils-devel is &lt;2.25.0-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138153" version="1" comment="bogofilter-common is &lt;1.2.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138154" version="1" comment="bogofilter-db is &lt;1.2.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138155" version="1" comment="bsdtar is &lt;3.1.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138156" version="1" comment="libarchive-devel is &lt;3.1.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138157" version="1" comment="libarchive13 is &lt;3.1.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138158" version="1" comment="busybox is &lt;1.21.1-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138159" version="1" comment="bzip2 is &lt;1.0.6-30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138160" version="1" comment="libbz2-1 is &lt;1.0.6-30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138161" version="1" comment="libbz2-1-32bit is &lt;1.0.6-30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138162" version="1" comment="libbz2-devel is &lt;1.0.6-30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138163" version="1" comment="cifs-utils is &lt;6.4-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138164" version="1" comment="clamav is &lt;0.98.7-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138165" version="1" comment="claws-mail is &lt;3.12.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138166" version="1" comment="claws-mail-lang is &lt;3.12.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138167" version="1" comment="colord is &lt;1.2.12-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138168" version="1" comment="colord-gtk-lang is &lt;0.1.26-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138169" version="1" comment="colord-lang is &lt;1.2.12-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138170" version="1" comment="libcolord-gtk1 is &lt;0.1.26-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138171" version="1" comment="libcolord2 is &lt;1.2.12-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138172" version="1" comment="libcolorhug2 is &lt;1.2.12-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138173" version="1" comment="coreutils is &lt;8.22-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138174" version="1" comment="coreutils-lang is &lt;8.22-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138175" version="1" comment="cpio is &lt;2.11-30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138176" version="1" comment="cpio-lang is &lt;2.11-30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138177" version="1" comment="cpp48 is &lt;4.8.5-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138178" version="1" comment="gcc48 is &lt;4.8.5-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138179" version="1" comment="gcc48-c++ is &lt;4.8.5-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138180" version="1" comment="gcc48-fortran is &lt;4.8.5-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138181" version="1" comment="gcc48-gij is &lt;4.8.5-16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138182" version="1" comment="gcc48-info is &lt;4.8.5-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138183" version="1" comment="gcc48-java is &lt;4.8.5-16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138184" version="1" comment="gcc48-locale is &lt;4.8.5-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138185" version="1" comment="gcc48-objc is &lt;4.8.5-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138186" version="1" comment="libasan0 is &lt;4.8.5-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138187" version="1" comment="libgcc_s1-gcc48-32bit is &lt;4.8.5-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138188" version="1" comment="libgcj48 is &lt;4.8.5-16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138189" version="1" comment="libgcj48-devel is &lt;4.8.5-16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138190" version="1" comment="libgcj48-jar is &lt;4.8.5-16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138191" version="1" comment="libgcj_bc1-gcc48 is &lt;4.8.5-16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138192" version="1" comment="libobjc4 is &lt;4.8.5-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138193" version="1" comment="libstdc++48-devel is &lt;4.8.5-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138194" version="1" comment="libstdc++6-gcc48-locale is &lt;4.8.5-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138195" version="1" comment="crash-kmp-default is &lt;7.1.3_k4.1.12_1-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138196" version="1" comment="crash-kmp-xen is &lt;7.1.3_k4.1.12_1-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138197" version="1" comment="cron is &lt;4.2-57.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138198" version="1" comment="cronie is &lt;1.4.11-57.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138199" version="1" comment="ctags is &lt;5.8-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138200" version="1" comment="cups is &lt;1.7.5-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138201" version="1" comment="cups-client is &lt;1.7.5-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138202" version="1" comment="cups-devel is &lt;1.7.5-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138203" version="1" comment="cups-libs is &lt;1.7.5-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138204" version="1" comment="cups-libs-32bit is &lt;1.7.5-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138205" version="1" comment="cups-filters is &lt;1.0.58-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138206" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138207" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138208" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138211" version="1" comment="curl is &lt;7.37.0-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138212" version="1" comment="libcurl-devel is &lt;7.37.0-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138213" version="1" comment="libcurl4 is &lt;7.37.0-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138214" version="1" comment="cvs is &lt;1.12.12-183.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138215" version="1" comment="cyradm is &lt;2.4.18-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138216" version="1" comment="cyrus-imapd is &lt;2.4.18-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138217" version="1" comment="perl-Cyrus-IMAP is &lt;2.4.18-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138218" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.4.18-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138219" version="1" comment="cyrus-sasl is &lt;2.1.26-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138220" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138221" version="1" comment="cyrus-sasl-devel is &lt;2.1.26-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138222" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138223" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138224" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138225" version="1" comment="libsasl2-3 is &lt;2.1.26-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138226" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138227" version="1" comment="dbus-1 is &lt;1.8.16-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138228" version="1" comment="dbus-1-devel is &lt;1.8.16-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138229" version="1" comment="dbus-1-x11 is &lt;1.8.16-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138230" version="1" comment="libdbus-1-3 is &lt;1.8.16-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138231" version="1" comment="libdbus-1-3-32bit is &lt;1.8.16-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138232" version="1" comment="dbus-1-glib is &lt;0.100.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138233" version="1" comment="dbus-1-glib-32bit is &lt;0.100.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138234" version="1" comment="dbus-1-glib-devel is &lt;0.100.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138235" version="1" comment="dhcp is &lt;4.3.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138236" version="1" comment="dhcp-client is &lt;4.3.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138237" version="1" comment="dhcp-doc is &lt;4.3.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138238" version="1" comment="dhcp-relay is &lt;4.3.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138239" version="1" comment="dhcp-server is &lt;4.3.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138240" version="1" comment="dia is &lt;0.97.3-2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138241" version="1" comment="dia-lang is &lt;0.97.3-2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138242" version="1" comment="dnsmasq is &lt;2.71-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138244" version="1" comment="e2fsprogs is &lt;1.42.11-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138245" version="1" comment="e2fsprogs-devel is &lt;1.42.11-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138246" version="1" comment="libcom_err-devel is &lt;1.42.11-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138247" version="1" comment="libcom_err2 is &lt;1.42.11-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138248" version="1" comment="libcom_err2-32bit is &lt;1.42.11-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138249" version="1" comment="libext2fs-devel is &lt;1.42.11-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138250" version="1" comment="libext2fs2 is &lt;1.42.11-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138251" version="1" comment="elfutils is &lt;0.158-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138252" version="1" comment="libasm1 is &lt;0.158-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138253" version="1" comment="libdw1 is &lt;0.158-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138254" version="1" comment="libelf1 is &lt;0.158-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138255" version="1" comment="libelf1-32bit is &lt;0.158-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138256" version="1" comment="emacs is &lt;24.3-18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138257" version="1" comment="emacs-info is &lt;24.3-18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138258" version="1" comment="emacs-nox is &lt;24.3-18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138259" version="1" comment="emacs-x11 is &lt;24.3-18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138260" version="1" comment="etags is &lt;24.3-18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138261" version="1" comment="empathy is &lt;3.12.10-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138262" version="1" comment="empathy-lang is &lt;3.12.10-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138263" version="1" comment="telepathy-mission-control-plugin-goa is &lt;3.12.10-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138264" version="1" comment="evince is &lt;3.14.2-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138265" version="1" comment="evince-lang is &lt;3.14.2-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138266" version="1" comment="libevdocument3-4 is &lt;3.14.2-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138267" version="1" comment="libevview3-3 is &lt;3.14.2-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138268" version="1" comment="nautilus-evince is &lt;3.14.2-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138269" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.14.2-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138270" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.14.2-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138271" version="1" comment="exif is &lt;0.6.21-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138272" version="1" comment="expat is &lt;2.1.0-15.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138273" version="1" comment="libexpat-devel is &lt;2.1.0-15.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138274" version="1" comment="libexpat1 is &lt;2.1.0-15.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138275" version="1" comment="libexpat1-32bit is &lt;2.1.0-15.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138276" version="1" comment="fetchmail is &lt;6.3.26-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138277" version="1" comment="file is &lt;5.19-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138278" version="1" comment="file-devel is &lt;5.19-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138279" version="1" comment="file-magic is &lt;5.19-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138280" version="1" comment="libmagic1 is &lt;5.19-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138281" version="1" comment="libmagic1-32bit is &lt;5.19-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138282" version="1" comment="flac is &lt;1.3.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138283" version="1" comment="flac-devel is &lt;1.3.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138284" version="1" comment="libFLAC++6 is &lt;1.3.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138285" version="1" comment="libFLAC8 is &lt;1.3.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138286" version="1" comment="libFLAC8-32bit is &lt;1.3.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138287" version="1" comment="freetype2-devel is &lt;2.5.5-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138288" version="1" comment="libfreetype6 is &lt;2.5.5-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138289" version="1" comment="libfreetype6-32bit is &lt;2.5.5-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138290" version="1" comment="ft2demos is &lt;2.5.5-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138291" version="1" comment="fuse is &lt;2.9.3-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138292" version="1" comment="libfuse2 is &lt;2.9.3-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138293" version="1" comment="gcab is &lt;0.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138294" version="1" comment="gcab-lang is &lt;0.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138295" version="1" comment="libgcab-1_0-0 is &lt;0.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138296" version="1" comment="gd is &lt;2.1.0-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138297" version="1" comment="gd-32bit is &lt;2.1.0-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138298" version="1" comment="gdk-pixbuf-devel is &lt;2.31.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138299" version="1" comment="gdk-pixbuf-lang is &lt;2.31.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138300" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.31.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138301" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.31.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138302" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.31.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138303" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.31.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138304" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.31.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138305" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.10-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138306" version="1" comment="librsvg-2-2 is &lt;2.40.10-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138307" version="1" comment="librsvg-devel is &lt;2.40.10-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138308" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.40.10-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138309" version="1" comment="gdm is &lt;3.14.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138310" version="1" comment="gdm-lang is &lt;3.14.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138311" version="1" comment="gdmflexiserver is &lt;3.14.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138312" version="1" comment="libgdm1 is &lt;3.14.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138313" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.14.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138314" version="1" comment="gimp is &lt;2.8.14-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138315" version="1" comment="gimp-help-browser is &lt;2.8.14-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138316" version="1" comment="gimp-lang is &lt;2.8.14-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138317" version="1" comment="gimp-plugin-aa is &lt;2.8.14-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138318" version="1" comment="gimp-plugins-python is &lt;2.8.14-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138319" version="1" comment="libgimp-2_0-0 is &lt;2.8.14-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138320" version="1" comment="libgimpui-2_0-0 is &lt;2.8.14-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138321" version="1" comment="git is &lt;2.6.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138322" version="1" comment="git-core is &lt;2.6.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138323" version="1" comment="git-cvs is &lt;2.6.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138324" version="1" comment="git-daemon is &lt;2.6.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138325" version="1" comment="git-email is &lt;2.6.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138326" version="1" comment="git-gui is &lt;2.6.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138327" version="1" comment="git-svn is &lt;2.6.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138328" version="1" comment="git-web is &lt;2.6.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138329" version="1" comment="gitk is &lt;2.6.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138330" version="1" comment="glib2-devel is &lt;2.44.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138331" version="1" comment="glib2-lang is &lt;2.44.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138332" version="1" comment="glib2-tools is &lt;2.44.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138333" version="1" comment="libgio-2_0-0 is &lt;2.44.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138334" version="1" comment="libgio-2_0-0-32bit is &lt;2.44.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138335" version="1" comment="libglib-2_0-0 is &lt;2.44.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138336" version="1" comment="libglib-2_0-0-32bit is &lt;2.44.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138337" version="1" comment="libgmodule-2_0-0 is &lt;2.44.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138338" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.44.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138339" version="1" comment="libgobject-2_0-0 is &lt;2.44.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138340" version="1" comment="libgobject-2_0-0-32bit is &lt;2.44.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138341" version="1" comment="libgthread-2_0-0 is &lt;2.44.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138342" version="1" comment="libgthread-2_0-0-32bit is &lt;2.44.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138343" version="1" comment="glibc is &lt;2.19-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138344" version="1" comment="glibc-32bit is &lt;2.19-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138345" version="1" comment="glibc-devel is &lt;2.19-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138346" version="1" comment="glibc-extra is &lt;2.19-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138347" version="1" comment="glibc-info is &lt;2.19-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138348" version="1" comment="glibc-locale is &lt;2.19-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138349" version="1" comment="glibc-locale-32bit is &lt;2.19-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138350" version="1" comment="nscd is &lt;2.19-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138351" version="1" comment="gnome-games is &lt;3.10.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138352" version="1" comment="gnome-games-recommended is &lt;3.10.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138353" version="1" comment="gnome-keyring is &lt;3.16.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138354" version="1" comment="gnome-keyring-32bit is &lt;3.16.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138355" version="1" comment="gnome-keyring-lang is &lt;3.16.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138356" version="1" comment="gnome-keyring-pam is &lt;3.16.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138357" version="1" comment="gnome-keyring-pam-32bit is &lt;3.16.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138358" version="1" comment="libgck-modules-gnome-keyring is &lt;3.16.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138359" version="1" comment="gnome-online-accounts is &lt;3.16.4.1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138360" version="1" comment="gnome-online-accounts-devel is &lt;3.16.4.1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138361" version="1" comment="gnome-online-accounts-lang is &lt;3.16.4.1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138362" version="1" comment="libgoa-1_0-0 is &lt;3.16.4.1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138363" version="1" comment="libgoa-backend-1_0-1 is &lt;3.16.4.1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138364" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.16.4.1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138365" version="1" comment="gnome-shell is &lt;3.16.4-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138366" version="1" comment="gnome-shell-browser-plugin is &lt;3.16.4-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138367" version="1" comment="gnome-shell-calendar is &lt;3.16.4-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138368" version="1" comment="gnome-shell-lang is &lt;3.16.4-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138369" version="1" comment="gnutls is &lt;3.2.15-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138370" version="1" comment="libgnutls-devel is &lt;3.2.15-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138371" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138372" version="1" comment="libgnutls28 is &lt;3.2.15-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138373" version="1" comment="libgnutls28-32bit is &lt;3.2.15-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138374" version="1" comment="gpgme is &lt;1.6.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138375" version="1" comment="libgpgme-devel is &lt;1.6.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138376" version="1" comment="libgpgme11 is &lt;1.6.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138377" version="1" comment="groff is &lt;1.22.2-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138378" version="1" comment="groff-full is &lt;1.22.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138379" version="1" comment="gxditview is &lt;1.22.2-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138380" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138381" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138382" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138383" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138384" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138385" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138386" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138387" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138388" version="1" comment="gv is &lt;3.7.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138389" version="1" comment="wdiff is &lt;1.2.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138390" version="1" comment="wdiff-lang is &lt;1.2.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138391" version="1" comment="gvim is &lt;7.4.326-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138392" version="1" comment="vim is &lt;7.4.326-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138393" version="1" comment="vim-data is &lt;7.4.326-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138394" version="1" comment="gzip is &lt;1.6-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138395" version="1" comment="hardlink is &lt;1.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138396" version="1" comment="hplip is &lt;3.14.6-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138397" version="1" comment="hplip-hpijs is &lt;3.14.6-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138398" version="1" comment="hplip-sane is &lt;3.14.6-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138399" version="1" comment="htmldoc is &lt;1.8.28-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138400" version="1" comment="hyper-v is &lt;6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138401" version="1" comment="ibus-chewing is &lt;1.4.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138402" version="1" comment="ibus-pinyin is &lt;1.5.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138403" version="1" comment="icedtea-web-javadoc is &lt;1.6.1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138404" version="1" comment="java-1_8_0-openjdk-plugin is &lt;1.6.1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138405" version="1" comment="id3lib is &lt;3.8.3-267.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138406" version="1" comment="ipsec-tools is &lt;0.8.0-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138407" version="1" comment="iputils is &lt;s20121221-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138408" version="1" comment="irssi is &lt;0.8.17-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138409" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138410" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.60-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138411" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.60-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138412" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.60-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138413" version="1" comment="jhead is &lt;3.00-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138414" version="1" comment="kbd is &lt;1.15.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138415" version="1" comment="kdebase4-workspace-libs is &lt;4.11.22-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138416" version="1" comment="python-kdebase4 is &lt;4.11.22-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138417" version="1" comment="kdelibs4 is &lt;4.14.10-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138418" version="1" comment="kdelibs4-core is &lt;4.14.10-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138419" version="1" comment="kdelibs4-doc is &lt;4.14.10-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138420" version="1" comment="libkde4 is &lt;4.14.10-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138421" version="1" comment="libkde4-devel is &lt;4.14.10-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138422" version="1" comment="libkdecore4 is &lt;4.14.10-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138423" version="1" comment="libkdecore4-devel is &lt;4.14.10-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138424" version="1" comment="libksuseinstall1 is &lt;4.14.10-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138425" version="1" comment="kdenetwork4-filesharing is &lt;15.04.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138426" version="1" comment="kdnssd is &lt;15.04.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138427" version="1" comment="kget is &lt;15.04.3-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138428" version="1" comment="kopete is &lt;15.04.3-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138429" version="1" comment="kppp is &lt;15.08.1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138430" version="1" comment="krdc is &lt;15.04.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138431" version="1" comment="krfb is &lt;15.04.3-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138432" version="1" comment="kernel-default is &lt;4.1.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138433" version="1" comment="kernel-default-devel is &lt;4.1.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138434" version="1" comment="kernel-devel is &lt;4.1.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138435" version="1" comment="kernel-docs is &lt;4.1.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138436" version="1" comment="kernel-macros is &lt;4.1.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138437" version="1" comment="kernel-pv-devel is &lt;4.1.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138438" version="1" comment="kernel-source is &lt;4.1.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138439" version="1" comment="kernel-syms is &lt;4.1.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138440" version="1" comment="kernel-xen is &lt;4.1.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138441" version="1" comment="kernel-xen-devel is &lt;4.1.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138442" version="1" comment="kio-extras5 is &lt;15.08.0-7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138443" version="1" comment="kwebkitpart is &lt;1.3.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138444" version="1" comment="kwebkitpart-lang is &lt;1.3.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138445" version="1" comment="klogd is &lt;1.4.1-779.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138446" version="1" comment="syslog-service is &lt;2.0-779.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138447" version="1" comment="konversation is &lt;1.6-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138448" version="1" comment="konversation-lang is &lt;1.6-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138449" version="1" comment="krb5 is &lt;1.12.1-19.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138450" version="1" comment="krb5-32bit is &lt;1.12.1-19.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138451" version="1" comment="krb5-client is &lt;1.12.1-19.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138452" version="1" comment="krb5-devel is &lt;1.12.1-19.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138453" version="1" comment="lftp is &lt;4.6.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138454" version="1" comment="libFS6 is &lt;1.0.7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138455" version="1" comment="libHX28 is &lt;3.18-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138456" version="1" comment="libHX28-32bit is &lt;3.18-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138457" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138458" version="1" comment="openexr-devel is &lt;2.1.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138459" version="1" comment="libImlib2-1 is &lt;1.4.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138460" version="1" comment="libQt5Concurrent-devel is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138461" version="1" comment="libQt5Concurrent5 is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138462" version="1" comment="libQt5Core-devel is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138463" version="1" comment="libQt5Core-private-headers-devel is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138464" version="1" comment="libQt5Core5 is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138465" version="1" comment="libQt5DBus-devel is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138466" version="1" comment="libQt5DBus5 is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138467" version="1" comment="libQt5Gui-devel is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138468" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138469" version="1" comment="libQt5Gui5 is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138470" version="1" comment="libQt5Network-devel is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138471" version="1" comment="libQt5Network5 is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138472" version="1" comment="libQt5OpenGL-devel is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138473" version="1" comment="libQt5OpenGL5 is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138474" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138475" version="1" comment="libQt5PrintSupport-devel is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138476" version="1" comment="libQt5PrintSupport5 is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138477" version="1" comment="libQt5Sql-devel is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138478" version="1" comment="libQt5Sql5 is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138479" version="1" comment="libQt5Sql5-mysql is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138480" version="1" comment="libQt5Sql5-postgresql is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138481" version="1" comment="libQt5Sql5-sqlite is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138482" version="1" comment="libQt5Sql5-unixODBC is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138483" version="1" comment="libQt5Test-devel is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138484" version="1" comment="libQt5Test5 is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138485" version="1" comment="libQt5Widgets-devel is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138486" version="1" comment="libQt5Widgets5 is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138487" version="1" comment="libQt5Xml-devel is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138488" version="1" comment="libQt5Xml5 is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138489" version="1" comment="libqt5-qtbase-common-devel is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138490" version="1" comment="libqt5-qtbase-devel is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138491" version="1" comment="libqt5-qtbase-doc is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138492" version="1" comment="libqt5-qtbase-platformtheme-gtk2 is &lt;5.5.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138493" version="1" comment="libX11-6 is &lt;1.6.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138494" version="1" comment="libX11-6-32bit is &lt;1.6.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138495" version="1" comment="libX11-data is &lt;1.6.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138496" version="1" comment="libX11-devel is &lt;1.6.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138497" version="1" comment="libX11-xcb1 is &lt;1.6.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138498" version="1" comment="libX11-xcb1-32bit is &lt;1.6.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138499" version="1" comment="libXRes1 is &lt;1.0.7-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138500" version="1" comment="libXres-devel is &lt;1.0.7-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138501" version="1" comment="libXcursor-devel is &lt;1.1.14-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138502" version="1" comment="libXcursor1 is &lt;1.1.14-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138503" version="1" comment="libXcursor1-32bit is &lt;1.1.14-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138504" version="1" comment="libXext-devel is &lt;1.3.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138505" version="1" comment="libXext6 is &lt;1.3.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138506" version="1" comment="libXext6-32bit is &lt;1.3.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138507" version="1" comment="libXfixes-devel is &lt;5.0.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138508" version="1" comment="libXfixes3 is &lt;5.0.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138509" version="1" comment="libXfixes3-32bit is &lt;5.0.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138510" version="1" comment="libXfont-devel is &lt;1.5.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138511" version="1" comment="libXfont1 is &lt;1.5.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138512" version="1" comment="libXi-devel is &lt;1.7.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138513" version="1" comment="libXi6 is &lt;1.7.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138514" version="1" comment="libXi6-32bit is &lt;1.7.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138515" version="1" comment="libXinerama-devel is &lt;1.1.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138516" version="1" comment="libXinerama1 is &lt;1.1.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138517" version="1" comment="libXinerama1-32bit is &lt;1.1.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138518" version="1" comment="libXp-devel is &lt;1.0.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138519" version="1" comment="libXp6 is &lt;1.0.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138520" version="1" comment="libXrandr-devel is &lt;1.5.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138521" version="1" comment="libXrandr2 is &lt;1.5.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138522" version="1" comment="libXrandr2-32bit is &lt;1.5.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138523" version="1" comment="libXrender-devel is &lt;0.9.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138524" version="1" comment="libXrender1 is &lt;0.9.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138525" version="1" comment="libXrender1-32bit is &lt;0.9.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138526" version="1" comment="libXt-devel is &lt;1.1.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138527" version="1" comment="libXt6 is &lt;1.1.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138528" version="1" comment="libXt6-32bit is &lt;1.1.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138529" version="1" comment="libXtst-devel is &lt;1.2.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138530" version="1" comment="libXtst6 is &lt;1.2.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138531" version="1" comment="libXv-devel is &lt;1.0.10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138532" version="1" comment="libXv1 is &lt;1.0.10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138533" version="1" comment="libXv1-32bit is &lt;1.0.10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138534" version="1" comment="libXvMC-devel is &lt;1.0.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138535" version="1" comment="libXvMC1 is &lt;1.0.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138536" version="1" comment="libXxf86dga-devel is &lt;1.1.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138537" version="1" comment="libXxf86dga1 is &lt;1.1.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138538" version="1" comment="libXxf86vm-devel is &lt;1.1.4-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138539" version="1" comment="libXxf86vm1 is &lt;1.1.4-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138540" version="1" comment="libXxf86vm1-32bit is &lt;1.1.4-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138541" version="1" comment="libapr-util1 is &lt;1.5.3-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138542" version="1" comment="libapr-util1-devel is &lt;1.5.3-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138543" version="1" comment="libapr1 is &lt;1.5.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138544" version="1" comment="libapr1-devel is &lt;1.5.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138545" version="1" comment="libblkid-devel is &lt;2.25-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138546" version="1" comment="libblkid1 is &lt;2.25-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138547" version="1" comment="libblkid1-32bit is &lt;2.25-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138548" version="1" comment="libmount1 is &lt;2.25-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138549" version="1" comment="libmount1-32bit is &lt;2.25-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138550" version="1" comment="libsmartcols1 is &lt;2.25-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138551" version="1" comment="libuuid-devel is &lt;2.25-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138552" version="1" comment="libuuid1 is &lt;2.25-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138553" version="1" comment="libuuid1-32bit is &lt;2.25-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138554" version="1" comment="util-linux is &lt;2.25-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138555" version="1" comment="util-linux-lang is &lt;2.25-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138556" version="1" comment="util-linux-systemd is &lt;2.25-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138557" version="1" comment="libbotan-1_10-1 is &lt;1.10.10-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138558" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138559" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138560" version="1" comment="libdcerpc0 is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138561" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138562" version="1" comment="libgensec0 is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138563" version="1" comment="libgensec0-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138564" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138565" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138566" version="1" comment="libndr-nbt0 is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138567" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138568" version="1" comment="libndr-standard0 is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138569" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138570" version="1" comment="libndr0 is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138571" version="1" comment="libndr0-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138572" version="1" comment="libnetapi0 is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138573" version="1" comment="libnetapi0-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138574" version="1" comment="libregistry0 is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138575" version="1" comment="libsamba-credentials0 is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138576" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138577" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138578" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138579" version="1" comment="libsamba-passdb0 is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138580" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138581" version="1" comment="libsamba-util0 is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138582" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138583" version="1" comment="libsamdb0 is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138584" version="1" comment="libsamdb0-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138585" version="1" comment="libsmbclient-devel is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138586" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138587" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138588" version="1" comment="libsmbclient0 is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138589" version="1" comment="libsmbconf0 is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138590" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138591" version="1" comment="libsmbldap0 is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138592" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138593" version="1" comment="libtevent-util0 is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138594" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138595" version="1" comment="libwbclient0 is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138596" version="1" comment="libwbclient0-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138597" version="1" comment="samba is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138598" version="1" comment="samba-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138599" version="1" comment="samba-client is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138600" version="1" comment="samba-client-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138601" version="1" comment="samba-doc is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138602" version="1" comment="samba-libs is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138603" version="1" comment="samba-libs-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138604" version="1" comment="samba-winbind is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138605" version="1" comment="samba-winbind-32bit is &lt;4.2.4-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109243" version="1" comment="libdirectfb-1_7-1 is &lt;1.7.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138606" version="1" comment="libdmx-devel is &lt;1.1.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138607" version="1" comment="libdmx1 is &lt;1.1.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138608" version="1" comment="libecpg6 is &lt;9.4.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138609" version="1" comment="libpq5 is &lt;9.4.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138610" version="1" comment="libpq5-32bit is &lt;9.4.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138611" version="1" comment="postgresql94 is &lt;9.4.5-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138612" version="1" comment="postgresql94-contrib is &lt;9.4.5-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138613" version="1" comment="postgresql94-devel is &lt;9.4.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138614" version="1" comment="postgresql94-docs is &lt;9.4.5-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138615" version="1" comment="postgresql94-server is &lt;9.4.5-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138616" version="1" comment="libevent-2_0-5 is &lt;2.0.21-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138617" version="1" comment="libexif-devel is &lt;0.6.21-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138618" version="1" comment="libexif12 is &lt;0.6.21-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138619" version="1" comment="libexif12-32bit is &lt;0.6.21-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138620" version="1" comment="libexiv2-14 is &lt;0.25-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138621" version="1" comment="libexiv2-devel is &lt;0.25-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138622" version="1" comment="libfbembed2_5 is &lt;2.5.4.26856-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138623" version="1" comment="libfreebl3 is &lt;3.20-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138624" version="1" comment="libsoftokn3 is &lt;3.20-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138625" version="1" comment="mozilla-nss is &lt;3.20-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138626" version="1" comment="mozilla-nss-certs is &lt;3.20-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138627" version="1" comment="mozilla-nss-devel is &lt;3.20-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138628" version="1" comment="mozilla-nss-tools is &lt;3.20-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138629" version="1" comment="libgadu-devel is &lt;1.12.1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138630" version="1" comment="libgadu3 is &lt;1.12.1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138631" version="1" comment="libgcrypt-devel is &lt;1.6.1-18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138632" version="1" comment="libgcrypt20 is &lt;1.6.1-18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138633" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138634" version="1" comment="libgnomesu is &lt;2.0.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138635" version="1" comment="libgnomesu-lang is &lt;2.0.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138636" version="1" comment="libgnomesu0 is &lt;2.0.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138637" version="1" comment="libgssglue-devel is &lt;0.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138638" version="1" comment="libgssglue1 is &lt;0.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138639" version="1" comment="libgudev-1_0-0 is &lt;210-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138640" version="1" comment="libgudev-1_0-devel is &lt;210-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138641" version="1" comment="libudev-devel is &lt;210-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138642" version="1" comment="libudev1 is &lt;210-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138643" version="1" comment="libudev1-32bit is &lt;210-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138644" version="1" comment="systemd is &lt;210-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138645" version="1" comment="systemd-32bit is &lt;210-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138646" version="1" comment="systemd-bash-completion is &lt;210-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138647" version="1" comment="systemd-logger is &lt;210-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138648" version="1" comment="systemd-sysvinit is &lt;210-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138649" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138650" version="1" comment="udev is &lt;210-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138651" version="1" comment="libgypsy0 is &lt;0.9-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138652" version="1" comment="libicu-devel is &lt;52.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138653" version="1" comment="libicu52_1 is &lt;52.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138654" version="1" comment="libicu52_1-data is &lt;52.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138655" version="1" comment="libid3tag0 is &lt;0.15.1b-184.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138656" version="1" comment="libimobiledevice-devel is &lt;1.2.0-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138657" version="1" comment="libimobiledevice6 is &lt;1.2.0-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138658" version="1" comment="libjasper-devel is &lt;1.900.1-164.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138659" version="1" comment="libjasper1 is &lt;1.900.1-164.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138660" version="1" comment="libjasper1-32bit is &lt;1.900.1-164.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138661" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.4.9-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138662" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.9-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138663" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.4.9-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138664" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.9-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138665" version="1" comment="libwebkitgtk-devel is &lt;2.4.9-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138666" version="1" comment="libwebkitgtk2-lang is &lt;2.4.9-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138667" version="1" comment="libwebkitgtk3-lang is &lt;2.4.9-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138668" version="1" comment="typelib-1_0-JavaScriptCore-1_0 is &lt;2.4.9-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138669" version="1" comment="typelib-1_0-WebKit-1_0 is &lt;2.4.9-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138670" version="1" comment="libjbig2 is &lt;2.0-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138671" version="1" comment="libjbig2-32bit is &lt;2.0-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138672" version="1" comment="libjpeg-turbo is &lt;1.3.1-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138673" version="1" comment="libjpeg62 is &lt;62.1.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138674" version="1" comment="libjpeg62-devel is &lt;62.1.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138675" version="1" comment="libjpeg8 is &lt;8.0.2-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138676" version="1" comment="libjpeg8-32bit is &lt;8.0.2-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138677" version="1" comment="libturbojpeg0 is &lt;8.0.2-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138678" version="1" comment="libjson-c2 is &lt;0.12-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138679" version="1" comment="libjson-c2-32bit is &lt;0.12-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138680" version="1" comment="libksba8 is &lt;1.3.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138681" version="1" comment="liblcms-devel is &lt;1.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138682" version="1" comment="liblcms1 is &lt;1.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138683" version="1" comment="liblcms1-32bit is &lt;1.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138684" version="1" comment="python-lcms is &lt;1.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138685" version="1" comment="liblightdm-gobject-1-0 is &lt;1.15.0-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138686" version="1" comment="lightdm is &lt;1.15.0-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138687" version="1" comment="lightdm-lang is &lt;1.15.0-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138688" version="1" comment="libltdl7 is &lt;2.4.2-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138689" version="1" comment="libltdl7-32bit is &lt;2.4.2-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138690" version="1" comment="libtool is &lt;2.4.2-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138691" version="1" comment="liblua5_2 is &lt;5.2.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138692" version="1" comment="lua is &lt;5.2.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138693" version="1" comment="lua-devel is &lt;5.2.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138694" version="1" comment="liblzo2-2 is &lt;2.08-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138695" version="1" comment="libmikmod3 is &lt;3.3.7-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138696" version="1" comment="libminiupnpc10 is &lt;1.9-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138697" version="1" comment="libmms-devel is &lt;0.6.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138698" version="1" comment="libmms0 is &lt;0.6.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138699" version="1" comment="libmodplug1 is &lt;0.8.8.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138700" version="1" comment="libmono-2_0-1 is &lt;4.0.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138701" version="1" comment="libmono-2_0-devel is &lt;4.0.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138702" version="1" comment="libmonoboehm-2_0-1 is &lt;4.0.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138703" version="1" comment="libmonoboehm-2_0-devel is &lt;4.0.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138704" version="1" comment="libmonosgen-2_0-1 is &lt;4.0.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138705" version="1" comment="mono-core is &lt;4.0.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138706" version="1" comment="mono-data is &lt;4.0.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138707" version="1" comment="mono-data-sqlite is &lt;4.0.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138708" version="1" comment="mono-extras is &lt;4.0.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138709" version="1" comment="mono-mvc is &lt;4.0.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138710" version="1" comment="mono-wcf is &lt;4.0.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138711" version="1" comment="mono-web is &lt;4.0.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138712" version="1" comment="mono-winforms is &lt;4.0.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138713" version="1" comment="mono-winfxcore is &lt;4.0.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138714" version="1" comment="libmpfr4 is &lt;3.1.2-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138715" version="1" comment="mpfr-devel is &lt;3.1.2-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138716" version="1" comment="libmspack0 is &lt;0.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138717" version="1" comment="libmusicbrainz-devel is &lt;2.1.5-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138718" version="1" comment="libmusicbrainz4 is &lt;2.1.5-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138719" version="1" comment="libmysqlclient-devel is &lt;10.0.21-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138720" version="1" comment="libmysqlclient18 is &lt;10.0.21-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138721" version="1" comment="libmysqlclient18-32bit is &lt;10.0.21-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138722" version="1" comment="libmysqlclient_r18 is &lt;10.0.21-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138723" version="1" comment="libmysqld18 is &lt;10.0.21-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138724" version="1" comment="mariadb is &lt;10.0.21-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138725" version="1" comment="mariadb-client is &lt;10.0.21-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138726" version="1" comment="mariadb-errormessages is &lt;10.0.21-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138727" version="1" comment="libneon27 is &lt;0.30.1-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138728" version="1" comment="libnewt0_52 is &lt;0.52.16-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138729" version="1" comment="libopenjpeg1 is &lt;1.5.2-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138730" version="1" comment="libopenssl-devel is &lt;1.0.1i-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138731" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138732" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138733" version="1" comment="openssl is &lt;1.0.1i-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138734" version="1" comment="libpango-1_0-0 is &lt;1.36.8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138735" version="1" comment="libpango-1_0-0-32bit is &lt;1.36.8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138736" version="1" comment="pango-devel is &lt;1.36.8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138737" version="1" comment="pango-tools is &lt;1.36.8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138738" version="1" comment="pango-tools-32bit is &lt;1.36.8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138739" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.36.8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138740" version="1" comment="libpcsclite1 is &lt;1.8.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138741" version="1" comment="pcsc-lite is &lt;1.8.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138742" version="1" comment="libpgf6 is &lt;6.14.12-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138743" version="1" comment="libpng12-0 is &lt;1.2.50-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138744" version="1" comment="libpng12-0-32bit is &lt;1.2.50-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138745" version="1" comment="libpng12-devel is &lt;1.2.50-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138746" version="1" comment="libpng16-16 is &lt;1.6.8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138747" version="1" comment="libpng16-16-32bit is &lt;1.6.8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138748" version="1" comment="libpng16-compat-devel is &lt;1.6.8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138749" version="1" comment="libpng16-devel is &lt;1.6.8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138750" version="1" comment="libpolkit0 is &lt;0.112-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138751" version="1" comment="polkit is &lt;0.112-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138752" version="1" comment="polkit-devel is &lt;0.112-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138753" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.112-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138754" version="1" comment="libpoppler-devel is &lt;0.24.4-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138755" version="1" comment="libpoppler-glib8 is &lt;0.24.4-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138756" version="1" comment="libpoppler-qt4-4 is &lt;0.24.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138757" version="1" comment="libpoppler44 is &lt;0.24.4-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138758" version="1" comment="poppler-tools is &lt;0.24.4-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138759" version="1" comment="libproxy-devel is &lt;0.4.11-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138760" version="1" comment="libproxy1 is &lt;0.4.11-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138761" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.11-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138762" version="1" comment="libproxy1-config-kde4 is &lt;0.4.11-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138763" version="1" comment="libproxy1-networkmanager is &lt;0.4.11-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138764" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.11-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138765" version="1" comment="libpulse-devel is &lt;7.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138766" version="1" comment="libpulse-mainloop-glib0 is &lt;7.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138767" version="1" comment="libpulse0 is &lt;7.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138768" version="1" comment="libpulse0-32bit is &lt;7.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138769" version="1" comment="pulseaudio is &lt;7.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138770" version="1" comment="pulseaudio-bash-completion is &lt;7.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138771" version="1" comment="pulseaudio-lang is &lt;7.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138772" version="1" comment="pulseaudio-module-bluetooth is &lt;7.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138773" version="1" comment="pulseaudio-module-gconf is &lt;7.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138774" version="1" comment="pulseaudio-module-jack is &lt;7.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138775" version="1" comment="pulseaudio-module-lirc is &lt;7.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138776" version="1" comment="pulseaudio-module-x11 is &lt;7.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138777" version="1" comment="pulseaudio-module-zeroconf is &lt;7.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138778" version="1" comment="pulseaudio-utils is &lt;7.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138779" version="1" comment="libpurple is &lt;2.10.11-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138780" version="1" comment="libpurple-lang is &lt;2.10.11-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138781" version="1" comment="libpurple-meanwhile is &lt;2.10.11-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138782" version="1" comment="libpurple-tcl is &lt;2.10.11-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138783" version="1" comment="pidgin is &lt;2.10.11-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138784" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138785" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138786" version="1" comment="python-base is &lt;2.7.9-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138787" version="1" comment="python-devel is &lt;2.7.9-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138788" version="1" comment="python-xml is &lt;2.7.9-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138789" version="1" comment="libpython3_4m1_0 is &lt;3.4.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138790" version="1" comment="python3-base is &lt;3.4.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138791" version="1" comment="libqt4 is &lt;4.8.6-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138792" version="1" comment="libqt4-32bit is &lt;4.8.6-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138793" version="1" comment="libqt4-devel is &lt;4.8.6-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138794" version="1" comment="libqt4-linguist is &lt;4.8.6-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138795" version="1" comment="libqt4-qt3support is &lt;4.8.6-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138796" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138797" version="1" comment="libqt4-sql is &lt;4.8.6-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138798" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138799" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138800" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138801" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138802" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138803" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138804" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138805" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138806" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138807" version="1" comment="libqt4-x11 is &lt;4.8.6-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138808" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138809" version="1" comment="libraptor2-0 is &lt;2.0.15-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138810" version="1" comment="libraw-devel is &lt;0.16.2-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138811" version="1" comment="libraw10 is &lt;0.16.2-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138812" version="1" comment="libreoffice is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138813" version="1" comment="libreoffice-base is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138814" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138815" version="1" comment="libreoffice-branding-upstream is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138816" version="1" comment="libreoffice-calc is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138817" version="1" comment="libreoffice-calc-extensions is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138818" version="1" comment="libreoffice-draw is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138819" version="1" comment="libreoffice-filters-optional is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138820" version="1" comment="libreoffice-gnome is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138821" version="1" comment="libreoffice-icon-theme-breeze is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138822" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138823" version="1" comment="libreoffice-icon-theme-hicontrast is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138824" version="1" comment="libreoffice-icon-theme-oxygen is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138825" version="1" comment="libreoffice-icon-theme-sifr is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138826" version="1" comment="libreoffice-icon-theme-tango is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138827" version="1" comment="libreoffice-impress is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138828" version="1" comment="libreoffice-kde4 is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138829" version="1" comment="libreoffice-l10n-cs is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138830" version="1" comment="libreoffice-l10n-da is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138831" version="1" comment="libreoffice-l10n-de is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138832" version="1" comment="libreoffice-l10n-el is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138833" version="1" comment="libreoffice-l10n-en is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138834" version="1" comment="libreoffice-l10n-es is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138835" version="1" comment="libreoffice-l10n-fr is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138836" version="1" comment="libreoffice-l10n-hu is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138837" version="1" comment="libreoffice-l10n-it is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138838" version="1" comment="libreoffice-l10n-ja is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138839" version="1" comment="libreoffice-l10n-pl is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138840" version="1" comment="libreoffice-l10n-ru is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138841" version="1" comment="libreoffice-mailmerge is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138842" version="1" comment="libreoffice-math is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138843" version="1" comment="libreoffice-pyuno is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138844" version="1" comment="libreoffice-writer is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138845" version="1" comment="libreoffice-writer-extensions is &lt;5.0.2.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138846" version="1" comment="librsync2 is &lt;1.0.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138847" version="1" comment="libruby2_1-2_1 is &lt;2.1.2-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138848" version="1" comment="ruby2.1 is &lt;2.1.2-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138849" version="1" comment="ruby2.1-devel is &lt;2.1.2-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138850" version="1" comment="ruby2.1-stdlib is &lt;2.1.2-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138851" version="1" comment="libserf-1-1 is &lt;1.3.8-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138852" version="1" comment="libsmi is &lt;0.4.8-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138853" version="1" comment="libsmi2 is &lt;0.4.8-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138854" version="1" comment="libsndfile-devel is &lt;1.0.25-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138855" version="1" comment="libsndfile1 is &lt;1.0.25-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138856" version="1" comment="libsndfile1-32bit is &lt;1.0.25-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138857" version="1" comment="libsnmp30 is &lt;5.7.3-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138858" version="1" comment="libsnmp30-32bit is &lt;5.7.3-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138859" version="1" comment="net-snmp is &lt;5.7.3-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138860" version="1" comment="net-snmp-devel is &lt;5.7.3-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138861" version="1" comment="perl-SNMP is &lt;5.7.3-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138862" version="1" comment="snmp-mibs is &lt;5.7.3-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138863" version="1" comment="libsoup-2_4-1 is &lt;2.50.0-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138864" version="1" comment="libsoup-devel is &lt;2.50.0-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138865" version="1" comment="libsoup-lang is &lt;2.50.0-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138866" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.50.0-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138867" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.29-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138868" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.29-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138869" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.29-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138870" version="1" comment="libspice-controller0 is &lt;0.29-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138871" version="1" comment="python-SpiceClientGtk is &lt;0.29-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138872" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.29-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138873" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.29-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138874" version="1" comment="libspice-server1 is &lt;0.12.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138875" version="1" comment="libssh2-1 is &lt;1.4.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138876" version="1" comment="libsss_idmap0 is &lt;1.11.5.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138877" version="1" comment="sssd is &lt;1.11.5.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138878" version="1" comment="sssd-32bit is &lt;1.11.5.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138879" version="1" comment="sssd-krb5-common is &lt;1.11.5.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138880" version="1" comment="sssd-ldap is &lt;1.11.5.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138881" version="1" comment="libtag-devel is &lt;1.9.1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138882" version="1" comment="libtag1 is &lt;1.9.1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138883" version="1" comment="libtag_c0 is &lt;1.9.1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138884" version="1" comment="taglib is &lt;1.9.1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138885" version="1" comment="libtasn1 is &lt;3.7-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138886" version="1" comment="libtasn1-6 is &lt;3.7-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138887" version="1" comment="libtasn1-6-32bit is &lt;3.7-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138888" version="1" comment="libtasn1-devel is &lt;3.7-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138889" version="1" comment="libthunarx-2-0 is &lt;1.6.10-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138890" version="1" comment="thunar is &lt;1.6.10-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138891" version="1" comment="thunar-lang is &lt;1.6.10-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138892" version="1" comment="libtidy-0_99-0 is &lt;1.0.20100204cvs-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138893" version="1" comment="libtidy-0_99-0-devel is &lt;1.0.20100204cvs-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138894" version="1" comment="tidy is &lt;1.0.20100204cvs-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138895" version="1" comment="libtiff-devel is &lt;4.0.4-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138896" version="1" comment="libtiff5 is &lt;4.0.4-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138897" version="1" comment="libtiff5-32bit is &lt;4.0.4-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138898" version="1" comment="tiff is &lt;4.0.4-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138899" version="1" comment="libudisks2-0 is &lt;2.1.6-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138900" version="1" comment="udisks2 is &lt;2.1.6-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138901" version="1" comment="udisks2-lang is &lt;2.1.6-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138902" version="1" comment="libupsclient1 is &lt;2.7.1-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138903" version="1" comment="nut is &lt;2.7.1-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138904" version="1" comment="nut-cgi is &lt;2.7.1-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138905" version="1" comment="libvdpau1 is &lt;1.1.1-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138906" version="1" comment="libvirt is &lt;1.2.18.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138907" version="1" comment="libvirt-client is &lt;1.2.18.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138908" version="1" comment="libvirt-daemon is &lt;1.2.18.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138909" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138910" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138911" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138912" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138913" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138914" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138915" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138916" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138917" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138918" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138919" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138920" version="1" comment="libvirt-daemon-driver-uml is &lt;1.2.18.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138921" version="1" comment="libvirt-daemon-driver-vbox is &lt;1.2.18.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138922" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138923" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138924" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138925" version="1" comment="libvorbis-devel is &lt;1.3.3-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138926" version="1" comment="libvorbis0 is &lt;1.3.3-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138927" version="1" comment="libvorbis0-32bit is &lt;1.3.3-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138928" version="1" comment="libvorbisenc2 is &lt;1.3.3-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138929" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138930" version="1" comment="libvorbisfile3 is &lt;1.3.3-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138931" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138932" version="1" comment="libvte9 is &lt;0.28.2-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138933" version="1" comment="vte2-lang is &lt;0.28.2-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138934" version="1" comment="libwmf-0_2-7 is &lt;0.2.8.4-240.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138935" version="1" comment="libwmf-tools is &lt;0.2.8.4-240.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138936" version="1" comment="libxcb-composite0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138937" version="1" comment="libxcb-damage0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138938" version="1" comment="libxcb-devel is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138939" version="1" comment="libxcb-dpms0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138940" version="1" comment="libxcb-dri2-0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138941" version="1" comment="libxcb-dri2-0-32bit is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138942" version="1" comment="libxcb-dri3-0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138943" version="1" comment="libxcb-dri3-0-32bit is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138944" version="1" comment="libxcb-glx0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138945" version="1" comment="libxcb-glx0-32bit is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138946" version="1" comment="libxcb-present0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138947" version="1" comment="libxcb-present0-32bit is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138948" version="1" comment="libxcb-randr0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138949" version="1" comment="libxcb-record0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138950" version="1" comment="libxcb-render0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138951" version="1" comment="libxcb-render0-32bit is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138952" version="1" comment="libxcb-res0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138953" version="1" comment="libxcb-screensaver0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138954" version="1" comment="libxcb-shape0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138955" version="1" comment="libxcb-shm0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138956" version="1" comment="libxcb-shm0-32bit is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138957" version="1" comment="libxcb-sync1 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138958" version="1" comment="libxcb-sync1-32bit is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138959" version="1" comment="libxcb-xevie0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138960" version="1" comment="libxcb-xf86dri0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138961" version="1" comment="libxcb-xfixes0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138962" version="1" comment="libxcb-xfixes0-32bit is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138963" version="1" comment="libxcb-xinerama0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138964" version="1" comment="libxcb-xkb1 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138965" version="1" comment="libxcb-xprint0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138966" version="1" comment="libxcb-xtest0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138967" version="1" comment="libxcb-xv0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138968" version="1" comment="libxcb-xvmc0 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138969" version="1" comment="libxcb1 is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138970" version="1" comment="libxcb1-32bit is &lt;1.11.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138971" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138972" version="1" comment="libxml2-2 is &lt;2.9.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138973" version="1" comment="libxml2-2-32bit is &lt;2.9.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138974" version="1" comment="libxml2-devel is &lt;2.9.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138975" version="1" comment="libxml2-tools is &lt;2.9.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138976" version="1" comment="libyaml-0-2 is &lt;0.1.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138977" version="1" comment="libzip-devel is &lt;0.11.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138978" version="1" comment="libzip2 is &lt;0.11.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138979" version="1" comment="links is &lt;2.8-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138980" version="1" comment="log4net is &lt;1.2.10-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138981" version="1" comment="logrotate is &lt;3.8.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138982" version="1" comment="lynx is &lt;2.8.7-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138983" version="1" comment="mailman is &lt;2.1.20-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138984" version="1" comment="mailx is &lt;12.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138985" version="1" comment="monitoring-tools is &lt;1.13.3-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138986" version="1" comment="mosh is &lt;1.2.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138987" version="1" comment="mozilla-nspr is &lt;4.10.8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138988" version="1" comment="mozilla-nspr-devel is &lt;4.10.8-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138989" version="1" comment="mutt is &lt;1.5.24-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138990" version="1" comment="nagios is &lt;3.5.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138991" version="1" comment="nagios-www is &lt;3.5.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138992" version="1" comment="nano is &lt;2.4.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138993" version="1" comment="nano-lang is &lt;2.4.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138994" version="1" comment="nbd is &lt;3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138995" version="1" comment="nbd-doc is &lt;3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138996" version="1" comment="nspluginwrapper is &lt;1.4.4-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138997" version="1" comment="ntp is &lt;4.2.8p3-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138998" version="1" comment="ntp-doc is &lt;4.2.8p3-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138999" version="1" comment="obs-service-set_version is &lt;0.5.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139000" version="1" comment="openconnect is &lt;7.06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139001" version="1" comment="openconnect-devel is &lt;7.06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139002" version="1" comment="openldap2 is &lt;2.4.41-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139003" version="1" comment="openslp is &lt;2.0.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139004" version="1" comment="openslp-devel is &lt;2.0.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139005" version="1" comment="openslp-server is &lt;2.0.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139006" version="1" comment="openssh is &lt;6.6p1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139007" version="1" comment="openssh-helpers is &lt;6.6p1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139008" version="1" comment="openvpn is &lt;2.3.8-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139009" version="1" comment="opie is &lt;2.4-726.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139010" version="1" comment="opie-32bit is &lt;2.4-726.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139011" version="1" comment="osc is &lt;0.152.0-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139012" version="1" comment="p7zip is &lt;9.20.1-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139013" version="1" comment="pam is &lt;1.1.8-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139014" version="1" comment="pam-32bit is &lt;1.1.8-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139015" version="1" comment="pam-devel is &lt;1.1.8-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139016" version="1" comment="pam-modules is &lt;12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139017" version="1" comment="pam-modules-32bit is &lt;12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139018" version="1" comment="pam_krb5 is &lt;2.4.4-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139019" version="1" comment="pam_krb5-32bit is &lt;2.4.4-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139020" version="1" comment="pam_ssh is &lt;2.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139021" version="1" comment="pam_ssh-32bit is &lt;2.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139022" version="1" comment="patch is &lt;2.7.5-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139023" version="1" comment="perl is &lt;5.18.2-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139024" version="1" comment="perl-32bit is &lt;5.18.2-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139025" version="1" comment="perl-base is &lt;5.18.2-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139026" version="1" comment="perl-doc is &lt;5.18.2-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139027" version="1" comment="perl-Capture-Tiny is &lt;0.23-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139028" version="1" comment="perl-Config-IniFiles is &lt;2.82-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139029" version="1" comment="perl-HTML-Parser is &lt;3.71-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139030" version="1" comment="perl-LWP-Protocol-https is &lt;6.04-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139031" version="1" comment="perl-XML-LibXML is &lt;2.0019-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139032" version="1" comment="perl-YAML-LibYAML is &lt;0.38-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139033" version="1" comment="pigz is &lt;2.3-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139034" version="1" comment="plasma5-desktop is &lt;5.4.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139035" version="1" comment="plasma5-desktop-lang is &lt;5.4.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139036" version="1" comment="ppp is &lt;2.4.7-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139037" version="1" comment="privoxy is &lt;3.0.23-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139038" version="1" comment="procmail is &lt;3.22-267.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139039" version="1" comment="pwgen is &lt;2.07-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139040" version="1" comment="python is &lt;2.7.9-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139041" version="1" comment="python-curses is &lt;2.7.9-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139042" version="1" comment="python-gdbm is &lt;2.7.9-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139043" version="1" comment="python3 is &lt;3.4.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139044" version="1" comment="python3-curses is &lt;3.4.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139045" version="1" comment="python3-dbm is &lt;3.4.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139046" version="1" comment="python3-tk is &lt;3.4.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139047" version="1" comment="python-Pillow is &lt;2.9.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139048" version="1" comment="python-cupshelpers is &lt;1.5.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139049" version="1" comment="system-config-printer is &lt;1.5.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139050" version="1" comment="system-config-printer-applet is &lt;1.5.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139051" version="1" comment="system-config-printer-common is &lt;1.5.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139052" version="1" comment="system-config-printer-common-lang is &lt;1.5.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139053" version="1" comment="system-config-printer-dbus-service is &lt;1.5.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139054" version="1" comment="udev-configure-printer is &lt;1.5.7-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139055" version="1" comment="python-libxml2 is &lt;2.9.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139056" version="1" comment="python-pyOpenSSL is &lt;0.14-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139057" version="1" comment="python-pycrypto is &lt;2.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139058" version="1" comment="python3-pip is &lt;7.1.2-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139059" version="1" comment="python3-requests is &lt;2.7.0-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139060" version="1" comment="qemu is &lt;2.3.1-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139061" version="1" comment="qemu-arm is &lt;2.3.1-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139062" version="1" comment="qemu-block-curl is &lt;2.3.1-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139063" version="1" comment="qemu-block-rbd is &lt;2.3.1-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139064" version="1" comment="qemu-extra is &lt;2.3.1-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109822" version="1" comment="qemu-ipxe is &lt;1.0.0-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139065" version="1" comment="qemu-kvm is &lt;2.3.1-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139066" version="1" comment="qemu-lang is &lt;2.3.1-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139067" version="1" comment="qemu-ppc is &lt;2.3.1-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139068" version="1" comment="qemu-s390 is &lt;2.3.1-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139069" version="1" comment="qemu-seabios is &lt;1.8.1-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109829" version="1" comment="qemu-sgabios is &lt;8-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139070" version="1" comment="qemu-tools is &lt;2.3.1-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139071" version="1" comment="qemu-vgabios is &lt;1.8.1-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139072" version="1" comment="qemu-x86 is &lt;2.3.1-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139073" version="1" comment="qemu-linux-user is &lt;2.3.1-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139074" version="1" comment="quagga is &lt;0.99.24.1-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139075" version="1" comment="radvd is &lt;2.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139076" version="1" comment="rpcbind is &lt;0.2.1_rc4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139077" version="1" comment="rpm is &lt;4.11.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139078" version="1" comment="rpm-32bit is &lt;4.11.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139079" version="1" comment="rpm-build is &lt;4.11.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139080" version="1" comment="rpm-devel is &lt;4.11.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139081" version="1" comment="rsync is &lt;3.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139082" version="1" comment="rsyslog is &lt;8.4.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139083" version="1" comment="rtkit is &lt;0.11_git201205151338-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139084" version="1" comment="ruby is &lt;2.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139085" version="1" comment="ruby-devel is &lt;2.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139086" version="1" comment="rxvt-unicode is &lt;9.21-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139087" version="1" comment="sblim-sfcb is &lt;1.4.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139088" version="1" comment="sddm is &lt;0.12.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139089" version="1" comment="sddm-branding-openSUSE is &lt;0.12.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139090" version="1" comment="shim is &lt;0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139091" version="1" comment="squashfs is &lt;4.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139092" version="1" comment="subversion is &lt;1.8.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139093" version="1" comment="subversion-devel is &lt;1.8.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139094" version="1" comment="subversion-perl is &lt;1.8.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139095" version="1" comment="subversion-python is &lt;1.8.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139096" version="1" comment="subversion-server is &lt;1.8.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139097" version="1" comment="subversion-tools is &lt;1.8.10-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139098" version="1" comment="sudo is &lt;1.8.10p3-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139099" version="1" comment="sysconfig is &lt;0.83.8-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139100" version="1" comment="sysconfig-netconfig is &lt;0.83.8-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139101" version="1" comment="sysvinit-tools is &lt;2.88+-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139102" version="1" comment="whois is &lt;5.2.10-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139105" version="1" comment="tcpdump is &lt;4.5.1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139106" version="1" comment="telepathy-gabble is &lt;0.18.3-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139107" version="1" comment="telepathy-idle is &lt;0.2.0-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139108" version="1" comment="tftp is &lt;5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139109" version="1" comment="tigervnc is &lt;1.5.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139110" version="1" comment="xorg-x11-Xvnc is &lt;1.5.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139111" version="1" comment="tnftp is &lt;20141104-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139112" version="1" comment="transmission-common is &lt;2.84-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139113" version="1" comment="transmission-gtk is &lt;2.84-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139114" version="1" comment="transmission-gtk-lang is &lt;2.84-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139115" version="1" comment="unixODBC is &lt;2.3.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139116" version="1" comment="unixODBC-32bit is &lt;2.3.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139117" version="1" comment="unzip is &lt;6.00-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139118" version="1" comment="unzip-doc is &lt;6.00-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139119" version="1" comment="viewvc is &lt;1.1.23-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139120" version="1" comment="vino is &lt;3.16.0-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139121" version="1" comment="vino-lang is &lt;3.16.0-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139122" version="1" comment="virtualbox is &lt;5.0.6-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139123" version="1" comment="virtualbox-guest-kmp-default is &lt;5.0.6_k4.1.12_1-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139124" version="1" comment="virtualbox-guest-tools is &lt;5.0.6-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139125" version="1" comment="virtualbox-guest-x11 is &lt;5.0.6-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139126" version="1" comment="virtualbox-host-kmp-default is &lt;5.0.6_k4.1.12_1-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139127" version="1" comment="virtualbox-qt is &lt;5.0.6-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139128" version="1" comment="vsftpd is &lt;3.0.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139129" version="1" comment="w3m is &lt;0.5.3-156.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139130" version="1" comment="wget is &lt;1.14-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139131" version="1" comment="wireshark is &lt;1.12.7-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139132" version="1" comment="wireshark-ui-gtk is &lt;1.12.7-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139133" version="1" comment="wpa_supplicant is &lt;2.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139134" version="1" comment="wpa_supplicant-gui is &lt;2.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139135" version="1" comment="xalan-j2 is &lt;2.7.0-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139136" version="1" comment="xen is &lt;4.5.1_10-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139137" version="1" comment="xen-doc-html is &lt;4.5.1_10-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139138" version="1" comment="xen-kmp-default is &lt;4.5.1_10_k4.1.12_1-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139139" version="1" comment="xen-libs is &lt;4.5.1_10-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139140" version="1" comment="xen-tools is &lt;4.5.1_10-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139141" version="1" comment="xen-tools-domU is &lt;4.5.1_10-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139142" version="1" comment="xf86-video-intel is &lt;2.99.917-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139143" version="1" comment="xinetd is &lt;2.3.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139144" version="1" comment="xlockmore is &lt;5.43-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139145" version="1" comment="xorg-x11 is &lt;7.6_1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139146" version="1" comment="xorg-x11-essentials is &lt;7.6_1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139147" version="1" comment="xrdb is &lt;1.1.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139148" version="1" comment="xorg-x11-devel is &lt;7.6-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139149" version="1" comment="xorg-x11-server is &lt;7.6_1.17.2-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139150" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.17.2-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139151" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.17.2-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139152" version="1" comment="yast2 is &lt;3.1.155-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139153" version="1" comment="yast2-devel-doc is &lt;3.1.155-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139154" version="1" comment="yast2-core is &lt;3.1.18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139155" version="1" comment="yast2-core-devel is &lt;3.1.18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139156" version="1" comment="zoo is &lt;2.10-1027.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117990" version="1" comment="nodejs is &lt;4.2.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117991" version="1" comment="nodejs-devel is &lt;4.2.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117992" version="1" comment="nodejs-doc is &lt;4.2.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117993" version="1" comment="nodejs-docs is &lt;4.2.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117994" version="1" comment="nodejs-npm is &lt;4.2.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117733" version="1" comment="libcrypto36 is &lt;2.3.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117734" version="1" comment="libcrypto36-32bit is &lt;2.3.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117735" version="1" comment="libressl is &lt;2.3.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117736" version="1" comment="libressl-devel is &lt;2.3.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117737" version="1" comment="libressl-devel-32bit is &lt;2.3.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117738" version="1" comment="libressl-devel-doc is &lt;2.3.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117739" version="1" comment="libssl37 is &lt;2.3.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117740" version="1" comment="libssl37-32bit is &lt;2.3.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117741" version="1" comment="libtls9 is &lt;2.3.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117742" version="1" comment="libtls9-32bit is &lt;2.3.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117614" version="1" comment="wireshark is &lt;1.12.8-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117615" version="1" comment="wireshark-devel is &lt;1.12.8-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117616" version="1" comment="wireshark-ui-gtk is &lt;1.12.8-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117617" version="1" comment="wireshark-ui-qt is &lt;1.12.8-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117618" version="1" comment="squid is &lt;3.3.13-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117744" version="1" comment="sudo is &lt;1.8.10p3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117745" version="1" comment="sudo-devel is &lt;1.8.10p3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117746" version="1" comment="sudo-test is &lt;1.8.10p3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117619" version="1" comment="audiofile is &lt;0.3.6-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117620" version="1" comment="audiofile-devel is &lt;0.3.6-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117621" version="1" comment="audiofile-devel-32bit is &lt;0.3.6-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117622" version="1" comment="audiofile-doc is &lt;0.3.6-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117623" version="1" comment="libaudiofile1 is &lt;0.3.6-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117624" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117625" version="1" comment="libblkid-devel is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117626" version="1" comment="libblkid-devel-32bit is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117627" version="1" comment="libblkid1 is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117628" version="1" comment="libblkid1-32bit is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117629" version="1" comment="libmount-devel is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117630" version="1" comment="libmount-devel-32bit is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117631" version="1" comment="libmount1 is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117632" version="1" comment="libmount1-32bit is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117633" version="1" comment="libsmartcols-devel is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117634" version="1" comment="libsmartcols1 is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117635" version="1" comment="libuuid-devel is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117636" version="1" comment="libuuid-devel-32bit is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117637" version="1" comment="libuuid1 is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117638" version="1" comment="libuuid1-32bit is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117639" version="1" comment="python-libmount is &lt;2.25-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117640" version="1" comment="util-linux is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117641" version="1" comment="util-linux-lang is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117642" version="1" comment="util-linux-systemd is &lt;2.25-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117643" version="1" comment="uuidd is &lt;2.25-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117644" version="1" comment="libpotrace0 is &lt;1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117645" version="1" comment="potrace is &lt;1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117646" version="1" comment="potrace-devel is &lt;1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117647" version="1" comment="bouncycastle is &lt;1.53-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117648" version="1" comment="bouncycastle-javadoc is &lt;1.53-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117747" version="1" comment="libpolkit0 is &lt;0.113-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117748" version="1" comment="libpolkit0-32bit is &lt;0.113-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117749" version="1" comment="polkit is &lt;0.113-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117750" version="1" comment="polkit-devel is &lt;0.113-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117751" version="1" comment="polkit-doc is &lt;0.113-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117752" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117753" version="1" comment="phpMyAdmin is &lt;4.4.15.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117649" version="1" comment="MozillaFirefox is &lt;42.0-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117650" version="1" comment="MozillaFirefox-branding-upstream is &lt;42.0-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117651" version="1" comment="MozillaFirefox-buildsymbols is &lt;42.0-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117652" version="1" comment="MozillaFirefox-devel is &lt;42.0-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117653" version="1" comment="MozillaFirefox-translations-common is &lt;42.0-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117654" version="1" comment="MozillaFirefox-translations-other is &lt;42.0-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117655" version="1" comment="libfreebl3 is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117656" version="1" comment="libfreebl3-32bit is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117657" version="1" comment="libsoftokn3 is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117658" version="1" comment="libsoftokn3-32bit is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117659" version="1" comment="mozilla-nspr is &lt;4.10.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117660" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117661" version="1" comment="mozilla-nspr-devel is &lt;4.10.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117662" version="1" comment="mozilla-nss is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117663" version="1" comment="mozilla-nss-32bit is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117664" version="1" comment="mozilla-nss-certs is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117665" version="1" comment="mozilla-nss-certs-32bit is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117666" version="1" comment="mozilla-nss-devel is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117667" version="1" comment="mozilla-nss-sysinit is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117668" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117669" version="1" comment="mozilla-nss-tools is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117670" version="1" comment="seamonkey is &lt;2.39-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117671" version="1" comment="seamonkey-dom-inspector is &lt;2.39-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117672" version="1" comment="seamonkey-irc is &lt;2.39-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117673" version="1" comment="seamonkey-translations-common is &lt;2.39-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117674" version="1" comment="seamonkey-translations-other is &lt;2.39-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117675" version="1" comment="xulrunner is &lt;38.4.0-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117676" version="1" comment="xulrunner-32bit is &lt;38.4.0-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117677" version="1" comment="xulrunner-devel is &lt;38.4.0-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117754" version="1" comment="roundcubemail is &lt;1.1.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117755" version="1" comment="cpp48 is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117756" version="1" comment="cross-aarch64-gcc48-icecream-backend is &lt;4.8.5-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117757" version="1" comment="cross-armv6hl-gcc48-icecream-backend is &lt;4.8.5-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117758" version="1" comment="cross-armv7hl-gcc48-icecream-backend is &lt;4.8.5-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117759" version="1" comment="cross-hppa-gcc48-icecream-backend is &lt;4.8.5-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117760" version="1" comment="cross-i386-gcc48-icecream-backend is &lt;4.8.5-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117761" version="1" comment="cross-ia64-gcc48-icecream-backend is &lt;4.8.5-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117762" version="1" comment="cross-ppc-gcc48-icecream-backend is &lt;4.8.5-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117763" version="1" comment="cross-ppc64-gcc48-icecream-backend is &lt;4.8.5-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117764" version="1" comment="cross-ppc64le-gcc48-icecream-backend is &lt;4.8.5-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117765" version="1" comment="cross-s390-gcc48-icecream-backend is &lt;4.8.5-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117766" version="1" comment="cross-s390x-gcc48-icecream-backend is &lt;4.8.5-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117767" version="1" comment="gcc48 is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117768" version="1" comment="gcc48-32bit is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117769" version="1" comment="gcc48-ada is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117770" version="1" comment="gcc48-ada-32bit is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117771" version="1" comment="gcc48-c++ is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117772" version="1" comment="gcc48-fortran is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117773" version="1" comment="gcc48-fortran-32bit is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117774" version="1" comment="gcc48-gij is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117775" version="1" comment="gcc48-gij-32bit is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117776" version="1" comment="gcc48-info is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117777" version="1" comment="gcc48-java is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117778" version="1" comment="gcc48-locale is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117779" version="1" comment="gcc48-obj-c++ is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117780" version="1" comment="gcc48-objc is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117781" version="1" comment="gcc48-objc-32bit is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117782" version="1" comment="gcc48-testresults is &lt;4.8.5-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117783" version="1" comment="gdb is &lt;7.9.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117784" version="1" comment="gdb-testresults is &lt;7.9.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117785" version="1" comment="gdbserver is &lt;7.9.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117786" version="1" comment="libada48 is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117787" version="1" comment="libada48-32bit is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117788" version="1" comment="libasan0 is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117789" version="1" comment="libasan0-32bit is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117790" version="1" comment="libatomic1-gcc48 is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117791" version="1" comment="libatomic1-gcc48-32bit is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117792" version="1" comment="libffi4-gcc48 is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117793" version="1" comment="libffi4-gcc48-32bit is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117794" version="1" comment="libffi48 is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117795" version="1" comment="libffi48-devel is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117796" version="1" comment="libffi48-devel-32bit is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117797" version="1" comment="libgcc_s1-gcc48 is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117798" version="1" comment="libgcc_s1-gcc48-32bit is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117799" version="1" comment="libgcj48 is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117800" version="1" comment="libgcj48-32bit is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117801" version="1" comment="libgcj48-devel is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117802" version="1" comment="libgcj48-devel-32bit is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117803" version="1" comment="libgcj48-jar is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117804" version="1" comment="libgcj_bc1-gcc48 is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117805" version="1" comment="libgfortran3-gcc48 is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117806" version="1" comment="libgfortran3-gcc48-32bit is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117807" version="1" comment="libgomp1-gcc48 is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117808" version="1" comment="libgomp1-gcc48-32bit is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117809" version="1" comment="libitm1-gcc48 is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117810" version="1" comment="libitm1-gcc48-32bit is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117811" version="1" comment="libobjc4 is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117812" version="1" comment="libobjc4-32bit is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117813" version="1" comment="libquadmath0-gcc48 is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117814" version="1" comment="libquadmath0-gcc48-32bit is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117815" version="1" comment="libstdc++48-devel is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117816" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117817" version="1" comment="libstdc++48-doc is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117818" version="1" comment="libstdc++6-gcc48 is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117819" version="1" comment="libstdc++6-gcc48-32bit is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117820" version="1" comment="libstdc++6-gcc48-locale is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117821" version="1" comment="libtsan0-gcc48 is &lt;4.8.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117822" version="1" comment="xen is &lt;4.5.1_12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117823" version="1" comment="xen-devel is &lt;4.5.1_12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117824" version="1" comment="xen-doc-html is &lt;4.5.1_12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117825" version="1" comment="xen-kmp-default is &lt;4.5.1_12_k4.1.12_1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117826" version="1" comment="xen-libs is &lt;4.5.1_12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117827" version="1" comment="xen-libs-32bit is &lt;4.5.1_12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117828" version="1" comment="xen-tools is &lt;4.5.1_12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117829" version="1" comment="xen-tools-domU is &lt;4.5.1_12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117830" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.91-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117831" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.91-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117832" version="1" comment="java-1_7_0-openjdk-bootstrap is &lt;1.7.0.91-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117833" version="1" comment="java-1_7_0-openjdk-bootstrap-devel is &lt;1.7.0.91-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117834" version="1" comment="java-1_7_0-openjdk-bootstrap-headless is &lt;1.7.0.91-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117835" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.91-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117836" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.91-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117837" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.91-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117838" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.91-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117839" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.91-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117881" version="1" comment="krb5 is &lt;1.12.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117882" version="1" comment="krb5-32bit is &lt;1.12.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117883" version="1" comment="krb5-client is &lt;1.12.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117884" version="1" comment="krb5-devel is &lt;1.12.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117885" version="1" comment="krb5-devel-32bit is &lt;1.12.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117886" version="1" comment="krb5-doc is &lt;1.12.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117887" version="1" comment="krb5-mini is &lt;1.12.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117888" version="1" comment="krb5-mini-devel is &lt;1.12.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117889" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117890" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117891" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117892" version="1" comment="krb5-server is &lt;1.12.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117995" version="1" comment="putty is &lt;0.66-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118002" version="1" comment="ntp is &lt;4.2.8p4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118003" version="1" comment="ntp-doc is &lt;4.2.8p4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118004" version="1" comment="xscreensaver is &lt;5.33-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118005" version="1" comment="xscreensaver-data is &lt;5.33-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118006" version="1" comment="xscreensaver-data-extra is &lt;5.33-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118042" version="1" comment="chromedriver is &lt;46.0.2490.86-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118043" version="1" comment="chromium is &lt;46.0.2490.86-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118044" version="1" comment="chromium-desktop-gnome is &lt;46.0.2490.86-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118045" version="1" comment="chromium-desktop-kde is &lt;46.0.2490.86-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118046" version="1" comment="chromium-ffmpegsumo is &lt;46.0.2490.86-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118047" version="1" comment="libminiupnpc-devel is &lt;1.9-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118048" version="1" comment="libminiupnpc10 is &lt;1.9-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118049" version="1" comment="libminiupnpc10-32bit is &lt;1.9-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118050" version="1" comment="miniupnpc is &lt;1.9-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118051" version="1" comment="python-miniupnpc is &lt;1.9-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118073" version="1" comment="docker is &lt;1.9.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118074" version="1" comment="docker-bash-completion is &lt;1.9.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118075" version="1" comment="docker-test is &lt;1.9.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118076" version="1" comment="docker-zsh-completion is &lt;1.9.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118117" version="1" comment="strongswan is &lt;5.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118118" version="1" comment="strongswan-doc is &lt;5.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118119" version="1" comment="strongswan-hmac is &lt;5.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118120" version="1" comment="strongswan-ipsec is &lt;5.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118121" version="1" comment="strongswan-libs0 is &lt;5.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118122" version="1" comment="strongswan-mysql is &lt;5.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118123" version="1" comment="strongswan-nm is &lt;5.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118124" version="1" comment="strongswan-sqlite is &lt;5.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116161" version="1" comment="libsndfile is &lt;1.0.25-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117461" version="1" comment="libsndfile-devel is &lt;1.0.25-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118343" version="1" comment="libsndfile-progs is &lt;1.0.25-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116162" version="1" comment="libsndfile1 is &lt;1.0.25-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116163" version="1" comment="libsndfile1-32bit is &lt;1.0.25-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118344" version="1" comment="ffmpeg is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118345" version="1" comment="ffmpeg-devel is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118346" version="1" comment="libavcodec-devel is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118347" version="1" comment="libavcodec56 is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118348" version="1" comment="libavcodec56-32bit is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118349" version="1" comment="libavdevice-devel is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118350" version="1" comment="libavdevice56 is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118351" version="1" comment="libavdevice56-32bit is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118352" version="1" comment="libavfilter-devel is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118353" version="1" comment="libavfilter5 is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118354" version="1" comment="libavfilter5-32bit is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118355" version="1" comment="libavformat-devel is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118356" version="1" comment="libavformat56 is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118357" version="1" comment="libavformat56-32bit is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118358" version="1" comment="libavresample-devel is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118359" version="1" comment="libavresample2 is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118360" version="1" comment="libavresample2-32bit is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118361" version="1" comment="libavutil-devel is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118362" version="1" comment="libavutil54 is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118363" version="1" comment="libavutil54-32bit is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118364" version="1" comment="libpostproc-devel is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118365" version="1" comment="libpostproc53 is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118366" version="1" comment="libpostproc53-32bit is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118367" version="1" comment="libswresample-devel is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118368" version="1" comment="libswresample1 is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118369" version="1" comment="libswresample1-32bit is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118370" version="1" comment="libswscale-devel is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118371" version="1" comment="libswscale3 is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118372" version="1" comment="libswscale3-32bit is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118373" version="1" comment="libpng16 is &lt;1.6.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118374" version="1" comment="libpng16-16 is &lt;1.6.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118375" version="1" comment="libpng16-16-32bit is &lt;1.6.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118376" version="1" comment="libpng16-compat-devel is &lt;1.6.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118377" version="1" comment="libpng16-compat-devel-32bit is &lt;1.6.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118378" version="1" comment="libpng16-devel is &lt;1.6.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118379" version="1" comment="libpng16-devel-32bit is &lt;1.6.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118380" version="1" comment="libpng16-tools is &lt;1.6.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118381" version="1" comment="libpng12 is &lt;1.2.50-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118382" version="1" comment="libpng12-0 is &lt;1.2.50-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118383" version="1" comment="libpng12-0-32bit is &lt;1.2.50-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118384" version="1" comment="libpng12-compat-devel is &lt;1.2.50-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118385" version="1" comment="libpng12-compat-devel-32bit is &lt;1.2.50-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118386" version="1" comment="libpng12-devel is &lt;1.2.50-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118387" version="1" comment="libpng12-devel-32bit is &lt;1.2.50-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118321" version="1" comment="ppp is &lt;2.4.7-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118322" version="1" comment="ppp-devel is &lt;2.4.7-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118325" version="1" comment="cyradm is &lt;2.4.18-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118326" version="1" comment="cyrus-imapd is &lt;2.4.18-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118327" version="1" comment="cyrus-imapd-devel is &lt;2.4.18-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118328" version="1" comment="cyrus-imapd-snmp is &lt;2.4.18-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118329" version="1" comment="cyrus-imapd-snmp-mibs is &lt;2.4.18-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118330" version="1" comment="cyrus-imapd-utils is &lt;2.4.18-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118331" version="1" comment="perl-Cyrus-IMAP is &lt;2.4.18-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118332" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.4.18-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118553" version="1" comment="libksba is &lt;1.3.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118554" version="1" comment="libksba-devel is &lt;1.3.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118555" version="1" comment="libksba8 is &lt;1.3.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118601" version="1" comment="znc is &lt;1.6.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118602" version="1" comment="znc-devel is &lt;1.6.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118603" version="1" comment="znc-perl is &lt;1.6.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118604" version="1" comment="znc-python3 is &lt;1.6.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118605" version="1" comment="znc-tcl is &lt;1.6.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118606" version="1" comment="dracut is &lt;037-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118607" version="1" comment="dracut-fips is &lt;037-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118828" version="1" comment="LibVNCServer is &lt;0.9.9-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118829" version="1" comment="LibVNCServer-devel is &lt;0.9.9-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118830" version="1" comment="libvncclient0 is &lt;0.9.9-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118831" version="1" comment="libvncserver0 is &lt;0.9.9-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118832" version="1" comment="linuxvnc is &lt;0.9.9-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118833" version="1" comment="MozillaThunderbird is &lt;38.4.0-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118834" version="1" comment="MozillaThunderbird-buildsymbols is &lt;38.4.0-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118835" version="1" comment="MozillaThunderbird-devel is &lt;38.4.0-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118836" version="1" comment="MozillaThunderbird-translations-common is &lt;38.4.0-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118837" version="1" comment="MozillaThunderbird-translations-other is &lt;38.4.0-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118838" version="1" comment="kernel-debug is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118839" version="1" comment="kernel-debug-base is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118840" version="1" comment="kernel-debug-devel is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118841" version="1" comment="kernel-default is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118842" version="1" comment="kernel-default-base is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118843" version="1" comment="kernel-default-devel is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118844" version="1" comment="kernel-devel is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118845" version="1" comment="kernel-docs is &lt;4.1.13-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118846" version="1" comment="kernel-docs-html is &lt;4.1.13-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118847" version="1" comment="kernel-docs-pdf is &lt;4.1.13-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118848" version="1" comment="kernel-ec2 is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118849" version="1" comment="kernel-ec2-base is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118850" version="1" comment="kernel-ec2-devel is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118851" version="1" comment="kernel-macros is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118852" version="1" comment="kernel-obs-build is &lt;4.1.13-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118853" version="1" comment="kernel-obs-qa is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118854" version="1" comment="kernel-obs-qa-xen is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118855" version="1" comment="kernel-pae is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118856" version="1" comment="kernel-pae-base is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118857" version="1" comment="kernel-pae-devel is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118858" version="1" comment="kernel-pv is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118859" version="1" comment="kernel-pv-base is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118860" version="1" comment="kernel-pv-devel is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118861" version="1" comment="kernel-source is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118862" version="1" comment="kernel-source-vanilla is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118863" version="1" comment="kernel-syms is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118864" version="1" comment="kernel-vanilla is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118865" version="1" comment="kernel-vanilla-devel is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118866" version="1" comment="kernel-xen is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118867" version="1" comment="kernel-xen-base is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118868" version="1" comment="kernel-xen-devel is &lt;4.1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118972" version="1" comment="gpg2 is &lt;2.0.24-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118973" version="1" comment="gpg2-lang is &lt;2.0.24-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118899" version="1" comment="libmysql56client18 is &lt;5.6.27-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118900" version="1" comment="libmysql56client18-32bit is &lt;5.6.27-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118901" version="1" comment="libmysql56client_r18 is &lt;5.6.27-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118902" version="1" comment="libmysql56client_r18-32bit is &lt;5.6.27-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118903" version="1" comment="mysql-community-server is &lt;5.6.27-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118904" version="1" comment="mysql-community-server-bench is &lt;5.6.27-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118905" version="1" comment="mysql-community-server-client is &lt;5.6.27-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118906" version="1" comment="mysql-community-server-errormessages is &lt;5.6.27-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118907" version="1" comment="mysql-community-server-test is &lt;5.6.27-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118908" version="1" comment="mysql-community-server-tools is &lt;5.6.27-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118974" version="1" comment="xen is &lt;4.5.2_01-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118975" version="1" comment="xen-devel is &lt;4.5.2_01-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118976" version="1" comment="xen-doc-html is &lt;4.5.2_01-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118977" version="1" comment="xen-kmp-default is &lt;4.5.2_01_k4.1.12_1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118978" version="1" comment="xen-libs is &lt;4.5.2_01-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118979" version="1" comment="xen-libs-32bit is &lt;4.5.2_01-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118980" version="1" comment="xen-tools is &lt;4.5.2_01-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118981" version="1" comment="xen-tools-domU is &lt;4.5.2_01-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119216" version="1" comment="libmbedtls9 is &lt;1.3.15-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119217" version="1" comment="libmbedtls9-32bit is &lt;1.3.15-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119218" version="1" comment="mbedtls is &lt;1.3.15-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119219" version="1" comment="mbedtls-devel is &lt;1.3.15-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102671" version="1" comment="libopenssl-devel is &lt;1.0.1i-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119601" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1i-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102672" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119602" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102673" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119603" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102674" version="1" comment="openssl is &lt;1.0.1i-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102675" version="1" comment="openssl-doc is &lt;1.0.1i-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119591" version="1" comment="chromedriver is &lt;47.0.2526.80-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119592" version="1" comment="chromium is &lt;47.0.2526.80-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119593" version="1" comment="chromium-desktop-gnome is &lt;47.0.2526.80-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119594" version="1" comment="chromium-desktop-kde is &lt;47.0.2526.80-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119595" version="1" comment="chromium-ffmpegsumo is &lt;47.0.2526.80-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119757" version="1" comment="libXfont is &lt;1.5.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119758" version="1" comment="libXfont-devel is &lt;1.5.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119759" version="1" comment="libXfont-devel-32bit is &lt;1.5.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119760" version="1" comment="libXfont1 is &lt;1.5.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119761" version="1" comment="libXfont1-32bit is &lt;1.5.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119774" version="1" comment="libcrypto36 is &lt;2.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119775" version="1" comment="libcrypto36-32bit is &lt;2.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119776" version="1" comment="libressl is &lt;2.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119777" version="1" comment="libressl-devel is &lt;2.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119778" version="1" comment="libressl-devel-32bit is &lt;2.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119779" version="1" comment="libressl-devel-doc is &lt;2.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119782" version="1" comment="libssl37 is &lt;2.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119783" version="1" comment="libssl37-32bit is &lt;2.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119786" version="1" comment="libtls9 is &lt;2.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119787" version="1" comment="libtls9-32bit is &lt;2.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119863" version="1" comment="quassel is &lt;0.12.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119864" version="1" comment="quassel-base is &lt;0.12.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119865" version="1" comment="quassel-client is &lt;0.12.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119866" version="1" comment="quassel-core is &lt;0.12.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119867" version="1" comment="quassel-mono is &lt;0.12.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119868" version="1" comment="chromedriver is &lt;47.0.2526.106-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119869" version="1" comment="chromium is &lt;47.0.2526.106-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119870" version="1" comment="chromium-desktop-gnome is &lt;47.0.2526.106-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119871" version="1" comment="chromium-desktop-kde is &lt;47.0.2526.106-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119872" version="1" comment="chromium-ffmpegsumo is &lt;47.0.2526.106-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119893" version="1" comment="compat-openssl098 is &lt;0.9.8j-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119894" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119895" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119896" version="1" comment="MozillaFirefox is &lt;43.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119897" version="1" comment="MozillaFirefox-branding-upstream is &lt;43.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119898" version="1" comment="MozillaFirefox-buildsymbols is &lt;43.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119899" version="1" comment="MozillaFirefox-devel is &lt;43.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119900" version="1" comment="MozillaFirefox-translations-common is &lt;43.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119901" version="1" comment="MozillaFirefox-translations-other is &lt;43.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119928" version="1" comment="ldb is &lt;1.1.24-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119929" version="1" comment="ldb-tools is &lt;1.1.24-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119930" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119931" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119932" version="1" comment="libdcerpc-atsvc0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119933" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119934" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119935" version="1" comment="libdcerpc-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119936" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119937" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119938" version="1" comment="libdcerpc-samr0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119939" version="1" comment="libdcerpc0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119940" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119941" version="1" comment="libgensec-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119942" version="1" comment="libgensec0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119943" version="1" comment="libgensec0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119944" version="1" comment="libldb-devel is &lt;1.1.24-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119945" version="1" comment="libldb1 is &lt;1.1.24-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119946" version="1" comment="libldb1-32bit is &lt;1.1.24-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119947" version="1" comment="libndr-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119948" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119949" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119950" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119951" version="1" comment="libndr-nbt-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119952" version="1" comment="libndr-nbt0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119953" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119954" version="1" comment="libndr-standard-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119955" version="1" comment="libndr-standard0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119956" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119957" version="1" comment="libndr0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119958" version="1" comment="libndr0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119959" version="1" comment="libnetapi-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119960" version="1" comment="libnetapi0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119961" version="1" comment="libnetapi0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119962" version="1" comment="libregistry-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119963" version="1" comment="libregistry0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119964" version="1" comment="libregistry0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119965" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119966" version="1" comment="libsamba-credentials0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119967" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119968" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119969" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119970" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119971" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119972" version="1" comment="libsamba-passdb0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119973" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119974" version="1" comment="libsamba-policy-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119975" version="1" comment="libsamba-policy0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119976" version="1" comment="libsamba-policy0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119977" version="1" comment="libsamba-util-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119978" version="1" comment="libsamba-util0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119979" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119980" version="1" comment="libsamdb-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119981" version="1" comment="libsamdb0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119982" version="1" comment="libsamdb0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119983" version="1" comment="libsmbclient-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119984" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119985" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119986" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119987" version="1" comment="libsmbclient0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119988" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119989" version="1" comment="libsmbconf-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119990" version="1" comment="libsmbconf0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119991" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119992" version="1" comment="libsmbldap-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119993" version="1" comment="libsmbldap0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119994" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119995" version="1" comment="libtalloc-devel is &lt;2.1.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119996" version="1" comment="libtalloc2 is &lt;2.1.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119997" version="1" comment="libtalloc2-32bit is &lt;2.1.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119998" version="1" comment="libtdb-devel is &lt;1.3.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119999" version="1" comment="libtdb1 is &lt;1.3.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120000" version="1" comment="libtdb1-32bit is &lt;1.3.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120001" version="1" comment="libtevent-devel is &lt;0.9.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120002" version="1" comment="libtevent-util-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120003" version="1" comment="libtevent-util0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120004" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120005" version="1" comment="libtevent0 is &lt;0.9.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120006" version="1" comment="libtevent0-32bit is &lt;0.9.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120007" version="1" comment="libwbclient-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120008" version="1" comment="libwbclient0 is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120009" version="1" comment="libwbclient0-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120010" version="1" comment="pyldb is &lt;1.1.24-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120011" version="1" comment="pyldb-32bit is &lt;1.1.24-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120012" version="1" comment="pyldb-devel is &lt;1.1.24-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120013" version="1" comment="pytalloc is &lt;2.1.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120014" version="1" comment="pytalloc-32bit is &lt;2.1.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120015" version="1" comment="pytalloc-devel is &lt;2.1.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120016" version="1" comment="python-tdb is &lt;1.3.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120017" version="1" comment="python-tdb-32bit is &lt;1.3.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120018" version="1" comment="python-tevent is &lt;0.9.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120019" version="1" comment="python-tevent-32bit is &lt;0.9.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120020" version="1" comment="samba is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120021" version="1" comment="samba-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120022" version="1" comment="samba-client is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120023" version="1" comment="samba-client-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120024" version="1" comment="samba-core-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120025" version="1" comment="samba-doc is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120026" version="1" comment="samba-libs is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120027" version="1" comment="samba-libs-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120028" version="1" comment="samba-pidl is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120029" version="1" comment="samba-python is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120030" version="1" comment="samba-test is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120031" version="1" comment="samba-test-devel is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120032" version="1" comment="samba-winbind is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120033" version="1" comment="samba-winbind-32bit is &lt;4.2.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120034" version="1" comment="talloc is &lt;2.1.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120035" version="1" comment="tdb is &lt;1.3.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120036" version="1" comment="tdb-tools is &lt;1.3.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120037" version="1" comment="tevent is &lt;0.9.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120394" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120395" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120396" version="1" comment="subversion is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120397" version="1" comment="subversion-bash-completion is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120398" version="1" comment="subversion-devel is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120399" version="1" comment="subversion-perl is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120400" version="1" comment="subversion-python is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120401" version="1" comment="subversion-ruby is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120402" version="1" comment="subversion-server is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120403" version="1" comment="subversion-tools is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120404" version="1" comment="bind is &lt;9.9.6P1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120405" version="1" comment="bind-chrootenv is &lt;9.9.6P1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120406" version="1" comment="bind-devel is &lt;9.9.6P1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120407" version="1" comment="bind-doc is &lt;9.9.6P1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120408" version="1" comment="bind-libs is &lt;9.9.6P1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120409" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120410" version="1" comment="bind-lwresd is &lt;9.9.6P1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120411" version="1" comment="bind-utils is &lt;9.9.6P1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120451" version="1" comment="calibre is &lt;2.46.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120452" version="1" comment="fcitx-qt5 is &lt;1.0.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120453" version="1" comment="fcitx-qt5-32bit is &lt;1.0.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120454" version="1" comment="fcitx-qt5-devel is &lt;1.0.4-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120455" version="1" comment="frameworkintegration is &lt;5.16.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120456" version="1" comment="frameworkintegration-devel is &lt;5.16.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120457" version="1" comment="frameworkintegration-devel-32bit is &lt;5.16.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120458" version="1" comment="frameworkintegration-plugin is &lt;5.16.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120459" version="1" comment="frameworkintegration-plugin-32bit is &lt;5.16.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120460" version="1" comment="kwayland is &lt;5.4.3-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120461" version="1" comment="kwayland-32bit is &lt;5.4.3-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120462" version="1" comment="kwayland-devel is &lt;5.4.3-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120463" version="1" comment="kwayland-devel-32bit is &lt;5.4.3-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120464" version="1" comment="kwin5 is &lt;5.4.3-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120465" version="1" comment="kwin5-devel is &lt;5.4.3-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120466" version="1" comment="kwin5-lang is &lt;5.4.3-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120467" version="1" comment="libKF5Style5 is &lt;5.16.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120468" version="1" comment="libKF5Style5-32bit is &lt;5.16.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120469" version="1" comment="libKF5Style5-lang is &lt;5.16.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120470" version="1" comment="libQt53DCollision-devel is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120471" version="1" comment="libQt53DCollision5 is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120472" version="1" comment="libQt53DCollision5-32bit is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120473" version="1" comment="libQt53DCore-devel is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120474" version="1" comment="libQt53DCore5 is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120475" version="1" comment="libQt53DCore5-32bit is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120476" version="1" comment="libQt53DInput-devel is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120477" version="1" comment="libQt53DInput5 is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120478" version="1" comment="libQt53DInput5-32bit is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120479" version="1" comment="libQt53DLogic-devel is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120480" version="1" comment="libQt53DLogic5 is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120481" version="1" comment="libQt53DLogic5-32bit is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120482" version="1" comment="libQt53DQuick-devel is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120483" version="1" comment="libQt53DQuick5 is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120484" version="1" comment="libQt53DQuick5-32bit is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120485" version="1" comment="libQt53DQuickRenderer-devel is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120486" version="1" comment="libQt53DQuickRenderer5 is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120487" version="1" comment="libQt53DQuickRenderer5-32bit is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120488" version="1" comment="libQt53DRenderer-devel is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120489" version="1" comment="libQt53DRenderer5 is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120490" version="1" comment="libQt53DRenderer5-32bit is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120491" version="1" comment="libQt5Bluetooth5 is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120492" version="1" comment="libQt5Bluetooth5-32bit is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120493" version="1" comment="libQt5Bluetooth5-imports is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120494" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120495" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120496" version="1" comment="libQt5CLucene5 is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120497" version="1" comment="libQt5CLucene5-32bit is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120498" version="1" comment="libQt5Compositor5 is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120499" version="1" comment="libQt5Compositor5-32bit is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120500" version="1" comment="libQt5Concurrent-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120501" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120502" version="1" comment="libQt5Concurrent5 is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120503" version="1" comment="libQt5Concurrent5-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120504" version="1" comment="libQt5Core-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120505" version="1" comment="libQt5Core-devel-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120506" version="1" comment="libQt5Core-private-headers-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120507" version="1" comment="libQt5Core5 is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120508" version="1" comment="libQt5Core5-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120509" version="1" comment="libQt5DBus-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120510" version="1" comment="libQt5DBus-devel-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120511" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120512" version="1" comment="libQt5DBus5 is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120513" version="1" comment="libQt5DBus5-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120514" version="1" comment="libQt5Declarative5 is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120515" version="1" comment="libQt5Declarative5-32bit is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120516" version="1" comment="libQt5Designer5 is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120517" version="1" comment="libQt5Designer5-32bit is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120518" version="1" comment="libQt5DesignerComponents5 is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120519" version="1" comment="libQt5DesignerComponents5-32bit is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120520" version="1" comment="libQt5Gui-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120521" version="1" comment="libQt5Gui-devel-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120522" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120523" version="1" comment="libQt5Gui5 is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120524" version="1" comment="libQt5Gui5-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120525" version="1" comment="libQt5Help5 is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120526" version="1" comment="libQt5Help5-32bit is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120527" version="1" comment="libQt5Location5 is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120528" version="1" comment="libQt5Location5-32bit is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120529" version="1" comment="libQt5Multimedia5 is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120530" version="1" comment="libQt5Multimedia5-32bit is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120531" version="1" comment="libQt5Network-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120532" version="1" comment="libQt5Network-devel-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120533" version="1" comment="libQt5Network-private-headers-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120534" version="1" comment="libQt5Network5 is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120535" version="1" comment="libQt5Network5-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120536" version="1" comment="libQt5Nfc5 is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120537" version="1" comment="libQt5Nfc5-32bit is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120538" version="1" comment="libQt5Nfc5-imports is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120539" version="1" comment="libQt5OpenGL-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120540" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120541" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120542" version="1" comment="libQt5OpenGL5 is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120543" version="1" comment="libQt5OpenGL5-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120544" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120545" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120546" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120547" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120548" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120549" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120550" version="1" comment="libQt5Positioning5 is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120551" version="1" comment="libQt5Positioning5-32bit is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120552" version="1" comment="libQt5PrintSupport-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120553" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120554" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120555" version="1" comment="libQt5PrintSupport5 is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120556" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120557" version="1" comment="libQt5Script5 is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120558" version="1" comment="libQt5Script5-32bit is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120559" version="1" comment="libQt5Sensors5 is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120560" version="1" comment="libQt5Sensors5-32bit is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120561" version="1" comment="libQt5Sensors5-imports is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120562" version="1" comment="libQt5SerialPort5 is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120563" version="1" comment="libQt5SerialPort5-32bit is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120564" version="1" comment="libQt5Sql-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120565" version="1" comment="libQt5Sql-devel-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120566" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120567" version="1" comment="libQt5Sql5 is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120568" version="1" comment="libQt5Sql5-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120569" version="1" comment="libQt5Sql5-mysql is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120570" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120571" version="1" comment="libQt5Sql5-postgresql is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120572" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120573" version="1" comment="libQt5Sql5-sqlite is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120574" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120575" version="1" comment="libQt5Sql5-unixODBC is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120576" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120577" version="1" comment="libQt5Svg5 is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120578" version="1" comment="libQt5Svg5-32bit is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120579" version="1" comment="libQt5Test-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120580" version="1" comment="libQt5Test-devel-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120581" version="1" comment="libQt5Test-private-headers-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120582" version="1" comment="libQt5Test5 is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120583" version="1" comment="libQt5Test5-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120584" version="1" comment="libQt5WaylandClient5 is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120585" version="1" comment="libQt5WaylandClient5-32bit is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120586" version="1" comment="libQt5WebChannel5 is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120587" version="1" comment="libQt5WebChannel5-32bit is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120588" version="1" comment="libQt5WebChannel5-imports is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120589" version="1" comment="libQt5WebKit-private-headers-devel is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120590" version="1" comment="libQt5WebKit5 is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120591" version="1" comment="libQt5WebKit5-32bit is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120592" version="1" comment="libQt5WebKit5-devel is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120593" version="1" comment="libQt5WebKit5-devel-32bit is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120594" version="1" comment="libQt5WebKit5-imports is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120595" version="1" comment="libQt5WebKitWidgets-devel is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120596" version="1" comment="libQt5WebKitWidgets-devel-32bit is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120597" version="1" comment="libQt5WebKitWidgets-private-headers-devel is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120598" version="1" comment="libQt5WebKitWidgets5 is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120599" version="1" comment="libQt5WebKitWidgets5-32bit is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120600" version="1" comment="libQt5WebSockets5 is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120601" version="1" comment="libQt5WebSockets5-32bit is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120602" version="1" comment="libQt5WebSockets5-imports is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120603" version="1" comment="libQt5Widgets-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120604" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120605" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120606" version="1" comment="libQt5Widgets5 is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120607" version="1" comment="libQt5Widgets5-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120608" version="1" comment="libQt5X11Extras5 is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120609" version="1" comment="libQt5X11Extras5-32bit is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120610" version="1" comment="libQt5Xml-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120611" version="1" comment="libQt5Xml-devel-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120612" version="1" comment="libQt5Xml5 is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120613" version="1" comment="libQt5Xml5-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120614" version="1" comment="libQt5XmlPatterns5 is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120615" version="1" comment="libQt5XmlPatterns5-32bit is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120616" version="1" comment="libQtQuick5 is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120617" version="1" comment="libQtQuick5-32bit is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120618" version="1" comment="libqt5-creator is &lt;3.5.1-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120619" version="1" comment="libqt5-linguist is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120620" version="1" comment="libqt5-linguist-devel is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120621" version="1" comment="libqt5-qt3d is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120622" version="1" comment="libqt5-qt3d-devel is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120623" version="1" comment="libqt5-qt3d-examples is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120624" version="1" comment="libqt5-qt3d-imports is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120625" version="1" comment="libqt5-qt3d-private-headers-devel is &lt;5.5.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120626" version="1" comment="libqt5-qtbase is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120627" version="1" comment="libqt5-qtbase-common-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120628" version="1" comment="libqt5-qtbase-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120629" version="1" comment="libqt5-qtbase-doc is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120630" version="1" comment="libqt5-qtbase-examples is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120631" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120632" version="1" comment="libqt5-qtbase-platformtheme-gtk2 is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120633" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120634" version="1" comment="libqt5-qtconnectivity is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120635" version="1" comment="libqt5-qtconnectivity-devel is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120636" version="1" comment="libqt5-qtconnectivity-devel-32bit is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120637" version="1" comment="libqt5-qtconnectivity-examples is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120638" version="1" comment="libqt5-qtconnectivity-private-headers-devel is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120639" version="1" comment="libqt5-qtconnectivity-tools is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120640" version="1" comment="libqt5-qtct is &lt;0.20-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120641" version="1" comment="libqt5-qtdeclarative is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120642" version="1" comment="libqt5-qtdeclarative-devel is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120643" version="1" comment="libqt5-qtdeclarative-devel-32bit is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120644" version="1" comment="libqt5-qtdeclarative-examples is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120645" version="1" comment="libqt5-qtdeclarative-private-headers-devel is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120646" version="1" comment="libqt5-qtdeclarative-tools is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120647" version="1" comment="libqt5-qtdoc is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120648" version="1" comment="libqt5-qtgraphicaleffects is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120649" version="1" comment="libqt5-qtimageformats is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120650" version="1" comment="libqt5-qtimageformats-32bit is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120651" version="1" comment="libqt5-qtimageformats-devel is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120652" version="1" comment="libqt5-qtlocation is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120653" version="1" comment="libqt5-qtlocation-devel is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120654" version="1" comment="libqt5-qtlocation-devel-32bit is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120655" version="1" comment="libqt5-qtlocation-examples is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120656" version="1" comment="libqt5-qtlocation-private-headers-devel is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120657" version="1" comment="libqt5-qtmultimedia is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120658" version="1" comment="libqt5-qtmultimedia-devel is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120659" version="1" comment="libqt5-qtmultimedia-devel-32bit is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120660" version="1" comment="libqt5-qtmultimedia-examples is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120661" version="1" comment="libqt5-qtmultimedia-private-headers-devel is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120662" version="1" comment="libqt5-qtquick1 is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120663" version="1" comment="libqt5-qtquick1-devel is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120664" version="1" comment="libqt5-qtquick1-devel-32bit is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120665" version="1" comment="libqt5-qtquick1-examples is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120666" version="1" comment="libqt5-qtquick1-private-headers-devel is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120667" version="1" comment="libqt5-qtquickcontrols is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120668" version="1" comment="libqt5-qtquickcontrols-examples is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120669" version="1" comment="libqt5-qtscript is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120670" version="1" comment="libqt5-qtscript-devel is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120671" version="1" comment="libqt5-qtscript-devel-32bit is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120672" version="1" comment="libqt5-qtscript-examples is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120673" version="1" comment="libqt5-qtscript-private-headers-devel is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120674" version="1" comment="libqt5-qtsensors is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120675" version="1" comment="libqt5-qtsensors-devel is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120676" version="1" comment="libqt5-qtsensors-devel-32bit is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120677" version="1" comment="libqt5-qtsensors-examples is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120678" version="1" comment="libqt5-qtsensors-private-headers-devel is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120679" version="1" comment="libqt5-qtserialport is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120680" version="1" comment="libqt5-qtserialport-devel is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120681" version="1" comment="libqt5-qtserialport-devel-32bit is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120682" version="1" comment="libqt5-qtserialport-private-headers-devel is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120683" version="1" comment="libqt5-qtsvg is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120684" version="1" comment="libqt5-qtsvg-devel is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120685" version="1" comment="libqt5-qtsvg-devel-32bit is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120686" version="1" comment="libqt5-qtsvg-examples is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120687" version="1" comment="libqt5-qtsvg-private-headers-devel is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120688" version="1" comment="libqt5-qttools is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120689" version="1" comment="libqt5-qttools-32bit is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120690" version="1" comment="libqt5-qttools-devel is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120691" version="1" comment="libqt5-qttools-devel-32bit is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120692" version="1" comment="libqt5-qttools-examples is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120693" version="1" comment="libqt5-qttools-private-headers-devel is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120694" version="1" comment="libqt5-qttranslations is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120695" version="1" comment="libqt5-qtwayland is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120696" version="1" comment="libqt5-qtwayland-32bit is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120697" version="1" comment="libqt5-qtwayland-devel is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120698" version="1" comment="libqt5-qtwayland-devel-32bit is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120699" version="1" comment="libqt5-qtwayland-examples is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120700" version="1" comment="libqt5-qtwayland-private-headers-devel is &lt;5.5.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120701" version="1" comment="libqt5-qtwebchannel is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120702" version="1" comment="libqt5-qtwebchannel-devel is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120703" version="1" comment="libqt5-qtwebchannel-devel-32bit is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120704" version="1" comment="libqt5-qtwebchannel-examples is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120705" version="1" comment="libqt5-qtwebchannel-private-headers-devel is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120706" version="1" comment="libqt5-qtwebengine is &lt;5.5.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120707" version="1" comment="libqt5-qtwebengine-32bit is &lt;5.5.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120708" version="1" comment="libqt5-qtwebengine-devel is &lt;5.5.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120709" version="1" comment="libqt5-qtwebengine-devel-32bit is &lt;5.5.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120710" version="1" comment="libqt5-qtwebengine-examples is &lt;5.5.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120711" version="1" comment="libqt5-qtwebengine-private-headers-devel is &lt;5.5.1-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120712" version="1" comment="libqt5-qtwebkit is &lt;5.5.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120713" version="1" comment="libqt5-qtwebkit-examples is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120714" version="1" comment="libqt5-qtwebsockets is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120715" version="1" comment="libqt5-qtwebsockets-devel is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120716" version="1" comment="libqt5-qtwebsockets-devel-32bit is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120717" version="1" comment="libqt5-qtwebsockets-examples is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120718" version="1" comment="libqt5-qtwebsockets-private-headers-devel is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120719" version="1" comment="libqt5-qtx11extras is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120720" version="1" comment="libqt5-qtx11extras-devel is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120721" version="1" comment="libqt5-qtx11extras-devel-32bit is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120722" version="1" comment="libqt5-qtxmlpatterns is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120723" version="1" comment="libqt5-qtxmlpatterns-devel is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120724" version="1" comment="libqt5-qtxmlpatterns-devel-32bit is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120725" version="1" comment="libqt5-qtxmlpatterns-examples is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120726" version="1" comment="libqt5-qtxmlpatterns-private-headers-devel is &lt;5.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120727" version="1" comment="lxqt-powermanagement is &lt;0.9.0-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120728" version="1" comment="lxqt-powermanagement-lang is &lt;0.9.0-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120729" version="1" comment="lxqt-qtplugin is &lt;0.9.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120412" version="1" comment="gummi is &lt;0.7.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120413" version="1" comment="gummi-lang is &lt;0.7.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120730" version="1" comment="krb5 is &lt;1.12.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120731" version="1" comment="krb5-32bit is &lt;1.12.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120732" version="1" comment="krb5-client is &lt;1.12.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120733" version="1" comment="krb5-devel is &lt;1.12.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120734" version="1" comment="krb5-devel-32bit is &lt;1.12.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120735" version="1" comment="krb5-doc is &lt;1.12.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120736" version="1" comment="krb5-mini is &lt;1.12.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120737" version="1" comment="krb5-mini-devel is &lt;1.12.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120738" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120739" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120740" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120741" version="1" comment="krb5-server is &lt;1.12.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120742" version="1" comment="ffmpeg is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120743" version="1" comment="ffmpeg-devel is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120744" version="1" comment="libavcodec-devel is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120745" version="1" comment="libavcodec56 is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120746" version="1" comment="libavcodec56-32bit is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120747" version="1" comment="libavdevice-devel is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120748" version="1" comment="libavdevice56 is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120749" version="1" comment="libavdevice56-32bit is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120750" version="1" comment="libavfilter-devel is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120751" version="1" comment="libavfilter5 is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120752" version="1" comment="libavfilter5-32bit is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120753" version="1" comment="libavformat-devel is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120754" version="1" comment="libavformat56 is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120755" version="1" comment="libavformat56-32bit is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120756" version="1" comment="libavresample-devel is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120757" version="1" comment="libavresample2 is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120758" version="1" comment="libavresample2-32bit is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120759" version="1" comment="libavutil-devel is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120760" version="1" comment="libavutil54 is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120761" version="1" comment="libavutil54-32bit is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120762" version="1" comment="libpostproc-devel is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120763" version="1" comment="libpostproc53 is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120764" version="1" comment="libpostproc53-32bit is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120765" version="1" comment="libswresample-devel is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120766" version="1" comment="libswresample1 is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120767" version="1" comment="libswresample1-32bit is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120768" version="1" comment="libswscale-devel is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120769" version="1" comment="libswscale3 is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120770" version="1" comment="libswscale3-32bit is &lt;2.8.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120798" version="1" comment="xulrunner is &lt;38.5.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120799" version="1" comment="xulrunner-32bit is &lt;38.5.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120800" version="1" comment="xulrunner-devel is &lt;38.5.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120911" version="1" comment="MozillaThunderbird is &lt;38.5.0-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120912" version="1" comment="MozillaThunderbird-buildsymbols is &lt;38.5.0-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120913" version="1" comment="MozillaThunderbird-devel is &lt;38.5.0-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120914" version="1" comment="MozillaThunderbird-translations-common is &lt;38.5.0-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120915" version="1" comment="MozillaThunderbird-translations-other is &lt;38.5.0-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120916" version="1" comment="libfreebl3 is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120917" version="1" comment="libfreebl3-32bit is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120918" version="1" comment="libsoftokn3 is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120919" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120920" version="1" comment="mozilla-nss is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120921" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120922" version="1" comment="mozilla-nss-certs is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120923" version="1" comment="mozilla-nss-certs-32bit is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120924" version="1" comment="mozilla-nss-devel is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120925" version="1" comment="mozilla-nss-sysinit is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120926" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120927" version="1" comment="mozilla-nss-tools is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120964" version="1" comment="claws-mail is &lt;3.12.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120965" version="1" comment="claws-mail-devel is &lt;3.12.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120966" version="1" comment="claws-mail-lang is &lt;3.12.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121123" version="1" comment="grub2 is &lt;2.02~beta2-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121124" version="1" comment="grub2-branding-upstream is &lt;2.02~beta2-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121125" version="1" comment="grub2-i386-efi is &lt;2.02~beta2-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121126" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121127" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121128" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121129" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133256" version="1" comment="typo3-cms-4_7 is &lt;4.7.20-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133261" version="1" comment="pdns is &lt;3.4.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133262" version="1" comment="pdns-backend-ldap is &lt;3.4.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133263" version="1" comment="pdns-backend-lua is &lt;3.4.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133264" version="1" comment="pdns-backend-mydns is &lt;3.4.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133265" version="1" comment="pdns-backend-mysql is &lt;3.4.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133266" version="1" comment="pdns-backend-postgresql is &lt;3.4.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133267" version="1" comment="pdns-backend-sqlite3 is &lt;3.4.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133268" version="1" comment="apache2-mod_fcgid is &lt;2.3.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122198" version="1" comment="libtiff-devel is &lt;4.0.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122199" version="1" comment="libtiff-devel-32bit is &lt;4.0.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122200" version="1" comment="libtiff5 is &lt;4.0.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122201" version="1" comment="libtiff5-32bit is &lt;4.0.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122202" version="1" comment="tiff is &lt;4.0.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134259" version="1" comment="libidn is &lt;1.28-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134260" version="1" comment="libidn-devel is &lt;1.28-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134261" version="1" comment="libidn-tools is &lt;1.28-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134262" version="1" comment="libidn11 is &lt;1.28-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134263" version="1" comment="libidn11-32bit is &lt;1.28-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134264" version="1" comment="ImageMagick is &lt;6.8.8.1-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134265" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134266" version="1" comment="ImageMagick-devel-32bit is &lt;6.8.8.1-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134267" version="1" comment="ImageMagick-doc is &lt;6.8.8.1-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134268" version="1" comment="ImageMagick-extra is &lt;6.8.8.1-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134269" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134270" version="1" comment="libMagick++-6_Q16-3-32bit is &lt;6.8.8.1-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134271" version="1" comment="libMagick++-devel is &lt;6.8.8.1-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134272" version="1" comment="libMagick++-devel-32bit is &lt;6.8.8.1-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134273" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134274" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134275" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134276" version="1" comment="libMagickWand-6_Q16-1-32bit is &lt;6.8.8.1-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134277" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133370" version="1" comment="phpMyAdmin is &lt;4.4.15.8-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133371" version="1" comment="typo3-cms-4_5 is &lt;4.5.40-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133372" version="1" comment="MozillaFirefox is &lt;48.0.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133373" version="1" comment="MozillaFirefox-branding-upstream is &lt;48.0.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133374" version="1" comment="MozillaFirefox-buildsymbols is &lt;48.0.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133375" version="1" comment="MozillaFirefox-devel is &lt;48.0.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133376" version="1" comment="MozillaFirefox-translations-common is &lt;48.0.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133377" version="1" comment="MozillaFirefox-translations-other is &lt;48.0.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133378" version="1" comment="libfreebl3 is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133379" version="1" comment="libfreebl3-32bit is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133380" version="1" comment="libsoftokn3 is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133381" version="1" comment="libsoftokn3-32bit is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133382" version="1" comment="mozilla-nss is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133383" version="1" comment="mozilla-nss-32bit is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133384" version="1" comment="mozilla-nss-certs is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133385" version="1" comment="mozilla-nss-certs-32bit is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133386" version="1" comment="mozilla-nss-devel is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133387" version="1" comment="mozilla-nss-sysinit is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133388" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133389" version="1" comment="mozilla-nss-tools is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134278" version="1" comment="libqt4 is &lt;4.8.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134279" version="1" comment="libqt4-32bit is &lt;4.8.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134280" version="1" comment="libqt4-devel is &lt;4.8.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134281" version="1" comment="libqt4-devel-doc is &lt;4.8.6-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134282" version="1" comment="libqt4-devel-doc-data is &lt;4.8.6-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134283" version="1" comment="libqt4-linguist is &lt;4.8.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134284" version="1" comment="libqt4-private-headers-devel is &lt;4.8.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134285" version="1" comment="libqt4-qt3support is &lt;4.8.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134286" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134287" version="1" comment="libqt4-sql is &lt;4.8.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134288" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134289" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134290" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134291" version="1" comment="libqt4-sql-plugins is &lt;4.8.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134292" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134293" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134294" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134295" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134296" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134297" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134298" version="1" comment="libqt4-x11 is &lt;4.8.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134299" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134300" version="1" comment="qt4-x11-tools is &lt;4.8.6-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122305" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122306" version="1" comment="libldap-2_4-2 is &lt;2.4.41-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122307" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122308" version="1" comment="openldap2 is &lt;2.4.41-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122309" version="1" comment="openldap2-back-meta is &lt;2.4.41-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122310" version="1" comment="openldap2-back-perl is &lt;2.4.41-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122311" version="1" comment="openldap2-back-sql is &lt;2.4.41-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122312" version="1" comment="openldap2-client is &lt;2.4.41-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122313" version="1" comment="openldap2-devel is &lt;2.4.41-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122314" version="1" comment="openldap2-devel-32bit is &lt;2.4.41-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122315" version="1" comment="openldap2-devel-static is &lt;2.4.41-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122316" version="1" comment="openldap2-doc is &lt;2.4.41-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134301" version="1" comment="cracklib-devel-32bit is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134302" version="1" comment="libpwquality is &lt;1.2.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134303" version="1" comment="libpwquality-devel is &lt;1.2.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134304" version="1" comment="libpwquality-lang is &lt;1.2.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134305" version="1" comment="libpwquality-tools is &lt;1.2.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134306" version="1" comment="libpwquality1 is &lt;1.2.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134307" version="1" comment="pam_pwquality is &lt;1.2.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134308" version="1" comment="python-pwquality is &lt;1.2.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134309" version="1" comment="dosfstools is &lt;3.0.26-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134310" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134311" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134312" version="1" comment="libxerces-c-devel is &lt;3.1.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134313" version="1" comment="xerces-c is &lt;3.1.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133407" version="1" comment="eog is &lt;3.16.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133408" version="1" comment="eog-devel is &lt;3.16.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133409" version="1" comment="eog-lang is &lt;3.16.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134314" version="1" comment="tomcat is &lt;8.0.32-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134315" version="1" comment="tomcat-admin-webapps is &lt;8.0.32-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134316" version="1" comment="tomcat-docs-webapp is &lt;8.0.32-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134317" version="1" comment="tomcat-el-3_0-api is &lt;8.0.32-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134318" version="1" comment="tomcat-embed is &lt;8.0.32-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134319" version="1" comment="tomcat-javadoc is &lt;8.0.32-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134320" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.32-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134321" version="1" comment="tomcat-jsvc is &lt;8.0.32-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134322" version="1" comment="tomcat-lib is &lt;8.0.32-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134323" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.32-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134324" version="1" comment="tomcat-webapps is &lt;8.0.32-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122317" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.72-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122318" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.72-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122319" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.72-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122320" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.72-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122321" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.72-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122322" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.72-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122323" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.72-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134325" version="1" comment="libstorage is &lt;2.25.35.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134326" version="1" comment="libstorage-devel is &lt;2.25.35.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134327" version="1" comment="libstorage-python is &lt;2.25.35.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134328" version="1" comment="libstorage-ruby is &lt;2.25.35.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134329" version="1" comment="libstorage-testsuite is &lt;2.25.35.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134330" version="1" comment="libstorage6 is &lt;2.25.35.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134331" version="1" comment="yast2-storage is &lt;3.1.71-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134332" version="1" comment="yast2-storage-devel is &lt;3.1.71-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134333" version="1" comment="libsrtp is &lt;1.5.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134334" version="1" comment="libsrtp-devel is &lt;1.5.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134335" version="1" comment="libsrtp1 is &lt;1.5.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134336" version="1" comment="libsrtp1-32bit is &lt;1.5.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134337" version="1" comment="libtcnative-1-0 is &lt;1.1.32-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134338" version="1" comment="libtcnative-1-0-devel is &lt;1.1.32-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134339" version="1" comment="krb5 is &lt;1.12.1-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134340" version="1" comment="krb5-32bit is &lt;1.12.1-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134341" version="1" comment="krb5-client is &lt;1.12.1-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134342" version="1" comment="krb5-devel is &lt;1.12.1-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134343" version="1" comment="krb5-devel-32bit is &lt;1.12.1-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134344" version="1" comment="krb5-doc is &lt;1.12.1-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134345" version="1" comment="krb5-mini is &lt;1.12.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134346" version="1" comment="krb5-mini-devel is &lt;1.12.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134347" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134348" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134349" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134350" version="1" comment="krb5-server is &lt;1.12.1-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134351" version="1" comment="wget is &lt;1.14-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134352" version="1" comment="libmysqlclient-devel is &lt;10.0.26-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134353" version="1" comment="libmysqlclient18 is &lt;10.0.26-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134354" version="1" comment="libmysqlclient18-32bit is &lt;10.0.26-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134355" version="1" comment="libmysqlclient_r18 is &lt;10.0.26-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134356" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.26-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134357" version="1" comment="libmysqld-devel is &lt;10.0.26-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134358" version="1" comment="libmysqld18 is &lt;10.0.26-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134359" version="1" comment="mariadb is &lt;10.0.26-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134360" version="1" comment="mariadb-bench is &lt;10.0.26-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134361" version="1" comment="mariadb-client is &lt;10.0.26-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134362" version="1" comment="mariadb-errormessages is &lt;10.0.26-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134363" version="1" comment="mariadb-test is &lt;10.0.26-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134364" version="1" comment="mariadb-tools is &lt;10.0.26-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134365" version="1" comment="fontconfig is &lt;2.11.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134366" version="1" comment="fontconfig-32bit is &lt;2.11.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134367" version="1" comment="fontconfig-devel is &lt;2.11.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134368" version="1" comment="fontconfig-devel-32bit is &lt;2.11.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133420" version="1" comment="gdk-pixbuf is &lt;2.32.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133421" version="1" comment="gdk-pixbuf-devel is &lt;2.32.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133422" version="1" comment="gdk-pixbuf-devel-32bit is &lt;2.32.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133423" version="1" comment="gdk-pixbuf-lang is &lt;2.32.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133424" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.32.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133425" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.32.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133426" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.32.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133427" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.32.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133428" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.32.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134369" version="1" comment="ocaml is &lt;4.02.3-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134370" version="1" comment="ocaml-compiler-libs is &lt;4.02.3-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134371" version="1" comment="ocaml-compiler-libs-devel is &lt;4.02.3-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134372" version="1" comment="ocaml-docs is &lt;4.02.3-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134373" version="1" comment="ocaml-emacs is &lt;4.02.3-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134374" version="1" comment="ocaml-ocamldoc is &lt;4.02.3-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134375" version="1" comment="ocaml-rpm-macros is &lt;4.02.3-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134376" version="1" comment="ocaml-runtime is &lt;4.02.3-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134377" version="1" comment="ocaml-source is &lt;4.02.3-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134378" version="1" comment="ocaml-x11 is &lt;4.02.3-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134379" version="1" comment="libtorrent-rasterbar is &lt;1.0.10-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134380" version="1" comment="libtorrent-rasterbar-devel is &lt;1.0.10-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134381" version="1" comment="libtorrent-rasterbar-doc is &lt;1.0.10-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134382" version="1" comment="libtorrent-rasterbar8 is &lt;1.0.10-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134383" version="1" comment="python-libtorrent-rasterbar is &lt;1.0.10-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134384" version="1" comment="drbd is &lt;8.4.6-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134385" version="1" comment="drbd-kmp-default is &lt;8.4.6_k4.1.31_30-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134386" version="1" comment="drbd-kmp-pv is &lt;8.4.6_k4.1.31_30-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134387" version="1" comment="drbd-kmp-xen is &lt;8.4.6_k4.1.31_30-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134388" version="1" comment="hdjmod is &lt;1.28-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134389" version="1" comment="hdjmod-kmp-default is &lt;1.28_k4.1.31_30-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134390" version="1" comment="hdjmod-kmp-pae is &lt;1.28_k4.1.31_30-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134391" version="1" comment="hdjmod-kmp-pv is &lt;1.28_k4.1.31_30-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134392" version="1" comment="hdjmod-kmp-xen is &lt;1.28_k4.1.31_30-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134393" version="1" comment="ipset is &lt;6.25.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134394" version="1" comment="ipset-devel is &lt;6.25.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134395" version="1" comment="ipset-kmp-default is &lt;6.25.1_k4.1.31_30-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134396" version="1" comment="ipset-kmp-pae is &lt;6.25.1_k4.1.31_30-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134397" version="1" comment="ipset-kmp-pv is &lt;6.25.1_k4.1.31_30-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134398" version="1" comment="ipset-kmp-xen is &lt;6.25.1_k4.1.31_30-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134399" version="1" comment="kernel-debug is &lt;4.1.31-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134400" version="1" comment="kernel-debug-base is &lt;4.1.31-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134401" version="1" comment="kernel-debug-devel is &lt;4.1.31-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134402" version="1" comment="kernel-default is &lt;4.1.31-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134403" version="1" comment="kernel-default-base is &lt;4.1.31-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134404" version="1" comment="kernel-default-devel is &lt;4.1.31-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134405" version="1" comment="kernel-devel is &lt;4.1.31-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134406" version="1" comment="kernel-docs is &lt;4.1.31-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134407" version="1" comment="kernel-docs-html is &lt;4.1.31-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134408" version="1" comment="kernel-docs-pdf is &lt;4.1.31-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134409" version="1" comment="kernel-ec2 is &lt;4.1.31-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134410" version="1" comment="kernel-ec2-base is &lt;4.1.31-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134411" version="1" comment="kernel-ec2-devel is &lt;4.1.31-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134412" version="1" comment="kernel-macros is &lt;4.1.31-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134413" version="1" comment="kernel-obs-build is &lt;4.1.31-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134414" version="1" comment="kernel-obs-qa is &lt;4.1.31-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134415" version="1" comment="kernel-obs-qa-xen is &lt;4.1.31-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134416" version="1" comment="kernel-pae is &lt;4.1.31-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134417" version="1" comment="kernel-pae-base is &lt;4.1.31-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134418" version="1" comment="kernel-pae-devel is &lt;4.1.31-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134419" version="1" comment="kernel-pv is &lt;4.1.31-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134420" version="1" comment="kernel-pv-base is &lt;4.1.31-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134421" version="1" comment="kernel-pv-devel is &lt;4.1.31-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134422" version="1" comment="kernel-source is &lt;4.1.31-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134423" version="1" comment="kernel-source-vanilla is &lt;4.1.31-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134424" version="1" comment="kernel-syms is &lt;4.1.31-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134425" version="1" comment="kernel-vanilla is &lt;4.1.31-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134426" version="1" comment="kernel-vanilla-devel is &lt;4.1.31-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134427" version="1" comment="kernel-xen is &lt;4.1.31-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134428" version="1" comment="kernel-xen-base is &lt;4.1.31-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134429" version="1" comment="kernel-xen-devel is &lt;4.1.31-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134430" version="1" comment="libipset3 is &lt;6.25.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134431" version="1" comment="lttng-modules is &lt;2.7.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134432" version="1" comment="lttng-modules-kmp-default is &lt;2.7.0_k4.1.31_30-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134433" version="1" comment="lttng-modules-kmp-pv is &lt;2.7.0_k4.1.31_30-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134434" version="1" comment="pcfclock is &lt;0.44-266.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134435" version="1" comment="pcfclock-kmp-default is &lt;0.44_k4.1.31_30-266.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134436" version="1" comment="pcfclock-kmp-pae is &lt;0.44_k4.1.31_30-266.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134437" version="1" comment="pcfclock-kmp-pv is &lt;0.44_k4.1.31_30-266.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134438" version="1" comment="vhba-kmp is &lt;20140928-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134439" version="1" comment="vhba-kmp-default is &lt;20140928_k4.1.31_30-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134440" version="1" comment="vhba-kmp-pae is &lt;20140928_k4.1.31_30-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134441" version="1" comment="vhba-kmp-pv is &lt;20140928_k4.1.31_30-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134442" version="1" comment="vhba-kmp-xen is &lt;20140928_k4.1.31_30-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134443" version="1" comment="mysql-connector-java is &lt;5.1.35-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134449" version="1" comment="perl is &lt;5.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134450" version="1" comment="perl-32bit is &lt;5.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134451" version="1" comment="perl-base is &lt;5.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134452" version="1" comment="perl-base-32bit is &lt;5.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134453" version="1" comment="perl-doc is &lt;5.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134454" version="1" comment="opera is &lt;39.0.2256.71-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134455" version="1" comment="libtiff-devel is &lt;4.0.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134456" version="1" comment="libtiff-devel-32bit is &lt;4.0.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134457" version="1" comment="libtiff5 is &lt;4.0.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134458" version="1" comment="libtiff5-32bit is &lt;4.0.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134459" version="1" comment="tiff is &lt;4.0.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134460" version="1" comment="openssh is &lt;6.6p1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134461" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134462" version="1" comment="openssh-cavs is &lt;6.6p1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134463" version="1" comment="openssh-fips is &lt;6.6p1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134464" version="1" comment="openssh-helpers is &lt;6.6p1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133518" version="1" comment="file-roller is &lt;3.16.5-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133519" version="1" comment="file-roller-lang is &lt;3.16.5-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133520" version="1" comment="nautilus-file-roller is &lt;3.16.5-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134465" version="1" comment="opera is &lt;40.0.2308.54-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133521" version="1" comment="pdns is &lt;3.4.6-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133522" version="1" comment="pdns-backend-ldap is &lt;3.4.6-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133523" version="1" comment="pdns-backend-lua is &lt;3.4.6-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133524" version="1" comment="pdns-backend-mydns is &lt;3.4.6-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133525" version="1" comment="pdns-backend-mysql is &lt;3.4.6-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133526" version="1" comment="pdns-backend-postgresql is &lt;3.4.6-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133527" version="1" comment="pdns-backend-sqlite3 is &lt;3.4.6-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110202" version="1" comment="wpa_supplicant-gui is &lt;2.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134466" version="1" comment="gd is &lt;2.1.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134467" version="1" comment="gd-32bit is &lt;2.1.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134468" version="1" comment="gd-devel is &lt;2.1.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134469" version="1" comment="ctdb is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134470" version="1" comment="ctdb-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134471" version="1" comment="ctdb-tests is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134472" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134473" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134474" version="1" comment="libdcerpc-atsvc0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134475" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134476" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134477" version="1" comment="libdcerpc-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134478" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134479" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134480" version="1" comment="libdcerpc-samr0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134481" version="1" comment="libdcerpc0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134482" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134483" version="1" comment="libgensec-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134484" version="1" comment="libgensec0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134485" version="1" comment="libgensec0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134486" version="1" comment="libndr-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134487" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134488" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134489" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134490" version="1" comment="libndr-nbt-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134491" version="1" comment="libndr-nbt0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134492" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134493" version="1" comment="libndr-standard-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134494" version="1" comment="libndr-standard0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134495" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134496" version="1" comment="libndr0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134497" version="1" comment="libndr0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134498" version="1" comment="libnetapi-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134499" version="1" comment="libnetapi0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134500" version="1" comment="libnetapi0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134501" version="1" comment="libregistry-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134502" version="1" comment="libregistry0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134503" version="1" comment="libregistry0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134504" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134505" version="1" comment="libsamba-credentials0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134506" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134507" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134508" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134509" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134510" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134511" version="1" comment="libsamba-passdb0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134512" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134513" version="1" comment="libsamba-policy-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134514" version="1" comment="libsamba-policy0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134515" version="1" comment="libsamba-policy0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134516" version="1" comment="libsamba-util-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134517" version="1" comment="libsamba-util0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134518" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134519" version="1" comment="libsamdb-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134520" version="1" comment="libsamdb0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134521" version="1" comment="libsamdb0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134522" version="1" comment="libsmbclient-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134523" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134524" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134525" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134526" version="1" comment="libsmbclient0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134527" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134528" version="1" comment="libsmbconf-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134529" version="1" comment="libsmbconf0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134530" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134531" version="1" comment="libsmbldap-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134532" version="1" comment="libsmbldap0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134533" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134534" version="1" comment="libtevent-util-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134535" version="1" comment="libtevent-util0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134536" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134537" version="1" comment="libwbclient-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134538" version="1" comment="libwbclient0 is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134539" version="1" comment="libwbclient0-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134540" version="1" comment="samba is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134541" version="1" comment="samba-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134542" version="1" comment="samba-client is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134543" version="1" comment="samba-client-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134544" version="1" comment="samba-core-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134545" version="1" comment="samba-doc is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134546" version="1" comment="samba-libs is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134547" version="1" comment="samba-libs-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134548" version="1" comment="samba-pidl is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134549" version="1" comment="samba-python is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134550" version="1" comment="samba-test is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134551" version="1" comment="samba-test-devel is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134552" version="1" comment="samba-winbind is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134553" version="1" comment="samba-winbind-32bit is &lt;4.2.4-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134554" version="1" comment="gtk2 is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134555" version="1" comment="gtk2-branding-SLED is &lt;42.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134556" version="1" comment="gtk2-branding-openSUSE is &lt;42.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134557" version="1" comment="gtk2-branding-upstream is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134558" version="1" comment="gtk2-data is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134559" version="1" comment="gtk2-devel is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134560" version="1" comment="gtk2-devel-32bit is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134561" version="1" comment="gtk2-engine-clearlooks is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134562" version="1" comment="gtk2-engine-clearlooks-32bit is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134563" version="1" comment="gtk2-engine-crux is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134564" version="1" comment="gtk2-engine-crux-32bit is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134565" version="1" comment="gtk2-engine-glide is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134566" version="1" comment="gtk2-engine-glide-32bit is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134567" version="1" comment="gtk2-engine-hcengine is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134568" version="1" comment="gtk2-engine-industrial is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134569" version="1" comment="gtk2-engine-industrial-32bit is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134570" version="1" comment="gtk2-engine-mist is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134571" version="1" comment="gtk2-engine-mist-32bit is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134572" version="1" comment="gtk2-engine-redmond95 is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134573" version="1" comment="gtk2-engine-redmond95-32bit is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134574" version="1" comment="gtk2-engine-thinice is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134575" version="1" comment="gtk2-engine-thinice-32bit is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134576" version="1" comment="gtk2-engines is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134577" version="1" comment="gtk2-engines-devel is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134578" version="1" comment="gtk2-immodule-amharic is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134579" version="1" comment="gtk2-immodule-amharic-32bit is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134580" version="1" comment="gtk2-immodule-inuktitut is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134581" version="1" comment="gtk2-immodule-inuktitut-32bit is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134582" version="1" comment="gtk2-immodule-multipress is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134583" version="1" comment="gtk2-immodule-multipress-32bit is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134584" version="1" comment="gtk2-immodule-thai is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134585" version="1" comment="gtk2-immodule-thai-32bit is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134586" version="1" comment="gtk2-immodule-vietnamese is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134587" version="1" comment="gtk2-immodule-vietnamese-32bit is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134588" version="1" comment="gtk2-immodule-xim is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134589" version="1" comment="gtk2-immodule-xim-32bit is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134590" version="1" comment="gtk2-immodules-tigrigna is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134591" version="1" comment="gtk2-immodules-tigrigna-32bit is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134592" version="1" comment="gtk2-lang is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134593" version="1" comment="gtk2-theme-clearlooks is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134594" version="1" comment="gtk2-theme-crux is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134595" version="1" comment="gtk2-theme-industrial is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134596" version="1" comment="gtk2-theme-mist is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134597" version="1" comment="gtk2-theme-redmond95 is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134598" version="1" comment="gtk2-theme-thinice is &lt;2.20.2-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134599" version="1" comment="gtk2-tools is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134600" version="1" comment="gtk2-tools-32bit is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134601" version="1" comment="libgtk-2_0-0 is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134602" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134603" version="1" comment="typelib-1_0-Gtk-2_0 is &lt;2.24.31-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133578" version="1" comment="MozillaFirefox is &lt;49.0-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133579" version="1" comment="MozillaFirefox-branding-upstream is &lt;49.0-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133580" version="1" comment="MozillaFirefox-buildsymbols is &lt;49.0-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133581" version="1" comment="MozillaFirefox-devel is &lt;49.0-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133582" version="1" comment="MozillaFirefox-translations-common is &lt;49.0-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133583" version="1" comment="MozillaFirefox-translations-other is &lt;49.0-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133584" version="1" comment="libfreebl3 is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133585" version="1" comment="libfreebl3-32bit is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133586" version="1" comment="libsoftokn3 is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133587" version="1" comment="libsoftokn3-32bit is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133588" version="1" comment="mozilla-nss is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133589" version="1" comment="mozilla-nss-32bit is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133590" version="1" comment="mozilla-nss-certs is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133591" version="1" comment="mozilla-nss-certs-32bit is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133592" version="1" comment="mozilla-nss-devel is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133593" version="1" comment="mozilla-nss-sysinit is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133594" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133595" version="1" comment="mozilla-nss-tools is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134604" version="1" comment="curl is &lt;7.37.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134605" version="1" comment="libcurl-devel is &lt;7.37.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134606" version="1" comment="libcurl-devel-32bit is &lt;7.37.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134607" version="1" comment="libcurl4 is &lt;7.37.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134608" version="1" comment="libcurl4-32bit is &lt;7.37.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134609" version="1" comment="freerdp is &lt;1.0.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134610" version="1" comment="freerdp-devel is &lt;1.0.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134611" version="1" comment="libfreerdp-1_0 is &lt;1.0.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134612" version="1" comment="libfreerdp-1_0-plugins is &lt;1.0.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133608" version="1" comment="bind is &lt;9.9.9P1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133609" version="1" comment="bind-chrootenv is &lt;9.9.9P1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133610" version="1" comment="bind-devel is &lt;9.9.9P1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133611" version="1" comment="bind-doc is &lt;9.9.9P1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133612" version="1" comment="bind-libs is &lt;9.9.9P1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133613" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133614" version="1" comment="bind-lwresd is &lt;9.9.9P1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133615" version="1" comment="bind-utils is &lt;9.9.9P1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134613" version="1" comment="libopenssl-devel is &lt;1.0.1i-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134614" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1i-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134615" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134616" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134617" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134618" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134619" version="1" comment="openssl is &lt;1.0.1i-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134620" version="1" comment="openssl-doc is &lt;1.0.1i-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134621" version="1" comment="libgcrypt is &lt;1.6.1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134622" version="1" comment="libgcrypt-cavs is &lt;1.6.1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134623" version="1" comment="libgcrypt-devel is &lt;1.6.1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134624" version="1" comment="libgcrypt-devel-32bit is &lt;1.6.1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134625" version="1" comment="libgcrypt20 is &lt;1.6.1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134626" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134627" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134628" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134629" version="1" comment="libopenjpeg1 is &lt;1.5.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134630" version="1" comment="libopenjpeg1-32bit is &lt;1.5.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134631" version="1" comment="openjpeg is &lt;1.5.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134632" version="1" comment="openjpeg-devel is &lt;1.5.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134633" version="1" comment="openjpeg-devel-32bit is &lt;1.5.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122393" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.95-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122394" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.95-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122395" version="1" comment="java-1_7_0-openjdk-bootstrap is &lt;1.7.0.95-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122396" version="1" comment="java-1_7_0-openjdk-bootstrap-devel is &lt;1.7.0.95-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122397" version="1" comment="java-1_7_0-openjdk-bootstrap-headless is &lt;1.7.0.95-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122398" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.95-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122399" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.95-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122400" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.95-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122401" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.95-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122402" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.95-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134634" version="1" comment="mariadb-bench is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134635" version="1" comment="mariadb-test is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134636" version="1" comment="at is &lt;3.1.14-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134637" version="1" comment="flex is &lt;2.5.37-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134638" version="1" comment="flex-32bit is &lt;2.5.37-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134639" version="1" comment="libbonobo is &lt;2.32.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134640" version="1" comment="libbonobo-32bit is &lt;2.32.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134641" version="1" comment="libbonobo-devel is &lt;2.32.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134642" version="1" comment="libbonobo-doc is &lt;2.32.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134643" version="1" comment="libbonobo-lang is &lt;2.32.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134644" version="1" comment="libnetpbm-devel is &lt;10.66.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134645" version="1" comment="libnetpbm11 is &lt;10.66.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134646" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134647" version="1" comment="netpbm is &lt;10.66.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134648" version="1" comment="openslp is &lt;2.0.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134649" version="1" comment="openslp-32bit is &lt;2.0.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134650" version="1" comment="openslp-devel is &lt;2.0.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134651" version="1" comment="openslp-server is &lt;2.0.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134652" version="1" comment="sgmltool is &lt;1.0.9-1078.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134653" version="1" comment="virtuoso is &lt;6.1.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134654" version="1" comment="virtuoso-drivers is &lt;6.1.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134655" version="1" comment="virtuoso-server is &lt;6.1.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134656" version="1" comment="apache2-mod_php5 is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134657" version="1" comment="php5 is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134658" version="1" comment="php5-bcmath is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134659" version="1" comment="php5-bz2 is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134660" version="1" comment="php5-calendar is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134661" version="1" comment="php5-ctype is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134662" version="1" comment="php5-curl is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134663" version="1" comment="php5-dba is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134664" version="1" comment="php5-devel is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134665" version="1" comment="php5-dom is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134666" version="1" comment="php5-enchant is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134667" version="1" comment="php5-exif is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134668" version="1" comment="php5-fastcgi is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134669" version="1" comment="php5-fileinfo is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134670" version="1" comment="php5-firebird is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134671" version="1" comment="php5-fpm is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134672" version="1" comment="php5-ftp is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134673" version="1" comment="php5-gd is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134674" version="1" comment="php5-gettext is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134675" version="1" comment="php5-gmp is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134676" version="1" comment="php5-iconv is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134677" version="1" comment="php5-imap is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134678" version="1" comment="php5-intl is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134679" version="1" comment="php5-json is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134680" version="1" comment="php5-ldap is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134681" version="1" comment="php5-mbstring is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134682" version="1" comment="php5-mcrypt is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134683" version="1" comment="php5-mssql is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134684" version="1" comment="php5-mysql is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134685" version="1" comment="php5-odbc is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134686" version="1" comment="php5-opcache is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134687" version="1" comment="php5-openssl is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134688" version="1" comment="php5-pcntl is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134689" version="1" comment="php5-pdo is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134690" version="1" comment="php5-pear is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134691" version="1" comment="php5-pgsql is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134692" version="1" comment="php5-phar is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134693" version="1" comment="php5-posix is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134694" version="1" comment="php5-pspell is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134695" version="1" comment="php5-readline is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134696" version="1" comment="php5-shmop is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134697" version="1" comment="php5-snmp is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134698" version="1" comment="php5-soap is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134699" version="1" comment="php5-sockets is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134700" version="1" comment="php5-sqlite is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134701" version="1" comment="php5-suhosin is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134702" version="1" comment="php5-sysvmsg is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134703" version="1" comment="php5-sysvsem is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134704" version="1" comment="php5-sysvshm is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134705" version="1" comment="php5-tidy is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134706" version="1" comment="php5-tokenizer is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134707" version="1" comment="php5-wddx is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134708" version="1" comment="php5-xmlreader is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134709" version="1" comment="php5-xmlrpc is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134710" version="1" comment="php5-xmlwriter is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134711" version="1" comment="php5-xsl is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134712" version="1" comment="php5-zip is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134713" version="1" comment="php5-zlib is &lt;5.5.14-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122451" version="1" comment="kernel-debug is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122452" version="1" comment="kernel-debug-base is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122453" version="1" comment="kernel-debug-devel is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122454" version="1" comment="kernel-default is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122455" version="1" comment="kernel-default-base is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122456" version="1" comment="kernel-default-devel is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122457" version="1" comment="kernel-devel is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122458" version="1" comment="kernel-docs is &lt;4.1.15-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122459" version="1" comment="kernel-docs-html is &lt;4.1.15-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122460" version="1" comment="kernel-docs-pdf is &lt;4.1.15-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122461" version="1" comment="kernel-ec2 is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122462" version="1" comment="kernel-ec2-base is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122463" version="1" comment="kernel-ec2-devel is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122464" version="1" comment="kernel-macros is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122465" version="1" comment="kernel-obs-build is &lt;4.1.15-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122466" version="1" comment="kernel-obs-qa is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122467" version="1" comment="kernel-obs-qa-xen is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122468" version="1" comment="kernel-pae is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122469" version="1" comment="kernel-pae-base is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122470" version="1" comment="kernel-pae-devel is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122471" version="1" comment="kernel-pv is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122472" version="1" comment="kernel-pv-base is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122473" version="1" comment="kernel-pv-devel is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122474" version="1" comment="kernel-source is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122475" version="1" comment="kernel-source-vanilla is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122476" version="1" comment="kernel-syms is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122477" version="1" comment="kernel-vanilla is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122478" version="1" comment="kernel-vanilla-devel is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122479" version="1" comment="kernel-xen is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122480" version="1" comment="kernel-xen-base is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122481" version="1" comment="kernel-xen-devel is &lt;4.1.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134714" version="1" comment="ffmpeg is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134715" version="1" comment="ffmpeg-devel is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134716" version="1" comment="libavcodec-devel is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134717" version="1" comment="libavcodec56 is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134718" version="1" comment="libavcodec56-32bit is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134719" version="1" comment="libavdevice-devel is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134720" version="1" comment="libavdevice56 is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134721" version="1" comment="libavdevice56-32bit is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134722" version="1" comment="libavfilter-devel is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134723" version="1" comment="libavfilter5 is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134724" version="1" comment="libavfilter5-32bit is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134725" version="1" comment="libavformat-devel is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134726" version="1" comment="libavformat56 is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134727" version="1" comment="libavformat56-32bit is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134728" version="1" comment="libavresample-devel is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134729" version="1" comment="libavresample2 is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134730" version="1" comment="libavresample2-32bit is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134731" version="1" comment="libavutil-devel is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134732" version="1" comment="libavutil54 is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134733" version="1" comment="libavutil54-32bit is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134734" version="1" comment="libpostproc-devel is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134735" version="1" comment="libpostproc53 is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134736" version="1" comment="libpostproc53-32bit is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134737" version="1" comment="libswresample-devel is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134738" version="1" comment="libswresample1 is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134739" version="1" comment="libswresample1-32bit is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134740" version="1" comment="libswscale-devel is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134741" version="1" comment="libswscale3 is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134742" version="1" comment="libswscale3-32bit is &lt;2.8.8-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134743" version="1" comment="libecpg6 is &lt;9.4.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134744" version="1" comment="libecpg6-32bit is &lt;9.4.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134745" version="1" comment="libpq5 is &lt;9.4.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134746" version="1" comment="libpq5-32bit is &lt;9.4.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134747" version="1" comment="postgresql94 is &lt;9.4.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134748" version="1" comment="postgresql94-contrib is &lt;9.4.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134749" version="1" comment="postgresql94-devel is &lt;9.4.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134750" version="1" comment="postgresql94-docs is &lt;9.4.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134751" version="1" comment="postgresql94-libs is &lt;9.4.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134752" version="1" comment="postgresql94-plperl is &lt;9.4.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134753" version="1" comment="postgresql94-plpython is &lt;9.4.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134754" version="1" comment="postgresql94-pltcl is &lt;9.4.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134755" version="1" comment="postgresql94-server is &lt;9.4.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134756" version="1" comment="postgresql94-test is &lt;9.4.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134757" version="1" comment="xen is &lt;4.5.3_10-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134758" version="1" comment="xen-devel is &lt;4.5.3_10-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134759" version="1" comment="xen-doc-html is &lt;4.5.3_10-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134760" version="1" comment="xen-kmp-default is &lt;4.5.3_10_k4.1.31_30-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134761" version="1" comment="xen-libs is &lt;4.5.3_10-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134762" version="1" comment="xen-libs-32bit is &lt;4.5.3_10-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134763" version="1" comment="xen-tools is &lt;4.5.3_10-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134764" version="1" comment="xen-tools-domU is &lt;4.5.3_10-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133731" version="1" comment="nodejs is &lt;4.6.0-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133732" version="1" comment="nodejs-devel is &lt;4.6.0-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133734" version="1" comment="nodejs-docs is &lt;4.6.0-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133735" version="1" comment="npm is &lt;4.6.0-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122482" version="1" comment="giflib-devel-32bit is &lt;5.0.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134766" version="1" comment="libtiff-devel is &lt;4.0.6-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134767" version="1" comment="libtiff-devel-32bit is &lt;4.0.6-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134768" version="1" comment="libtiff5 is &lt;4.0.6-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134769" version="1" comment="libtiff5-32bit is &lt;4.0.6-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134770" version="1" comment="tiff is &lt;4.0.6-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134771" version="1" comment="compat-openssl098 is &lt;0.9.8j-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134772" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134773" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122483" version="1" comment="ecryptfs-utils is &lt;103-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122484" version="1" comment="ecryptfs-utils-32bit is &lt;103-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134774" version="1" comment="libreoffice is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134775" version="1" comment="libreoffice-base is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134776" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134777" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134778" version="1" comment="libreoffice-branding-upstream is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134779" version="1" comment="libreoffice-calc is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134780" version="1" comment="libreoffice-calc-extensions is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134781" version="1" comment="libreoffice-draw is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134782" version="1" comment="libreoffice-filters-optional is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134783" version="1" comment="libreoffice-gdb-pretty-printers is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134784" version="1" comment="libreoffice-glade is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134785" version="1" comment="libreoffice-gnome is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134786" version="1" comment="libreoffice-gtk3 is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134787" version="1" comment="libreoffice-icon-theme-breeze is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134788" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134789" version="1" comment="libreoffice-icon-theme-hicontrast is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134790" version="1" comment="libreoffice-icon-theme-oxygen is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134791" version="1" comment="libreoffice-icon-theme-sifr is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134792" version="1" comment="libreoffice-icon-theme-tango is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134793" version="1" comment="libreoffice-impress is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134794" version="1" comment="libreoffice-kde4 is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134795" version="1" comment="libreoffice-l10n-af is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134796" version="1" comment="libreoffice-l10n-ar is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134797" version="1" comment="libreoffice-l10n-as is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134798" version="1" comment="libreoffice-l10n-bg is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134799" version="1" comment="libreoffice-l10n-bn is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134800" version="1" comment="libreoffice-l10n-br is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134801" version="1" comment="libreoffice-l10n-ca is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134802" version="1" comment="libreoffice-l10n-cs is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134803" version="1" comment="libreoffice-l10n-cy is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134804" version="1" comment="libreoffice-l10n-da is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134805" version="1" comment="libreoffice-l10n-de is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134806" version="1" comment="libreoffice-l10n-dz is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134807" version="1" comment="libreoffice-l10n-el is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134808" version="1" comment="libreoffice-l10n-en is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134809" version="1" comment="libreoffice-l10n-es is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134810" version="1" comment="libreoffice-l10n-et is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134811" version="1" comment="libreoffice-l10n-eu is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134812" version="1" comment="libreoffice-l10n-fa is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134813" version="1" comment="libreoffice-l10n-fi is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134814" version="1" comment="libreoffice-l10n-fr is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134815" version="1" comment="libreoffice-l10n-ga is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134816" version="1" comment="libreoffice-l10n-gl is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134817" version="1" comment="libreoffice-l10n-gu is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134818" version="1" comment="libreoffice-l10n-he is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134819" version="1" comment="libreoffice-l10n-hi is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134820" version="1" comment="libreoffice-l10n-hr is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134821" version="1" comment="libreoffice-l10n-hu is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134822" version="1" comment="libreoffice-l10n-it is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134823" version="1" comment="libreoffice-l10n-ja is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134824" version="1" comment="libreoffice-l10n-kk is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134825" version="1" comment="libreoffice-l10n-kn is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134826" version="1" comment="libreoffice-l10n-ko is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134827" version="1" comment="libreoffice-l10n-lt is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134828" version="1" comment="libreoffice-l10n-lv is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134829" version="1" comment="libreoffice-l10n-mai is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134830" version="1" comment="libreoffice-l10n-ml is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134831" version="1" comment="libreoffice-l10n-mr is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134832" version="1" comment="libreoffice-l10n-nb is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134833" version="1" comment="libreoffice-l10n-nl is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134834" version="1" comment="libreoffice-l10n-nn is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134835" version="1" comment="libreoffice-l10n-nr is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134836" version="1" comment="libreoffice-l10n-nso is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134837" version="1" comment="libreoffice-l10n-or is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134838" version="1" comment="libreoffice-l10n-pa is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134839" version="1" comment="libreoffice-l10n-pl is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134840" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134841" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134842" version="1" comment="libreoffice-l10n-ro is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134843" version="1" comment="libreoffice-l10n-ru is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134844" version="1" comment="libreoffice-l10n-si is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134845" version="1" comment="libreoffice-l10n-sk is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134846" version="1" comment="libreoffice-l10n-sl is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134847" version="1" comment="libreoffice-l10n-sr is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134848" version="1" comment="libreoffice-l10n-ss is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134849" version="1" comment="libreoffice-l10n-st is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134850" version="1" comment="libreoffice-l10n-sv is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134851" version="1" comment="libreoffice-l10n-ta is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134852" version="1" comment="libreoffice-l10n-te is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134853" version="1" comment="libreoffice-l10n-th is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134854" version="1" comment="libreoffice-l10n-tn is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134855" version="1" comment="libreoffice-l10n-tr is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134856" version="1" comment="libreoffice-l10n-ts is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134857" version="1" comment="libreoffice-l10n-uk is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134858" version="1" comment="libreoffice-l10n-ve is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134859" version="1" comment="libreoffice-l10n-xh is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134860" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134861" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134862" version="1" comment="libreoffice-l10n-zu is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134863" version="1" comment="libreoffice-mailmerge is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134864" version="1" comment="libreoffice-math is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134865" version="1" comment="libreoffice-officebean is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134866" version="1" comment="libreoffice-pyuno is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134867" version="1" comment="libreoffice-sdk is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134868" version="1" comment="libreoffice-sdk-doc is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134869" version="1" comment="libreoffice-writer is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134870" version="1" comment="libreoffice-writer-extensions is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134871" version="1" comment="libreofficekit is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134872" version="1" comment="libreofficekit-devel is &lt;5.1.5.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134873" version="1" comment="apache2-mod_php5 is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134874" version="1" comment="php5 is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134875" version="1" comment="php5-bcmath is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134876" version="1" comment="php5-bz2 is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134877" version="1" comment="php5-calendar is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134878" version="1" comment="php5-ctype is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134879" version="1" comment="php5-curl is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134880" version="1" comment="php5-dba is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134881" version="1" comment="php5-devel is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134882" version="1" comment="php5-dom is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134883" version="1" comment="php5-enchant is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134884" version="1" comment="php5-exif is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134885" version="1" comment="php5-fastcgi is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134886" version="1" comment="php5-fileinfo is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134887" version="1" comment="php5-firebird is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134888" version="1" comment="php5-fpm is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134889" version="1" comment="php5-ftp is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134890" version="1" comment="php5-gd is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134891" version="1" comment="php5-gettext is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134892" version="1" comment="php5-gmp is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134893" version="1" comment="php5-iconv is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134894" version="1" comment="php5-imap is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134895" version="1" comment="php5-intl is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134896" version="1" comment="php5-json is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134897" version="1" comment="php5-ldap is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134898" version="1" comment="php5-mbstring is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134899" version="1" comment="php5-mcrypt is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134900" version="1" comment="php5-mssql is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134901" version="1" comment="php5-mysql is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134902" version="1" comment="php5-odbc is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134903" version="1" comment="php5-opcache is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134904" version="1" comment="php5-openssl is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134905" version="1" comment="php5-pcntl is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134906" version="1" comment="php5-pdo is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134907" version="1" comment="php5-pear is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134908" version="1" comment="php5-pgsql is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134909" version="1" comment="php5-phar is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134910" version="1" comment="php5-posix is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134911" version="1" comment="php5-pspell is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134912" version="1" comment="php5-readline is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134913" version="1" comment="php5-shmop is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134914" version="1" comment="php5-snmp is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134915" version="1" comment="php5-soap is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134916" version="1" comment="php5-sockets is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134917" version="1" comment="php5-sqlite is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134918" version="1" comment="php5-suhosin is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134919" version="1" comment="php5-sysvmsg is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134920" version="1" comment="php5-sysvsem is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134921" version="1" comment="php5-sysvshm is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134922" version="1" comment="php5-tidy is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134923" version="1" comment="php5-tokenizer is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134924" version="1" comment="php5-wddx is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134925" version="1" comment="php5-xmlreader is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134926" version="1" comment="php5-xmlrpc is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134927" version="1" comment="php5-xmlwriter is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134928" version="1" comment="php5-xsl is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134929" version="1" comment="php5-zip is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134930" version="1" comment="php5-zlib is &lt;5.5.14-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134931" version="1" comment="libgudev-1_0-0 is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134932" version="1" comment="libgudev-1_0-0-32bit is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134933" version="1" comment="libgudev-1_0-devel is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134934" version="1" comment="libudev-devel is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134935" version="1" comment="libudev-mini-devel is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134936" version="1" comment="libudev-mini1 is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134937" version="1" comment="libudev1 is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134938" version="1" comment="libudev1-32bit is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134939" version="1" comment="nss-myhostname is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134940" version="1" comment="nss-myhostname-32bit is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134941" version="1" comment="systemd is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134942" version="1" comment="systemd-32bit is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134943" version="1" comment="systemd-bash-completion is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134944" version="1" comment="systemd-devel is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134945" version="1" comment="systemd-journal-gateway is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134946" version="1" comment="systemd-logger is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134947" version="1" comment="systemd-mini is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134948" version="1" comment="systemd-mini-devel is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134949" version="1" comment="systemd-mini-sysvinit is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134950" version="1" comment="systemd-sysvinit is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134951" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134952" version="1" comment="udev is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134953" version="1" comment="udev-mini is &lt;210-98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121171" version="1" comment="wireshark is &lt;1.12.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121172" version="1" comment="wireshark-devel is &lt;1.12.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121173" version="1" comment="wireshark-ui-gtk is &lt;1.12.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121174" version="1" comment="wireshark-ui-qt is &lt;1.12.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134983" version="1" comment="roundcubemail is &lt;1.1.6-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134984" version="1" comment="ghostscript is &lt;9.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134985" version="1" comment="ghostscript-devel is &lt;9.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134986" version="1" comment="ghostscript-mini is &lt;9.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134987" version="1" comment="ghostscript-mini-devel is &lt;9.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134988" version="1" comment="ghostscript-x11 is &lt;9.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134989" version="1" comment="squidGuard is &lt;1.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134990" version="1" comment="squidGuard-doc is &lt;1.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134991" version="1" comment="drbd is &lt;8.4.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134992" version="1" comment="drbd-kmp-default is &lt;8.4.6_k4.1.34_33-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134993" version="1" comment="drbd-kmp-pv is &lt;8.4.6_k4.1.34_33-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134994" version="1" comment="drbd-kmp-xen is &lt;8.4.6_k4.1.34_33-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134995" version="1" comment="hdjmod is &lt;1.28-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134996" version="1" comment="hdjmod-kmp-default is &lt;1.28_k4.1.34_33-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134997" version="1" comment="hdjmod-kmp-pae is &lt;1.28_k4.1.34_33-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134998" version="1" comment="hdjmod-kmp-pv is &lt;1.28_k4.1.34_33-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134999" version="1" comment="hdjmod-kmp-xen is &lt;1.28_k4.1.34_33-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135000" version="1" comment="ipset is &lt;6.25.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135001" version="1" comment="ipset-devel is &lt;6.25.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135002" version="1" comment="ipset-kmp-default is &lt;6.25.1_k4.1.34_33-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135003" version="1" comment="ipset-kmp-pae is &lt;6.25.1_k4.1.34_33-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135004" version="1" comment="ipset-kmp-pv is &lt;6.25.1_k4.1.34_33-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135005" version="1" comment="ipset-kmp-xen is &lt;6.25.1_k4.1.34_33-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135006" version="1" comment="kernel-debug is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135007" version="1" comment="kernel-debug-base is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135008" version="1" comment="kernel-debug-devel is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135009" version="1" comment="kernel-default is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135010" version="1" comment="kernel-default-base is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135011" version="1" comment="kernel-default-devel is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135012" version="1" comment="kernel-devel is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135013" version="1" comment="kernel-docs is &lt;4.1.34-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135014" version="1" comment="kernel-docs-html is &lt;4.1.34-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135015" version="1" comment="kernel-docs-pdf is &lt;4.1.34-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135016" version="1" comment="kernel-ec2 is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135017" version="1" comment="kernel-ec2-base is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135018" version="1" comment="kernel-ec2-devel is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135019" version="1" comment="kernel-macros is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135020" version="1" comment="kernel-obs-build is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135021" version="1" comment="kernel-obs-qa is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135022" version="1" comment="kernel-obs-qa-xen is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135023" version="1" comment="kernel-pae is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135024" version="1" comment="kernel-pae-base is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135025" version="1" comment="kernel-pae-devel is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135026" version="1" comment="kernel-pv is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135027" version="1" comment="kernel-pv-base is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135028" version="1" comment="kernel-pv-devel is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135029" version="1" comment="kernel-source is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135030" version="1" comment="kernel-source-vanilla is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135031" version="1" comment="kernel-syms is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135032" version="1" comment="kernel-vanilla is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135033" version="1" comment="kernel-vanilla-devel is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135034" version="1" comment="kernel-xen is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135035" version="1" comment="kernel-xen-base is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135036" version="1" comment="kernel-xen-devel is &lt;4.1.34-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135037" version="1" comment="libipset3 is &lt;6.25.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135038" version="1" comment="lttng-modules is &lt;2.7.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135039" version="1" comment="lttng-modules-kmp-default is &lt;2.7.0_k4.1.34_33-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135040" version="1" comment="lttng-modules-kmp-pv is &lt;2.7.0_k4.1.34_33-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135041" version="1" comment="pcfclock is &lt;0.44-268.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135042" version="1" comment="pcfclock-kmp-default is &lt;0.44_k4.1.34_33-268.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135043" version="1" comment="pcfclock-kmp-pae is &lt;0.44_k4.1.34_33-268.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135044" version="1" comment="pcfclock-kmp-pv is &lt;0.44_k4.1.34_33-268.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135045" version="1" comment="vhba-kmp is &lt;20140928-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135046" version="1" comment="vhba-kmp-default is &lt;20140928_k4.1.34_33-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135047" version="1" comment="vhba-kmp-pae is &lt;20140928_k4.1.34_33-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135048" version="1" comment="vhba-kmp-pv is &lt;20140928_k4.1.34_33-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135049" version="1" comment="vhba-kmp-xen is &lt;20140928_k4.1.34_33-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135050" version="1" comment="libX11 is &lt;1.6.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135051" version="1" comment="libX11-6 is &lt;1.6.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135052" version="1" comment="libX11-6-32bit is &lt;1.6.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135053" version="1" comment="libX11-data is &lt;1.6.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135054" version="1" comment="libX11-devel is &lt;1.6.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135055" version="1" comment="libX11-devel-32bit is &lt;1.6.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135056" version="1" comment="libX11-xcb1 is &lt;1.6.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135057" version="1" comment="libX11-xcb1-32bit is &lt;1.6.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135060" version="1" comment="libXfixes-devel-32bit is &lt;5.0.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135063" version="1" comment="libXi is &lt;1.7.5-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135064" version="1" comment="libXi-devel is &lt;1.7.5-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135065" version="1" comment="libXi-devel-32bit is &lt;1.7.5-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135066" version="1" comment="libXi6 is &lt;1.7.5-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135067" version="1" comment="libXi6-32bit is &lt;1.7.5-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135068" version="1" comment="libXrandr is &lt;1.5.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135069" version="1" comment="libXrandr-devel is &lt;1.5.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135070" version="1" comment="libXrandr-devel-32bit is &lt;1.5.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135071" version="1" comment="libXrandr2 is &lt;1.5.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135072" version="1" comment="libXrandr2-32bit is &lt;1.5.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135073" version="1" comment="libXrender is &lt;0.9.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135074" version="1" comment="libXrender-devel is &lt;0.9.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135075" version="1" comment="libXrender-devel-32bit is &lt;0.9.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135076" version="1" comment="libXrender1 is &lt;0.9.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135077" version="1" comment="libXrender1-32bit is &lt;0.9.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135080" version="1" comment="libXtst-devel-32bit is &lt;1.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135085" version="1" comment="libXv-devel-32bit is &lt;1.0.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135088" version="1" comment="libXvMC is &lt;1.0.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135089" version="1" comment="libXvMC-devel is &lt;1.0.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135090" version="1" comment="libXvMC-devel-32bit is &lt;1.0.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135091" version="1" comment="libXvMC1 is &lt;1.0.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135092" version="1" comment="libXvMC1-32bit is &lt;1.0.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135093" version="1" comment="kdump is &lt;0.8.15-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133785" version="1" comment="tor is &lt;0.2.7.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135094" version="1" comment="dbus-1 is &lt;1.8.22-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135095" version="1" comment="dbus-1-devel is &lt;1.8.22-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135096" version="1" comment="dbus-1-devel-32bit is &lt;1.8.22-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135097" version="1" comment="dbus-1-devel-doc is &lt;1.8.22-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135098" version="1" comment="dbus-1-x11 is &lt;1.8.22-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135099" version="1" comment="libdbus-1-3 is &lt;1.8.22-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135100" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135101" version="1" comment="GraphicsMagick is &lt;1.3.21-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135102" version="1" comment="GraphicsMagick-devel is &lt;1.3.21-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135103" version="1" comment="libGraphicsMagick++-Q16-11 is &lt;1.3.21-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135104" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.21-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135105" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.21-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135106" version="1" comment="libGraphicsMagick3-config is &lt;1.3.21-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135107" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.21-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135108" version="1" comment="perl-GraphicsMagick is &lt;1.3.21-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135109" version="1" comment="guile1 is &lt;1.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135110" version="1" comment="libguile-srfi-srfi-1-v-3-3 is &lt;1.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135111" version="1" comment="libguile-srfi-srfi-13-14-v-3-3 is &lt;1.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135112" version="1" comment="libguile-srfi-srfi-4-v-3-3 is &lt;1.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135113" version="1" comment="libguile-srfi-srfi-60-v-2-2 is &lt;1.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135114" version="1" comment="libguile1-devel is &lt;1.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135115" version="1" comment="libguile17 is &lt;1.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135116" version="1" comment="libguilereadline-v-17-17 is &lt;1.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135117" version="1" comment="quagga is &lt;0.99.24.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135118" version="1" comment="quagga-devel is &lt;0.99.24.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135119" version="1" comment="qemu is &lt;2.3.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135120" version="1" comment="qemu-arm is &lt;2.3.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135121" version="1" comment="qemu-block-curl is &lt;2.3.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135122" version="1" comment="qemu-block-rbd is &lt;2.3.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135123" version="1" comment="qemu-extra is &lt;2.3.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135124" version="1" comment="qemu-guest-agent is &lt;2.3.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135125" version="1" comment="qemu-ipxe is &lt;1.0.0-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135126" version="1" comment="qemu-kvm is &lt;2.3.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135127" version="1" comment="qemu-lang is &lt;2.3.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135128" version="1" comment="qemu-linux-user is &lt;2.3.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135129" version="1" comment="qemu-ppc is &lt;2.3.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135130" version="1" comment="qemu-s390 is &lt;2.3.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135131" version="1" comment="qemu-seabios is &lt;1.8.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135132" version="1" comment="qemu-sgabios is &lt;8-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135133" version="1" comment="qemu-testsuite is &lt;2.3.1-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135134" version="1" comment="qemu-tools is &lt;2.3.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135135" version="1" comment="qemu-vgabios is &lt;1.8.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135136" version="1" comment="qemu-x86 is &lt;2.3.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135137" version="1" comment="libipa_hbac-devel is &lt;1.11.5.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135138" version="1" comment="libipa_hbac0 is &lt;1.11.5.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135139" version="1" comment="libsss_idmap-devel is &lt;1.11.5.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135140" version="1" comment="libsss_idmap0 is &lt;1.11.5.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135141" version="1" comment="libsss_nss_idmap-devel is &lt;1.11.5.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135142" version="1" comment="libsss_nss_idmap0 is &lt;1.11.5.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135143" version="1" comment="libsss_sudo is &lt;1.11.5.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135144" version="1" comment="python-ipa_hbac is &lt;1.11.5.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135145" version="1" comment="python-sss_nss_idmap is &lt;1.11.5.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135146" version="1" comment="python-sssd-config is &lt;1.11.5.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135147" version="1" comment="sssd is &lt;1.11.5.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135148" version="1" comment="sssd-32bit is &lt;1.11.5.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135149" version="1" comment="sssd-ad is &lt;1.11.5.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135150" version="1" comment="sssd-ipa is &lt;1.11.5.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135151" version="1" comment="sssd-krb5 is &lt;1.11.5.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135152" version="1" comment="sssd-krb5-common is &lt;1.11.5.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135153" version="1" comment="sssd-ldap is &lt;1.11.5.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135154" version="1" comment="sssd-proxy is &lt;1.11.5.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135155" version="1" comment="sssd-tools is &lt;1.11.5.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135253" version="1" comment="libxml2 is &lt;2.9.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135254" version="1" comment="libxml2-2 is &lt;2.9.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135255" version="1" comment="libxml2-2-32bit is &lt;2.9.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135256" version="1" comment="libxml2-devel is &lt;2.9.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135257" version="1" comment="libxml2-devel-32bit is &lt;2.9.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135258" version="1" comment="libxml2-doc is &lt;2.9.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135259" version="1" comment="libxml2-tools is &lt;2.9.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135260" version="1" comment="python-libxml2 is &lt;2.9.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122694" version="1" comment="seamonkey is &lt;2.40-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122695" version="1" comment="seamonkey-dom-inspector is &lt;2.40-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122696" version="1" comment="seamonkey-irc is &lt;2.40-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122697" version="1" comment="seamonkey-translations-common is &lt;2.40-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122698" version="1" comment="seamonkey-translations-other is &lt;2.40-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135305" version="1" comment="libraw is &lt;0.16.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135306" version="1" comment="libraw-devel is &lt;0.16.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135307" version="1" comment="libraw-devel-static is &lt;0.16.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135308" version="1" comment="libraw-tools is &lt;0.16.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135309" version="1" comment="libraw10 is &lt;0.16.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122750" version="1" comment="xulrunner is &lt;38.6.0-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122751" version="1" comment="xulrunner-32bit is &lt;38.6.0-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122752" version="1" comment="xulrunner-devel is &lt;38.6.0-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135335" version="1" comment="bind is &lt;9.9.9P1-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135336" version="1" comment="bind-chrootenv is &lt;9.9.9P1-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135337" version="1" comment="bind-devel is &lt;9.9.9P1-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135338" version="1" comment="bind-doc is &lt;9.9.9P1-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135339" version="1" comment="bind-libs is &lt;9.9.9P1-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135340" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135341" version="1" comment="bind-lwresd is &lt;9.9.9P1-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135342" version="1" comment="bind-utils is &lt;9.9.9P1-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135435" version="1" comment="nodejs is &lt;4.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135436" version="1" comment="nodejs-devel is &lt;4.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135438" version="1" comment="nodejs-docs is &lt;4.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135439" version="1" comment="npm is &lt;4.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122699" version="1" comment="MozillaFirefox is &lt;44.0-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122700" version="1" comment="MozillaFirefox-branding-upstream is &lt;44.0-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122701" version="1" comment="MozillaFirefox-buildsymbols is &lt;44.0-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122702" version="1" comment="MozillaFirefox-devel is &lt;44.0-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122703" version="1" comment="MozillaFirefox-translations-common is &lt;44.0-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122704" version="1" comment="MozillaFirefox-translations-other is &lt;44.0-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122705" version="1" comment="libfreebl3 is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122706" version="1" comment="libfreebl3-32bit is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122707" version="1" comment="libsoftokn3 is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122708" version="1" comment="libsoftokn3-32bit is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122709" version="1" comment="mozilla-nspr is &lt;4.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122710" version="1" comment="mozilla-nspr-32bit is &lt;4.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122711" version="1" comment="mozilla-nspr-devel is &lt;4.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122712" version="1" comment="mozilla-nss is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122713" version="1" comment="mozilla-nss-32bit is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122714" version="1" comment="mozilla-nss-certs is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122715" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122716" version="1" comment="mozilla-nss-devel is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122717" version="1" comment="mozilla-nss-sysinit is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122718" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122719" version="1" comment="mozilla-nss-tools is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135465" version="1" comment="curl is &lt;7.37.0-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135466" version="1" comment="libcurl-devel is &lt;7.37.0-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135467" version="1" comment="libcurl-devel-32bit is &lt;7.37.0-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135468" version="1" comment="libcurl4 is &lt;7.37.0-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135469" version="1" comment="libcurl4-32bit is &lt;7.37.0-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135470" version="1" comment="gd is &lt;2.1.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135471" version="1" comment="gd-32bit is &lt;2.1.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135472" version="1" comment="gd-devel is &lt;2.1.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135473" version="1" comment="ImageMagick is &lt;6.8.8.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135474" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135475" version="1" comment="ImageMagick-devel-32bit is &lt;6.8.8.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135476" version="1" comment="ImageMagick-doc is &lt;6.8.8.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135477" version="1" comment="ImageMagick-extra is &lt;6.8.8.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135478" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135479" version="1" comment="libMagick++-6_Q16-3-32bit is &lt;6.8.8.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135480" version="1" comment="libMagick++-devel is &lt;6.8.8.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135481" version="1" comment="libMagick++-devel-32bit is &lt;6.8.8.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135482" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135483" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135484" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135485" version="1" comment="libMagickWand-6_Q16-1-32bit is &lt;6.8.8.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135486" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135440" version="1" comment="libmysql56client18 is &lt;5.6.34-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135441" version="1" comment="libmysql56client18-32bit is &lt;5.6.34-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135442" version="1" comment="libmysql56client_r18 is &lt;5.6.34-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135443" version="1" comment="libmysql56client_r18-32bit is &lt;5.6.34-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135444" version="1" comment="mysql-community-server is &lt;5.6.34-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135445" version="1" comment="mysql-community-server-bench is &lt;5.6.34-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135446" version="1" comment="mysql-community-server-client is &lt;5.6.34-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135447" version="1" comment="mysql-community-server-errormessages is &lt;5.6.34-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135448" version="1" comment="mysql-community-server-test is &lt;5.6.34-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135449" version="1" comment="mysql-community-server-tools is &lt;5.6.34-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135729" version="1" comment="opera is &lt;41.0.2353.56-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135516" version="1" comment="chromedriver is &lt;54.0.2840.100-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135517" version="1" comment="chromium is &lt;54.0.2840.100-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135518" version="1" comment="chromium-ffmpegsumo is &lt;54.0.2840.100-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121317" version="1" comment="phpMyAdmin is &lt;4.4.15.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122720" version="1" comment="privoxy is &lt;3.0.24-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122721" version="1" comment="privoxy-doc is &lt;3.0.24-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135730" version="1" comment="jasper is &lt;1.900.14-167.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135731" version="1" comment="libjasper-devel is &lt;1.900.14-167.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135732" version="1" comment="libjasper1 is &lt;1.900.14-167.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135733" version="1" comment="libjasper1-32bit is &lt;1.900.14-167.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135562" version="1" comment="GraphicsMagick is &lt;1.3.21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135563" version="1" comment="GraphicsMagick-devel is &lt;1.3.21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135564" version="1" comment="libGraphicsMagick++-Q16-11 is &lt;1.3.21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135566" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135567" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135568" version="1" comment="libGraphicsMagick3-config is &lt;1.3.21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135569" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135570" version="1" comment="perl-GraphicsMagick is &lt;1.3.21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135585" version="1" comment="memcached is &lt;1.4.22-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135586" version="1" comment="memcached-devel is &lt;1.4.22-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135602" version="1" comment="libblkid-devel is &lt;2.25-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135603" version="1" comment="libblkid-devel-32bit is &lt;2.25-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135604" version="1" comment="libblkid1 is &lt;2.25-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135605" version="1" comment="libblkid1-32bit is &lt;2.25-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135606" version="1" comment="libmount-devel is &lt;2.25-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135607" version="1" comment="libmount-devel-32bit is &lt;2.25-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135608" version="1" comment="libmount1 is &lt;2.25-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135609" version="1" comment="libmount1-32bit is &lt;2.25-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135610" version="1" comment="libsmartcols-devel is &lt;2.25-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135611" version="1" comment="libsmartcols1 is &lt;2.25-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135612" version="1" comment="libuuid-devel is &lt;2.25-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135613" version="1" comment="libuuid-devel-32bit is &lt;2.25-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135614" version="1" comment="libuuid1 is &lt;2.25-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135615" version="1" comment="libuuid1-32bit is &lt;2.25-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135616" version="1" comment="python-libmount is &lt;2.25-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135617" version="1" comment="util-linux is &lt;2.25-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135618" version="1" comment="util-linux-lang is &lt;2.25-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135619" version="1" comment="util-linux-systemd is &lt;2.25-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135620" version="1" comment="uuidd is &lt;2.25-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135621" version="1" comment="apache2-mod_php5 is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135622" version="1" comment="php5 is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135623" version="1" comment="php5-bcmath is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135624" version="1" comment="php5-bz2 is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135625" version="1" comment="php5-calendar is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135626" version="1" comment="php5-ctype is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135627" version="1" comment="php5-curl is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135628" version="1" comment="php5-dba is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135629" version="1" comment="php5-devel is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135630" version="1" comment="php5-dom is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135631" version="1" comment="php5-enchant is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135632" version="1" comment="php5-exif is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135633" version="1" comment="php5-fastcgi is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135634" version="1" comment="php5-fileinfo is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135635" version="1" comment="php5-firebird is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135636" version="1" comment="php5-fpm is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135637" version="1" comment="php5-ftp is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135638" version="1" comment="php5-gd is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135639" version="1" comment="php5-gettext is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135640" version="1" comment="php5-gmp is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135641" version="1" comment="php5-iconv is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135642" version="1" comment="php5-imap is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135643" version="1" comment="php5-intl is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135644" version="1" comment="php5-json is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135645" version="1" comment="php5-ldap is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135646" version="1" comment="php5-mbstring is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135647" version="1" comment="php5-mcrypt is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135648" version="1" comment="php5-mssql is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135649" version="1" comment="php5-mysql is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135650" version="1" comment="php5-odbc is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135651" version="1" comment="php5-opcache is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135652" version="1" comment="php5-openssl is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135653" version="1" comment="php5-pcntl is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135654" version="1" comment="php5-pdo is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135655" version="1" comment="php5-pear is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135656" version="1" comment="php5-pgsql is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135657" version="1" comment="php5-phar is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135658" version="1" comment="php5-posix is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135659" version="1" comment="php5-pspell is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135660" version="1" comment="php5-readline is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135661" version="1" comment="php5-shmop is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135662" version="1" comment="php5-snmp is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135663" version="1" comment="php5-soap is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135664" version="1" comment="php5-sockets is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135665" version="1" comment="php5-sqlite is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135666" version="1" comment="php5-suhosin is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135667" version="1" comment="php5-sysvmsg is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135668" version="1" comment="php5-sysvsem is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135669" version="1" comment="php5-sysvshm is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135670" version="1" comment="php5-tidy is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135671" version="1" comment="php5-tokenizer is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135672" version="1" comment="php5-wddx is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135673" version="1" comment="php5-xmlreader is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135674" version="1" comment="php5-xmlrpc is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135675" version="1" comment="php5-xmlwriter is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135676" version="1" comment="php5-xsl is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135677" version="1" comment="php5-zip is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135678" version="1" comment="php5-zlib is &lt;5.5.14-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135723" version="1" comment="MozillaFirefox is &lt;50.0-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135724" version="1" comment="MozillaFirefox-branding-upstream is &lt;50.0-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135725" version="1" comment="MozillaFirefox-buildsymbols is &lt;50.0-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135726" version="1" comment="MozillaFirefox-devel is &lt;50.0-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135727" version="1" comment="MozillaFirefox-translations-common is &lt;50.0-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135728" version="1" comment="MozillaFirefox-translations-other is &lt;50.0-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135690" version="1" comment="libfreebl3 is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135691" version="1" comment="libfreebl3-32bit is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135692" version="1" comment="libsoftokn3 is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135693" version="1" comment="libsoftokn3-32bit is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135694" version="1" comment="mozilla-nss is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135695" version="1" comment="mozilla-nss-32bit is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135696" version="1" comment="mozilla-nss-certs is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135697" version="1" comment="mozilla-nss-certs-32bit is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135698" version="1" comment="mozilla-nss-devel is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135699" version="1" comment="mozilla-nss-sysinit is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135700" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135701" version="1" comment="mozilla-nss-tools is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135893" version="1" comment="monit is &lt;5.20.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135894" version="1" comment="monit-doc is &lt;5.20.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135899" version="1" comment="dovecot22 is &lt;2.2.25-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135900" version="1" comment="dovecot22-backend-mysql is &lt;2.2.25-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135901" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.25-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135902" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.25-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135903" version="1" comment="dovecot22-devel is &lt;2.2.25-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135904" version="1" comment="dovecot22-fts is &lt;2.2.25-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135905" version="1" comment="dovecot22-fts-lucene is &lt;2.2.25-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135906" version="1" comment="dovecot22-fts-solr is &lt;2.2.25-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135907" version="1" comment="dovecot22-fts-squat is &lt;2.2.25-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135936" version="1" comment="gnuchess is &lt;6.2.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136190" version="1" comment="bash is &lt;4.2-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136191" version="1" comment="bash-devel is &lt;4.2-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136192" version="1" comment="bash-doc is &lt;4.2-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136193" version="1" comment="bash-lang is &lt;4.2-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136194" version="1" comment="bash-loadables is &lt;4.2-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136195" version="1" comment="libreadline6 is &lt;6.2-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136196" version="1" comment="libreadline6-32bit is &lt;6.2-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136197" version="1" comment="readline-devel is &lt;6.2-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136198" version="1" comment="readline-devel-32bit is &lt;6.2-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136199" version="1" comment="readline-doc is &lt;6.2-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136200" version="1" comment="libtcnative-1-0 is &lt;1.1.34-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136201" version="1" comment="libtcnative-1-0-devel is &lt;1.1.34-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136354" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.111-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136355" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.111-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136356" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.111-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136357" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.111-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136358" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.111-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136359" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.111-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136360" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.111-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136326" version="1" comment="gvim is &lt;7.4.326-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136327" version="1" comment="vim is &lt;7.4.326-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136328" version="1" comment="vim-data is &lt;7.4.326-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136329" version="1" comment="MozillaFirefox is &lt;50.0.2-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136330" version="1" comment="MozillaFirefox-branding-upstream is &lt;50.0.2-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136331" version="1" comment="MozillaFirefox-buildsymbols is &lt;50.0.2-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136332" version="1" comment="MozillaFirefox-devel is &lt;50.0.2-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136333" version="1" comment="MozillaFirefox-translations-common is &lt;50.0.2-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136334" version="1" comment="MozillaFirefox-translations-other is &lt;50.0.2-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136335" version="1" comment="MozillaThunderbird is &lt;45.5.1-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136336" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.5.1-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136337" version="1" comment="MozillaThunderbird-devel is &lt;45.5.1-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136338" version="1" comment="MozillaThunderbird-translations-common is &lt;45.5.1-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136339" version="1" comment="MozillaThunderbird-translations-other is &lt;45.5.1-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121319" version="1" comment="pitivi is &lt;0.94-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121320" version="1" comment="pitivi-lang is &lt;0.94-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136434" version="1" comment="containerd is &lt;0.2.4+gitr565_0366d7e-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136435" version="1" comment="containerd-ctr is &lt;0.2.4+gitr565_0366d7e-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136436" version="1" comment="containerd-test is &lt;0.2.4+gitr565_0366d7e-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136437" version="1" comment="docker is &lt;1.12.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136438" version="1" comment="docker-bash-completion is &lt;1.12.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136439" version="1" comment="docker-test is &lt;1.12.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136440" version="1" comment="docker-zsh-completion is &lt;1.12.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136441" version="1" comment="runc is &lt;0.1.1+gitr2816_02f8fa7-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136442" version="1" comment="runc-test is &lt;0.1.1+gitr2816_02f8fa7-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136444" version="1" comment="tar-backup-scripts is &lt;1.27.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136446" version="1" comment="tar-tests is &lt;1.27.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136447" version="1" comment="sudo-test is &lt;1.8.10p3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136448" version="1" comment="bsdtar is &lt;3.1.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136449" version="1" comment="libarchive is &lt;3.1.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136450" version="1" comment="libarchive-devel is &lt;3.1.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136451" version="1" comment="libarchive13 is &lt;3.1.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136452" version="1" comment="libarchive13-32bit is &lt;3.1.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136433" version="1" comment="phpMyAdmin is &lt;4.4.15.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136607" version="1" comment="GraphicsMagick is &lt;1.3.21-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136608" version="1" comment="GraphicsMagick-devel is &lt;1.3.21-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136609" version="1" comment="libGraphicsMagick++-Q16-11 is &lt;1.3.21-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136610" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.21-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136611" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.21-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136612" version="1" comment="libGraphicsMagick3-config is &lt;1.3.21-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136613" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.21-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136614" version="1" comment="perl-GraphicsMagick is &lt;1.3.21-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136615" version="1" comment="libmysqlclient-devel is &lt;10.0.28-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136616" version="1" comment="libmysqlclient18 is &lt;10.0.28-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136617" version="1" comment="libmysqlclient18-32bit is &lt;10.0.28-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136618" version="1" comment="libmysqlclient_r18 is &lt;10.0.28-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136619" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.28-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136620" version="1" comment="libmysqld-devel is &lt;10.0.28-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136621" version="1" comment="libmysqld18 is &lt;10.0.28-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136622" version="1" comment="mariadb is &lt;10.0.28-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136623" version="1" comment="mariadb-bench is &lt;10.0.28-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136624" version="1" comment="mariadb-client is &lt;10.0.28-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136625" version="1" comment="mariadb-errormessages is &lt;10.0.28-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136626" version="1" comment="mariadb-test is &lt;10.0.28-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136627" version="1" comment="mariadb-tools is &lt;10.0.28-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136830" version="1" comment="roundcubemail is &lt;1.1.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136715" version="1" comment="libX11 is &lt;1.6.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136716" version="1" comment="libX11-6 is &lt;1.6.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136717" version="1" comment="libX11-6-32bit is &lt;1.6.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136718" version="1" comment="libX11-data is &lt;1.6.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136719" version="1" comment="libX11-devel is &lt;1.6.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136720" version="1" comment="libX11-devel-32bit is &lt;1.6.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136721" version="1" comment="libX11-xcb1 is &lt;1.6.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136722" version="1" comment="libX11-xcb1-32bit is &lt;1.6.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136723" version="1" comment="libXi is &lt;1.7.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136724" version="1" comment="libXi-devel is &lt;1.7.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136725" version="1" comment="libXi-devel-32bit is &lt;1.7.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136726" version="1" comment="libXi6 is &lt;1.7.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136727" version="1" comment="libXi6-32bit is &lt;1.7.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136728" version="1" comment="libXrandr is &lt;1.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136729" version="1" comment="libXrandr-devel is &lt;1.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136730" version="1" comment="libXrandr-devel-32bit is &lt;1.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136731" version="1" comment="libXrandr2 is &lt;1.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136732" version="1" comment="libXrandr2-32bit is &lt;1.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136831" version="1" comment="drbd is &lt;8.4.6-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136832" version="1" comment="drbd-kmp-default is &lt;8.4.6_k4.1.36_38-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136833" version="1" comment="drbd-kmp-pv is &lt;8.4.6_k4.1.36_38-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136834" version="1" comment="drbd-kmp-xen is &lt;8.4.6_k4.1.36_38-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136835" version="1" comment="hdjmod is &lt;1.28-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136836" version="1" comment="hdjmod-kmp-default is &lt;1.28_k4.1.36_38-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136837" version="1" comment="hdjmod-kmp-pae is &lt;1.28_k4.1.36_38-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136838" version="1" comment="hdjmod-kmp-pv is &lt;1.28_k4.1.36_38-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136839" version="1" comment="hdjmod-kmp-xen is &lt;1.28_k4.1.36_38-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136840" version="1" comment="ipset is &lt;6.25.1-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136841" version="1" comment="ipset-devel is &lt;6.25.1-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136842" version="1" comment="ipset-kmp-default is &lt;6.25.1_k4.1.36_38-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136843" version="1" comment="ipset-kmp-pae is &lt;6.25.1_k4.1.36_38-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136844" version="1" comment="ipset-kmp-pv is &lt;6.25.1_k4.1.36_38-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136845" version="1" comment="ipset-kmp-xen is &lt;6.25.1_k4.1.36_38-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136846" version="1" comment="kernel-debug is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136847" version="1" comment="kernel-debug-base is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136848" version="1" comment="kernel-debug-devel is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136849" version="1" comment="kernel-default is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136850" version="1" comment="kernel-default-base is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136851" version="1" comment="kernel-default-devel is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136852" version="1" comment="kernel-devel is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136853" version="1" comment="kernel-docs is &lt;4.1.36-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136854" version="1" comment="kernel-docs-html is &lt;4.1.36-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136855" version="1" comment="kernel-docs-pdf is &lt;4.1.36-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136856" version="1" comment="kernel-ec2 is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136857" version="1" comment="kernel-ec2-base is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136858" version="1" comment="kernel-ec2-devel is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136859" version="1" comment="kernel-macros is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136860" version="1" comment="kernel-obs-build is &lt;4.1.36-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136861" version="1" comment="kernel-obs-qa is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136862" version="1" comment="kernel-pae is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136863" version="1" comment="kernel-pae-base is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136864" version="1" comment="kernel-pae-devel is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136865" version="1" comment="kernel-pv is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136866" version="1" comment="kernel-pv-base is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136867" version="1" comment="kernel-pv-devel is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136868" version="1" comment="kernel-source is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136869" version="1" comment="kernel-source-vanilla is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136870" version="1" comment="kernel-syms is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136871" version="1" comment="kernel-vanilla is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136872" version="1" comment="kernel-vanilla-devel is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136873" version="1" comment="kernel-xen is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136874" version="1" comment="kernel-xen-base is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136875" version="1" comment="kernel-xen-devel is &lt;4.1.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136876" version="1" comment="libipset3 is &lt;6.25.1-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136877" version="1" comment="lttng-modules is &lt;2.7.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136878" version="1" comment="lttng-modules-kmp-default is &lt;2.7.0_k4.1.36_38-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136879" version="1" comment="lttng-modules-kmp-pv is &lt;2.7.0_k4.1.36_38-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136880" version="1" comment="pcfclock is &lt;0.44-270.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136881" version="1" comment="pcfclock-kmp-default is &lt;0.44_k4.1.36_38-270.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136882" version="1" comment="pcfclock-kmp-pae is &lt;0.44_k4.1.36_38-270.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136883" version="1" comment="pcfclock-kmp-pv is &lt;0.44_k4.1.36_38-270.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136884" version="1" comment="vhba-kmp is &lt;20140928-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136885" version="1" comment="vhba-kmp-default is &lt;20140928_k4.1.36_38-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136886" version="1" comment="vhba-kmp-pae is &lt;20140928_k4.1.36_38-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136887" version="1" comment="vhba-kmp-pv is &lt;20140928_k4.1.36_38-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136888" version="1" comment="vhba-kmp-xen is &lt;20140928_k4.1.36_38-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142173" version="1" comment="pdns is &lt;3.4.6-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142174" version="1" comment="pdns-backend-ldap is &lt;3.4.6-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142175" version="1" comment="pdns-backend-lua is &lt;3.4.6-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142176" version="1" comment="pdns-backend-mydns is &lt;3.4.6-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142177" version="1" comment="pdns-backend-mysql is &lt;3.4.6-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142178" version="1" comment="pdns-backend-postgresql is &lt;3.4.6-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142179" version="1" comment="pdns-backend-sqlite3 is &lt;3.4.6-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142391" version="1" comment="kernel-debug is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142392" version="1" comment="kernel-debug-base is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142393" version="1" comment="kernel-debug-devel is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142394" version="1" comment="kernel-default is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142395" version="1" comment="kernel-default-base is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142396" version="1" comment="kernel-default-devel is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142397" version="1" comment="kernel-devel is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142398" version="1" comment="kernel-docs is &lt;4.1.36-41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142399" version="1" comment="kernel-docs-html is &lt;4.1.36-41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142400" version="1" comment="kernel-docs-pdf is &lt;4.1.36-41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142401" version="1" comment="kernel-ec2 is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142402" version="1" comment="kernel-ec2-base is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142403" version="1" comment="kernel-ec2-devel is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142404" version="1" comment="kernel-macros is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142405" version="1" comment="kernel-obs-build is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142406" version="1" comment="kernel-obs-qa is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142407" version="1" comment="kernel-pae is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142408" version="1" comment="kernel-pae-base is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142409" version="1" comment="kernel-pae-devel is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142410" version="1" comment="kernel-pv is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142411" version="1" comment="kernel-pv-base is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142412" version="1" comment="kernel-pv-devel is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142413" version="1" comment="kernel-source is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142414" version="1" comment="kernel-source-vanilla is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142415" version="1" comment="kernel-syms is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142416" version="1" comment="kernel-vanilla is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142417" version="1" comment="kernel-vanilla-devel is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142418" version="1" comment="kernel-xen is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142419" version="1" comment="kernel-xen-base is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142420" version="1" comment="kernel-xen-devel is &lt;4.1.36-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142383" version="1" comment="libass is &lt;0.12.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142384" version="1" comment="libass-devel is &lt;0.12.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142385" version="1" comment="libass5 is &lt;0.12.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142386" version="1" comment="libass5-32bit is &lt;0.12.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142421" version="1" comment="ImageMagick is &lt;6.8.8.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142422" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142423" version="1" comment="ImageMagick-devel-32bit is &lt;6.8.8.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142424" version="1" comment="ImageMagick-doc is &lt;6.8.8.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142425" version="1" comment="ImageMagick-extra is &lt;6.8.8.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142426" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142427" version="1" comment="libMagick++-6_Q16-3-32bit is &lt;6.8.8.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142428" version="1" comment="libMagick++-devel is &lt;6.8.8.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142429" version="1" comment="libMagick++-devel-32bit is &lt;6.8.8.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142430" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142431" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142432" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142433" version="1" comment="libMagickWand-6_Q16-1-32bit is &lt;6.8.8.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142434" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142435" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.121-37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142436" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.121-37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142437" version="1" comment="java-1_7_0-openjdk-bootstrap is &lt;1.7.0.121-37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142438" version="1" comment="java-1_7_0-openjdk-bootstrap-devel is &lt;1.7.0.121-37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142439" version="1" comment="java-1_7_0-openjdk-bootstrap-headless is &lt;1.7.0.121-37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142440" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.121-37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142441" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.121-37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142442" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.121-37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142443" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.121-37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142444" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.121-37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142445" version="1" comment="libpacemaker-devel is &lt;1.1.13-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142446" version="1" comment="libpacemaker3 is &lt;1.1.13-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142447" version="1" comment="pacemaker is &lt;1.1.13-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142448" version="1" comment="pacemaker-cli is &lt;1.1.13-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142449" version="1" comment="pacemaker-cts is &lt;1.1.13-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142450" version="1" comment="pacemaker-remote is &lt;1.1.13-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142451" version="1" comment="libpcre1 is &lt;8.39-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142452" version="1" comment="libpcre1-32bit is &lt;8.39-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142453" version="1" comment="libpcre16-0 is &lt;8.39-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142454" version="1" comment="libpcre16-0-32bit is &lt;8.39-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142455" version="1" comment="libpcrecpp0 is &lt;8.39-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142456" version="1" comment="libpcrecpp0-32bit is &lt;8.39-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142457" version="1" comment="libpcreposix0 is &lt;8.39-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142458" version="1" comment="libpcreposix0-32bit is &lt;8.39-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142459" version="1" comment="pcre is &lt;8.39-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142460" version="1" comment="pcre-devel is &lt;8.39-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142461" version="1" comment="pcre-devel-static is &lt;8.39-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142462" version="1" comment="pcre-doc is &lt;8.39-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142463" version="1" comment="pcre-tools is &lt;8.39-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142464" version="1" comment="apache2-mod_php5 is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142465" version="1" comment="php5 is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142466" version="1" comment="php5-bcmath is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142467" version="1" comment="php5-bz2 is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142468" version="1" comment="php5-calendar is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142469" version="1" comment="php5-ctype is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142470" version="1" comment="php5-curl is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142471" version="1" comment="php5-dba is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142472" version="1" comment="php5-devel is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142473" version="1" comment="php5-dom is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142474" version="1" comment="php5-enchant is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142475" version="1" comment="php5-exif is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142476" version="1" comment="php5-fastcgi is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142477" version="1" comment="php5-fileinfo is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142478" version="1" comment="php5-firebird is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142479" version="1" comment="php5-fpm is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142480" version="1" comment="php5-ftp is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142481" version="1" comment="php5-gd is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142482" version="1" comment="php5-gettext is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142483" version="1" comment="php5-gmp is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142484" version="1" comment="php5-iconv is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142485" version="1" comment="php5-imap is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142486" version="1" comment="php5-intl is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142487" version="1" comment="php5-json is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142488" version="1" comment="php5-ldap is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142489" version="1" comment="php5-mbstring is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142490" version="1" comment="php5-mcrypt is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142491" version="1" comment="php5-mssql is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142492" version="1" comment="php5-mysql is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142493" version="1" comment="php5-odbc is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142494" version="1" comment="php5-opcache is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142495" version="1" comment="php5-openssl is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142496" version="1" comment="php5-pcntl is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142497" version="1" comment="php5-pdo is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142498" version="1" comment="php5-pear is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142499" version="1" comment="php5-pgsql is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142500" version="1" comment="php5-phar is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142501" version="1" comment="php5-posix is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142502" version="1" comment="php5-pspell is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142503" version="1" comment="php5-readline is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142504" version="1" comment="php5-shmop is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142505" version="1" comment="php5-snmp is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142506" version="1" comment="php5-soap is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142507" version="1" comment="php5-sockets is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142508" version="1" comment="php5-sqlite is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142509" version="1" comment="php5-suhosin is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142510" version="1" comment="php5-sysvmsg is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142511" version="1" comment="php5-sysvsem is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142512" version="1" comment="php5-sysvshm is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142513" version="1" comment="php5-tidy is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142514" version="1" comment="php5-tokenizer is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142515" version="1" comment="php5-wddx is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142516" version="1" comment="php5-xmlreader is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142517" version="1" comment="php5-xmlrpc is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142518" version="1" comment="php5-xmlwriter is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142519" version="1" comment="php5-xsl is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142520" version="1" comment="php5-zip is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142521" version="1" comment="php5-zlib is &lt;5.5.14-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142522" version="1" comment="qemu is &lt;2.3.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142523" version="1" comment="qemu-arm is &lt;2.3.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142524" version="1" comment="qemu-block-curl is &lt;2.3.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142525" version="1" comment="qemu-block-rbd is &lt;2.3.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142526" version="1" comment="qemu-extra is &lt;2.3.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142527" version="1" comment="qemu-guest-agent is &lt;2.3.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142528" version="1" comment="qemu-ipxe is &lt;1.0.0-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142529" version="1" comment="qemu-kvm is &lt;2.3.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142530" version="1" comment="qemu-lang is &lt;2.3.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142531" version="1" comment="qemu-linux-user is &lt;2.3.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142532" version="1" comment="qemu-ppc is &lt;2.3.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142533" version="1" comment="qemu-s390 is &lt;2.3.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142534" version="1" comment="qemu-seabios is &lt;1.8.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142535" version="1" comment="qemu-sgabios is &lt;8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142536" version="1" comment="qemu-testsuite is &lt;2.3.1-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142537" version="1" comment="qemu-tools is &lt;2.3.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142538" version="1" comment="qemu-vgabios is &lt;1.8.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142539" version="1" comment="qemu-x86 is &lt;2.3.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142894" version="1" comment="chromedriver is &lt;55.0.2883.75-99.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142895" version="1" comment="chromium is &lt;55.0.2883.75-99.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142899" version="1" comment="apache-commons-dbcp is &lt;2.1.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142900" version="1" comment="apache-commons-dbcp-javadoc is &lt;2.1.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142901" version="1" comment="apache-commons-pool2 is &lt;2.4.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142902" version="1" comment="apache-commons-pool2-javadoc is &lt;2.4.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142903" version="1" comment="tomcat is &lt;8.0.32-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142904" version="1" comment="tomcat-admin-webapps is &lt;8.0.32-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142905" version="1" comment="tomcat-docs-webapp is &lt;8.0.32-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142906" version="1" comment="tomcat-el-3_0-api is &lt;8.0.32-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142907" version="1" comment="tomcat-embed is &lt;8.0.32-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142908" version="1" comment="tomcat-javadoc is &lt;8.0.32-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142909" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.32-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142910" version="1" comment="tomcat-jsvc is &lt;8.0.32-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142911" version="1" comment="tomcat-lib is &lt;8.0.32-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142912" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.32-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142913" version="1" comment="tomcat-webapps is &lt;8.0.32-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142914" version="1" comment="w3m-inline-image is &lt;0.5.3.git20161120-160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142915" version="1" comment="gc is &lt;7.2d-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142916" version="1" comment="gc-devel is &lt;7.2d-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142917" version="1" comment="libgc1 is &lt;7.2d-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122926" version="1" comment="ruby2.1-rubygem-rails-html-sanitizer is &lt;1.0.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122927" version="1" comment="ruby2.1-rubygem-rails-html-sanitizer-doc is &lt;1.0.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122928" version="1" comment="ruby2.1-rubygem-rails-html-sanitizer-testsuite is &lt;1.0.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122929" version="1" comment="rubygem-rails-html-sanitizer is &lt;1.0.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142950" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142951" version="1" comment="gstreamer-0_10-plugins-bad-32bit is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142952" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142953" version="1" comment="gstreamer-0_10-plugins-bad-doc is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142954" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142955" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142956" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142957" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142958" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142959" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142960" version="1" comment="libgstcodecparsers-0_10-23-32bit is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142961" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142962" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142963" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142964" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142965" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142966" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143032" version="1" comment="python-Twisted is &lt;15.4.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143033" version="1" comment="python-Twisted-doc is &lt;15.4.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142967" version="1" comment="gstreamer-plugins-bad is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142968" version="1" comment="gstreamer-plugins-bad-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142969" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142970" version="1" comment="gstreamer-plugins-bad-doc is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142971" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142972" version="1" comment="libgstbadbase-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142973" version="1" comment="libgstbadbase-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142974" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142975" version="1" comment="libgstbadvideo-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142976" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142977" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142978" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142979" version="1" comment="libgstcodecparsers-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142980" version="1" comment="libgstgl-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142981" version="1" comment="libgstgl-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142982" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142983" version="1" comment="libgstinsertbin-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142984" version="1" comment="libgstmpegts-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142985" version="1" comment="libgstmpegts-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142986" version="1" comment="libgstphotography-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142987" version="1" comment="libgstphotography-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142988" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142989" version="1" comment="libgsturidownloader-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142990" version="1" comment="libgstwayland-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142991" version="1" comment="libgstwayland-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143100" version="1" comment="lxc is &lt;1.1.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143101" version="1" comment="lxc-devel is &lt;1.1.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143102" version="1" comment="MozillaFirefox is &lt;50.1.0-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143103" version="1" comment="MozillaFirefox-branding-upstream is &lt;50.1.0-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143104" version="1" comment="MozillaFirefox-buildsymbols is &lt;50.1.0-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143105" version="1" comment="MozillaFirefox-devel is &lt;50.1.0-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143106" version="1" comment="MozillaFirefox-translations-common is &lt;50.1.0-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143107" version="1" comment="MozillaFirefox-translations-other is &lt;50.1.0-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121321" version="1" comment="ruby2.1-rubygem-mail-2_5 is &lt;2.5.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121322" version="1" comment="ruby2.1-rubygem-mail-doc-2_5 is &lt;2.5.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121324" version="1" comment="rubygem-mail-2_4 is &lt;2.4.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121325" version="1" comment="rubygem-mail-2_4-doc is &lt;2.4.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121326" version="1" comment="rubygem-mail-2_5 is &lt;2.5.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144696" version="1" comment="shellinabox is &lt;2.20-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122885" version="1" comment="phpMyAdmin is &lt;4.4.15.4-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145778" version="1" comment="GraphicsMagick is &lt;1.3.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145779" version="1" comment="GraphicsMagick-devel is &lt;1.3.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145780" version="1" comment="libGraphicsMagick++-Q16-11 is &lt;1.3.21-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145781" version="1" comment="libGraphicsMagick++-Q16-12 is &lt;1.3.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145783" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145784" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145785" version="1" comment="libGraphicsMagick3-config is &lt;1.3.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145786" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145787" version="1" comment="perl-GraphicsMagick is &lt;1.3.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122930" version="1" comment="curl is &lt;7.37.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122931" version="1" comment="libcurl-devel is &lt;7.37.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122932" version="1" comment="libcurl-devel-32bit is &lt;7.37.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122933" version="1" comment="libcurl4 is &lt;7.37.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122934" version="1" comment="libcurl4-32bit is &lt;7.37.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145996" version="1" comment="ntp is &lt;4.2.8p9-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145997" version="1" comment="ntp-doc is &lt;4.2.8p9-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145994" version="1" comment="tor is &lt;0.2.7.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122935" version="1" comment="apache2-mod_php5 is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122936" version="1" comment="php5 is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122937" version="1" comment="php5-bcmath is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122938" version="1" comment="php5-bz2 is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122939" version="1" comment="php5-calendar is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122940" version="1" comment="php5-ctype is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122941" version="1" comment="php5-curl is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122942" version="1" comment="php5-dba is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122943" version="1" comment="php5-devel is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122944" version="1" comment="php5-dom is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122945" version="1" comment="php5-enchant is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122946" version="1" comment="php5-exif is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122947" version="1" comment="php5-fastcgi is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122948" version="1" comment="php5-fileinfo is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122949" version="1" comment="php5-firebird is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122950" version="1" comment="php5-fpm is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122951" version="1" comment="php5-ftp is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122952" version="1" comment="php5-gd is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122953" version="1" comment="php5-gettext is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122954" version="1" comment="php5-gmp is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122955" version="1" comment="php5-iconv is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122956" version="1" comment="php5-imap is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122957" version="1" comment="php5-intl is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122958" version="1" comment="php5-json is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122959" version="1" comment="php5-ldap is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122960" version="1" comment="php5-mbstring is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122961" version="1" comment="php5-mcrypt is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122962" version="1" comment="php5-mssql is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122963" version="1" comment="php5-mysql is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122964" version="1" comment="php5-odbc is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122965" version="1" comment="php5-opcache is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122966" version="1" comment="php5-openssl is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122967" version="1" comment="php5-pcntl is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122968" version="1" comment="php5-pdo is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122969" version="1" comment="php5-pear is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122970" version="1" comment="php5-pgsql is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122971" version="1" comment="php5-phar is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122972" version="1" comment="php5-posix is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122973" version="1" comment="php5-pspell is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122974" version="1" comment="php5-readline is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122975" version="1" comment="php5-shmop is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122976" version="1" comment="php5-snmp is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122977" version="1" comment="php5-soap is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122978" version="1" comment="php5-sockets is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122979" version="1" comment="php5-sqlite is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122980" version="1" comment="php5-suhosin is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122981" version="1" comment="php5-sysvmsg is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122982" version="1" comment="php5-sysvsem is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122983" version="1" comment="php5-sysvshm is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122984" version="1" comment="php5-tidy is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122985" version="1" comment="php5-tokenizer is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122986" version="1" comment="php5-wddx is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122987" version="1" comment="php5-xmlreader is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122988" version="1" comment="php5-xmlrpc is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122989" version="1" comment="php5-xmlwriter is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122990" version="1" comment="php5-xsl is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122991" version="1" comment="php5-zip is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122992" version="1" comment="php5-zlib is &lt;5.5.14-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122993" version="1" comment="ruby2.1-rubygem-actionpack-4_2 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122994" version="1" comment="ruby2.1-rubygem-actionpack-doc-4_2 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122995" version="1" comment="ruby2.1-rubygem-actionview-4_2 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122996" version="1" comment="ruby2.1-rubygem-actionview-doc-4_2 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122997" version="1" comment="ruby2.1-rubygem-activemodel-4_2 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122998" version="1" comment="ruby2.1-rubygem-activemodel-doc-4_2 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122999" version="1" comment="ruby2.1-rubygem-activerecord-4_2 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123000" version="1" comment="ruby2.1-rubygem-activerecord-doc-4_2 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123001" version="1" comment="ruby2.1-rubygem-activesupport-4_2 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123002" version="1" comment="ruby2.1-rubygem-activesupport-doc-4_2 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123003" version="1" comment="rubygem-actionpack-4_2 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123004" version="1" comment="rubygem-actionview-4_2 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123005" version="1" comment="rubygem-activemodel-4_2 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123006" version="1" comment="rubygem-activerecord-4_2 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123007" version="1" comment="rubygem-activesupport-4_2 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123008" version="1" comment="nginx is &lt;1.8.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123009" version="1" comment="mariadb-bench is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123010" version="1" comment="mariadb-test is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122905" version="1" comment="libmysql56client18 is &lt;5.6.28-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122906" version="1" comment="libmysql56client18-32bit is &lt;5.6.28-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122907" version="1" comment="libmysql56client_r18 is &lt;5.6.28-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122908" version="1" comment="libmysql56client_r18-32bit is &lt;5.6.28-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122909" version="1" comment="mysql-community-server is &lt;5.6.28-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122910" version="1" comment="mysql-community-server-bench is &lt;5.6.28-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122911" version="1" comment="mysql-community-server-client is &lt;5.6.28-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122912" version="1" comment="mysql-community-server-errormessages is &lt;5.6.28-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122913" version="1" comment="mysql-community-server-test is &lt;5.6.28-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122914" version="1" comment="mysql-community-server-tools is &lt;5.6.28-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123268" version="1" comment="cacti is &lt;0.8.8f-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123269" version="1" comment="cacti-spine is &lt;0.8.8f-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123307" version="1" comment="libnettle-devel-32bit is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123308" version="1" comment="nettle is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123309" version="1" comment="libvlc5 is &lt;2.2.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123310" version="1" comment="libvlccore8 is &lt;2.2.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123311" version="1" comment="vlc is &lt;2.2.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123312" version="1" comment="vlc-devel is &lt;2.2.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123313" version="1" comment="vlc-gnome is &lt;2.2.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123314" version="1" comment="vlc-noX is &lt;2.2.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123315" version="1" comment="vlc-noX-lang is &lt;2.2.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123316" version="1" comment="vlc-qt is &lt;2.2.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123299" version="1" comment="claws-mail is &lt;3.12.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123300" version="1" comment="claws-mail-devel is &lt;3.12.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123301" version="1" comment="claws-mail-lang is &lt;3.12.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123302" version="1" comment="socat is &lt;1.7.3.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123322" version="1" comment="chromedriver is &lt;48.0.2564.109-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123323" version="1" comment="chromium is &lt;48.0.2564.109-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123324" version="1" comment="chromium-desktop-gnome is &lt;48.0.2564.109-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123325" version="1" comment="chromium-desktop-kde is &lt;48.0.2564.109-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123326" version="1" comment="chromium-ffmpegsumo is &lt;48.0.2564.109-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123327" version="1" comment="MozillaThunderbird is &lt;38.6.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123328" version="1" comment="MozillaThunderbird-buildsymbols is &lt;38.6.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123329" version="1" comment="MozillaThunderbird-devel is &lt;38.6.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123330" version="1" comment="MozillaThunderbird-translations-common is &lt;38.6.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123331" version="1" comment="MozillaThunderbird-translations-other is &lt;38.6.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123332" version="1" comment="MozillaFirefox is &lt;44.0.2-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123333" version="1" comment="MozillaFirefox-branding-upstream is &lt;44.0.2-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123334" version="1" comment="MozillaFirefox-buildsymbols is &lt;44.0.2-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123335" version="1" comment="MozillaFirefox-devel is &lt;44.0.2-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123336" version="1" comment="MozillaFirefox-translations-common is &lt;44.0.2-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123337" version="1" comment="MozillaFirefox-translations-other is &lt;44.0.2-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123354" version="1" comment="glibc is &lt;2.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123355" version="1" comment="glibc-32bit is &lt;2.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123356" version="1" comment="glibc-devel is &lt;2.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123357" version="1" comment="glibc-devel-32bit is &lt;2.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123358" version="1" comment="glibc-devel-static is &lt;2.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123359" version="1" comment="glibc-devel-static-32bit is &lt;2.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123360" version="1" comment="glibc-extra is &lt;2.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123361" version="1" comment="glibc-html is &lt;2.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123362" version="1" comment="glibc-i18ndata is &lt;2.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123363" version="1" comment="glibc-info is &lt;2.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123364" version="1" comment="glibc-locale is &lt;2.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123365" version="1" comment="glibc-locale-32bit is &lt;2.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123366" version="1" comment="glibc-obsolete is &lt;2.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123367" version="1" comment="glibc-profile is &lt;2.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123368" version="1" comment="glibc-profile-32bit is &lt;2.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123369" version="1" comment="glibc-testsuite is &lt;2.19-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123370" version="1" comment="glibc-utils is &lt;2.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123371" version="1" comment="glibc-utils-32bit is &lt;2.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123372" version="1" comment="nscd is &lt;2.19-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123392" version="1" comment="krb5 is &lt;1.12.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123393" version="1" comment="krb5-32bit is &lt;1.12.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123394" version="1" comment="krb5-client is &lt;1.12.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123395" version="1" comment="krb5-devel is &lt;1.12.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123396" version="1" comment="krb5-devel-32bit is &lt;1.12.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123397" version="1" comment="krb5-doc is &lt;1.12.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123398" version="1" comment="krb5-mini is &lt;1.12.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123399" version="1" comment="krb5-mini-devel is &lt;1.12.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123400" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123401" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123402" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123403" version="1" comment="krb5-server is &lt;1.12.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123444" version="1" comment="chromedriver is &lt;48.0.2564.116-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123445" version="1" comment="chromium is &lt;48.0.2564.116-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123446" version="1" comment="chromium-desktop-gnome is &lt;48.0.2564.116-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123447" version="1" comment="chromium-desktop-kde is &lt;48.0.2564.116-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123448" version="1" comment="chromium-ffmpegsumo is &lt;48.0.2564.116-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123449" version="1" comment="ffmpeg is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123450" version="1" comment="ffmpeg-devel is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123451" version="1" comment="libavcodec-devel is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123452" version="1" comment="libavcodec56 is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123453" version="1" comment="libavcodec56-32bit is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123454" version="1" comment="libavdevice-devel is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123455" version="1" comment="libavdevice56 is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123456" version="1" comment="libavdevice56-32bit is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123457" version="1" comment="libavfilter-devel is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123458" version="1" comment="libavfilter5 is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123459" version="1" comment="libavfilter5-32bit is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123460" version="1" comment="libavformat-devel is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123461" version="1" comment="libavformat56 is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123462" version="1" comment="libavformat56-32bit is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123463" version="1" comment="libavresample-devel is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123464" version="1" comment="libavresample2 is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123465" version="1" comment="libavresample2-32bit is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123466" version="1" comment="libavutil-devel is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123467" version="1" comment="libavutil54 is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123468" version="1" comment="libavutil54-32bit is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123469" version="1" comment="libpostproc-devel is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123470" version="1" comment="libpostproc53 is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123471" version="1" comment="libpostproc53-32bit is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123472" version="1" comment="libswresample-devel is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123473" version="1" comment="libswresample1 is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123474" version="1" comment="libswresample1-32bit is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123475" version="1" comment="libswscale-devel is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123476" version="1" comment="libswscale3 is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123477" version="1" comment="libswscale3-32bit is &lt;2.8.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123478" version="1" comment="obs-service-download_files is &lt;0.5.1.git.1455712026.9c0a4a0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123479" version="1" comment="obs-service-extract_file is &lt;0.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123480" version="1" comment="obs-service-recompress is &lt;0.3.1+git20160217.7897d3f-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123481" version="1" comment="obs-service-source_validator is &lt;0.6+git20160218.73d6618-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123482" version="1" comment="obs-service-verify_file is &lt;0.1.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123644" version="1" comment="qemu is &lt;2.3.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123645" version="1" comment="qemu-arm is &lt;2.3.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123646" version="1" comment="qemu-block-curl is &lt;2.3.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123647" version="1" comment="qemu-block-rbd is &lt;2.3.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123648" version="1" comment="qemu-extra is &lt;2.3.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123649" version="1" comment="qemu-guest-agent is &lt;2.3.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123650" version="1" comment="qemu-ipxe is &lt;1.0.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123651" version="1" comment="qemu-kvm is &lt;2.3.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123652" version="1" comment="qemu-lang is &lt;2.3.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123653" version="1" comment="qemu-linux-user is &lt;2.3.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123654" version="1" comment="qemu-ppc is &lt;2.3.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123655" version="1" comment="qemu-s390 is &lt;2.3.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123656" version="1" comment="qemu-seabios is &lt;1.8.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123657" version="1" comment="qemu-sgabios is &lt;8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123658" version="1" comment="qemu-testsuite is &lt;2.3.1-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123659" version="1" comment="qemu-tools is &lt;2.3.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123660" version="1" comment="qemu-vgabios is &lt;1.8.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123661" version="1" comment="qemu-x86 is &lt;2.3.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123633" version="1" comment="postgresql-init is &lt;9.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123634" version="1" comment="postgresql93 is &lt;9.3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123635" version="1" comment="postgresql93-contrib is &lt;9.3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123636" version="1" comment="postgresql93-devel is &lt;9.3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123637" version="1" comment="postgresql93-docs is &lt;9.3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123638" version="1" comment="postgresql93-libs is &lt;9.3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123639" version="1" comment="postgresql93-plperl is &lt;9.3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123640" version="1" comment="postgresql93-plpython is &lt;9.3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123641" version="1" comment="postgresql93-pltcl is &lt;9.3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123642" version="1" comment="postgresql93-server is &lt;9.3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123643" version="1" comment="postgresql93-test is &lt;9.3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121403" version="1" comment="ffmpeg is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121404" version="1" comment="ffmpeg-devel is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121405" version="1" comment="libavcodec-devel is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121406" version="1" comment="libavcodec56 is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121407" version="1" comment="libavcodec56-32bit is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121408" version="1" comment="libavdevice-devel is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121409" version="1" comment="libavdevice56 is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121410" version="1" comment="libavdevice56-32bit is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121411" version="1" comment="libavfilter-devel is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121412" version="1" comment="libavfilter5 is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121413" version="1" comment="libavfilter5-32bit is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121414" version="1" comment="libavformat-devel is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121415" version="1" comment="libavformat56 is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121416" version="1" comment="libavformat56-32bit is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121417" version="1" comment="libavresample-devel is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121418" version="1" comment="libavresample2 is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121419" version="1" comment="libavresample2-32bit is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121420" version="1" comment="libavutil-devel is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121421" version="1" comment="libavutil54 is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121422" version="1" comment="libavutil54-32bit is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121423" version="1" comment="libpostproc-devel is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121424" version="1" comment="libpostproc53 is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121425" version="1" comment="libpostproc53-32bit is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121426" version="1" comment="libswresample-devel is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121427" version="1" comment="libswresample1 is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121428" version="1" comment="libswresample1-32bit is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121429" version="1" comment="libswscale-devel is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121430" version="1" comment="libswscale3 is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121431" version="1" comment="libswscale3-32bit is &lt;2.8.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123695" version="1" comment="gummi is &lt;0.7.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123696" version="1" comment="gummi-lang is &lt;0.7.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123832" version="1" comment="libecpg6 is &lt;9.4.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123833" version="1" comment="libecpg6-32bit is &lt;9.4.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123834" version="1" comment="libpq5 is &lt;9.4.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123835" version="1" comment="libpq5-32bit is &lt;9.4.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123836" version="1" comment="postgresql94 is &lt;9.4.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123837" version="1" comment="postgresql94-contrib is &lt;9.4.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123838" version="1" comment="postgresql94-devel is &lt;9.4.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123839" version="1" comment="postgresql94-docs is &lt;9.4.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123840" version="1" comment="postgresql94-libs is &lt;9.4.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123841" version="1" comment="postgresql94-plperl is &lt;9.4.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123842" version="1" comment="postgresql94-plpython is &lt;9.4.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123843" version="1" comment="postgresql94-pltcl is &lt;9.4.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123844" version="1" comment="postgresql94-server is &lt;9.4.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123845" version="1" comment="postgresql94-test is &lt;9.4.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121432" version="1" comment="libpng16 is &lt;1.6.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121433" version="1" comment="libpng16-16 is &lt;1.6.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121434" version="1" comment="libpng16-16-32bit is &lt;1.6.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121435" version="1" comment="libpng16-compat-devel is &lt;1.6.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121436" version="1" comment="libpng16-compat-devel-32bit is &lt;1.6.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121437" version="1" comment="libpng16-devel is &lt;1.6.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121438" version="1" comment="libpng16-devel-32bit is &lt;1.6.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121439" version="1" comment="libpng16-tools is &lt;1.6.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123852" version="1" comment="bouncycastle is &lt;1.54-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123853" version="1" comment="bouncycastle-javadoc is &lt;1.54-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123854" version="1" comment="nodejs is &lt;4.3.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123855" version="1" comment="nodejs-devel is &lt;4.3.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123857" version="1" comment="nodejs-docs is &lt;4.3.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123858" version="1" comment="npm is &lt;4.3.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123863" version="1" comment="dhcp-doc is &lt;4.3.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123977" version="1" comment="attica-qt5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123978" version="1" comment="attica-qt5-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123979" version="1" comment="attica-qt5-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123980" version="1" comment="baloo5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123981" version="1" comment="baloo5-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123982" version="1" comment="baloo5-file is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123983" version="1" comment="baloo5-imports is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123984" version="1" comment="baloo5-kioslaves is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123985" version="1" comment="baloo5-lang is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123986" version="1" comment="baloo5-tools is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123987" version="1" comment="bluez-qt is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123988" version="1" comment="bluez-qt-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123989" version="1" comment="bluez-qt-imports is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123990" version="1" comment="bluez-qt-udev is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123991" version="1" comment="breeze5-icons is &lt;5.19.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123992" version="1" comment="extra-cmake-modules is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123993" version="1" comment="frameworkintegration is &lt;5.19.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123994" version="1" comment="frameworkintegration-devel is &lt;5.19.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123995" version="1" comment="frameworkintegration-devel-32bit is &lt;5.19.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123996" version="1" comment="frameworkintegration-plugin is &lt;5.19.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123997" version="1" comment="frameworkintegration-plugin-32bit is &lt;5.19.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123998" version="1" comment="kactivities5 is &lt;5.19.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123999" version="1" comment="kactivities5-devel is &lt;5.19.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124000" version="1" comment="kactivities5-devel-32bit is &lt;5.19.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124001" version="1" comment="kactivities5-imports is &lt;5.19.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124002" version="1" comment="kapidox is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124003" version="1" comment="karchive is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124004" version="1" comment="karchive-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124005" version="1" comment="karchive-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124006" version="1" comment="kauth is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124007" version="1" comment="kauth-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124008" version="1" comment="kauth-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124009" version="1" comment="kbookmarks is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124010" version="1" comment="kbookmarks-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124011" version="1" comment="kbookmarks-devel-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124012" version="1" comment="kcmutils is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124013" version="1" comment="kcmutils-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124014" version="1" comment="kcmutils-devel-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124015" version="1" comment="kcodecs is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124016" version="1" comment="kcodecs-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124017" version="1" comment="kcodecs-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124018" version="1" comment="kcompletion is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124019" version="1" comment="kcompletion-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124020" version="1" comment="kcompletion-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124021" version="1" comment="kconf_update5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124022" version="1" comment="kconfig is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124023" version="1" comment="kconfig-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124024" version="1" comment="kconfig-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124025" version="1" comment="kconfigwidgets is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124026" version="1" comment="kconfigwidgets-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124027" version="1" comment="kconfigwidgets-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124028" version="1" comment="kcoreaddons is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124029" version="1" comment="kcoreaddons-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124030" version="1" comment="kcoreaddons-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124031" version="1" comment="kcoreaddons-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124032" version="1" comment="kcrash is &lt;5.19.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124033" version="1" comment="kcrash-devel is &lt;5.19.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124034" version="1" comment="kcrash-devel-32bit is &lt;5.19.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124035" version="1" comment="kdbusaddons is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124036" version="1" comment="kdbusaddons-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124037" version="1" comment="kdbusaddons-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124038" version="1" comment="kdbusaddons-tools is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124039" version="1" comment="kdeclarative is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124040" version="1" comment="kdeclarative-components is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124041" version="1" comment="kdeclarative-components-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124042" version="1" comment="kdeclarative-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124043" version="1" comment="kdeclarative-devel-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124044" version="1" comment="kdeclarative-tools is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124045" version="1" comment="kded is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124046" version="1" comment="kded-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124047" version="1" comment="kded-lang is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124048" version="1" comment="kdelibs4support is &lt;5.19.0-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124049" version="1" comment="kdelibs4support-32bit is &lt;5.19.0-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124050" version="1" comment="kdelibs4support-devel is &lt;5.19.0-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124051" version="1" comment="kdelibs4support-devel-32bit is &lt;5.19.0-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124052" version="1" comment="kdelibs4support-lang is &lt;5.19.0-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124053" version="1" comment="kdesignerplugin is &lt;5.19.0-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124054" version="1" comment="kdesignerplugin-devel is &lt;5.19.0-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124055" version="1" comment="kdesignerplugin-lang is &lt;5.19.0-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124056" version="1" comment="kdesu is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124057" version="1" comment="kdesu-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124058" version="1" comment="kdesu-devel-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124059" version="1" comment="kdewebkit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124060" version="1" comment="kdewebkit-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124061" version="1" comment="kdewebkit-devel-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124062" version="1" comment="kdnssd-framework is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124063" version="1" comment="kdnssd-framework-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124064" version="1" comment="kdnssd-framework-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124065" version="1" comment="kdoctools is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124066" version="1" comment="kdoctools-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124067" version="1" comment="kdoctools-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124068" version="1" comment="kemoticons is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124069" version="1" comment="kemoticons-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124070" version="1" comment="kemoticons-devel-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124071" version="1" comment="kfilemetadata5 is &lt;5.19.0-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124072" version="1" comment="kfilemetadata5-32bit is &lt;5.19.0-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124073" version="1" comment="kfilemetadata5-devel is &lt;5.19.0-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124074" version="1" comment="kfilemetadata5-lang is &lt;5.19.0-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124075" version="1" comment="kglobalaccel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124076" version="1" comment="kglobalaccel-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124077" version="1" comment="kglobalaccel-devel-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124078" version="1" comment="kglobalaccel5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124079" version="1" comment="kguiaddons is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124080" version="1" comment="kguiaddons-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124081" version="1" comment="kguiaddons-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124082" version="1" comment="khtml is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124083" version="1" comment="khtml-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124084" version="1" comment="khtml-devel-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124085" version="1" comment="ki18n is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124086" version="1" comment="ki18n-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124087" version="1" comment="ki18n-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124088" version="1" comment="kiconthemes is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124089" version="1" comment="kiconthemes-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124090" version="1" comment="kiconthemes-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124091" version="1" comment="kidletime is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124092" version="1" comment="kidletime-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124093" version="1" comment="kidletime-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124094" version="1" comment="kimageformats is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124095" version="1" comment="kimageformats-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124096" version="1" comment="kinit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124097" version="1" comment="kinit-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124098" version="1" comment="kinit-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124099" version="1" comment="kinit-lang is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124100" version="1" comment="kio is &lt;5.19.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124101" version="1" comment="kio-32bit is &lt;5.19.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124102" version="1" comment="kio-core is &lt;5.19.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124103" version="1" comment="kio-core-32bit is &lt;5.19.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124104" version="1" comment="kio-devel is &lt;5.19.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124105" version="1" comment="kio-devel-32bit is &lt;5.19.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124106" version="1" comment="kio-lang is &lt;5.19.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124107" version="1" comment="kitemmodels is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124108" version="1" comment="kitemmodels-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124109" version="1" comment="kitemmodels-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124110" version="1" comment="kitemviews is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124111" version="1" comment="kitemviews-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124112" version="1" comment="kitemviews-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124113" version="1" comment="kjobwidgets is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124114" version="1" comment="kjobwidgets-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124115" version="1" comment="kjobwidgets-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124116" version="1" comment="kjs is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124117" version="1" comment="kjs-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124118" version="1" comment="kjs-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124119" version="1" comment="kjsembed is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124120" version="1" comment="kjsembed-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124121" version="1" comment="kjsembed-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124122" version="1" comment="kmediaplayer is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124123" version="1" comment="kmediaplayer-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124124" version="1" comment="kmediaplayer-devel-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124125" version="1" comment="knewstuff is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124126" version="1" comment="knewstuff-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124127" version="1" comment="knewstuff-devel-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124128" version="1" comment="knotifications is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124129" version="1" comment="knotifications-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124130" version="1" comment="knotifications-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124131" version="1" comment="knotifyconfig is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124132" version="1" comment="knotifyconfig-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124133" version="1" comment="knotifyconfig-devel-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124134" version="1" comment="kpackage is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124135" version="1" comment="kpackage-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124136" version="1" comment="kpackage-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124137" version="1" comment="kpackage-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124138" version="1" comment="kpackage-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124139" version="1" comment="kparts is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124140" version="1" comment="kparts-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124141" version="1" comment="kparts-devel-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124142" version="1" comment="kpeople5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124143" version="1" comment="kpeople5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124144" version="1" comment="kpeople5-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124145" version="1" comment="kpeople5-devel-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124146" version="1" comment="kpeople5-lang is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124147" version="1" comment="kplotting is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124148" version="1" comment="kplotting-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124149" version="1" comment="kplotting-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124150" version="1" comment="kpty is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124151" version="1" comment="kpty-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124152" version="1" comment="kpty-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124153" version="1" comment="kross is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124154" version="1" comment="kross-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124155" version="1" comment="kross-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124156" version="1" comment="kross-devel-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124157" version="1" comment="kross-lang is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124158" version="1" comment="krunner is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124159" version="1" comment="krunner-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124160" version="1" comment="krunner-devel-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124161" version="1" comment="kservice is &lt;5.19.0-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124162" version="1" comment="kservice-32bit is &lt;5.19.0-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124163" version="1" comment="kservice-devel is &lt;5.19.0-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124164" version="1" comment="kservice-devel-32bit is &lt;5.19.0-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124165" version="1" comment="kservice-lang is &lt;5.19.0-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124166" version="1" comment="kssl is &lt;5.19.0-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124167" version="1" comment="ktexteditor is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124168" version="1" comment="ktexteditor-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124169" version="1" comment="ktexteditor-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124170" version="1" comment="ktexteditor-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124171" version="1" comment="ktexteditor-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124172" version="1" comment="ktextwidgets is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124173" version="1" comment="ktextwidgets-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124174" version="1" comment="ktextwidgets-devel-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124175" version="1" comment="kunitconversion is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124176" version="1" comment="kunitconversion-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124177" version="1" comment="kunitconversion-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124178" version="1" comment="kwallet is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124179" version="1" comment="kwallet-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124180" version="1" comment="kwallet-devel-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124181" version="1" comment="kwallet-tools is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124182" version="1" comment="kwallet-tools-lang is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124183" version="1" comment="kwalletd5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124184" version="1" comment="kwalletd5-lang is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124185" version="1" comment="kwidgetsaddons is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124186" version="1" comment="kwidgetsaddons-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124187" version="1" comment="kwidgetsaddons-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124188" version="1" comment="kwindowsystem is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124189" version="1" comment="kwindowsystem-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124190" version="1" comment="kwindowsystem-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124191" version="1" comment="kxmlgui is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124192" version="1" comment="kxmlgui-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124193" version="1" comment="kxmlgui-devel-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124194" version="1" comment="kxmlrpcclient5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124195" version="1" comment="kxmlrpcclient5-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124196" version="1" comment="kxmlrpcclient5-devel-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124197" version="1" comment="libKF5Activities5 is &lt;5.19.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124198" version="1" comment="libKF5Activities5-32bit is &lt;5.19.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124199" version="1" comment="libKF5Activities5-lang is &lt;5.19.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124200" version="1" comment="libKF5Archive5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124201" version="1" comment="libKF5Archive5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124202" version="1" comment="libKF5Attica5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124203" version="1" comment="libKF5Attica5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124204" version="1" comment="libKF5Auth5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124205" version="1" comment="libKF5Auth5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124206" version="1" comment="libKF5Auth5-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124207" version="1" comment="libKF5Baloo5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124208" version="1" comment="libKF5Baloo5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124209" version="1" comment="libKF5BalooEngine5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124210" version="1" comment="libKF5BalooEngine5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124211" version="1" comment="libKF5BluezQt6 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124212" version="1" comment="libKF5Bookmarks5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124213" version="1" comment="libKF5Bookmarks5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124214" version="1" comment="libKF5Bookmarks5-lang is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124215" version="1" comment="libKF5CalendarEvents5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124216" version="1" comment="libKF5CalendarEvents5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124217" version="1" comment="libKF5Codecs5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124218" version="1" comment="libKF5Codecs5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124219" version="1" comment="libKF5Codecs5-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124220" version="1" comment="libKF5Completion5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124221" version="1" comment="libKF5Completion5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124222" version="1" comment="libKF5Completion5-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124223" version="1" comment="libKF5ConfigCore5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124224" version="1" comment="libKF5ConfigCore5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124225" version="1" comment="libKF5ConfigCore5-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124226" version="1" comment="libKF5ConfigGui5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124227" version="1" comment="libKF5ConfigGui5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124228" version="1" comment="libKF5ConfigWidgets5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124229" version="1" comment="libKF5ConfigWidgets5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124230" version="1" comment="libKF5ConfigWidgets5-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124231" version="1" comment="libKF5CoreAddons5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124232" version="1" comment="libKF5CoreAddons5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124233" version="1" comment="libKF5Crash5 is &lt;5.19.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124234" version="1" comment="libKF5Crash5-32bit is &lt;5.19.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124235" version="1" comment="libKF5DBusAddons5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124236" version="1" comment="libKF5DBusAddons5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124237" version="1" comment="libKF5DBusAddons5-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124238" version="1" comment="libKF5DNSSD5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124239" version="1" comment="libKF5DNSSD5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124240" version="1" comment="libKF5DNSSD5-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124241" version="1" comment="libKF5Declarative5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124242" version="1" comment="libKF5Declarative5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124243" version="1" comment="libKF5Declarative5-lang is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124244" version="1" comment="libKF5Emoticons5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124245" version="1" comment="libKF5Emoticons5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124246" version="1" comment="libKF5GlobalAccel5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124247" version="1" comment="libKF5GlobalAccel5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124248" version="1" comment="libKF5GlobalAccel5-lang is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124249" version="1" comment="libKF5GlobalAccelPrivate5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124250" version="1" comment="libKF5GuiAddons5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124251" version="1" comment="libKF5GuiAddons5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124252" version="1" comment="libKF5I18n5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124253" version="1" comment="libKF5I18n5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124254" version="1" comment="libKF5I18n5-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124255" version="1" comment="libKF5IconThemes5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124256" version="1" comment="libKF5IconThemes5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124257" version="1" comment="libKF5IconThemes5-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124258" version="1" comment="libKF5IdleTime5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124259" version="1" comment="libKF5IdleTime5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124260" version="1" comment="libKF5ItemModels5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124261" version="1" comment="libKF5ItemModels5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124262" version="1" comment="libKF5ItemViews5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124263" version="1" comment="libKF5ItemViews5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124264" version="1" comment="libKF5ItemViews5-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124265" version="1" comment="libKF5JS5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124266" version="1" comment="libKF5JS5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124267" version="1" comment="libKF5JSApi5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124268" version="1" comment="libKF5JSApi5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124269" version="1" comment="libKF5JobWidgets5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124270" version="1" comment="libKF5JobWidgets5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124271" version="1" comment="libKF5JobWidgets5-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124272" version="1" comment="libKF5JsEmbed5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124273" version="1" comment="libKF5JsEmbed5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124274" version="1" comment="libKF5JsEmbed5-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124275" version="1" comment="libKF5KCMUtils5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124276" version="1" comment="libKF5KCMUtils5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124277" version="1" comment="libKF5KCMUtils5-lang is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124278" version="1" comment="libKF5KDELibs4Support5 is &lt;5.19.0-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124279" version="1" comment="libKF5KDELibs4Support5-32bit is &lt;5.19.0-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124280" version="1" comment="libKF5KHtml5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124281" version="1" comment="libKF5KHtml5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124282" version="1" comment="libKF5KHtml5-lang is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124283" version="1" comment="libKF5MediaPlayer5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124284" version="1" comment="libKF5MediaPlayer5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124285" version="1" comment="libKF5ModemManagerQt is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124286" version="1" comment="libKF5ModemManagerQt-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124287" version="1" comment="libKF5ModemManagerQt6 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124288" version="1" comment="libKF5NetworkManagerQt is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124289" version="1" comment="libKF5NetworkManagerQt-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124290" version="1" comment="libKF5NetworkManagerQt-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124291" version="1" comment="libKF5NetworkManagerQt6 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124292" version="1" comment="libKF5NetworkManagerQt6-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124293" version="1" comment="libKF5NewStuff5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124294" version="1" comment="libKF5NewStuff5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124295" version="1" comment="libKF5NewStuff5-lang is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124296" version="1" comment="libKF5Notifications5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124297" version="1" comment="libKF5Notifications5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124298" version="1" comment="libKF5Notifications5-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124299" version="1" comment="libKF5NotifyConfig5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124300" version="1" comment="libKF5NotifyConfig5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124301" version="1" comment="libKF5NotifyConfig5-lang is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124302" version="1" comment="libKF5Parts5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124303" version="1" comment="libKF5Parts5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124304" version="1" comment="libKF5Parts5-lang is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124305" version="1" comment="libKF5Plotting5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124306" version="1" comment="libKF5Plotting5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124307" version="1" comment="libKF5Pty5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124308" version="1" comment="libKF5Pty5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124309" version="1" comment="libKF5Pty5-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124310" version="1" comment="libKF5QuickAddons5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124311" version="1" comment="libKF5QuickAddons5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124312" version="1" comment="libKF5Runner5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124313" version="1" comment="libKF5Runner5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124314" version="1" comment="libKF5Solid5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124315" version="1" comment="libKF5Solid5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124316" version="1" comment="libKF5Solid5-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124317" version="1" comment="libKF5SonnetCore5 is &lt;5.19.0-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124318" version="1" comment="libKF5SonnetCore5-32bit is &lt;5.19.0-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124319" version="1" comment="libKF5SonnetCore5-lang is &lt;5.19.0-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124320" version="1" comment="libKF5SonnetUi5 is &lt;5.19.0-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124321" version="1" comment="libKF5SonnetUi5-32bit is &lt;5.19.0-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124322" version="1" comment="libKF5Style5 is &lt;5.19.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124323" version="1" comment="libKF5Style5-32bit is &lt;5.19.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124324" version="1" comment="libKF5Style5-lang is &lt;5.19.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124325" version="1" comment="libKF5Su5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124326" version="1" comment="libKF5Su5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124327" version="1" comment="libKF5Su5-lang is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124328" version="1" comment="libKF5TextWidgets5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124329" version="1" comment="libKF5TextWidgets5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124330" version="1" comment="libKF5TextWidgets5-lang is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124331" version="1" comment="libKF5ThreadWeaver5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124332" version="1" comment="libKF5ThreadWeaver5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124333" version="1" comment="libKF5UnitConversion5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124334" version="1" comment="libKF5UnitConversion5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124335" version="1" comment="libKF5UnitConversion5-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124336" version="1" comment="libKF5Wallet5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124337" version="1" comment="libKF5Wallet5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124338" version="1" comment="libKF5WebKit5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124339" version="1" comment="libKF5WebKit5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124340" version="1" comment="libKF5WidgetsAddons5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124341" version="1" comment="libKF5WidgetsAddons5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124342" version="1" comment="libKF5WidgetsAddons5-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124343" version="1" comment="libKF5WindowSystem5 is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124344" version="1" comment="libKF5WindowSystem5-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124345" version="1" comment="libKF5WindowSystem5-lang is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124346" version="1" comment="libKF5XmlGui5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124347" version="1" comment="libKF5XmlGui5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124348" version="1" comment="libKF5XmlGui5-lang is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124349" version="1" comment="libKF5XmlRpcClient5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124350" version="1" comment="libKF5XmlRpcClient5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124351" version="1" comment="libKF5XmlRpcClient5-lang is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124352" version="1" comment="libkwalletbackend5-5 is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124353" version="1" comment="libkwalletbackend5-5-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124354" version="1" comment="oxygen5-icon-theme is &lt;5.18.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124355" version="1" comment="oxygen5-icon-theme-large is &lt;5.18.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124356" version="1" comment="oxygen5-icon-theme-scalable is &lt;5.18.0-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124357" version="1" comment="plasma-framework is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124358" version="1" comment="plasma-framework-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124359" version="1" comment="plasma-framework-components is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124360" version="1" comment="plasma-framework-components-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124361" version="1" comment="plasma-framework-devel is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124362" version="1" comment="plasma-framework-devel-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124363" version="1" comment="plasma-framework-lang is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124364" version="1" comment="plasma-framework-private is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124365" version="1" comment="plasma-framework-private-32bit is &lt;5.19.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124366" version="1" comment="solid is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124367" version="1" comment="solid-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124368" version="1" comment="solid-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124369" version="1" comment="solid-imports is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124370" version="1" comment="solid-tools is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124371" version="1" comment="sonnet is &lt;5.19.0-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124372" version="1" comment="sonnet-devel is &lt;5.19.0-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124373" version="1" comment="sonnet-devel-32bit is &lt;5.19.0-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124374" version="1" comment="threadweaver is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124375" version="1" comment="threadweaver-devel is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124376" version="1" comment="threadweaver-devel-32bit is &lt;5.19.0-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124397" version="1" comment="libopenssl-devel is &lt;1.0.1i-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124398" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1i-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124399" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124400" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124401" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124402" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124403" version="1" comment="openssl is &lt;1.0.1i-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124404" version="1" comment="openssl-doc is &lt;1.0.1i-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121440" version="1" comment="gajim is &lt;0.16.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121441" version="1" comment="gajim-lang is &lt;0.16.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124409" version="1" comment="libopenssl0_9_8 is &lt;0.9.8zh-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124410" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8zh-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124415" version="1" comment="eog is &lt;3.16.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124416" version="1" comment="eog-devel is &lt;3.16.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124417" version="1" comment="eog-lang is &lt;3.16.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121442" version="1" comment="libpng12 is &lt;1.2.50-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121443" version="1" comment="libpng12-0 is &lt;1.2.50-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121444" version="1" comment="libpng12-0-32bit is &lt;1.2.50-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121445" version="1" comment="libpng12-compat-devel is &lt;1.2.50-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121446" version="1" comment="libpng12-compat-devel-32bit is &lt;1.2.50-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121447" version="1" comment="libpng12-devel is &lt;1.2.50-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121448" version="1" comment="libpng12-devel-32bit is &lt;1.2.50-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124447" version="1" comment="wireshark is &lt;1.12.10-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124448" version="1" comment="wireshark-devel is &lt;1.12.10-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124449" version="1" comment="wireshark-ui-gtk is &lt;1.12.10-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124450" version="1" comment="wireshark-ui-qt is &lt;1.12.10-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124456" version="1" comment="phpMyAdmin is &lt;4.4.15.5-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121449" version="1" comment="libpng15-15-32bit is &lt;1.5.22-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124508" version="1" comment="libnghttp2-14 is &lt;1.3.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124509" version="1" comment="libnghttp2-devel is &lt;1.3.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124510" version="1" comment="libnghttp2_asio-devel is &lt;1.3.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124511" version="1" comment="libnghttp2_asio1 is &lt;1.3.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124512" version="1" comment="nghttp2 is &lt;1.3.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124513" version="1" comment="nghttp2-doc is &lt;1.3.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124514" version="1" comment="python-nghttp2 is &lt;1.3.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124515" version="1" comment="salt is &lt;2015.8.7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124516" version="1" comment="salt-api is &lt;2015.8.7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124517" version="1" comment="salt-bash-completion is &lt;2015.8.7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124518" version="1" comment="salt-cloud is &lt;2015.8.7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124519" version="1" comment="salt-doc is &lt;2015.8.7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124520" version="1" comment="salt-fish-completion is &lt;2015.8.7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124521" version="1" comment="salt-master is &lt;2015.8.7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124522" version="1" comment="salt-minion is &lt;2015.8.7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124523" version="1" comment="salt-proxy is &lt;2015.8.7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124524" version="1" comment="salt-raet is &lt;2015.8.7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124525" version="1" comment="salt-ssh is &lt;2015.8.7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124526" version="1" comment="salt-syndic is &lt;2015.8.7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124527" version="1" comment="salt-zsh-completion is &lt;2015.8.7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103735" version="1" comment="libxml2-devel-32bit is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124494" version="1" comment="libotr is &lt;4.1.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124495" version="1" comment="libotr-devel is &lt;4.1.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124496" version="1" comment="libotr-tools is &lt;4.1.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124497" version="1" comment="libotr2 is &lt;3.2.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124498" version="1" comment="libotr2-devel is &lt;3.2.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124499" version="1" comment="libotr2-tools is &lt;3.2.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124500" version="1" comment="libotr5 is &lt;4.1.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124628" version="1" comment="exim is &lt;4.86.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124629" version="1" comment="eximon is &lt;4.86.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124630" version="1" comment="eximstats-html is &lt;4.86.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124681" version="1" comment="compat-openssl098 is &lt;0.9.8j-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124682" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124683" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124684" version="1" comment="libssh is &lt;0.6.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124685" version="1" comment="libssh-devel is &lt;0.6.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124686" version="1" comment="libssh-devel-doc is &lt;0.6.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124687" version="1" comment="libssh4 is &lt;0.6.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124688" version="1" comment="libssh4-32bit is &lt;0.6.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121400" version="1" comment="python-rsa is &lt;3.1.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124636" version="1" comment="MozillaFirefox is &lt;45.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124637" version="1" comment="MozillaFirefox-branding-upstream is &lt;45.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124638" version="1" comment="MozillaFirefox-buildsymbols is &lt;45.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124639" version="1" comment="MozillaFirefox-devel is &lt;45.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124640" version="1" comment="MozillaFirefox-translations-common is &lt;45.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124641" version="1" comment="MozillaFirefox-translations-other is &lt;45.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124642" version="1" comment="libfreebl3 is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124643" version="1" comment="libfreebl3-32bit is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124644" version="1" comment="libsoftokn3 is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124645" version="1" comment="libsoftokn3-32bit is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124646" version="1" comment="mozilla-nspr is &lt;4.12-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124647" version="1" comment="mozilla-nspr-32bit is &lt;4.12-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124648" version="1" comment="mozilla-nspr-devel is &lt;4.12-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124649" version="1" comment="mozilla-nss is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124650" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124651" version="1" comment="mozilla-nss-certs is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124652" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124653" version="1" comment="mozilla-nss-devel is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124654" version="1" comment="mozilla-nss-sysinit is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124655" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124656" version="1" comment="mozilla-nss-tools is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124773" version="1" comment="python-Pillow is &lt;2.9.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124774" version="1" comment="python-Pillow-tk is &lt;2.9.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124777" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.10.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124778" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.10.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124779" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.10.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124780" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.10.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124781" version="1" comment="libwebkit2gtk3-lang is &lt;2.10.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124782" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.10.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124783" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.10.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124784" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.10.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124785" version="1" comment="webkit-jsc-4 is &lt;2.10.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124786" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.10.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124787" version="1" comment="webkit2gtk3 is &lt;2.10.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124788" version="1" comment="webkit2gtk3-devel is &lt;2.10.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124845" version="1" comment="bsh2 is &lt;2.0.0.b5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124846" version="1" comment="bsh2-bsf is &lt;2.0.0.b5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124847" version="1" comment="bsh2-classgen is &lt;2.0.0.b5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124848" version="1" comment="bsh2-demo is &lt;2.0.0.b5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124849" version="1" comment="bsh2-javadoc is &lt;2.0.0.b5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124850" version="1" comment="bsh2-manual is &lt;2.0.0.b5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124851" version="1" comment="bsh2-src is &lt;2.0.0.b5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124852" version="1" comment="ruby2.1-rubygem-actionview-4_2 is &lt;4.2.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124853" version="1" comment="ruby2.1-rubygem-actionview-doc-4_2 is &lt;4.2.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124854" version="1" comment="rubygem-actionview-4_2 is &lt;4.2.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124855" version="1" comment="git is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124856" version="1" comment="git-arch is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124857" version="1" comment="git-core is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124858" version="1" comment="git-credential-gnome-keyring is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124859" version="1" comment="git-cvs is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124860" version="1" comment="git-daemon is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124861" version="1" comment="git-doc is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124862" version="1" comment="git-email is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124863" version="1" comment="git-gui is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124864" version="1" comment="git-svn is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124865" version="1" comment="git-web is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124866" version="1" comment="gitk is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124867" version="1" comment="cgit is &lt;0.12-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121492" version="1" comment="xen is &lt;4.5.2_04-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121493" version="1" comment="xen-devel is &lt;4.5.2_04-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121494" version="1" comment="xen-doc-html is &lt;4.5.2_04-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121495" version="1" comment="xen-kmp-default is &lt;4.5.2_04_k4.1.13_5-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121496" version="1" comment="xen-libs is &lt;4.5.2_04-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121497" version="1" comment="xen-libs-32bit is &lt;4.5.2_04-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121498" version="1" comment="xen-tools is &lt;4.5.2_04-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121499" version="1" comment="xen-tools-domU is &lt;4.5.2_04-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125134" version="1" comment="chromedriver is &lt;49.0.2623.87-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125135" version="1" comment="chromium is &lt;49.0.2623.87-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125136" version="1" comment="chromium-desktop-gnome is &lt;49.0.2623.87-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125137" version="1" comment="chromium-desktop-kde is &lt;49.0.2623.87-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125138" version="1" comment="chromium-ffmpegsumo is &lt;49.0.2623.87-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121471" version="1" comment="libebml is &lt;1.3.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121472" version="1" comment="libebml-devel is &lt;1.3.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121473" version="1" comment="libebml4 is &lt;1.3.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121474" version="1" comment="libebml4-32bit is &lt;1.3.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121475" version="1" comment="libmatroska is &lt;1.4.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121476" version="1" comment="libmatroska-devel is &lt;1.4.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121477" version="1" comment="libmatroska6 is &lt;1.4.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121478" version="1" comment="libmatroska6-32bit is &lt;1.4.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121500" version="1" comment="openssh is &lt;6.6p1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121501" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121502" version="1" comment="openssh-cavs is &lt;6.6p1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121503" version="1" comment="openssh-fips is &lt;6.6p1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121504" version="1" comment="openssh-helpers is &lt;6.6p1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125295" version="1" comment="bind is &lt;9.9.6P1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125296" version="1" comment="bind-chrootenv is &lt;9.9.6P1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125297" version="1" comment="bind-devel is &lt;9.9.6P1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125298" version="1" comment="bind-doc is &lt;9.9.6P1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125299" version="1" comment="bind-libs is &lt;9.9.6P1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125300" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125301" version="1" comment="bind-lwresd is &lt;9.9.6P1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125302" version="1" comment="bind-utils is &lt;9.9.6P1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125308" version="1" comment="tomcat is &lt;8.0.32-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125309" version="1" comment="tomcat-admin-webapps is &lt;8.0.32-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125310" version="1" comment="tomcat-docs-webapp is &lt;8.0.32-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125311" version="1" comment="tomcat-el-3_0-api is &lt;8.0.32-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125312" version="1" comment="tomcat-embed is &lt;8.0.32-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125313" version="1" comment="tomcat-javadoc is &lt;8.0.32-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125314" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.32-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125315" version="1" comment="tomcat-jsvc is &lt;8.0.32-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125316" version="1" comment="tomcat-lib is &lt;8.0.32-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125317" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.32-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125318" version="1" comment="tomcat-webapps is &lt;8.0.32-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125352" version="1" comment="dropbear is &lt;2016.72-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125371" version="1" comment="libssh2-1 is &lt;1.4.3-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125372" version="1" comment="libssh2-1-32bit is &lt;1.4.3-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125373" version="1" comment="libssh2-devel is &lt;1.4.3-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125374" version="1" comment="libssh2_org is &lt;1.4.3-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125358" version="1" comment="MozillaThunderbird is &lt;38.7.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125359" version="1" comment="MozillaThunderbird-buildsymbols is &lt;38.7.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125360" version="1" comment="MozillaThunderbird-devel is &lt;38.7.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125361" version="1" comment="MozillaThunderbird-translations-common is &lt;38.7.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125362" version="1" comment="MozillaThunderbird-translations-other is &lt;38.7.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125375" version="1" comment="quagga is &lt;0.99.24.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125376" version="1" comment="quagga-devel is &lt;0.99.24.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125363" version="1" comment="pidgin-otr is &lt;4.0.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125377" version="1" comment="ctdb is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125378" version="1" comment="ctdb-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125379" version="1" comment="ctdb-tests is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125380" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125381" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125382" version="1" comment="libdcerpc-atsvc0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125383" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125384" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125385" version="1" comment="libdcerpc-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125386" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125387" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125388" version="1" comment="libdcerpc-samr0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125389" version="1" comment="libdcerpc0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125390" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125391" version="1" comment="libgensec-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125392" version="1" comment="libgensec0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125393" version="1" comment="libgensec0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125394" version="1" comment="libndr-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125395" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125396" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125397" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125398" version="1" comment="libndr-nbt-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125399" version="1" comment="libndr-nbt0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125400" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125401" version="1" comment="libndr-standard-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125402" version="1" comment="libndr-standard0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125403" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125404" version="1" comment="libndr0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125405" version="1" comment="libndr0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125406" version="1" comment="libnetapi-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125407" version="1" comment="libnetapi0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125408" version="1" comment="libnetapi0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125409" version="1" comment="libregistry-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125410" version="1" comment="libregistry0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125411" version="1" comment="libregistry0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125412" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125413" version="1" comment="libsamba-credentials0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125414" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125415" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125416" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125417" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125418" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125419" version="1" comment="libsamba-passdb0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125420" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125421" version="1" comment="libsamba-policy-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125422" version="1" comment="libsamba-policy0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125423" version="1" comment="libsamba-policy0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125424" version="1" comment="libsamba-util-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125425" version="1" comment="libsamba-util0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125426" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125427" version="1" comment="libsamdb-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125428" version="1" comment="libsamdb0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125429" version="1" comment="libsamdb0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125430" version="1" comment="libsmbclient-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125431" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125432" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125433" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125434" version="1" comment="libsmbclient0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125435" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125436" version="1" comment="libsmbconf-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125437" version="1" comment="libsmbconf0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125438" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125439" version="1" comment="libsmbldap-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125440" version="1" comment="libsmbldap0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125441" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125442" version="1" comment="libtevent-util-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125443" version="1" comment="libtevent-util0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125444" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125445" version="1" comment="libwbclient-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125446" version="1" comment="libwbclient0 is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125447" version="1" comment="libwbclient0-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125448" version="1" comment="samba is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125449" version="1" comment="samba-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125450" version="1" comment="samba-client is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125451" version="1" comment="samba-client-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125452" version="1" comment="samba-core-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125453" version="1" comment="samba-doc is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125454" version="1" comment="samba-libs is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125455" version="1" comment="samba-libs-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125456" version="1" comment="samba-pidl is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125457" version="1" comment="samba-python is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125458" version="1" comment="samba-test is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125459" version="1" comment="samba-test-devel is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125460" version="1" comment="samba-winbind is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125461" version="1" comment="samba-winbind-32bit is &lt;4.2.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125560" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125561" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125562" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125563" version="1" comment="libjavascriptcoregtk-3_0-0-32bit is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125564" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125565" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125566" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125567" version="1" comment="libwebkitgtk-3_0-0-32bit is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125568" version="1" comment="libwebkitgtk-devel is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125569" version="1" comment="libwebkitgtk2-lang is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125570" version="1" comment="libwebkitgtk3-devel is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125571" version="1" comment="libwebkitgtk3-lang is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125572" version="1" comment="typelib-1_0-JavaScriptCore-1_0 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125573" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125574" version="1" comment="typelib-1_0-WebKit-1_0 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125575" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125576" version="1" comment="webkit-jsc-1 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125577" version="1" comment="webkit-jsc-3 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125578" version="1" comment="webkitgtk is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125579" version="1" comment="webkitgtk3 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125600" version="1" comment="xen is &lt;4.5.2_06-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125601" version="1" comment="xen-devel is &lt;4.5.2_06-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125602" version="1" comment="xen-doc-html is &lt;4.5.2_06-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125603" version="1" comment="xen-kmp-default is &lt;4.5.2_06_k4.1.15_8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125604" version="1" comment="xen-libs is &lt;4.5.2_06-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125605" version="1" comment="xen-libs-32bit is &lt;4.5.2_06-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125606" version="1" comment="xen-tools is &lt;4.5.2_06-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125607" version="1" comment="xen-tools-domU is &lt;4.5.2_06-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125640" version="1" comment="libqt4-devel-doc is &lt;4.8.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125641" version="1" comment="libqt4-devel-doc-data is &lt;4.8.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125642" version="1" comment="qt4-x11-tools is &lt;4.8.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125630" version="1" comment="chromedriver is &lt;49.0.2623.110-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125631" version="1" comment="chromium is &lt;49.0.2623.110-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125632" version="1" comment="chromium-desktop-gnome is &lt;49.0.2623.110-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125633" version="1" comment="chromium-desktop-kde is &lt;49.0.2623.110-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125634" version="1" comment="chromium-ffmpegsumo is &lt;49.0.2623.110-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125693" version="1" comment="ghostscript is &lt;9.15-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125694" version="1" comment="ghostscript-devel is &lt;9.15-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125695" version="1" comment="ghostscript-mini is &lt;9.15-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125696" version="1" comment="ghostscript-mini-devel is &lt;9.15-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125697" version="1" comment="ghostscript-x11 is &lt;9.15-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125698" version="1" comment="git is &lt;2.6.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125699" version="1" comment="git-arch is &lt;2.6.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125700" version="1" comment="git-core is &lt;2.6.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125701" version="1" comment="git-credential-gnome-keyring is &lt;2.6.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125702" version="1" comment="git-cvs is &lt;2.6.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125703" version="1" comment="git-daemon is &lt;2.6.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125704" version="1" comment="git-doc is &lt;2.6.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125705" version="1" comment="git-email is &lt;2.6.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125706" version="1" comment="git-gui is &lt;2.6.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125707" version="1" comment="git-svn is &lt;2.6.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125708" version="1" comment="git-web is &lt;2.6.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125709" version="1" comment="gitk is &lt;2.6.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126041" version="1" comment="clamav-database is &lt;201604040002-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126042" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.77-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126043" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.77-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126044" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.77-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126045" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.77-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126046" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.77-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126047" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.77-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126048" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.77-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126049" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.99-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126050" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.99-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126051" version="1" comment="java-1_7_0-openjdk-bootstrap is &lt;1.7.0.99-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126052" version="1" comment="java-1_7_0-openjdk-bootstrap-devel is &lt;1.7.0.99-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126053" version="1" comment="java-1_7_0-openjdk-bootstrap-headless is &lt;1.7.0.99-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126054" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.99-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126055" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.99-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126056" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.99-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126057" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.99-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126058" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.99-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126059" version="1" comment="kernel-debug is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126060" version="1" comment="kernel-debug-base is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126061" version="1" comment="kernel-debug-devel is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126062" version="1" comment="kernel-default is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126063" version="1" comment="kernel-default-base is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126064" version="1" comment="kernel-default-devel is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126065" version="1" comment="kernel-devel is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126066" version="1" comment="kernel-docs is &lt;4.1.20-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126067" version="1" comment="kernel-docs-html is &lt;4.1.20-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126068" version="1" comment="kernel-docs-pdf is &lt;4.1.20-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126069" version="1" comment="kernel-ec2 is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126070" version="1" comment="kernel-ec2-base is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126071" version="1" comment="kernel-ec2-devel is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126072" version="1" comment="kernel-macros is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126073" version="1" comment="kernel-obs-build is &lt;4.1.20-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126074" version="1" comment="kernel-obs-qa is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126075" version="1" comment="kernel-obs-qa-xen is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126076" version="1" comment="kernel-pae is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126077" version="1" comment="kernel-pae-base is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126078" version="1" comment="kernel-pae-devel is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126079" version="1" comment="kernel-pv is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126080" version="1" comment="kernel-pv-base is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126081" version="1" comment="kernel-pv-devel is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126082" version="1" comment="kernel-source is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126083" version="1" comment="kernel-source-vanilla is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126084" version="1" comment="kernel-syms is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126085" version="1" comment="kernel-vanilla is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126086" version="1" comment="kernel-vanilla-devel is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126087" version="1" comment="kernel-xen is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126088" version="1" comment="kernel-xen-base is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126089" version="1" comment="kernel-xen-devel is &lt;4.1.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126090" version="1" comment="clamav-database is &lt;201604110002-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126118" version="1" comment="ctdb is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126119" version="1" comment="ctdb-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126120" version="1" comment="ctdb-tests is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126121" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126122" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126123" version="1" comment="libdcerpc-atsvc0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126124" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126125" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126126" version="1" comment="libdcerpc-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126127" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126128" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126129" version="1" comment="libdcerpc-samr0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126130" version="1" comment="libdcerpc0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126131" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126132" version="1" comment="libgensec-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126133" version="1" comment="libgensec0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126134" version="1" comment="libgensec0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126135" version="1" comment="libndr-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126136" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126137" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126138" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126139" version="1" comment="libndr-nbt-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126140" version="1" comment="libndr-nbt0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126141" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126142" version="1" comment="libndr-standard-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126143" version="1" comment="libndr-standard0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126144" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126145" version="1" comment="libndr0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126146" version="1" comment="libndr0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126147" version="1" comment="libnetapi-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126148" version="1" comment="libnetapi0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126149" version="1" comment="libnetapi0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126150" version="1" comment="libregistry-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126151" version="1" comment="libregistry0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126152" version="1" comment="libregistry0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126153" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126154" version="1" comment="libsamba-credentials0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126155" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126156" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126157" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126158" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126159" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126160" version="1" comment="libsamba-passdb0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126161" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126162" version="1" comment="libsamba-policy-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126163" version="1" comment="libsamba-policy0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126164" version="1" comment="libsamba-policy0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126165" version="1" comment="libsamba-util-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126166" version="1" comment="libsamba-util0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126167" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126168" version="1" comment="libsamdb-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126169" version="1" comment="libsamdb0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126170" version="1" comment="libsamdb0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126171" version="1" comment="libsmbclient-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126172" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126173" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126174" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126175" version="1" comment="libsmbclient0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126176" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126177" version="1" comment="libsmbconf-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126178" version="1" comment="libsmbconf0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126179" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126180" version="1" comment="libsmbldap-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126181" version="1" comment="libsmbldap0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126182" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126183" version="1" comment="libtevent-util-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126184" version="1" comment="libtevent-util0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126185" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126186" version="1" comment="libwbclient-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126187" version="1" comment="libwbclient0 is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126188" version="1" comment="libwbclient0-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126189" version="1" comment="samba is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126190" version="1" comment="samba-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126191" version="1" comment="samba-client is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126192" version="1" comment="samba-client-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126193" version="1" comment="samba-core-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126194" version="1" comment="samba-doc is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126195" version="1" comment="samba-libs is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126196" version="1" comment="samba-libs-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126197" version="1" comment="samba-pidl is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126198" version="1" comment="samba-python is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126199" version="1" comment="samba-test is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126200" version="1" comment="samba-test-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126201" version="1" comment="samba-winbind is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126202" version="1" comment="samba-winbind-32bit is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126203" version="1" comment="lhasa is &lt;0.3.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126204" version="1" comment="lhasa-devel is &lt;0.3.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126205" version="1" comment="liblhasa0 is &lt;0.3.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126250" version="1" comment="quagga is &lt;0.99.24.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126251" version="1" comment="quagga-devel is &lt;0.99.24.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121518" version="1" comment="nodejs is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121519" version="1" comment="nodejs-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121520" version="1" comment="nodejs-doc is &lt;4.2.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121521" version="1" comment="nodejs-docs is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121522" version="1" comment="npm is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126360" version="1" comment="mercurial is &lt;3.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126361" version="1" comment="mercurial-lang is &lt;3.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126362" version="1" comment="optipng is &lt;0.7.5-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126363" version="1" comment="cpp5 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126364" version="1" comment="gcc5 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126365" version="1" comment="gcc5-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126366" version="1" comment="gcc5-ada is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126367" version="1" comment="gcc5-ada-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126368" version="1" comment="gcc5-c++ is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126369" version="1" comment="gcc5-c++-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126370" version="1" comment="gcc5-fortran is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126371" version="1" comment="gcc5-fortran-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126372" version="1" comment="gcc5-go is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126373" version="1" comment="gcc5-go-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126374" version="1" comment="gcc5-info is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126375" version="1" comment="gcc5-locale is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126376" version="1" comment="gcc5-testresults is &lt;5.3.1+r233831-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126377" version="1" comment="libada5 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126378" version="1" comment="libada5-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126379" version="1" comment="libasan2 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126380" version="1" comment="libasan2-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126381" version="1" comment="libatomic1 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126382" version="1" comment="libatomic1-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126383" version="1" comment="libcilkrts5 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126384" version="1" comment="libcilkrts5-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126385" version="1" comment="libffi-devel-gcc5 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126386" version="1" comment="libffi-devel-gcc5-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126387" version="1" comment="libffi-gcc5 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126388" version="1" comment="libffi4 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126389" version="1" comment="libffi4-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126390" version="1" comment="libgcc_s1 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126391" version="1" comment="libgcc_s1-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126392" version="1" comment="libgfortran3 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126393" version="1" comment="libgfortran3-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126394" version="1" comment="libgo7 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126395" version="1" comment="libgo7-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126396" version="1" comment="libgomp1 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126397" version="1" comment="libgomp1-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126398" version="1" comment="libitm1 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126399" version="1" comment="libitm1-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126400" version="1" comment="liblsan0 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126401" version="1" comment="libmpx0 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126402" version="1" comment="libmpx0-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126403" version="1" comment="libmpxwrappers0 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126404" version="1" comment="libmpxwrappers0-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126405" version="1" comment="libquadmath0 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126406" version="1" comment="libquadmath0-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126407" version="1" comment="libstdc++6 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126408" version="1" comment="libstdc++6-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126409" version="1" comment="libstdc++6-devel-gcc5 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126410" version="1" comment="libstdc++6-devel-gcc5-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126411" version="1" comment="libstdc++6-locale is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126412" version="1" comment="libtsan0 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126413" version="1" comment="libubsan0 is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126414" version="1" comment="libubsan0-32bit is &lt;5.3.1+r233831-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126415" version="1" comment="perl-YAML-LibYAML is &lt;0.38-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126416" version="1" comment="krb5 is &lt;1.12.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126417" version="1" comment="krb5-32bit is &lt;1.12.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126418" version="1" comment="krb5-client is &lt;1.12.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126419" version="1" comment="krb5-devel is &lt;1.12.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126420" version="1" comment="krb5-devel-32bit is &lt;1.12.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126421" version="1" comment="krb5-doc is &lt;1.12.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126422" version="1" comment="krb5-mini is &lt;1.12.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126423" version="1" comment="krb5-mini-devel is &lt;1.12.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126424" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126425" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126426" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126427" version="1" comment="krb5-server is &lt;1.12.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126691" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126692" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126693" version="1" comment="libxerces-c-devel is &lt;3.1.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126694" version="1" comment="xerces-c is &lt;3.1.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126695" version="1" comment="clamav-database is &lt;201604180001-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127020" version="1" comment="apache2-mod_php5 is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127021" version="1" comment="php5 is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127022" version="1" comment="php5-bcmath is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127023" version="1" comment="php5-bz2 is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127024" version="1" comment="php5-calendar is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127025" version="1" comment="php5-ctype is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127026" version="1" comment="php5-curl is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127027" version="1" comment="php5-dba is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127028" version="1" comment="php5-devel is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127029" version="1" comment="php5-dom is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127030" version="1" comment="php5-enchant is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127031" version="1" comment="php5-exif is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127032" version="1" comment="php5-fastcgi is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127033" version="1" comment="php5-fileinfo is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127034" version="1" comment="php5-firebird is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127035" version="1" comment="php5-fpm is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127036" version="1" comment="php5-ftp is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127037" version="1" comment="php5-gd is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127038" version="1" comment="php5-gettext is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127039" version="1" comment="php5-gmp is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127040" version="1" comment="php5-iconv is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127041" version="1" comment="php5-imap is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127042" version="1" comment="php5-intl is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127043" version="1" comment="php5-json is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127044" version="1" comment="php5-ldap is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127045" version="1" comment="php5-mbstring is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127046" version="1" comment="php5-mcrypt is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127047" version="1" comment="php5-mssql is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127048" version="1" comment="php5-mysql is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127049" version="1" comment="php5-odbc is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127050" version="1" comment="php5-opcache is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127051" version="1" comment="php5-openssl is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127052" version="1" comment="php5-pcntl is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127053" version="1" comment="php5-pdo is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127054" version="1" comment="php5-pear is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127055" version="1" comment="php5-pgsql is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127056" version="1" comment="php5-phar is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127057" version="1" comment="php5-posix is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127058" version="1" comment="php5-pspell is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127059" version="1" comment="php5-readline is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127060" version="1" comment="php5-shmop is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127061" version="1" comment="php5-snmp is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127062" version="1" comment="php5-soap is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127063" version="1" comment="php5-sockets is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127064" version="1" comment="php5-sqlite is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127065" version="1" comment="php5-suhosin is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127066" version="1" comment="php5-sysvmsg is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127067" version="1" comment="php5-sysvsem is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127068" version="1" comment="php5-sysvshm is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127069" version="1" comment="php5-tidy is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127070" version="1" comment="php5-tokenizer is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127071" version="1" comment="php5-wddx is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127072" version="1" comment="php5-xmlreader is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127073" version="1" comment="php5-xmlrpc is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127074" version="1" comment="php5-xmlwriter is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127075" version="1" comment="php5-xsl is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127076" version="1" comment="php5-zip is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127077" version="1" comment="php5-zlib is &lt;5.5.14-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127126" version="1" comment="chromedriver is &lt;50.0.2661.94-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127127" version="1" comment="chromium is &lt;50.0.2661.94-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127128" version="1" comment="chromium-desktop-gnome is &lt;50.0.2661.94-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127129" version="1" comment="chromium-desktop-kde is &lt;50.0.2661.94-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127130" version="1" comment="chromium-ffmpegsumo is &lt;50.0.2661.94-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127156" version="1" comment="MozillaFirefox is &lt;46.0-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127157" version="1" comment="MozillaFirefox-branding-upstream is &lt;46.0-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127158" version="1" comment="MozillaFirefox-buildsymbols is &lt;46.0-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127159" version="1" comment="MozillaFirefox-devel is &lt;46.0-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127160" version="1" comment="MozillaFirefox-translations-common is &lt;46.0-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127161" version="1" comment="MozillaFirefox-translations-other is &lt;46.0-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127162" version="1" comment="libfreebl3 is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127163" version="1" comment="libfreebl3-32bit is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127164" version="1" comment="libsoftokn3 is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127165" version="1" comment="libsoftokn3-32bit is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127166" version="1" comment="mozilla-nss is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127167" version="1" comment="mozilla-nss-32bit is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127168" version="1" comment="mozilla-nss-certs is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127169" version="1" comment="mozilla-nss-certs-32bit is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127170" version="1" comment="mozilla-nss-devel is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127171" version="1" comment="mozilla-nss-sysinit is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127172" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127173" version="1" comment="mozilla-nss-tools is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127221" version="1" comment="jq is &lt;1.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127222" version="1" comment="libjq-devel is &lt;1.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127223" version="1" comment="libjq1 is &lt;1.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127224" version="1" comment="yast2-users is &lt;3.1.41.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127225" version="1" comment="yast2-users-devel-doc is &lt;3.1.41.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127226" version="1" comment="giflib is &lt;5.0.5-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127227" version="1" comment="giflib-devel is &lt;5.0.5-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127228" version="1" comment="giflib-devel-32bit is &lt;5.0.5-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127229" version="1" comment="giflib-progs is &lt;5.0.5-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127230" version="1" comment="libgif6 is &lt;5.0.5-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127231" version="1" comment="libgif6-32bit is &lt;5.0.5-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127194" version="1" comment="wireshark is &lt;1.12.11-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127195" version="1" comment="wireshark-devel is &lt;1.12.11-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127196" version="1" comment="wireshark-ui-gtk is &lt;1.12.11-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127197" version="1" comment="wireshark-ui-qt is &lt;1.12.11-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127232" version="1" comment="libgcrypt is &lt;1.6.1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127233" version="1" comment="libgcrypt-cavs is &lt;1.6.1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127234" version="1" comment="libgcrypt-devel is &lt;1.6.1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127235" version="1" comment="libgcrypt-devel-32bit is &lt;1.6.1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127236" version="1" comment="libgcrypt20 is &lt;1.6.1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127237" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127238" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127239" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127252" version="1" comment="libopenssl-devel is &lt;1.0.1i-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127253" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1i-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127254" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127255" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127256" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127257" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127258" version="1" comment="openssl is &lt;1.0.1i-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127259" version="1" comment="openssl-doc is &lt;1.0.1i-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127248" version="1" comment="libopenssl0_9_8 is &lt;0.9.8zh-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127249" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8zh-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127320" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127321" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127322" version="1" comment="subversion is &lt;1.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127323" version="1" comment="subversion-bash-completion is &lt;1.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127324" version="1" comment="subversion-devel is &lt;1.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127325" version="1" comment="subversion-perl is &lt;1.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127326" version="1" comment="subversion-python is &lt;1.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127327" version="1" comment="subversion-ruby is &lt;1.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127328" version="1" comment="subversion-server is &lt;1.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127329" version="1" comment="subversion-tools is &lt;1.8.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127330" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.91-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127331" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.91-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127332" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.91-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127333" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.91-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127334" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.91-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127335" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.91-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127336" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.91-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127337" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.101-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127338" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.101-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127339" version="1" comment="java-1_7_0-openjdk-bootstrap is &lt;1.7.0.101-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127340" version="1" comment="java-1_7_0-openjdk-bootstrap-devel is &lt;1.7.0.101-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127341" version="1" comment="java-1_7_0-openjdk-bootstrap-headless is &lt;1.7.0.101-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127342" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.101-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127343" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.101-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127344" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.101-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127345" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.101-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127346" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.101-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127347" version="1" comment="ImageMagick is &lt;6.8.8.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127348" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127349" version="1" comment="ImageMagick-devel-32bit is &lt;6.8.8.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127350" version="1" comment="ImageMagick-doc is &lt;6.8.8.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127351" version="1" comment="ImageMagick-extra is &lt;6.8.8.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127352" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127353" version="1" comment="libMagick++-6_Q16-3-32bit is &lt;6.8.8.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127354" version="1" comment="libMagick++-devel is &lt;6.8.8.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127355" version="1" comment="libMagick++-devel-32bit is &lt;6.8.8.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127356" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127357" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127358" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127359" version="1" comment="libMagickWand-6_Q16-1-32bit is &lt;6.8.8.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127360" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127398" version="1" comment="compat-openssl098 is &lt;0.9.8j-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127399" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127400" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127544" version="1" comment="ntp is &lt;4.2.8p6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127545" version="1" comment="ntp-doc is &lt;4.2.8p6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127546" version="1" comment="yast2-ntp-client is &lt;3.1.22-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127547" version="1" comment="yast2-ntp-client-devel-doc is &lt;3.1.22-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127571" version="1" comment="libxml2 is &lt;2.9.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127572" version="1" comment="libxml2-2 is &lt;2.9.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127573" version="1" comment="libxml2-2-32bit is &lt;2.9.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127574" version="1" comment="libxml2-devel is &lt;2.9.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127575" version="1" comment="libxml2-devel-32bit is &lt;2.9.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127576" version="1" comment="libxml2-doc is &lt;2.9.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127577" version="1" comment="libxml2-tools is &lt;2.9.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127578" version="1" comment="python-libxml2 is &lt;2.9.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127581" version="1" comment="chromedriver is &lt;50.0.2661.102-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127582" version="1" comment="chromium is &lt;50.0.2661.102-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127583" version="1" comment="chromium-desktop-gnome is &lt;50.0.2661.102-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127584" version="1" comment="chromium-desktop-kde is &lt;50.0.2661.102-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127585" version="1" comment="chromium-ffmpegsumo is &lt;50.0.2661.102-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127666" version="1" comment="quassel is &lt;0.12.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127667" version="1" comment="quassel-base is &lt;0.12.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127668" version="1" comment="quassel-client is &lt;0.12.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127669" version="1" comment="quassel-core is &lt;0.12.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127670" version="1" comment="quassel-mono is &lt;0.12.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121684" version="1" comment="libmbedtls9 is &lt;1.3.16-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121685" version="1" comment="libmbedtls9-32bit is &lt;1.3.16-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121686" version="1" comment="mbedtls is &lt;1.3.16-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121687" version="1" comment="mbedtls-devel is &lt;1.3.16-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127671" version="1" comment="atheme is &lt;7.2.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127672" version="1" comment="atheme-devel is &lt;7.2.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127673" version="1" comment="libathemecore1 is &lt;7.2.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127674" version="1" comment="quagga is &lt;0.99.24.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127675" version="1" comment="quagga-devel is &lt;0.99.24.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127851" version="1" comment="ntp is &lt;4.2.8p7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127852" version="1" comment="ntp-doc is &lt;4.2.8p7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120973" version="1" comment="MozillaFirefox is &lt;43.0.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120974" version="1" comment="MozillaFirefox-branding-upstream is &lt;43.0.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120975" version="1" comment="MozillaFirefox-buildsymbols is &lt;43.0.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120976" version="1" comment="MozillaFirefox-devel is &lt;43.0.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120977" version="1" comment="MozillaFirefox-translations-common is &lt;43.0.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120978" version="1" comment="MozillaFirefox-translations-other is &lt;43.0.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127752" version="1" comment="cacti is &lt;0.8.8f-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127753" version="1" comment="GraphicsMagick is &lt;1.3.21-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127754" version="1" comment="GraphicsMagick-devel is &lt;1.3.21-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127755" version="1" comment="libGraphicsMagick++-Q16-11 is &lt;1.3.21-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127757" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.21-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127758" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.21-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127759" version="1" comment="libGraphicsMagick3-config is &lt;1.3.21-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127760" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.21-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127761" version="1" comment="perl-GraphicsMagick is &lt;1.3.21-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127762" version="1" comment="proftpd is &lt;1.3.5b-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127763" version="1" comment="proftpd-devel is &lt;1.3.5b-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127764" version="1" comment="proftpd-doc is &lt;1.3.5b-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127765" version="1" comment="proftpd-lang is &lt;1.3.5b-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127766" version="1" comment="proftpd-ldap is &lt;1.3.5b-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127767" version="1" comment="proftpd-mysql is &lt;1.3.5b-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127768" version="1" comment="proftpd-pgsql is &lt;1.3.5b-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127769" version="1" comment="proftpd-radius is &lt;1.3.5b-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127770" version="1" comment="proftpd-sqlite is &lt;1.3.5b-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127853" version="1" comment="go is &lt;1.6.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127854" version="1" comment="go-doc is &lt;1.6.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127794" version="1" comment="libmysql56client18 is &lt;5.6.30-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127795" version="1" comment="libmysql56client18-32bit is &lt;5.6.30-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127796" version="1" comment="libmysql56client_r18 is &lt;5.6.30-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127797" version="1" comment="libmysql56client_r18-32bit is &lt;5.6.30-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127798" version="1" comment="mysql-community-server is &lt;5.6.30-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127799" version="1" comment="mysql-community-server-bench is &lt;5.6.30-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127800" version="1" comment="mysql-community-server-client is &lt;5.6.30-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127801" version="1" comment="mysql-community-server-errormessages is &lt;5.6.30-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127802" version="1" comment="mysql-community-server-test is &lt;5.6.30-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127803" version="1" comment="mysql-community-server-tools is &lt;5.6.30-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127804" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.15-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127805" version="1" comment="gdk-pixbuf-loader-rsvg-32bit is &lt;2.40.15-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127806" version="1" comment="librsvg is &lt;2.40.15-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127807" version="1" comment="librsvg-2-2 is &lt;2.40.15-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127808" version="1" comment="librsvg-2-2-32bit is &lt;2.40.15-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127809" version="1" comment="librsvg-devel is &lt;2.40.15-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127810" version="1" comment="rsvg-view is &lt;2.40.15-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127811" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.40.15-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127812" version="1" comment="mercurial is &lt;3.5.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127813" version="1" comment="mercurial-lang is &lt;3.5.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127954" version="1" comment="apache2-mod_php5 is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127955" version="1" comment="php5 is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127956" version="1" comment="php5-bcmath is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127957" version="1" comment="php5-bz2 is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127958" version="1" comment="php5-calendar is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127959" version="1" comment="php5-ctype is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127960" version="1" comment="php5-curl is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127961" version="1" comment="php5-dba is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127962" version="1" comment="php5-devel is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127963" version="1" comment="php5-dom is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127964" version="1" comment="php5-enchant is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127965" version="1" comment="php5-exif is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127966" version="1" comment="php5-fastcgi is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127967" version="1" comment="php5-fileinfo is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127968" version="1" comment="php5-firebird is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127969" version="1" comment="php5-fpm is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127970" version="1" comment="php5-ftp is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127971" version="1" comment="php5-gd is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127972" version="1" comment="php5-gettext is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127973" version="1" comment="php5-gmp is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127974" version="1" comment="php5-iconv is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127975" version="1" comment="php5-imap is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127976" version="1" comment="php5-intl is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127977" version="1" comment="php5-json is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127978" version="1" comment="php5-ldap is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127979" version="1" comment="php5-mbstring is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127980" version="1" comment="php5-mcrypt is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127981" version="1" comment="php5-mssql is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127982" version="1" comment="php5-mysql is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127983" version="1" comment="php5-odbc is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127984" version="1" comment="php5-opcache is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127985" version="1" comment="php5-openssl is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127986" version="1" comment="php5-pcntl is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127987" version="1" comment="php5-pdo is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127988" version="1" comment="php5-pear is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127989" version="1" comment="php5-pgsql is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127990" version="1" comment="php5-phar is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127991" version="1" comment="php5-posix is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127992" version="1" comment="php5-pspell is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127993" version="1" comment="php5-readline is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127994" version="1" comment="php5-shmop is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127995" version="1" comment="php5-snmp is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127996" version="1" comment="php5-soap is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127997" version="1" comment="php5-sockets is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127998" version="1" comment="php5-sqlite is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127999" version="1" comment="php5-suhosin is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128000" version="1" comment="php5-sysvmsg is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128001" version="1" comment="php5-sysvsem is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128002" version="1" comment="php5-sysvshm is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128003" version="1" comment="php5-tidy is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128004" version="1" comment="php5-tokenizer is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128005" version="1" comment="php5-wddx is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128006" version="1" comment="php5-xmlreader is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128007" version="1" comment="php5-xmlrpc is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128008" version="1" comment="php5-xmlwriter is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128009" version="1" comment="php5-xsl is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128010" version="1" comment="php5-zip is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128011" version="1" comment="php5-zlib is &lt;5.5.14-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128019" version="1" comment="kernel-debug is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128020" version="1" comment="kernel-debug-base is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128021" version="1" comment="kernel-debug-devel is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128022" version="1" comment="kernel-default is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128023" version="1" comment="kernel-default-base is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128024" version="1" comment="kernel-default-devel is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128025" version="1" comment="kernel-devel is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128026" version="1" comment="kernel-docs is &lt;4.1.21-14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128027" version="1" comment="kernel-docs-html is &lt;4.1.21-14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128028" version="1" comment="kernel-docs-pdf is &lt;4.1.21-14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128029" version="1" comment="kernel-ec2 is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128030" version="1" comment="kernel-ec2-base is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128031" version="1" comment="kernel-ec2-devel is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128032" version="1" comment="kernel-macros is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128033" version="1" comment="kernel-obs-build is &lt;4.1.21-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128034" version="1" comment="kernel-obs-qa is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128035" version="1" comment="kernel-obs-qa-xen is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128036" version="1" comment="kernel-pae is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128037" version="1" comment="kernel-pae-base is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128038" version="1" comment="kernel-pae-devel is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128039" version="1" comment="kernel-pv is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128040" version="1" comment="kernel-pv-base is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128041" version="1" comment="kernel-pv-devel is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128042" version="1" comment="kernel-source is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128043" version="1" comment="kernel-source-vanilla is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128044" version="1" comment="kernel-syms is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128045" version="1" comment="kernel-vanilla is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128046" version="1" comment="kernel-vanilla-devel is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128047" version="1" comment="kernel-xen is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128048" version="1" comment="kernel-xen-base is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128049" version="1" comment="kernel-xen-devel is &lt;4.1.21-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128161" version="1" comment="libgudev-1_0-0 is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128162" version="1" comment="libgudev-1_0-0-32bit is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128163" version="1" comment="libgudev-1_0-devel is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128164" version="1" comment="libudev-devel is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128165" version="1" comment="libudev-mini-devel is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128166" version="1" comment="libudev-mini1 is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128167" version="1" comment="libudev1 is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128168" version="1" comment="libudev1-32bit is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128169" version="1" comment="nss-myhostname is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128170" version="1" comment="nss-myhostname-32bit is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128171" version="1" comment="systemd is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128172" version="1" comment="systemd-32bit is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128173" version="1" comment="systemd-bash-completion is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128174" version="1" comment="systemd-devel is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128175" version="1" comment="systemd-journal-gateway is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128176" version="1" comment="systemd-logger is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128177" version="1" comment="systemd-mini is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128178" version="1" comment="systemd-mini-devel is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128179" version="1" comment="systemd-mini-sysvinit is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128180" version="1" comment="systemd-sysvinit is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128181" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128182" version="1" comment="udev is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128183" version="1" comment="udev-mini is &lt;210-92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128184" version="1" comment="chromedriver is &lt;51.0.2704.63-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128185" version="1" comment="chromium is &lt;51.0.2704.63-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128186" version="1" comment="chromium-desktop-gnome is &lt;51.0.2704.63-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128187" version="1" comment="chromium-desktop-kde is &lt;51.0.2704.63-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128188" version="1" comment="chromium-ffmpegsumo is &lt;51.0.2704.63-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128189" version="1" comment="phpMyAdmin is &lt;4.4.15.6-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128299" version="1" comment="redis is &lt;3.0.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128328" version="1" comment="python-virtualbox is &lt;5.0.18-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128329" version="1" comment="virtualbox is &lt;5.0.18-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128330" version="1" comment="virtualbox-devel is &lt;5.0.18-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128331" version="1" comment="virtualbox-guest-desktop-icons is &lt;5.0.18-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128332" version="1" comment="virtualbox-guest-kmp-default is &lt;5.0.18_k4.1.21_14-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128333" version="1" comment="virtualbox-guest-tools is &lt;5.0.18-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128334" version="1" comment="virtualbox-guest-x11 is &lt;5.0.18-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128335" version="1" comment="virtualbox-host-kmp-default is &lt;5.0.18_k4.1.21_14-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128336" version="1" comment="virtualbox-host-source is &lt;5.0.18-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128337" version="1" comment="virtualbox-qt is &lt;5.0.18-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128338" version="1" comment="virtualbox-websrv is &lt;5.0.18-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128326" version="1" comment="putty is &lt;0.67-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128339" version="1" comment="openssh is &lt;6.6p1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128340" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128341" version="1" comment="openssh-cavs is &lt;6.6p1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128342" version="1" comment="openssh-fips is &lt;6.6p1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128343" version="1" comment="openssh-helpers is &lt;6.6p1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128379" version="1" comment="gdk-pixbuf is &lt;2.31.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128380" version="1" comment="gdk-pixbuf-devel is &lt;2.31.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128381" version="1" comment="gdk-pixbuf-devel-32bit is &lt;2.31.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128382" version="1" comment="gdk-pixbuf-lang is &lt;2.31.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128383" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.31.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128384" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.31.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128385" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.31.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128386" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.31.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128387" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.31.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121798" version="1" comment="cups-filters is &lt;1.0.58-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121799" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121800" version="1" comment="cups-filters-devel is &lt;1.0.58-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121801" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121802" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128361" version="1" comment="dosfstools is &lt;3.0.26-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121821" version="1" comment="libxml2-devel-32bit is &lt;2.9.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128489" version="1" comment="clamav-database is &lt;201606060002-105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121925" version="1" comment="cgit is &lt;0.12-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128545" version="1" comment="GraphicsMagick is &lt;1.3.21-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128546" version="1" comment="GraphicsMagick-devel is &lt;1.3.21-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128547" version="1" comment="libGraphicsMagick++-Q16-11 is &lt;1.3.21-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128548" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.21-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128549" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.21-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128550" version="1" comment="libGraphicsMagick3-config is &lt;1.3.21-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128551" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.21-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128552" version="1" comment="perl-GraphicsMagick is &lt;1.3.21-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128553" version="1" comment="libexpat-devel-32bit is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128554" version="1" comment="apache2-mod_php5 is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128555" version="1" comment="php5 is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128556" version="1" comment="php5-bcmath is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128557" version="1" comment="php5-bz2 is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128558" version="1" comment="php5-calendar is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128559" version="1" comment="php5-ctype is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128560" version="1" comment="php5-curl is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128561" version="1" comment="php5-dba is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128562" version="1" comment="php5-devel is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128563" version="1" comment="php5-dom is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128564" version="1" comment="php5-enchant is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128565" version="1" comment="php5-exif is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128566" version="1" comment="php5-fastcgi is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128567" version="1" comment="php5-fileinfo is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128568" version="1" comment="php5-firebird is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128569" version="1" comment="php5-fpm is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128570" version="1" comment="php5-ftp is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128571" version="1" comment="php5-gd is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128572" version="1" comment="php5-gettext is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128573" version="1" comment="php5-gmp is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128574" version="1" comment="php5-iconv is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128575" version="1" comment="php5-imap is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128576" version="1" comment="php5-intl is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128577" version="1" comment="php5-json is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128578" version="1" comment="php5-ldap is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128579" version="1" comment="php5-mbstring is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128580" version="1" comment="php5-mcrypt is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128581" version="1" comment="php5-mssql is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128582" version="1" comment="php5-mysql is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128583" version="1" comment="php5-odbc is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128584" version="1" comment="php5-opcache is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128585" version="1" comment="php5-openssl is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128586" version="1" comment="php5-pcntl is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128587" version="1" comment="php5-pdo is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128588" version="1" comment="php5-pear is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128589" version="1" comment="php5-pgsql is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128590" version="1" comment="php5-phar is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128591" version="1" comment="php5-posix is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128592" version="1" comment="php5-pspell is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128593" version="1" comment="php5-readline is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128594" version="1" comment="php5-shmop is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128595" version="1" comment="php5-snmp is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128596" version="1" comment="php5-soap is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128597" version="1" comment="php5-sockets is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128598" version="1" comment="php5-sqlite is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128599" version="1" comment="php5-suhosin is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128600" version="1" comment="php5-sysvmsg is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128601" version="1" comment="php5-sysvsem is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128602" version="1" comment="php5-sysvshm is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128603" version="1" comment="php5-tidy is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128604" version="1" comment="php5-tokenizer is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128605" version="1" comment="php5-wddx is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128606" version="1" comment="php5-xmlreader is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128607" version="1" comment="php5-xmlrpc is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128608" version="1" comment="php5-xmlwriter is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128609" version="1" comment="php5-xsl is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128610" version="1" comment="php5-zip is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128611" version="1" comment="php5-zlib is &lt;5.5.14-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128612" version="1" comment="libksba is &lt;1.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128613" version="1" comment="libksba-devel is &lt;1.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128614" version="1" comment="libksba8 is &lt;1.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128502" version="1" comment="imobiledevice-tools is &lt;1.2.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128503" version="1" comment="iproxy is &lt;1.0.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128504" version="1" comment="libimobiledevice is &lt;1.2.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128505" version="1" comment="libimobiledevice-devel is &lt;1.2.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128506" version="1" comment="libimobiledevice-doc is &lt;1.2.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128509" version="1" comment="libimobiledevice6 is &lt;1.2.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128510" version="1" comment="libimobiledevice6-32bit is &lt;1.2.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128511" version="1" comment="libusbmuxd is &lt;1.0.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128512" version="1" comment="libusbmuxd-devel is &lt;1.0.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128515" version="1" comment="libusbmuxd4 is &lt;1.0.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128516" version="1" comment="libusbmuxd4-32bit is &lt;1.0.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128517" version="1" comment="python-imobiledevice is &lt;1.2.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121941" version="1" comment="bind is &lt;9.9.6P1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121942" version="1" comment="bind-chrootenv is &lt;9.9.6P1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121943" version="1" comment="bind-devel is &lt;9.9.6P1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121944" version="1" comment="bind-doc is &lt;9.9.6P1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121945" version="1" comment="bind-libs is &lt;9.9.6P1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121946" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121947" version="1" comment="bind-lwresd is &lt;9.9.6P1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121948" version="1" comment="bind-utils is &lt;9.9.6P1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128663" version="1" comment="opera is &lt;38.0.2220.29-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128750" version="1" comment="MozillaFirefox is &lt;47.0-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128751" version="1" comment="MozillaFirefox-branding-upstream is &lt;47.0-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128752" version="1" comment="MozillaFirefox-buildsymbols is &lt;47.0-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128753" version="1" comment="MozillaFirefox-devel is &lt;47.0-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128754" version="1" comment="MozillaFirefox-translations-common is &lt;47.0-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128755" version="1" comment="MozillaFirefox-translations-other is &lt;47.0-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128756" version="1" comment="libfreebl3 is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128757" version="1" comment="libfreebl3-32bit is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128758" version="1" comment="libsoftokn3 is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128759" version="1" comment="libsoftokn3-32bit is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128760" version="1" comment="mozilla-nss is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128761" version="1" comment="mozilla-nss-32bit is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128762" version="1" comment="mozilla-nss-certs is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128763" version="1" comment="mozilla-nss-certs-32bit is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128764" version="1" comment="mozilla-nss-devel is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128765" version="1" comment="mozilla-nss-sysinit is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128766" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128767" version="1" comment="mozilla-nss-tools is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128870" version="1" comment="nodejs is &lt;4.4.5-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128871" version="1" comment="nodejs-devel is &lt;4.4.5-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128873" version="1" comment="nodejs-docs is &lt;4.4.5-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128874" version="1" comment="npm is &lt;4.4.5-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128882" version="1" comment="clamav-database is &lt;201606130003-109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128888" version="1" comment="monit is &lt;5.10-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128889" version="1" comment="monit-doc is &lt;5.10-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128929" version="1" comment="libxml2 is &lt;2.9.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128930" version="1" comment="libxml2-2 is &lt;2.9.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128931" version="1" comment="libxml2-2-32bit is &lt;2.9.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128932" version="1" comment="libxml2-devel is &lt;2.9.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128933" version="1" comment="libxml2-devel-32bit is &lt;2.9.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128934" version="1" comment="libxml2-doc is &lt;2.9.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128935" version="1" comment="libxml2-tools is &lt;2.9.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128936" version="1" comment="python-libxml2 is &lt;2.9.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128990" version="1" comment="wireshark is &lt;1.12.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128991" version="1" comment="wireshark-devel is &lt;1.12.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128992" version="1" comment="wireshark-ui-gtk is &lt;1.12.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128993" version="1" comment="wireshark-ui-qt is &lt;1.12.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129004" version="1" comment="chromedriver is &lt;51.0.2704.103-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129005" version="1" comment="chromium is &lt;51.0.2704.103-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129006" version="1" comment="chromium-desktop-gnome is &lt;51.0.2704.103-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129007" version="1" comment="chromium-desktop-kde is &lt;51.0.2704.103-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129008" version="1" comment="chromium-ffmpegsumo is &lt;51.0.2704.103-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129014" version="1" comment="libpoppler-qt5-1 is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129015" version="1" comment="libpoppler-qt5-devel is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129016" version="1" comment="poppler-qt5 is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129087" version="1" comment="ntp is &lt;4.2.8p8-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129088" version="1" comment="ntp-doc is &lt;4.2.8p8-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129074" version="1" comment="libtorrent-rasterbar is &lt;1.0.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129075" version="1" comment="libtorrent-rasterbar-devel is &lt;1.0.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129076" version="1" comment="libtorrent-rasterbar-doc is &lt;1.0.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129078" version="1" comment="libtorrent-rasterbar8 is &lt;1.0.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129079" version="1" comment="python-libtorrent-rasterbar is &lt;1.0.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129080" version="1" comment="ctdb is &lt;2.5.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129081" version="1" comment="ctdb-devel is &lt;2.5.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129149" version="1" comment="kernel-debug is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129150" version="1" comment="kernel-debug-base is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129151" version="1" comment="kernel-debug-devel is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129152" version="1" comment="kernel-default is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129153" version="1" comment="kernel-default-base is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129154" version="1" comment="kernel-default-devel is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129155" version="1" comment="kernel-devel is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129156" version="1" comment="kernel-docs is &lt;4.1.26-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129157" version="1" comment="kernel-docs-html is &lt;4.1.26-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129158" version="1" comment="kernel-docs-pdf is &lt;4.1.26-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129159" version="1" comment="kernel-ec2 is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129160" version="1" comment="kernel-ec2-base is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129161" version="1" comment="kernel-ec2-devel is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129162" version="1" comment="kernel-macros is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129163" version="1" comment="kernel-obs-build is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129164" version="1" comment="kernel-obs-qa is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129165" version="1" comment="kernel-obs-qa-xen is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129166" version="1" comment="kernel-pae is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129167" version="1" comment="kernel-pae-base is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129168" version="1" comment="kernel-pae-devel is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129169" version="1" comment="kernel-pv is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129170" version="1" comment="kernel-pv-base is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129171" version="1" comment="kernel-pv-devel is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129172" version="1" comment="kernel-source is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129173" version="1" comment="kernel-source-vanilla is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129174" version="1" comment="kernel-syms is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129175" version="1" comment="kernel-vanilla is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129176" version="1" comment="kernel-vanilla-devel is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129177" version="1" comment="kernel-xen is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129178" version="1" comment="kernel-xen-base is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129179" version="1" comment="kernel-xen-devel is &lt;4.1.26-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129194" version="1" comment="libvlc5 is &lt;2.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129195" version="1" comment="libvlccore8 is &lt;2.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129196" version="1" comment="vlc is &lt;2.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129197" version="1" comment="vlc-devel is &lt;2.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129198" version="1" comment="vlc-noX is &lt;2.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129199" version="1" comment="vlc-noX-lang is &lt;2.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129200" version="1" comment="vlc-qt is &lt;2.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129201" version="1" comment="ImageMagick is &lt;6.8.8.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129202" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129203" version="1" comment="ImageMagick-devel-32bit is &lt;6.8.8.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129204" version="1" comment="ImageMagick-doc is &lt;6.8.8.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129205" version="1" comment="ImageMagick-extra is &lt;6.8.8.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129206" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129207" version="1" comment="libMagick++-6_Q16-3-32bit is &lt;6.8.8.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129208" version="1" comment="libMagick++-devel is &lt;6.8.8.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129209" version="1" comment="libMagick++-devel-32bit is &lt;6.8.8.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129210" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129211" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129212" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129213" version="1" comment="libMagickWand-6_Q16-1-32bit is &lt;6.8.8.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129214" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129215" version="1" comment="obs-service-source_validator is &lt;0.6+git20160531.fbfe336-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129229" version="1" comment="bsdtar is &lt;3.1.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129230" version="1" comment="libarchive is &lt;3.1.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129231" version="1" comment="libarchive-devel is &lt;3.1.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129232" version="1" comment="libarchive13 is &lt;3.1.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129233" version="1" comment="libarchive13-32bit is &lt;3.1.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121989" version="1" comment="libvirt is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121990" version="1" comment="libvirt-client is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121991" version="1" comment="libvirt-client-32bit is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121992" version="1" comment="libvirt-daemon is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121993" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121994" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121995" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121996" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121997" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121998" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121999" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122000" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122001" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122002" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122003" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122004" version="1" comment="libvirt-daemon-driver-uml is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122005" version="1" comment="libvirt-daemon-driver-vbox is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122007" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122008" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122009" version="1" comment="libvirt-daemon-uml is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122010" version="1" comment="libvirt-daemon-vbox is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122011" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122012" version="1" comment="libvirt-devel is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122013" version="1" comment="libvirt-devel-32bit is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122014" version="1" comment="libvirt-doc is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122015" version="1" comment="libvirt-lock-sanlock is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122016" version="1" comment="libvirt-login-shell is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129261" version="1" comment="p7zip is &lt;9.20.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129262" version="1" comment="libtasn1 is &lt;3.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129263" version="1" comment="libtasn1-6 is &lt;3.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129264" version="1" comment="libtasn1-6-32bit is &lt;3.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129265" version="1" comment="libtasn1-devel is &lt;3.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129266" version="1" comment="libtasn1-devel-32bit is &lt;3.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129319" version="1" comment="php5-firebird is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129320" version="1" comment="php5-imap is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129321" version="1" comment="php5-mssql is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129322" version="1" comment="php5-phar is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129323" version="1" comment="php5-readline is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129324" version="1" comment="php5-tidy is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129325" version="1" comment="libav is &lt;11.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129326" version="1" comment="libav-tools is &lt;11.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129327" version="1" comment="libavcodec-libav-devel is &lt;11.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129328" version="1" comment="libavcodec-libav56 is &lt;11.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129329" version="1" comment="libavdevice-libav-devel is &lt;11.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129330" version="1" comment="libavdevice-libav55 is &lt;11.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129331" version="1" comment="libavfilter-libav-devel is &lt;11.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129332" version="1" comment="libavfilter-libav5 is &lt;11.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129333" version="1" comment="libavformat-libav-devel is &lt;11.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129334" version="1" comment="libavformat-libav56 is &lt;11.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129335" version="1" comment="libavresample-libav-devel is &lt;11.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129336" version="1" comment="libavresample-libav2 is &lt;11.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129337" version="1" comment="libavutil-libav-devel is &lt;11.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129338" version="1" comment="libavutil-libav54 is &lt;11.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129339" version="1" comment="libswscale-libav-devel is &lt;11.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129340" version="1" comment="libswscale-libav3 is &lt;11.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129341" version="1" comment="mariadb-bench is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129342" version="1" comment="mariadb-test is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120999" version="1" comment="xfsprogs is &lt;3.2.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121000" version="1" comment="xfsprogs-devel is &lt;3.2.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122054" version="1" comment="roundcubemail is &lt;1.1.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129367" version="1" comment="phpMyAdmin is &lt;4.4.15.7-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129704" version="1" comment="kinit is &lt;5.21.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129705" version="1" comment="kinit-32bit is &lt;5.21.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129706" version="1" comment="kinit-devel is &lt;5.21.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129707" version="1" comment="kinit-lang is &lt;5.21.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129708" version="1" comment="gimp is &lt;2.8.16-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129709" version="1" comment="gimp-devel is &lt;2.8.16-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129710" version="1" comment="gimp-help-browser is &lt;2.8.16-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129711" version="1" comment="gimp-lang is &lt;2.8.16-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129712" version="1" comment="gimp-plugin-aa is &lt;2.8.16-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129713" version="1" comment="gimp-plugins-python is &lt;2.8.16-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129714" version="1" comment="libgimp-2_0-0 is &lt;2.8.16-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129715" version="1" comment="libgimp-2_0-0-32bit is &lt;2.8.16-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129716" version="1" comment="libgimpui-2_0-0 is &lt;2.8.16-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129717" version="1" comment="libgimpui-2_0-0-32bit is &lt;2.8.16-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129718" version="1" comment="libspice-server-devel is &lt;0.12.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129719" version="1" comment="libspice-server1 is &lt;0.12.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129720" version="1" comment="spice is &lt;0.12.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129721" version="1" comment="spice-client is &lt;0.12.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129749" version="1" comment="libircclient is &lt;1.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129750" version="1" comment="libircclient-devel is &lt;1.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129751" version="1" comment="libircclient-doc is &lt;1.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129752" version="1" comment="libircclient1 is &lt;1.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129743" version="1" comment="cronic is &lt;3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129834" version="1" comment="qemu is &lt;2.3.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129835" version="1" comment="qemu-arm is &lt;2.3.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129836" version="1" comment="qemu-block-curl is &lt;2.3.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129837" version="1" comment="qemu-block-rbd is &lt;2.3.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129838" version="1" comment="qemu-extra is &lt;2.3.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129839" version="1" comment="qemu-guest-agent is &lt;2.3.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129840" version="1" comment="qemu-ipxe is &lt;1.0.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129841" version="1" comment="qemu-kvm is &lt;2.3.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129842" version="1" comment="qemu-lang is &lt;2.3.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129843" version="1" comment="qemu-linux-user is &lt;2.3.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129844" version="1" comment="qemu-ppc is &lt;2.3.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129845" version="1" comment="qemu-s390 is &lt;2.3.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129846" version="1" comment="qemu-seabios is &lt;1.8.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129847" version="1" comment="qemu-sgabios is &lt;8-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129848" version="1" comment="qemu-testsuite is &lt;2.3.1-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129849" version="1" comment="qemu-tools is &lt;2.3.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129850" version="1" comment="qemu-vgabios is &lt;1.8.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129851" version="1" comment="qemu-x86 is &lt;2.3.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129885" version="1" comment="glibc is &lt;2.19-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129886" version="1" comment="glibc-32bit is &lt;2.19-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129887" version="1" comment="glibc-devel is &lt;2.19-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129888" version="1" comment="glibc-devel-32bit is &lt;2.19-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129889" version="1" comment="glibc-devel-static is &lt;2.19-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129890" version="1" comment="glibc-devel-static-32bit is &lt;2.19-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129891" version="1" comment="glibc-extra is &lt;2.19-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129892" version="1" comment="glibc-html is &lt;2.19-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129893" version="1" comment="glibc-i18ndata is &lt;2.19-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129894" version="1" comment="glibc-info is &lt;2.19-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129895" version="1" comment="glibc-locale is &lt;2.19-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129896" version="1" comment="glibc-locale-32bit is &lt;2.19-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129897" version="1" comment="glibc-obsolete is &lt;2.19-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129898" version="1" comment="glibc-profile is &lt;2.19-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129899" version="1" comment="glibc-profile-32bit is &lt;2.19-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129900" version="1" comment="glibc-testsuite is &lt;2.19-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129901" version="1" comment="glibc-utils is &lt;2.19-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129902" version="1" comment="glibc-utils-32bit is &lt;2.19-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129903" version="1" comment="nscd is &lt;2.19-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130071" version="1" comment="kernel-debug is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130072" version="1" comment="kernel-debug-base is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130073" version="1" comment="kernel-debug-devel is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130074" version="1" comment="kernel-default is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130075" version="1" comment="kernel-default-base is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130076" version="1" comment="kernel-default-devel is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130077" version="1" comment="kernel-devel is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130078" version="1" comment="kernel-docs is &lt;4.1.27-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130079" version="1" comment="kernel-docs-html is &lt;4.1.27-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130080" version="1" comment="kernel-docs-pdf is &lt;4.1.27-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130081" version="1" comment="kernel-ec2 is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130082" version="1" comment="kernel-ec2-base is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130083" version="1" comment="kernel-ec2-devel is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130084" version="1" comment="kernel-macros is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130085" version="1" comment="kernel-obs-build is &lt;4.1.27-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130086" version="1" comment="kernel-obs-qa is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130087" version="1" comment="kernel-obs-qa-xen is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130088" version="1" comment="kernel-pae is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130089" version="1" comment="kernel-pae-base is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130090" version="1" comment="kernel-pae-devel is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130091" version="1" comment="kernel-pv is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130092" version="1" comment="kernel-pv-base is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130093" version="1" comment="kernel-pv-devel is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130094" version="1" comment="kernel-source is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130095" version="1" comment="kernel-source-vanilla is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130096" version="1" comment="kernel-syms is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130097" version="1" comment="kernel-vanilla is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130098" version="1" comment="kernel-vanilla-devel is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130099" version="1" comment="kernel-xen is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130100" version="1" comment="kernel-xen-base is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130101" version="1" comment="kernel-xen-devel is &lt;4.1.27-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130102" version="1" comment="cmis-client is &lt;0.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130103" version="1" comment="hunspell is &lt;1.3.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130104" version="1" comment="hunspell-32bit is &lt;1.3.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130105" version="1" comment="hunspell-devel is &lt;1.3.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130106" version="1" comment="hunspell-devel-32bit is &lt;1.3.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130107" version="1" comment="hunspell-static is &lt;1.3.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130108" version="1" comment="hunspell-tools is &lt;1.3.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130109" version="1" comment="hyphen is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130110" version="1" comment="hyphen-devel is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130111" version="1" comment="libcmis-0_5-5 is &lt;0.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130112" version="1" comment="libcmis-c-0_5-5 is &lt;0.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130113" version="1" comment="libcmis-c-devel is &lt;0.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130114" version="1" comment="libcmis-devel is &lt;0.5.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130115" version="1" comment="libetonyek is &lt;0.1.6-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130116" version="1" comment="libetonyek-0_1-1 is &lt;0.1.6-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130117" version="1" comment="libetonyek-devel is &lt;0.1.6-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130118" version="1" comment="libetonyek-devel-doc is &lt;0.1.6-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130119" version="1" comment="libetonyek-tools is &lt;0.1.6-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130120" version="1" comment="libhyphen0 is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130121" version="1" comment="libhyphen0-32bit is &lt;2.8.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130122" version="1" comment="libixion is &lt;0.11.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130123" version="1" comment="libixion-0_11-0 is &lt;0.11.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130124" version="1" comment="libixion-devel is &lt;0.11.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130125" version="1" comment="libixion-python3 is &lt;0.11.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130126" version="1" comment="libixion-tools is &lt;0.11.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130127" version="1" comment="liborcus is &lt;0.11.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130128" version="1" comment="liborcus-0_11-0 is &lt;0.11.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130129" version="1" comment="liborcus-devel is &lt;0.11.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130130" version="1" comment="liborcus-python3 is &lt;0.11.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130131" version="1" comment="liborcus-tools is &lt;0.11.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130132" version="1" comment="libreoffice is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130133" version="1" comment="libreoffice-base is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130134" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130135" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130136" version="1" comment="libreoffice-branding-upstream is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130137" version="1" comment="libreoffice-calc is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130138" version="1" comment="libreoffice-calc-extensions is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130139" version="1" comment="libreoffice-draw is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130140" version="1" comment="libreoffice-filters-optional is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130141" version="1" comment="libreoffice-gdb-pretty-printers is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130142" version="1" comment="libreoffice-glade is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130143" version="1" comment="libreoffice-gnome is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130144" version="1" comment="libreoffice-gtk3 is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130145" version="1" comment="libreoffice-icon-theme-breeze is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130146" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130147" version="1" comment="libreoffice-icon-theme-hicontrast is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130148" version="1" comment="libreoffice-icon-theme-oxygen is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130149" version="1" comment="libreoffice-icon-theme-sifr is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130150" version="1" comment="libreoffice-icon-theme-tango is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130151" version="1" comment="libreoffice-impress is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130152" version="1" comment="libreoffice-kde4 is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130153" version="1" comment="libreoffice-l10n-af is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130154" version="1" comment="libreoffice-l10n-ar is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130155" version="1" comment="libreoffice-l10n-as is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130156" version="1" comment="libreoffice-l10n-bg is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130157" version="1" comment="libreoffice-l10n-bn is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130158" version="1" comment="libreoffice-l10n-br is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130159" version="1" comment="libreoffice-l10n-ca is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130160" version="1" comment="libreoffice-l10n-cs is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130161" version="1" comment="libreoffice-l10n-cy is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130162" version="1" comment="libreoffice-l10n-da is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130163" version="1" comment="libreoffice-l10n-de is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130164" version="1" comment="libreoffice-l10n-dz is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130165" version="1" comment="libreoffice-l10n-el is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130166" version="1" comment="libreoffice-l10n-en is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130167" version="1" comment="libreoffice-l10n-es is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130168" version="1" comment="libreoffice-l10n-et is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130169" version="1" comment="libreoffice-l10n-eu is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130170" version="1" comment="libreoffice-l10n-fa is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130171" version="1" comment="libreoffice-l10n-fi is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130172" version="1" comment="libreoffice-l10n-fr is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130173" version="1" comment="libreoffice-l10n-ga is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130174" version="1" comment="libreoffice-l10n-gl is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130175" version="1" comment="libreoffice-l10n-gu is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130176" version="1" comment="libreoffice-l10n-he is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130177" version="1" comment="libreoffice-l10n-hi is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130178" version="1" comment="libreoffice-l10n-hr is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130179" version="1" comment="libreoffice-l10n-hu is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130180" version="1" comment="libreoffice-l10n-it is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130181" version="1" comment="libreoffice-l10n-ja is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130182" version="1" comment="libreoffice-l10n-kk is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130183" version="1" comment="libreoffice-l10n-kn is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130184" version="1" comment="libreoffice-l10n-ko is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130185" version="1" comment="libreoffice-l10n-lt is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130186" version="1" comment="libreoffice-l10n-lv is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130187" version="1" comment="libreoffice-l10n-mai is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130188" version="1" comment="libreoffice-l10n-ml is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130189" version="1" comment="libreoffice-l10n-mr is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130190" version="1" comment="libreoffice-l10n-nb is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130191" version="1" comment="libreoffice-l10n-nl is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130192" version="1" comment="libreoffice-l10n-nn is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130193" version="1" comment="libreoffice-l10n-nr is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130194" version="1" comment="libreoffice-l10n-nso is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130195" version="1" comment="libreoffice-l10n-or is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130196" version="1" comment="libreoffice-l10n-pa is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130197" version="1" comment="libreoffice-l10n-pl is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130198" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130199" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130200" version="1" comment="libreoffice-l10n-ro is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130201" version="1" comment="libreoffice-l10n-ru is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130202" version="1" comment="libreoffice-l10n-si is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130203" version="1" comment="libreoffice-l10n-sk is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130204" version="1" comment="libreoffice-l10n-sl is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130205" version="1" comment="libreoffice-l10n-sr is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130206" version="1" comment="libreoffice-l10n-ss is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130207" version="1" comment="libreoffice-l10n-st is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130208" version="1" comment="libreoffice-l10n-sv is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130209" version="1" comment="libreoffice-l10n-ta is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130210" version="1" comment="libreoffice-l10n-te is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130211" version="1" comment="libreoffice-l10n-th is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130212" version="1" comment="libreoffice-l10n-tn is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130213" version="1" comment="libreoffice-l10n-tr is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130214" version="1" comment="libreoffice-l10n-ts is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130215" version="1" comment="libreoffice-l10n-uk is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130216" version="1" comment="libreoffice-l10n-ve is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130217" version="1" comment="libreoffice-l10n-xh is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130218" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130219" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130220" version="1" comment="libreoffice-l10n-zu is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130221" version="1" comment="libreoffice-mailmerge is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130222" version="1" comment="libreoffice-math is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130223" version="1" comment="libreoffice-officebean is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130224" version="1" comment="libreoffice-pyuno is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130225" version="1" comment="libreoffice-sdk is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130226" version="1" comment="libreoffice-sdk-doc is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130227" version="1" comment="libreoffice-writer is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130228" version="1" comment="libreoffice-writer-extensions is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130229" version="1" comment="libreofficekit is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130230" version="1" comment="libreofficekit-devel is &lt;5.1.3.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130231" version="1" comment="libvisio is &lt;0.1.5-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130232" version="1" comment="libvisio-0_1-1 is &lt;0.1.5-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130233" version="1" comment="libvisio-devel is &lt;0.1.5-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130234" version="1" comment="libvisio-devel-doc is &lt;0.1.5-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130235" version="1" comment="libvisio-tools is &lt;0.1.5-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130236" version="1" comment="libwps is &lt;0.4.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130237" version="1" comment="libwps-0_4-4 is &lt;0.4.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130238" version="1" comment="libwps-devel is &lt;0.4.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130239" version="1" comment="libwps-tools is &lt;0.4.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130240" version="1" comment="mdds-1_0 is &lt;1.1.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130241" version="1" comment="mdds-1_0-devel is &lt;1.1.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130242" version="1" comment="myspell-af_NA is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130243" version="1" comment="myspell-af_ZA is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130244" version="1" comment="myspell-an is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130245" version="1" comment="myspell-an_ES is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130246" version="1" comment="myspell-ar is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130247" version="1" comment="myspell-ar_AE is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130248" version="1" comment="myspell-ar_BH is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130249" version="1" comment="myspell-ar_DZ is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130250" version="1" comment="myspell-ar_EG is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130251" version="1" comment="myspell-ar_IQ is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130252" version="1" comment="myspell-ar_JO is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130253" version="1" comment="myspell-ar_KW is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130254" version="1" comment="myspell-ar_LB is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130255" version="1" comment="myspell-ar_LY is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130256" version="1" comment="myspell-ar_MA is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130257" version="1" comment="myspell-ar_OM is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130258" version="1" comment="myspell-ar_QA is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130259" version="1" comment="myspell-ar_SA is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130260" version="1" comment="myspell-ar_SD is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130261" version="1" comment="myspell-ar_SY is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130262" version="1" comment="myspell-ar_TN is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130263" version="1" comment="myspell-ar_YE is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130264" version="1" comment="myspell-be_BY is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130265" version="1" comment="myspell-bg_BG is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130266" version="1" comment="myspell-bn_BD is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130267" version="1" comment="myspell-bn_IN is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130268" version="1" comment="myspell-br_FR is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130269" version="1" comment="myspell-bs is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130270" version="1" comment="myspell-bs_BA is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130271" version="1" comment="myspell-ca is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130272" version="1" comment="myspell-ca_AD is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130273" version="1" comment="myspell-ca_ES is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130274" version="1" comment="myspell-ca_ES_valencia is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130275" version="1" comment="myspell-ca_FR is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130276" version="1" comment="myspell-ca_IT is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130277" version="1" comment="myspell-cs_CZ is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130278" version="1" comment="myspell-da_DK is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130279" version="1" comment="myspell-de is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130280" version="1" comment="myspell-de_AT is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130281" version="1" comment="myspell-de_CH is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130282" version="1" comment="myspell-de_DE is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130283" version="1" comment="myspell-dictionaries is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130284" version="1" comment="myspell-el_GR is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130285" version="1" comment="myspell-en is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130286" version="1" comment="myspell-en_AU is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130287" version="1" comment="myspell-en_BS is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130288" version="1" comment="myspell-en_BZ is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130289" version="1" comment="myspell-en_CA is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130290" version="1" comment="myspell-en_GB is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130291" version="1" comment="myspell-en_GH is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130292" version="1" comment="myspell-en_IE is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130293" version="1" comment="myspell-en_IN is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130294" version="1" comment="myspell-en_JM is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130295" version="1" comment="myspell-en_MW is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130296" version="1" comment="myspell-en_NA is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130297" version="1" comment="myspell-en_NZ is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130298" version="1" comment="myspell-en_PH is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130299" version="1" comment="myspell-en_TT is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130300" version="1" comment="myspell-en_US is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130301" version="1" comment="myspell-en_ZA is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130302" version="1" comment="myspell-en_ZW is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130303" version="1" comment="myspell-es is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130304" version="1" comment="myspell-es_AR is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130305" version="1" comment="myspell-es_BO is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130306" version="1" comment="myspell-es_CL is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130307" version="1" comment="myspell-es_CO is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130308" version="1" comment="myspell-es_CR is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130309" version="1" comment="myspell-es_CU is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130310" version="1" comment="myspell-es_DO is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130311" version="1" comment="myspell-es_EC is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130312" version="1" comment="myspell-es_ES is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130313" version="1" comment="myspell-es_GT is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130314" version="1" comment="myspell-es_HN is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130315" version="1" comment="myspell-es_MX is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130316" version="1" comment="myspell-es_NI is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130317" version="1" comment="myspell-es_PA is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130318" version="1" comment="myspell-es_PE is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130319" version="1" comment="myspell-es_PR is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130320" version="1" comment="myspell-es_PY is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130321" version="1" comment="myspell-es_SV is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130322" version="1" comment="myspell-es_UY is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130323" version="1" comment="myspell-es_VE is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130324" version="1" comment="myspell-et_EE is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130325" version="1" comment="myspell-fr_BE is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130326" version="1" comment="myspell-fr_CA is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130327" version="1" comment="myspell-fr_CH is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130328" version="1" comment="myspell-fr_FR is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130329" version="1" comment="myspell-fr_LU is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130330" version="1" comment="myspell-fr_MC is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130331" version="1" comment="myspell-gd_GB is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130332" version="1" comment="myspell-gl is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130333" version="1" comment="myspell-gl_ES is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130334" version="1" comment="myspell-gu_IN is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130335" version="1" comment="myspell-gug is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130336" version="1" comment="myspell-gug_PY is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130337" version="1" comment="myspell-he_IL is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130338" version="1" comment="myspell-hi_IN is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130339" version="1" comment="myspell-hr_HR is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130340" version="1" comment="myspell-hu_HU is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130341" version="1" comment="myspell-is is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130342" version="1" comment="myspell-is_IS is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130343" version="1" comment="myspell-it_IT is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130344" version="1" comment="myspell-kmr_Latn is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130345" version="1" comment="myspell-kmr_Latn_SY is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130346" version="1" comment="myspell-kmr_Latn_TR is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130347" version="1" comment="myspell-lightproof-en is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130348" version="1" comment="myspell-lightproof-hu_HU is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130349" version="1" comment="myspell-lightproof-pt_BR is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130350" version="1" comment="myspell-lightproof-ru_RU is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130351" version="1" comment="myspell-lo_LA is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130352" version="1" comment="myspell-lt_LT is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130353" version="1" comment="myspell-lv_LV is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130354" version="1" comment="myspell-nb_NO is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130355" version="1" comment="myspell-ne_NP is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130356" version="1" comment="myspell-nl_BE is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130357" version="1" comment="myspell-nl_NL is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130358" version="1" comment="myspell-nn_NO is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130359" version="1" comment="myspell-no is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130360" version="1" comment="myspell-oc_FR is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130361" version="1" comment="myspell-pl_PL is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130362" version="1" comment="myspell-pt_AO is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130363" version="1" comment="myspell-pt_BR is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130364" version="1" comment="myspell-pt_PT is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130365" version="1" comment="myspell-ro is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130366" version="1" comment="myspell-ro_RO is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130367" version="1" comment="myspell-ru_RU is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130368" version="1" comment="myspell-si_LK is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130369" version="1" comment="myspell-sk_SK is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130370" version="1" comment="myspell-sl_SI is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130371" version="1" comment="myspell-sr is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130372" version="1" comment="myspell-sr_CS is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130373" version="1" comment="myspell-sr_Latn_CS is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130374" version="1" comment="myspell-sr_Latn_RS is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130375" version="1" comment="myspell-sr_RS is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130376" version="1" comment="myspell-sv_FI is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130377" version="1" comment="myspell-sv_SE is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130378" version="1" comment="myspell-sw_TZ is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130379" version="1" comment="myspell-te is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130380" version="1" comment="myspell-te_IN is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130381" version="1" comment="myspell-th_TH is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130382" version="1" comment="myspell-uk_UA is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130383" version="1" comment="myspell-vi is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130384" version="1" comment="myspell-vi_VN is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130385" version="1" comment="myspell-zu_ZA is &lt;20160511-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130419" version="1" comment="libvirt is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130420" version="1" comment="libvirt-client is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130421" version="1" comment="libvirt-client-32bit is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130422" version="1" comment="libvirt-daemon is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130423" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130424" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130425" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130426" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130427" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130428" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130429" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130430" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130431" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130432" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130433" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130434" version="1" comment="libvirt-daemon-driver-uml is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130435" version="1" comment="libvirt-daemon-driver-vbox is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130436" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130437" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130438" version="1" comment="libvirt-daemon-uml is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130439" version="1" comment="libvirt-daemon-vbox is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130440" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130441" version="1" comment="libvirt-devel is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130442" version="1" comment="libvirt-devel-32bit is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130443" version="1" comment="libvirt-doc is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130444" version="1" comment="libvirt-lock-sanlock is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130445" version="1" comment="libvirt-login-shell is &lt;1.2.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130467" version="1" comment="apache2 is &lt;2.4.16-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130468" version="1" comment="apache2-devel is &lt;2.4.16-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130469" version="1" comment="apache2-doc is &lt;2.4.16-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130470" version="1" comment="apache2-event is &lt;2.4.16-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130471" version="1" comment="apache2-example-pages is &lt;2.4.16-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130472" version="1" comment="apache2-prefork is &lt;2.4.16-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130473" version="1" comment="apache2-utils is &lt;2.4.16-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130474" version="1" comment="apache2-worker is &lt;2.4.16-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130633" version="1" comment="ImageMagick is &lt;6.8.8.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130634" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130635" version="1" comment="ImageMagick-devel-32bit is &lt;6.8.8.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130636" version="1" comment="ImageMagick-doc is &lt;6.8.8.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130637" version="1" comment="ImageMagick-extra is &lt;6.8.8.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130638" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130639" version="1" comment="libMagick++-6_Q16-3-32bit is &lt;6.8.8.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130640" version="1" comment="libMagick++-devel is &lt;6.8.8.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130641" version="1" comment="libMagick++-devel-32bit is &lt;6.8.8.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130642" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130643" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130644" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130645" version="1" comment="libMagickWand-6_Q16-1-32bit is &lt;6.8.8.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130646" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130626" version="1" comment="nodejs is &lt;4.4.5-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130627" version="1" comment="nodejs-devel is &lt;4.4.5-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130629" version="1" comment="nodejs-docs is &lt;4.4.5-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130630" version="1" comment="npm is &lt;4.4.5-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130648" version="1" comment="dhcp is &lt;4.3.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130649" version="1" comment="dhcp-client is &lt;4.3.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130650" version="1" comment="dhcp-devel is &lt;4.3.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130651" version="1" comment="dhcp-doc is &lt;4.3.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130652" version="1" comment="dhcp-relay is &lt;4.3.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130653" version="1" comment="dhcp-server is &lt;4.3.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130654" version="1" comment="gnugk is &lt;4.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130655" version="1" comment="h323plus is &lt;1.26.5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130656" version="1" comment="h323plus-devel is &lt;1.26.5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130657" version="1" comment="libh323-1_26_5 is &lt;1.26.5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130718" version="1" comment="libmbedtls9 is &lt;1.3.17-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130719" version="1" comment="libmbedtls9-32bit is &lt;1.3.17-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130720" version="1" comment="mbedtls is &lt;1.3.17-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130721" version="1" comment="mbedtls-devel is &lt;1.3.17-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130675" version="1" comment="libpython2_7-1_0 is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130676" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130677" version="1" comment="python is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130678" version="1" comment="python-32bit is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130679" version="1" comment="python-base is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130680" version="1" comment="python-base-32bit is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130681" version="1" comment="python-curses is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130682" version="1" comment="python-demo is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130683" version="1" comment="python-devel is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130684" version="1" comment="python-doc is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130685" version="1" comment="python-doc-pdf is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130686" version="1" comment="python-gdbm is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130687" version="1" comment="python-idle is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130688" version="1" comment="python-tk is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130689" version="1" comment="python-xml is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130697" version="1" comment="dropbear is &lt;2016.74-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130751" version="1" comment="php5-firebird is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130752" version="1" comment="php5-imap is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130753" version="1" comment="php5-mssql is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130754" version="1" comment="php5-readline is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130755" version="1" comment="php5-tidy is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130739" version="1" comment="mupdf is &lt;1.7a-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130740" version="1" comment="mupdf-devel-static is &lt;1.7a-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130796" version="1" comment="MozillaFirefox is &lt;48.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130797" version="1" comment="MozillaFirefox-branding-upstream is &lt;48.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130798" version="1" comment="MozillaFirefox-buildsymbols is &lt;48.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130799" version="1" comment="MozillaFirefox-devel is &lt;48.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130800" version="1" comment="MozillaFirefox-translations-common is &lt;48.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130801" version="1" comment="MozillaFirefox-translations-other is &lt;48.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130802" version="1" comment="libfreebl3 is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130803" version="1" comment="libfreebl3-32bit is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130804" version="1" comment="libsoftokn3 is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130805" version="1" comment="libsoftokn3-32bit is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130806" version="1" comment="mozilla-nss is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130807" version="1" comment="mozilla-nss-32bit is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130808" version="1" comment="mozilla-nss-certs is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130809" version="1" comment="mozilla-nss-certs-32bit is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130810" version="1" comment="mozilla-nss-devel is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130811" version="1" comment="mozilla-nss-sysinit is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130812" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130813" version="1" comment="mozilla-nss-tools is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122081" version="1" comment="ffmpeg is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122082" version="1" comment="ffmpeg-devel is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122083" version="1" comment="libavcodec-devel is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122084" version="1" comment="libavcodec56 is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122085" version="1" comment="libavcodec56-32bit is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122086" version="1" comment="libavdevice-devel is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122087" version="1" comment="libavdevice56 is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122088" version="1" comment="libavdevice56-32bit is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122089" version="1" comment="libavfilter-devel is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122090" version="1" comment="libavfilter5 is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122091" version="1" comment="libavfilter5-32bit is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122092" version="1" comment="libavformat-devel is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122093" version="1" comment="libavformat56 is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122094" version="1" comment="libavformat56-32bit is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122095" version="1" comment="libavresample-devel is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122096" version="1" comment="libavresample2 is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122097" version="1" comment="libavresample2-32bit is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122098" version="1" comment="libavutil-devel is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122099" version="1" comment="libavutil54 is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122100" version="1" comment="libavutil54-32bit is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122101" version="1" comment="libpostproc-devel is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122102" version="1" comment="libpostproc53 is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122103" version="1" comment="libpostproc53-32bit is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122104" version="1" comment="libswresample-devel is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122105" version="1" comment="libswresample1 is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122106" version="1" comment="libswresample1-32bit is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122107" version="1" comment="libswscale-devel is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122108" version="1" comment="libswscale3 is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122109" version="1" comment="libswscale3-32bit is &lt;2.8.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130883" version="1" comment="libvirt is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130884" version="1" comment="libvirt-client is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130885" version="1" comment="libvirt-client-32bit is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130886" version="1" comment="libvirt-daemon is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130887" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130888" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130889" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130890" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130891" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130892" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130893" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130894" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130895" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130896" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130897" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130898" version="1" comment="libvirt-daemon-driver-uml is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130899" version="1" comment="libvirt-daemon-driver-vbox is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130900" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130901" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130902" version="1" comment="libvirt-daemon-uml is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130903" version="1" comment="libvirt-daemon-vbox is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130904" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130905" version="1" comment="libvirt-devel is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130906" version="1" comment="libvirt-devel-32bit is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130907" version="1" comment="libvirt-doc is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130908" version="1" comment="libvirt-lock-sanlock is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130909" version="1" comment="libvirt-login-shell is &lt;1.2.18.4-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130872" version="1" comment="bsdiff is &lt;4.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130873" version="1" comment="wireshark is &lt;1.12.13-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130874" version="1" comment="wireshark-devel is &lt;1.12.13-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130875" version="1" comment="wireshark-ui-gtk is &lt;1.12.13-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130876" version="1" comment="wireshark-ui-qt is &lt;1.12.13-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135156" version="1" comment="libpcre2-16-0 is &lt;10.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135157" version="1" comment="libpcre2-16-0-32bit is &lt;10.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135158" version="1" comment="libpcre2-32-0 is &lt;10.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135159" version="1" comment="libpcre2-32-0-32bit is &lt;10.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135160" version="1" comment="libpcre2-8-0 is &lt;10.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135161" version="1" comment="libpcre2-8-0-32bit is &lt;10.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135162" version="1" comment="libpcre2-posix1 is &lt;10.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135163" version="1" comment="libpcre2-posix1-32bit is &lt;10.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135164" version="1" comment="pcre2 is &lt;10.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135165" version="1" comment="pcre2-devel is &lt;10.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135166" version="1" comment="pcre2-devel-static is &lt;10.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135167" version="1" comment="pcre2-doc is &lt;10.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135168" version="1" comment="pcre2-tools is &lt;10.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135169" version="1" comment="bsdtar is &lt;3.1.2-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135170" version="1" comment="libarchive is &lt;3.1.2-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135171" version="1" comment="libarchive-devel is &lt;3.1.2-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135172" version="1" comment="libarchive13 is &lt;3.1.2-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135173" version="1" comment="libarchive13-32bit is &lt;3.1.2-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135174" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135175" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135176" version="1" comment="sqlite3 is &lt;3.8.10.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135177" version="1" comment="sqlite3-devel is &lt;3.8.10.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135178" version="1" comment="sqlite3-doc is &lt;3.8.10.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135179" version="1" comment="hawk2 is &lt;1.0.1+git.1456406635.49e230d-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135180" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.111-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135181" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.111-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135182" version="1" comment="java-1_7_0-openjdk-bootstrap is &lt;1.7.0.111-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135183" version="1" comment="java-1_7_0-openjdk-bootstrap-devel is &lt;1.7.0.111-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135184" version="1" comment="java-1_7_0-openjdk-bootstrap-headless is &lt;1.7.0.111-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135185" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.111-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135186" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.111-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135187" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.111-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135188" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.111-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135189" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.111-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135190" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.101-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135191" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.101-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135192" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.101-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135193" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.101-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135194" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.101-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135195" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.101-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135196" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.101-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135197" version="1" comment="GraphicsMagick is &lt;1.3.21-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135198" version="1" comment="GraphicsMagick-devel is &lt;1.3.21-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135199" version="1" comment="libGraphicsMagick++-Q16-11 is &lt;1.3.21-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135200" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.21-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135201" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.21-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135202" version="1" comment="libGraphicsMagick3-config is &lt;1.3.21-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135203" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.21-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135204" version="1" comment="perl-GraphicsMagick is &lt;1.3.21-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134096" version="1" comment="harfbuzz is &lt;1.0.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134097" version="1" comment="harfbuzz-devel is &lt;1.0.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134098" version="1" comment="harfbuzz-tools is &lt;1.0.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134099" version="1" comment="libharfbuzz-icu0 is &lt;1.0.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134100" version="1" comment="libharfbuzz-icu0-32bit is &lt;1.0.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134101" version="1" comment="libharfbuzz0 is &lt;1.0.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134102" version="1" comment="libharfbuzz0-32bit is &lt;1.0.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135205" version="1" comment="squid is &lt;3.3.14-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122188" version="1" comment="chromedriver is &lt;48.0.2564.82-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122189" version="1" comment="chromium is &lt;48.0.2564.82-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122190" version="1" comment="chromium-desktop-gnome is &lt;48.0.2564.82-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122191" version="1" comment="chromium-desktop-kde is &lt;48.0.2564.82-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122192" version="1" comment="chromium-ffmpegsumo is &lt;48.0.2564.82-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135206" version="1" comment="roundcubemail is &lt;1.1.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134104" version="1" comment="libpython3_4m1_0 is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134105" version="1" comment="libpython3_4m1_0-32bit is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134106" version="1" comment="python3 is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134107" version="1" comment="python3-32bit is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134108" version="1" comment="python3-base is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134109" version="1" comment="python3-base-32bit is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134110" version="1" comment="python3-curses is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134111" version="1" comment="python3-dbm is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134112" version="1" comment="python3-devel is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134113" version="1" comment="python3-doc is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134114" version="1" comment="python3-doc-pdf is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134115" version="1" comment="python3-idle is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134116" version="1" comment="python3-testsuite is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134117" version="1" comment="python3-tk is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134118" version="1" comment="python3-tools is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146198" version="1" comment="kernel-debug is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146199" version="1" comment="kernel-debug-base is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146200" version="1" comment="kernel-debug-devel is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146201" version="1" comment="kernel-default is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146202" version="1" comment="kernel-default-base is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146203" version="1" comment="kernel-default-devel is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146204" version="1" comment="kernel-devel is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146205" version="1" comment="kernel-docs is &lt;4.1.36-44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146206" version="1" comment="kernel-docs-html is &lt;4.1.36-44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146207" version="1" comment="kernel-docs-pdf is &lt;4.1.36-44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146208" version="1" comment="kernel-ec2 is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146209" version="1" comment="kernel-ec2-base is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146210" version="1" comment="kernel-ec2-devel is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146211" version="1" comment="kernel-macros is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146212" version="1" comment="kernel-obs-build is &lt;4.1.36-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146213" version="1" comment="kernel-obs-qa is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146214" version="1" comment="kernel-pae is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146215" version="1" comment="kernel-pae-base is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146216" version="1" comment="kernel-pae-devel is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146217" version="1" comment="kernel-pv is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146218" version="1" comment="kernel-pv-base is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146219" version="1" comment="kernel-pv-devel is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146220" version="1" comment="kernel-source is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146221" version="1" comment="kernel-source-vanilla is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146222" version="1" comment="kernel-syms is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146223" version="1" comment="kernel-vanilla is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146224" version="1" comment="kernel-vanilla-devel is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146225" version="1" comment="kernel-xen is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146226" version="1" comment="kernel-xen-base is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146227" version="1" comment="kernel-xen-devel is &lt;4.1.36-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146254" version="1" comment="dnsmasq is &lt;2.71-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146255" version="1" comment="dnsmasq-utils is &lt;2.71-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147097" version="1" comment="icinga is &lt;1.14.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147098" version="1" comment="icinga-devel is &lt;1.14.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147099" version="1" comment="icinga-doc is &lt;1.14.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147100" version="1" comment="icinga-idoutils is &lt;1.14.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147101" version="1" comment="icinga-idoutils-mysql is &lt;1.14.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147102" version="1" comment="icinga-idoutils-oracle is &lt;1.14.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147103" version="1" comment="icinga-idoutils-pgsql is &lt;1.14.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147104" version="1" comment="icinga-plugins-downtimes is &lt;1.14.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147105" version="1" comment="icinga-plugins-eventhandlers is &lt;1.14.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147106" version="1" comment="icinga-www is &lt;1.14.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147107" version="1" comment="icinga-www-config is &lt;1.14.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147108" version="1" comment="monitoring-tools is &lt;1.14.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147109" version="1" comment="icoutils is &lt;0.31.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147253" version="1" comment="libpcsclite1 is &lt;1.8.17-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147254" version="1" comment="libpcsclite1-32bit is &lt;1.8.17-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147255" version="1" comment="libpcscspy0 is &lt;1.8.17-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147256" version="1" comment="libpcscspy0-32bit is &lt;1.8.17-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147257" version="1" comment="pcsc-lite is &lt;1.8.17-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147258" version="1" comment="pcsc-lite-devel is &lt;1.8.17-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146320" version="1" comment="ctdb is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146321" version="1" comment="ctdb-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146322" version="1" comment="ctdb-tests is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146323" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146324" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146325" version="1" comment="libdcerpc-atsvc0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146326" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146327" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146328" version="1" comment="libdcerpc-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146329" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146330" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146331" version="1" comment="libdcerpc-samr0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146332" version="1" comment="libdcerpc0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146333" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146334" version="1" comment="libgensec-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146335" version="1" comment="libgensec0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146336" version="1" comment="libgensec0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146337" version="1" comment="libndr-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146338" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146339" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146340" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146341" version="1" comment="libndr-nbt-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146342" version="1" comment="libndr-nbt0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146343" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146344" version="1" comment="libndr-standard-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146345" version="1" comment="libndr-standard0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146346" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146347" version="1" comment="libndr0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146348" version="1" comment="libndr0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146349" version="1" comment="libnetapi-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146350" version="1" comment="libnetapi0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146351" version="1" comment="libnetapi0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146352" version="1" comment="libregistry-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146353" version="1" comment="libregistry0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146354" version="1" comment="libregistry0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146355" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146356" version="1" comment="libsamba-credentials0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146357" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146358" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146359" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146360" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146361" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146362" version="1" comment="libsamba-passdb0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146363" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146364" version="1" comment="libsamba-policy-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146365" version="1" comment="libsamba-policy0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146366" version="1" comment="libsamba-policy0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146367" version="1" comment="libsamba-util-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146368" version="1" comment="libsamba-util0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146369" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146370" version="1" comment="libsamdb-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146371" version="1" comment="libsamdb0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146372" version="1" comment="libsamdb0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146373" version="1" comment="libsmbclient-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146374" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146375" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146376" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146377" version="1" comment="libsmbclient0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146378" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146379" version="1" comment="libsmbconf-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146380" version="1" comment="libsmbconf0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146381" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146382" version="1" comment="libsmbldap-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146383" version="1" comment="libsmbldap0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146384" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146385" version="1" comment="libtevent-util-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146386" version="1" comment="libtevent-util0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146387" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146388" version="1" comment="libwbclient-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146389" version="1" comment="libwbclient0 is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146390" version="1" comment="libwbclient0-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146391" version="1" comment="samba is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146392" version="1" comment="samba-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146393" version="1" comment="samba-client is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146394" version="1" comment="samba-client-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146395" version="1" comment="samba-core-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146396" version="1" comment="samba-doc is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146397" version="1" comment="samba-libs is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146398" version="1" comment="samba-libs-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146399" version="1" comment="samba-pidl is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146400" version="1" comment="samba-python is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146401" version="1" comment="samba-test is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146402" version="1" comment="samba-test-devel is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146403" version="1" comment="samba-winbind is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146404" version="1" comment="samba-winbind-32bit is &lt;4.2.4-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147273" version="1" comment="pdns is &lt;3.4.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147274" version="1" comment="pdns-backend-ldap is &lt;3.4.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147275" version="1" comment="pdns-backend-lua is &lt;3.4.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147276" version="1" comment="pdns-backend-mydns is &lt;3.4.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147277" version="1" comment="pdns-backend-mysql is &lt;3.4.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147278" version="1" comment="pdns-backend-postgresql is &lt;3.4.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147279" version="1" comment="pdns-backend-sqlite3 is &lt;3.4.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147306" version="1" comment="bind is &lt;9.9.9P1-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147307" version="1" comment="bind-chrootenv is &lt;9.9.9P1-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147308" version="1" comment="bind-devel is &lt;9.9.9P1-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147309" version="1" comment="bind-doc is &lt;9.9.9P1-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147310" version="1" comment="bind-libs is &lt;9.9.9P1-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147311" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147312" version="1" comment="bind-lwresd is &lt;9.9.9P1-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147313" version="1" comment="bind-utils is &lt;9.9.9P1-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147388" version="1" comment="libopenjp2-7-32bit is &lt;2.1.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147391" version="1" comment="libgit2 is &lt;0.22.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147392" version="1" comment="libgit2-22 is &lt;0.22.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147393" version="1" comment="libgit2-22-32bit is &lt;0.22.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147394" version="1" comment="libgit2-devel is &lt;0.22.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147395" version="1" comment="squid is &lt;3.3.14-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147396" version="1" comment="pdns-recursor is &lt;3.7.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146405" version="1" comment="libgme is &lt;0.6.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146406" version="1" comment="libgme-devel is &lt;0.6.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146407" version="1" comment="libgme0 is &lt;0.6.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146408" version="1" comment="libgme0-32bit is &lt;0.6.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147467" version="1" comment="perl-DBD-mysql is &lt;4.021-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147468" version="1" comment="xtrabackup is &lt;2.2.12-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147469" version="1" comment="xtrabackup-test is &lt;2.2.12-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146409" version="1" comment="ImageMagick-devel-32bit is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146410" version="1" comment="ImageMagick-doc is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146411" version="1" comment="ImageMagick-extra is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146412" version="1" comment="libMagick++-6_Q16-3-32bit is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146413" version="1" comment="libMagick++-devel-32bit is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146414" version="1" comment="libMagickWand-6_Q16-1-32bit is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147821" version="1" comment="libXvnc-devel is &lt;1.6.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147822" version="1" comment="libXvnc1 is &lt;1.6.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147823" version="1" comment="tigervnc is &lt;1.6.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147824" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147826" version="1" comment="gstreamer-0_10-plugins-bad-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147828" version="1" comment="gstreamer-0_10-plugins-bad-doc is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147835" version="1" comment="libgstcodecparsers-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147866" version="1" comment="gstreamer-0_10-plugin-esd is &lt;0.10.31-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147867" version="1" comment="gstreamer-0_10-plugin-esd-32bit is &lt;0.10.31-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147868" version="1" comment="gstreamer-0_10-plugins-good-32bit is &lt;0.10.31-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147869" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.31-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147870" version="1" comment="gstreamer-0_10-plugins-good-extra is &lt;0.10.31-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147871" version="1" comment="gstreamer-0_10-plugins-good-extra-32bit is &lt;0.10.31-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147883" version="1" comment="gstreamer-0_10-plugin-gnomevfs is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147884" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147955" version="1" comment="python-virtualbox is &lt;5.0.32-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147956" version="1" comment="virtualbox is &lt;5.0.32-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147957" version="1" comment="virtualbox-devel is &lt;5.0.32-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147958" version="1" comment="virtualbox-guest-desktop-icons is &lt;5.0.32-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147959" version="1" comment="virtualbox-guest-kmp-default is &lt;5.0.32_k4.1.36_44-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147960" version="1" comment="virtualbox-guest-tools is &lt;5.0.32-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147961" version="1" comment="virtualbox-guest-x11 is &lt;5.0.32-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147962" version="1" comment="virtualbox-host-kmp-default is &lt;5.0.32_k4.1.36_44-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147963" version="1" comment="virtualbox-host-source is &lt;5.0.32-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147964" version="1" comment="virtualbox-qt is &lt;5.0.32-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147965" version="1" comment="virtualbox-websrv is &lt;5.0.32-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147975" version="1" comment="lcms2 is &lt;2.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147976" version="1" comment="liblcms2-2 is &lt;2.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147977" version="1" comment="liblcms2-2-32bit is &lt;2.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147978" version="1" comment="liblcms2-devel is &lt;2.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147979" version="1" comment="liblcms2-devel-32bit is &lt;2.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147980" version="1" comment="liblcms2-doc is &lt;2.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147981" version="1" comment="containerd is &lt;0.2.5+gitr569_2a5e70c-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147982" version="1" comment="containerd-ctr is &lt;0.2.5+gitr569_2a5e70c-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147983" version="1" comment="containerd-test is &lt;0.2.5+gitr569_2a5e70c-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147984" version="1" comment="docker is &lt;1.12.6-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147985" version="1" comment="docker-bash-completion is &lt;1.12.6-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147986" version="1" comment="docker-test is &lt;1.12.6-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147987" version="1" comment="docker-zsh-completion is &lt;1.12.6-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147988" version="1" comment="runc is &lt;0.1.1+gitr2819_50a19c6-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147989" version="1" comment="runc-test is &lt;0.1.1+gitr2819_50a19c6-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148012" version="1" comment="MozillaFirefox is &lt;51.0.1-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148013" version="1" comment="MozillaFirefox-branding-upstream is &lt;51.0.1-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148014" version="1" comment="MozillaFirefox-buildsymbols is &lt;51.0.1-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148015" version="1" comment="MozillaFirefox-devel is &lt;51.0.1-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148016" version="1" comment="MozillaFirefox-translations-common is &lt;51.0.1-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148017" version="1" comment="MozillaFirefox-translations-other is &lt;51.0.1-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148023" version="1" comment="seamonkey is &lt;2.46-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148024" version="1" comment="seamonkey-translations-common is &lt;2.46-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148025" version="1" comment="seamonkey-translations-other is &lt;2.46-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148027" version="1" comment="bzrtp is &lt;1.0.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148028" version="1" comment="bzrtp-devel is &lt;1.0.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148029" version="1" comment="libbzrtp0 is &lt;1.0.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148030" version="1" comment="libbzrtp0-32bit is &lt;1.0.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148037" version="1" comment="clamav-database is &lt;201701300007-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148038" version="1" comment="mupdf is &lt;1.10a-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148039" version="1" comment="mupdf-devel-static is &lt;1.10a-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148040" version="1" comment="phpMyAdmin is &lt;4.4.15.10-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148072" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.121-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148073" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.121-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148074" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.121-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148075" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.121-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148076" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.121-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148077" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.121-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148078" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.121-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148097" version="1" comment="gnutls is &lt;3.2.15-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148098" version="1" comment="libgnutls-devel is &lt;3.2.15-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148099" version="1" comment="libgnutls-devel-32bit is &lt;3.2.15-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148100" version="1" comment="libgnutls-openssl-devel is &lt;3.2.15-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148101" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148102" version="1" comment="libgnutls28 is &lt;3.2.15-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148103" version="1" comment="libgnutls28-32bit is &lt;3.2.15-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148104" version="1" comment="libgnutlsxx-devel is &lt;3.2.15-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148105" version="1" comment="libgnutlsxx28 is &lt;3.2.15-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148106" version="1" comment="cpio is &lt;2.11-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148107" version="1" comment="cpio-lang is &lt;2.11-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148177" version="1" comment="libgit2 is &lt;0.22.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148178" version="1" comment="libgit2-22 is &lt;0.22.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148179" version="1" comment="libgit2-22-32bit is &lt;0.22.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148180" version="1" comment="libgit2-devel is &lt;0.22.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148181" version="1" comment="GraphicsMagick is &lt;1.3.21-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148182" version="1" comment="GraphicsMagick-devel is &lt;1.3.21-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148183" version="1" comment="libGraphicsMagick++-Q16-11 is &lt;1.3.21-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148184" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.21-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148185" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.21-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148186" version="1" comment="libGraphicsMagick3-config is &lt;1.3.21-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148187" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.21-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148188" version="1" comment="perl-GraphicsMagick is &lt;1.3.21-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148223" version="1" comment="libcrypto36 is &lt;2.3.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148224" version="1" comment="libcrypto36-32bit is &lt;2.3.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148225" version="1" comment="libcrypto37 is &lt;2.3.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148226" version="1" comment="libcrypto37-32bit is &lt;2.3.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148227" version="1" comment="libressl is &lt;2.3.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148228" version="1" comment="libressl-devel is &lt;2.3.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148229" version="1" comment="libressl-devel-32bit is &lt;2.3.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148230" version="1" comment="libressl-devel-doc is &lt;2.3.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148231" version="1" comment="libssl37 is &lt;2.3.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148232" version="1" comment="libssl37-32bit is &lt;2.3.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148233" version="1" comment="libssl38 is &lt;2.3.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148234" version="1" comment="libssl38-32bit is &lt;2.3.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148235" version="1" comment="libtls10 is &lt;2.3.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148236" version="1" comment="libtls10-32bit is &lt;2.3.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148237" version="1" comment="libtls9 is &lt;2.3.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148238" version="1" comment="libtls9-32bit is &lt;2.3.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148253" version="1" comment="libspice-server-devel is &lt;0.12.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148254" version="1" comment="libspice-server1 is &lt;0.12.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148255" version="1" comment="spice is &lt;0.12.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148256" version="1" comment="spice-client is &lt;0.12.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148296" version="1" comment="libplist is &lt;1.12-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148297" version="1" comment="libplist++-devel is &lt;1.12-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148298" version="1" comment="libplist++3 is &lt;1.12-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148299" version="1" comment="libplist++3-32bit is &lt;1.12-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148300" version="1" comment="libplist-devel is &lt;1.12-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148301" version="1" comment="libplist3 is &lt;1.12-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148302" version="1" comment="libplist3-32bit is &lt;1.12-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148303" version="1" comment="plistutil is &lt;1.12-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148304" version="1" comment="python-plist is &lt;1.12-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148305" version="1" comment="opera is &lt;43.0.2442.806-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148325" version="1" comment="irssi is &lt;1.0.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148326" version="1" comment="irssi-devel is &lt;1.0.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148327" version="1" comment="libXvnc-devel is &lt;1.6.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148328" version="1" comment="libXvnc1 is &lt;1.6.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148329" version="1" comment="tigervnc is &lt;1.6.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148330" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148345" version="1" comment="kernel-debug is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148346" version="1" comment="kernel-debug-base is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148347" version="1" comment="kernel-debug-devel is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148348" version="1" comment="kernel-default is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148349" version="1" comment="kernel-default-base is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148350" version="1" comment="kernel-default-devel is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148351" version="1" comment="kernel-devel is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148352" version="1" comment="kernel-docs is &lt;4.1.38-47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148353" version="1" comment="kernel-docs-html is &lt;4.1.38-47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148354" version="1" comment="kernel-docs-pdf is &lt;4.1.38-47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148355" version="1" comment="kernel-ec2 is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148356" version="1" comment="kernel-ec2-base is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148357" version="1" comment="kernel-ec2-devel is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148358" version="1" comment="kernel-macros is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148359" version="1" comment="kernel-obs-build is &lt;4.1.38-47.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148360" version="1" comment="kernel-obs-qa is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148361" version="1" comment="kernel-pae is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148362" version="1" comment="kernel-pae-base is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148363" version="1" comment="kernel-pae-devel is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148364" version="1" comment="kernel-pv is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148365" version="1" comment="kernel-pv-base is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148366" version="1" comment="kernel-pv-devel is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148367" version="1" comment="kernel-source is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148368" version="1" comment="kernel-source-vanilla is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148369" version="1" comment="kernel-syms is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148370" version="1" comment="kernel-vanilla is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148371" version="1" comment="kernel-vanilla-devel is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148372" version="1" comment="kernel-xen is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148373" version="1" comment="kernel-xen-base is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148374" version="1" comment="kernel-xen-devel is &lt;4.1.38-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148476" version="1" comment="libopenssl-devel is &lt;1.0.1i-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148477" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1i-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148478" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148479" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148480" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148481" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148482" version="1" comment="openssl is &lt;1.0.1i-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148483" version="1" comment="openssl-doc is &lt;1.0.1i-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148484" version="1" comment="libmysqlclient-devel is &lt;10.0.29-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148485" version="1" comment="libmysqlclient18 is &lt;10.0.29-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148486" version="1" comment="libmysqlclient18-32bit is &lt;10.0.29-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148487" version="1" comment="libmysqlclient_r18 is &lt;10.0.29-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148488" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.29-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148489" version="1" comment="libmysqld-devel is &lt;10.0.29-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148490" version="1" comment="libmysqld18 is &lt;10.0.29-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148491" version="1" comment="mariadb is &lt;10.0.29-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148492" version="1" comment="mariadb-bench is &lt;10.0.29-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148493" version="1" comment="mariadb-client is &lt;10.0.29-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148494" version="1" comment="mariadb-errormessages is &lt;10.0.29-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148495" version="1" comment="mariadb-test is &lt;10.0.29-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148496" version="1" comment="mariadb-tools is &lt;10.0.29-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148497" version="1" comment="libmysql56client18 is &lt;5.6.35-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148498" version="1" comment="libmysql56client18-32bit is &lt;5.6.35-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148499" version="1" comment="libmysql56client_r18 is &lt;5.6.35-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148500" version="1" comment="libmysql56client_r18-32bit is &lt;5.6.35-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148501" version="1" comment="mysql-community-server is &lt;5.6.35-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148502" version="1" comment="mysql-community-server-bench is &lt;5.6.35-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148503" version="1" comment="mysql-community-server-client is &lt;5.6.35-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148504" version="1" comment="mysql-community-server-errormessages is &lt;5.6.35-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148505" version="1" comment="mysql-community-server-test is &lt;5.6.35-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148506" version="1" comment="mysql-community-server-tools is &lt;5.6.35-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148507" version="1" comment="guile is &lt;2.0.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148508" version="1" comment="guile-devel is &lt;2.0.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148509" version="1" comment="guile-modules-2_0 is &lt;2.0.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148510" version="1" comment="libguile-2_0-22 is &lt;2.0.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148511" version="1" comment="libguilereadline-v-18-18 is &lt;2.0.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148512" version="1" comment="expat is &lt;2.1.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148513" version="1" comment="libexpat-devel is &lt;2.1.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148514" version="1" comment="libexpat-devel-32bit is &lt;2.1.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148515" version="1" comment="libexpat1 is &lt;2.1.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148516" version="1" comment="libexpat1-32bit is &lt;2.1.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148517" version="1" comment="postfixadmin is &lt;3.0.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148570" version="1" comment="mupdf is &lt;1.10a-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148571" version="1" comment="mupdf-devel-static is &lt;1.10a-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148572" version="1" comment="chromedriver is &lt;56.0.2924.87-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148573" version="1" comment="chromium is &lt;56.0.2924.87-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148574" version="1" comment="ffmpeg3 is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148575" version="1" comment="harfbuzz is &lt;1.4.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148576" version="1" comment="harfbuzz-devel is &lt;1.4.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148577" version="1" comment="harfbuzz-tools is &lt;1.4.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148578" version="1" comment="libavcodec-devel is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148579" version="1" comment="libavcodec57 is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148580" version="1" comment="libavcodec57-32bit is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148581" version="1" comment="libavdevice-devel is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148582" version="1" comment="libavdevice57 is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148583" version="1" comment="libavdevice57-32bit is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148584" version="1" comment="libavfilter-devel is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148585" version="1" comment="libavfilter6 is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148586" version="1" comment="libavfilter6-32bit is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148587" version="1" comment="libavformat-devel is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148588" version="1" comment="libavformat57 is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148589" version="1" comment="libavformat57-32bit is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148590" version="1" comment="libavresample-devel is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148591" version="1" comment="libavresample3 is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148592" version="1" comment="libavresample3-32bit is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148593" version="1" comment="libavutil-devel is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148594" version="1" comment="libavutil55 is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148595" version="1" comment="libavutil55-32bit is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148596" version="1" comment="libharfbuzz-icu0 is &lt;1.4.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148597" version="1" comment="libharfbuzz-icu0-32bit is &lt;1.4.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148598" version="1" comment="libharfbuzz0 is &lt;1.4.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148599" version="1" comment="libharfbuzz0-32bit is &lt;1.4.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148600" version="1" comment="libpostproc-devel is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148601" version="1" comment="libpostproc54 is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148602" version="1" comment="libpostproc54-32bit is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148603" version="1" comment="libswresample-devel is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148604" version="1" comment="libswresample2 is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148605" version="1" comment="libswresample2-32bit is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148606" version="1" comment="libswscale-devel is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148607" version="1" comment="libswscale4 is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148608" version="1" comment="libswscale4-32bit is &lt;3.2.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148609" version="1" comment="viewvc is &lt;1.1.26-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148610" version="1" comment="libvmtools-devel is &lt;10.1.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148611" version="1" comment="libvmtools0 is &lt;10.1.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148612" version="1" comment="open-vm-tools is &lt;10.1.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148613" version="1" comment="open-vm-tools-desktop is &lt;10.1.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148614" version="1" comment="libopus-devel is &lt;1.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148615" version="1" comment="libopus-devel-static is &lt;1.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148616" version="1" comment="libopus0 is &lt;1.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148617" version="1" comment="libopus0-32bit is &lt;1.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148618" version="1" comment="opus is &lt;1.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148627" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.131-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148628" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.131-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148629" version="1" comment="java-1_7_0-openjdk-bootstrap is &lt;1.7.0.131-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148630" version="1" comment="java-1_7_0-openjdk-bootstrap-devel is &lt;1.7.0.131-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148631" version="1" comment="java-1_7_0-openjdk-bootstrap-headless is &lt;1.7.0.131-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148632" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.131-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148633" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.131-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148634" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.131-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148635" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.131-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148636" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.131-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148637" version="1" comment="firebird is &lt;2.5.6.27020-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148638" version="1" comment="firebird-32bit is &lt;2.5.6.27020-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148639" version="1" comment="firebird-classic is &lt;2.5.6.27020-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148640" version="1" comment="firebird-devel is &lt;2.5.6.27020-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148641" version="1" comment="firebird-doc is &lt;2.5.6.27020-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148642" version="1" comment="firebird-superserver is &lt;2.5.6.27020-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148643" version="1" comment="libfbclient2 is &lt;2.5.6.27020-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148644" version="1" comment="libfbclient2-32bit is &lt;2.5.6.27020-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148645" version="1" comment="libfbclient2-devel is &lt;2.5.6.27020-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148646" version="1" comment="libfbembed-devel is &lt;2.5.6.27020-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148647" version="1" comment="libfbembed2_5 is &lt;2.5.6.27020-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148648" version="1" comment="libfbembed2_5-32bit is &lt;2.5.6.27020-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148649" version="1" comment="gvim is &lt;7.4.326-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148650" version="1" comment="vim is &lt;7.4.326-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148651" version="1" comment="vim-data is &lt;7.4.326-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148652" version="1" comment="libtiff-devel is &lt;4.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148653" version="1" comment="libtiff-devel-32bit is &lt;4.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148654" version="1" comment="libtiff5 is &lt;4.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148655" version="1" comment="libtiff5-32bit is &lt;4.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148656" version="1" comment="tiff is &lt;4.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148685" version="1" comment="libplist is &lt;1.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148686" version="1" comment="libplist++-devel is &lt;1.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148687" version="1" comment="libplist++3 is &lt;1.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148688" version="1" comment="libplist++3-32bit is &lt;1.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148689" version="1" comment="libplist-devel is &lt;1.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148690" version="1" comment="libplist3 is &lt;1.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148691" version="1" comment="libplist3-32bit is &lt;1.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148692" version="1" comment="plistutil is &lt;1.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148693" version="1" comment="python-plist is &lt;1.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148694" version="1" comment="nodejs is &lt;4.7.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148695" version="1" comment="nodejs-devel is &lt;4.7.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148696" version="1" comment="nodejs-docs is &lt;4.7.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148697" version="1" comment="npm is &lt;4.7.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148762" version="1" comment="profanity is &lt;0.5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148763" version="1" comment="profanity-mini is &lt;0.5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148764" version="1" comment="profanity-standard is &lt;0.5.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148765" version="1" comment="kernel-debug is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148766" version="1" comment="kernel-debug-base is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148767" version="1" comment="kernel-debug-devel is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148768" version="1" comment="kernel-default is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148769" version="1" comment="kernel-default-base is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148770" version="1" comment="kernel-default-devel is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148771" version="1" comment="kernel-devel is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148772" version="1" comment="kernel-docs is &lt;4.1.38-50.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148773" version="1" comment="kernel-docs-html is &lt;4.1.38-50.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148774" version="1" comment="kernel-docs-pdf is &lt;4.1.38-50.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148775" version="1" comment="kernel-ec2 is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148776" version="1" comment="kernel-ec2-base is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148777" version="1" comment="kernel-ec2-devel is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148778" version="1" comment="kernel-macros is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148779" version="1" comment="kernel-obs-build is &lt;4.1.38-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148780" version="1" comment="kernel-obs-qa is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148781" version="1" comment="kernel-pae is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148782" version="1" comment="kernel-pae-base is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148783" version="1" comment="kernel-pae-devel is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148784" version="1" comment="kernel-pv is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148785" version="1" comment="kernel-pv-base is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148786" version="1" comment="kernel-pv-devel is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148787" version="1" comment="kernel-source is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148788" version="1" comment="kernel-source-vanilla is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148789" version="1" comment="kernel-syms is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148790" version="1" comment="kernel-vanilla is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148791" version="1" comment="kernel-vanilla-devel is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148792" version="1" comment="kernel-xen is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148793" version="1" comment="kernel-xen-base is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148794" version="1" comment="kernel-xen-devel is &lt;4.1.38-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148795" version="1" comment="libquicktime is &lt;1.2.4cvs20150223-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148796" version="1" comment="libquicktime-devel is &lt;1.2.4cvs20150223-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148797" version="1" comment="libquicktime-tools is &lt;1.2.4cvs20150223-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148798" version="1" comment="libquicktime0 is &lt;1.2.4cvs20150223-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148799" version="1" comment="libquicktime0-32bit is &lt;1.2.4cvs20150223-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146236" version="1" comment="gd is &lt;2.1.0-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146237" version="1" comment="gd-32bit is &lt;2.1.0-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146238" version="1" comment="gd-devel is &lt;2.1.0-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146590" version="1" comment="syncthing is &lt;0.14.16-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146591" version="1" comment="syncthing-gtk is &lt;0.9.2.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146592" version="1" comment="syncthing-gtk-lang is &lt;0.9.2.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148927" version="1" comment="libXpm is &lt;3.5.11-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148928" version="1" comment="libXpm-devel is &lt;3.5.11-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148929" version="1" comment="libXpm-devel-32bit is &lt;3.5.11-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148930" version="1" comment="libXpm-tools is &lt;3.5.11-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148931" version="1" comment="libXpm4 is &lt;3.5.11-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148932" version="1" comment="libXpm4-32bit is &lt;3.5.11-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149034" version="1" comment="gstreamer-plugins-base is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149035" version="1" comment="gstreamer-plugins-base-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149036" version="1" comment="gstreamer-plugins-base-devel is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149037" version="1" comment="gstreamer-plugins-base-doc is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149038" version="1" comment="gstreamer-plugins-base-lang is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149039" version="1" comment="libgstallocators-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149040" version="1" comment="libgstallocators-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149041" version="1" comment="libgstapp-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149042" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149043" version="1" comment="libgstaudio-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149044" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149045" version="1" comment="libgstfft-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149046" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149047" version="1" comment="libgstpbutils-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149048" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149049" version="1" comment="libgstriff-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149050" version="1" comment="libgstriff-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149051" version="1" comment="libgstrtp-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149052" version="1" comment="libgstrtp-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149053" version="1" comment="libgstrtsp-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149054" version="1" comment="libgstrtsp-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149055" version="1" comment="libgstsdp-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149056" version="1" comment="libgstsdp-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149057" version="1" comment="libgsttag-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149058" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149059" version="1" comment="libgstvideo-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149060" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149061" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149062" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149063" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149064" version="1" comment="typelib-1_0-GstFft-1_0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149065" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149066" version="1" comment="typelib-1_0-GstRiff-1_0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149067" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149068" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149069" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149070" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149071" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149072" version="1" comment="gstreamer is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149073" version="1" comment="gstreamer-32bit is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149074" version="1" comment="gstreamer-devel is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149075" version="1" comment="gstreamer-doc is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149076" version="1" comment="gstreamer-lang is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149077" version="1" comment="gstreamer-utils is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149078" version="1" comment="libgstreamer-1_0-0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149079" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149080" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149144" version="1" comment="ImageMagick is &lt;6.8.8.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149145" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149146" version="1" comment="ImageMagick-devel-32bit is &lt;6.8.8.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149147" version="1" comment="ImageMagick-doc is &lt;6.8.8.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149148" version="1" comment="ImageMagick-extra is &lt;6.8.8.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149149" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149150" version="1" comment="libMagick++-6_Q16-3-32bit is &lt;6.8.8.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149151" version="1" comment="libMagick++-devel is &lt;6.8.8.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149152" version="1" comment="libMagick++-devel-32bit is &lt;6.8.8.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149153" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149154" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149155" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149156" version="1" comment="libMagickWand-6_Q16-1-32bit is &lt;6.8.8.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149157" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149158" version="1" comment="libblkid-devel is &lt;2.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149159" version="1" comment="libblkid-devel-32bit is &lt;2.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149160" version="1" comment="libblkid1 is &lt;2.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149161" version="1" comment="libblkid1-32bit is &lt;2.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149162" version="1" comment="libmount-devel is &lt;2.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149163" version="1" comment="libmount-devel-32bit is &lt;2.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149164" version="1" comment="libmount1 is &lt;2.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149165" version="1" comment="libmount1-32bit is &lt;2.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149166" version="1" comment="libsmartcols-devel is &lt;2.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149167" version="1" comment="libsmartcols1 is &lt;2.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149168" version="1" comment="libuuid-devel is &lt;2.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149169" version="1" comment="libuuid-devel-32bit is &lt;2.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149170" version="1" comment="libuuid1 is &lt;2.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149171" version="1" comment="libuuid1-32bit is &lt;2.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149172" version="1" comment="python-libmount is &lt;2.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149173" version="1" comment="util-linux is &lt;2.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149174" version="1" comment="util-linux-lang is &lt;2.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149175" version="1" comment="util-linux-systemd is &lt;2.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149176" version="1" comment="uuidd is &lt;2.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149177" version="1" comment="apache2-mod_php5 is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149178" version="1" comment="php5 is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149179" version="1" comment="php5-bcmath is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149180" version="1" comment="php5-bz2 is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149181" version="1" comment="php5-calendar is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149182" version="1" comment="php5-ctype is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149183" version="1" comment="php5-curl is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149184" version="1" comment="php5-dba is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149185" version="1" comment="php5-devel is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149186" version="1" comment="php5-dom is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149187" version="1" comment="php5-enchant is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149188" version="1" comment="php5-exif is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149189" version="1" comment="php5-fastcgi is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149190" version="1" comment="php5-fileinfo is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149191" version="1" comment="php5-firebird is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149192" version="1" comment="php5-fpm is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149193" version="1" comment="php5-ftp is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149194" version="1" comment="php5-gd is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149195" version="1" comment="php5-gettext is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149196" version="1" comment="php5-gmp is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149197" version="1" comment="php5-iconv is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149198" version="1" comment="php5-imap is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149199" version="1" comment="php5-intl is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149200" version="1" comment="php5-json is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149201" version="1" comment="php5-ldap is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149202" version="1" comment="php5-mbstring is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149203" version="1" comment="php5-mcrypt is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149204" version="1" comment="php5-mssql is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149205" version="1" comment="php5-mysql is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149206" version="1" comment="php5-odbc is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149207" version="1" comment="php5-opcache is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149208" version="1" comment="php5-openssl is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149209" version="1" comment="php5-pcntl is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149210" version="1" comment="php5-pdo is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149211" version="1" comment="php5-pear is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149212" version="1" comment="php5-pgsql is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149213" version="1" comment="php5-phar is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149214" version="1" comment="php5-posix is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149215" version="1" comment="php5-pspell is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149216" version="1" comment="php5-readline is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149217" version="1" comment="php5-shmop is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149218" version="1" comment="php5-snmp is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149219" version="1" comment="php5-soap is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149220" version="1" comment="php5-sockets is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149221" version="1" comment="php5-sqlite is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149222" version="1" comment="php5-suhosin is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149223" version="1" comment="php5-sysvmsg is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149224" version="1" comment="php5-sysvsem is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149225" version="1" comment="php5-sysvshm is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149226" version="1" comment="php5-tidy is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149227" version="1" comment="php5-tokenizer is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149228" version="1" comment="php5-wddx is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149229" version="1" comment="php5-xmlreader is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149230" version="1" comment="php5-xmlrpc is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149231" version="1" comment="php5-xmlwriter is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149232" version="1" comment="php5-xsl is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149233" version="1" comment="php5-zip is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149234" version="1" comment="php5-zlib is &lt;5.5.14-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149235" version="1" comment="munin is &lt;2.0.25-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149236" version="1" comment="munin-node is &lt;2.0.25-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149237" version="1" comment="bind-lwresd is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149440" version="1" comment="sane-backends is &lt;1.0.24-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149441" version="1" comment="sane-backends-32bit is &lt;1.0.24-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149442" version="1" comment="sane-backends-autoconfig is &lt;1.0.24-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149443" version="1" comment="sane-backends-devel is &lt;1.0.24-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149444" version="1" comment="libpotrace0 is &lt;1.14-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149445" version="1" comment="potrace is &lt;1.14-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149446" version="1" comment="potrace-devel is &lt;1.14-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149462" version="1" comment="cacti is &lt;1.0.4-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149463" version="1" comment="cacti-doc is &lt;1.0.4-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149464" version="1" comment="perl-Image-Info is &lt;1.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149465" version="1" comment="bitlbee is &lt;3.4.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149466" version="1" comment="bitlbee-devel is &lt;3.4.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149467" version="1" comment="bitlbee-doc is &lt;3.4.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149468" version="1" comment="lynx is &lt;2.8.7-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149484" version="1" comment="pax-utils is &lt;1.2.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149506" version="1" comment="openssh is &lt;6.6p1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149507" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149508" version="1" comment="openssh-cavs is &lt;6.6p1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149509" version="1" comment="openssh-fips is &lt;6.6p1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149510" version="1" comment="openssh-helpers is &lt;6.6p1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149532" version="1" comment="MozillaFirefox is &lt;52.0-55.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149533" version="1" comment="MozillaFirefox-branding-upstream is &lt;52.0-55.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149534" version="1" comment="MozillaFirefox-buildsymbols is &lt;52.0-55.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149535" version="1" comment="MozillaFirefox-devel is &lt;52.0-55.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149536" version="1" comment="MozillaFirefox-translations-common is &lt;52.0-55.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149537" version="1" comment="MozillaFirefox-translations-other is &lt;52.0-55.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149538" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.121-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149539" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.121-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149540" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.121-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149541" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.121-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149542" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.121-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149543" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.121-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149544" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.121-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149545" version="1" comment="libfreebl3 is &lt;3.28.3-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149546" version="1" comment="libfreebl3-32bit is &lt;3.28.3-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149547" version="1" comment="libsoftokn3 is &lt;3.28.3-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149548" version="1" comment="libsoftokn3-32bit is &lt;3.28.3-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149549" version="1" comment="mozilla-nss is &lt;3.28.3-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149550" version="1" comment="mozilla-nss-32bit is &lt;3.28.3-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149551" version="1" comment="mozilla-nss-certs is &lt;3.28.3-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149552" version="1" comment="mozilla-nss-certs-32bit is &lt;3.28.3-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149553" version="1" comment="mozilla-nss-devel is &lt;3.28.3-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149554" version="1" comment="mozilla-nss-sysinit is &lt;3.28.3-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149555" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.28.3-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149556" version="1" comment="mozilla-nss-tools is &lt;3.28.3-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149589" version="1" comment="dracut is &lt;037-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149590" version="1" comment="dracut-fips is &lt;037-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149686" version="1" comment="putty is &lt;0.68-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149687" version="1" comment="roundcubemail is &lt;1.1.8-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149800" version="1" comment="MozillaFirefox is &lt;52.0.1-57.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149801" version="1" comment="MozillaFirefox-branding-upstream is &lt;52.0.1-57.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149802" version="1" comment="MozillaFirefox-buildsymbols is &lt;52.0.1-57.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149803" version="1" comment="MozillaFirefox-devel is &lt;52.0.1-57.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149804" version="1" comment="MozillaFirefox-translations-common is &lt;52.0.1-57.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149805" version="1" comment="MozillaFirefox-translations-other is &lt;52.0.1-57.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149839" version="1" comment="libmxml1 is &lt;2.9-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149840" version="1" comment="libmxml1-32bit is &lt;2.9-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149841" version="1" comment="mxml is &lt;2.9-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149842" version="1" comment="mxml-devel is &lt;2.9-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149843" version="1" comment="qbittorrent is &lt;3.3.11-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149844" version="1" comment="qbittorrent-nox is &lt;3.3.11-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149845" version="1" comment="dbus-1 is &lt;1.8.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149846" version="1" comment="dbus-1-devel is &lt;1.8.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149847" version="1" comment="dbus-1-devel-32bit is &lt;1.8.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149848" version="1" comment="dbus-1-devel-doc is &lt;1.8.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149849" version="1" comment="dbus-1-x11 is &lt;1.8.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149850" version="1" comment="libdbus-1-3 is &lt;1.8.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149851" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149852" version="1" comment="partclone is &lt;0.3.5a-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149853" version="1" comment="partclone-lang is &lt;0.3.5a-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146228" version="1" comment="xen is &lt;4.5.5_06-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146229" version="1" comment="xen-devel is &lt;4.5.5_06-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146230" version="1" comment="xen-doc-html is &lt;4.5.5_06-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146231" version="1" comment="xen-kmp-default is &lt;4.5.5_06_k4.1.36_41-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146232" version="1" comment="xen-libs is &lt;4.5.5_06-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146233" version="1" comment="xen-libs-32bit is &lt;4.5.5_06-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146234" version="1" comment="xen-tools is &lt;4.5.5_06-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146235" version="1" comment="xen-tools-domU is &lt;4.5.5_06-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150331" version="1" comment="apache2-mod_php5 is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150332" version="1" comment="php5 is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150333" version="1" comment="php5-bcmath is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150334" version="1" comment="php5-bz2 is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150335" version="1" comment="php5-calendar is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150336" version="1" comment="php5-ctype is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150337" version="1" comment="php5-curl is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150338" version="1" comment="php5-dba is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150339" version="1" comment="php5-devel is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150340" version="1" comment="php5-dom is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150341" version="1" comment="php5-enchant is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150342" version="1" comment="php5-exif is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150343" version="1" comment="php5-fastcgi is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150344" version="1" comment="php5-fileinfo is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150345" version="1" comment="php5-firebird is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150346" version="1" comment="php5-fpm is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150347" version="1" comment="php5-ftp is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150348" version="1" comment="php5-gd is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150349" version="1" comment="php5-gettext is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150350" version="1" comment="php5-gmp is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150351" version="1" comment="php5-iconv is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150352" version="1" comment="php5-imap is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150353" version="1" comment="php5-intl is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150354" version="1" comment="php5-json is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150355" version="1" comment="php5-ldap is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150356" version="1" comment="php5-mbstring is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150357" version="1" comment="php5-mcrypt is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150358" version="1" comment="php5-mssql is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150359" version="1" comment="php5-mysql is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150360" version="1" comment="php5-odbc is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150361" version="1" comment="php5-opcache is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150362" version="1" comment="php5-openssl is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150363" version="1" comment="php5-pcntl is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150364" version="1" comment="php5-pdo is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150365" version="1" comment="php5-pear is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150366" version="1" comment="php5-pgsql is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150367" version="1" comment="php5-phar is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150368" version="1" comment="php5-posix is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150369" version="1" comment="php5-pspell is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150370" version="1" comment="php5-readline is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150371" version="1" comment="php5-shmop is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150372" version="1" comment="php5-snmp is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150373" version="1" comment="php5-soap is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150374" version="1" comment="php5-sockets is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150375" version="1" comment="php5-sqlite is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150376" version="1" comment="php5-suhosin is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150377" version="1" comment="php5-sysvmsg is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150378" version="1" comment="php5-sysvsem is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150379" version="1" comment="php5-sysvshm is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150380" version="1" comment="php5-tidy is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150381" version="1" comment="php5-tokenizer is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150382" version="1" comment="php5-wddx is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150383" version="1" comment="php5-xmlreader is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150384" version="1" comment="php5-xmlrpc is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150385" version="1" comment="php5-xmlwriter is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150386" version="1" comment="php5-xsl is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150387" version="1" comment="php5-zip is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150388" version="1" comment="php5-zlib is &lt;5.5.14-77.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150389" version="1" comment="wget is &lt;1.14-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150258" version="1" comment="GraphicsMagick is &lt;1.3.21-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150259" version="1" comment="GraphicsMagick-devel is &lt;1.3.21-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150260" version="1" comment="libGraphicsMagick++-Q16-11 is &lt;1.3.21-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150261" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.21-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150262" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.21-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150263" version="1" comment="libGraphicsMagick3-config is &lt;1.3.21-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150264" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.21-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150265" version="1" comment="perl-GraphicsMagick is &lt;1.3.21-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150390" version="1" comment="apache2 is &lt;2.4.16-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150391" version="1" comment="apache2-devel is &lt;2.4.16-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150392" version="1" comment="apache2-doc is &lt;2.4.16-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150393" version="1" comment="apache2-event is &lt;2.4.16-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150394" version="1" comment="apache2-example-pages is &lt;2.4.16-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150395" version="1" comment="apache2-prefork is &lt;2.4.16-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150396" version="1" comment="apache2-utils is &lt;2.4.16-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150397" version="1" comment="apache2-worker is &lt;2.4.16-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150436" version="1" comment="kernel-debug is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150437" version="1" comment="kernel-debug-base is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150438" version="1" comment="kernel-debug-devel is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150439" version="1" comment="kernel-default is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150440" version="1" comment="kernel-default-base is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150441" version="1" comment="kernel-default-devel is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150442" version="1" comment="kernel-devel is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150443" version="1" comment="kernel-docs is &lt;4.1.39-53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150444" version="1" comment="kernel-docs-html is &lt;4.1.39-53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150445" version="1" comment="kernel-docs-pdf is &lt;4.1.39-53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150446" version="1" comment="kernel-ec2 is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150447" version="1" comment="kernel-ec2-base is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150448" version="1" comment="kernel-ec2-devel is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150449" version="1" comment="kernel-macros is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150450" version="1" comment="kernel-obs-build is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150451" version="1" comment="kernel-obs-qa is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150452" version="1" comment="kernel-pae is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150453" version="1" comment="kernel-pae-base is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150454" version="1" comment="kernel-pae-devel is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150455" version="1" comment="kernel-pv is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150456" version="1" comment="kernel-pv-base is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150457" version="1" comment="kernel-pv-devel is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150458" version="1" comment="kernel-source is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150459" version="1" comment="kernel-source-vanilla is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150460" version="1" comment="kernel-syms is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150461" version="1" comment="kernel-vanilla is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150462" version="1" comment="kernel-vanilla-devel is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150463" version="1" comment="kernel-xen is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150464" version="1" comment="kernel-xen-base is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150465" version="1" comment="kernel-xen-devel is &lt;4.1.39-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150541" version="1" comment="finch is &lt;2.10.11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150542" version="1" comment="finch-devel is &lt;2.10.11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150543" version="1" comment="libpurple is &lt;2.10.11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150544" version="1" comment="libpurple-branding-upstream is &lt;2.10.11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150545" version="1" comment="libpurple-devel is &lt;2.10.11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150546" version="1" comment="libpurple-lang is &lt;2.10.11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150547" version="1" comment="libpurple-meanwhile is &lt;2.10.11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150548" version="1" comment="libpurple-tcl is &lt;2.10.11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150549" version="1" comment="pidgin is &lt;2.10.11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150550" version="1" comment="pidgin-devel is &lt;2.10.11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150587" version="1" comment="libruby2_2-2_2 is &lt;2.2.6-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150588" version="1" comment="libruby2_3-2_3 is &lt;2.3.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150589" version="1" comment="ruby2.2 is &lt;2.2.6-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150590" version="1" comment="ruby2.2-devel is &lt;2.2.6-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150591" version="1" comment="ruby2.2-devel-extra is &lt;2.2.6-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150592" version="1" comment="ruby2.2-doc is &lt;2.2.6-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150593" version="1" comment="ruby2.2-doc-ri is &lt;2.2.6-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150594" version="1" comment="ruby2.2-stdlib is &lt;2.2.6-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150595" version="1" comment="ruby2.2-tk is &lt;2.2.6-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150596" version="1" comment="ruby2.3 is &lt;2.3.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150597" version="1" comment="ruby2.3-devel is &lt;2.3.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150598" version="1" comment="ruby2.3-devel-extra is &lt;2.3.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150599" version="1" comment="ruby2.3-doc is &lt;2.3.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150600" version="1" comment="ruby2.3-doc-ri is &lt;2.3.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150601" version="1" comment="ruby2.3-stdlib is &lt;2.3.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150602" version="1" comment="ruby2.3-tk is &lt;2.3.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150603" version="1" comment="ctdb is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150604" version="1" comment="ctdb-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150605" version="1" comment="ctdb-tests is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150606" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150607" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150608" version="1" comment="libdcerpc-atsvc0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150609" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150610" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150611" version="1" comment="libdcerpc-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150612" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150613" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150614" version="1" comment="libdcerpc-samr0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150615" version="1" comment="libdcerpc0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150616" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150617" version="1" comment="libgensec-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150618" version="1" comment="libgensec0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150619" version="1" comment="libgensec0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150620" version="1" comment="libndr-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150621" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150622" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150623" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150624" version="1" comment="libndr-nbt-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150625" version="1" comment="libndr-nbt0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150626" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150627" version="1" comment="libndr-standard-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150628" version="1" comment="libndr-standard0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150629" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150630" version="1" comment="libndr0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150631" version="1" comment="libndr0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150632" version="1" comment="libnetapi-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150633" version="1" comment="libnetapi0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150634" version="1" comment="libnetapi0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150635" version="1" comment="libregistry-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150636" version="1" comment="libregistry0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150637" version="1" comment="libregistry0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150638" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150639" version="1" comment="libsamba-credentials0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150640" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150641" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150642" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150643" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150644" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150645" version="1" comment="libsamba-passdb0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150646" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150647" version="1" comment="libsamba-policy-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150648" version="1" comment="libsamba-policy0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150649" version="1" comment="libsamba-policy0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150650" version="1" comment="libsamba-util-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150651" version="1" comment="libsamba-util0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150652" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150653" version="1" comment="libsamdb-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150654" version="1" comment="libsamdb0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150655" version="1" comment="libsamdb0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150656" version="1" comment="libsmbclient-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150657" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150658" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150659" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150660" version="1" comment="libsmbclient0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150661" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150662" version="1" comment="libsmbconf-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150663" version="1" comment="libsmbconf0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150664" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150665" version="1" comment="libsmbldap-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150666" version="1" comment="libsmbldap0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150667" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150668" version="1" comment="libtevent-util-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150669" version="1" comment="libtevent-util0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150670" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150671" version="1" comment="libwbclient-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150672" version="1" comment="libwbclient0 is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150673" version="1" comment="libwbclient0-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150674" version="1" comment="samba is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150675" version="1" comment="samba-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150676" version="1" comment="samba-client is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150677" version="1" comment="samba-client-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150678" version="1" comment="samba-core-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150679" version="1" comment="samba-doc is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150680" version="1" comment="samba-libs is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150681" version="1" comment="samba-libs-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150682" version="1" comment="samba-pidl is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150683" version="1" comment="samba-python is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150684" version="1" comment="samba-test is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150685" version="1" comment="samba-test-devel is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150686" version="1" comment="samba-winbind is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150687" version="1" comment="samba-winbind-32bit is &lt;4.2.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150688" version="1" comment="libpng12 is &lt;1.2.50-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150689" version="1" comment="libpng12-0 is &lt;1.2.50-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150690" version="1" comment="libpng12-0-32bit is &lt;1.2.50-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150691" version="1" comment="libpng12-compat-devel is &lt;1.2.50-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150692" version="1" comment="libpng12-compat-devel-32bit is &lt;1.2.50-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150693" version="1" comment="libpng12-devel is &lt;1.2.50-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150694" version="1" comment="libpng12-devel-32bit is &lt;1.2.50-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150695" version="1" comment="libpng16 is &lt;1.6.8-9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150696" version="1" comment="libpng16-16 is &lt;1.6.8-9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150697" version="1" comment="libpng16-16-32bit is &lt;1.6.8-9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150698" version="1" comment="libpng16-compat-devel is &lt;1.6.8-9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150699" version="1" comment="libpng16-compat-devel-32bit is &lt;1.6.8-9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150700" version="1" comment="libpng16-devel is &lt;1.6.8-9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150701" version="1" comment="libpng16-devel-32bit is &lt;1.6.8-9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150702" version="1" comment="libpng16-tools is &lt;1.6.8-9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150824" version="1" comment="clamav-database is &lt;201704030005-54.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150881" version="1" comment="apache2-mod_apparmor is &lt;2.10.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150882" version="1" comment="apparmor is &lt;2.10.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150883" version="1" comment="apparmor-abstractions is &lt;2.10.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150884" version="1" comment="apparmor-docs is &lt;2.10.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150885" version="1" comment="apparmor-parser is &lt;2.10.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150886" version="1" comment="apparmor-parser-lang is &lt;2.10.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150887" version="1" comment="apparmor-profiles is &lt;2.10.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150888" version="1" comment="apparmor-utils is &lt;2.10.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150889" version="1" comment="apparmor-utils-lang is &lt;2.10.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150890" version="1" comment="libapparmor-devel is &lt;2.10.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150891" version="1" comment="libapparmor1 is &lt;2.10.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150892" version="1" comment="libapparmor1-32bit is &lt;2.10.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150893" version="1" comment="pam_apparmor is &lt;2.10.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150894" version="1" comment="pam_apparmor-32bit is &lt;2.10.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150895" version="1" comment="perl-apparmor is &lt;2.10.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150896" version="1" comment="python3-apparmor is &lt;2.10.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150897" version="1" comment="ruby-apparmor is &lt;2.10.2-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150922" version="1" comment="atheme is &lt;7.2.9-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150923" version="1" comment="atheme-devel is &lt;7.2.9-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150924" version="1" comment="libathemecore1 is &lt;7.2.9-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150925" version="1" comment="slrn is &lt;1.0.3-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150926" version="1" comment="slrn-lang is &lt;1.0.3-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151003" version="1" comment="lxc is &lt;1.1.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151004" version="1" comment="lxc-devel is &lt;1.1.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146593" version="1" comment="libz1 is &lt;1.2.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146594" version="1" comment="libz1-32bit is &lt;1.2.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146595" version="1" comment="zlib is &lt;1.2.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146596" version="1" comment="zlib-devel is &lt;1.2.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146597" version="1" comment="zlib-devel-32bit is &lt;1.2.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146598" version="1" comment="zlib-devel-static is &lt;1.2.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146599" version="1" comment="zlib-devel-static-32bit is &lt;1.2.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154344" version="1" comment="phpMyAdmin is &lt;4.4.15.10-33.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154345" version="1" comment="postgresql93 is &lt;9.3.14-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154346" version="1" comment="postgresql93-contrib is &lt;9.3.14-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154347" version="1" comment="postgresql93-devel is &lt;9.3.14-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154348" version="1" comment="postgresql93-docs is &lt;9.3.14-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154349" version="1" comment="postgresql93-libs is &lt;9.3.14-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154350" version="1" comment="postgresql93-plperl is &lt;9.3.14-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154351" version="1" comment="postgresql93-plpython is &lt;9.3.14-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154352" version="1" comment="postgresql93-pltcl is &lt;9.3.14-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154353" version="1" comment="postgresql93-server is &lt;9.3.14-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154354" version="1" comment="postgresql93-test is &lt;9.3.14-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154489" version="1" comment="libXvnc-devel is &lt;1.6.0-16.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154490" version="1" comment="libXvnc1 is &lt;1.6.0-16.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154491" version="1" comment="tigervnc is &lt;1.6.0-16.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154492" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-16.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154493" version="1" comment="audiofile is &lt;0.3.6-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154494" version="1" comment="audiofile-devel is &lt;0.3.6-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154495" version="1" comment="audiofile-devel-32bit is &lt;0.3.6-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154496" version="1" comment="audiofile-doc is &lt;0.3.6-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154497" version="1" comment="libaudiofile1 is &lt;0.3.6-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154498" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154499" version="1" comment="libpng15 is &lt;1.5.22-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154500" version="1" comment="libpng15-15 is &lt;1.5.22-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154501" version="1" comment="libpng15-15-32bit is &lt;1.5.22-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154502" version="1" comment="jasper is &lt;1.900.14-175.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154503" version="1" comment="libjasper-devel is &lt;1.900.14-175.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154504" version="1" comment="libjasper1 is &lt;1.900.14-175.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154505" version="1" comment="libjasper1-32bit is &lt;1.900.14-175.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154506" version="1" comment="proftpd is &lt;1.3.5d-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154507" version="1" comment="proftpd-devel is &lt;1.3.5d-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154508" version="1" comment="proftpd-doc is &lt;1.3.5d-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154509" version="1" comment="proftpd-lang is &lt;1.3.5d-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154510" version="1" comment="proftpd-ldap is &lt;1.3.5d-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154511" version="1" comment="proftpd-mysql is &lt;1.3.5d-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154512" version="1" comment="proftpd-pgsql is &lt;1.3.5d-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154513" version="1" comment="proftpd-radius is &lt;1.3.5d-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154514" version="1" comment="proftpd-sqlite is &lt;1.3.5d-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154515" version="1" comment="bind is &lt;9.9.9P1-48.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154516" version="1" comment="bind-chrootenv is &lt;9.9.9P1-48.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154517" version="1" comment="bind-devel is &lt;9.9.9P1-48.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154518" version="1" comment="bind-doc is &lt;9.9.9P1-48.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154519" version="1" comment="bind-libs is &lt;9.9.9P1-48.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154520" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-48.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154521" version="1" comment="bind-lwresd is &lt;9.9.9P1-48.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154522" version="1" comment="bind-utils is &lt;9.9.9P1-48.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154627" version="1" comment="gstreamer-plugins-good is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154628" version="1" comment="gstreamer-plugins-good-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154629" version="1" comment="gstreamer-plugins-good-doc is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154630" version="1" comment="gstreamer-plugins-good-extra is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154631" version="1" comment="gstreamer-plugins-good-extra-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154632" version="1" comment="gstreamer-plugins-good-lang is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154633" version="1" comment="gstreamer-0_10-plugin-gnomevfs is &lt;0.10.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154634" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154635" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154636" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154637" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154638" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154639" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154640" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154641" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154642" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154643" version="1" comment="typelib-1_0-GstApp-0_10 is &lt;0.10.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154644" version="1" comment="typelib-1_0-GstInterfaces-0_10 is &lt;0.10.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154645" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.121-10.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154646" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.121-10.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154647" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.121-10.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154648" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.121-10.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154649" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.121-10.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154650" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.121-10.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154651" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.121-10.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154652" version="1" comment="libfreebl3 is &lt;3.28.4-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154653" version="1" comment="libfreebl3-32bit is &lt;3.28.4-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154654" version="1" comment="libsoftokn3 is &lt;3.28.4-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154655" version="1" comment="libsoftokn3-32bit is &lt;3.28.4-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154656" version="1" comment="mozilla-nss is &lt;3.28.4-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154657" version="1" comment="mozilla-nss-32bit is &lt;3.28.4-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154658" version="1" comment="mozilla-nss-certs is &lt;3.28.4-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154659" version="1" comment="mozilla-nss-certs-32bit is &lt;3.28.4-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154660" version="1" comment="mozilla-nss-devel is &lt;3.28.4-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154661" version="1" comment="mozilla-nss-sysinit is &lt;3.28.4-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154662" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.28.4-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154663" version="1" comment="mozilla-nss-tools is &lt;3.28.4-40.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154714" version="1" comment="MozillaFirefox is &lt;52.1.0-57.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154715" version="1" comment="MozillaFirefox-branding-upstream is &lt;52.1.0-57.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154716" version="1" comment="MozillaFirefox-buildsymbols is &lt;52.1.0-57.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154717" version="1" comment="MozillaFirefox-devel is &lt;52.1.0-57.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154718" version="1" comment="MozillaFirefox-translations-common is &lt;52.1.0-57.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154719" version="1" comment="MozillaFirefox-translations-other is &lt;52.1.0-57.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154733" version="1" comment="ntp is &lt;4.2.8p10-29.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154734" version="1" comment="ntp-doc is &lt;4.2.8p10-29.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154735" version="1" comment="curl is &lt;7.37.0-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154736" version="1" comment="libcurl-devel is &lt;7.37.0-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154737" version="1" comment="libcurl-devel-32bit is &lt;7.37.0-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154738" version="1" comment="libcurl4 is &lt;7.37.0-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154739" version="1" comment="libcurl4-32bit is &lt;7.37.0-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154740" version="1" comment="libsndfile is &lt;1.0.25-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154741" version="1" comment="libsndfile-devel is &lt;1.0.25-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154742" version="1" comment="libsndfile-progs is &lt;1.0.25-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154743" version="1" comment="libsndfile1 is &lt;1.0.25-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154744" version="1" comment="libsndfile1-32bit is &lt;1.0.25-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154745" version="1" comment="libtiff-devel is &lt;4.0.7-17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154746" version="1" comment="libtiff-devel-32bit is &lt;4.0.7-17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154747" version="1" comment="libtiff5 is &lt;4.0.7-17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154748" version="1" comment="libtiff5-32bit is &lt;4.0.7-17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154749" version="1" comment="tiff is &lt;4.0.7-17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154821" version="1" comment="backintime is &lt;1.1.20-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154822" version="1" comment="backintime-lang is &lt;1.1.20-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154823" version="1" comment="backintime-qt4 is &lt;1.1.20-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154824" version="1" comment="libosip2 is &lt;4.1.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154825" version="1" comment="libosip2-devel is &lt;4.1.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154826" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-8.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154827" version="1" comment="ruby2.1 is &lt;2.1.9-8.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154828" version="1" comment="ruby2.1-devel is &lt;2.1.9-8.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154829" version="1" comment="ruby2.1-devel-extra is &lt;2.1.9-8.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154830" version="1" comment="ruby2.1-doc is &lt;2.1.9-8.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154831" version="1" comment="ruby2.1-doc-ri is &lt;2.1.9-8.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154832" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-8.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146600" version="1" comment="libtiff-devel is &lt;4.0.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146601" version="1" comment="libtiff-devel-32bit is &lt;4.0.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146602" version="1" comment="libtiff5 is &lt;4.0.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146603" version="1" comment="libtiff5-32bit is &lt;4.0.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146604" version="1" comment="tiff is &lt;4.0.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154881" version="1" comment="feh is &lt;2.18.3-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154976" version="1" comment="python-virtualbox is &lt;5.0.40-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154977" version="1" comment="virtualbox is &lt;5.0.40-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154978" version="1" comment="virtualbox-devel is &lt;5.0.40-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154979" version="1" comment="virtualbox-guest-desktop-icons is &lt;5.0.40-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154980" version="1" comment="virtualbox-guest-kmp-default is &lt;5.0.40_k4.1.39_53-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154981" version="1" comment="virtualbox-guest-tools is &lt;5.0.40-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154982" version="1" comment="virtualbox-guest-x11 is &lt;5.0.40-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154983" version="1" comment="virtualbox-host-kmp-default is &lt;5.0.40_k4.1.39_53-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154984" version="1" comment="virtualbox-host-source is &lt;5.0.40-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154985" version="1" comment="virtualbox-qt is &lt;5.0.40-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154986" version="1" comment="virtualbox-websrv is &lt;5.0.40-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155041" version="1" comment="GraphicsMagick is &lt;1.3.21-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155042" version="1" comment="GraphicsMagick-devel is &lt;1.3.21-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155043" version="1" comment="libGraphicsMagick++-Q16-11 is &lt;1.3.21-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155044" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.21-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155045" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.21-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155046" version="1" comment="libGraphicsMagick3-config is &lt;1.3.21-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155047" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.21-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155048" version="1" comment="perl-GraphicsMagick is &lt;1.3.21-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155078" version="1" comment="MozillaThunderbird is &lt;52.1.0-41.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155079" version="1" comment="MozillaThunderbird-buildsymbols is &lt;52.1.0-41.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155080" version="1" comment="MozillaThunderbird-devel is &lt;52.1.0-41.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155081" version="1" comment="MozillaThunderbird-translations-common is &lt;52.1.0-41.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155082" version="1" comment="MozillaThunderbird-translations-other is &lt;52.1.0-41.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155130" version="1" comment="quagga is &lt;0.99.24.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155131" version="1" comment="quagga-devel is &lt;0.99.24.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155132" version="1" comment="dpkg is &lt;1.16.10-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155133" version="1" comment="dpkg-devel is &lt;1.16.10-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155134" version="1" comment="dpkg-lang is &lt;1.16.10-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155135" version="1" comment="update-alternatives is &lt;1.16.10-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155136" version="1" comment="libzzip-0-13 is &lt;0.13.62-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155137" version="1" comment="libzzip-0-13-32bit is &lt;0.13.62-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155138" version="1" comment="zziplib is &lt;0.13.62-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155139" version="1" comment="zziplib-devel is &lt;0.13.62-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155140" version="1" comment="zziplib-devel-32bit is &lt;0.13.62-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155141" version="1" comment="libmysql56client18 is &lt;5.6.36-24.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155142" version="1" comment="libmysql56client18-32bit is &lt;5.6.36-24.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155143" version="1" comment="libmysql56client_r18 is &lt;5.6.36-24.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155144" version="1" comment="libmysql56client_r18-32bit is &lt;5.6.36-24.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155145" version="1" comment="mysql-community-server is &lt;5.6.36-24.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155146" version="1" comment="mysql-community-server-bench is &lt;5.6.36-24.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155147" version="1" comment="mysql-community-server-client is &lt;5.6.36-24.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155148" version="1" comment="mysql-community-server-errormessages is &lt;5.6.36-24.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155149" version="1" comment="mysql-community-server-test is &lt;5.6.36-24.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155150" version="1" comment="mysql-community-server-tools is &lt;5.6.36-24.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155151" version="1" comment="libpcap is &lt;1.8.1-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155152" version="1" comment="libpcap-devel is &lt;1.8.1-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155153" version="1" comment="libpcap-devel-32bit is &lt;1.8.1-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155154" version="1" comment="libpcap-devel-static is &lt;1.8.1-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155155" version="1" comment="libpcap1 is &lt;1.8.1-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155156" version="1" comment="libpcap1-32bit is &lt;1.8.1-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155157" version="1" comment="tcpdump is &lt;4.9.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155158" version="1" comment="ghostscript is &lt;9.15-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155159" version="1" comment="ghostscript-devel is &lt;9.15-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155160" version="1" comment="ghostscript-mini is &lt;9.15-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155161" version="1" comment="ghostscript-mini-devel is &lt;9.15-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155162" version="1" comment="ghostscript-x11 is &lt;9.15-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155163" version="1" comment="libcrypto41 is &lt;2.5.3-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155164" version="1" comment="libcrypto41-32bit is &lt;2.5.3-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155165" version="1" comment="libressl is &lt;2.5.3-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155166" version="1" comment="libressl-devel is &lt;2.5.3-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155167" version="1" comment="libressl-devel-32bit is &lt;2.5.3-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155168" version="1" comment="libressl-devel-doc is &lt;2.5.3-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155169" version="1" comment="libssl43 is &lt;2.5.3-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155170" version="1" comment="libssl43-32bit is &lt;2.5.3-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155171" version="1" comment="libtls15 is &lt;2.5.3-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155172" version="1" comment="libtls15-32bit is &lt;2.5.3-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155173" version="1" comment="kernel-debug is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155174" version="1" comment="kernel-debug-base is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155175" version="1" comment="kernel-debug-devel is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155176" version="1" comment="kernel-default is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155177" version="1" comment="kernel-default-base is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155178" version="1" comment="kernel-default-devel is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155179" version="1" comment="kernel-devel is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155180" version="1" comment="kernel-docs is &lt;4.1.39-56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155181" version="1" comment="kernel-docs-html is &lt;4.1.39-56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155182" version="1" comment="kernel-docs-pdf is &lt;4.1.39-56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155183" version="1" comment="kernel-ec2 is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155184" version="1" comment="kernel-ec2-base is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155185" version="1" comment="kernel-ec2-devel is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155186" version="1" comment="kernel-macros is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155187" version="1" comment="kernel-obs-build is &lt;4.1.39-56.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155188" version="1" comment="kernel-obs-qa is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155189" version="1" comment="kernel-pae is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155190" version="1" comment="kernel-pae-base is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155191" version="1" comment="kernel-pae-devel is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155192" version="1" comment="kernel-pv is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155193" version="1" comment="kernel-pv-base is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155194" version="1" comment="kernel-pv-devel is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155195" version="1" comment="kernel-source is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155196" version="1" comment="kernel-source-vanilla is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155197" version="1" comment="kernel-syms is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155198" version="1" comment="kernel-vanilla is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155199" version="1" comment="kernel-vanilla-devel is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155200" version="1" comment="kernel-xen is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155201" version="1" comment="kernel-xen-base is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155202" version="1" comment="kernel-xen-devel is &lt;4.1.39-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155300" version="1" comment="swftools is &lt;0.9.2-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155455" version="1" comment="graphite2 is &lt;1.3.1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155456" version="1" comment="graphite2-devel is &lt;1.3.1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155457" version="1" comment="libgraphite2-3 is &lt;1.3.1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155458" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155459" version="1" comment="rzip is &lt;2.1-151.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146605" version="1" comment="libcares-devel is &lt;1.9.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146606" version="1" comment="libcares2 is &lt;1.9.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146607" version="1" comment="libcares2-32bit is &lt;1.9.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155480" version="1" comment="roundcubemail is &lt;1.1.9-17.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155481" version="1" comment="tomcat is &lt;8.0.43-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155482" version="1" comment="tomcat-admin-webapps is &lt;8.0.43-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155483" version="1" comment="tomcat-docs-webapp is &lt;8.0.43-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155484" version="1" comment="tomcat-el-3_0-api is &lt;8.0.43-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155485" version="1" comment="tomcat-embed is &lt;8.0.43-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155486" version="1" comment="tomcat-javadoc is &lt;8.0.43-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155487" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.43-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155488" version="1" comment="tomcat-jsvc is &lt;8.0.43-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155489" version="1" comment="tomcat-lib is &lt;8.0.43-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155490" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.43-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155491" version="1" comment="tomcat-webapps is &lt;8.0.43-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155579" version="1" comment="qemu is &lt;2.3.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155580" version="1" comment="qemu-arm is &lt;2.3.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155581" version="1" comment="qemu-block-curl is &lt;2.3.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155582" version="1" comment="qemu-block-rbd is &lt;2.3.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155583" version="1" comment="qemu-extra is &lt;2.3.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155584" version="1" comment="qemu-guest-agent is &lt;2.3.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155585" version="1" comment="qemu-ipxe is &lt;1.0.0-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155586" version="1" comment="qemu-kvm is &lt;2.3.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155587" version="1" comment="qemu-lang is &lt;2.3.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155588" version="1" comment="qemu-linux-user is &lt;2.3.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155589" version="1" comment="qemu-ppc is &lt;2.3.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155590" version="1" comment="qemu-s390 is &lt;2.3.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155591" version="1" comment="qemu-seabios is &lt;1.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155592" version="1" comment="qemu-sgabios is &lt;8-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155593" version="1" comment="qemu-testsuite is &lt;2.3.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155594" version="1" comment="qemu-tools is &lt;2.3.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155595" version="1" comment="qemu-vgabios is &lt;1.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155596" version="1" comment="qemu-x86 is &lt;2.3.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156066" version="1" comment="ctdb is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156067" version="1" comment="ctdb-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156068" version="1" comment="ctdb-tests is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156069" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156070" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156071" version="1" comment="libdcerpc-atsvc0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156072" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156073" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156074" version="1" comment="libdcerpc-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156075" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156076" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156077" version="1" comment="libdcerpc-samr0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156078" version="1" comment="libdcerpc0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156079" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156080" version="1" comment="libgensec-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156081" version="1" comment="libgensec0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156082" version="1" comment="libgensec0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156083" version="1" comment="libndr-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156084" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156085" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156086" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156087" version="1" comment="libndr-nbt-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156088" version="1" comment="libndr-nbt0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156089" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156090" version="1" comment="libndr-standard-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156091" version="1" comment="libndr-standard0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156092" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156093" version="1" comment="libndr0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156094" version="1" comment="libndr0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156095" version="1" comment="libnetapi-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156096" version="1" comment="libnetapi0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156097" version="1" comment="libnetapi0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156098" version="1" comment="libregistry-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156099" version="1" comment="libregistry0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156100" version="1" comment="libregistry0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156101" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156102" version="1" comment="libsamba-credentials0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156103" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156104" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156105" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156106" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156107" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156108" version="1" comment="libsamba-passdb0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156109" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156110" version="1" comment="libsamba-policy-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156111" version="1" comment="libsamba-policy0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156112" version="1" comment="libsamba-policy0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156113" version="1" comment="libsamba-util-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156114" version="1" comment="libsamba-util0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156115" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156116" version="1" comment="libsamdb-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156117" version="1" comment="libsamdb0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156118" version="1" comment="libsamdb0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156119" version="1" comment="libsmbclient-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156120" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156121" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156122" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156123" version="1" comment="libsmbclient0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156124" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156125" version="1" comment="libsmbconf-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156126" version="1" comment="libsmbconf0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156127" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156128" version="1" comment="libsmbldap-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156129" version="1" comment="libsmbldap0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156130" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156131" version="1" comment="libtevent-util-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156132" version="1" comment="libtevent-util0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156133" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156134" version="1" comment="libwbclient-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156135" version="1" comment="libwbclient0 is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156136" version="1" comment="libwbclient0-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156137" version="1" comment="samba is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156138" version="1" comment="samba-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156139" version="1" comment="samba-client is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156140" version="1" comment="samba-client-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156141" version="1" comment="samba-core-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156142" version="1" comment="samba-doc is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156143" version="1" comment="samba-libs is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156144" version="1" comment="samba-libs-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156145" version="1" comment="samba-pidl is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156146" version="1" comment="samba-python is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156147" version="1" comment="samba-test is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156148" version="1" comment="samba-test-devel is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156149" version="1" comment="samba-winbind is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156150" version="1" comment="samba-winbind-32bit is &lt;4.2.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146608" version="1" comment="apache2-mod_php5 is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146609" version="1" comment="php5 is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146610" version="1" comment="php5-bcmath is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146611" version="1" comment="php5-bz2 is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146612" version="1" comment="php5-calendar is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146613" version="1" comment="php5-ctype is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146614" version="1" comment="php5-curl is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146615" version="1" comment="php5-dba is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146616" version="1" comment="php5-devel is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146617" version="1" comment="php5-dom is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146618" version="1" comment="php5-enchant is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146619" version="1" comment="php5-exif is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146620" version="1" comment="php5-fastcgi is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146621" version="1" comment="php5-fileinfo is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146622" version="1" comment="php5-firebird is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146623" version="1" comment="php5-fpm is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146624" version="1" comment="php5-ftp is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146625" version="1" comment="php5-gd is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146626" version="1" comment="php5-gettext is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146627" version="1" comment="php5-gmp is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146628" version="1" comment="php5-iconv is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146629" version="1" comment="php5-imap is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146630" version="1" comment="php5-intl is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146631" version="1" comment="php5-json is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146632" version="1" comment="php5-ldap is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146633" version="1" comment="php5-mbstring is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146634" version="1" comment="php5-mcrypt is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146635" version="1" comment="php5-mssql is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146636" version="1" comment="php5-mysql is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146637" version="1" comment="php5-odbc is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146638" version="1" comment="php5-opcache is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146639" version="1" comment="php5-openssl is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146640" version="1" comment="php5-pcntl is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146641" version="1" comment="php5-pdo is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146642" version="1" comment="php5-pear is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146643" version="1" comment="php5-pgsql is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146644" version="1" comment="php5-phar is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146645" version="1" comment="php5-posix is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146646" version="1" comment="php5-pspell is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146647" version="1" comment="php5-readline is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146648" version="1" comment="php5-shmop is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146649" version="1" comment="php5-snmp is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146650" version="1" comment="php5-soap is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146651" version="1" comment="php5-sockets is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146652" version="1" comment="php5-sqlite is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146653" version="1" comment="php5-suhosin is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146654" version="1" comment="php5-sysvmsg is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146655" version="1" comment="php5-sysvsem is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146656" version="1" comment="php5-sysvshm is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146657" version="1" comment="php5-tidy is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146658" version="1" comment="php5-tokenizer is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146659" version="1" comment="php5-wddx is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146660" version="1" comment="php5-xmlreader is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146661" version="1" comment="php5-xmlrpc is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146662" version="1" comment="php5-xmlwriter is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146663" version="1" comment="php5-xsl is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146664" version="1" comment="php5-zip is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146665" version="1" comment="php5-zlib is &lt;5.5.14-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146872" version="1" comment="jasper is &lt;1.900.14-170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146873" version="1" comment="libjasper-devel is &lt;1.900.14-170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146874" version="1" comment="libjasper1 is &lt;1.900.14-170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146875" version="1" comment="libjasper1-32bit is &lt;1.900.14-170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146987" version="1" comment="encfs is &lt;1.8.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146988" version="1" comment="encfs-lang is &lt;1.8.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147035" version="1" comment="python-pycrypto is &lt;2.6.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146256" version="1" comment="wget is &lt;1.14-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147113" version="1" comment="gstreamer-plugins-good is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147114" version="1" comment="gstreamer-plugins-good-32bit is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147115" version="1" comment="gstreamer-plugins-good-doc is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147116" version="1" comment="gstreamer-plugins-good-extra is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147117" version="1" comment="gstreamer-plugins-good-extra-32bit is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147118" version="1" comment="gstreamer-plugins-good-lang is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147119" version="1" comment="gstreamer-plugins-bad is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147120" version="1" comment="gstreamer-plugins-bad-32bit is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147121" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147122" version="1" comment="gstreamer-plugins-bad-doc is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147123" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147124" version="1" comment="libgstbadbase-1_0-0 is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147125" version="1" comment="libgstbadbase-1_0-0-32bit is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147126" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147127" version="1" comment="libgstbadvideo-1_0-0-32bit is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147128" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147129" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147130" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147131" version="1" comment="libgstcodecparsers-1_0-0-32bit is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147132" version="1" comment="libgstgl-1_0-0 is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147133" version="1" comment="libgstgl-1_0-0-32bit is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147134" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147135" version="1" comment="libgstinsertbin-1_0-0-32bit is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147136" version="1" comment="libgstmpegts-1_0-0 is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147137" version="1" comment="libgstmpegts-1_0-0-32bit is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147138" version="1" comment="libgstphotography-1_0-0 is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147139" version="1" comment="libgstphotography-1_0-0-32bit is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147140" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147141" version="1" comment="libgsturidownloader-1_0-0-32bit is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147142" version="1" comment="libgstwayland-1_0-0 is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147143" version="1" comment="libgstwayland-1_0-0-32bit is &lt;1.4.5-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147144" version="1" comment="gstreamer-plugins-base is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147145" version="1" comment="gstreamer-plugins-base-32bit is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147146" version="1" comment="gstreamer-plugins-base-devel is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147147" version="1" comment="gstreamer-plugins-base-doc is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147148" version="1" comment="gstreamer-plugins-base-lang is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147149" version="1" comment="libgstallocators-1_0-0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147150" version="1" comment="libgstallocators-1_0-0-32bit is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147151" version="1" comment="libgstapp-1_0-0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147152" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147153" version="1" comment="libgstaudio-1_0-0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147154" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147155" version="1" comment="libgstfft-1_0-0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147156" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147157" version="1" comment="libgstpbutils-1_0-0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147158" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147159" version="1" comment="libgstriff-1_0-0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147160" version="1" comment="libgstriff-1_0-0-32bit is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147161" version="1" comment="libgstrtp-1_0-0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147162" version="1" comment="libgstrtp-1_0-0-32bit is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147163" version="1" comment="libgstrtsp-1_0-0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147164" version="1" comment="libgstrtsp-1_0-0-32bit is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147165" version="1" comment="libgstsdp-1_0-0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147166" version="1" comment="libgstsdp-1_0-0-32bit is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147167" version="1" comment="libgsttag-1_0-0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147168" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147169" version="1" comment="libgstvideo-1_0-0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147170" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147171" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147172" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147173" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147174" version="1" comment="typelib-1_0-GstFft-1_0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147175" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147176" version="1" comment="typelib-1_0-GstRiff-1_0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147177" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147178" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147179" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147180" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147181" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.4.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151005" version="1" comment="krb5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151006" version="1" comment="krb5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151007" version="1" comment="krb5-client is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151008" version="1" comment="krb5-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151009" version="1" comment="hplip is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151010" version="1" comment="hplip-hpijs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151011" version="1" comment="hplip-sane is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151012" version="1" comment="a2ps is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151013" version="1" comment="mailx is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151014" version="1" comment="log4net is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151015" version="1" comment="zoo is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151016" version="1" comment="cron is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151017" version="1" comment="cronie is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151018" version="1" comment="libmusicbrainz-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151019" version="1" comment="libmusicbrainz4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151020" version="1" comment="lynx is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151021" version="1" comment="apache2-mod_php5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151022" version="1" comment="php5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151023" version="1" comment="php5-bcmath is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151024" version="1" comment="php5-bz2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151025" version="1" comment="php5-calendar is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151026" version="1" comment="php5-ctype is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151027" version="1" comment="php5-curl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151028" version="1" comment="php5-dba is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151029" version="1" comment="php5-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151030" version="1" comment="php5-dom is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151031" version="1" comment="php5-exif is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151032" version="1" comment="php5-fastcgi is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151033" version="1" comment="php5-ftp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151034" version="1" comment="php5-gd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151035" version="1" comment="php5-gettext is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151036" version="1" comment="php5-gmp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151037" version="1" comment="php5-iconv is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151038" version="1" comment="php5-imap is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151039" version="1" comment="php5-json is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151040" version="1" comment="php5-ldap is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151041" version="1" comment="php5-mbstring is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151042" version="1" comment="php5-mcrypt is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151043" version="1" comment="php5-mysql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151044" version="1" comment="php5-odbc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151045" version="1" comment="php5-openssl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151046" version="1" comment="php5-pdo is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151047" version="1" comment="php5-pear is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151048" version="1" comment="php5-pgsql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151049" version="1" comment="php5-shmop is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151050" version="1" comment="php5-snmp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151051" version="1" comment="php5-sockets is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151052" version="1" comment="php5-sqlite is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151053" version="1" comment="php5-suhosin is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151054" version="1" comment="php5-sysvsem is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151055" version="1" comment="php5-sysvshm is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151056" version="1" comment="php5-tidy is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151057" version="1" comment="php5-tokenizer is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151058" version="1" comment="php5-wddx is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151059" version="1" comment="php5-xmlreader is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151060" version="1" comment="php5-xmlwriter is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151061" version="1" comment="php5-xsl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151062" version="1" comment="php5-zip is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151063" version="1" comment="php5-zlib is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151064" version="1" comment="libopenssl-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151065" version="1" comment="libopenssl1_0_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151066" version="1" comment="libopenssl1_0_0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151067" version="1" comment="openssl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151068" version="1" comment="id3lib is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151069" version="1" comment="libecpg6 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151070" version="1" comment="libecpg6-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151071" version="1" comment="libpq5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151072" version="1" comment="libpq5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151073" version="1" comment="postgresql-init is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151074" version="1" comment="postgresql93 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151075" version="1" comment="postgresql93-contrib is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151076" version="1" comment="postgresql93-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151077" version="1" comment="postgresql93-docs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151078" version="1" comment="postgresql93-libs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151079" version="1" comment="postgresql93-plperl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151080" version="1" comment="postgresql93-plpython is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151081" version="1" comment="postgresql93-pltcl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151082" version="1" comment="postgresql93-server is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151083" version="1" comment="postgresql93-test is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151084" version="1" comment="postgresql94 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151085" version="1" comment="postgresql94-contrib is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151086" version="1" comment="postgresql94-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151087" version="1" comment="postgresql94-docs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151088" version="1" comment="postgresql94-libs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151089" version="1" comment="postgresql94-plperl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151090" version="1" comment="postgresql94-plpython is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151091" version="1" comment="postgresql94-pltcl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151092" version="1" comment="postgresql94-server is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151093" version="1" comment="postgresql94-test is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151094" version="1" comment="libmysqlclient-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151095" version="1" comment="libmysqlclient18 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151096" version="1" comment="libmysqlclient18-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151097" version="1" comment="libmysqlclient_r18 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151098" version="1" comment="libmysqld18 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151099" version="1" comment="mariadb is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151100" version="1" comment="mariadb-client is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151101" version="1" comment="mariadb-errormessages is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151102" version="1" comment="libmikmod3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151103" version="1" comment="telepathy-idle is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151104" version="1" comment="qemu is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151105" version="1" comment="qemu-arm is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151106" version="1" comment="qemu-block-curl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151107" version="1" comment="qemu-block-rbd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151108" version="1" comment="qemu-extra is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151109" version="1" comment="qemu-ipxe is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151110" version="1" comment="qemu-kvm is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151111" version="1" comment="qemu-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151112" version="1" comment="qemu-linux-user is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151113" version="1" comment="qemu-ppc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151114" version="1" comment="qemu-s390 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151115" version="1" comment="qemu-seabios is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151116" version="1" comment="qemu-sgabios is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151117" version="1" comment="qemu-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151118" version="1" comment="qemu-vgabios is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151119" version="1" comment="qemu-x86 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151120" version="1" comment="rxvt-unicode is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151121" version="1" comment="libvorbis-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151122" version="1" comment="libvorbis0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151123" version="1" comment="libvorbis0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151124" version="1" comment="libvorbisenc2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151125" version="1" comment="libvorbisenc2-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151126" version="1" comment="libvorbisfile3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151127" version="1" comment="libvorbisfile3-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151128" version="1" comment="vorbis-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151129" version="1" comment="vorbis-tools-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151130" version="1" comment="libid3tag0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135598" version="1" comment="jasper is &lt;1.900.14-166.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151131" version="1" comment="jasper is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135599" version="1" comment="libjasper-devel is &lt;1.900.14-166.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151132" version="1" comment="libjasper-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135600" version="1" comment="libjasper1 is &lt;1.900.14-166.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151133" version="1" comment="libjasper1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135601" version="1" comment="libjasper1-32bit is &lt;1.900.14-166.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151134" version="1" comment="libjasper1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151135" version="1" comment="pam_krb5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151136" version="1" comment="pam_krb5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151137" version="1" comment="libxml2-2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151138" version="1" comment="libxml2-2-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151139" version="1" comment="libxml2-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151140" version="1" comment="libxml2-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151141" version="1" comment="python-libxml2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151142" version="1" comment="glib2-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151143" version="1" comment="glib2-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151144" version="1" comment="glib2-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151145" version="1" comment="libgio-2_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151146" version="1" comment="libgio-2_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151147" version="1" comment="libglib-2_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151148" version="1" comment="libglib-2_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151149" version="1" comment="libgmodule-2_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151150" version="1" comment="libgmodule-2_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151151" version="1" comment="libgobject-2_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151152" version="1" comment="libgobject-2_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151153" version="1" comment="libgthread-2_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151154" version="1" comment="libgthread-2_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151155" version="1" comment="jhead is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151156" version="1" comment="gnutls is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151157" version="1" comment="libgnutls-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151158" version="1" comment="libgnutls-openssl27 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151159" version="1" comment="libgnutls28 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151160" version="1" comment="libgnutls28-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151161" version="1" comment="MozillaFirefox is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151162" version="1" comment="MozillaFirefox-translations-common is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151163" version="1" comment="dia is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151164" version="1" comment="dia-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151165" version="1" comment="apache2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151166" version="1" comment="apache2-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151167" version="1" comment="apache2-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151168" version="1" comment="apache2-example-pages is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151169" version="1" comment="apache2-prefork is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151170" version="1" comment="apache2-utils is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151171" version="1" comment="libapr-util1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151172" version="1" comment="libapr-util1-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151173" version="1" comment="alsa is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151174" version="1" comment="alsa-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151175" version="1" comment="libasound2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151176" version="1" comment="libasound2-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151177" version="1" comment="curl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151178" version="1" comment="libcurl-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151179" version="1" comment="libcurl4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151180" version="1" comment="MozillaThunderbird is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151181" version="1" comment="MozillaThunderbird-translations-common is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151182" version="1" comment="ntp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151183" version="1" comment="ntp-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151184" version="1" comment="cups is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151185" version="1" comment="cups-client is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151186" version="1" comment="cups-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151187" version="1" comment="cups-libs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151188" version="1" comment="cups-libs-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151189" version="1" comment="libsndfile-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151190" version="1" comment="libsndfile1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151191" version="1" comment="libsndfile1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151192" version="1" comment="gvim is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151193" version="1" comment="vim is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151194" version="1" comment="vim-data is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151195" version="1" comment="cyrus-sasl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151196" version="1" comment="cyrus-sasl-crammd5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151197" version="1" comment="cyrus-sasl-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151198" version="1" comment="cyrus-sasl-digestmd5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151199" version="1" comment="cyrus-sasl-gssapi is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151200" version="1" comment="cyrus-sasl-plain is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151201" version="1" comment="libsasl2-3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151202" version="1" comment="libsasl2-3-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151203" version="1" comment="bind is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151204" version="1" comment="bind-chrootenv is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151205" version="1" comment="bind-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151206" version="1" comment="bind-libs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151207" version="1" comment="bind-utils is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151208" version="1" comment="avahi is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151209" version="1" comment="avahi-autoipd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151210" version="1" comment="avahi-compat-mDNSResponder-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151211" version="1" comment="avahi-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151212" version="1" comment="libavahi-client3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151213" version="1" comment="libavahi-client3-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151214" version="1" comment="libavahi-common3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151215" version="1" comment="libavahi-common3-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151216" version="1" comment="libavahi-core7 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151217" version="1" comment="libavahi-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151218" version="1" comment="libdns_sd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151219" version="1" comment="liblcms-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151220" version="1" comment="liblcms1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151221" version="1" comment="liblcms1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151222" version="1" comment="python-lcms is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151223" version="1" comment="libpoppler-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151224" version="1" comment="libpoppler-glib8 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151225" version="1" comment="libpoppler-qt4-4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151226" version="1" comment="libpoppler44 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151227" version="1" comment="poppler-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151228" version="1" comment="libqt4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151229" version="1" comment="libqt4-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151230" version="1" comment="libqt4-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151231" version="1" comment="libqt4-linguist is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151232" version="1" comment="libqt4-qt3support is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151233" version="1" comment="libqt4-qt3support-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151234" version="1" comment="libqt4-sql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151235" version="1" comment="libqt4-sql-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151236" version="1" comment="libqt4-sql-mysql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151237" version="1" comment="libqt4-sql-mysql-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151238" version="1" comment="libqt4-sql-postgresql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151239" version="1" comment="libqt4-sql-postgresql-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151240" version="1" comment="libqt4-sql-sqlite is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151241" version="1" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151242" version="1" comment="libqt4-sql-unixODBC is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151243" version="1" comment="libqt4-sql-unixODBC-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151244" version="1" comment="libqt4-x11 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151245" version="1" comment="libqt4-x11-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151246" version="1" comment="freetype2-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151247" version="1" comment="ft2demos is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151248" version="1" comment="libfreetype6 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151249" version="1" comment="libfreetype6-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151250" version="1" comment="wireshark is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151251" version="1" comment="wireshark-ui-gtk is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151252" version="1" comment="pam_ssh is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151253" version="1" comment="pam_ssh-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151254" version="1" comment="libIlmImf-Imf_2_1-21 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151255" version="1" comment="openexr-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151256" version="1" comment="GraphicsMagick-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151257" version="1" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151258" version="1" comment="libGraphicsMagick3-config is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151259" version="1" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151260" version="1" comment="libxerces-c-3_1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151261" version="1" comment="cifs-utils is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151262" version="1" comment="libdcerpc-binding0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151263" version="1" comment="libdcerpc-binding0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151264" version="1" comment="libdcerpc0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151265" version="1" comment="libdcerpc0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151266" version="1" comment="libgensec0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151267" version="1" comment="libgensec0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151268" version="1" comment="libndr-krb5pac0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151269" version="1" comment="libndr-krb5pac0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151270" version="1" comment="libndr-nbt0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151271" version="1" comment="libndr-nbt0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151272" version="1" comment="libndr-standard0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151273" version="1" comment="libndr-standard0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151274" version="1" comment="libndr0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151275" version="1" comment="libndr0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151276" version="1" comment="libnetapi0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151277" version="1" comment="libnetapi0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151278" version="1" comment="libregistry0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151279" version="1" comment="libsamba-credentials0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151280" version="1" comment="libsamba-credentials0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151281" version="1" comment="libsamba-hostconfig0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151282" version="1" comment="libsamba-hostconfig0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151283" version="1" comment="libsamba-passdb0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151284" version="1" comment="libsamba-passdb0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151285" version="1" comment="libsamba-util0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151286" version="1" comment="libsamba-util0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151287" version="1" comment="libsamdb0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151288" version="1" comment="libsamdb0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151289" version="1" comment="libsmbclient-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151290" version="1" comment="libsmbclient-raw0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151291" version="1" comment="libsmbclient-raw0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151292" version="1" comment="libsmbclient0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151293" version="1" comment="libsmbconf0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151294" version="1" comment="libsmbconf0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151295" version="1" comment="libsmbldap0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151296" version="1" comment="libsmbldap0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151297" version="1" comment="libtevent-util0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151298" version="1" comment="libtevent-util0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151299" version="1" comment="libwbclient0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151300" version="1" comment="libwbclient0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151301" version="1" comment="samba is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151302" version="1" comment="samba-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151303" version="1" comment="samba-client is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151304" version="1" comment="samba-client-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151305" version="1" comment="samba-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151306" version="1" comment="samba-libs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151307" version="1" comment="samba-libs-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151308" version="1" comment="samba-winbind is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151309" version="1" comment="samba-winbind-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151310" version="1" comment="dhcp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151311" version="1" comment="dhcp-client is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151312" version="1" comment="dhcp-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151313" version="1" comment="dhcp-relay is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151314" version="1" comment="dhcp-server is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151315" version="1" comment="irssi is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151316" version="1" comment="libtiff-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151317" version="1" comment="libtiff5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151318" version="1" comment="libtiff5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151319" version="1" comment="tiff is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151320" version="1" comment="subversion is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151321" version="1" comment="subversion-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151322" version="1" comment="subversion-perl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151323" version="1" comment="subversion-python is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151324" version="1" comment="subversion-server is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151325" version="1" comment="subversion-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151326" version="1" comment="libapr1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151327" version="1" comment="libapr1-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151328" version="1" comment="libneon27 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151329" version="1" comment="gzip is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151330" version="1" comment="expat is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151331" version="1" comment="libexpat-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151332" version="1" comment="libexpat1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151333" version="1" comment="libexpat1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151334" version="1" comment="fetchmail is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151335" version="1" comment="libpurple is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151336" version="1" comment="libpurple-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151337" version="1" comment="libpurple-meanwhile is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151338" version="1" comment="libpurple-tcl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151339" version="1" comment="pidgin is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151340" version="1" comment="libnewt0_52 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151341" version="1" comment="htmldoc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151342" version="1" comment="cyradm is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151343" version="1" comment="cyrus-imapd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151344" version="1" comment="perl-Cyrus-IMAP is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151345" version="1" comment="perl-Cyrus-SIEVE-managesieve is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151346" version="1" comment="fuse is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151347" version="1" comment="libfuse2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151348" version="1" comment="aria2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151349" version="1" comment="aria2-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151350" version="1" comment="perl-HTML-Parser is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151351" version="1" comment="libltdl7 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151352" version="1" comment="libltdl7-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151353" version="1" comment="libtool is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151354" version="1" comment="kernel-default is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151355" version="1" comment="kernel-default-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151356" version="1" comment="kernel-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151357" version="1" comment="kernel-docs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151358" version="1" comment="kernel-macros is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151359" version="1" comment="kernel-pv-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151360" version="1" comment="kernel-source is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151361" version="1" comment="kernel-syms is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151362" version="1" comment="kernel-xen is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151363" version="1" comment="kernel-xen-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151364" version="1" comment="automake is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151365" version="1" comment="m4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151366" version="1" comment="ruby is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151367" version="1" comment="ruby-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151368" version="1" comment="glibc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151369" version="1" comment="glibc-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151370" version="1" comment="glibc-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151371" version="1" comment="glibc-extra is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151372" version="1" comment="glibc-info is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151373" version="1" comment="glibc-locale is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151374" version="1" comment="glibc-locale-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151375" version="1" comment="nscd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151376" version="1" comment="libopenjpeg1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151377" version="1" comment="groff is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151378" version="1" comment="groff-full is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151379" version="1" comment="gxditview is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151380" version="1" comment="bzip2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151381" version="1" comment="clamav is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151382" version="1" comment="libbz2-1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151383" version="1" comment="libbz2-1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151384" version="1" comment="libbz2-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151385" version="1" comment="libpcsclite1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151386" version="1" comment="pcsc-lite is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151387" version="1" comment="kdebase4-workspace-libs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151388" version="1" comment="python-kdebase4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151389" version="1" comment="cpio is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151390" version="1" comment="cpio-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151391" version="1" comment="tar is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151392" version="1" comment="tar-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151393" version="1" comment="libpolkit0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151394" version="1" comment="polkit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151395" version="1" comment="polkit-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151396" version="1" comment="typelib-1_0-Polkit-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151397" version="1" comment="libImlib2-1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151398" version="1" comment="kdenetwork4-filesharing is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151399" version="1" comment="kdnssd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151400" version="1" comment="kget is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151401" version="1" comment="kopete is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151402" version="1" comment="kppp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151403" version="1" comment="krdc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151404" version="1" comment="krfb is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151405" version="1" comment="nano is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151406" version="1" comment="nano-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151407" version="1" comment="sudo is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151408" version="1" comment="dbus-1-glib is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151409" version="1" comment="dbus-1-glib-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151410" version="1" comment="dbus-1-glib-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151411" version="1" comment="libpng12-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151412" version="1" comment="libpng12-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151413" version="1" comment="libpng12-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151414" version="1" comment="libpng16-16 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151415" version="1" comment="libpng16-16-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151416" version="1" comment="libpng16-compat-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151417" version="1" comment="libpng16-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151418" version="1" comment="quagga is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151419" version="1" comment="w3m is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151420" version="1" comment="xorg-x11-server is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151421" version="1" comment="xorg-x11-server-extra is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151422" version="1" comment="xorg-x11-server-sdk is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151423" version="1" comment="libvirt is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151424" version="1" comment="libvirt-client is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151425" version="1" comment="libvirt-daemon is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151426" version="1" comment="libvirt-daemon-config-network is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151427" version="1" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151428" version="1" comment="libvirt-daemon-driver-interface is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151429" version="1" comment="libvirt-daemon-driver-libxl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151430" version="1" comment="libvirt-daemon-driver-lxc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151431" version="1" comment="libvirt-daemon-driver-network is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151432" version="1" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151433" version="1" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151434" version="1" comment="libvirt-daemon-driver-qemu is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151435" version="1" comment="libvirt-daemon-driver-secret is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151436" version="1" comment="libvirt-daemon-driver-storage is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151437" version="1" comment="libvirt-daemon-driver-uml is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151438" version="1" comment="libvirt-daemon-driver-vbox is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151439" version="1" comment="libvirt-daemon-lxc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151440" version="1" comment="libvirt-daemon-qemu is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151441" version="1" comment="libvirt-daemon-xen is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151442" version="1" comment="wget is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151443" version="1" comment="bogofilter-common is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151444" version="1" comment="bogofilter-db is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151445" version="1" comment="iputils is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151446" version="1" comment="gpg2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151447" version="1" comment="gpg2-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151448" version="1" comment="evince is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151449" version="1" comment="evince-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151450" version="1" comment="libevdocument3-4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151451" version="1" comment="libevview3-3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151452" version="1" comment="nautilus-evince is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151453" version="1" comment="typelib-1_0-EvinceDocument-3_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151454" version="1" comment="typelib-1_0-EvinceView-3_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151455" version="1" comment="perl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151456" version="1" comment="perl-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151457" version="1" comment="perl-base is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151458" version="1" comment="perl-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151459" version="1" comment="libmspack0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151460" version="1" comment="libsmi is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151461" version="1" comment="libsmi2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151462" version="1" comment="libreoffice is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151463" version="1" comment="libreoffice-base is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151464" version="1" comment="libreoffice-base-drivers-mysql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151465" version="1" comment="libreoffice-branding-upstream is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151466" version="1" comment="libreoffice-calc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151467" version="1" comment="libreoffice-calc-extensions is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151468" version="1" comment="libreoffice-draw is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151469" version="1" comment="libreoffice-filters-optional is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151470" version="1" comment="libreoffice-gnome is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151471" version="1" comment="libreoffice-icon-theme-breeze is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151472" version="1" comment="libreoffice-icon-theme-galaxy is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151473" version="1" comment="libreoffice-icon-theme-hicontrast is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151474" version="1" comment="libreoffice-icon-theme-oxygen is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151475" version="1" comment="libreoffice-icon-theme-sifr is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151476" version="1" comment="libreoffice-icon-theme-tango is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151477" version="1" comment="libreoffice-impress is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151478" version="1" comment="libreoffice-kde4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151479" version="1" comment="libreoffice-l10n-cs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151480" version="1" comment="libreoffice-l10n-da is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151481" version="1" comment="libreoffice-l10n-de is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151482" version="1" comment="libreoffice-l10n-el is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151483" version="1" comment="libreoffice-l10n-en is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151484" version="1" comment="libreoffice-l10n-es is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151485" version="1" comment="libreoffice-l10n-fr is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151486" version="1" comment="libreoffice-l10n-hu is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151487" version="1" comment="libreoffice-l10n-it is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151488" version="1" comment="libreoffice-l10n-ja is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151489" version="1" comment="libreoffice-l10n-pl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151490" version="1" comment="libreoffice-l10n-ru is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151491" version="1" comment="libreoffice-mailmerge is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151492" version="1" comment="libreoffice-math is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151493" version="1" comment="libreoffice-pyuno is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151494" version="1" comment="libreoffice-writer is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151495" version="1" comment="libreoffice-writer-extensions is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151496" version="1" comment="libHX28 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151497" version="1" comment="libHX28-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151498" version="1" comment="libfreebl3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151499" version="1" comment="libsoftokn3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151500" version="1" comment="mozilla-nss is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151501" version="1" comment="mozilla-nss-certs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151502" version="1" comment="mozilla-nss-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151503" version="1" comment="mozilla-nss-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151504" version="1" comment="pam is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151505" version="1" comment="pam-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151506" version="1" comment="pam-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151507" version="1" comment="openslp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151508" version="1" comment="openslp-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151509" version="1" comment="openslp-server is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151510" version="1" comment="gnome-shell is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151511" version="1" comment="gnome-shell-browser-plugin is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151512" version="1" comment="gnome-shell-calendar is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151513" version="1" comment="gnome-shell-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151514" version="1" comment="gnome-games is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151515" version="1" comment="gnome-games-recommended is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151516" version="1" comment="libmono-2_0-1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151517" version="1" comment="libmono-2_0-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151518" version="1" comment="libmonoboehm-2_0-1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151519" version="1" comment="libmonoboehm-2_0-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151520" version="1" comment="libmonosgen-2_0-1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151521" version="1" comment="mono-core is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151522" version="1" comment="mono-data is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151523" version="1" comment="mono-data-sqlite is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151524" version="1" comment="mono-extras is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151525" version="1" comment="mono-mvc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151526" version="1" comment="mono-wcf is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151527" version="1" comment="mono-web is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151528" version="1" comment="mono-winforms is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151529" version="1" comment="mono-winfxcore is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151530" version="1" comment="libsss_idmap0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151531" version="1" comment="sssd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151532" version="1" comment="sssd-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151533" version="1" comment="sssd-krb5-common is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151534" version="1" comment="sssd-ldap is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151535" version="1" comment="dbus-1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151536" version="1" comment="dbus-1-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151537" version="1" comment="dbus-1-x11 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151538" version="1" comment="libdbus-1-3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151539" version="1" comment="libdbus-1-3-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151540" version="1" comment="gimp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151541" version="1" comment="gimp-help-browser is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151542" version="1" comment="gimp-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151543" version="1" comment="gimp-plugin-aa is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151544" version="1" comment="gimp-plugins-python is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151545" version="1" comment="libgimp-2_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151546" version="1" comment="libgimpui-2_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151547" version="1" comment="patch is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151548" version="1" comment="libpango-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151549" version="1" comment="libpango-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151550" version="1" comment="pango-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151551" version="1" comment="pango-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151552" version="1" comment="pango-tools-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151553" version="1" comment="typelib-1_0-Pango-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151554" version="1" comment="libzip-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151555" version="1" comment="libzip2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151556" version="1" comment="kbd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151557" version="1" comment="aaa_base is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151558" version="1" comment="aaa_base-extras is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151559" version="1" comment="xorg-x11 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151560" version="1" comment="xorg-x11-essentials is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151561" version="1" comment="xrdb is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151562" version="1" comment="libgypsy0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151563" version="1" comment="mailman is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151564" version="1" comment="vino is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151565" version="1" comment="vino-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151566" version="1" comment="telepathy-gabble is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151567" version="1" comment="rsync is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151568" version="1" comment="logrotate is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151569" version="1" comment="unixODBC is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151570" version="1" comment="unixODBC-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151571" version="1" comment="libpython2_7-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151572" version="1" comment="libpython2_7-1_0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151573" version="1" comment="python-base is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151574" version="1" comment="python-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151575" version="1" comment="python-xml is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151576" version="1" comment="nagios is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151577" version="1" comment="nagios-www is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151578" version="1" comment="libthunarx-2-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151579" version="1" comment="thunar is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151580" version="1" comment="thunar-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151581" version="1" comment="gdm is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151582" version="1" comment="gdm-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151583" version="1" comment="gdmflexiserver is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151584" version="1" comment="libgdm1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151585" version="1" comment="typelib-1_0-Gdm-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151586" version="1" comment="libmodplug1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151587" version="1" comment="xen is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151588" version="1" comment="xen-doc-html is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151589" version="1" comment="xen-kmp-default is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151590" version="1" comment="xen-libs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151591" version="1" comment="xen-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151592" version="1" comment="xen-tools-domU is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151593" version="1" comment="libgnomesu is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151594" version="1" comment="libgnomesu-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151595" version="1" comment="libgnomesu0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151596" version="1" comment="libsoup-2_4-1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151597" version="1" comment="libsoup-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151598" version="1" comment="libsoup-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151599" version="1" comment="typelib-1_0-Soup-2_4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151600" version="1" comment="git is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151601" version="1" comment="git-core is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151602" version="1" comment="git-cvs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151603" version="1" comment="git-daemon is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151604" version="1" comment="git-email is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151605" version="1" comment="git-gui is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151606" version="1" comment="git-svn is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151607" version="1" comment="git-web is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151608" version="1" comment="gitk is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151609" version="1" comment="tftp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151610" version="1" comment="sysvinit-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151611" version="1" comment="whois is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151612" version="1" comment="yast2-core is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151613" version="1" comment="yast2-core-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151614" version="1" comment="gdk-pixbuf-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151615" version="1" comment="gdk-pixbuf-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151616" version="1" comment="gdk-pixbuf-query-loaders is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151617" version="1" comment="gdk-pixbuf-query-loaders-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151618" version="1" comment="libgdk_pixbuf-2_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151619" version="1" comment="libgdk_pixbuf-2_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151620" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151621" version="1" comment="nspluginwrapper is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151622" version="1" comment="opie is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151623" version="1" comment="opie-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151624" version="1" comment="icedtea-web-javadoc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151625" version="1" comment="java-1_8_0-openjdk-plugin is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151626" version="1" comment="libgssglue-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151627" version="1" comment="libgssglue1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151628" version="1" comment="apache-commons-daemon is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151629" version="1" comment="FastCGI is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151630" version="1" comment="perl-FastCGI is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151631" version="1" comment="libXfont-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151632" version="1" comment="libXfont1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151633" version="1" comment="xorg-x11-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151634" version="1" comment="gdk-pixbuf-loader-rsvg is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151635" version="1" comment="librsvg-2-2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151636" version="1" comment="librsvg-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151637" version="1" comment="typelib-1_0-Rsvg-2_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151638" version="1" comment="liblightdm-gobject-1-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151639" version="1" comment="lightdm is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151640" version="1" comment="lightdm-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151641" version="1" comment="pam-modules is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151642" version="1" comment="pam-modules-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151643" version="1" comment="yast2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151644" version="1" comment="yast2-devel-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151645" version="1" comment="rsyslog is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151646" version="1" comment="libpython3_4m1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151647" version="1" comment="python3-base is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151648" version="1" comment="radvd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151649" version="1" comment="hardlink is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151650" version="1" comment="empathy is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151651" version="1" comment="empathy-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151652" version="1" comment="telepathy-mission-control-plugin-goa is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151653" version="1" comment="sysconfig is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151654" version="1" comment="sysconfig-netconfig is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151655" version="1" comment="colord is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151656" version="1" comment="colord-gtk-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151657" version="1" comment="colord-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151658" version="1" comment="libcolord-gtk1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151659" version="1" comment="libcolord2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151660" version="1" comment="libcolorhug2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151661" version="1" comment="python-cupshelpers is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151662" version="1" comment="system-config-printer is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151663" version="1" comment="system-config-printer-applet is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151664" version="1" comment="system-config-printer-common is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151665" version="1" comment="system-config-printer-common-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151666" version="1" comment="system-config-printer-dbus-service is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151667" version="1" comment="udev-configure-printer is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151668" version="1" comment="emacs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151669" version="1" comment="emacs-info is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151670" version="1" comment="emacs-nox is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151671" version="1" comment="emacs-x11 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151672" version="1" comment="etags is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151673" version="1" comment="libraptor2-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151674" version="1" comment="ImageMagick is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151675" version="1" comment="ImageMagick-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151676" version="1" comment="ImageMagick-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151677" version="1" comment="ImageMagick-extra is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151678" version="1" comment="libMagick++-6_Q16-3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151679" version="1" comment="libMagickCore-6_Q16-1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151680" version="1" comment="libMagickWand-6_Q16-1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151681" version="1" comment="perl-PerlMagick is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151682" version="1" comment="augeas-lenses is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151683" version="1" comment="libaugeas0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151684" version="1" comment="cvs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151685" version="1" comment="xinetd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151686" version="1" comment="osc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151687" version="1" comment="perl-YAML-LibYAML is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151688" version="1" comment="libgudev-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151689" version="1" comment="libgudev-1_0-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151690" version="1" comment="libudev-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151691" version="1" comment="libudev1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151692" version="1" comment="libudev1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151693" version="1" comment="systemd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151694" version="1" comment="systemd-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151695" version="1" comment="systemd-bash-completion is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151696" version="1" comment="systemd-logger is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151697" version="1" comment="systemd-sysvinit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151698" version="1" comment="typelib-1_0-GUdev-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151699" version="1" comment="udev is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151700" version="1" comment="file is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151701" version="1" comment="file-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151702" version="1" comment="file-magic is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151703" version="1" comment="libmagic1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151704" version="1" comment="libmagic1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151705" version="1" comment="argyllcms is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151706" version="1" comment="libsnmp30 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151707" version="1" comment="libsnmp30-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151708" version="1" comment="net-snmp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151709" version="1" comment="net-snmp-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151710" version="1" comment="perl-SNMP is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151711" version="1" comment="snmp-mibs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151712" version="1" comment="xfsprogs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151713" version="1" comment="xfsprogs-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151714" version="1" comment="mosh is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151715" version="1" comment="libtag-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151716" version="1" comment="libtag1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151717" version="1" comment="libtag_c0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151718" version="1" comment="taglib is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151719" version="1" comment="python-pycrypto is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151720" version="1" comment="perl-Config-IniFiles is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151721" version="1" comment="hyper-v is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151722" version="1" comment="libgc1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151723" version="1" comment="accountsservice is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151724" version="1" comment="accountsservice-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151725" version="1" comment="libaccountsservice0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151726" version="1" comment="typelib-1_0-AccountsService-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151727" version="1" comment="libvte9 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151728" version="1" comment="vte2-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151729" version="1" comment="libexif-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151730" version="1" comment="libexif12 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151731" version="1" comment="libexif12-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151732" version="1" comment="exif is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151733" version="1" comment="libupsclient1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151734" version="1" comment="nut is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151735" version="1" comment="nut-cgi is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151736" version="1" comment="openconnect is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151737" version="1" comment="openconnect-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151738" version="1" comment="viewvc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151739" version="1" comment="gv is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151740" version="1" comment="wdiff is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151741" version="1" comment="wdiff-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151742" version="1" comment="gnome-keyring is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151743" version="1" comment="gnome-keyring-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151744" version="1" comment="gnome-keyring-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151745" version="1" comment="gnome-keyring-pam is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151746" version="1" comment="gnome-keyring-pam-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151747" version="1" comment="libgck-modules-gnome-keyring is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151748" version="1" comment="gnugk is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151749" version="1" comment="h323plus is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151750" version="1" comment="h323plus-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151751" version="1" comment="libh323-1_26_5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151752" version="1" comment="squashfs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151753" version="1" comment="libspice-client-glib-2_0-8 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151754" version="1" comment="libspice-client-gtk-2_0-4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151755" version="1" comment="libspice-client-gtk-3_0-4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151756" version="1" comment="libspice-controller0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151757" version="1" comment="python-SpiceClientGtk is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151758" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151759" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151760" version="1" comment="dracut is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151761" version="1" comment="libproxy-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151762" version="1" comment="libproxy1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151763" version="1" comment="libproxy1-config-gnome3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151764" version="1" comment="libproxy1-config-kde4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151765" version="1" comment="libproxy1-networkmanager is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151766" version="1" comment="libproxy1-pacrunner-webkit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151767" version="1" comment="claws-mail is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151768" version="1" comment="claws-mail-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151769" version="1" comment="cups-pk-helper is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151770" version="1" comment="cups-pk-helper-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151771" version="1" comment="libssh-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151772" version="1" comment="libssh4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151773" version="1" comment="links is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151774" version="1" comment="libjavascriptcoregtk-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151775" version="1" comment="libjavascriptcoregtk-3_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151776" version="1" comment="libwebkitgtk-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151777" version="1" comment="libwebkitgtk-3_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151778" version="1" comment="libwebkitgtk-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151779" version="1" comment="libwebkitgtk2-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151780" version="1" comment="libwebkitgtk3-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151781" version="1" comment="typelib-1_0-JavaScriptCore-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151782" version="1" comment="typelib-1_0-WebKit-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151783" version="1" comment="apache-commons-httpclient is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151784" version="1" comment="monitoring-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148518" version="1" comment="expat is &lt;2.1.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148519" version="1" comment="libexpat-devel is &lt;2.1.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148520" version="1" comment="libexpat-devel-32bit is &lt;2.1.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151785" version="1" comment="libexpat-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148521" version="1" comment="libexpat1 is &lt;2.1.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148522" version="1" comment="libexpat1-32bit is &lt;2.1.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151786" version="1" comment="libblkid-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151787" version="1" comment="libblkid1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151788" version="1" comment="libblkid1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151789" version="1" comment="libmount1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151790" version="1" comment="libmount1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151791" version="1" comment="libsmartcols1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151792" version="1" comment="libuuid-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151793" version="1" comment="libuuid1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151794" version="1" comment="libuuid1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151795" version="1" comment="util-linux is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151796" version="1" comment="util-linux-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151797" version="1" comment="util-linux-systemd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151798" version="1" comment="libopenssl0_9_8 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151799" version="1" comment="libopenssl0_9_8-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151800" version="1" comment="bsdtar is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151801" version="1" comment="libarchive-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151802" version="1" comment="libarchive13 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151803" version="1" comment="coreutils is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151804" version="1" comment="coreutils-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151805" version="1" comment="gnome-online-accounts is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151806" version="1" comment="gnome-online-accounts-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151807" version="1" comment="gnome-online-accounts-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151808" version="1" comment="libgoa-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151809" version="1" comment="libgoa-backend-1_0-1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151810" version="1" comment="typelib-1_0-Goa-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151811" version="1" comment="ant is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151812" version="1" comment="ant-jmf is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151813" version="1" comment="ant-junit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151814" version="1" comment="ant-scripts is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151815" version="1" comment="ant-swing is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151816" version="1" comment="apache2-mod_perl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151817" version="1" comment="libX11-6 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151818" version="1" comment="libX11-6-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151819" version="1" comment="libX11-data is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151820" version="1" comment="libX11-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151821" version="1" comment="libX11-xcb1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151822" version="1" comment="libX11-xcb1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151823" version="1" comment="libXext-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151824" version="1" comment="libXext6 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151825" version="1" comment="libXext6-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151826" version="1" comment="libXfixes-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151827" version="1" comment="libXfixes3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151828" version="1" comment="libXfixes3-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151829" version="1" comment="libXi-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151830" version="1" comment="libXi6 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151831" version="1" comment="libXi6-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151832" version="1" comment="libXinerama-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151833" version="1" comment="libXinerama1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151834" version="1" comment="libXinerama1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151835" version="1" comment="libXrandr-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151836" version="1" comment="libXrandr2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151837" version="1" comment="libXrandr2-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151838" version="1" comment="libXrender-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151839" version="1" comment="libXrender1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151840" version="1" comment="libXrender1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151841" version="1" comment="libXRes1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151842" version="1" comment="libXres-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151843" version="1" comment="libXv-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151844" version="1" comment="libXv1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151845" version="1" comment="libXv1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151846" version="1" comment="libXvMC-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151847" version="1" comment="libXvMC1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151848" version="1" comment="libXxf86dga-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151849" version="1" comment="libXxf86dga1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151850" version="1" comment="libdmx-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151851" version="1" comment="libdmx1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151852" version="1" comment="libFS6 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151853" version="1" comment="libXxf86vm-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151854" version="1" comment="libXxf86vm1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151855" version="1" comment="libXxf86vm1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151856" version="1" comment="libXt-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151857" version="1" comment="libXt6 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151858" version="1" comment="libXt6-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151859" version="1" comment="libXcursor-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151860" version="1" comment="libXcursor1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151861" version="1" comment="libXcursor1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151862" version="1" comment="libXp-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151863" version="1" comment="libXp6 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151864" version="1" comment="libXtst-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151865" version="1" comment="libXtst6 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151866" version="1" comment="libxcb-composite0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151867" version="1" comment="libxcb-damage0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151868" version="1" comment="libxcb-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151869" version="1" comment="libxcb-dpms0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151870" version="1" comment="libxcb-dri2-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151871" version="1" comment="libxcb-dri2-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151872" version="1" comment="libxcb-dri3-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151873" version="1" comment="libxcb-dri3-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151874" version="1" comment="libxcb-glx0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151875" version="1" comment="libxcb-glx0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151876" version="1" comment="libxcb-present0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151877" version="1" comment="libxcb-present0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151878" version="1" comment="libxcb-randr0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151879" version="1" comment="libxcb-record0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151880" version="1" comment="libxcb-render0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151881" version="1" comment="libxcb-render0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151882" version="1" comment="libxcb-res0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151883" version="1" comment="libxcb-screensaver0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151884" version="1" comment="libxcb-shape0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151885" version="1" comment="libxcb-shm0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151886" version="1" comment="libxcb-shm0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151887" version="1" comment="libxcb-sync1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151888" version="1" comment="libxcb-sync1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151889" version="1" comment="libxcb-xevie0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151890" version="1" comment="libxcb-xf86dri0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151891" version="1" comment="libxcb-xfixes0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151892" version="1" comment="libxcb-xfixes0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151893" version="1" comment="libxcb-xinerama0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151894" version="1" comment="libxcb-xkb1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151895" version="1" comment="libxcb-xprint0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151896" version="1" comment="libxcb-xtest0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151897" version="1" comment="libxcb-xv0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151898" version="1" comment="libxcb-xvmc0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151899" version="1" comment="libxcb1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151900" version="1" comment="libxcb1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151901" version="1" comment="libraw-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151902" version="1" comment="libraw10 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151903" version="1" comment="libimobiledevice-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151904" version="1" comment="libimobiledevice6 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151905" version="1" comment="jakarta-commons-fileupload is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151906" version="1" comment="python-suds-jurko is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151907" version="1" comment="libfbembed2_5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151908" version="1" comment="freerdp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151909" version="1" comment="freerdp-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151910" version="1" comment="libfreerdp-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151911" version="1" comment="libfreerdp-1_0-plugins is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151912" version="1" comment="xlockmore is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151913" version="1" comment="python is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151914" version="1" comment="python-curses is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151915" version="1" comment="python-gdbm is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151916" version="1" comment="python3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151917" version="1" comment="python3-curses is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151918" version="1" comment="python3-dbm is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151919" version="1" comment="python3-tk is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151920" version="1" comment="libgcrypt-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151921" version="1" comment="libgcrypt20 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151922" version="1" comment="libgcrypt20-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151923" version="1" comment="libspice-server1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151924" version="1" comment="python-pyOpenSSL is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151925" version="1" comment="rtkit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151926" version="1" comment="pwgen is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151927" version="1" comment="ibus-chewing is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151928" version="1" comment="ibus-pinyin is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151929" version="1" comment="xen-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151930" version="1" comment="xen-libs-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151931" version="1" comment="typo3-cms-4_7 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151932" version="1" comment="python3-pip is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151933" version="1" comment="ghostscript is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151934" version="1" comment="ghostscript-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151935" version="1" comment="ghostscript-mini is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151936" version="1" comment="ghostscript-mini-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151937" version="1" comment="ghostscript-x11 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151938" version="1" comment="libjbig2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151939" version="1" comment="libjbig2-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151940" version="1" comment="libjson-c2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151941" version="1" comment="libjson-c2-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151942" version="1" comment="libyaml-0-2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151943" version="1" comment="rpm is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151944" version="1" comment="rpm-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151945" version="1" comment="rpm-build is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151946" version="1" comment="rpm-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151947" version="1" comment="cups-filters is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151948" version="1" comment="cups-filters-cups-browsed is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151949" version="1" comment="cups-filters-foomatic-rip is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151950" version="1" comment="cups-filters-ghostscript is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151951" version="1" comment="libgadu-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151952" version="1" comment="libgadu3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151953" version="1" comment="typo3-cms-4_5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151954" version="1" comment="libpotrace0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151955" version="1" comment="potrace is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151956" version="1" comment="potrace-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151957" version="1" comment="kernel-debug is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151958" version="1" comment="kernel-debug-base is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151959" version="1" comment="kernel-debug-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151960" version="1" comment="kernel-default-base is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151961" version="1" comment="kernel-docs-html is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151962" version="1" comment="kernel-docs-pdf is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151963" version="1" comment="kernel-ec2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151964" version="1" comment="kernel-ec2-base is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151965" version="1" comment="kernel-ec2-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151966" version="1" comment="kernel-obs-build is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151967" version="1" comment="kernel-obs-qa is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151968" version="1" comment="kernel-obs-qa-xen is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151969" version="1" comment="kernel-pae is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151970" version="1" comment="kernel-pae-base is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151971" version="1" comment="kernel-pae-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151972" version="1" comment="kernel-pv is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151973" version="1" comment="kernel-pv-base is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151974" version="1" comment="kernel-source-vanilla is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151975" version="1" comment="kernel-vanilla is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151976" version="1" comment="kernel-vanilla-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151977" version="1" comment="kernel-xen-base is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151978" version="1" comment="eog is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151979" version="1" comment="eog-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151980" version="1" comment="eog-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151981" version="1" comment="gtk2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151982" version="1" comment="gtk2-branding-SLED is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151983" version="1" comment="gtk2-branding-openSUSE is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151984" version="1" comment="gtk2-branding-upstream is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151985" version="1" comment="gtk2-data is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151986" version="1" comment="gtk2-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151987" version="1" comment="gtk2-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151988" version="1" comment="gtk2-engine-clearlooks is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151989" version="1" comment="gtk2-engine-clearlooks-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151990" version="1" comment="gtk2-engine-crux is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151991" version="1" comment="gtk2-engine-crux-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151992" version="1" comment="gtk2-engine-glide is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151993" version="1" comment="gtk2-engine-glide-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151994" version="1" comment="gtk2-engine-hcengine is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151995" version="1" comment="gtk2-engine-industrial is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151996" version="1" comment="gtk2-engine-industrial-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151997" version="1" comment="gtk2-engine-mist is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151998" version="1" comment="gtk2-engine-mist-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151999" version="1" comment="gtk2-engine-redmond95 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152000" version="1" comment="gtk2-engine-redmond95-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152001" version="1" comment="gtk2-engine-thinice is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152002" version="1" comment="gtk2-engine-thinice-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152003" version="1" comment="gtk2-engines is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152004" version="1" comment="gtk2-engines-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152005" version="1" comment="gtk2-immodule-amharic is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152006" version="1" comment="gtk2-immodule-amharic-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152007" version="1" comment="gtk2-immodule-inuktitut is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152008" version="1" comment="gtk2-immodule-inuktitut-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152009" version="1" comment="gtk2-immodule-multipress is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152010" version="1" comment="gtk2-immodule-multipress-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152011" version="1" comment="gtk2-immodule-thai is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152012" version="1" comment="gtk2-immodule-thai-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152013" version="1" comment="gtk2-immodule-vietnamese is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152014" version="1" comment="gtk2-immodule-vietnamese-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152015" version="1" comment="gtk2-immodule-xim is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152016" version="1" comment="gtk2-immodule-xim-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152017" version="1" comment="gtk2-immodules-tigrigna is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152018" version="1" comment="gtk2-immodules-tigrigna-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152019" version="1" comment="gtk2-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152020" version="1" comment="gtk2-theme-clearlooks is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152021" version="1" comment="gtk2-theme-crux is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152022" version="1" comment="gtk2-theme-industrial is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152023" version="1" comment="gtk2-theme-mist is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152024" version="1" comment="gtk2-theme-redmond95 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152025" version="1" comment="gtk2-theme-thinice is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152026" version="1" comment="gtk2-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152027" version="1" comment="gtk2-tools-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152028" version="1" comment="libgtk-2_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152029" version="1" comment="libgtk-2_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152030" version="1" comment="typelib-1_0-Gtk-2_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152031" version="1" comment="imap is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152032" version="1" comment="imap-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152033" version="1" comment="libc-client2007e_suse is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152034" version="1" comment="php5-enchant is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152035" version="1" comment="php5-fileinfo is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152036" version="1" comment="php5-firebird is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152037" version="1" comment="php5-fpm is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152038" version="1" comment="php5-intl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152039" version="1" comment="php5-mssql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152040" version="1" comment="php5-opcache is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152041" version="1" comment="php5-pcntl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152042" version="1" comment="php5-phar is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152043" version="1" comment="php5-posix is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152044" version="1" comment="php5-pspell is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152045" version="1" comment="php5-readline is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152046" version="1" comment="php5-soap is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152047" version="1" comment="php5-sysvmsg is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152048" version="1" comment="php5-xmlrpc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130871" version="1" comment="redis is &lt;3.0.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152049" version="1" comment="redis is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147182" version="1" comment="python-pycrypto is &lt;2.6.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152050" version="1" comment="libudisks2-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152051" version="1" comment="udisks2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152052" version="1" comment="udisks2-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152053" version="1" comment="tigervnc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152054" version="1" comment="xorg-x11-Xvnc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152055" version="1" comment="xalan-j2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152056" version="1" comment="lftp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152057" version="1" comment="elfutils is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152058" version="1" comment="libasm1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152059" version="1" comment="libdw1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152060" version="1" comment="libelf1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152061" version="1" comment="libelf1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152062" version="1" comment="virtualbox is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152063" version="1" comment="virtualbox-guest-kmp-default is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152064" version="1" comment="virtualbox-guest-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152065" version="1" comment="virtualbox-guest-x11 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152066" version="1" comment="virtualbox-host-kmp-default is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152067" version="1" comment="virtualbox-qt is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152068" version="1" comment="libipa_hbac-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152069" version="1" comment="libipa_hbac0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152070" version="1" comment="libsss_idmap-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152071" version="1" comment="libsss_nss_idmap-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152072" version="1" comment="libsss_nss_idmap0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152073" version="1" comment="libsss_sudo is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152074" version="1" comment="python-ipa_hbac is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152075" version="1" comment="python-sss_nss_idmap is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152076" version="1" comment="python-sssd-config is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152077" version="1" comment="sssd-ad is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152078" version="1" comment="sssd-ipa is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152079" version="1" comment="sssd-krb5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152080" version="1" comment="sssd-proxy is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152081" version="1" comment="sssd-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152082" version="1" comment="mutt is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152083" version="1" comment="obs-service-set_version is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152084" version="1" comment="mozilla-nspr is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152085" version="1" comment="mozilla-nspr-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152086" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152087" version="1" comment="libjavascriptcoregtk-3_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152088" version="1" comment="libwebkitgtk-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152089" version="1" comment="libwebkitgtk-3_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152090" version="1" comment="libwebkitgtk3-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152091" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152092" version="1" comment="typelib-1_0-WebKit-3_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152093" version="1" comment="webkit-jsc-1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152094" version="1" comment="webkit-jsc-3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152095" version="1" comment="webkitgtk is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152096" version="1" comment="webkitgtk3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152097" version="1" comment="python3-requests is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152098" version="1" comment="perl-Capture-Tiny is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152099" version="1" comment="android-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152100" version="1" comment="gd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152101" version="1" comment="gd-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152102" version="1" comment="bash is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152103" version="1" comment="bash-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152104" version="1" comment="bash-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152105" version="1" comment="crash-kmp-default is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152106" version="1" comment="crash-kmp-xen is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152107" version="1" comment="libreadline6 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152108" version="1" comment="readline-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152109" version="1" comment="readline-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152110" version="1" comment="openssh is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152111" version="1" comment="openssh-helpers is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152112" version="1" comment="libmms-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152113" version="1" comment="libmms0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152114" version="1" comment="libdirectfb-1_7-1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152115" version="1" comment="ppp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152116" version="1" comment="perl-LWP-Protocol-https is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147183" version="1" comment="encfs is &lt;1.8.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152117" version="1" comment="encfs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147184" version="1" comment="encfs-lang is &lt;1.8.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152118" version="1" comment="encfs-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152119" version="1" comment="libtasn1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152120" version="1" comment="libtasn1-6 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152121" version="1" comment="libtasn1-6-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152122" version="1" comment="libtasn1-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152123" version="1" comment="kdelibs4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152124" version="1" comment="kdelibs4-core is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152125" version="1" comment="kdelibs4-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152126" version="1" comment="libkde4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152127" version="1" comment="libkde4-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152128" version="1" comment="libkdecore4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152129" version="1" comment="libkdecore4-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152130" version="1" comment="libksuseinstall1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152131" version="1" comment="libserf-1-1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152132" version="1" comment="apache-commons-beanutils is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152133" version="1" comment="gpgme is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152134" version="1" comment="libgpgme-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152135" version="1" comment="libgpgme11 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152136" version="1" comment="monit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152137" version="1" comment="monit-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150927" version="1" comment="slrn is &lt;1.0.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152138" version="1" comment="slrn is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150928" version="1" comment="slrn-lang is &lt;1.0.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152139" version="1" comment="slrn-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152140" version="1" comment="python-Pillow is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152141" version="1" comment="procmail is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152142" version="1" comment="klogd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152143" version="1" comment="syslog-service is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152144" version="1" comment="shim is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152145" version="1" comment="wpa_supplicant is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152146" version="1" comment="wpa_supplicant-gui is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152147" version="1" comment="finch is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152148" version="1" comment="finch-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152149" version="1" comment="libpurple-branding-upstream is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152150" version="1" comment="libpurple-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152151" version="1" comment="pidgin-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152152" version="1" comment="libpulse-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152153" version="1" comment="libpulse-mainloop-glib0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152154" version="1" comment="libpulse0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152155" version="1" comment="libpulse0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152156" version="1" comment="pulseaudio is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152157" version="1" comment="pulseaudio-bash-completion is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152158" version="1" comment="pulseaudio-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152159" version="1" comment="pulseaudio-module-bluetooth is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152160" version="1" comment="pulseaudio-module-gconf is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152161" version="1" comment="pulseaudio-module-jack is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152162" version="1" comment="pulseaudio-module-lirc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152163" version="1" comment="pulseaudio-module-x11 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152164" version="1" comment="pulseaudio-module-zeroconf is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152165" version="1" comment="pulseaudio-utils is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152166" version="1" comment="libminiupnpc10 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152167" version="1" comment="cacti is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152168" version="1" comment="cacti-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152169" version="1" comment="liblzo2-2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152170" version="1" comment="libpython3_4m1_0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152171" version="1" comment="python3-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152172" version="1" comment="python3-base-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152173" version="1" comment="python3-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152174" version="1" comment="python3-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152175" version="1" comment="python3-doc-pdf is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152176" version="1" comment="python3-idle is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152177" version="1" comment="python3-testsuite is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152178" version="1" comment="python3-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152179" version="1" comment="transmission-common is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152180" version="1" comment="transmission-gtk is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152181" version="1" comment="transmission-gtk-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152182" version="1" comment="xf86-video-intel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154833" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152217" version="1" comment="libruby2_1-2_1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154834" version="1" comment="ruby2.1 is &lt;2.1.9-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152218" version="1" comment="ruby2.1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154835" version="1" comment="ruby2.1-devel is &lt;2.1.9-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152219" version="1" comment="ruby2.1-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154836" version="1" comment="ruby2.1-devel-extra is &lt;2.1.9-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154837" version="1" comment="ruby2.1-devel-extra is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154838" version="1" comment="ruby2.1-doc is &lt;2.1.9-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154839" version="1" comment="ruby2.1-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154840" version="1" comment="ruby2.1-doc-ri is &lt;2.1.9-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154841" version="1" comment="ruby2.1-doc-ri is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154842" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152220" version="1" comment="ruby2.1-stdlib is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152183" version="1" comment="cpp48 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152184" version="1" comment="gcc48 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152185" version="1" comment="gcc48-c++ is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152186" version="1" comment="gcc48-fortran is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152187" version="1" comment="gcc48-gij is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152188" version="1" comment="gcc48-info is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152189" version="1" comment="gcc48-java is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152190" version="1" comment="gcc48-locale is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152191" version="1" comment="gcc48-objc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152192" version="1" comment="libasan0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152193" version="1" comment="libgcc_s1-gcc48-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152194" version="1" comment="libgcj48 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152195" version="1" comment="libgcj48-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152196" version="1" comment="libgcj48-jar is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152197" version="1" comment="libgcj_bc1-gcc48 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152198" version="1" comment="libobjc4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152199" version="1" comment="libstdc++48-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152200" version="1" comment="libstdc++6-gcc48-locale is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152201" version="1" comment="liblua5_2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152202" version="1" comment="lua is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152203" version="1" comment="lua-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152204" version="1" comment="LibVNCServer is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152205" version="1" comment="LibVNCServer-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152206" version="1" comment="libvncclient0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152207" version="1" comment="libvncserver0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152208" version="1" comment="linuxvnc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152209" version="1" comment="libevent-2_0-5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152210" version="1" comment="bash-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152211" version="1" comment="bash-loadables is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152212" version="1" comment="libreadline6-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152213" version="1" comment="readline-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152214" version="1" comment="ctags is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152215" version="1" comment="sddm is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152216" version="1" comment="sddm-branding-openSUSE is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152221" version="1" comment="openvpn is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152222" version="1" comment="libtiff-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152223" version="1" comment="unzip is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152224" version="1" comment="unzip-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152225" version="1" comment="calibre is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152226" version="1" comment="fcitx-qt5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152227" version="1" comment="fcitx-qt5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152228" version="1" comment="fcitx-qt5-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152229" version="1" comment="frameworkintegration is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152230" version="1" comment="frameworkintegration-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152231" version="1" comment="frameworkintegration-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152232" version="1" comment="frameworkintegration-plugin is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152233" version="1" comment="frameworkintegration-plugin-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152234" version="1" comment="kwayland is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152235" version="1" comment="kwayland-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152236" version="1" comment="kwayland-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152237" version="1" comment="kwayland-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152238" version="1" comment="kwin5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152239" version="1" comment="kwin5-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152240" version="1" comment="kwin5-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152241" version="1" comment="libKF5Style5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152242" version="1" comment="libKF5Style5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152243" version="1" comment="libKF5Style5-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152244" version="1" comment="libQt53DCollision-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152245" version="1" comment="libQt53DCollision5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152246" version="1" comment="libQt53DCollision5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152247" version="1" comment="libQt53DCore-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152248" version="1" comment="libQt53DCore5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152249" version="1" comment="libQt53DCore5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152250" version="1" comment="libQt53DInput-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152251" version="1" comment="libQt53DInput5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152252" version="1" comment="libQt53DInput5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152253" version="1" comment="libQt53DLogic-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152254" version="1" comment="libQt53DLogic5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152255" version="1" comment="libQt53DLogic5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152256" version="1" comment="libQt53DQuick-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152257" version="1" comment="libQt53DQuick5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152258" version="1" comment="libQt53DQuick5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152259" version="1" comment="libQt53DQuickRenderer-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152260" version="1" comment="libQt53DQuickRenderer5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152261" version="1" comment="libQt53DQuickRenderer5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152262" version="1" comment="libQt53DRenderer-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152263" version="1" comment="libQt53DRenderer5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152264" version="1" comment="libQt53DRenderer5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152265" version="1" comment="libQt5Bluetooth5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152266" version="1" comment="libQt5Bluetooth5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152267" version="1" comment="libQt5Bluetooth5-imports is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152268" version="1" comment="libQt5Bootstrap-devel-static is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152269" version="1" comment="libQt5Bootstrap-devel-static-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152270" version="1" comment="libQt5CLucene5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152271" version="1" comment="libQt5CLucene5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152272" version="1" comment="libQt5Compositor5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152273" version="1" comment="libQt5Compositor5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152274" version="1" comment="libQt5Concurrent-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152275" version="1" comment="libQt5Concurrent-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152276" version="1" comment="libQt5Concurrent5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152277" version="1" comment="libQt5Concurrent5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152278" version="1" comment="libQt5Core-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152279" version="1" comment="libQt5Core-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152280" version="1" comment="libQt5Core-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152281" version="1" comment="libQt5Core5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152282" version="1" comment="libQt5Core5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152283" version="1" comment="libQt5DBus-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152284" version="1" comment="libQt5DBus-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152285" version="1" comment="libQt5DBus-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152286" version="1" comment="libQt5DBus5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152287" version="1" comment="libQt5DBus5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152288" version="1" comment="libQt5Declarative5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152289" version="1" comment="libQt5Declarative5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152290" version="1" comment="libQt5Designer5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152291" version="1" comment="libQt5Designer5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152292" version="1" comment="libQt5DesignerComponents5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152293" version="1" comment="libQt5DesignerComponents5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152294" version="1" comment="libQt5Gui-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152295" version="1" comment="libQt5Gui-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152296" version="1" comment="libQt5Gui-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152297" version="1" comment="libQt5Gui5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152298" version="1" comment="libQt5Gui5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152299" version="1" comment="libQt5Help5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152300" version="1" comment="libQt5Help5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152301" version="1" comment="libQt5Location5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152302" version="1" comment="libQt5Location5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152303" version="1" comment="libQt5Multimedia5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152304" version="1" comment="libQt5Multimedia5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152305" version="1" comment="libQt5Network-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152306" version="1" comment="libQt5Network-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152307" version="1" comment="libQt5Network-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152308" version="1" comment="libQt5Network5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152309" version="1" comment="libQt5Network5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152310" version="1" comment="libQt5Nfc5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152311" version="1" comment="libQt5Nfc5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152312" version="1" comment="libQt5Nfc5-imports is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152313" version="1" comment="libQt5OpenGL-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152314" version="1" comment="libQt5OpenGL-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152315" version="1" comment="libQt5OpenGL-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152316" version="1" comment="libQt5OpenGL5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152317" version="1" comment="libQt5OpenGL5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152318" version="1" comment="libQt5OpenGLExtensions-devel-static is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152319" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152320" version="1" comment="libQt5PlatformHeaders-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152321" version="1" comment="libQt5PlatformSupport-devel-static is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152322" version="1" comment="libQt5PlatformSupport-devel-static-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152323" version="1" comment="libQt5PlatformSupport-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152324" version="1" comment="libQt5Positioning5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152325" version="1" comment="libQt5Positioning5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152326" version="1" comment="libQt5PrintSupport-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152327" version="1" comment="libQt5PrintSupport-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152328" version="1" comment="libQt5PrintSupport-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152329" version="1" comment="libQt5PrintSupport5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152330" version="1" comment="libQt5PrintSupport5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152331" version="1" comment="libQt5Script5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152332" version="1" comment="libQt5Script5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152333" version="1" comment="libQt5Sensors5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152334" version="1" comment="libQt5Sensors5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152335" version="1" comment="libQt5Sensors5-imports is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152336" version="1" comment="libQt5SerialPort5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152337" version="1" comment="libQt5SerialPort5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152338" version="1" comment="libQt5Sql-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152339" version="1" comment="libQt5Sql-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152340" version="1" comment="libQt5Sql-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152341" version="1" comment="libQt5Sql5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152342" version="1" comment="libQt5Sql5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152343" version="1" comment="libQt5Sql5-mysql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152344" version="1" comment="libQt5Sql5-mysql-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152345" version="1" comment="libQt5Sql5-postgresql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152346" version="1" comment="libQt5Sql5-postgresql-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152347" version="1" comment="libQt5Sql5-sqlite is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152348" version="1" comment="libQt5Sql5-sqlite-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152349" version="1" comment="libQt5Sql5-unixODBC is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152350" version="1" comment="libQt5Sql5-unixODBC-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152351" version="1" comment="libQt5Svg5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152352" version="1" comment="libQt5Svg5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152353" version="1" comment="libQt5Test-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152354" version="1" comment="libQt5Test-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152355" version="1" comment="libQt5Test-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152356" version="1" comment="libQt5Test5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152357" version="1" comment="libQt5Test5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152358" version="1" comment="libQt5WaylandClient5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152359" version="1" comment="libQt5WaylandClient5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152360" version="1" comment="libQt5WebChannel5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152361" version="1" comment="libQt5WebChannel5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152362" version="1" comment="libQt5WebChannel5-imports is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152363" version="1" comment="libQt5WebKit-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152364" version="1" comment="libQt5WebKit5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152365" version="1" comment="libQt5WebKit5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152366" version="1" comment="libQt5WebKit5-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152367" version="1" comment="libQt5WebKit5-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152368" version="1" comment="libQt5WebKit5-imports is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152369" version="1" comment="libQt5WebKitWidgets-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152370" version="1" comment="libQt5WebKitWidgets-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152371" version="1" comment="libQt5WebKitWidgets-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152372" version="1" comment="libQt5WebKitWidgets5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152373" version="1" comment="libQt5WebKitWidgets5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152374" version="1" comment="libQt5WebSockets5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152375" version="1" comment="libQt5WebSockets5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152376" version="1" comment="libQt5WebSockets5-imports is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152377" version="1" comment="libQt5Widgets-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152378" version="1" comment="libQt5Widgets-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152379" version="1" comment="libQt5Widgets-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152380" version="1" comment="libQt5Widgets5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152381" version="1" comment="libQt5Widgets5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152382" version="1" comment="libQt5X11Extras5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152383" version="1" comment="libQt5X11Extras5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152384" version="1" comment="libQt5Xml-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152385" version="1" comment="libQt5Xml-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152386" version="1" comment="libQt5Xml5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152387" version="1" comment="libQt5Xml5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152388" version="1" comment="libQt5XmlPatterns5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152389" version="1" comment="libQt5XmlPatterns5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152390" version="1" comment="libQtQuick5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152391" version="1" comment="libQtQuick5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152392" version="1" comment="libqt5-creator is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152393" version="1" comment="libqt5-linguist is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152394" version="1" comment="libqt5-linguist-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152395" version="1" comment="libqt5-qt3d is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152396" version="1" comment="libqt5-qt3d-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152397" version="1" comment="libqt5-qt3d-examples is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152398" version="1" comment="libqt5-qt3d-imports is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152399" version="1" comment="libqt5-qt3d-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152400" version="1" comment="libqt5-qtbase is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152401" version="1" comment="libqt5-qtbase-common-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152402" version="1" comment="libqt5-qtbase-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152403" version="1" comment="libqt5-qtbase-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152404" version="1" comment="libqt5-qtbase-examples is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152405" version="1" comment="libqt5-qtbase-examples-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152406" version="1" comment="libqt5-qtbase-platformtheme-gtk2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152407" version="1" comment="libqt5-qtbase-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152408" version="1" comment="libqt5-qtconnectivity is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152409" version="1" comment="libqt5-qtconnectivity-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152410" version="1" comment="libqt5-qtconnectivity-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152411" version="1" comment="libqt5-qtconnectivity-examples is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152412" version="1" comment="libqt5-qtconnectivity-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152413" version="1" comment="libqt5-qtconnectivity-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152414" version="1" comment="libqt5-qtct is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152415" version="1" comment="libqt5-qtdeclarative is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152416" version="1" comment="libqt5-qtdeclarative-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152417" version="1" comment="libqt5-qtdeclarative-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152418" version="1" comment="libqt5-qtdeclarative-examples is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152419" version="1" comment="libqt5-qtdeclarative-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152420" version="1" comment="libqt5-qtdeclarative-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152421" version="1" comment="libqt5-qtdoc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152422" version="1" comment="libqt5-qtgraphicaleffects is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152423" version="1" comment="libqt5-qtimageformats is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152424" version="1" comment="libqt5-qtimageformats-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152425" version="1" comment="libqt5-qtimageformats-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152426" version="1" comment="libqt5-qtlocation is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152427" version="1" comment="libqt5-qtlocation-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152428" version="1" comment="libqt5-qtlocation-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152429" version="1" comment="libqt5-qtlocation-examples is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152430" version="1" comment="libqt5-qtlocation-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152431" version="1" comment="libqt5-qtmultimedia is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152432" version="1" comment="libqt5-qtmultimedia-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152433" version="1" comment="libqt5-qtmultimedia-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152434" version="1" comment="libqt5-qtmultimedia-examples is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152435" version="1" comment="libqt5-qtmultimedia-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152436" version="1" comment="libqt5-qtquick1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152437" version="1" comment="libqt5-qtquick1-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152438" version="1" comment="libqt5-qtquick1-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152439" version="1" comment="libqt5-qtquick1-examples is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152440" version="1" comment="libqt5-qtquick1-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152441" version="1" comment="libqt5-qtquickcontrols is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152442" version="1" comment="libqt5-qtquickcontrols-examples is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152443" version="1" comment="libqt5-qtscript is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152444" version="1" comment="libqt5-qtscript-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152445" version="1" comment="libqt5-qtscript-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152446" version="1" comment="libqt5-qtscript-examples is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152447" version="1" comment="libqt5-qtscript-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152448" version="1" comment="libqt5-qtsensors is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152449" version="1" comment="libqt5-qtsensors-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152450" version="1" comment="libqt5-qtsensors-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152451" version="1" comment="libqt5-qtsensors-examples is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152452" version="1" comment="libqt5-qtsensors-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152453" version="1" comment="libqt5-qtserialport is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152454" version="1" comment="libqt5-qtserialport-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152455" version="1" comment="libqt5-qtserialport-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152456" version="1" comment="libqt5-qtserialport-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152457" version="1" comment="libqt5-qtsvg is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152458" version="1" comment="libqt5-qtsvg-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152459" version="1" comment="libqt5-qtsvg-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152460" version="1" comment="libqt5-qtsvg-examples is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152461" version="1" comment="libqt5-qtsvg-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152462" version="1" comment="libqt5-qttools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152463" version="1" comment="libqt5-qttools-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152464" version="1" comment="libqt5-qttools-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152465" version="1" comment="libqt5-qttools-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152466" version="1" comment="libqt5-qttools-examples is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152467" version="1" comment="libqt5-qttools-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152468" version="1" comment="libqt5-qttranslations is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152469" version="1" comment="libqt5-qtwayland is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152470" version="1" comment="libqt5-qtwayland-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152471" version="1" comment="libqt5-qtwayland-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152472" version="1" comment="libqt5-qtwayland-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152473" version="1" comment="libqt5-qtwayland-examples is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152474" version="1" comment="libqt5-qtwayland-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152475" version="1" comment="libqt5-qtwebchannel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152476" version="1" comment="libqt5-qtwebchannel-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152477" version="1" comment="libqt5-qtwebchannel-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152478" version="1" comment="libqt5-qtwebchannel-examples is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152479" version="1" comment="libqt5-qtwebchannel-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152480" version="1" comment="libqt5-qtwebengine is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152481" version="1" comment="libqt5-qtwebengine-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152482" version="1" comment="libqt5-qtwebengine-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152483" version="1" comment="libqt5-qtwebengine-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152484" version="1" comment="libqt5-qtwebengine-examples is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152485" version="1" comment="libqt5-qtwebengine-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152486" version="1" comment="libqt5-qtwebkit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152487" version="1" comment="libqt5-qtwebkit-examples is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152488" version="1" comment="libqt5-qtwebsockets is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152489" version="1" comment="libqt5-qtwebsockets-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152490" version="1" comment="libqt5-qtwebsockets-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152491" version="1" comment="libqt5-qtwebsockets-examples is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152492" version="1" comment="libqt5-qtwebsockets-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152493" version="1" comment="libqt5-qtx11extras is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152494" version="1" comment="libqt5-qtx11extras-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152495" version="1" comment="libqt5-qtx11extras-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152496" version="1" comment="libqt5-qtxmlpatterns is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152497" version="1" comment="libqt5-qtxmlpatterns-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152498" version="1" comment="libqt5-qtxmlpatterns-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152499" version="1" comment="libqt5-qtxmlpatterns-examples is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152500" version="1" comment="libqt5-qtxmlpatterns-private-headers-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152501" version="1" comment="lxqt-powermanagement is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152502" version="1" comment="lxqt-powermanagement-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152503" version="1" comment="lxqt-qtplugin is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152504" version="1" comment="autofs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152505" version="1" comment="docker is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152506" version="1" comment="docker-bash-completion is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152507" version="1" comment="docker-test is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152508" version="1" comment="docker-zsh-completion is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152509" version="1" comment="librsync2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152510" version="1" comment="konversation is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152511" version="1" comment="konversation-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152512" version="1" comment="binutils is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152513" version="1" comment="binutils-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152514" version="1" comment="tnftp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152515" version="1" comment="kio-extras5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152516" version="1" comment="kwebkitpart is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152517" version="1" comment="kwebkitpart-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152518" version="1" comment="plasma5-desktop is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152519" version="1" comment="plasma5-desktop-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155203" version="1" comment="libpcap is &lt;1.8.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155204" version="1" comment="libpcap is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155205" version="1" comment="libpcap-devel is &lt;1.8.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155206" version="1" comment="libpcap-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155207" version="1" comment="libpcap-devel-32bit is &lt;1.8.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155208" version="1" comment="libpcap-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155209" version="1" comment="libpcap-devel-static is &lt;1.8.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155210" version="1" comment="libpcap-devel-static is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155211" version="1" comment="libpcap1 is &lt;1.8.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155212" version="1" comment="libpcap1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155213" version="1" comment="libpcap1-32bit is &lt;1.8.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155214" version="1" comment="libpcap1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152520" version="1" comment="tcpdump is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152521" version="1" comment="flac is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152522" version="1" comment="flac-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152523" version="1" comment="libFLAC++6 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152524" version="1" comment="libFLAC8 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152525" version="1" comment="libFLAC8-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152526" version="1" comment="libpcre1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152527" version="1" comment="libpcre1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152528" version="1" comment="libpcre16-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142540" version="1" comment="libpcre16-0-32bit is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152529" version="1" comment="libpcre16-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152530" version="1" comment="libpcrecpp0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152531" version="1" comment="libpcrecpp0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152532" version="1" comment="libpcreposix0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142541" version="1" comment="libpcreposix0-32bit is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152533" version="1" comment="libpcreposix0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152534" version="1" comment="pcre is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152535" version="1" comment="pcre-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152536" version="1" comment="pcre-devel-static is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142542" version="1" comment="pcre-doc is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152537" version="1" comment="pcre-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152538" version="1" comment="pcre-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152539" version="1" comment="libksba8 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152540" version="1" comment="libjpeg-turbo is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152541" version="1" comment="libjpeg62 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152542" version="1" comment="libjpeg62-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152543" version="1" comment="libjpeg8 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152544" version="1" comment="libjpeg8-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152545" version="1" comment="libturbojpeg0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152546" version="1" comment="znc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152547" version="1" comment="znc-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152548" version="1" comment="znc-perl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152549" version="1" comment="znc-python3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152550" version="1" comment="znc-tcl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152551" version="1" comment="libexiv2-14 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152552" version="1" comment="libexiv2-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152553" version="1" comment="libmpfr4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152554" version="1" comment="mpfr-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152555" version="1" comment="busybox is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152556" version="1" comment="libicu-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152557" version="1" comment="libicu52_1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152558" version="1" comment="libicu52_1-data is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152559" version="1" comment="sudo-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152560" version="1" comment="sudo-test is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152561" version="1" comment="ecryptfs-utils is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152562" version="1" comment="ecryptfs-utils-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152563" version="1" comment="squid is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152564" version="1" comment="libsndfile is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152565" version="1" comment="libsndfile-progs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152566" version="1" comment="glibc-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152567" version="1" comment="glibc-devel-static is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152568" version="1" comment="glibc-devel-static-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152569" version="1" comment="glibc-html is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152570" version="1" comment="glibc-i18ndata is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152571" version="1" comment="glibc-obsolete is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152572" version="1" comment="glibc-profile is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152573" version="1" comment="glibc-profile-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152574" version="1" comment="glibc-testsuite is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152575" version="1" comment="glibc-utils is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152576" version="1" comment="glibc-utils-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152577" version="1" comment="libgudev-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152578" version="1" comment="libudev-mini-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152579" version="1" comment="libudev-mini1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152580" version="1" comment="nss-myhostname is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152581" version="1" comment="nss-myhostname-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152582" version="1" comment="systemd-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152583" version="1" comment="systemd-journal-gateway is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152584" version="1" comment="systemd-mini is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152585" version="1" comment="systemd-mini-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152586" version="1" comment="systemd-mini-sysvinit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152587" version="1" comment="udev-mini is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152588" version="1" comment="atheme is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152589" version="1" comment="atheme-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152590" version="1" comment="libathemecore1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152591" version="1" comment="GraphicsMagick is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152592" version="1" comment="ImageMagick-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152593" version="1" comment="libGraphicsMagick++-Q16-11 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152594" version="1" comment="libGraphicsMagick++-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152595" version="1" comment="libMagick++-6_Q16-3-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152596" version="1" comment="libMagick++-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152597" version="1" comment="libMagick++-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152598" version="1" comment="libMagickCore-6_Q16-1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152599" version="1" comment="libMagickWand-6_Q16-1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152600" version="1" comment="perl-GraphicsMagick is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146415" version="1" comment="ImageMagick is &lt;6.8.8.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146416" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146417" version="1" comment="ImageMagick-devel-32bit is &lt;6.8.8.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146418" version="1" comment="ImageMagick-doc is &lt;6.8.8.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146419" version="1" comment="ImageMagick-extra is &lt;6.8.8.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146420" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146421" version="1" comment="libMagick++-6_Q16-3-32bit is &lt;6.8.8.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146422" version="1" comment="libMagick++-devel is &lt;6.8.8.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146423" version="1" comment="libMagick++-devel-32bit is &lt;6.8.8.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146424" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146425" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146426" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146427" version="1" comment="libMagickWand-6_Q16-1-32bit is &lt;6.8.8.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146428" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152601" version="1" comment="bsdiff is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152602" version="1" comment="e2fsprogs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152603" version="1" comment="e2fsprogs-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152604" version="1" comment="libcom_err-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152605" version="1" comment="libcom_err2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152606" version="1" comment="libcom_err2-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152607" version="1" comment="libext2fs-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152608" version="1" comment="libext2fs2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152609" version="1" comment="libmysql56client18 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152610" version="1" comment="libmysql56client18-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152611" version="1" comment="libmysql56client_r18 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152612" version="1" comment="libmysql56client_r18-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152613" version="1" comment="mysql-community-server is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152614" version="1" comment="mysql-community-server-bench is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152615" version="1" comment="mysql-community-server-client is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152616" version="1" comment="mysql-community-server-errormessages is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152617" version="1" comment="mysql-community-server-test is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152618" version="1" comment="mysql-community-server-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152619" version="1" comment="gcab is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152620" version="1" comment="gcab-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152621" version="1" comment="libgcab-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152622" version="1" comment="gstreamer-0_10-plugins-bad is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152623" version="1" comment="gstreamer-0_10-plugins-bad-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152624" version="1" comment="libgstbasecamerabinsrc-0_10-23 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152625" version="1" comment="libgstbasevideo-0_10-23 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152626" version="1" comment="libgstcodecparsers-0_10-23 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152627" version="1" comment="libgstphotography-0_10-23 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152628" version="1" comment="libgstsignalprocessor-0_10-23 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152629" version="1" comment="libgstvdp-0_10-23 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152630" version="1" comment="nbd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152631" version="1" comment="nbd-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152632" version="1" comment="libwmf-0_2-7 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152633" version="1" comment="libwmf-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152634" version="1" comment="pitivi is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152635" version="1" comment="pitivi-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155215" version="1" comment="dpkg is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155216" version="1" comment="dpkg-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155217" version="1" comment="dpkg-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154128" version="1" comment="update-alternatives is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152636" version="1" comment="privoxy is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152637" version="1" comment="p7zip is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152638" version="1" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152639" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152640" version="1" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152641" version="1" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152642" version="1" comment="libwebkit2gtk3-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152643" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152644" version="1" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152645" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152646" version="1" comment="webkit-jsc-4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152647" version="1" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152648" version="1" comment="webkit2gtk3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152649" version="1" comment="webkit2gtk3-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152650" version="1" comment="pigz is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152651" version="1" comment="chromedriver is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152652" version="1" comment="chromium is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152653" version="1" comment="chromium-desktop-gnome is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152654" version="1" comment="chromium-desktop-kde is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152655" version="1" comment="chromium-ffmpegsumo is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152656" version="1" comment="vsftpd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152657" version="1" comment="openldap2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152658" version="1" comment="libssh2-1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152659" version="1" comment="libXfont is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152660" version="1" comment="libXfont-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152661" version="1" comment="libXfont1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152662" version="1" comment="libxml2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152663" version="1" comment="libxml2-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152664" version="1" comment="libxml2-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152665" version="1" comment="libidn is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152666" version="1" comment="libidn-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152667" version="1" comment="libidn-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152668" version="1" comment="libidn11 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152669" version="1" comment="libidn11-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152670" version="1" comment="roundcubemail is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152671" version="1" comment="libarchive is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152672" version="1" comment="libarchive13-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152673" version="1" comment="mysql-connector-java is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152674" version="1" comment="java-1_8_0-openjdk is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152675" version="1" comment="java-1_8_0-openjdk-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152676" version="1" comment="java-1_8_0-openjdk-headless is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152677" version="1" comment="krb5-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152678" version="1" comment="krb5-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152679" version="1" comment="krb5-mini is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152680" version="1" comment="krb5-mini-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152681" version="1" comment="krb5-plugin-kdb-ldap is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152682" version="1" comment="krb5-plugin-preauth-otp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152683" version="1" comment="krb5-plugin-preauth-pkinit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152684" version="1" comment="krb5-server is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152685" version="1" comment="NetworkManager is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152686" version="1" comment="NetworkManager-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152687" version="1" comment="NetworkManager-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152688" version="1" comment="libnm-glib-vpn1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152689" version="1" comment="libnm-glib4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152690" version="1" comment="libnm-util2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152691" version="1" comment="libnm0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152692" version="1" comment="typelib-1_0-NM-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152693" version="1" comment="typelib-1_0-NMClient-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152694" version="1" comment="typelib-1_0-NetworkManager-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155218" version="1" comment="tcpdump is &lt;4.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152695" version="1" comment="libsvn_auth_gnome_keyring-1-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152696" version="1" comment="libsvn_auth_kwallet-1-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152697" version="1" comment="subversion-bash-completion is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152698" version="1" comment="subversion-ruby is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152701" version="1" comment="libcrypto36 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152702" version="1" comment="libcrypto36-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152703" version="1" comment="libopenssl-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152704" version="1" comment="libopenssl1_0_0-hmac is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152705" version="1" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152706" version="1" comment="libressl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152707" version="1" comment="libressl-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152708" version="1" comment="libressl-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152709" version="1" comment="libressl-devel-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152712" version="1" comment="libssl37 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152713" version="1" comment="libssl37-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152716" version="1" comment="libtls9 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152717" version="1" comment="libtls9-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152718" version="1" comment="openssl-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152719" version="1" comment="compat-openssl098 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152720" version="1" comment="libpolkit0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152721" version="1" comment="polkit-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152722" version="1" comment="ldb is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152723" version="1" comment="ldb-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152724" version="1" comment="libdcerpc-atsvc-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152725" version="1" comment="libdcerpc-atsvc0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152726" version="1" comment="libdcerpc-atsvc0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152727" version="1" comment="libdcerpc-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152728" version="1" comment="libdcerpc-samr-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152729" version="1" comment="libdcerpc-samr0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152730" version="1" comment="libdcerpc-samr0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152731" version="1" comment="libgensec-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152732" version="1" comment="libldb-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152733" version="1" comment="libldb1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152734" version="1" comment="libldb1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152735" version="1" comment="libndr-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152736" version="1" comment="libndr-krb5pac-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152737" version="1" comment="libndr-nbt-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152738" version="1" comment="libndr-standard-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152739" version="1" comment="libnetapi-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152740" version="1" comment="libregistry-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152741" version="1" comment="libregistry0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152742" version="1" comment="libsamba-credentials-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152743" version="1" comment="libsamba-hostconfig-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152744" version="1" comment="libsamba-passdb-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152745" version="1" comment="libsamba-policy-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152746" version="1" comment="libsamba-policy0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152747" version="1" comment="libsamba-policy0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152748" version="1" comment="libsamba-util-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152749" version="1" comment="libsamdb-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152750" version="1" comment="libsmbclient-raw-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152751" version="1" comment="libsmbclient0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152752" version="1" comment="libsmbconf-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152753" version="1" comment="libsmbldap-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152754" version="1" comment="libtalloc-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152755" version="1" comment="libtalloc2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152756" version="1" comment="libtalloc2-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152757" version="1" comment="libtdb-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152758" version="1" comment="libtdb1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152759" version="1" comment="libtdb1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152760" version="1" comment="libtevent-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152761" version="1" comment="libtevent-util-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152762" version="1" comment="libtevent0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152763" version="1" comment="libtevent0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152764" version="1" comment="libwbclient-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152765" version="1" comment="pyldb is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152766" version="1" comment="pyldb-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152767" version="1" comment="pyldb-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152768" version="1" comment="pytalloc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152769" version="1" comment="pytalloc-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152770" version="1" comment="pytalloc-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152771" version="1" comment="python-tdb is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152772" version="1" comment="python-tdb-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152773" version="1" comment="python-tevent is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152774" version="1" comment="python-tevent-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152775" version="1" comment="samba-core-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152776" version="1" comment="samba-pidl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152777" version="1" comment="samba-python is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152778" version="1" comment="samba-test is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152779" version="1" comment="samba-test-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152780" version="1" comment="talloc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152781" version="1" comment="tdb is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152782" version="1" comment="tdb-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152783" version="1" comment="tevent is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152784" version="1" comment="dnsmasq is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152785" version="1" comment="ppp-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152786" version="1" comment="perl-XML-LibXML is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152787" version="1" comment="libtasn1-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152788" version="1" comment="compat-libldap-2_3-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152789" version="1" comment="libldap-2_4-2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152790" version="1" comment="libldap-2_4-2-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152791" version="1" comment="libtcnative-1-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152792" version="1" comment="libtcnative-1-0-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152793" version="1" comment="openldap2-back-meta is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152794" version="1" comment="openldap2-back-perl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152795" version="1" comment="openldap2-back-sql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152796" version="1" comment="openldap2-client is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152797" version="1" comment="openldap2-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152798" version="1" comment="openldap2-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152799" version="1" comment="openldap2-devel-static is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152800" version="1" comment="openldap2-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152801" version="1" comment="socat is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152802" version="1" comment="ipsec-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152803" version="1" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152804" version="1" comment="MozillaThunderbird-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152805" version="1" comment="MozillaThunderbird-translations-other is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152806" version="1" comment="MozillaFirefox-branding-upstream is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152807" version="1" comment="MozillaFirefox-buildsymbols is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152808" version="1" comment="MozillaFirefox-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152809" version="1" comment="MozillaFirefox-translations-other is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152810" version="1" comment="libfreebl3-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152811" version="1" comment="libsoftokn3-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152812" version="1" comment="mozilla-nspr-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152813" version="1" comment="mozilla-nss-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152814" version="1" comment="mozilla-nss-certs-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152815" version="1" comment="mozilla-nss-sysinit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152816" version="1" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152817" version="1" comment="seamonkey is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152818" version="1" comment="seamonkey-dom-inspector is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152819" version="1" comment="seamonkey-irc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152820" version="1" comment="seamonkey-translations-common is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152821" version="1" comment="seamonkey-translations-other is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152822" version="1" comment="xulrunner is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152823" version="1" comment="xulrunner-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152824" version="1" comment="xulrunner-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152825" version="1" comment="java-1_7_0-openjdk is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152826" version="1" comment="java-1_7_0-openjdk-accessibility is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152827" version="1" comment="java-1_7_0-openjdk-bootstrap is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152828" version="1" comment="java-1_7_0-openjdk-bootstrap-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152829" version="1" comment="java-1_7_0-openjdk-bootstrap-headless is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152830" version="1" comment="java-1_7_0-openjdk-demo is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152831" version="1" comment="java-1_7_0-openjdk-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152832" version="1" comment="java-1_7_0-openjdk-headless is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152833" version="1" comment="java-1_7_0-openjdk-javadoc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152834" version="1" comment="java-1_7_0-openjdk-src is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152835" version="1" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152836" version="1" comment="java-1_8_0-openjdk-demo is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152837" version="1" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152838" version="1" comment="java-1_8_0-openjdk-src is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152839" version="1" comment="libmysqlclient_r18-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152840" version="1" comment="libmysqld-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152841" version="1" comment="mariadb-bench is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152842" version="1" comment="mariadb-test is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152843" version="1" comment="mariadb-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152844" version="1" comment="tomcat is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152845" version="1" comment="tomcat-admin-webapps is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152846" version="1" comment="tomcat-docs-webapp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152847" version="1" comment="tomcat-el-3_0-api is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152848" version="1" comment="tomcat-embed is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152849" version="1" comment="tomcat-javadoc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152850" version="1" comment="tomcat-jsp-2_3-api is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152851" version="1" comment="tomcat-jsvc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152852" version="1" comment="tomcat-lib is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152853" version="1" comment="tomcat-servlet-3_1-api is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152854" version="1" comment="tomcat-webapps is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152855" version="1" comment="sblim-sfcb is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152856" version="1" comment="libvmtools-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152857" version="1" comment="libvmtools0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152858" version="1" comment="open-vm-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152859" version="1" comment="open-vm-tools-desktop is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152860" version="1" comment="libvdpau1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152861" version="1" comment="libblkid-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152863" version="1" comment="libmount-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152864" version="1" comment="libmount-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152866" version="1" comment="libsmartcols-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152868" version="1" comment="libuuid-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152870" version="1" comment="python-libmount is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152871" version="1" comment="uuidd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152872" version="1" comment="cpp5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152873" version="1" comment="cross-aarch64-gcc48-icecream-backend is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152874" version="1" comment="cross-armv6hl-gcc48-icecream-backend is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152875" version="1" comment="cross-armv7hl-gcc48-icecream-backend is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152876" version="1" comment="cross-hppa-gcc48-icecream-backend is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152877" version="1" comment="cross-i386-gcc48-icecream-backend is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152878" version="1" comment="cross-ia64-gcc48-icecream-backend is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152879" version="1" comment="cross-ppc-gcc48-icecream-backend is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152880" version="1" comment="cross-ppc64-gcc48-icecream-backend is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152881" version="1" comment="cross-ppc64le-gcc48-icecream-backend is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152882" version="1" comment="cross-s390-gcc48-icecream-backend is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152883" version="1" comment="cross-s390x-gcc48-icecream-backend is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152884" version="1" comment="gcc48-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152885" version="1" comment="gcc48-ada is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152886" version="1" comment="gcc48-ada-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152887" version="1" comment="gcc48-fortran-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152888" version="1" comment="gcc48-gij-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152889" version="1" comment="gcc48-obj-c++ is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152890" version="1" comment="gcc48-objc-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152891" version="1" comment="gcc48-testresults is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152892" version="1" comment="gcc5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152893" version="1" comment="gcc5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152894" version="1" comment="gcc5-ada is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152895" version="1" comment="gcc5-ada-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152896" version="1" comment="gcc5-c++ is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152897" version="1" comment="gcc5-c++-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152898" version="1" comment="gcc5-fortran is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152899" version="1" comment="gcc5-fortran-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152900" version="1" comment="gcc5-go is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152901" version="1" comment="gcc5-go-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152902" version="1" comment="gcc5-info is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152903" version="1" comment="gcc5-locale is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152904" version="1" comment="gcc5-testresults is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152905" version="1" comment="gdb is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152906" version="1" comment="gdb-testresults is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152907" version="1" comment="gdbserver is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152908" version="1" comment="libada48 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152909" version="1" comment="libada48-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152910" version="1" comment="libada5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152911" version="1" comment="libada5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152912" version="1" comment="libasan0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152913" version="1" comment="libasan2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152914" version="1" comment="libasan2-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152915" version="1" comment="libatomic1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152916" version="1" comment="libatomic1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152917" version="1" comment="libatomic1-gcc48 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152918" version="1" comment="libatomic1-gcc48-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152919" version="1" comment="libcilkrts5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152920" version="1" comment="libcilkrts5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152921" version="1" comment="libffi-devel-gcc5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152922" version="1" comment="libffi-devel-gcc5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152923" version="1" comment="libffi-gcc5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152924" version="1" comment="libffi4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152925" version="1" comment="libffi4-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152926" version="1" comment="libffi4-gcc48 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152927" version="1" comment="libffi4-gcc48-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152928" version="1" comment="libffi48 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152929" version="1" comment="libffi48-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152930" version="1" comment="libffi48-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152931" version="1" comment="libgcc_s1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152932" version="1" comment="libgcc_s1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152933" version="1" comment="libgcc_s1-gcc48 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152934" version="1" comment="libgcj48-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152935" version="1" comment="libgcj48-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152936" version="1" comment="libgfortran3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152937" version="1" comment="libgfortran3-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152938" version="1" comment="libgfortran3-gcc48 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152939" version="1" comment="libgfortran3-gcc48-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152940" version="1" comment="libgo7 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152941" version="1" comment="libgo7-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152942" version="1" comment="libgomp1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152943" version="1" comment="libgomp1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152944" version="1" comment="libgomp1-gcc48 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152945" version="1" comment="libgomp1-gcc48-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152946" version="1" comment="libitm1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152947" version="1" comment="libitm1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152948" version="1" comment="libitm1-gcc48 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152949" version="1" comment="libitm1-gcc48-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152950" version="1" comment="liblsan0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152951" version="1" comment="libmpx0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152952" version="1" comment="libmpx0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152953" version="1" comment="libmpxwrappers0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152954" version="1" comment="libmpxwrappers0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152955" version="1" comment="libobjc4-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152956" version="1" comment="libquadmath0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152957" version="1" comment="libquadmath0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152958" version="1" comment="libquadmath0-gcc48 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152959" version="1" comment="libquadmath0-gcc48-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152960" version="1" comment="libstdc++48-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152961" version="1" comment="libstdc++48-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152962" version="1" comment="libstdc++6 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152963" version="1" comment="libstdc++6-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152964" version="1" comment="libstdc++6-devel-gcc5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152965" version="1" comment="libstdc++6-devel-gcc5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152966" version="1" comment="libstdc++6-gcc48 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152967" version="1" comment="libstdc++6-gcc48-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152968" version="1" comment="libstdc++6-locale is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152969" version="1" comment="libtsan0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152970" version="1" comment="libtsan0-gcc48 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152971" version="1" comment="libubsan0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152972" version="1" comment="libubsan0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152973" version="1" comment="libmbedtls9 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152974" version="1" comment="libmbedtls9-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152975" version="1" comment="mbedtls is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152976" version="1" comment="mbedtls-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152977" version="1" comment="yast2-ntp-client is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152978" version="1" comment="yast2-ntp-client-devel-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152979" version="1" comment="putty is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152980" version="1" comment="pdns is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152981" version="1" comment="pdns-backend-ldap is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152982" version="1" comment="pdns-backend-lua is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152983" version="1" comment="pdns-backend-mydns is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152984" version="1" comment="pdns-backend-mysql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152985" version="1" comment="pdns-backend-postgresql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152986" version="1" comment="pdns-backend-sqlite3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152987" version="1" comment="libvirt-client-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152989" version="1" comment="libvirt-daemon-uml is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152990" version="1" comment="libvirt-daemon-vbox is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152991" version="1" comment="libvirt-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152992" version="1" comment="libvirt-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152993" version="1" comment="libvirt-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152994" version="1" comment="libvirt-lock-sanlock is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152995" version="1" comment="libvirt-login-shell is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152996" version="1" comment="ctdb is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152997" version="1" comment="ctdb-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152998" version="1" comment="ctdb-tests is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152999" version="1" comment="libav is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153000" version="1" comment="libav-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153001" version="1" comment="libavcodec-libav-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153002" version="1" comment="libavcodec-libav56 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153003" version="1" comment="libavdevice-libav-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153004" version="1" comment="libavdevice-libav55 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153005" version="1" comment="libavfilter-libav-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153006" version="1" comment="libavfilter-libav5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153007" version="1" comment="libavformat-libav-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153008" version="1" comment="libavformat-libav56 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153009" version="1" comment="libavresample-libav-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153010" version="1" comment="libavresample-libav2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153011" version="1" comment="libavutil-libav-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153012" version="1" comment="libavutil-libav54 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153013" version="1" comment="libswscale-libav-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153014" version="1" comment="libswscale-libav3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153015" version="1" comment="libtidy-0_99-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153016" version="1" comment="libtidy-0_99-0-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153017" version="1" comment="tidy is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153018" version="1" comment="libbotan-1_10-1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153019" version="1" comment="qemu-guest-agent is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153020" version="1" comment="qemu-testsuite is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153021" version="1" comment="libvlc5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153022" version="1" comment="libvlccore8 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153023" version="1" comment="vlc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153024" version="1" comment="vlc-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153025" version="1" comment="vlc-gnome is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153026" version="1" comment="vlc-noX is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153027" version="1" comment="vlc-noX-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153028" version="1" comment="vlc-qt is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153029" version="1" comment="libminiupnpc-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153030" version="1" comment="libminiupnpc10-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153031" version="1" comment="miniupnpc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153032" version="1" comment="python-miniupnpc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153033" version="1" comment="wireshark-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153034" version="1" comment="wireshark-ui-qt is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153035" version="1" comment="libsrtp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153036" version="1" comment="libsrtp-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153037" version="1" comment="libsrtp1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153038" version="1" comment="libsrtp1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153039" version="1" comment="libpgf6 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153040" version="1" comment="nodejs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153041" version="1" comment="nodejs-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153042" version="1" comment="nodejs-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153043" version="1" comment="nodejs-docs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153044" version="1" comment="npm is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153045" version="1" comment="rpcbind is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153046" version="1" comment="nodejs-npm is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153047" version="1" comment="libgcrypt is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153048" version="1" comment="libgcrypt-cavs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153049" version="1" comment="libgcrypt-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153050" version="1" comment="libgcrypt20-hmac is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153051" version="1" comment="libgcrypt20-hmac-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150703" version="1" comment="libruby2_2-2_2 is &lt;2.2.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153052" version="1" comment="libruby2_2-2_2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150704" version="1" comment="ruby2.2 is &lt;2.2.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153053" version="1" comment="ruby2.2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150705" version="1" comment="ruby2.2-devel is &lt;2.2.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153054" version="1" comment="ruby2.2-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150706" version="1" comment="ruby2.2-devel-extra is &lt;2.2.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153055" version="1" comment="ruby2.2-devel-extra is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150707" version="1" comment="ruby2.2-doc is &lt;2.2.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153056" version="1" comment="ruby2.2-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150708" version="1" comment="ruby2.2-doc-ri is &lt;2.2.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153057" version="1" comment="ruby2.2-doc-ri is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150709" version="1" comment="ruby2.2-stdlib is &lt;2.2.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153058" version="1" comment="ruby2.2-stdlib is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150710" version="1" comment="ruby2.2-tk is &lt;2.2.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153059" version="1" comment="ruby2.2-tk is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153060" version="1" comment="gdk-pixbuf is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153061" version="1" comment="gdk-pixbuf-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153062" version="1" comment="giflib is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153063" version="1" comment="giflib-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153064" version="1" comment="giflib-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153065" version="1" comment="giflib-progs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153066" version="1" comment="libgif6 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153067" version="1" comment="libgif6-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153068" version="1" comment="bouncycastle is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153069" version="1" comment="bouncycastle-javadoc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153070" version="1" comment="ruby2.1-rubygem-actionpack-4_2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153071" version="1" comment="ruby2.1-rubygem-actionpack-doc-4_2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153072" version="1" comment="ruby2.1-rubygem-actionview-4_2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153073" version="1" comment="ruby2.1-rubygem-actionview-doc-4_2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153074" version="1" comment="ruby2.1-rubygem-activemodel-4_2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153075" version="1" comment="ruby2.1-rubygem-activemodel-doc-4_2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153076" version="1" comment="ruby2.1-rubygem-activerecord-4_2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153077" version="1" comment="ruby2.1-rubygem-activerecord-doc-4_2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153078" version="1" comment="ruby2.1-rubygem-activesupport-4_2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153079" version="1" comment="ruby2.1-rubygem-activesupport-doc-4_2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153080" version="1" comment="rubygem-actionpack-4_2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153081" version="1" comment="rubygem-actionview-4_2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153082" version="1" comment="rubygem-activemodel-4_2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153083" version="1" comment="rubygem-activerecord-4_2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153084" version="1" comment="rubygem-activesupport-4_2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153085" version="1" comment="ruby2.1-rubygem-rails-html-sanitizer is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153086" version="1" comment="ruby2.1-rubygem-rails-html-sanitizer-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153087" version="1" comment="ruby2.1-rubygem-rails-html-sanitizer-testsuite is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153088" version="1" comment="rubygem-rails-html-sanitizer is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153089" version="1" comment="audiofile is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153090" version="1" comment="audiofile-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153091" version="1" comment="audiofile-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153092" version="1" comment="audiofile-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153093" version="1" comment="libaudiofile1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153094" version="1" comment="libaudiofile1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153095" version="1" comment="gummi is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153096" version="1" comment="gummi-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153097" version="1" comment="phpMyAdmin is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153098" version="1" comment="libpng12 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153099" version="1" comment="libpng12-compat-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153100" version="1" comment="libpng12-compat-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153101" version="1" comment="libpng12-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153102" version="1" comment="bind-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153103" version="1" comment="bind-libs-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153104" version="1" comment="bind-lwresd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147185" version="1" comment="icinga is &lt;1.14.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153105" version="1" comment="icinga is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147186" version="1" comment="icinga-devel is &lt;1.14.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153106" version="1" comment="icinga-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147187" version="1" comment="icinga-doc is &lt;1.14.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153107" version="1" comment="icinga-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147188" version="1" comment="icinga-idoutils is &lt;1.14.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153108" version="1" comment="icinga-idoutils is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147189" version="1" comment="icinga-idoutils-mysql is &lt;1.14.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153109" version="1" comment="icinga-idoutils-mysql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147190" version="1" comment="icinga-idoutils-oracle is &lt;1.14.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153110" version="1" comment="icinga-idoutils-oracle is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147191" version="1" comment="icinga-idoutils-pgsql is &lt;1.14.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153111" version="1" comment="icinga-idoutils-pgsql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147192" version="1" comment="icinga-plugins-downtimes is &lt;1.14.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153112" version="1" comment="icinga-plugins-downtimes is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147193" version="1" comment="icinga-plugins-eventhandlers is &lt;1.14.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153113" version="1" comment="icinga-plugins-eventhandlers is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147194" version="1" comment="icinga-www is &lt;1.14.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153114" version="1" comment="icinga-www is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147195" version="1" comment="icinga-www-config is &lt;1.14.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153115" version="1" comment="icinga-www-config is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147196" version="1" comment="monitoring-tools is &lt;1.14.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153116" version="1" comment="strongswan is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153117" version="1" comment="strongswan-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153118" version="1" comment="strongswan-hmac is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153119" version="1" comment="strongswan-ipsec is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153120" version="1" comment="strongswan-libs0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153121" version="1" comment="strongswan-mysql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153122" version="1" comment="strongswan-nm is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153123" version="1" comment="strongswan-sqlite is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153124" version="1" comment="xscreensaver is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153125" version="1" comment="xscreensaver-data is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153126" version="1" comment="xscreensaver-data-extra is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153127" version="1" comment="cyrus-imapd-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153128" version="1" comment="cyrus-imapd-snmp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153129" version="1" comment="cyrus-imapd-snmp-mibs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153130" version="1" comment="cyrus-imapd-utils is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153131" version="1" comment="libpng15 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153132" version="1" comment="libpng15-15 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153133" version="1" comment="libpng15-15-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153134" version="1" comment="libpng16 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153135" version="1" comment="libpng16-compat-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153136" version="1" comment="libpng16-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153137" version="1" comment="libpng16-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153138" version="1" comment="ffmpeg is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153139" version="1" comment="ffmpeg-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153140" version="1" comment="libavcodec-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153141" version="1" comment="libavcodec56 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153142" version="1" comment="libavcodec56-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153143" version="1" comment="libavdevice-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153144" version="1" comment="libavdevice56 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153145" version="1" comment="libavdevice56-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153146" version="1" comment="libavfilter-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153147" version="1" comment="libavfilter5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153148" version="1" comment="libavfilter5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153149" version="1" comment="libavformat-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153150" version="1" comment="libavformat56 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153151" version="1" comment="libavformat56-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153152" version="1" comment="libavresample-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153153" version="1" comment="libavresample2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153154" version="1" comment="libavresample2-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153155" version="1" comment="libavutil-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153156" version="1" comment="libavutil54 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153157" version="1" comment="libavutil54-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153158" version="1" comment="libpostproc-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153159" version="1" comment="libpostproc53 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153160" version="1" comment="libpostproc53-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153161" version="1" comment="libswresample-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153162" version="1" comment="libswresample1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153163" version="1" comment="libswresample1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153164" version="1" comment="libswscale-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153165" version="1" comment="libswscale3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153166" version="1" comment="libswscale3-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153167" version="1" comment="openssh-askpass-gnome is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153168" version="1" comment="openssh-cavs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153169" version="1" comment="openssh-fips is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153170" version="1" comment="cups-filters-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153171" version="1" comment="libraw is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153172" version="1" comment="libraw-devel-static is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153173" version="1" comment="libraw-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153174" version="1" comment="cacti-spine is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153175" version="1" comment="grub2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153176" version="1" comment="grub2-branding-upstream is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153177" version="1" comment="grub2-i386-efi is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153178" version="1" comment="grub2-i386-pc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153179" version="1" comment="grub2-snapper-plugin is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153180" version="1" comment="grub2-x86_64-efi is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153181" version="1" comment="grub2-x86_64-xen is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144698" version="1" comment="shellinabox is &lt;2.20-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153182" version="1" comment="shellinabox is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150711" version="1" comment="libpng12 is &lt;1.2.50-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150712" version="1" comment="libpng12-0 is &lt;1.2.50-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150713" version="1" comment="libpng12-0-32bit is &lt;1.2.50-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150714" version="1" comment="libpng12-compat-devel is &lt;1.2.50-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150715" version="1" comment="libpng12-compat-devel-32bit is &lt;1.2.50-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150716" version="1" comment="libpng12-devel is &lt;1.2.50-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150717" version="1" comment="libpng12-devel-32bit is &lt;1.2.50-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154523" version="1" comment="libpng15 is &lt;1.5.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154524" version="1" comment="libpng15-15 is &lt;1.5.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154525" version="1" comment="libpng15-15-32bit is &lt;1.5.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153183" version="1" comment="quassel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153184" version="1" comment="quassel-base is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153185" version="1" comment="quassel-client is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153186" version="1" comment="quassel-core is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153187" version="1" comment="quassel-mono is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153188" version="1" comment="dhcp-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153189" version="1" comment="claws-mail-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153190" version="1" comment="go is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153191" version="1" comment="go-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153192" version="1" comment="gajim is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153193" version="1" comment="gajim-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153194" version="1" comment="drbd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153195" version="1" comment="drbd-kmp-default is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153196" version="1" comment="drbd-kmp-pv is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153197" version="1" comment="drbd-kmp-xen is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153198" version="1" comment="hdjmod is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153199" version="1" comment="hdjmod-kmp-default is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153200" version="1" comment="hdjmod-kmp-pae is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153201" version="1" comment="hdjmod-kmp-pv is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153202" version="1" comment="hdjmod-kmp-xen is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153203" version="1" comment="ipset is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153204" version="1" comment="ipset-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153205" version="1" comment="ipset-kmp-default is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153206" version="1" comment="ipset-kmp-pae is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153207" version="1" comment="ipset-kmp-pv is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153208" version="1" comment="ipset-kmp-xen is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153209" version="1" comment="libipset3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153210" version="1" comment="lttng-modules is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153211" version="1" comment="lttng-modules-kmp-default is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153212" version="1" comment="lttng-modules-kmp-pv is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153213" version="1" comment="pcfclock is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153214" version="1" comment="pcfclock-kmp-default is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153215" version="1" comment="pcfclock-kmp-pae is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153216" version="1" comment="pcfclock-kmp-pv is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153217" version="1" comment="vhba-kmp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153218" version="1" comment="vhba-kmp-default is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153219" version="1" comment="vhba-kmp-pae is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153220" version="1" comment="vhba-kmp-pv is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153221" version="1" comment="vhba-kmp-xen is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153222" version="1" comment="libhogweed2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153223" version="1" comment="libhogweed2-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153224" version="1" comment="libnettle is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153225" version="1" comment="libnettle-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153226" version="1" comment="libnettle-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153227" version="1" comment="libnettle4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153228" version="1" comment="libnettle4-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153229" version="1" comment="nettle is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153230" version="1" comment="pidgin-otr is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153231" version="1" comment="perl-base-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153232" version="1" comment="jq is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153233" version="1" comment="libjq-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153234" version="1" comment="libjq1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153235" version="1" comment="libpoppler-cpp0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153236" version="1" comment="libpoppler-glib-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153237" version="1" comment="libpoppler-qt4-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153238" version="1" comment="libpoppler-qt5-1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153239" version="1" comment="libpoppler-qt5-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153240" version="1" comment="poppler is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153241" version="1" comment="poppler-qt is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153242" version="1" comment="poppler-qt5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153243" version="1" comment="typelib-1_0-Poppler-0_18 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153244" version="1" comment="ocaml is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153245" version="1" comment="ocaml-compiler-libs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153246" version="1" comment="ocaml-compiler-libs-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153247" version="1" comment="ocaml-docs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153248" version="1" comment="ocaml-emacs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153249" version="1" comment="ocaml-ocamldoc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153250" version="1" comment="ocaml-rpm-macros is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153251" version="1" comment="ocaml-runtime is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153252" version="1" comment="ocaml-source is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153253" version="1" comment="ocaml-x11 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153254" version="1" comment="dosfstools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146257" version="1" comment="dnsmasq is &lt;2.71-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146258" version="1" comment="dnsmasq-utils is &lt;2.71-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153255" version="1" comment="dnsmasq-utils is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153256" version="1" comment="squidGuard is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153257" version="1" comment="squidGuard-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153258" version="1" comment="harfbuzz is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153259" version="1" comment="harfbuzz-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153260" version="1" comment="harfbuzz-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153261" version="1" comment="libharfbuzz-icu0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153262" version="1" comment="libharfbuzz-icu0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153263" version="1" comment="libharfbuzz0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153264" version="1" comment="libharfbuzz0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135938" version="1" comment="gnuchess is &lt;6.2.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153265" version="1" comment="gnuchess is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150253" version="1" comment="php5-firebird is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150254" version="1" comment="php5-mssql is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150255" version="1" comment="php5-readline is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150256" version="1" comment="php5-tidy is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153266" version="1" comment="python-virtualbox is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153267" version="1" comment="virtualbox-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153268" version="1" comment="virtualbox-guest-desktop-icons is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153269" version="1" comment="virtualbox-host-source is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153270" version="1" comment="virtualbox-websrv is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155219" version="1" comment="libcrypto41 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155220" version="1" comment="libcrypto41-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155221" version="1" comment="libssl43 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155222" version="1" comment="libssl43-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155223" version="1" comment="libtls15 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155224" version="1" comment="libtls15-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153271" version="1" comment="libxerces-c-3_1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153272" version="1" comment="libxerces-c-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153273" version="1" comment="xerces-c is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153274" version="1" comment="apache2-event is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153275" version="1" comment="apache2-worker is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153276" version="1" comment="libssh is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153277" version="1" comment="libssh-devel-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153278" version="1" comment="libssh4-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153279" version="1" comment="python-Pillow-tk is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153280" version="1" comment="nginx is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153281" version="1" comment="libspice-server-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153282" version="1" comment="spice is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153283" version="1" comment="spice-client is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153284" version="1" comment="libcurl-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153285" version="1" comment="libcurl4-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153286" version="1" comment="apache-commons-dbcp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153287" version="1" comment="apache-commons-dbcp-javadoc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153288" version="1" comment="apache-commons-pool2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153289" version="1" comment="apache-commons-pool2-javadoc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153290" version="1" comment="python-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153291" version="1" comment="python-base-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153292" version="1" comment="python-demo is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153293" version="1" comment="python-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153294" version="1" comment="python-doc-pdf is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153295" version="1" comment="python-idle is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153296" version="1" comment="python-tk is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153297" version="1" comment="libssh2-1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153298" version="1" comment="libssh2-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153299" version="1" comment="libssh2_org is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153300" version="1" comment="cmis-client is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153301" version="1" comment="hunspell is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153302" version="1" comment="hunspell-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153303" version="1" comment="hunspell-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153304" version="1" comment="hunspell-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153305" version="1" comment="hunspell-static is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153306" version="1" comment="hunspell-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153307" version="1" comment="hyphen is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153308" version="1" comment="hyphen-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153309" version="1" comment="libcmis-0_5-5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153310" version="1" comment="libcmis-c-0_5-5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153311" version="1" comment="libcmis-c-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153312" version="1" comment="libcmis-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153313" version="1" comment="libetonyek is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153314" version="1" comment="libetonyek-0_1-1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153315" version="1" comment="libetonyek-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153316" version="1" comment="libetonyek-devel-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153317" version="1" comment="libetonyek-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153318" version="1" comment="libhyphen0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153319" version="1" comment="libhyphen0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153320" version="1" comment="libixion is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153321" version="1" comment="libixion-0_11-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153322" version="1" comment="libixion-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153323" version="1" comment="libixion-python3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153324" version="1" comment="libixion-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153325" version="1" comment="liborcus is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153326" version="1" comment="liborcus-0_11-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153327" version="1" comment="liborcus-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153328" version="1" comment="liborcus-python3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153329" version="1" comment="liborcus-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153330" version="1" comment="libreoffice-base-drivers-postgresql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153331" version="1" comment="libreoffice-gdb-pretty-printers is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153332" version="1" comment="libreoffice-glade is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153333" version="1" comment="libreoffice-gtk3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153334" version="1" comment="libreoffice-l10n-af is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153335" version="1" comment="libreoffice-l10n-ar is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153336" version="1" comment="libreoffice-l10n-as is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153337" version="1" comment="libreoffice-l10n-bg is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153338" version="1" comment="libreoffice-l10n-bn is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153339" version="1" comment="libreoffice-l10n-br is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153340" version="1" comment="libreoffice-l10n-ca is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153341" version="1" comment="libreoffice-l10n-cy is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153342" version="1" comment="libreoffice-l10n-dz is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153343" version="1" comment="libreoffice-l10n-et is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153344" version="1" comment="libreoffice-l10n-eu is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153345" version="1" comment="libreoffice-l10n-fa is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153346" version="1" comment="libreoffice-l10n-fi is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153347" version="1" comment="libreoffice-l10n-ga is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153348" version="1" comment="libreoffice-l10n-gl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153349" version="1" comment="libreoffice-l10n-gu is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153350" version="1" comment="libreoffice-l10n-he is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153351" version="1" comment="libreoffice-l10n-hi is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153352" version="1" comment="libreoffice-l10n-hr is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153353" version="1" comment="libreoffice-l10n-kk is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153354" version="1" comment="libreoffice-l10n-kn is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153355" version="1" comment="libreoffice-l10n-ko is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153356" version="1" comment="libreoffice-l10n-lt is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153357" version="1" comment="libreoffice-l10n-lv is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153358" version="1" comment="libreoffice-l10n-mai is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153359" version="1" comment="libreoffice-l10n-ml is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153360" version="1" comment="libreoffice-l10n-mr is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153361" version="1" comment="libreoffice-l10n-nb is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153362" version="1" comment="libreoffice-l10n-nl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153363" version="1" comment="libreoffice-l10n-nn is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153364" version="1" comment="libreoffice-l10n-nr is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153365" version="1" comment="libreoffice-l10n-nso is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153366" version="1" comment="libreoffice-l10n-or is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153367" version="1" comment="libreoffice-l10n-pa is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153368" version="1" comment="libreoffice-l10n-pt-BR is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153369" version="1" comment="libreoffice-l10n-pt-PT is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153370" version="1" comment="libreoffice-l10n-ro is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153371" version="1" comment="libreoffice-l10n-si is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153372" version="1" comment="libreoffice-l10n-sk is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153373" version="1" comment="libreoffice-l10n-sl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153374" version="1" comment="libreoffice-l10n-sr is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153375" version="1" comment="libreoffice-l10n-ss is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153376" version="1" comment="libreoffice-l10n-st is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153377" version="1" comment="libreoffice-l10n-sv is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153378" version="1" comment="libreoffice-l10n-ta is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153379" version="1" comment="libreoffice-l10n-te is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153380" version="1" comment="libreoffice-l10n-th is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153381" version="1" comment="libreoffice-l10n-tn is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153382" version="1" comment="libreoffice-l10n-tr is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153383" version="1" comment="libreoffice-l10n-ts is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153384" version="1" comment="libreoffice-l10n-uk is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153385" version="1" comment="libreoffice-l10n-ve is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153386" version="1" comment="libreoffice-l10n-xh is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153387" version="1" comment="libreoffice-l10n-zh-Hans is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153388" version="1" comment="libreoffice-l10n-zh-Hant is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153389" version="1" comment="libreoffice-l10n-zu is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153390" version="1" comment="libreoffice-officebean is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153391" version="1" comment="libreoffice-sdk is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153392" version="1" comment="libreoffice-sdk-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153393" version="1" comment="libreofficekit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153394" version="1" comment="libreofficekit-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153395" version="1" comment="libvisio is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153396" version="1" comment="libvisio-0_1-1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153397" version="1" comment="libvisio-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153398" version="1" comment="libvisio-devel-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153399" version="1" comment="libvisio-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153400" version="1" comment="libwps is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153401" version="1" comment="libwps-0_4-4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153402" version="1" comment="libwps-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153403" version="1" comment="libwps-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153404" version="1" comment="mdds-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153405" version="1" comment="mdds-1_0-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153406" version="1" comment="myspell-af_NA is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153407" version="1" comment="myspell-af_ZA is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153408" version="1" comment="myspell-an is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153409" version="1" comment="myspell-an_ES is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153410" version="1" comment="myspell-ar is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153411" version="1" comment="myspell-ar_AE is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153412" version="1" comment="myspell-ar_BH is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153413" version="1" comment="myspell-ar_DZ is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153414" version="1" comment="myspell-ar_EG is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153415" version="1" comment="myspell-ar_IQ is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153416" version="1" comment="myspell-ar_JO is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153417" version="1" comment="myspell-ar_KW is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153418" version="1" comment="myspell-ar_LB is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153419" version="1" comment="myspell-ar_LY is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153420" version="1" comment="myspell-ar_MA is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153421" version="1" comment="myspell-ar_OM is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153422" version="1" comment="myspell-ar_QA is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153423" version="1" comment="myspell-ar_SA is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153424" version="1" comment="myspell-ar_SD is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153425" version="1" comment="myspell-ar_SY is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153426" version="1" comment="myspell-ar_TN is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153427" version="1" comment="myspell-ar_YE is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153428" version="1" comment="myspell-be_BY is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153429" version="1" comment="myspell-bg_BG is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153430" version="1" comment="myspell-bn_BD is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153431" version="1" comment="myspell-bn_IN is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153432" version="1" comment="myspell-br_FR is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153433" version="1" comment="myspell-bs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153434" version="1" comment="myspell-bs_BA is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153435" version="1" comment="myspell-ca is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153436" version="1" comment="myspell-ca_AD is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153437" version="1" comment="myspell-ca_ES is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153438" version="1" comment="myspell-ca_ES_valencia is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153439" version="1" comment="myspell-ca_FR is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153440" version="1" comment="myspell-ca_IT is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153441" version="1" comment="myspell-cs_CZ is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153442" version="1" comment="myspell-da_DK is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153443" version="1" comment="myspell-de is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153444" version="1" comment="myspell-de_AT is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153445" version="1" comment="myspell-de_CH is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153446" version="1" comment="myspell-de_DE is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153447" version="1" comment="myspell-dictionaries is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153448" version="1" comment="myspell-el_GR is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153449" version="1" comment="myspell-en is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153450" version="1" comment="myspell-en_AU is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153451" version="1" comment="myspell-en_BS is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153452" version="1" comment="myspell-en_BZ is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153453" version="1" comment="myspell-en_CA is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153454" version="1" comment="myspell-en_GB is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153455" version="1" comment="myspell-en_GH is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153456" version="1" comment="myspell-en_IE is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153457" version="1" comment="myspell-en_IN is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153458" version="1" comment="myspell-en_JM is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153459" version="1" comment="myspell-en_MW is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153460" version="1" comment="myspell-en_NA is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153461" version="1" comment="myspell-en_NZ is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153462" version="1" comment="myspell-en_PH is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153463" version="1" comment="myspell-en_TT is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153464" version="1" comment="myspell-en_US is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153465" version="1" comment="myspell-en_ZA is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153466" version="1" comment="myspell-en_ZW is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153467" version="1" comment="myspell-es is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153468" version="1" comment="myspell-es_AR is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153469" version="1" comment="myspell-es_BO is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153470" version="1" comment="myspell-es_CL is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153471" version="1" comment="myspell-es_CO is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153472" version="1" comment="myspell-es_CR is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153473" version="1" comment="myspell-es_CU is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153474" version="1" comment="myspell-es_DO is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153475" version="1" comment="myspell-es_EC is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153476" version="1" comment="myspell-es_ES is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153477" version="1" comment="myspell-es_GT is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153478" version="1" comment="myspell-es_HN is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153479" version="1" comment="myspell-es_MX is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153480" version="1" comment="myspell-es_NI is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153481" version="1" comment="myspell-es_PA is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153482" version="1" comment="myspell-es_PE is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153483" version="1" comment="myspell-es_PR is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153484" version="1" comment="myspell-es_PY is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153485" version="1" comment="myspell-es_SV is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153486" version="1" comment="myspell-es_UY is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153487" version="1" comment="myspell-es_VE is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153488" version="1" comment="myspell-et_EE is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153489" version="1" comment="myspell-fr_BE is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153490" version="1" comment="myspell-fr_CA is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153491" version="1" comment="myspell-fr_CH is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153492" version="1" comment="myspell-fr_FR is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153493" version="1" comment="myspell-fr_LU is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153494" version="1" comment="myspell-fr_MC is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153495" version="1" comment="myspell-gd_GB is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153496" version="1" comment="myspell-gl is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153497" version="1" comment="myspell-gl_ES is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153498" version="1" comment="myspell-gu_IN is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153499" version="1" comment="myspell-gug is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153500" version="1" comment="myspell-gug_PY is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153501" version="1" comment="myspell-he_IL is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153502" version="1" comment="myspell-hi_IN is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153503" version="1" comment="myspell-hr_HR is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153504" version="1" comment="myspell-hu_HU is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153505" version="1" comment="myspell-is is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153506" version="1" comment="myspell-is_IS is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153507" version="1" comment="myspell-it_IT is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153508" version="1" comment="myspell-kmr_Latn is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153509" version="1" comment="myspell-kmr_Latn_SY is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153510" version="1" comment="myspell-kmr_Latn_TR is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153511" version="1" comment="myspell-lightproof-en is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153512" version="1" comment="myspell-lightproof-hu_HU is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153513" version="1" comment="myspell-lightproof-pt_BR is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153514" version="1" comment="myspell-lightproof-ru_RU is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153515" version="1" comment="myspell-lo_LA is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153516" version="1" comment="myspell-lt_LT is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153517" version="1" comment="myspell-lv_LV is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153518" version="1" comment="myspell-nb_NO is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153519" version="1" comment="myspell-ne_NP is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153520" version="1" comment="myspell-nl_BE is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153521" version="1" comment="myspell-nl_NL is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153522" version="1" comment="myspell-nn_NO is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153523" version="1" comment="myspell-no is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153524" version="1" comment="myspell-oc_FR is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153525" version="1" comment="myspell-pl_PL is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153526" version="1" comment="myspell-pt_AO is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153527" version="1" comment="myspell-pt_BR is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153528" version="1" comment="myspell-pt_PT is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153529" version="1" comment="myspell-ro is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153530" version="1" comment="myspell-ro_RO is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153531" version="1" comment="myspell-ru_RU is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153532" version="1" comment="myspell-si_LK is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153533" version="1" comment="myspell-sk_SK is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153534" version="1" comment="myspell-sl_SI is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153535" version="1" comment="myspell-sr is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153536" version="1" comment="myspell-sr_CS is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153537" version="1" comment="myspell-sr_Latn_CS is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153538" version="1" comment="myspell-sr_Latn_RS is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153539" version="1" comment="myspell-sr_RS is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153540" version="1" comment="myspell-sv_FI is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153541" version="1" comment="myspell-sv_SE is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153542" version="1" comment="myspell-sw_TZ is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153543" version="1" comment="myspell-te is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153544" version="1" comment="myspell-te_IN is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153545" version="1" comment="myspell-th_TH is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153546" version="1" comment="myspell-uk_UA is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153547" version="1" comment="myspell-vi is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153548" version="1" comment="myspell-vi_VN is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153549" version="1" comment="myspell-zu_ZA is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153550" version="1" comment="apache2-mod_fcgid is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153551" version="1" comment="python-Twisted is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153552" version="1" comment="python-Twisted-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149238" version="1" comment="ImageMagick is &lt;6.8.8.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149239" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149240" version="1" comment="ImageMagick-devel-32bit is &lt;6.8.8.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149241" version="1" comment="ImageMagick-doc is &lt;6.8.8.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149242" version="1" comment="ImageMagick-extra is &lt;6.8.8.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149243" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149244" version="1" comment="libMagick++-6_Q16-3-32bit is &lt;6.8.8.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149245" version="1" comment="libMagick++-devel is &lt;6.8.8.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149246" version="1" comment="libMagick++-devel-32bit is &lt;6.8.8.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149247" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149248" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149249" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149250" version="1" comment="libMagickWand-6_Q16-1-32bit is &lt;6.8.8.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149251" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150718" version="1" comment="libpng16 is &lt;1.6.8-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150719" version="1" comment="libpng16-16 is &lt;1.6.8-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150720" version="1" comment="libpng16-16-32bit is &lt;1.6.8-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150721" version="1" comment="libpng16-compat-devel is &lt;1.6.8-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150722" version="1" comment="libpng16-compat-devel-32bit is &lt;1.6.8-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150723" version="1" comment="libpng16-devel is &lt;1.6.8-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150724" version="1" comment="libpng16-devel-32bit is &lt;1.6.8-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150725" version="1" comment="libpng16-tools is &lt;1.6.8-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147293" version="1" comment="libpcsclite1 is &lt;1.8.14-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147294" version="1" comment="libpcsclite1-32bit is &lt;1.8.14-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153553" version="1" comment="libpcsclite1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147295" version="1" comment="libpcscspy0 is &lt;1.8.14-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153554" version="1" comment="libpcscspy0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147296" version="1" comment="libpcscspy0-32bit is &lt;1.8.14-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153555" version="1" comment="libpcscspy0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147297" version="1" comment="pcsc-lite is &lt;1.8.14-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147298" version="1" comment="pcsc-lite-devel is &lt;1.8.14-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153556" version="1" comment="pcsc-lite-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153557" version="1" comment="libgit2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153558" version="1" comment="libgit2-22 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153559" version="1" comment="libgit2-22-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153560" version="1" comment="libgit2-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153561" version="1" comment="mupdf is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153562" version="1" comment="mupdf-devel-static is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148933" version="1" comment="libXpm is &lt;3.5.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153563" version="1" comment="libXpm is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148934" version="1" comment="libXpm-devel is &lt;3.5.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153564" version="1" comment="libXpm-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148935" version="1" comment="libXpm-devel-32bit is &lt;3.5.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153565" version="1" comment="libXpm-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148936" version="1" comment="libXpm-tools is &lt;3.5.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153566" version="1" comment="libXpm-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148937" version="1" comment="libXpm4 is &lt;3.5.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153567" version="1" comment="libXpm4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148938" version="1" comment="libXpm4-32bit is &lt;3.5.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153568" version="1" comment="libXpm4-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148800" version="1" comment="gd is &lt;2.1.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148801" version="1" comment="gd-32bit is &lt;2.1.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148802" version="1" comment="gd-devel is &lt;2.1.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153569" version="1" comment="gd-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149469" version="1" comment="bitlbee is &lt;3.4.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153570" version="1" comment="bitlbee is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149470" version="1" comment="bitlbee-doc is &lt;3.4.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153571" version="1" comment="bitlbee-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153915" version="1" comment="gstreamer-plugins-good is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153916" version="1" comment="gstreamer-plugins-good-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153917" version="1" comment="gstreamer-plugins-good-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153918" version="1" comment="gstreamer-plugins-good-extra is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153919" version="1" comment="gstreamer-plugins-good-extra-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153920" version="1" comment="gstreamer-plugins-good-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148331" version="1" comment="tigervnc is &lt;1.5.0-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148332" version="1" comment="xorg-x11-Xvnc is &lt;1.5.0-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155225" version="1" comment="ghostscript is &lt;9.15-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155226" version="1" comment="ghostscript-devel is &lt;9.15-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155227" version="1" comment="ghostscript-x11 is &lt;9.15-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154526" version="1" comment="jasper is &lt;1.900.14-176.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154527" version="1" comment="libjasper-devel is &lt;1.900.14-176.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154528" version="1" comment="libjasper1 is &lt;1.900.14-176.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154529" version="1" comment="libjasper1-32bit is &lt;1.900.14-176.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154750" version="1" comment="libtiff-devel is &lt;4.0.7-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154751" version="1" comment="libtiff-devel-32bit is &lt;4.0.7-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154752" version="1" comment="libtiff5 is &lt;4.0.7-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154753" version="1" comment="libtiff5-32bit is &lt;4.0.7-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154754" version="1" comment="tiff is &lt;4.0.7-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154843" version="1" comment="libosip2 is &lt;4.1.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154844" version="1" comment="libosip2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154845" version="1" comment="libosip2-devel is &lt;4.1.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154846" version="1" comment="libosip2-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153572" version="1" comment="quagga-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147470" version="1" comment="perl-DBD-mysql is &lt;4.021-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153573" version="1" comment="perl-DBD-mysql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153574" version="1" comment="tor is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153575" version="1" comment="python-rsa is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153576" version="1" comment="graphite2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153577" version="1" comment="graphite2-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153578" version="1" comment="libgraphite2-3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153579" version="1" comment="libgraphite2-3-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153580" version="1" comment="exim is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153581" version="1" comment="eximon is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153582" version="1" comment="eximstats-html is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153583" version="1" comment="libnghttp2-14 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153584" version="1" comment="libnghttp2-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153585" version="1" comment="libnghttp2_asio-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153586" version="1" comment="libnghttp2_asio1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153587" version="1" comment="nghttp2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153588" version="1" comment="nghttp2-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153589" version="1" comment="python-nghttp2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153590" version="1" comment="yast2-users is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153591" version="1" comment="yast2-users-devel-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130665" version="1" comment="chromedriver is &lt;52.0.2743.82-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130666" version="1" comment="chromium is &lt;52.0.2743.82-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130667" version="1" comment="chromium-desktop-gnome is &lt;52.0.2743.82-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130668" version="1" comment="chromium-desktop-kde is &lt;52.0.2743.82-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130669" version="1" comment="chromium-ffmpegsumo is &lt;52.0.2743.82-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153592" version="1" comment="salt is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153593" version="1" comment="salt-api is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153594" version="1" comment="salt-bash-completion is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153595" version="1" comment="salt-cloud is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153596" version="1" comment="salt-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153597" version="1" comment="salt-fish-completion is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153598" version="1" comment="salt-master is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153599" version="1" comment="salt-minion is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153600" version="1" comment="salt-proxy is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153601" version="1" comment="salt-raet is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153602" version="1" comment="salt-ssh is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153603" version="1" comment="salt-syndic is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153604" version="1" comment="salt-zsh-completion is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153605" version="1" comment="cgit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129875" version="1" comment="MozillaThunderbird is &lt;45.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129876" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129877" version="1" comment="MozillaThunderbird-devel is &lt;45.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129878" version="1" comment="MozillaThunderbird-translations-common is &lt;45.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129879" version="1" comment="MozillaThunderbird-translations-other is &lt;45.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153606" version="1" comment="privoxy-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147299" version="1" comment="pdns is &lt;3.4.6-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147300" version="1" comment="pdns-backend-ldap is &lt;3.4.6-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147301" version="1" comment="pdns-backend-lua is &lt;3.4.6-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147302" version="1" comment="pdns-backend-mydns is &lt;3.4.6-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147303" version="1" comment="pdns-backend-mysql is &lt;3.4.6-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147304" version="1" comment="pdns-backend-postgresql is &lt;3.4.6-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147305" version="1" comment="pdns-backend-sqlite3 is &lt;3.4.6-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148079" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.121-21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148080" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.121-21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148081" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.121-21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148082" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.121-21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148083" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.121-21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148084" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.121-21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148085" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.121-21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153607" version="1" comment="optipng is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153608" version="1" comment="git-arch is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153609" version="1" comment="git-credential-gnome-keyring is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153610" version="1" comment="git-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153611" version="1" comment="lhasa is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153612" version="1" comment="lhasa-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153613" version="1" comment="liblhasa0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148803" version="1" comment="libquicktime is &lt;1.2.4cvs20150223-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153614" version="1" comment="libquicktime is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148804" version="1" comment="libquicktime-devel is &lt;1.2.4cvs20150223-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153615" version="1" comment="libquicktime-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148805" version="1" comment="libquicktime-tools is &lt;1.2.4cvs20150223-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153616" version="1" comment="libquicktime-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148806" version="1" comment="libquicktime0 is &lt;1.2.4cvs20150223-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153617" version="1" comment="libquicktime0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148807" version="1" comment="libquicktime0-32bit is &lt;1.2.4cvs20150223-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153618" version="1" comment="libquicktime0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153619" version="1" comment="bsh2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153620" version="1" comment="bsh2-bsf is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153621" version="1" comment="bsh2-classgen is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153622" version="1" comment="bsh2-demo is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153623" version="1" comment="bsh2-javadoc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153624" version="1" comment="bsh2-manual is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153625" version="1" comment="bsh2-src is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154530" version="1" comment="bind is &lt;9.9.9P1-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154531" version="1" comment="bind-chrootenv is &lt;9.9.9P1-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154532" version="1" comment="bind-devel is &lt;9.9.9P1-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154533" version="1" comment="bind-doc is &lt;9.9.9P1-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154534" version="1" comment="bind-libs is &lt;9.9.9P1-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154535" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154536" version="1" comment="bind-lwresd is &lt;9.9.9P1-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154537" version="1" comment="bind-utils is &lt;9.9.9P1-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133410" version="1" comment="MozillaThunderbird is &lt;45.3.0-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133411" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.3.0-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133412" version="1" comment="MozillaThunderbird-devel is &lt;45.3.0-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133413" version="1" comment="MozillaThunderbird-translations-common is &lt;45.3.0-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133414" version="1" comment="MozillaThunderbird-translations-other is &lt;45.3.0-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153626" version="1" comment="libotr is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153627" version="1" comment="libotr-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153628" version="1" comment="libotr-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153629" version="1" comment="libotr2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153630" version="1" comment="libotr2-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153631" version="1" comment="libotr2-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153632" version="1" comment="libotr5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153633" version="1" comment="mercurial is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153634" version="1" comment="mercurial-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153635" version="1" comment="kinit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153636" version="1" comment="kinit-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153637" version="1" comment="kinit-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153638" version="1" comment="kinit-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153639" version="1" comment="dropbear is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153640" version="1" comment="proftpd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153641" version="1" comment="proftpd-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153642" version="1" comment="proftpd-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153643" version="1" comment="proftpd-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153644" version="1" comment="proftpd-ldap is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153645" version="1" comment="proftpd-mysql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153646" version="1" comment="proftpd-pgsql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153647" version="1" comment="proftpd-radius is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153648" version="1" comment="proftpd-sqlite is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153649" version="1" comment="libpcre2-16-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153650" version="1" comment="libpcre2-16-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153651" version="1" comment="libpcre2-32-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153652" version="1" comment="libpcre2-32-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153653" version="1" comment="libpcre2-8-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153654" version="1" comment="libpcre2-8-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153655" version="1" comment="libpcre2-posix1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153656" version="1" comment="libpcre2-posix1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153657" version="1" comment="pcre2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153658" version="1" comment="pcre2-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153659" version="1" comment="pcre2-devel-static is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153660" version="1" comment="pcre2-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153661" version="1" comment="pcre2-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153663" version="1" comment="cronic is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153664" version="1" comment="obs-service-source_validator is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133269" version="1" comment="iperf is &lt;3.0.12-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153665" version="1" comment="iperf is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133270" version="1" comment="iperf-devel is &lt;3.0.12-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153666" version="1" comment="iperf-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133271" version="1" comment="libiperf0 is &lt;3.0.12-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153667" version="1" comment="libiperf0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153668" version="1" comment="gdk-pixbuf-loader-rsvg-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153669" version="1" comment="librsvg is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153670" version="1" comment="librsvg-2-2-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153671" version="1" comment="rsvg-view is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148026" version="1" comment="nginx is &lt;1.8.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149854" version="1" comment="libmxml1 is &lt;2.9-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153672" version="1" comment="libmxml1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149855" version="1" comment="libmxml1-32bit is &lt;2.9-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153673" version="1" comment="libmxml1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149856" version="1" comment="mxml is &lt;2.9-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153674" version="1" comment="mxml is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149857" version="1" comment="mxml-devel is &lt;2.9-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153675" version="1" comment="mxml-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153676" version="1" comment="libksba is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153677" version="1" comment="libksba-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153678" version="1" comment="openslp-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135920" version="1" comment="dovecot22 is &lt;2.2.18-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153679" version="1" comment="dovecot22 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135921" version="1" comment="dovecot22-backend-mysql is &lt;2.2.18-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153680" version="1" comment="dovecot22-backend-mysql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135922" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.18-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153681" version="1" comment="dovecot22-backend-pgsql is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135923" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.18-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153682" version="1" comment="dovecot22-backend-sqlite is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135924" version="1" comment="dovecot22-devel is &lt;2.2.18-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153683" version="1" comment="dovecot22-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135925" version="1" comment="dovecot22-fts is &lt;2.2.18-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153684" version="1" comment="dovecot22-fts is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135926" version="1" comment="dovecot22-fts-lucene is &lt;2.2.18-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153685" version="1" comment="dovecot22-fts-lucene is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135927" version="1" comment="dovecot22-fts-solr is &lt;2.2.18-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153686" version="1" comment="dovecot22-fts-solr is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135928" version="1" comment="dovecot22-fts-squat is &lt;2.2.18-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153687" version="1" comment="dovecot22-fts-squat is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153688" version="1" comment="gimp-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153689" version="1" comment="libgimp-2_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153690" version="1" comment="libgimpui-2_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153691" version="1" comment="imobiledevice-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153692" version="1" comment="iproxy is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153693" version="1" comment="libimobiledevice is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153694" version="1" comment="libimobiledevice-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153697" version="1" comment="libimobiledevice6-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153698" version="1" comment="libusbmuxd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153699" version="1" comment="libusbmuxd-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153702" version="1" comment="libusbmuxd4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153703" version="1" comment="libusbmuxd4-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153704" version="1" comment="python-imobiledevice is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130910" version="1" comment="chromedriver is &lt;52.0.2743.116-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130911" version="1" comment="chromium is &lt;52.0.2743.116-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130912" version="1" comment="chromium-desktop-gnome is &lt;52.0.2743.116-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130913" version="1" comment="chromium-desktop-kde is &lt;52.0.2743.116-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130914" version="1" comment="chromium-ffmpegsumo is &lt;52.0.2743.116-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134254" version="1" comment="chromedriver is &lt;53.0.2785.89-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134255" version="1" comment="chromium is &lt;53.0.2785.89-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134256" version="1" comment="chromium-desktop-gnome is &lt;53.0.2785.89-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134257" version="1" comment="chromium-desktop-kde is &lt;53.0.2785.89-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134258" version="1" comment="chromium-ffmpegsumo is &lt;53.0.2785.89-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134444" version="1" comment="chromedriver is &lt;53.0.2785.113-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134445" version="1" comment="chromium is &lt;53.0.2785.113-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134446" version="1" comment="chromium-desktop-gnome is &lt;53.0.2785.113-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134447" version="1" comment="chromium-desktop-kde is &lt;53.0.2785.113-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134448" version="1" comment="chromium-ffmpegsumo is &lt;53.0.2785.113-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133630" version="1" comment="chromedriver is &lt;53.0.2785.143-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133631" version="1" comment="chromium is &lt;53.0.2785.143-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133632" version="1" comment="chromium-desktop-gnome is &lt;53.0.2785.143-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133633" version="1" comment="chromium-desktop-kde is &lt;53.0.2785.143-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133634" version="1" comment="chromium-ffmpegsumo is &lt;53.0.2785.143-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153705" version="1" comment="libcares-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153706" version="1" comment="libcares2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153707" version="1" comment="libcares2-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133247" version="1" comment="chromedriver is &lt;54.0.2840.59-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133248" version="1" comment="chromium is &lt;54.0.2840.59-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133249" version="1" comment="chromium-ffmpegsumo is &lt;54.0.2840.59-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135299" version="1" comment="chromedriver is &lt;54.0.2840.90-85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135300" version="1" comment="chromium is &lt;54.0.2840.90-85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135301" version="1" comment="chromium-ffmpegsumo is &lt;54.0.2840.90-85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135684" version="1" comment="MozillaFirefox is &lt;50.0-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135685" version="1" comment="MozillaFirefox-branding-upstream is &lt;50.0-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135686" version="1" comment="MozillaFirefox-buildsymbols is &lt;50.0-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135687" version="1" comment="MozillaFirefox-devel is &lt;50.0-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135688" version="1" comment="MozillaFirefox-translations-common is &lt;50.0-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135689" version="1" comment="MozillaFirefox-translations-other is &lt;50.0-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153708" version="1" comment="libtorrent-rasterbar is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153709" version="1" comment="libtorrent-rasterbar-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153710" version="1" comment="libtorrent-rasterbar-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153712" version="1" comment="libtorrent-rasterbar8 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153713" version="1" comment="python-libtorrent-rasterbar is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153714" version="1" comment="fontconfig is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153715" version="1" comment="fontconfig-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153716" version="1" comment="fontconfig-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153717" version="1" comment="fontconfig-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134022" version="1" comment="go is &lt;1.6.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134023" version="1" comment="go-doc is &lt;1.6.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153718" version="1" comment="libX11 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153719" version="1" comment="libX11-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153720" version="1" comment="libXfixes is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153721" version="1" comment="libXfixes-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153722" version="1" comment="libXi is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153723" version="1" comment="libXi-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153724" version="1" comment="libXrandr is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153725" version="1" comment="libXrandr-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153726" version="1" comment="libXrender is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153727" version="1" comment="libXrender-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153728" version="1" comment="libXtst is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153729" version="1" comment="libXtst-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153730" version="1" comment="libXtst6-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153731" version="1" comment="libXv is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153732" version="1" comment="libXv-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153733" version="1" comment="libXvMC is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153734" version="1" comment="libXvMC-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153735" version="1" comment="libXvMC1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154355" version="1" comment="postgresql93 is &lt;9.3.14-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154356" version="1" comment="postgresql93-contrib is &lt;9.3.14-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154357" version="1" comment="postgresql93-devel is &lt;9.3.14-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154358" version="1" comment="postgresql93-docs is &lt;9.3.14-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154359" version="1" comment="postgresql93-libs is &lt;9.3.14-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154360" version="1" comment="postgresql93-plperl is &lt;9.3.14-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154361" version="1" comment="postgresql93-plpython is &lt;9.3.14-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154362" version="1" comment="postgresql93-pltcl is &lt;9.3.14-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154363" version="1" comment="postgresql93-server is &lt;9.3.14-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154364" version="1" comment="postgresql93-test is &lt;9.3.14-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155228" version="1" comment="libmysql56client18 is &lt;5.6.36-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155229" version="1" comment="libmysql56client18-32bit is &lt;5.6.36-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155230" version="1" comment="libmysql56client_r18 is &lt;5.6.36-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155231" version="1" comment="libmysql56client_r18-32bit is &lt;5.6.36-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155232" version="1" comment="mysql-community-server is &lt;5.6.36-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155233" version="1" comment="mysql-community-server-bench is &lt;5.6.36-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155234" version="1" comment="mysql-community-server-client is &lt;5.6.36-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155235" version="1" comment="mysql-community-server-errormessages is &lt;5.6.36-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155236" version="1" comment="mysql-community-server-test is &lt;5.6.36-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155237" version="1" comment="mysql-community-server-tools is &lt;5.6.36-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136361" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.111-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136362" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.111-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136363" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.111-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136364" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.111-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136365" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.111-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136366" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.111-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136367" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.111-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153736" version="1" comment="libstorage is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153737" version="1" comment="libstorage-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153738" version="1" comment="libstorage-python is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153739" version="1" comment="libstorage-ruby is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153740" version="1" comment="libstorage-testsuite is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153741" version="1" comment="libstorage6 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153742" version="1" comment="yast2-storage is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153743" version="1" comment="yast2-storage-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153744" version="1" comment="kdump is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142543" version="1" comment="apache2-mod_php5 is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142544" version="1" comment="php5 is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142545" version="1" comment="php5-bcmath is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142546" version="1" comment="php5-bz2 is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142547" version="1" comment="php5-calendar is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142548" version="1" comment="php5-ctype is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142549" version="1" comment="php5-curl is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142550" version="1" comment="php5-dba is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142551" version="1" comment="php5-devel is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142552" version="1" comment="php5-dom is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142553" version="1" comment="php5-enchant is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142554" version="1" comment="php5-exif is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142555" version="1" comment="php5-fastcgi is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142556" version="1" comment="php5-fileinfo is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142557" version="1" comment="php5-firebird is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142558" version="1" comment="php5-fpm is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142559" version="1" comment="php5-ftp is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142560" version="1" comment="php5-gd is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142561" version="1" comment="php5-gettext is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142562" version="1" comment="php5-gmp is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142563" version="1" comment="php5-iconv is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142564" version="1" comment="php5-imap is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142565" version="1" comment="php5-intl is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142566" version="1" comment="php5-json is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142567" version="1" comment="php5-ldap is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142568" version="1" comment="php5-mbstring is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142569" version="1" comment="php5-mcrypt is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142570" version="1" comment="php5-mssql is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142571" version="1" comment="php5-mysql is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142572" version="1" comment="php5-odbc is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142573" version="1" comment="php5-opcache is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142574" version="1" comment="php5-openssl is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142575" version="1" comment="php5-pcntl is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142576" version="1" comment="php5-pdo is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142577" version="1" comment="php5-pear is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142578" version="1" comment="php5-pgsql is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142579" version="1" comment="php5-phar is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142580" version="1" comment="php5-posix is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142581" version="1" comment="php5-pspell is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142582" version="1" comment="php5-readline is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142583" version="1" comment="php5-shmop is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142584" version="1" comment="php5-snmp is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142585" version="1" comment="php5-soap is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142586" version="1" comment="php5-sockets is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142587" version="1" comment="php5-sqlite is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142588" version="1" comment="php5-suhosin is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142589" version="1" comment="php5-sysvmsg is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142590" version="1" comment="php5-sysvsem is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142591" version="1" comment="php5-sysvshm is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142592" version="1" comment="php5-tidy is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142593" version="1" comment="php5-tokenizer is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142594" version="1" comment="php5-wddx is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142595" version="1" comment="php5-xmlreader is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142596" version="1" comment="php5-xmlrpc is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142597" version="1" comment="php5-xmlwriter is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142598" version="1" comment="php5-xsl is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142599" version="1" comment="php5-zip is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142600" version="1" comment="php5-zlib is &lt;5.5.14-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153745" version="1" comment="libsqlite3-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153746" version="1" comment="libsqlite3-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153747" version="1" comment="sqlite3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153748" version="1" comment="sqlite3-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153749" version="1" comment="sqlite3-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153750" version="1" comment="xtrabackup is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153751" version="1" comment="xtrabackup-test is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130670" version="1" comment="karchive is &lt;5.21.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153752" version="1" comment="karchive is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130671" version="1" comment="karchive-devel is &lt;5.21.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153753" version="1" comment="karchive-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153754" version="1" comment="karchive-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130673" version="1" comment="libKF5Archive5 is &lt;5.21.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153755" version="1" comment="libKF5Archive5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153756" version="1" comment="libKF5Archive5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148031" version="1" comment="bzrtp is &lt;1.0.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153757" version="1" comment="bzrtp is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148032" version="1" comment="bzrtp-devel is &lt;1.0.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153758" version="1" comment="bzrtp-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148033" version="1" comment="libbzrtp0 is &lt;1.0.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153759" version="1" comment="libbzrtp0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148034" version="1" comment="libbzrtp0-32bit is &lt;1.0.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153760" version="1" comment="libbzrtp0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153761" version="1" comment="cracklib is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153762" version="1" comment="cracklib-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153763" version="1" comment="cracklib-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153764" version="1" comment="cracklib-dict-small is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153765" version="1" comment="libcrack2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153766" version="1" comment="libcrack2-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153767" version="1" comment="libpwquality is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153768" version="1" comment="libpwquality-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153769" version="1" comment="libpwquality-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153770" version="1" comment="libpwquality-tools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153771" version="1" comment="libpwquality1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153772" version="1" comment="pam_pwquality is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153773" version="1" comment="python-pwquality is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136453" version="1" comment="tar is &lt;1.27.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136454" version="1" comment="tar-backup-scripts is &lt;1.27.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153774" version="1" comment="tar-backup-scripts is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136455" version="1" comment="tar-lang is &lt;1.27.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136456" version="1" comment="tar-tests is &lt;1.27.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153775" version="1" comment="tar-tests is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153776" version="1" comment="at is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153777" version="1" comment="flex is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153778" version="1" comment="flex-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153779" version="1" comment="libbonobo is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153780" version="1" comment="libbonobo-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153781" version="1" comment="libbonobo-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153782" version="1" comment="libbonobo-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153783" version="1" comment="libbonobo-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153784" version="1" comment="libnetpbm-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153785" version="1" comment="libnetpbm11 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153786" version="1" comment="libnetpbm11-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153787" version="1" comment="netpbm is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153788" version="1" comment="sgmltool is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153789" version="1" comment="virtuoso is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153790" version="1" comment="virtuoso-drivers is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153791" version="1" comment="virtuoso-server is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153792" version="1" comment="libpacemaker-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153793" version="1" comment="libpacemaker3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153794" version="1" comment="pacemaker is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153795" version="1" comment="pacemaker-cli is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153796" version="1" comment="pacemaker-cts is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153797" version="1" comment="pacemaker-remote is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133245" version="1" comment="irssi is &lt;0.8.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133246" version="1" comment="irssi-devel is &lt;0.8.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153798" version="1" comment="irssi-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147397" version="1" comment="pdns-recursor is &lt;3.7.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153799" version="1" comment="pdns-recursor is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146259" version="1" comment="wget is &lt;1.14-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153800" version="1" comment="file-roller is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153801" version="1" comment="file-roller-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153802" version="1" comment="nautilus-file-roller is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148108" version="1" comment="gnutls is &lt;3.2.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148109" version="1" comment="libgnutls-devel is &lt;3.2.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148110" version="1" comment="libgnutls-devel-32bit is &lt;3.2.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153803" version="1" comment="libgnutls-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148111" version="1" comment="libgnutls-openssl-devel is &lt;3.2.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153804" version="1" comment="libgnutls-openssl-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148112" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148113" version="1" comment="libgnutls28 is &lt;3.2.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148114" version="1" comment="libgnutls28-32bit is &lt;3.2.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148115" version="1" comment="libgnutlsxx-devel is &lt;3.2.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153805" version="1" comment="libgnutlsxx-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148116" version="1" comment="libgnutlsxx28 is &lt;3.2.15-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153806" version="1" comment="libgnutlsxx28 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153807" version="1" comment="libopenjp2-7 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153808" version="1" comment="libopenjp2-7-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153809" version="1" comment="libopenjpeg1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153810" version="1" comment="openjpeg is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153811" version="1" comment="openjpeg-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153812" version="1" comment="openjpeg-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153813" version="1" comment="openjpeg2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153814" version="1" comment="openjpeg2-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134954" version="1" comment="ffmpeg is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134955" version="1" comment="ffmpeg-devel is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134956" version="1" comment="libavcodec-devel is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134957" version="1" comment="libavcodec56 is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134959" version="1" comment="libavdevice-devel is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134960" version="1" comment="libavdevice56 is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134962" version="1" comment="libavfilter-devel is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134963" version="1" comment="libavfilter5 is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134965" version="1" comment="libavformat-devel is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134966" version="1" comment="libavformat56 is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134968" version="1" comment="libavresample-devel is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134969" version="1" comment="libavresample2 is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134971" version="1" comment="libavutil-devel is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134972" version="1" comment="libavutil54 is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134974" version="1" comment="libpostproc-devel is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134975" version="1" comment="libpostproc53 is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134977" version="1" comment="libswresample-devel is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134978" version="1" comment="libswresample1 is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134980" version="1" comment="libswscale-devel is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134981" version="1" comment="libswscale3 is &lt;2.8.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133729" version="1" comment="kde-cli-tools5 is &lt;5.5.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153815" version="1" comment="kde-cli-tools5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133730" version="1" comment="kde-cli-tools5-lang is &lt;5.5.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153816" version="1" comment="kde-cli-tools5-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133772" version="1" comment="kcoreaddons is &lt;5.21.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153836" version="1" comment="kcoreaddons is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133773" version="1" comment="kcoreaddons-devel is &lt;5.21.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153837" version="1" comment="kcoreaddons-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153838" version="1" comment="kcoreaddons-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133775" version="1" comment="kcoreaddons-lang is &lt;5.21.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153839" version="1" comment="kcoreaddons-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133776" version="1" comment="libKF5CoreAddons5 is &lt;5.21.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153840" version="1" comment="libKF5CoreAddons5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153841" version="1" comment="libKF5CoreAddons5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153842" version="1" comment="libass is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153843" version="1" comment="libass-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153844" version="1" comment="libass5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153845" version="1" comment="libass5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148523" version="1" comment="guile is &lt;2.0.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153846" version="1" comment="guile is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148524" version="1" comment="guile-devel is &lt;2.0.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153847" version="1" comment="guile-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148525" version="1" comment="guile-modules-2_0 is &lt;2.0.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153848" version="1" comment="guile-modules-2_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153849" version="1" comment="guile1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148526" version="1" comment="libguile-2_0-22 is &lt;2.0.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153850" version="1" comment="libguile-2_0-22 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153851" version="1" comment="libguile-srfi-srfi-1-v-3-3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153852" version="1" comment="libguile-srfi-srfi-13-14-v-3-3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153853" version="1" comment="libguile-srfi-srfi-4-v-3-3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153854" version="1" comment="libguile-srfi-srfi-60-v-2-2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153855" version="1" comment="libguile1-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153856" version="1" comment="libguile17 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153857" version="1" comment="libguilereadline-v-17-17 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148527" version="1" comment="libguilereadline-v-18-18 is &lt;2.0.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153858" version="1" comment="libguilereadline-v-18-18 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153859" version="1" comment="dracut-fips is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143116" version="1" comment="lxc is &lt;1.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153860" version="1" comment="lxc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143117" version="1" comment="lxc-devel is &lt;1.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153861" version="1" comment="lxc-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153862" version="1" comment="memcached is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153863" version="1" comment="memcached-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155492" version="1" comment="tomcat is &lt;8.0.43-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155493" version="1" comment="tomcat-admin-webapps is &lt;8.0.43-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155494" version="1" comment="tomcat-docs-webapp is &lt;8.0.43-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155495" version="1" comment="tomcat-el-3_0-api is &lt;8.0.43-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155496" version="1" comment="tomcat-embed is &lt;8.0.43-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155497" version="1" comment="tomcat-javadoc is &lt;8.0.43-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155498" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.43-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155499" version="1" comment="tomcat-jsvc is &lt;8.0.43-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155500" version="1" comment="tomcat-lib is &lt;8.0.43-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155501" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.43-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155502" version="1" comment="tomcat-webapps is &lt;8.0.43-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145809" version="1" comment="GraphicsMagick is &lt;1.3.21-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145810" version="1" comment="GraphicsMagick-devel is &lt;1.3.21-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145811" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.21-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145812" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.21-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145813" version="1" comment="libGraphicsMagick3-config is &lt;1.3.21-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145814" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.21-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145815" version="1" comment="perl-GraphicsMagick is &lt;1.3.21-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136457" version="1" comment="containerd is &lt;0.2.4+gitr565_0366d7e-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153864" version="1" comment="containerd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136458" version="1" comment="containerd-ctr is &lt;0.2.4+gitr565_0366d7e-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153865" version="1" comment="containerd-ctr is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136459" version="1" comment="containerd-test is &lt;0.2.4+gitr565_0366d7e-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153866" version="1" comment="containerd-test is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136460" version="1" comment="docker is &lt;1.12.3-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136461" version="1" comment="docker-bash-completion is &lt;1.12.3-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136462" version="1" comment="docker-test is &lt;1.12.3-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136463" version="1" comment="docker-zsh-completion is &lt;1.12.3-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136464" version="1" comment="runc is &lt;0.1.1+gitr2816_02f8fa7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153867" version="1" comment="runc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136465" version="1" comment="runc-test is &lt;0.1.1+gitr2816_02f8fa7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153868" version="1" comment="runc-test is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154755" version="1" comment="ntp is &lt;4.2.8p10-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154756" version="1" comment="ntp-doc is &lt;4.2.8p10-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136368" version="1" comment="MozillaFirefox is &lt;50.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136369" version="1" comment="MozillaFirefox-branding-upstream is &lt;50.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136370" version="1" comment="MozillaFirefox-buildsymbols is &lt;50.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136371" version="1" comment="MozillaFirefox-devel is &lt;50.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136372" version="1" comment="MozillaFirefox-translations-common is &lt;50.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136373" version="1" comment="MozillaFirefox-translations-other is &lt;50.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147314" version="1" comment="bind is &lt;9.9.9P1-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147315" version="1" comment="bind-chrootenv is &lt;9.9.9P1-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147316" version="1" comment="bind-devel is &lt;9.9.9P1-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147317" version="1" comment="bind-doc is &lt;9.9.9P1-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147318" version="1" comment="bind-libs is &lt;9.9.9P1-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147319" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147320" version="1" comment="bind-lwresd is &lt;9.9.9P1-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147321" version="1" comment="bind-utils is &lt;9.9.9P1-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149471" version="1" comment="lynx is &lt;2.8.7-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149472" version="1" comment="perl-Image-Info is &lt;1.39-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153869" version="1" comment="perl-Image-Info is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142918" version="1" comment="gc is &lt;7.2d-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153870" version="1" comment="gc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142919" version="1" comment="gc-devel is &lt;7.2d-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153871" version="1" comment="gc-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142920" version="1" comment="libgc1 is &lt;7.2d-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142921" version="1" comment="w3m is &lt;0.5.3.git20161120-161.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142922" version="1" comment="w3m-inline-image is &lt;0.5.3.git20161120-161.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153872" version="1" comment="w3m-inline-image is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153873" version="1" comment="gstreamer-0_10-plugins-bad-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153874" version="1" comment="gstreamer-0_10-plugins-bad-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153875" version="1" comment="gstreamer-0_10-plugins-bad-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153876" version="1" comment="gstreamer-plugins-bad is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153877" version="1" comment="gstreamer-plugins-bad-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153878" version="1" comment="gstreamer-plugins-bad-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153879" version="1" comment="gstreamer-plugins-bad-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153880" version="1" comment="gstreamer-plugins-bad-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153881" version="1" comment="libgstbadbase-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153882" version="1" comment="libgstbadbase-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153883" version="1" comment="libgstbadvideo-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153884" version="1" comment="libgstbadvideo-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153885" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153886" version="1" comment="libgstbasecamerabinsrc-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153887" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153888" version="1" comment="libgstbasevideo-0_10-23-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153889" version="1" comment="libgstcodecparsers-0_10-23-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153890" version="1" comment="libgstcodecparsers-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153891" version="1" comment="libgstcodecparsers-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153892" version="1" comment="libgstgl-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153893" version="1" comment="libgstgl-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153894" version="1" comment="libgstinsertbin-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153895" version="1" comment="libgstinsertbin-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153896" version="1" comment="libgstmpegts-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153897" version="1" comment="libgstmpegts-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153898" version="1" comment="libgstphotography-0_10-23-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153899" version="1" comment="libgstphotography-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153900" version="1" comment="libgstphotography-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153901" version="1" comment="libgstsignalprocessor-0_10-23-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153902" version="1" comment="libgsturidownloader-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153903" version="1" comment="libgsturidownloader-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153904" version="1" comment="libgstvdp-0_10-23-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153905" version="1" comment="libgstwayland-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153906" version="1" comment="libgstwayland-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154664" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.121-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154665" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.121-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154666" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.121-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154667" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.121-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154668" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.121-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154669" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.121-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154670" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.121-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154671" version="1" comment="libfreebl3 is &lt;3.28.4-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154672" version="1" comment="libfreebl3-32bit is &lt;3.28.4-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154673" version="1" comment="libsoftokn3 is &lt;3.28.4-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154674" version="1" comment="libsoftokn3-32bit is &lt;3.28.4-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154675" version="1" comment="mozilla-nss is &lt;3.28.4-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154676" version="1" comment="mozilla-nss-32bit is &lt;3.28.4-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154677" version="1" comment="mozilla-nss-certs is &lt;3.28.4-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154678" version="1" comment="mozilla-nss-certs-32bit is &lt;3.28.4-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154679" version="1" comment="mozilla-nss-devel is &lt;3.28.4-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154680" version="1" comment="mozilla-nss-sysinit is &lt;3.28.4-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154681" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.28.4-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154682" version="1" comment="mozilla-nss-tools is &lt;3.28.4-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154757" version="1" comment="curl is &lt;7.37.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154758" version="1" comment="libcurl-devel is &lt;7.37.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154759" version="1" comment="libcurl-devel-32bit is &lt;7.37.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154760" version="1" comment="libcurl4 is &lt;7.37.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154761" version="1" comment="libcurl4-32bit is &lt;7.37.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153907" version="1" comment="gstreamer-0_10-plugin-esd is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153908" version="1" comment="gstreamer-0_10-plugin-esd-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153909" version="1" comment="gstreamer-0_10-plugins-good is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153910" version="1" comment="gstreamer-0_10-plugins-good-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153911" version="1" comment="gstreamer-0_10-plugins-good-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153912" version="1" comment="gstreamer-0_10-plugins-good-extra is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153913" version="1" comment="gstreamer-0_10-plugins-good-extra-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153914" version="1" comment="gstreamer-0_10-plugins-good-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153921" version="1" comment="gstreamer-0_10-plugin-gnomevfs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153922" version="1" comment="gstreamer-0_10-plugins-base is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153923" version="1" comment="gstreamer-0_10-plugins-base-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153924" version="1" comment="gstreamer-0_10-plugins-base-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153925" version="1" comment="gstreamer-0_10-plugins-base-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153926" version="1" comment="gstreamer-0_10-plugins-base-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153927" version="1" comment="gstreamer-plugins-base is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153928" version="1" comment="gstreamer-plugins-base-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153929" version="1" comment="gstreamer-plugins-base-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153930" version="1" comment="gstreamer-plugins-base-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153931" version="1" comment="gstreamer-plugins-base-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153932" version="1" comment="libgstallocators-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153933" version="1" comment="libgstallocators-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153934" version="1" comment="libgstapp-0_10-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153935" version="1" comment="libgstapp-0_10-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153936" version="1" comment="libgstapp-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153937" version="1" comment="libgstapp-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153938" version="1" comment="libgstaudio-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153939" version="1" comment="libgstaudio-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153940" version="1" comment="libgstfft-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153941" version="1" comment="libgstfft-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153942" version="1" comment="libgstinterfaces-0_10-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153943" version="1" comment="libgstinterfaces-0_10-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153944" version="1" comment="libgstpbutils-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153945" version="1" comment="libgstpbutils-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153946" version="1" comment="libgstriff-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153947" version="1" comment="libgstriff-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153948" version="1" comment="libgstrtp-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153949" version="1" comment="libgstrtp-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153950" version="1" comment="libgstrtsp-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153951" version="1" comment="libgstrtsp-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153952" version="1" comment="libgstsdp-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153953" version="1" comment="libgstsdp-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153954" version="1" comment="libgsttag-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153955" version="1" comment="libgsttag-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153956" version="1" comment="libgstvideo-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153957" version="1" comment="libgstvideo-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153958" version="1" comment="typelib-1_0-GstAllocators-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153959" version="1" comment="typelib-1_0-GstApp-0_10 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153960" version="1" comment="typelib-1_0-GstApp-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153961" version="1" comment="typelib-1_0-GstAudio-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153962" version="1" comment="typelib-1_0-GstFft-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153963" version="1" comment="typelib-1_0-GstInterfaces-0_10 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153964" version="1" comment="typelib-1_0-GstPbutils-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153965" version="1" comment="typelib-1_0-GstRiff-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153966" version="1" comment="typelib-1_0-GstRtp-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153967" version="1" comment="typelib-1_0-GstRtsp-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153968" version="1" comment="typelib-1_0-GstSdp-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153969" version="1" comment="typelib-1_0-GstTag-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153970" version="1" comment="typelib-1_0-GstVideo-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153971" version="1" comment="libz1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153972" version="1" comment="libz1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153973" version="1" comment="zlib is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153974" version="1" comment="zlib-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153975" version="1" comment="zlib-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153976" version="1" comment="zlib-devel-static is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153977" version="1" comment="zlib-devel-static-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146167" version="1" comment="MozillaThunderbird is &lt;45.6.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146168" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.6.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146169" version="1" comment="MozillaThunderbird-devel is &lt;45.6.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146170" version="1" comment="MozillaThunderbird-translations-common is &lt;45.6.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146171" version="1" comment="MozillaThunderbird-translations-other is &lt;45.6.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149252" version="1" comment="apache2-mod_php5 is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149253" version="1" comment="php5 is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149254" version="1" comment="php5-bcmath is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149255" version="1" comment="php5-bz2 is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149256" version="1" comment="php5-calendar is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149257" version="1" comment="php5-ctype is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149258" version="1" comment="php5-curl is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149259" version="1" comment="php5-dba is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149260" version="1" comment="php5-devel is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149261" version="1" comment="php5-dom is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149262" version="1" comment="php5-enchant is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149263" version="1" comment="php5-exif is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149264" version="1" comment="php5-fastcgi is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149265" version="1" comment="php5-fileinfo is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149266" version="1" comment="php5-firebird is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149267" version="1" comment="php5-fpm is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149268" version="1" comment="php5-ftp is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149269" version="1" comment="php5-gd is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149270" version="1" comment="php5-gettext is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149271" version="1" comment="php5-gmp is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149272" version="1" comment="php5-iconv is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149273" version="1" comment="php5-imap is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149274" version="1" comment="php5-intl is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149275" version="1" comment="php5-json is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149276" version="1" comment="php5-ldap is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149277" version="1" comment="php5-mbstring is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149278" version="1" comment="php5-mcrypt is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149279" version="1" comment="php5-mssql is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149280" version="1" comment="php5-mysql is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149281" version="1" comment="php5-odbc is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149282" version="1" comment="php5-opcache is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149283" version="1" comment="php5-openssl is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149284" version="1" comment="php5-pcntl is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149285" version="1" comment="php5-pdo is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149286" version="1" comment="php5-pear is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149287" version="1" comment="php5-pgsql is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149288" version="1" comment="php5-phar is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149289" version="1" comment="php5-posix is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149290" version="1" comment="php5-pspell is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149291" version="1" comment="php5-readline is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149292" version="1" comment="php5-shmop is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149293" version="1" comment="php5-snmp is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149294" version="1" comment="php5-soap is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149295" version="1" comment="php5-sockets is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149296" version="1" comment="php5-sqlite is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149297" version="1" comment="php5-suhosin is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149298" version="1" comment="php5-sysvmsg is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149299" version="1" comment="php5-sysvsem is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149300" version="1" comment="php5-sysvshm is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149301" version="1" comment="php5-tidy is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149302" version="1" comment="php5-tokenizer is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149303" version="1" comment="php5-wddx is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149304" version="1" comment="php5-xmlreader is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149305" version="1" comment="php5-xmlrpc is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149306" version="1" comment="php5-xmlwriter is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149307" version="1" comment="php5-xsl is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149308" version="1" comment="php5-zip is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149309" version="1" comment="php5-zlib is &lt;5.5.14-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146429" version="1" comment="libgme is &lt;0.6.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153978" version="1" comment="libgme is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146430" version="1" comment="libgme-devel is &lt;0.6.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153979" version="1" comment="libgme-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146431" version="1" comment="libgme0 is &lt;0.6.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153980" version="1" comment="libgme0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146432" version="1" comment="libgme0-32bit is &lt;0.6.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153981" version="1" comment="libgme0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147990" version="1" comment="containerd is &lt;0.2.5+gitr569_2a5e70c-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147991" version="1" comment="containerd-ctr is &lt;0.2.5+gitr569_2a5e70c-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147992" version="1" comment="containerd-test is &lt;0.2.5+gitr569_2a5e70c-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147993" version="1" comment="docker is &lt;1.12.6-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147994" version="1" comment="docker-bash-completion is &lt;1.12.6-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147995" version="1" comment="docker-test is &lt;1.12.6-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147996" version="1" comment="docker-zsh-completion is &lt;1.12.6-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147997" version="1" comment="runc is &lt;0.1.1+gitr2819_50a19c6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147998" version="1" comment="runc-test is &lt;0.1.1+gitr2819_50a19c6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148619" version="1" comment="libopus-devel is &lt;1.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153982" version="1" comment="libopus-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148620" version="1" comment="libopus-devel-static is &lt;1.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153983" version="1" comment="libopus-devel-static is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148621" version="1" comment="libopus0 is &lt;1.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153984" version="1" comment="libopus0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148622" version="1" comment="libopus0-32bit is &lt;1.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153985" version="1" comment="libopus0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148623" version="1" comment="opus is &lt;1.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153986" version="1" comment="opus is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149835" version="1" comment="libmbedtls9 is &lt;1.3.19-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149837" version="1" comment="mbedtls is &lt;1.3.19-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149838" version="1" comment="mbedtls-devel is &lt;1.3.19-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149310" version="1" comment="bind is &lt;9.9.9P1-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149311" version="1" comment="bind-chrootenv is &lt;9.9.9P1-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149312" version="1" comment="bind-devel is &lt;9.9.9P1-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149313" version="1" comment="bind-doc is &lt;9.9.9P1-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149314" version="1" comment="bind-libs is &lt;9.9.9P1-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149315" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149316" version="1" comment="bind-lwresd is &lt;9.9.9P1-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149317" version="1" comment="bind-utils is &lt;9.9.9P1-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153987" version="1" comment="ffmpeg3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153988" version="1" comment="libavcodec57 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153989" version="1" comment="libavcodec57-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153990" version="1" comment="libavdevice57 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153991" version="1" comment="libavdevice57-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153992" version="1" comment="libavfilter6 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153993" version="1" comment="libavfilter6-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153994" version="1" comment="libavformat57 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153995" version="1" comment="libavformat57-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153996" version="1" comment="libavresample3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153997" version="1" comment="libavresample3-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153998" version="1" comment="libavutil55 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153999" version="1" comment="libavutil55-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154000" version="1" comment="libpostproc54 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154001" version="1" comment="libpostproc54-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154002" version="1" comment="libswresample2 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154003" version="1" comment="libswresample2-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154004" version="1" comment="libswscale4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154005" version="1" comment="libswscale4-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149684" version="1" comment="chromedriver is &lt;57.0.2987.98-105.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149685" version="1" comment="chromium is &lt;57.0.2987.98-105.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150468" version="1" comment="chromedriver is &lt;57.0.2987.133-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150469" version="1" comment="chromium is &lt;57.0.2987.133-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154720" version="1" comment="chromedriver is &lt;58.0.3029.81-111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154721" version="1" comment="chromium is &lt;58.0.3029.81-111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155083" version="1" comment="chromedriver is &lt;58.0.3029.96-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155084" version="1" comment="chromium is &lt;58.0.3029.96-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146853" version="1" comment="irssi is &lt;0.8.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146854" version="1" comment="irssi-devel is &lt;0.8.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154006" version="1" comment="icoutils is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154007" version="1" comment="libplist is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154008" version="1" comment="libplist++-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154009" version="1" comment="libplist++3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154010" version="1" comment="libplist++3-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154011" version="1" comment="libplist-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154012" version="1" comment="libplist3 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154013" version="1" comment="libplist3-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154014" version="1" comment="plistutil is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154015" version="1" comment="python-plist is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147197" version="1" comment="ark is &lt;15.12.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154016" version="1" comment="ark is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147111" version="1" comment="libkerfuffle15 is &lt;15.12.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154017" version="1" comment="libkerfuffle15 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148018" version="1" comment="MozillaThunderbird is &lt;45.7.0-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148019" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.7.0-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148020" version="1" comment="MozillaThunderbird-devel is &lt;45.7.0-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148021" version="1" comment="MozillaThunderbird-translations-common is &lt;45.7.0-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148022" version="1" comment="MozillaThunderbird-translations-other is &lt;45.7.0-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155085" version="1" comment="MozillaThunderbird is &lt;52.1.0-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155086" version="1" comment="MozillaThunderbird-buildsymbols is &lt;52.1.0-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155087" version="1" comment="MozillaThunderbird-devel is &lt;52.1.0-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155088" version="1" comment="MozillaThunderbird-translations-common is &lt;52.1.0-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155089" version="1" comment="MozillaThunderbird-translations-other is &lt;52.1.0-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149591" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.121-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149592" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.121-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149593" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.121-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149594" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.121-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149595" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.121-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149596" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.121-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149597" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.121-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149806" version="1" comment="MozillaFirefox is &lt;52.0.1-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149807" version="1" comment="MozillaFirefox-branding-upstream is &lt;52.0.1-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149808" version="1" comment="MozillaFirefox-buildsymbols is &lt;52.0.1-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149809" version="1" comment="MozillaFirefox-devel is &lt;52.0.1-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149810" version="1" comment="MozillaFirefox-translations-common is &lt;52.0.1-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149811" version="1" comment="MozillaFirefox-translations-other is &lt;52.0.1-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154722" version="1" comment="MozillaFirefox is &lt;52.1.0-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154723" version="1" comment="MozillaFirefox-branding-upstream is &lt;52.1.0-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154724" version="1" comment="MozillaFirefox-buildsymbols is &lt;52.1.0-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154725" version="1" comment="MozillaFirefox-devel is &lt;52.1.0-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154726" version="1" comment="MozillaFirefox-translations-common is &lt;52.1.0-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154727" version="1" comment="MozillaFirefox-translations-other is &lt;52.1.0-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148306" version="1" comment="libplist is &lt;1.12-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148307" version="1" comment="libplist++-devel is &lt;1.12-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148308" version="1" comment="libplist++3 is &lt;1.12-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148309" version="1" comment="libplist++3-32bit is &lt;1.12-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148310" version="1" comment="libplist-devel is &lt;1.12-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148311" version="1" comment="libplist3 is &lt;1.12-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148312" version="1" comment="libplist3-32bit is &lt;1.12-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148313" version="1" comment="plistutil is &lt;1.12-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148314" version="1" comment="python-plist is &lt;1.12-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148808" version="1" comment="profanity is &lt;0.4.7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154018" version="1" comment="profanity is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148624" version="1" comment="mupdf is &lt;1.10a-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148625" version="1" comment="mupdf-devel-static is &lt;1.10a-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154019" version="1" comment="gstreamer is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154020" version="1" comment="gstreamer-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154021" version="1" comment="gstreamer-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154022" version="1" comment="gstreamer-doc is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154023" version="1" comment="gstreamer-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154024" version="1" comment="gstreamer-utils is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154025" version="1" comment="libgstreamer-1_0-0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154026" version="1" comment="libgstreamer-1_0-0-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154027" version="1" comment="typelib-1_0-Gst-1_0 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148528" version="1" comment="postfixadmin is &lt;3.0.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154028" version="1" comment="postfixadmin is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148626" version="1" comment="viewvc is &lt;1.1.26-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155238" version="1" comment="libzzip-0-13 is &lt;0.13.62-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155239" version="1" comment="libzzip-0-13 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155240" version="1" comment="libzzip-0-13-32bit is &lt;0.13.62-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155241" version="1" comment="libzzip-0-13-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155242" version="1" comment="zziplib is &lt;0.13.62-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155243" version="1" comment="zziplib is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155244" version="1" comment="zziplib-devel is &lt;0.13.62-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155245" version="1" comment="zziplib-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155246" version="1" comment="zziplib-devel-32bit is &lt;0.13.62-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155247" version="1" comment="zziplib-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149318" version="1" comment="munin is &lt;2.0.25-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154029" version="1" comment="munin is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149319" version="1" comment="munin-node is &lt;2.0.25-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154030" version="1" comment="munin-node is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154031" version="1" comment="sane-backends is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154032" version="1" comment="sane-backends-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154033" version="1" comment="sane-backends-autoconfig is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154034" version="1" comment="sane-backends-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150929" version="1" comment="atheme is &lt;7.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150930" version="1" comment="atheme-devel is &lt;7.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150931" version="1" comment="libathemecore1 is &lt;7.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149511" version="1" comment="kdelibs4 is &lt;4.14.18-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149512" version="1" comment="kdelibs4-apidocs is &lt;4.14.18-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154035" version="1" comment="kdelibs4-apidocs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149513" version="1" comment="kdelibs4-branding-upstream is &lt;4.14.18-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154036" version="1" comment="kdelibs4-branding-upstream is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149514" version="1" comment="kdelibs4-core is &lt;4.14.18-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149515" version="1" comment="kdelibs4-doc is &lt;4.14.18-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149516" version="1" comment="kio is &lt;5.21.0-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154037" version="1" comment="kio is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149517" version="1" comment="kio-32bit is &lt;5.21.0-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154038" version="1" comment="kio-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149518" version="1" comment="kio-core is &lt;5.21.0-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154039" version="1" comment="kio-core is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149519" version="1" comment="kio-core-32bit is &lt;5.21.0-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154040" version="1" comment="kio-core-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149520" version="1" comment="kio-devel is &lt;5.21.0-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154041" version="1" comment="kio-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149521" version="1" comment="kio-devel-32bit is &lt;5.21.0-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154042" version="1" comment="kio-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149522" version="1" comment="kio-lang is &lt;5.21.0-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154043" version="1" comment="kio-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149523" version="1" comment="libkde4 is &lt;4.14.18-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149524" version="1" comment="libkde4-32bit is &lt;4.14.18-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154044" version="1" comment="libkde4-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149525" version="1" comment="libkde4-devel is &lt;4.14.18-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149526" version="1" comment="libkdecore4 is &lt;4.14.18-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149527" version="1" comment="libkdecore4-32bit is &lt;4.14.18-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154045" version="1" comment="libkdecore4-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149528" version="1" comment="libkdecore4-devel is &lt;4.14.18-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149529" version="1" comment="libksuseinstall-devel is &lt;4.14.18-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154046" version="1" comment="libksuseinstall-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149530" version="1" comment="libksuseinstall1 is &lt;4.14.18-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149531" version="1" comment="libksuseinstall1-32bit is &lt;4.14.18-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154047" version="1" comment="libksuseinstall1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149858" version="1" comment="qbittorrent is &lt;3.3.11-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154048" version="1" comment="qbittorrent is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149859" version="1" comment="qbittorrent-nox is &lt;3.3.11-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154049" version="1" comment="qbittorrent-nox is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150898" version="1" comment="apache2-mod_apparmor is &lt;2.10.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154050" version="1" comment="apache2-mod_apparmor is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150899" version="1" comment="apparmor is &lt;2.10.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154051" version="1" comment="apparmor is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150900" version="1" comment="apparmor-abstractions is &lt;2.10.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154052" version="1" comment="apparmor-abstractions is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150901" version="1" comment="apparmor-docs is &lt;2.10.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154053" version="1" comment="apparmor-docs is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150902" version="1" comment="apparmor-parser is &lt;2.10.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154054" version="1" comment="apparmor-parser is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150903" version="1" comment="apparmor-parser-lang is &lt;2.10.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154055" version="1" comment="apparmor-parser-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150904" version="1" comment="apparmor-profiles is &lt;2.10.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154056" version="1" comment="apparmor-profiles is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150905" version="1" comment="apparmor-utils is &lt;2.10.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154057" version="1" comment="apparmor-utils is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150906" version="1" comment="apparmor-utils-lang is &lt;2.10.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154058" version="1" comment="apparmor-utils-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150907" version="1" comment="libapparmor-devel is &lt;2.10.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154059" version="1" comment="libapparmor-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150908" version="1" comment="libapparmor1 is &lt;2.10.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154060" version="1" comment="libapparmor1 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150909" version="1" comment="libapparmor1-32bit is &lt;2.10.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154061" version="1" comment="libapparmor1-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150910" version="1" comment="pam_apparmor is &lt;2.10.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154062" version="1" comment="pam_apparmor is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150911" version="1" comment="pam_apparmor-32bit is &lt;2.10.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154063" version="1" comment="pam_apparmor-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150912" version="1" comment="perl-apparmor is &lt;2.10.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154064" version="1" comment="perl-apparmor is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150913" version="1" comment="python3-apparmor is &lt;2.10.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154065" version="1" comment="python3-apparmor is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150914" version="1" comment="ruby-apparmor is &lt;2.10.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154066" version="1" comment="ruby-apparmor is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150257" version="1" comment="wget is &lt;1.14-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149860" version="1" comment="partclone is &lt;0.3.5a-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154067" version="1" comment="partclone is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149861" version="1" comment="partclone-lang is &lt;0.3.5a-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154068" version="1" comment="partclone-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154538" version="1" comment="audiofile is &lt;0.3.6-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154539" version="1" comment="audiofile-devel is &lt;0.3.6-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154540" version="1" comment="audiofile-devel-32bit is &lt;0.3.6-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154541" version="1" comment="audiofile-doc is &lt;0.3.6-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154542" version="1" comment="libaudiofile1 is &lt;0.3.6-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154543" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154544" version="1" comment="tigervnc is &lt;1.5.0-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154545" version="1" comment="xorg-x11-Xvnc is &lt;1.5.0-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154546" version="1" comment="proftpd is &lt;1.3.5d-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154547" version="1" comment="proftpd-devel is &lt;1.3.5d-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154548" version="1" comment="proftpd-doc is &lt;1.3.5d-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154549" version="1" comment="proftpd-lang is &lt;1.3.5d-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154550" version="1" comment="proftpd-ldap is &lt;1.3.5d-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154551" version="1" comment="proftpd-mysql is &lt;1.3.5d-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154552" version="1" comment="proftpd-pgsql is &lt;1.3.5d-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154553" version="1" comment="proftpd-radius is &lt;1.3.5d-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154554" version="1" comment="proftpd-sqlite is &lt;1.3.5d-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154847" version="1" comment="backintime is &lt;1.1.20-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154848" version="1" comment="backintime is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154849" version="1" comment="backintime-lang is &lt;1.1.20-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154850" version="1" comment="backintime-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154851" version="1" comment="backintime-qt4 is &lt;1.1.20-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154852" version="1" comment="backintime-qt4 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154762" version="1" comment="libsndfile is &lt;1.0.25-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154763" version="1" comment="libsndfile-devel is &lt;1.0.25-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154764" version="1" comment="libsndfile-progs is &lt;1.0.25-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154765" version="1" comment="libsndfile1 is &lt;1.0.25-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154766" version="1" comment="libsndfile1-32bit is &lt;1.0.25-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154882" version="1" comment="feh is &lt;2.13.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154883" version="1" comment="feh is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155503" version="1" comment="roundcubemail is &lt;1.1.9-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155504" version="1" comment="rzip is &lt;2.1-151.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155505" version="1" comment="rzip is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155301" version="1" comment="swftools is &lt;0.9.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155302" version="1" comment="swftools is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155506" version="1" comment="kauth is &lt;5.21.0-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155507" version="1" comment="kauth is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155508" version="1" comment="kauth-devel is &lt;5.21.0-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155509" version="1" comment="kauth-devel is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155510" version="1" comment="kauth-devel-32bit is &lt;5.21.0-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155511" version="1" comment="kauth-devel-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155512" version="1" comment="kdelibs4 is &lt;4.14.18-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155513" version="1" comment="kdelibs4-apidocs is &lt;4.14.18-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155514" version="1" comment="kdelibs4-branding-upstream is &lt;4.14.18-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155515" version="1" comment="kdelibs4-core is &lt;4.14.18-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155516" version="1" comment="kdelibs4-doc is &lt;4.14.18-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155517" version="1" comment="libKF5Auth5 is &lt;5.21.0-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155518" version="1" comment="libKF5Auth5 is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155519" version="1" comment="libKF5Auth5-32bit is &lt;5.21.0-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155520" version="1" comment="libKF5Auth5-32bit is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155521" version="1" comment="libKF5Auth5-lang is &lt;5.21.0-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155522" version="1" comment="libKF5Auth5-lang is signed with openSUSE key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155523" version="1" comment="libkde4 is &lt;4.14.18-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155524" version="1" comment="libkde4-32bit is &lt;4.14.18-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155525" version="1" comment="libkde4-devel is &lt;4.14.18-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155526" version="1" comment="libkdecore4 is &lt;4.14.18-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155527" version="1" comment="libkdecore4-32bit is &lt;4.14.18-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155528" version="1" comment="libkdecore4-devel is &lt;4.14.18-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155529" version="1" comment="libksuseinstall-devel is &lt;4.14.18-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155530" version="1" comment="libksuseinstall1 is &lt;4.14.18-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155531" version="1" comment="libksuseinstall1-32bit is &lt;4.14.18-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051703"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kinit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kinit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromedriver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-desktop-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-desktop-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-ffmpegsumo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>irssi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>irssi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-sle12-cloud-compute-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-volume</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cinder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-dhcp-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-ha-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-l3-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-lbaas-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-linuxbridge-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-metadata-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-metering-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-openvswitch-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vpn-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Beaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystoneclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystoneclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pycrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pymongo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-chef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-chef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-6_Q16-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-6_Q16-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-6_Q16-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-6_Q16-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sled-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaccountsservice0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-AccountsService-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>argyllcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-gtk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolorhug2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coolkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-gij</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-gij-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj48-jar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj_bc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-cups-browsed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-foomatic-rip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-saslauthd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dia-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-mission-control-plugin-goa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevdocument3-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevview3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EvinceDocument-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EvinceView-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>facter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-meanwhile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp-1_0-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ft2demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>g3utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgetty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixbuf-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdmflexiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gdm-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugins-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimp-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpui-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-fam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgck-modules-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-backend-1_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Goa-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpgme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hardlink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-chewing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-pinyin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iputils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-appl-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-Imf_2_1-21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-Imf_2_1-21-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaugeas0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuidd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgensec0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgensec0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libregistry0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-raw0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-raw0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-2_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbembed2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libid3tag0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-3_0-25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmusicbrainz4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-modules-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Pango-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Polkit-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler44</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-networkmanager-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-esound-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-gdm-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-gconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-lirc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_4m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-tango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt-PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-Hans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-Hant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-officebean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librpcsecgss3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsilc-1_1-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsilcclient-1_1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>silc-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Soup-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-2_0-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-2_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-3_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-controller0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGlib-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag_c0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag_c0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-libxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvte9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmq3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>m4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mipv6d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-ccid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Config-IniFiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTML-Parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-LWP-Protocol-https</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-YAML-LibYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-otr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cupshelpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-dbus-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev-configure-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-sgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radvd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhythmbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhythmbox-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-libs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysvinit-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>whois</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-gabble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xf86-video-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xinetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xlockmore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-essentials</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zoo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib++dfb-1_7-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdirectfb-1_7-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdirectfb-1_7-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby2_1-2_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-stdlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-0_2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-LibXML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pigz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpcbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-sfcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-glib-vpn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-glib4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-util2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NM-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NMClient-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NetworkManager-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>at</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-lenses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dosfstools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-djvudocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-dvidocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-pdfdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-psdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-tiffdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-xpsdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-systemd-sleep-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gtk-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imobiledevice-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lhasa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblhasa0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKitWidgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-atsvc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgypsy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk-4_0-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnewt0_52</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-pacrunner-webkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-galaxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreofficekit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>update-alternatives</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-users</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-profiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapparmor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapparmor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudiofile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudiofile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-sametime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgegl-0_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gst-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadbase-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAudio-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPbutils-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstTag-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVideo-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile-modules-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-2_0-22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-script-interpreter2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjp2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcrecpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcrecpp0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist++3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt_PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-3_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirglrenderer0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-admin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwscodecs1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzzip-0-13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minicom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-otr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool-cached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-autoconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unrar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-ha-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conntrack-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpacemaker3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-bundler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcreposix0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-adv-systems-management-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-containers-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups154</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups154-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups154-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups154-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-legacy-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-public-cloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi-devel-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-toolchain-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-suhosin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-web-scripting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pear-Archive_Tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_wsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs4-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs6-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs6-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_jk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>automake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmailconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-openssl27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff-full</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gxditview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Guestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-kdb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-appl-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt4-x11-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupsclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-drivers-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-vte</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-switch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-IMAP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-SIEVE-managesieve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppc64-diag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ppc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-diag-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gtls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-udpspoof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-2_2-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2_2-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>davfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhivex0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Win-Hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-auth-pam-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powerpc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>smt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>smt-support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2_3-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-3_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flex-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-powerpc-ieee1275</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-p2v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtcnative-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-dpdk-switch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>res-signingkeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBD-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2.0-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>FastCGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FastCGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-sdk-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-malloccheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-swing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-mDNSResponder-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhowl0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>checkbashisms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coolkey-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbembed-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libulockmgr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-obj-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-objc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi48-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj48-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-arch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icecream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>id3lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-zfcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib3ds-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXres-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-ColorHug-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Colord-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-ColordGtk-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-atsvc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgensec-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libregistry-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-raw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-openssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev-1_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GUdev-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-libguestfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libid3tag-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmusicbrainz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpacemaker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-iostat2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-mrtg2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sar2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sheet2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogImport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogSummary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-MMV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-PMDA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcscspy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Poppler-0_18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-linguist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librpcsecgss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Rsvg-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserf-1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>silc-toolkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_gnome_keyring-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_kwallet-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-composite0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-damage0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dpms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-record0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-res0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-screensaver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xevie0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xprint0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xtest0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xvmc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-cgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhythmbox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-sdt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib++dfb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-spu-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Bootstrap-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGLExtensions-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-common-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgypsy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy-0_99-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy-0_99-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpfr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibVNCServer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-classgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-ddk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdbtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sgmltool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphite2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lhasa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformHeaders-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKitWidgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKitWidgets-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-cpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtcnative-1-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-connector-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-compiler-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>FastCGI-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-pdfbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_perl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstApp-0_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstInterfaces-0_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinsertbin-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAllocators-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstApp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstFft-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtsp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstSdp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguilereadline-v-18-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapparmor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-1_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosip2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunrar-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunrar5_0_14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virglrenderer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yodl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-we-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-bsk-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libformula</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblayout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libloader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librepository</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librevenge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librevenge-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librevenge-generators-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserializer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdds-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pentaho-libxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pentaho-reporting-flow-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Capture-Tiny</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-mini1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-dict-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-ocamldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmdbodbc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdbtools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtuoso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtuoso-drivers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtuoso-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lynx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbclient2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbclient2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl098</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2_org</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fltk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfltk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcamel-1_2-45</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcamel-1_2-45-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebackend-1_2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebackend-1_2-7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-1_2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-1_2-14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-contacts-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-contacts-1_2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecal-1_2-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecal-1_2-16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-book-1_2-20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-book-1_2-20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-cal-1_2-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-cal-1_2-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserver-1_2-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserver-1_2-18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpfr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-logging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cmis-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphite2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyphen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabw-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdr-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmis-0_5-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libe-book</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libe-book-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetonyek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetonyek-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreehand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreehand-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgltf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgltf-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhyphen0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblangtag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblangtag1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspub</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspub-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-0_3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libodfgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libodfgen-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpagemaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpagemaker-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-share-linker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-voikko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librevenge-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librevenge-stream-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvisio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvisio-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvoikko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvoikko1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwps-0_4-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>malaga-suomi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-af_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-be_BY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bg_BG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bn_BD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bs_BA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-cs_CZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-da_DK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-dictionaries</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-el_GR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-et_EE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gu_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-he_IL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hi_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hr_HR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hu_HU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-it_IT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lo_LA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lt_LT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lv_LV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nl_NL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-no</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pl_PL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ru_RU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sk_SK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sl_SI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sv_SE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-te_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-th_TH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-zu_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibVNCServer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pytalloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pytalloc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>talloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenCOLLADA0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_atomic1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_11-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_11-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-af_NA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_AE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_BH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_DZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_EG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_IQ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_JO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_KW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_LB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_LY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_MA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_OM</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_QA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_TN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_YE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bn_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_AD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_ES_valencia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_IT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_AT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_CH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_DE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_AU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_BS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_BZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_CA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_GH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_IE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_JM</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_MW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_NA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_NZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_PH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_TT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_ZW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_AR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_BO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_DO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_EC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_GT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_HN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_MX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_NI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_SV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_UY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_VE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_BE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_CA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_CH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_LU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_MC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-hu_HU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-ru_RU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nb_NO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nl_BE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nn_NO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_AO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ro_RO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_CS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_Latn_CS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_Latn_RS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_RS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sv_FI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-vi_VN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCOLLADA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-backports.ssl_match_hostname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tornado</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ntp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libc-client2007e_suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbmuxd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstegl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-classic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist++1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstaroffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstaroffice-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmf-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-uk_UA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SuSEfirewall2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-0_10-10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libradosstriper1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cephfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rados</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virglrenderer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtQuick5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtdeclarative</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vpx-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-vdagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db48-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-cpp0_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yaml-cpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shotwell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shotwell-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiso9660-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libid3tag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gwenhywfar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gwenhywfar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gwenhywfar-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgwengui-gtk2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgwenhywfar60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgwenhywfar60-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-pkg-bindings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-talloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-talloc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-backend-zypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gstreamer-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gtk3-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-PackageKitGlib-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rzsz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-documents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-documents-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-documents_books-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-search-provider-documents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_locale1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_random1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libepubgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libepubgen-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_13-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_13-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqxp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqxp-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-id_ID</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetfilter_cthelper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetfilter_cthelper0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetfilter_cttimeout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetfilter_cttimeout1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawk-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldirectord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-metadata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resource-agents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_38-44-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_38-44-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-live-patching-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_39-47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_39-47-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_32-33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_32-33-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_36-38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_36-38-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_43-52_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_43-52_6-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_10-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_18-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_48-52_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_48-52_27-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_31-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_20-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_49-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_41-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_45-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_54-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_34-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_49-11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_49-11-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_57-60_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_57-60_35-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_53-60_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_53-60_30-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_25-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_62-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_62-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_39-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_64_8-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_64_8-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_18-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_21-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-84-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-90-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_24-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_55-52_42-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_55-52_42-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_55-52_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_55-52_45-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_38-93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_29-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_32-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_35-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_40-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_56-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-92_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_120-92_70-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_73-5-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_92-6_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_92-6_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-6_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-6_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-94_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_120-94_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-94_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_126-94_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP3_Update_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-cloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-master</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-syndic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-passenger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-passenger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-passenger-apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-rack-1_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles12-docker-image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles12sp1-docker-image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-docker-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-excon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-docker-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-excon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles11sp4-docker-image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>portus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles12sp2-docker-image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-libnetwork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-docker-libnetwork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-distribution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-distribution-registry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpmi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm29</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-auth-none</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-pam_slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sched-wiki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-slurmdb-direct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-slurmdbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-torque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurmlibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-hpc-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-libldap-2_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-libgcrypt11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tablib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-PyJWT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-ada-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi-devel-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-pos-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfpm_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libospf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libospfapiclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquagga_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzebra1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcmu-runner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-apis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp-lite6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shibboleth-sp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsaml8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensaml-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensaml-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmltooling6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmltooling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmltooling-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librelp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-compute-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-compute-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-compute_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-compute_debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SUSE-Linux-Enterprise-RT-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SUSE_SLES_SAP-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_57-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_60-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_63-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamsap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_80-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_77-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_77-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_66-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_69-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_72-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_83-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_86-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_cml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_magnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_mysql_vhost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_trigger_b4_dl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_webdav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_48-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_48-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_45-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_51-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_54-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_57-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_60-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_63-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_66-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_69-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_82-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_82-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_85-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_74-60_64_85-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-92_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fltk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fltk-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EBook-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EBookContacts-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EDataServer-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetfilter_cthelper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetfilter_cttimeout-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyphen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabw-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdr-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmis-c-0_5-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmis-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libe-book-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libe-book-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetonyek-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetonyek-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreehand-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreehand-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblangtag-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspub-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspub-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libodfgen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libodfgen-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvisio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvisio-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvoikko-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pytalloc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_chrono1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph_parallel1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_log1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_math1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_mpi1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_python1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_serialization1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_test1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_timer1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_wave1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhyphen0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ntp-client-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-source_validator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-users-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRiff-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Botan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nasm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcmu-runner-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libradosstriper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shibboleth-sp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsaml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build-initvm-s390</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build-initvm-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build-mkbaselibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtdeclarative-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtdeclarative-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtdeclarative-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmltooling-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio++0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librelp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gwenhywfar-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgwengui-qt4-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-pkg-bindings-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-talloc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_context1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libepubgen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqxp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqxp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqxp-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-sle2docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle2docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_kerb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_security2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tdb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-collections</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-collections-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_89-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_89-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_92-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_101-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_106-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_106-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_29</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_111-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_119-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_119-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_122-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_122-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_125-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_125-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_33</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtcmu1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-glanceclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystonemiddleware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-novaclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-novaclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-swiftclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-swiftclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-suse-sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ceilometer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-nova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-python-memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iperf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iperf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiperf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-cli-tools5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-cli-tools5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcoreaddons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcoreaddons-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcoreaddons-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcoreaddons-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5CoreAddons5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5CoreAddons5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec56</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec56-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice56</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice56-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat56</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat56-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil54</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil54-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc53-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libImlib2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotoc8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mosh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ninja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Switch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-protobuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>karchive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>karchive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>karchive-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Archive5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Archive5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freexl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freexl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreexl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjpeg1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lame</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lame-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lame-mp3rtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil55</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmp3lame-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmp3lame0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc54</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtwolame-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtwolame0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>twolame</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjp2-7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mbedtls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mbedtls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjq1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mongodb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mongodb-mongoperf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mongodb-mongos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mongodb-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mongodb-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-debugger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-debugger-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-dialyzer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-dialyzer-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-diameter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-diameter-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-epmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-et-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-gs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-gs-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-jinterface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-jinterface-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-observer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-observer-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-reltool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-reltool-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-wx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-wx-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enigmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phpMyAdmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kopete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kopete-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-apidocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kio-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kio-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kio-core-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kio-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geotiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geotiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgeotiff2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec57-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice57-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat57-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil55-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc54-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kauth-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kauth-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Auth5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Auth5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Auth5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>akonadi_resources</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>akregator5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blogilo5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kaddressbook5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kalarm5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kmail5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>knotes5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kontact5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>korganizer5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktnef5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>messagelib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>messagelib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkerfuffle15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkerfuffle16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libre2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>re2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>re2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libre2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drkonqi5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-workspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-workspace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-workspace-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-workspace-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsox3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmad0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmad0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmp3lame0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.9-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.9-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.8-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.8-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-plugin-nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-recursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-devel-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-openmpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-openmpi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-openmpi-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5-10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5-10-openmpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran10-openmpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl10-openmpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5hl_fortran10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5hl_fortran10-openmpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amavisd-new</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-hash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldapsmb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-krb-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>findutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>findutils-locate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-dialupadmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fvwm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-rus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-std</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-library</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-omni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmime-2_0-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmime-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-screensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-screensaver-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kgreeter-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-wallpapers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-ksysguardd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-runtime-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-runtime-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ppc64-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ppc64-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-apps-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-apps-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadns1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-2_0-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-Max</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-browse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librpcsecgss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-locale-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-nunit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-winforms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-gnomevfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-gnomevfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>star</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat-isag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-xauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xpdf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acpid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-suhosin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcpcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcpv6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>foomatic-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork4-filesharing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krdc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdiplus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwdutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwdutils-plugin-audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-libwww-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pure-ftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tgt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-jsp-2_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-servlet-2_5-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-trax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcalc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcharselect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdessh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kfloppy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgpg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktimer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwalletmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwikdisk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okteta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-extra26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-config-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-config-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-classic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Test-Simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC_23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>x3270</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-dmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-rdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>a2ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fastjar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdirstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuid-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-1_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suseRegister</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-nrpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-nrpe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins-nrpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-qt10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-qt10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Xerces-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXerces-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXerces-c28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>a2ps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-antlr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-oro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-regexp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-commons-logging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-javamail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jdepend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-junit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-nodeps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_fcgid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boinc-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boinc-client-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_math1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_math1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_mpi1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_python1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_python1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_serialization1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_serialization1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_test1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_test1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_wave1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_wave1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bytefx-data-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sybase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-jscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-wcf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-winfxcore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monodoc-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cscope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>derby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fileshareset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>misc-console-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-ijs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-2_4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-sharp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnucash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnucash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnucash-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-dia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-fig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadns-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdhcp6client-1_0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdhcp6client-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-extra-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-2_0-7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-2_0-7-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpfr-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-testtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_sudo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtunepimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtunepimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtunepimp5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-1_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-1_0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-0_8-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine1-gnome-vfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine1-pulse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-gnome-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-translations-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netatalk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netatalk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-ipsec-tools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obex-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBD-Pg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imaging-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-logilab-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lxml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-test-suite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activemodel-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activeresource-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-railties-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bundler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-i18n-0_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-json_pure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-ssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rxvt-unicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>struts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>struts-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>struts-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-cjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-dvilj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-jadetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-metapost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-musictex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-omega</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-tex4ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-xmltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvilj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musictex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-omega</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ppower4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC_23-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valgrind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valgrind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ncurses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inst-source-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activeresource-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-2_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mail-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-cache-1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-de-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-de-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnu-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-1_6_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-fontconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsdtar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-obj-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-objc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc43-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-capng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb_java-4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-carlito-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmythes-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mythes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mythes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-importlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmxml1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SOAP-Lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mail-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>portaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>portaudio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libICE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libICE-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libICE-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXdmcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXdmcp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXdmcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXdmcp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-storage-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-openssl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-openssl1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-openssl1-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-openssl1-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-openssl1-2_4-2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-openssl1-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-openssl1-down-root-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-sfcb-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-cmaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread_ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibm-data-db2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLED</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-firefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mhtml-firefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-config-gnome-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-networkmanager-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quota</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vm-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cabextract</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-wireless-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-wireless-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-wireless-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-da-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-da-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-es-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-es-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fr-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-it-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-it-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nl-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pl-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt_BR-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt_BR-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ru-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ru-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sv-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-runtime-xine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-qtgui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-qtgui-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-ui-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orca-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-plugins-avc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-plugins-dc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-plugins-v4l2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-hae-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-heartbeat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-pacemaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libffi-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libffi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Image-Minimal3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Image-Netboot-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Image-Tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Image3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Migration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server-Admin3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server-AdminGUI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server-AdminTools3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server-BranchTools3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server-Modules3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>admind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>admind-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>posbios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>microcode_ctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brocade-bna-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_trace-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_trace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-sap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-sap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sap_suse_cluster_connector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhn-virtualization-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhn-virtualization-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhncfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhncfg-actions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhncfg-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhncfg-management</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhnmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-certs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhnlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacecmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-check</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-client-setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-client-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gconf2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gconf2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gconf2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orbit2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orbit2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orbit2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc43-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc43-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keyutils-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keyutils-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keyutils-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtkhtml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtkhtml2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdparanoia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdparanoia-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdparanoia-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>desktop-file-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fam-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libogg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libogg0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libogg0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboil-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboil-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpg-error0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpg-error0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpg-error0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-vmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-bea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-bea-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-bea-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-bea-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-alsa-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-akonadi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-akregator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kaddressbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kalarm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kjots</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-knode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-knotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kontact</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-korganizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-ktimetracker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-ktnef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepim4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepim4-wizards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepimlibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libakonadi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdepim4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdepimlibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-gwenview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kcolorchooser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kruler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-ksnapshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-okular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkipi5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-knewsticker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kopete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-krdc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-krfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>utempter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>utempter-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>utempter-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-vmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vmi-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX13-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvolume_id1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IO-Socket-SSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>websphere-as_ce</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmpiutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-cim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-viewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ldap-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arpwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-kde4-integration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gwenview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcolorchooser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kruler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ksnapshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkexiv2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkipi6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfs-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfs-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfs-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-hmac-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpciaccess0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpciaccess0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpciaccess0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>man-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gcc47</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cxgb3-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Config-General</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quota-nfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLES-for-VMware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-collections</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-collections-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-collections-tomcat5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-csb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-kk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ku</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-lv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-wa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-kde4-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-kde4-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-openvpn-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-pptp-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasmoid-networkmanagement</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apport-crashdb-sle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apport-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suseRegisterInfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>intel-SINIT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigmem-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigmem-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lha</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db-utils-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Virt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libICE-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libICE-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXdmcp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-storage-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-cloud-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-barclamp-trove</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-barclamp-neutron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-ibm-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-mlnx-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-nec-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-nvsd-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-plugin-cisco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-restproxy-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-ryu-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-central</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-ipmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-notification</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-alarm-evaluator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-alarm-notifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-collector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-backup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-api-cfn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-api-cloudwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-keystone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-keystone-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-glance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-heat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.i18n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslotest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sahara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-six</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-barclamp-nova_dashboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-dashboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-django_openstack_auth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-cells</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-cert</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-conductor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-consoleauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-novncproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-objectstore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-serialproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-vncproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-account</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-object</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-swift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove-conductor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove-guestagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove-taskmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-trove</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-openstackclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-sprockets-2_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionpack-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionview-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionview-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activemodel-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activemodel-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activerecord-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activesupport-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-bson-1_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-easy_diff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-redcarpet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bson-1_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-easy_diff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-redcarpet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-openstack-cloud-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>couchdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-openstack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-plugin-heat_docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ironic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ironic-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ironic-conductor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ironic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionpack-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionview-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activemodel-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activerecord-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activesupport-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-chef-expander</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-chef-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-chef-server-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-chef-solr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-chef-expander</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-chef-server-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-chef-solr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-extlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-multi_xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-rails-html-sanitizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-railties-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate-central</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate-sink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ironic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vpnaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vpnaas-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-tempest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-tempest-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-designate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron-vpnaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tempest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-polling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-share</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-fwaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-fwaas-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-lbaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-lbaas-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-resource-agents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-manila</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-networking-cisco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron-fwaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron-lbaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-horizon-plugin-manila-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon-plugin-manila-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-suds-jurko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionview-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionmailer-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activejob-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-rails-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activejob-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activemodel-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails-html-sanitizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-railties-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-defusedxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pysaml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.middleware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-XStatic-jquery-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-glare</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-registry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-evaluator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-expirer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-listener</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-notifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-aodh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monasca-installer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>storm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>storm-nimbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>storm-supervisor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-placement-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-magnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-magnum-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-magnum-conductor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-magnum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-magnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Bootstrap-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGLExtensions-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-mysql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-postgresql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-examples-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-platformtheme-gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openSUSE-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick-Q16-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick3-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagickWand-Q16-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>android-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aria2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aria2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-autoipd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter-db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-gcc48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj_bc1-gcc48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-gcc48-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyradm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcab-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcab-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-browser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugin-aa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-games</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-games-recommended</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wdiff-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htmldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jhead</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-kdebase4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdnssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kio-extras5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwebkitpart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwebkitpart-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>klogd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>konversation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>konversation-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-1_10-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-logger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblightdm-gobject-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminiupnpc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmono-2_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmono-2_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmonoboehm-2_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmonoboehm-2_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmonosgen-2_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-mvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpgf6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-breeze</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-hicontrast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-oxygen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-sifr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsync2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-SpiceClientGtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthunarx-2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>thunar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>thunar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-uml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-vbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>links</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nano-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nspluginwrapper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-set_version</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-desktop-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>privoxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-linux-user</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sddm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sddm-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tnftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>viewvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-host-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-ui-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-npm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrypto36</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrypto36-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libressl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libressl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libressl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libressl-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssl37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssl37-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtls9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtls9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-ui-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpotrace0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>potrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>potrace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-dom-inspector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-irc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>roundcubemail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-aarch64-gcc48-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-armv6hl-gcc48-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-armv7hl-gcc48-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-hppa-gcc48-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-i386-gcc48-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ia64-gcc48-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc-gcc48-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64-gcc48-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64le-gcc48-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390-gcc48-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390x-gcc48-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-ada-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-testresults</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb-testresults</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdbserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-gcc48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-gcc48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4-gcc48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4-gcc48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi48-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-gcc48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj48-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3-gcc48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3-gcc48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-gcc48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-gcc48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-gcc48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-gcc48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-gcc48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-gcc48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-gcc48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-gcc48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan0-gcc48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-bootstrap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-bootstrap-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>putty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver-data-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminiupnpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminiupnpc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>miniupnpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-miniupnpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-nm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-compat-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-compat-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linuxvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-qa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-qa-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pv-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql56client18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql56client18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql56client_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql56client_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-atsvc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libregistry0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyldb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tdb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tevent-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-pidl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-lwresd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calibre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fcitx-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fcitx-qt5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fcitx-qt5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frameworkintegration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frameworkintegration-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frameworkintegration-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frameworkintegration-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frameworkintegration-plugin-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwayland-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwayland-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwayland-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Style5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Style5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Style5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DCollision-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DCollision5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DCollision5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DCore-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DCore5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DCore5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DInput-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DInput5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DInput5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DLogic-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DLogic5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DLogic5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DQuick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DQuick5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DQuick5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DQuickRenderer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DQuickRenderer5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DQuickRenderer5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DRenderer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DRenderer5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DRenderer5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Bluetooth5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Bluetooth5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Bluetooth5-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5CLucene5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5CLucene5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Compositor5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Compositor5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Declarative5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Declarative5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Designer5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Designer5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DesignerComponents5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DesignerComponents5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Help5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Help5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Location5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Location5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Multimedia5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Multimedia5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Nfc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Nfc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Nfc5-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Positioning5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Positioning5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Script5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Script5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sensors5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sensors5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sensors5-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5SerialPort5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5SerialPort5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Svg5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Svg5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WaylandClient5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WaylandClient5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebChannel5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebChannel5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebChannel5-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKitWidgets-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKitWidgets5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebSockets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebSockets5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebSockets5-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5X11Extras5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5X11Extras5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5XmlPatterns5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5XmlPatterns5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtQuick5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-creator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-linguist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-linguist-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qt3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qt3d-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qt3d-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qt3d-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qt3d-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtconnectivity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtconnectivity-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtconnectivity-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtconnectivity-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtconnectivity-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtconnectivity-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtdeclarative-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtdeclarative-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtgraphicaleffects</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtimageformats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtimageformats-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtimageformats-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtlocation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtlocation-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtlocation-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtlocation-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtlocation-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtmultimedia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtmultimedia-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtmultimedia-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtmultimedia-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtmultimedia-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtquick1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtquick1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtquick1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtquick1-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtquick1-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtquickcontrols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtquickcontrols-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtscript-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtscript-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtscript-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsensors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsensors-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsensors-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsensors-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsensors-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtserialport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtserialport-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtserialport-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtserialport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qttools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qttools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qttools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qttools-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qttools-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qttools-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qttranslations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwayland-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwayland-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwayland-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwayland-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwayland-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebchannel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebchannel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebchannel-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebchannel-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebchannel-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebengine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebengine-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebengine-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebengine-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebengine-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebengine-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebkit-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebsockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebsockets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebsockets-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebsockets-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebsockets-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtx11extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtx11extras-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtx11extras-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtxmlpatterns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtxmlpatterns-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtxmlpatterns-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtxmlpatterns-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtxmlpatterns-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxqt-powermanagement</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxqt-powermanagement-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxqt-qtplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gummi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gummi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typo3-cms-4_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-mydns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-6_Q16-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-6_Q16-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typo3-cms-4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpwquality</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpwquality-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpwquality-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpwquality-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpwquality1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_pwquality</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pwquality</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-compiler-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtorrent-rasterbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtorrent-rasterbar-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtorrent-rasterbar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtorrent-rasterbar8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libtorrent-rasterbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-pv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdjmod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdjmod-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdjmod-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdjmod-kmp-pv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdjmod-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipset-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipset-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipset-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipset-kmp-pv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipset-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipset3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules-kmp-pv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcfclock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcfclock-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcfclock-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcfclock-kmp-pv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vhba-kmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vhba-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vhba-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vhba-kmp-pv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vhba-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-branding-SLED</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-clearlooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-clearlooks-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-crux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-crux-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-glide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-glide-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-hcengine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-industrial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-industrial-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-mist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-mist-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-redmond95</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-redmond95-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-thinice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-thinice-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engines-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-amharic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-amharic-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-inuktitut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-inuktitut-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-multipress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-multipress-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-thai-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-vietnamese-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-xim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-xim-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodules-tigrigna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodules-tigrigna-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-theme-clearlooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-theme-crux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-theme-industrial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-theme-mist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-theme-redmond95</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-theme-thinice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjpeg1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mssql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gdb-pretty-printers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-glade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-as</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-br</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-dz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-he</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-or</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-si</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-st</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreofficekit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-myhostname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-myhostname-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-journal-gateway</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++-Q16-11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-srfi-srfi-1-v-3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-srfi-srfi-13-14-v-3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-srfi-srfi-4-v-3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-srfi-srfi-60-v-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguilereadline-v-17-17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>privoxy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-fts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-fts-lucene</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-fts-solr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-fts-squat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnuchess</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-loadables</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pitivi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pitivi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd-ctr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-backup-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre16-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcreposix0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-dbcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-dbcp-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-pool2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-pool2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m-inline-image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-rails-html-sanitizer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-rails-html-sanitizer-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Twisted-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadbase-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadvideo-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinsertbin-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwayland-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwayland-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-mail-2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-mail-doc-2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mail-2_4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mail-2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shellinabox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++-Q16-12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionpack-doc-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionview-doc-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activemodel-doc-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activerecord-doc-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activesupport-doc-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti-spine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nettle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvlc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvlccore8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-noX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-noX-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-obsolete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-download_files</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-extract_file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-recompress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-verify_file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>attica-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>attica-qt5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>attica-qt5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>baloo5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>baloo5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>baloo5-file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>baloo5-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>baloo5-kioslaves</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>baloo5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>baloo5-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-qt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-qt-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-qt-udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>breeze5-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>extra-cmake-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kactivities5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kactivities5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kactivities5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kactivities5-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kapidox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbookmarks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbookmarks-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbookmarks-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcmutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcmutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcmutils-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcodecs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcodecs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcodecs-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcompletion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcompletion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcompletion-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kconf_update5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kconfig-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kconfigwidgets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kconfigwidgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kconfigwidgets-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcrash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcrash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcrash-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdbusaddons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdbusaddons-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdbusaddons-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdbusaddons-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdeclarative</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdeclarative-components</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdeclarative-components-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdeclarative-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdeclarative-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdeclarative-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kded</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kded-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kded-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4support-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4support-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4support-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdesignerplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdesignerplugin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdesignerplugin-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdesu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdesu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdesu-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdewebkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdewebkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdewebkit-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdnssd-framework</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdnssd-framework-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdnssd-framework-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdoctools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdoctools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdoctools-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kemoticons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kemoticons-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kemoticons-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kfilemetadata5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kfilemetadata5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kfilemetadata5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kfilemetadata5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kglobalaccel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kglobalaccel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kglobalaccel-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kglobalaccel5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kguiaddons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kguiaddons-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kguiaddons-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>khtml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>khtml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>khtml-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ki18n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ki18n-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ki18n-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kiconthemes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kiconthemes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kiconthemes-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kidletime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kidletime-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kidletime-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kimageformats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kimageformats-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kinit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kitemmodels</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kitemmodels-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kitemmodels-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kitemviews</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kitemviews-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kitemviews-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kjobwidgets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kjobwidgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kjobwidgets-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kjs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kjs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kjs-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kjsembed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kjsembed-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kjsembed-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kmediaplayer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kmediaplayer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kmediaplayer-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>knewstuff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>knewstuff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>knewstuff-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>knotifications</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>knotifications-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>knotifications-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>knotifyconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>knotifyconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>knotifyconfig-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpackage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpackage-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpackage-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpackage-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpackage-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kparts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kparts-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kparts-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpeople5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpeople5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpeople5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpeople5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpeople5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kplotting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kplotting-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kplotting-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpty-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpty-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kross</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kross-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kross-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kross-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kross-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krunner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krunner-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krunner-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kservice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kservice-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kservice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kservice-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kservice-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktexteditor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktexteditor-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktexteditor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktexteditor-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktexteditor-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktextwidgets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktextwidgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktextwidgets-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kunitconversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kunitconversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kunitconversion-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwallet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwallet-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwallet-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwallet-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwallet-tools-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwalletd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwalletd5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwidgetsaddons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwidgetsaddons-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwidgetsaddons-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwindowsystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwindowsystem-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwindowsystem-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kxmlgui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kxmlgui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kxmlgui-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kxmlrpcclient5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kxmlrpcclient5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kxmlrpcclient5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Activities5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Activities5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Activities5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Attica5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Attica5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Baloo5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Baloo5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5BalooEngine5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5BalooEngine5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5BluezQt6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Bookmarks5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Bookmarks5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Bookmarks5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5CalendarEvents5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5CalendarEvents5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Codecs5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Codecs5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Codecs5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Completion5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Completion5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Completion5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigCore5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigCore5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigCore5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigGui5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigGui5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigWidgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigWidgets5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigWidgets5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Crash5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Crash5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5DBusAddons5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5DBusAddons5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5DBusAddons5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5DNSSD5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5DNSSD5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5DNSSD5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Declarative5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Declarative5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Declarative5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Emoticons5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Emoticons5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5GlobalAccel5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5GlobalAccel5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5GlobalAccel5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5GlobalAccelPrivate5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5GuiAddons5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5GuiAddons5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5I18n5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5I18n5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5I18n5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5IconThemes5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5IconThemes5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5IconThemes5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5IdleTime5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5IdleTime5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ItemModels5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ItemModels5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ItemViews5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ItemViews5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ItemViews5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5JS5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5JS5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5JSApi5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5JSApi5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5JobWidgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5JobWidgets5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5JobWidgets5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5JsEmbed5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5JsEmbed5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5JsEmbed5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5KCMUtils5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5KCMUtils5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5KCMUtils5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5KDELibs4Support5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5KDELibs4Support5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5KHtml5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5KHtml5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5KHtml5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5MediaPlayer5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5MediaPlayer5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ModemManagerQt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ModemManagerQt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ModemManagerQt6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5NetworkManagerQt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5NetworkManagerQt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5NetworkManagerQt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5NetworkManagerQt6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5NetworkManagerQt6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5NewStuff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5NewStuff5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5NewStuff5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Notifications5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Notifications5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Notifications5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5NotifyConfig5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5NotifyConfig5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5NotifyConfig5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Parts5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Parts5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Parts5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Plotting5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Plotting5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Pty5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Pty5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Pty5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5QuickAddons5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5QuickAddons5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Runner5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Runner5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Solid5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Solid5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Solid5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5SonnetCore5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5SonnetCore5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5SonnetCore5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5SonnetUi5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5SonnetUi5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Su5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Su5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Su5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5TextWidgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5TextWidgets5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5TextWidgets5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ThreadWeaver5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ThreadWeaver5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5UnitConversion5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5UnitConversion5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5UnitConversion5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Wallet5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Wallet5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5WebKit5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5WebKit5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5WidgetsAddons5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5WidgetsAddons5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5WidgetsAddons5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5WindowSystem5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5WindowSystem5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5WindowSystem5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5XmlGui5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5XmlGui5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5XmlGui5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5XmlRpcClient5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5XmlRpcClient5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5XmlRpcClient5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkwalletbackend5-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkwalletbackend5-5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oxygen5-icon-theme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oxygen5-icon-theme-large</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oxygen5-icon-theme-scalable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma-framework</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma-framework-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma-framework-components</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma-framework-components-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma-framework-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma-framework-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma-framework-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma-framework-private</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma-framework-private-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>solid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>solid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>solid-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>solid-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>solid-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sonnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sonnet-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sonnet-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>threadweaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>threadweaver-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>threadweaver-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gajim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gajim-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2_asio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2_asio1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nghttp2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-nghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-raet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximstats-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Pillow-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2WebExtension-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-bsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-credential-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cgit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebml4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebml4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmatroska</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmatroska-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmatroska6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmatroska6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dropbear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-3_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-3_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav-database</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>optipng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-go-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-testresults</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atheme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atheme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libathemecore1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-radius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-virtualbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-desktop-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-host-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-websrv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imobiledevice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt5-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-uml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-vbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-login-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libav-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec-libav-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec-libav56</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice-libav-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice-libav55</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter-libav-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter-libav5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat-libav-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat-libav56</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample-libav-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample-libav2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil-libav-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil-libav54</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale-libav-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale-libav3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimp-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpui-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libircclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libircclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libircclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libircclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetonyek-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvisio-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwps-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdds-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdds-1_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-an</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-an_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-br_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gd_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gl_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gug_PY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-is_IS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-kmr_Latn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-kmr_Latn_SY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-kmr_Latn_TR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ne_NP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-oc_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-si_LK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sw_TZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-event</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnugk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>h323plus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>h323plus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libh323-1_26_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mupdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mupdf-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-16-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-32-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-32-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-8-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-posix1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-posix1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-icu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-icu0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_4m1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-idoutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-idoutils-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-idoutils-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-idoutils-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-plugins-downtimes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-plugins-eventhandlers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-www-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icoutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcscspy0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-22-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtrabackup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtrabackup-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugin-esd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugin-esd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-extra-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugin-gnomevfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzrtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzrtp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbzrtp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbzrtp0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrypto37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrypto37-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssl38</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssl38-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtls10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtls10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist++3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plistutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-plist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfixadmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-superserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbclient2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbembed2_5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>profanity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>profanity-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>profanity-standard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syncthing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syncthing-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syncthing-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munin-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Image-Info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bitlbee</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bitlbee-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bitlbee-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pax-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmxml1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qbittorrent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qbittorrent-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>partclone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>partclone-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby2_2-2_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby2_3-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-stdlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.2-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-stdlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.3-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-abstractions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-parser-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-utils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slrn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slrn-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-extra-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>backintime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>backintime-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>backintime-qt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>feh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpkg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpkg-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzzip-0-13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrypto41</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrypto41-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssl43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssl43-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtls15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtls15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>swftools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>encfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>encfs-lang</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.20.0-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.1</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:53.0.2785.89-96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.20-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:54.0.2840.59-109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">5</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.3.dev13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.2.dev26-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-2.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.32.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-5.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.1.0esr-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.35-1.126</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.27.2-11.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-1.179</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.31-20.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.5P1-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-3.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-27.1129</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.4-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-2.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.25-3.113</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-147.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.22-5.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-26.182</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-2.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.3+r212056-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.11-55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5-3.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-181.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.26-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.8-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.8-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.2-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.2-13.253</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-34.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:103-5.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158-3.200</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-14.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.3-1.131</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.3-1.213</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-13.232</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.26-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-2.149</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.9-5.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.406-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.3-3.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.36-54.100</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.30.6-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.2-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.10-1.164</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.38.2-5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-17.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.5-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.4-22.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.2-5.429</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-2.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-7.392</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-6.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.6-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.10.1-2.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:s20121221-2.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.65-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-7.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.28-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19-17.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.18-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-4.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-3.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.14-3.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-3.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.7-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2-3.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-3.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-3.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-3.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-3.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-3.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-3.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-6.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.12-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.5-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.5-2.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.21-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.21-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2.26539-13.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.4-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2d-3.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-352.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-3.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-182.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.5.1-5.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-3.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-12.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11-2.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-14.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.2-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.08-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0-4.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.2-15.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8.4-13.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-3.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-27.86</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.11-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.30.0-3.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-59.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.3-4.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-8.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-2.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.112-2.189</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.11-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.11-11.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-2.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-2.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-3.67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.4-3.88</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.1.2-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.19-16.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.10-24.128</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.8-18.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-18.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.2.1-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.44.2-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.25-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-1.265</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3-9.78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.3-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-8.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.2-17.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-4.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.7-3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.16-15.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2.umip.0.4-19.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.21-44.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.0-1.122</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-11.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.1-23.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-1.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-5.191</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.14-1.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.82-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.71-1.178</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.04-5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:804.031-3.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.38-7.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-267.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.2-3.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-2.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-21.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.7-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-1.92</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11_git201205151338-8.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2.4-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-1.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.83.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-778.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-94.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.1-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18.1-3.268</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-1.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-8.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-4.95</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.1-1.86</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-16.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-153.145</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-3.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-4.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.9-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-264.133</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_06-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_06_k3.12.28_4-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.914-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.15-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.43-5.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1-14.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6-45.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-12.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.108-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.11-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-1020.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.35-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.21.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.7-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.22-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.11-58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.16-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.42.11-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.9-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.548-111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-31.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.2-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.4-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.91-21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-2.4.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.65-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-8.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.49-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.2-1.81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.7-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-30.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-4.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.5-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.5.1-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.8-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:62.1.0-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2-30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.21-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-20.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.2.2-13.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.3-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.29-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18.1-4.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-242.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-25.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.10-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.21-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p4-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0019-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.38-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-6.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1_rc4-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.83.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.7-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140630-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1_12-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1_12_k3.12.49_11-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.914-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-36.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.155-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.18-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.12-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.42-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.14-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6+2.3.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.0-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.66.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-21.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.32-30.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-78.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3-78.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26.1-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.5-8.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.2-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.26-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.25-12.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.16-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.3-15.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:103-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-16.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.12-5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-5.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.26-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-12.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0~git.1463131968.4e66df7-11.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.15-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-52.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.18-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.48.2-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-49.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.0-27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-70.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-104.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-20.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.31-7.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.14-4.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-7.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.111-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.101-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.15-28.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-11.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-12.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-40.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-40.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-29.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.9-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.1-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.5-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-353.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-6.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-18.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.11-23.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.5-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.26-10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.27-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.16-1.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.40.1-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.43.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.13-16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.13-16.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.5.2-29.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.54.1-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.31-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.7-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-117.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.25-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-6.73</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.2-19.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-11.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.0.0-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4-6.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.2-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.84.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18.3-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.4-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.18.4-14.216</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.13-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.0_12-23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.917.641_ge4ef6e9-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.0-8.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-57.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.22-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.206-37.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.23-6.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.57-16.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.3</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.2.0esr-108.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.12-12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.27.2-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-49.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.2-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-12.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-17.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-28.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-28.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.76-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044-113.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.33_k4.4.73_5-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.42.11-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.12-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.6-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.0-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.18-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-61.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.5-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-49.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-76.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.27-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.36-17.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.31-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.11-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.141-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-2.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-2.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.131-26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.16-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.73-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.4-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.2-5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.2-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.11-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.29.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.29.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.2-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.5+git.27.6afd48b1083-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.3-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2.26539-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.29.5-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2d-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.29-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.30-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.66.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.0-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.39-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.13-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.6-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.5.1-42.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.9-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.33-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.8-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.7-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-4.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.5-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.28-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.62-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.0-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13.1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-63.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.25-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.5-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.7-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.24.0-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.24-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-23.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.20p2-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-99.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.14-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0_08-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.917.770_gcb6ba2da-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.36-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.2-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.11-1.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.22+git.1455008135.15c5e92-8.93</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.5-5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.15-19.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.35-1.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.3-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.25+git.1485179354.eb43835-2.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.11-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.16-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.35-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.1-5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.5-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-4.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.13-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.9.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.35-1.96</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.27.2-11.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.15-4.221</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-4.498</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.40-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-4.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.5P1-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-27.886</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.22-5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.3+r212056-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.13-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:103-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158-3.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.26-5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-2.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.36-54.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5.2-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.38.2-5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.4-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26.9-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.4-1.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.6-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-120.238</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-1.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.5-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-12.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.08-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.3-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-4.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.0-13.131</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.17-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-8.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2_k3.12.28_4-8.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2_k3.12.28_4-8.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-724.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.1-23.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.18-35.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-267.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-21.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.22.1-3.128</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.13-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.00-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-1.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-94.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.55-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.9-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-264.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1-14.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6-45.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.108-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2-1.149</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.40-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-11.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5.6-11.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26.10-4.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.10-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr1.10-2.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.10-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-4.5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2_k3.12.49_11-4.5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.26-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.8-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.13-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.00-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-4.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.23-1.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-14.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.14-18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.37-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-3.110</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5.6-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.32.4-14.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-15.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.50-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr3.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-1.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.32-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.9-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.3-15.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.1-24.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.22.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.18-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.21-23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-7.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.36-11.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.15-6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.8-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.8_k4.4.73_5-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.30.2-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.14-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.3-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.32.4-19.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-255.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.5-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.5-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.30-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.34-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.33-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-2.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.021-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.3-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.22.1-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.25-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.21-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.43-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.15-4.181</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-4.364</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.16-15.67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-147.67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5-3.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-181.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.13-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.2-5.287</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.4-1.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-3.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-7.209</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-6.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:s20121221-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-120.113</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.18-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-4.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-3.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.14-3.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-3.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-3.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-3.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-3.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-3.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-3.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-3.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.21-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2d-3.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-3.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-6.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11-2.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19-17.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-14.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8.4-13.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-27.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.30.0-3.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-3.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.8-18.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-1.218</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.3-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-4.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.7-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2.umip.0.4-19.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.0-1.107</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-724.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-1.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.14-1.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.82-3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.71-1.145</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:804.031-3.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.7-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11_git201205151338-8.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.1-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.15-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.43-5.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-3.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.206-36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-1020.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.0-167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.6-3.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-4.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5.2-2.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.3-261.135</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.28-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.28-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-25.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.12-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.10-4.124</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-2.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.7-1.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.148.1-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.5c-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.49-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.13-10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20100204cvs-25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.152.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.b5-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.9-1075.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.10-4.97</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.4-3.89</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.7-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-3.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.35-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.03.0-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.0-168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.12-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.9-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158.0-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.03.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.38-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.48-52.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.10-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.4-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.23-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.8-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.26-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3.2-22.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.55-52.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-70.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.55-52.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.8-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.26-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.02.3-6.6.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.1.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.7-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.2.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.10-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-149.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.3.2-40.5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-150.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.7-28.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-150.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-23.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.114-92.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.5.1-40.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.120-92.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-150.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.5.2-43.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.103-6.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.103-6.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.114-94.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.5.1-43.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.34-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.120-94.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.03.0-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.126-94.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.3.2-43.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.103-94.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.425-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.12-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.12-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.411-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.71-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.418-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.3.0esr-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.2-12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-66.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.424-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_06-22.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_06_k3.12.48_52.27-22.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.5.0esr-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-28.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-56.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.559-117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.0esr-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.6-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.6-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.451-77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.75-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-73.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_10-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_10_k3.12.36_38-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.3esr-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.13-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_02-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_02_k3.12.38_44-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.6.0esr-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.457-80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.16-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.79-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.429-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.460-83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_04-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_04_k3.12.39_47-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.7.0esr-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.4.0esr-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.3-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_06-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_06_k3.12.39_47-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.466-86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.14-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.39-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-28.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.468-89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.481-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.491-96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.8-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2_CKBI_1.98-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.20-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_08-22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_08_k3.12.43_52.6-22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.85-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.5P1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.4-5.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.508-99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_10-22.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_10_k3.12.44_52.10-22.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1-4.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.438-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.440-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.2.1esr-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.2.1-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.442-67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.521-102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.3.0esr-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.9-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1_rc4-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.48-52.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.535-105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.540-108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.10-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-22.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-70.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_02-22.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_02_k3.12.48_52.27-22.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.8-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.2-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.4-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.18-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20150827-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_08-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_08_k3.12.28_4-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.12-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-51.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-5.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.12-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.30.6-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.554-114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.12-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6-14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.2.0esr-75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.0-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-22.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.54.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.1-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.8-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1_3335ac1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20160511-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-28.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.30.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.95-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-27.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.6.0esr-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.569-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-22.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.11-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.577-123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-63.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-28.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.12-18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.99-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.616-126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.0.2-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.16-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.101-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p6-46.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12.4-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.8.0esr-66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.9-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.621-130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_02-22.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_02_k3.12.55_52.42-22.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.11-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.22-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-46.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.626-133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.25-20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2007e_suse-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.2-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-73.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2_02-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2_02_k3.12.49_11-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.632-137.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.10-7.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18.4-11.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.3_08-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.3_08_k3.12.59_60.45-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.3.0esr-78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-36.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25.35.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.26-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.635-140.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.3_10-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.3_10_k3.12.62_60.62-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.637-143.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.24-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.15-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.5.1-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.5-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.643-146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.72-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-181.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.644-149.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.2-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.111-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.28-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.121-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2007e_suse-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.39-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.5.0esr-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.3-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_02-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_02_k3.12.67_60.64.18-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.0.0.186-152.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.22-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_04-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_04_k3.12.67_60.64.24-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.7-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2_06-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2_06_k3.12.53_60.30-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.77-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.41.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p6-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.22-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.91-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p7-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.25-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.31-13.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.36-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-19.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.29-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.7.0esr-99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.7-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-54.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.131-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.0.0.221-158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-184.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_06-22.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_06_k3.12.69_60.64.32-22.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-54.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-24.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-10.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.0-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:25.0.0.127-162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.8.0esr-102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.0.0.194-155.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:25.0.0.148-165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.36-11.6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.6.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.9-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_10-22.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_10_k3.12.69_60.64.35-22.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:25.0.0.171-168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-32.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-32.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-32.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-32.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.9.0esr-105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.30-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1_rc4-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-26.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.6-44.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.5-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-42.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-42.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.1_02-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.1_04-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.12-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.2_06-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-149.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.9-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.11-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20170511-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.7-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-74.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-6.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044.1-109.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.36-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.31-29.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.8-48.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.15.2-27.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.30-18.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.9-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.5-15.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.18-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.54.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.144-27.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12-20.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0~git.1463131968.4e66df7-12.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-66.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.4-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.1-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.3_03-43.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.13-21.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-182.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-24.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.3_04-43.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.9-48.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.8-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.4-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.3.0esr-109.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.78-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.4.0esr-109.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.29.5-58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-268.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.3_06-43.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.312-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.0-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-14.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.151-27.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.2.4+git.1481215985.12b091b-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.22-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.18-9.3.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20170530-21.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.29.1-9.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.4_02-43.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.5.0esr-109.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.7-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.14-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.4-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.6-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.19.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.11-48.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-44.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.1_06-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044-108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.2_02-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.2_04-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-13.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-269.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-48.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.21-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.5-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.5e-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.3-33.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.9-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-11.3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:103-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.0-8.5.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.6.0esr-109.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-41.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.33-29.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-62.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.4_06-43.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.7-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.30-29.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.67-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.5-15.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.60.99-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.0+git.20160103-15.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-62.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.171-43.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.161-27.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.16-21.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20170530-21.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.90-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.34-29.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180312-13.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-184.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6.8-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.4-33.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.13-48.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-62.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.7.3esr-109.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.17-21.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.161-43.7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0beta-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.5_02-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.15-21.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.32-29.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20170530-21.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-13.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.9-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0019-6.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-150.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.7+git.38.90b2cdb4f22-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.15.3-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.4-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.1-13.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.11-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.1-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20170511-16.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0_11-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.15.6-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.32-21.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0_12-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.8-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.7+git.51.327af8d0a11-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0_14-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.312.333-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.1_02-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.9+git.59.c2cff9cea4c-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.114-94.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.1_08-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.33-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.33_k4.4.114_94.11-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.13+git.72.2a684235f41-3.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.10-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.33-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-5.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.67-10.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.22.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-64.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.14-48.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.126-94.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.21~rc-1001.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.54.0-26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-10.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.0-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.0-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.13-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.4-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.1-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.7-10.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180403-16.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1+git.1456406635.49e230d-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.13-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.15-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0+git.1448981395.15fb8b9-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.1+git.1495055229.643177f1-2.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-18.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-18.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10-18.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-4.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.11.4-46.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.11.4-46.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.11.4-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.1-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.18-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-8.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-20160727</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-20160727</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.4+gitr565_0366d7e-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.3-81.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.31.0-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1+gitr2816_02f8fa7-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-20160308170633</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-20160304104123</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-20160307082632</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.3-66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.0-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-20171002</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-20171002</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-20171006</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5+gitr569_2a5e70c-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.6-87.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1+gitr2819_50a19c6-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.18-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.9+gitr706_06b9cb351610-16.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.09.1_ce-98.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.1+gitr2066_7b2b1feb1de4-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0rc4+gitr3338_3f2f8b84a77f-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.02.9-6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.05.8.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.33-7.5.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.02.10-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.4-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.7-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.3-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.15-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-18.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.30-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.35-43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.25-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.26-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.50-50.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.41-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.45-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.11-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.2-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.69.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-59.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-64.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.4-15.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.11.1-11.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-109.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-109.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-109.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-89.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.3-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-109.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.7-15.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.12.2-11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-109.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-50.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-109.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.1-15.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.13-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.36-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-17.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.43-29.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.29.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.6-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.1-25.12.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-17.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.5-15.3.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.5_k4.4.114_92.67-15.3.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.50-29.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.39-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.58-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-60.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.88-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.95-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.104-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.114-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.5_k4.4.21_6-15.3.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.120-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.26-20.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-14.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25.16.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.14-10.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.27-20.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-28.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.14-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-70.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_04-22.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_04_k3.12.60_52.54-22.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-28.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.28-20.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.60-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_05-22.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_05_k3.12.60_52.57-22.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-46.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_05-22.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_05_k3.12.60_52.63-22.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.9-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.78-7.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-28.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_21-22.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_21_k3.12.61_52.77-22.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-30.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.3-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.31-20.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.44.2-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.18-25.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.10-38.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_22-22.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_22_k3.12.61_52.89-22.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.32-20.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.29-20.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-24.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-24.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_14-22.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_14_k3.12.61_52.66-22.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-28.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.1-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-28.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-28.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-46.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_16-22.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_16_k3.12.61_52.69-22.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_18-22.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_18_k3.12.61_52.69-22.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.30-20.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.17-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-26.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-22.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_12-22.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_12_k3.12.74_60.64.45-22.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-53.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.10-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_14-22.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_14_k3.12.74_60.64.54-22.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-20.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_16-22.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_16_k3.12.74_60.64.57-22.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-20.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_18-22.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_18_k3.12.74_60.64.60-22.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-33.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-33.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-33.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-33.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-54.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_20-22.36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_20_k3.12.74_60.64.63-22.36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.43-10.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.5-30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.15-38.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-40.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20160516git-10.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.22.1-16.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-33.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-33.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-33.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-33.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_24-22.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_24_k3.12.74_60.64.82-22.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.10-30.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.20-38.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-40.9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-20.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-54.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-5.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr2.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.151.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.38-44.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.39-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.39-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.32-33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.43-52.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5.6-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.36-38.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.36-38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-14.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr2.10-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5.6-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.20-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.31.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.49.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.54.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.30-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.11-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.55-52.42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.22.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.22.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.40-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.55-52.45.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr2.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.45.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6+git20160531.fbfe336-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.62.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.64.8.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.64.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr3.10-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr3.21-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr2.10-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.53-60.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.57-60.35.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.32.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.1-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.35.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.40.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-90.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.32.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.09-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.19-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.42-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.9-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20171128-9.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.162.0-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.17.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.114-92.64.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.20-38.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-15.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.15-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.114-94.11.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.12-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-15.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.103-94.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.103-94.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.55-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.22-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.40-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.0-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.27.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.68-7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.18-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.78-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-51.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-14.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_24-22.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_24_k3.12.61_52.92-22.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.82-7.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_26-22.59.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_26_k3.12.61_52.101-22.59.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-1.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140807git-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_28-22.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_28_k3.12.61_52.119-22.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.34-20.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-22.24.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-14.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.14-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.32-8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.18-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.32-10.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0_k3.12.53_60.30-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.32-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.14-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.43-10.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.74-60.64.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20160518_1.9.4-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.1-25.12.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.39-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev18-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev78-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev61-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev103-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev80-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.54-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.3.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:53.0.2785.113-100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:53.0.2785.143-106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.4.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.5-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.20.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.21.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.8-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.8-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:54.0.2840.90-112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.5.1-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:55.0.2883.75-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.6.0-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:51.0.2704.103-85.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.0.2743.82-89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.21.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.7-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.0.2743.116-92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:61.0.3163.79-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:61.0.3163.100-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.99.5-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.13-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.4.0-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.19-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.19-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.3-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.10-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.5.0-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.1.9-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:63.0.3239.84-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:18.3.4.7-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:63.0.3239.108-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.9-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.5.2-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.7-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.7.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.12.3-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:56.0.2924.87-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.25-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.26.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.26.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.25-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.8.0-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:57.0.2987.98-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.19-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.19-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:57.0.2987.133-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.6-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.10-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.4-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:58.0.3029.81-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:58.0.3029.96-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.1.0-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.26.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.26.0-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.25-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.25-7.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:59.0.3071.86-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.21-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.11-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.8-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.2-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:59.0.3071.104-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.08.2-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.08.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.12-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.0.3112.78-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.12.3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.08.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.3.0-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.6-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:64.0.3282.119-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180101-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:64.0.3282.140-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180201-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20180201-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.7-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:64.0.3282.167-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:14.4.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.19-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.19-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.8-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.100-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.100-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.2.10-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.10-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.11-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.9-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.7-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.19-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.19-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.0.1-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.17-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.18-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.20.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.20.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.18-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:64.0.3282.140-138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-154.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.1</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r4359-15.22.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r1053-11.16.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.14-2.12.105</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.40.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.35-0.2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-14.34.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-14.34.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-2.24.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-40.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.6-50.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.19.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.0P2-20.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.0-11.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.246</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-22.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.0-11.24.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.11.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.11.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3.ESV-0.3.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.1.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.3-4.32.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.4-152.17.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.2.68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.10.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.24-43.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-38.24.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.7.19.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.26-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.36-26.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.27.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.27.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.2.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.23-1.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.8-1.2.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.4.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.25-1.1.133</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.17-1.1.126</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-8.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.12-69.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.8-3.4.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.1.93</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.3-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr7.0-1.6.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.8.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.8.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-20.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.2.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.12-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-77.14.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.2-1.6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.2-1.6.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.2-1.6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-73.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-5.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.17-0.3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.17.1-31.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.0-1.2.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.24.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.6-2.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.67-13.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.3-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.27.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.2.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.21-1.5.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.4-194.23.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.2.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.4-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.1.151</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.6-1.9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.1.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.12-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2-17.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.19-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.9-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.13-1.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.3.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.31.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-0.5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-47.10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:184-147.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.47-13.13.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.47.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.56-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:804.028-50.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.5-26.22.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.8-1.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.8b-88.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.1.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.33.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p72-5.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5final-28.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.9p17-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-27.27.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.5-7.9.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-0.15.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20-23.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.80.2-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.52-142.23.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.2-132.1.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-36.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0_21091_04-0.2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0_21091_04_2.6.32.12_0.7-0.2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-9.24.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.19.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.02-138.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:238-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-911.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1_git20090811-3.20.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-5.22.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.14-2.23.126</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.58.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.58.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-14.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-14.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-6.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-91.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-18.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.26-1.30.110</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR5P1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.253.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-0.4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.199.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.65.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.76-34.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3.P2-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-44.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:61-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2-1001.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.3-4.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.4-152.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.26.33.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.20.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.24-43.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-38.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-269.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.23-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.15.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.30-5.8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-8.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.10-0.6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.10-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr9.3-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.1-16.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.13-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.48.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.34-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.27-0.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.1-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.5.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-307.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.94-0.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.29.6-6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.10-1.35.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.7.128</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.2-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.13.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-1.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.7-10.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.6-65.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02.84-3.25.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.14-9.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2.umip.0.4-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.7.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.24-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.24-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-0.22.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.13_0.27-0.22.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-662.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.10.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26.2-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.8-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.816-2.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-10.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.14-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.12-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.11-0.9.96</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-1.24.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.7-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5final-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.71.47-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-27.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.5-7.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-9.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-0.7.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.1-100.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26-1.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.48-101.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.18-20.35.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-11.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.2-132.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.10-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2_14-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2_14_3.0.13_0.27-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-9.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.60.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.119-0.5.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.44-0.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.3</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.3-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.4esr-0.10.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1_git20090811-3.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.14-2.28.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-14.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-6.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-91.25.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-20.9.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-16.9.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.13.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-0.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.30.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P4-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.24.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.24.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.207.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.26.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-144.23.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.16.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-44.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:61-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.29.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.24-43.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.16.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.7-0.9.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20.4-0.14.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.12-69.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5-0.7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-0.7.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.1-253.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr13.1-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr4.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6b-879.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.76-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.25.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.25.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.37.1-5.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-0.8.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.11.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.0-1.9.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.31-0.7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.10-1.35.113</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.2-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-0.12.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.152.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.10-0.9.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-0.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.1-0.7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.7-10.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02.98-0.25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.14-9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.27-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.16-0.11.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-18.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1-0.11.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.76_0.11-0.11.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-0.9.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.38.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-47.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.47-13.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.67.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.67.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-0.67.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.23-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.0-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.47.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.1-0.7.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.0-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5final-28.23.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.54-0.9.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.17.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.71.61-0.11.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-27.34.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.5-7.45.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-9.23.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.1-100.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-19.23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.48-101.31.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.18-20.35.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-0.9.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-0.7.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.12-517.12.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_04-0.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_04_3.0.76_0.11-0.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-9.62.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.81.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.99-17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.99-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.129-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.45-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.4</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.3-0.28.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.7.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.14-2.30.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-14.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13-1326.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-6.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-20.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-16.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.51.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.40-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-0.4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-40.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-0.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.1-4.131.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.27.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.27.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24-3.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.0-12.6.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.49.0-0.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-0.14.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.32.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-75.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.211.213.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-1.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-0.14.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.152-4.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.3-4.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.95-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.24-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.35.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.7-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.39.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.30-5.12.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20.12-0.18.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.10-0.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-0.15.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.1-16.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-255.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-30.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-77.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-68.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-2.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.52-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.4-0.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.3+r212056-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.0-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.03-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-3.118.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-3.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.43-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.10-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-3.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-1.38.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-1.25.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-0.17.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.7-10.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.6-65.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02.98-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12-24.4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.16-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-18.38.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p2-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1-20.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_63-20.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-0.11.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.15.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-0.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-37.63.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.63.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.22-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-240.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.26-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-168.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-6.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.14.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-1.24.8.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.1-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.14.3-50.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.318.81ee561d-0.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5final-28.23.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.71.61-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.5-7.50.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26-1.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.41-0.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-10.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.7-4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.13-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-217.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_08-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_08_3.0.101_63-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.14-130.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-9.65.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.99-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.140-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.46-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.0-29.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-31.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.18-4.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2011.10.10-0.7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.6-95.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.114.6-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.3.1.4-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.13.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-20.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.0-294.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-3.34.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-1.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.14-401.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-2.18.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.46-62.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-130.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.11a-116.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.10-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.5.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.5-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2-5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.9-9.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-126.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-0.1.141</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-206.27.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.14-4.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.15-23.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.17-481.19.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.17-481.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-0.10.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.6-143.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-249.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-2.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.6-2.7.90</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.139.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.3-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.10-120.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-28.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.56.2-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6c11-5.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-0.5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-0.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-0.5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-0.12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.1-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-0.7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.05-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-7.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-162.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.10-2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2007-219.34.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.11.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-0.2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.4P2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.8-56.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.8-56.44.45.129</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.5-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.2-0.4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-0.7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.46-62.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-170.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.9.13-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.18-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr15.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr6.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.20.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.4.13-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.2-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-37.50.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.50.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.4-0.7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-0.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-1.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.14-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.14-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-0.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.12-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.4_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2_20-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.5_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.70.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.6.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.3-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.9esr-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-0.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.5.0esr-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.5.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.6.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2_CKBI_1.98-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.23.1-0.23.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.23.1-0.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.52.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.7esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.10esr-0.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.4.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.7.0esr-0.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.8.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.3.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.4.0esr-0.8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.3esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.9-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.3.0esr-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-25.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.10-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.2.0esr-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.2.0esr-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.2.1esr-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.72.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.87.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20.4-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.7-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.15-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr8.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.10-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.20-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.12-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.39-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-206.29.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.21.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.6.0esr-31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.45-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.46-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.47-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.152.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.5-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.15-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.18-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.19-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6c8-10.19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6c11-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-0.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0u-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-162.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.11-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.7-0.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.9-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_12-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_14-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_08-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_08-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_18-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-78.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-78.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.8.0esr-40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.2.0esr-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.3.0esr-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.7.0esr-65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.8.0esr-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.9.0esr-71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13.1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.29.5-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.2.0esr-72.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.3.0esr-72.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.5.0esr-72.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.6.0esr-72.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.7.3esr-72.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_12-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-31.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.6-142.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-318.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20171128-8.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.162.1-7.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.12-56.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.114.6-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-144.23.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.65.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.28.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.28.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.3-42.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.4.0esr-72.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-10.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.41.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.33.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-3.34.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.10-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.20-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.30-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.40-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.60-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.1-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.5-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.10-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.15-26.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.20-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.50-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-88.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-94.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-97.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-104.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-65.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-68.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-77.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-84.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-107.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.113.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.23.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-1.9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.20-97.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.20-97.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-24.24.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.43-1.10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-132.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.03.beta1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.4.2-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-2.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.1-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20150827-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-100.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.6-145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.6-146.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.3-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-24.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.49-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.8.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.52-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.53-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.54-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.55-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.57-0.39.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.58-0.39.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.59-0.39.9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.03.90-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6-92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6-93.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6-93.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6-93.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.02.1-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.02.1-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.008-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.008-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.710.08-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-79.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-111.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.9-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.12-0.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.13-0.23.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.15-0.23.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.16-0.23.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.17-0.23.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.31.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.30.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-0.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.36.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.50.1-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.11-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.13-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.12-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.13-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.14-40.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.5-2.7.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.11-40.14.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:19-234.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-40.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.13-40.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.14-40.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_10-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_02-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_02-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_07-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_08-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_10-43.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_12-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_14-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_16-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_18-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_20-60.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_22-61.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_24-61.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_26-61.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_28-61.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_06-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-238.29.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.50.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.161-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.9esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.5-0.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.2-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-174.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.8-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.10-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.11-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.12-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.4esr-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5-1.47.51.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.5esr-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.6esr-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.7esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.10esr-0.4.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.336-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.7-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.7.17-0.5.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.1.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.95-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16-50.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.5-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.58_0.6.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2_20_3.0.38_0.5-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_02_3.0.38_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_04_3.0.42_0.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.5_02_3.0.74_0.6.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_02_3.0.93_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.99-3.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-28.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.166-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24-0.7.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24-0.7.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.1-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13_3.0.101_0.31-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-45.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-0.12.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:61-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.12.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24-0.7.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24-0.7.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38-15.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24-0.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-0.12.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.418-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.481-0.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.491-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.508-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.521-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.535-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.540-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.548-0.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.554-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.559-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-269.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.00-0.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.22-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.71-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.85-0.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.91-0.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.95-0.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.22.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-16.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-1.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38-18.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.0-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.0-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.97-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-0.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6+git20080930-6.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.25.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.17.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_06_3.0.101_0.47.52-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_02_3.0.101_0.40-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_12_3.0.101_0.47.55-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_14_3.0.101_0.47.67-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_06_3.0.82_0.7-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_02_3.0.93_0.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_08_3.0.101_0.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.15-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_04_3.0.101_0.47.52-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_08_3.0.101_0.47.55-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_18_3.0.101_0.47.71-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.07-6.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_12_3.0.101_63-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.20.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.569-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.577-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.00-0.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.99-0.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.0-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_10_3.0.101_63-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_02_3.0.101_65-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_02_3.0.101_68-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_06_3.0.101_65-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.47.55-2.28.1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.40-2.27.98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.47.55-0.17.1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.40-0.16.104</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.47.55-0.21.1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.40-0.20.98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_0.40-0.22.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0+git.1430140184.8e872c5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-2.32.2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_108.7-2.32.2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4-0.27.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4-0.27.2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_108.7-0.27.2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-0.24.2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_108.7-0.24.2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-0.28.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.7-0.28.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-2.32.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_108.35-2.32.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4-0.27.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4-0.27.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_108.35-0.27.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-0.24.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_108.35-0.24.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-0.28.5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.35-0.28.5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.12-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.0-23.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52-24.3.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52-24.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.5-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.14-0.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.2-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.3-0.20.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.4-0.20.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.78-0.16.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.30-75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.35-78.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.45-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.50-85.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.50-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.60-58.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.1-61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.5-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.15-65.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.20-65.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6+git20080930-6.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.33.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.47.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.66-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-94.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-94.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.53-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.80.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.86-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.90-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.96-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.99-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.99-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.102-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.105-45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.105-45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.5-45.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.8-45.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.14-45.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.33.5_rt23_0.4-0.7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0.0_2.6.33.20_rt31_0.5-0.2.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_2.6.33.20_rt31_0.5-2.5.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.11_2.6.33.20_rt31_0.5-0.3.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.33.20_rt31_0.5-0.9.11.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.33.20-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_2.6.33.20_rt31_0.5-0.4.2.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.33.20_rt31_0.5-0.9.13.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.33.18_rt31_0.3-0.9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.7.9-2.18.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.101_rt130_0.7.9-0.6.6.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.7.9-0.25.25.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.101_rt130_0.7.9-0.9.9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.7.9-0.11.78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.101_rt130_0.7.9-0.28.28.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.28-2.27.99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.28-0.22.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.28-0.38.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.28-0.11.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.28-0.20.99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.28-0.13.90</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.33.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.33.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.33.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_68-2.32.2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_68-0.27.2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_rt130_68-0.24.2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_68-0.28.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_69.14-2.32.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_69.14-0.27.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_rt130_69.14-0.24.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_69.14-0.28.5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.13-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.9-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.15-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.9.33-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.7-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.74-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.74-0.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.84.4-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5.5-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.24.9-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.13.8-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.11.4-43.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.11.4-43.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.11.4-42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.2-0.38.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.7.17-2.18.81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.7.17-0.7.109</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.7.17-0.11.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.10-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5-1.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.3.1-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.11-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.10-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.12-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.14.16-2.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r4359-15.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r1053-11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-151.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.47-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-2.23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.6-50.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.95.1-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3_20081022-11.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-75.27.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.0-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-107.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.76-34.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-7.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.45-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.1.1-11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.24.1.1-3.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.1.1-11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:IIIalpha9.8-691.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-130.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.21-3.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-87.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.15-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-24.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.2-7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-13.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-14.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.21-2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.10-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-10.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.15-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.15_2.6.27.48_0.6-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.13.1.2-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-124.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-124.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-9.14.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-9.28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-8.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-8.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.5-106.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.23_0.1-7.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.15_2.6.27.54_0.2-94.14.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.23-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.5_2.6.27.54_0.2-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:78.0.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:78.2.6.30.1_2.6.27.37_0.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-77.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.23-4.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-157.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.8-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-106.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.12-7.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.67-13.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.30.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3-12.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.17-172.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.beta2-6.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:128-13.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.6-14.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02.39-18.26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.2-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.15-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p6-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.870-26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.10.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.1-3.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-37.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.7-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.5-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.4-194.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.10-17.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.14.3-50.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p72-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8-1.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-42.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.2-128.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5-15.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.6-14.60.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.2-8.47.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-66.42.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.3-3.57.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.27-0.1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1_18546_24-0.3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1_18546_24_2.6.27.45_0.3-0.3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-238.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.21-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.10-64.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.6.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24-0.4.10.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.7-5.12.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.5-0.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.5-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.5.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24-0.4.10.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1_git20090811-3.9.9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-5.15.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.9-4.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-5.15.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-6.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-147.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1a15-131.23.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.28.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.20-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.12-32.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.27.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.76-34.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3.ESV-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-5.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.4-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.4-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.6-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.12-0.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.103</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.10esr-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3.0esr-0.4.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24-0.4.10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.2_20130108-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.7.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.8.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.3.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.4.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.3esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.2.1esr-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.2.0esr-0.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-0.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-24.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.8-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.20.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19-0.7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.32.19_0.2-0.7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.12-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.1-16.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.3-0.3.92</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.3-7.9.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.3-0.18.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.32.19_0.3-0.7.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.5_2.6.32.19_0.3-7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16_2.6.32.59_0.15-0.5.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.24-0.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1-20.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.20-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.18-28.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.29.6-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.6-1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.6-65.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02.39-18.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.2.0esr-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-0.5.7.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.2_20130108-0.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.19-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.11-3.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.9-1.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.29.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-0.9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.32.46_0.3-0.9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2011.6.28-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.46-2.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.33-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.816-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-37.29.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.29.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.6-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.20-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1-0.6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.18-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.17-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16-50.36.36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p72-5.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.71.31-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16-6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.7-4.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.13-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.6-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.30-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.1_21326_08-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.1_21326_08_2.6.32.36_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.31-0.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2_21511_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2_21511_02_2.6.32.43_0.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.6-1.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_02-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_02_2.6.32.54_0.3-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_04_2.6.32.59_0.5-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.34-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_08-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_08_2.6.32.59_0.7-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_10_2.6.32.59_0.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16_2.6.32.59_0.9-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-9.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4_0.11.0-0.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.02-138.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.02-138.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.35.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.21-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.2-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr10.0-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.12-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.8.0esr-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.3.0esr-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.0-20.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.1-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-0.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.14.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.14.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.3.0esr-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38-12.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.0-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.25-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr7.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.30-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.40-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.3-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38-15.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-17.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12-24.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p6-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.14.1-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p7-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.69.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.36-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.18-20.35.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.23-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.40-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.44-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_06-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_06_3.0.101_0.7.17-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.52.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38-10.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-0.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.2-88.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.30-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_0.40-0.38.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_0.40-0.13.89</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.5_3.0.101_0.40-7.39.89</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.68.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.16-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-76.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-12.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.7-4.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_20-24.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_20_3.0.101_0.47.79-24.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.svn1043876-1.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6_SVNr208-2.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.114-12.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.114-0.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.69.8-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.12-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-0.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.78-0.17.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.0-3.11.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.30-5.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-0.81.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.38.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-234.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-104.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20110923-0.59.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.0.894-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.50.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.64.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.76.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-27.24.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-64.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-35.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.81.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-0.81.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.81.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-0.81.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.79-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.79-4.9.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4-0.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-240.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.26-0.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.53.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.53.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.21~rc-936.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-94.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-13.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.36.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20-121.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26-1.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20120115_1.7.0-0.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.45-0.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.41-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.45-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.5-160.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-11.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-11.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-8.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-8.20.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_07_3.0.101_77-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_08_3.0.101_80-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_10_3.0.101_88-43.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_12_3.0.101_91-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_14_3.0.101_94-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_16_3.0.101_97-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_18_3.0.101_97-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_20_3.0.101_104-60.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_22_3.0.101_108.7-61.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_24_3.0.101_108.10-61.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_26_3.0.101_108.13-61.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_28_3.0.101_108.35-61.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.6-67.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.8-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.39_0.3-7.1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.39-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.67-13.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.1-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.13-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.10-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.7-1.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.7-1.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.17-172.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr7.0-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.21_0.1-7.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.21-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.21-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.0P2-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8-1.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.8-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.8-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.2-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.12-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.12-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.95-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.6-50.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.25_0.1-7.1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.25-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.48_0.1-7.1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.48-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.11-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.4-1.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.15-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.4-2.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.8-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.18-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.8-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:78.0.10.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:78.2.6.30.1_2.6.27.25_0.1-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.3.1-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.29_0.1-7.1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.29-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.12-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.0-11.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr6-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.8.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.13-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8-1.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.6-50.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.37_0.1-7.1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.37-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.3-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.14-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.3-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.42_0.1-7.1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.42-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.8-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.22.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.2-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.6-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.6-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.4-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.6-3.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.9-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.6-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr9.0-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p6-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.45_0.1-7.1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.45-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.16-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.0P2-20.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.27.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.27.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.5-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr8.0-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr8.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.13-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.16-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.13-1.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.7-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.17-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.7-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r4359-15.20.10.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r4359-15.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.13_0.4-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.7-0.3.107</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.13_0.4-7.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.7-7.9.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.7-0.18.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.13-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.8-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.8-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.15-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.17-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.15-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96.1-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.13_0.5-0.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.13_0.5-7.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.13-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-37.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0.0_2.6.33.7.2_rt30_0.3-0.2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.33.7.2_rt30_0.3-0.7.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.33.7.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_2.6.33.7.2_rt30_0.3-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.6-1.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.19_0.2-0.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.19_0.2-7.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.19-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.10-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.10-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.54_0.2-7.1.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.54-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.22.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.29_0.3-0.3.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.29_0.3-7.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.29-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.10-17.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.23_0.3-0.3.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.23_0.3-7.3.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.23-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.19_0.3-0.3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.19_0.3-7.3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.19-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.48_0.12-7.1.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.48-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.24_0.2-0.3.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.24_0.2-7.3.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.24-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.12-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.11-0.1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96.4-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.27_0.2-0.3.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.27_0.2-7.3.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.27-0.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.94-0.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.22.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0.0_2.6.33.20_rt31_0.3-0.2.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_2.6.33.20_rt31_0.3-2.5.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.11_2.6.33.20_rt31_0.3-0.3.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.33.20_rt31_0.3-0.9.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.33.20-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_2.6.33.20_rt31_0.3-0.4.2.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.33.20_rt31_0.3-0.9.13.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.74_rt98_0.6.2-2.18.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.74_rt98_0.6.2-0.6.6.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.74_rt98_0.6.2-0.23.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.74.rt98-0.6.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.74_rt98_0.6.2-0.7.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.74_rt98_0.6.2-0.11.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.74_rt98_0.6.2-0.28.28.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.54_0.3-0.3.73</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.54_0.3-7.9.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.54-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.36_0.5-0.3.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.36_0.5-7.9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.36-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0.0_2.6.33.18_rt31_0.3-0.2.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_2.6.33.18_rt31_0.3-2.5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.11_2.6.33.18_rt31_0.3-0.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.33.18_rt31_0.3-0.7.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.33.18-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_2.6.33.18_rt31_0.3-0.4.2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.45_0.3-0.3.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.45_0.3-7.9.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.45-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.8-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr9.1-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.9-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.13-0.3.163</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.13-7.9.130</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.13-0.18.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-0.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.17-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.17-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.18-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.18-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.20-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.20-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.6-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr9.2-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.10-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-44.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3.ESV-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97-5.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.43_0.4-0.3.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.43_0.4-7.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.43-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26-0.7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.26_0.7-2.10.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.26_0.7-0.7.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.26_0.7-0.7.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.9-0.3.151</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.9-7.9.118</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.9-0.18.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.49_0.3-0.3.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.49_0.3-7.9.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.49-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.24-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR4P3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.27.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.2-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3.ESV-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.46_0.3-0.3.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.46_0.3-7.9.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.46-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.23-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.23-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-37.29.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.29.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.11-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.11-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.12-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.26-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.12-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR5P1-0.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.46.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-0.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.11-0.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.3-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.1-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b24.1.11.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr2.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr11.0-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.58-0.6.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_06_3.0.58_0.6.2-0.7.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.58_0.6.2-2.18.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.58_0.6.2-0.7.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.58_0.6.2-0.11.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.28.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.4.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b24.1.11.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.14-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr12.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr3.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr13.0-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr4.0-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.12-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.51-0.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.51_0.7.9-2.18.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.51_0.7.9-0.7.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.51_0.7.9-0.11.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P1-0.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.13-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.12-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.34-0.7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.34_0.7-2.10.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.34_0.7-0.7.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.34_0.7-0.7.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.31-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.31_0.9-2.10.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.31_0.9-0.7.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.31_0.9-0.7.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.74-0.6.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.74_0.6.6-0.5.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.74_0.6.6-2.18.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.74_0.6.6-0.7.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.74_0.6.6-0.11.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.35-0.7.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.35-2.27.78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.35-0.16.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.35-0.20.78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.61_rt85_0.7-2.18.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.61_rt85_0.7-0.6.6.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.61_rt85_0.7-0.23.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.61.rt85-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.61_rt85_0.7-0.7.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.61_rt85_0.7-0.11.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.61_rt85_0.7-0.26.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.24-2.27.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.24-0.22.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.24-0.38.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.24-0.11.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.24-0.20.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.24-0.13.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.42-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.42_0.7-2.18.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.42_0.7-0.7.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.42_0.7-0.11.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.38-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.38_0.5-2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.38_0.5-0.7.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.38_0.5-0.7.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.14-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.15-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P3-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_02_3.0.101_0.46-0.7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.42-2.27.115</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.42-0.16.121</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.42-0.20.115</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.32-2.27.121</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.32-0.22.87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.32-0.38.106</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.32-0.11.96</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.32-0.20.121</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.32-0.13.112</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-0.5.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_06_3.0.101_0.7.23-0.5.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.15.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P4-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P4-0.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.243-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.251-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_06_3.0.51_0.7.9-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.42-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.258-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.33.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.37.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.52.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.28.52.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.80.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.80-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.5_02_3.0.80_0.5-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.82-0.7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_04_3.0.82_0.7-0.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.80_0.5-2.18.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.80_0.5-0.7.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.80_0.5-0.11.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.82_0.7-2.25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.82_0.7-0.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.82_0.7-0.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.80_rt108_0.5-2.18.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.80_rt108_0.5-0.6.6.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.80_rt108_0.5-0.23.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.80.rt108-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.80_rt108_0.5-0.7.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.80_rt108_0.5-0.11.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.80_rt108_0.5-0.28.28.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.42.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.8-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr13.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr4.2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.2-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.15-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.16-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.273-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.261-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.262-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.270-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.275-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.3esr-0.4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.4-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.58-0.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_06_3.0.58_0.6.6-0.7.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.58_0.6.6-2.18.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.58_0.6.6-0.7.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.58_0.6.6-0.11.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.93-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.5_02_3.0.93_0.5-0.5.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.93-0.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_06_3.0.93_0.8-0.7.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.93_0.5-2.18.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.93_0.5-0.7.91</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.93_0.5-0.11.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.93_0.8-2.27.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.93_0.8-0.16.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.93_0.8-0.20.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.93_rt117_0.5-2.18.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.93_rt117_0.5-0.6.6.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.93_rt117_0.5-0.25.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.93.rt117-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.93_rt117_0.5-0.7.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.93_rt117_0.5-0.11.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.93_rt117_0.5-0.28.28.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.93_rt117_0.9-2.27.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.3_3.0.93_rt117_0.9-0.19.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.93_rt117_0.9-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.93.rt117-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.93_rt117_0.9-0.11.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.93_rt117_0.9-0.20.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.93_rt117_0.9-0.13.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.280-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.17-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.6-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-0.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr14.0-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr5.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.8esr-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.8esr-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.12.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.33-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.70.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.74-0.6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.74_0.6.8-0.5.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.74_0.6.8-2.18.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.74_0.6.8-0.7.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.74_0.6.8-0.11.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.74_rt98_0.6.4-2.18.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.74_rt98_0.6.4-0.6.6.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.74_rt98_0.6.4-0.23.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.74.rt98-0.6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.74_rt98_0.6.4-0.7.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.74_rt98_0.6.4-0.11.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.74_rt98_0.6.4-0.28.28.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_08_3.0.101_0.15-0.7.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.15-2.27.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.15-0.16.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.15-0.20.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.10-2.27.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.10-0.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.10-0.38.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.10-0.11.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.10-0.20.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.10-0.13.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_02_3.0.101_0.5-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_02_3.0.101_0.8-0.7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.5-2.18.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.5-0.7.98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.5-0.11.68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.8-2.27.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.8-0.16.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.8-0.20.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.5-2.18.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.101_rt130_0.5-0.6.6.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.5-0.25.25.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.101_rt130_0.5-0.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.5-0.11.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.101_rt130_0.5-0.28.28.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.8-2.27.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.8-0.18.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.8-0.38.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.8-0.11.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.8-0.20.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.8-0.13.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.8-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.285-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.74-0.6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.74_0.6.10-0.5.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.74_0.6.10-2.18.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.74_0.6.10-0.7.73</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.74_0.6.10-0.11.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.74_rt98_0.6.6-2.18.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.74_rt98_0.6.6-0.6.6.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.74_rt98_0.6.6-0.23.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.74.rt98-0.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.74_rt98_0.6.6-0.7.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.74_rt98_0.6.6-0.11.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.74_rt98_0.6.6-0.28.28.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.17.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.291-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.297-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.310-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.15-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.33.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.6-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.37-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.7.15-0.5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.7.15-2.18.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.7.15-0.7.107</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.7.15-0.11.78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.70.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.21-0.7.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.21-2.27.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.21-0.16.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.21-0.20.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.14-2.27.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.14-0.22.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.14-0.38.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.14-0.11.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.14-0.20.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.14-0.13.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.28.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.33.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.54.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.3P2-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.9-0.2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.327-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.332-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr15.1-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr6.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.11-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.12-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.82.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.16.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_04_3.0.101_0.47.50-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.47.50-2.28.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.47.50-0.17.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.47.50-0.21.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.33.36-2.28.1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.33.36-0.23.1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.33.36-0.39.1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.33.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.33.36-0.12.1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.33.36-0.21.1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.33.36-0.14.1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.29-0.7.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.29-2.27.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.29-0.16.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.29-0.20.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.16-2.27.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.16-0.22.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.16-0.38.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.16-0.11.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.16-0.20.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.16-0.13.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.41-0.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.23.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.335-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.341-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.346-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.350-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.359-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.356-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.378-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.394-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.400-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.406-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.411-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.425-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.24-43.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.13-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.65-0.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_06_3.0.101_0.7.21-0.5.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.62.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.75-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr7.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.14.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.14.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.10-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_08_3.0.101_0.47.55-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.33.38-2.28.1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.33.38-0.23.1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.33.38-0.39.1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.33.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.33.38-0.12.1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.33.38-0.21.1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.33.38-0.14.1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.17-0.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.27-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.424-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.3-0.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr8.10-0.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.3-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr8.10-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.6-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.74.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.55.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.33.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.54.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.429-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.438-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.440-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.442-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.451-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.457-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.75-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.12-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.0esr-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.0esr-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.22.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.29.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.460-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.466-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.468-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.22.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.22.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.14-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.43-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.8.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9+git.1473844105.932298f-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.3-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9+git.1443859419.95e948a-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev103-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev103-16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev18-9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev18-9.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev19-9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev19-9.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev5-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev5-9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev13-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev13-9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev5-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev5-11.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev3-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9+git.1443622531.b2b2939-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev12-13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.juno-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.juno-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.juno-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.juno-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev80-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.juno-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.11-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.11-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.0-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.0-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.9-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.9-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.9-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.9-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">6</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0+git.1456169766.1e60d19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.14-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.15-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.14-1.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.2~a0~dev1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2~a0~dev7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.0.2~a0~dev2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.2~a0~dev9-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.0+git.1452795102.e53f5d3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3~a0~dev14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2~a0~dev8-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.4~a0~dev18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.2~a0~dev63-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.0.2~a0~dev18-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.1~a0~dev2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.4-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.3-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.4-2.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.1-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.32.2-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.32.2-1.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.32.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.32.2-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.32.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.4-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3~a0~dev10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3~a0~dev10-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.5~a0~dev3-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.1~a0~dev238-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3~a0~dev1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.1~a0~dev19-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.4~a0~dev6-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.4~a0~dev6-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.3~a0~dev2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2~a0~dev34-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.0.2~a0~dev13-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.2~a0~dev93-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.2~a0~dev93-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.1~a0~dev13-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.1~a0~dev13-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2~a0~dev11-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2~a0~dev11-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.2~a0~dev29-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.2~a0~dev1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.0.5~a0~dev2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0+git.1467079370.4f2c49d-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1~a0~dev2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.2-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.9-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.9-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.9-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.9-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.1-6.4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.1_k3.12.74_60.64.69-6.4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.39-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.19-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0+git.1521471181.2b39130da-39.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.2~a0~dev30-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2~a0~dev34-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.0.2~a0~dev7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">7</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.0.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.0.1~a0~dev6-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.0.1~a0~dev6-4.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4~a0~dev1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20170912_10.45-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:14.0.10~dev13-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:14.0.10~dev13-4.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2~a0~dev20-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2~a0~dev20-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.4~a0~dev7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.4~a0~dev7-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.5~a0~dev1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.4~a0~dev2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.0.1~a0~dev6-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.0.1~a0~dev6-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.4~a0~dev4-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.4~a0~dev4-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.2~a0~dev2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.2~a0~dev2-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2~a0~dev22-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.1~a0~dev27-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:14.0.6~a0~dev16-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:14.0.6~a0~dev16-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.39-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.5.6-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009054221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.19-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">42.1</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:49.0.2623.75-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.0+git.20160103-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:50.0.2661.75-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:51.0.2704.79-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:49.0.2-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.0-170.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.21-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:41.0.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.3.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.40-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.29-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.1_r8-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.15-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-36.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19.0-7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.16-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.31-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-76.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-76.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25.0-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.21.1-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.7-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.12-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.26-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.22-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-30.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-16.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-16.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.3_k4.1.12_1-4.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-57.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.11-57.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.18-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.26-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.16-5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.16-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.2-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.3-2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.42.11-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-18.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.10-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.2-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.21-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.26-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.3-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.31.6-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.10-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.14-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.44.1-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-17.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.0-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.4.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.4-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.2-7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.2-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-20.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.4-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.6-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.28-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.3-267.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:s20121221-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.17-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.60-4.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.00-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.22-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.10-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.04.3-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.04.3-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.08.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.08.0-7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-779.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-779.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-19.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.4-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.18-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.14-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.10-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.5-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.21-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.21-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.25-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.4.26856-5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-18.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.1-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-184.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-4.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:62.1.0-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2-31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.0-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-16.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.2-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.08-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.7-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9-4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8.5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-10.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.21-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.30.1-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.16-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.8-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.14.12-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.112-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.11-13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.11-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.15-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.2-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.2.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.8-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.8-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.3-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.50.0-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.29-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.5.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.10-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20100204cvs-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.6-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18.1-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.2-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-240.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.7-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.7-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.20-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.3-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.8-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.24-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p3-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.06-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-726.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.152.0-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.1-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.5-5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.23-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.82-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.71-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.04-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0019-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.38-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.23-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-267.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.07-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.2-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.24.1-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1_rc4-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.2-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11_git201205151338-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.21-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.83.8-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.10-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18.3-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20141104-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.84-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.23-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.0-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.6-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.6_k4.1.12_1-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.7-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1_10-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1_10_k4.1.12_1-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.917-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.15-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.43-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.17.2-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.155-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-1027.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.8-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.13-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.53-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:42.0-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.10-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.39-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.4.0-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.9.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1_12-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1_12_k4.1.12_1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.91-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.66-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p4-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.33-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:46.0.2490.86-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.18-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.9-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.4.0-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.13-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.13-5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.13-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.27-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2_01-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2_01_k4.1.12_1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.15-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:47.0.2526.80-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:47.0.2526.106-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:43.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.26-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.46.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.16.0-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.3-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.3-6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.1-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.1-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.20-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.1-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.3-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.5.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.5.0-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.20-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.6-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.9-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.8-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.40-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:48.0.1-30.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.24-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.32-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.72-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25.35.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.71-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.32-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.26-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.02.3-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.6-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.6_k4.1.31_30-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28_k4.1.31_30-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.25.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.25.1_k4.1.31_30-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.31-30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.31-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.31-30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0_k4.1.31_30-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44-266.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44_k4.1.31_30-266.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140928-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140928_k4.1.31_30-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.35-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:39.0.2256.71-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.5-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:40.0.2308.54-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.6-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.31-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:42.1-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.2-29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:49.0-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.25-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.95-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.14-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.37-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.1-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.66.3-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.9-1078.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.1.6-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.15-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.15-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.15-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.8-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.9-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.3_10-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.3_10_k4.1.31_30-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.0-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:103-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.5.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.9-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.6_k4.1.34_33-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28_k4.1.34_33-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.25.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.25.1_k4.1.34_33-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.34-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.34-33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0_k4.1.34_33-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44-268.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44_k4.1.34_33-268.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140928-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140928_k4.1.34_33-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.9-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.9-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.15-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.7.6-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.21-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.8-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.24.1-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.5.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.6.0-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.1-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:44.0-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.34-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:41.0.2353.56-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:54.0.2840.100-91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.24-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.21-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.22-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:50.0-39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.26.2-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.20.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.25-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.34-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.111-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:50.0.2-42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.5.1-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.4+gitr565_0366d7e-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.3-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1+gitr2816_02f8fa7-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.9-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.21-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.28-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.6-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.6_k4.1.36_38-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28_k4.1.36_38-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.25.1-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.25.1_k4.1.36_38-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.36-38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0_k4.1.36_38-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44-270.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44_k4.1.36_38-270.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140928-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140928_k4.1.36_38-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.6-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.36-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.36-41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.121-37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.13-23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.39-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:55.0.2883.75-99.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.32-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2d-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.4.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:50.1.0-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.4-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.25-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.21-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.7.6-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.28-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8f-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8f-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.3.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:48.0.2564.109-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.6.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:44.0.2-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:48.0.2564.116-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.6-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.1.git.1455712026.9c0a4a0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.1+git20160217.7897d3f-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6+git20160218.73d6618-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.11-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.4-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.54-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.1-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19.0-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19.0-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19.0-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19.0-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19.0-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19.0-6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19.0-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19.0-12.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19.0-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.0-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8zh-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.10-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.5-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2015.8.7-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.86.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.7-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.b5-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2_04-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2_04_k4.1.13_5-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:49.0.2623.87-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.32-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.72-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.7.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.24.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2_06-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2_06_k4.1.15_8-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:49.0.2623.110-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:201604040002-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.77-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.99-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.20-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.20-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.20-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:201604110002-74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.24.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.5-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.38-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:201604180001-77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:50.0.2661.94-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:46.0-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22.3-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.41.3-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.5-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.11-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8zh-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.91-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.101-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p6-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.22-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:50.0.2661.102-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.16-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.6-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.24.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p7-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:43.0.3-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8f-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.21-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.5b-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.30-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.15-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.21-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.21-14.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.21-14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:51.0.2704.63-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.6-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.18-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.18_k4.1.21_14-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.67-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.31.6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:201606060002-105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.21-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.0.2220.29-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:47.0-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.23-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.5-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:201606130003-109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:51.0.2704.103-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.9-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.26-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.26-21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.4-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6+git20160531.fbfe336-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.7-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.16-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.27-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.27-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.5-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20160511-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.5-30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.17-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.12-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.74-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7a-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:48.0-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.24-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.5-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18.4-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.13-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.22-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1+git.1456406635.49e230d-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.111-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.101-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.21-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.14-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:48.0.2564.82-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.5-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.36-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.36-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.36-44.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.31.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.17-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.9-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.14-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.021-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.32-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.32_k4.1.36_44-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5+gitr569_2a5e70c-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.6-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1+gitr2819_50a19c6-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:51.0.1-50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.46-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:201701300007-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10a-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.10-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.21-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:43.0.2442.806-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.38-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.38-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.38-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.29-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.35-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10a-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:56.0.2924.87-102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.26-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.131-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.6.27020-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.7-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.3-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.38-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.38-50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.38-50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4cvs20150223-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14.16-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.2.3-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.11-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.25-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.24-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.39-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.7-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.0-55.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.28.3-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.68-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.0.1-57.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.11-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.5a-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_06-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_06_k4.1.36_41-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-77.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.21-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.39-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.39-53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.11-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.6-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:201704030005-54.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.2-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.9-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.10-33.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.14-5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-16.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-175.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.5d-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-48.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.36-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-10.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.28.4-40.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.1.0-57.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-29.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.7-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.0-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.9-8.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.7-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.40-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.40_k4.1.39_53-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.21-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.1.0-41.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.24.1-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.10-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.62-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.36-24.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.39-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.39-56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.39-56.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.2-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1-151.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.9-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.43-6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <signature_keyid operation="equals">b88b2fd43dbdc284</signature_keyid>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.9-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.6-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.14-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.11-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.7-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.021-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.0.2743.82-61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.2-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.6-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4cvs20150223-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.3.0-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.12-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.18-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.0.2743.116-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:53.0.2785.89-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:53.0.2785.113-74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:53.0.2785.143-79.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:54.0.2840.59-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:54.0.2840.90-85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:50.0-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.14-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.36-25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.111-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-68.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.20-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.3-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.5-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.43-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.4+gitr565_0366d7e-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.3-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1+gitr2816_02f8fa7-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:50.0.2-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.7-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.39-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2d-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.28.4-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.6.0-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5+gitr569_2a5e70c-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.6-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1+gitr2819_50a19c6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:57.0.2987.98-105.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:57.0.2987.133-108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:58.0.3029.81-111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:58.0.3029.96-114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.21-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.12.3-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.7.0-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.1.0-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.0.1-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.1.0-61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10a-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.26-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.62-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.25-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.9-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.18-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.21.0-23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.11-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.2-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.5a-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.5d-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.9-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1-151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.21.0-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.18-18.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
